CN105190590B - For managing the method and system of data and/or for the service of equipment - Google Patents
For managing the method and system of data and/or for the service of equipment Download PDFInfo
- Publication number
- CN105190590B CN105190590B CN201480024191.3A CN201480024191A CN105190590B CN 105190590 B CN105190590 B CN 105190590B CN 201480024191 A CN201480024191 A CN 201480024191A CN 105190590 B CN105190590 B CN 105190590B
- Authority
- CN
- China
- Prior art keywords
- module
- access
- particular device
- agency
- services
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Abstract
The method and system implemented is calculated, the data of the application including obtaining one or more protection parts in relation to being configured to access specific device, the application is configured to provide one or more services;At least one of one or more services have been completed in detection application and application maintains the access to one or more protection parts of specific device;It presents and shows to have completed one or more services and using the information for maintaining the access to one or more protection parts of specific device;And for promoting that circuit of the option to interrupt the access using one or more protection parts to specific device is presented.Apart from the above, in terms of describing other in claims, attached drawing and text.
Description
Any and all female case, the grandmother's case, great-grandfather of earlier application and related application and earlier application and related application
All themes of the application of female case etc. (including any prior claims) by reference with these themes with herein simultaneously
Consistent degree is incorporated herein invariably.
Background
This application involves data services.
Summary of the invention
In one or more aspects, a kind of method includes but is not limited to: obtaining and related is configured to access specific device
The data of the application of one or more protection part, the application are configured to provide one or more services;Detection application is
It is completed at least one of one or more services and application is maintained to one or more protection parts of specific device
Access;It presents and shows to have completed one or more services and using the one or more protection parts maintained to specific device
Access information;And promote that option is presented to interrupt the access using one or more protection parts to specific device.
In addition to the above, it constitutes in claims, attached drawing and text of disclosed a part set forth herein and describes other
In terms of method.
In one or more aspects, one or more related systems can be limited to the patentability according to 35U.S.C.101
Implement in the machines of Sexual Themes, material composition or manufacture system.One or more related systems can include but is not limited to be used for
Circuit and/or programming in terms of the method that implementation is mentioned above.Circuit and/or programming can be in fact arranged to according to being
Unite designer design alternative and be limited to realize the method side being mentioned above according to the patentability theme of 35U.S.C.101
Any combination of the hardware in face, software and/or firmware.
In one or more aspects, a kind of system includes but is not limited to: related being configured to access specific dress for obtaining
The device of the data of the application for the one or more protection parts set, the application are configured to provide one or more services;
For detect using completed at least one of one or more services and application maintain to one of specific device or
The device of the access of multiple protection parts;Show to have completed one or more services for rendering and application is maintained to specific
The device of the information of the access of one or more protection parts of device;And for promoting that option is presented to interrupt using to spy
Determine the device of the access of one or more protection parts of device.In addition to the above, set forth herein disclosed one is constituted
In terms of describing other systems in partial claims, attached drawing and text.
In one or more aspects, a kind of system includes but is not limited to: related being configured to access specific dress for obtaining
The circuit of the data of the application for the one or more protection parts set, the application are configured to provide one or more services;
For detect using completed at least one of one or more services and application maintain to one of specific device or
The circuit of the access of multiple protection parts;Show to have completed one or more services for rendering and application is maintained to specific
The circuit of the information of the access of one or more protection parts of device;And for promoting that option is presented to interrupt using to spy
Determine the circuit of the access of one or more protection parts of device.Apart from the above, disclosed a part set forth herein is constituted
Claims, describe other systems in attached drawing and text in terms of.
In one or more various methods, a kind of computer program product, the signal including the one or more instructions of carrying
Bearing medium, one or more of instructions include but is not limited to: for obtain in relation to be configured to access specific device one
One or more instructions of the data of the application of a or multiple protections part, the application are configured to provide one or more clothes
Business;At least one of one or more services have been completed and using one maintained to specific device for detecting to apply
Or one or more instructions of the access of multiple protection parts;Show to have completed one or more services for rendering and answer
With the one or more instructions for the information for maintaining the access to one or more protection parts of specific device;And for promoting
Option is presented to interrupt and instruct using the one or more of access of one or more protection parts to specific device.Except above-mentioned
Except, it constitutes in claims, attached drawing and text of disclosed a part set forth herein and describes other computer programs
In terms of product.
In one or more various aspects, device is defined by computational language, so that described device includes: to order for obtaining
One or more interchain physics in relation to being configured to access the data of the application of one or more protection parts of specific device
Machine, the application are configured to provide one or more services;It orders and has completed one or more clothes for detecting application
At least one of business and application maintain one or more chains of the access to one or more protection parts of specific device
Between physical machine;It orders and shows to have completed one or more services for rendering and using one maintained to specific device
Or one or more interchain physical machines of the information of the access of multiple protection parts;And order for promote present option with
Interrupt one or more interchain physical machines of access of the application to one or more protection parts of specific device.
Apart from the above, in the text of such as disclosure (for example, claims and/or specific embodiment) and/or
In terms of various other methods and/or system and/or program product are illustrated and described in the introduction of attached drawing.
Above content is to summarize and therefore may include the simple of details to talk about, summarize, include and/or omit;Therefore, ability
Field technique personnel should understand that this general introduction is merely illustrative, and not be intended to be construed as limiting in any way.Pass through ginseng
According to specific embodiment, corresponding attached drawing and/or introduction set forth herein will make equipment and/or method described herein and/
Or other aspects, features and advantages of other themes become apparent.
Detailed description of the invention
In order to which embodiment is more fully understood, it is described below presently in connection with attached drawing reference.In different figures using identical
Label usually indicate similar or identical project, unless the context indicates otherwise.Specific embodiment, drawings and claims
Exemplary embodiment described in book is not intended to limit.The spirit or scope for not departing from subject matter disclosed herein the case where
Under, it can use other embodiments, and other modifications can be carried out.
Figure 1A shows the high level block diagram of exemplary environments 100 according to the embodiment.
Figure 1B shows the high level block diagram of the personal device 120 according to the embodiment to work in exemplary environments 100.
Fig. 1 C shows the personal device 120 according to the embodiment to work in exemplary embodiment 100' and calculates equipment
The high level block diagram of 130A.
Fig. 1 D shows the personal device 120 according to the embodiment to work in exemplary embodiment 100 " and calculates equipment
The high level block diagram of 130B.
Fig. 1 E show it is according to the embodiment exemplary embodiment 100 " ' in work personal device 120 and calculating set
The high level block diagram of standby 130C.
Fig. 1 F shows according to the embodiment in exemplary embodiment 100 " " in work personal device 120 and calculating set
The high level block diagram of standby 130D.
Fig. 2, including Fig. 2A -2C show according to the embodiment 152 in relation to being configured to provide one or more services simultaneously
And the one or more particular device protection portion for selectively accessing the processing module 150 of the personal device 120 of Figure 1B are separately won
The specific perspective view of the data of the agency of module.
Fig. 3, including Fig. 3 A-3D, the agency for showing according to the embodiment 154 one or more services stops and agency
The one or more particular device protection portion for continuing to access the processing module 150 of the personal device 120 of Figure 1B divide detection module
Specific perspective view.
Fig. 4, including Fig. 4 A-4C show according to the embodiment 156 and continue proxy access one or more particular device guarantor
The instruction of the stopping of module is presented in one or more services of the processing module 150 of the personal device 120 of shield part and Figure 1B
Accord with specific perspective view.
Fig. 5, including Fig. 5 A-5D show according to the embodiment 158 and the personal device for stopping proxy access Figure 1B are presented
One or more particular devices protection part of 120 processing module 150 promotes the specific perspective view of the option of module.
Fig. 6 is the high-level logic flowchart of process according to the embodiment, for example, work flow diagram 600.
Fig. 7 A is the process according to the alternate embodiments for depicting acquisition data manipulation 602 of one or more embodiments
High-level logic flowchart.
Fig. 7 B is the process according to the alternate embodiments for depicting acquisition data manipulation 602 of one or more embodiments
High-level logic flowchart.
Fig. 7 C is the process according to the alternate embodiments for depicting acquisition data manipulation 602 of one or more embodiments
High-level logic flowchart.
Fig. 8 A is the substitution implementation for depicting detection and completing and continue access operation 604 according to one or more embodiments
The high-level logic flowchart of the process of mode.
Fig. 8 B is the substitution implementation for depicting detection and completing and continue access operation 604 according to one or more embodiments
The high-level logic flowchart of the process of mode.
Fig. 8 C is the substitution implementation for depicting detection and completing and continue access operation 604 according to one or more embodiments
The high-level logic flowchart of the process of mode.
Fig. 8 D is the substitution implementation for depicting detection and completing and continue access operation 604 according to one or more embodiments
The high-level logic flowchart of the process of mode.
Fig. 9 A is the process according to the alternate embodiments for depicting presentation information operation 606 of one or more embodiments
High-level logic flowchart.
Fig. 9 B is the process according to the alternate embodiments for depicting presentation information operation 606 of one or more embodiments
High-level logic flowchart.
Fig. 9 C is the process according to the alternate embodiments for depicting presentation information operation 606 of one or more embodiments
High-level logic flowchart.
Figure 10 A is to depict the mistake for the alternate embodiments for promoting presentation to operate 608 according to one or more embodiments
The high-level logic flowchart of journey.
Figure 10 B is to depict the mistake for the alternate embodiments for promoting presentation to operate 608 according to one or more embodiments
The high-level logic flowchart of journey.
Figure 10 C is to depict the mistake for the alternate embodiments for promoting presentation to operate 608 according to one or more embodiments
The high-level logic flowchart of journey.
Figure 10 D is to depict the mistake for the alternate embodiments for promoting presentation to operate 608 according to one or more embodiments
The high-level logic flowchart of journey.
Specific embodiment
In the following detailed description, referring to the attached drawing for constituting part of specification.In the accompanying drawings, similar label is usual
Similar or identical component or project are identified, unless being otherwise noted in context.Specific embodiment, drawings and claims
Described in exemplary embodiment be not intended to limit.The spirit or scope for not departing from subject matter disclosed herein the case where
Under, it can use other embodiments, and other modifications can be carried out.
Therefore, according to various embodiments, method, system, circuit, product, the orderly chain of article and the calculating of implementation are calculated
Machine program product is designed to (inter alia): provide for obtaining in relation to be configured to access specific device one or
The interface of the data of the application of multiple protection parts, the application are configured to provide one or more services;Detection application is
It is completed at least one of one or more services and application is maintained to one or more protection parts of specific device
Access;It presents and shows to have completed one or more services and using the one or more protection parts maintained to specific device
Access information;And promote that option is presented to interrupt the access using one or more protection parts to specific device.
Following claims, the description and the appended drawings can be one or more immediately with operation/function language description
Technology, for example, computer one group of operation to be executed.In most cases, those skilled in the art can grasp these
Work/function description is understood as the hardware of special configuration (for example, because general purpose computer is once programmed to perform according to from journey
The specific function of the instruction of sequence software, in fact it has reformed into special purpose computer).
Importantly, although operations described herein/function description is human thinking it should be understood that still they are not
Implement the abstract concept of isolated operation/function from the calculating of these operation/functions.On the contrary, operation/function is indicated for very
The specification of complicated computing machine or other devices.According to discussed further below, it is necessary in correct technical background, that is, make
For the concrete norm of physical implementation, reading operations/functional language.
Logical operation/function as described herein is the distillation of machine specification or other physical machines that operation/function is specified
System, enables the machine specification that otherwise can not be understood to be understood by human thinking.This distillation also allows those skilled in the art
In the case where being not limited to the hardware configuration or platform of specific supplier in the hardware configuration of the supplier of many different specifications or
The operation/function description of adaptive technique between platform.
Some current technology descriptions can be illustrated (for example, specific embodiment, attached drawing, right with regard to logical operation/function
Claim etc.).It is more fully described according to following paragraphs, these logical operation/functions do not indicate abstract concept, but indicate each
The static state or sequence specification of kind hardware element.In other words, unless otherwise indicated by context, those skilled in the art grasp logic
Work/function is understood as indicating the static state of various hardware elements or sequence specification.Because those skilled in the art can be used for implement with
Tool --- high-level programming language (for example, C, java, visual basic) shape disclosed in the technology that operation/function format illustrates
A kind of work of tool or very-high-speed hardware description language (" VHDL " is language using verbal description logic circuit) form of formula
Tool --- it is the static state of various hardware configurations or the generator of sequence specification, therefore this is genuine.Wide in range term " software " has
When the fact that obscuring, still, according to explained below, it is understood to one skilled in the art that being referred to as " software " is
Sufficiently complex exchange/specification of orderly matter essential factor is write a Chinese character in simplified form.Term " orderly matter essential factor " also refers to physical computing group
Part, for example, the component of electronic logic door, the logic composition of molecular computing, quantum calculation mechanism etc..
For example, high-level programming language be with for example from the practical machine specified of high-level programming language sequential organization,
The programming language of strong abstract (for example, the multilevel abstract) of the details such as state, input, output.See, for example, being available from website
Http:// en.wikipedia.org/wiki/High-level_programming_language (on June 5th, 2012,
Wikipedia 21:00GMT), High-level programming language.For the ease of human intelligible, in many
In example, high-level programming language imitates or the symbol of even shared natural language.See, for example, being available from website http: //
The Wikipedia of en.wikipedia.org/wiki/Natural_language (in 21:00GMT on June 5th, 2012),
Natural language。
Has arguement, because high-level programming language is abstracted using strong (for example, they can imitate or share natural language
Symbol), therefore they are " pure intelligence constructions " (for example, " software " computer program or computer programming are to a certain extent
It is the intelligence construction that can not be understood, because it can be conceived and be understood by human thinking under high-level abstractions).The argument has been used
In function/operation format technical description that characterization is " abstract concept " to a certain extent.In fact, in technical field (example
Such as, information and communication technology (ICT)) in be not in this way.
High-level programming language the fact that human intelligible should not be perceived as expressed being to take out using strong abstract
As the instruction of concept.In fact, it is understood to one skilled in the art that exactly the opposite is true.If advanced programming language
Speech is suitable for implementing tool disclosed in function/operation format technology, then it will be apparent to a skilled person that in office
Far from abstract, inaccurate, " fuzzy " or " intelligence " in what significant semantic sense, this tool is certain computer instead
The precise sequence specification that can not almost understand of device, a part of the machine by from usually more generally computing machine starting/
Select these parts at any time (for example, clock time) variation and establish.Table between high-level programming language and natural language
Face similitude has sometimes obscured this fact.These surface similarities can also cover high-level programming language and implement by building
It is vertical/to control many different computing machines finally to execute the fact that valuable work.
Many different computing machines of high-level programming language description are almost unthinkable complexity.Substantially, it is counting
Hardware used in machine is calculated usually by being configured to be formed some type of orderly substance of logic gate (for example, conditional electronic
It is device (for example, transistor), DNA (DNA), quantum device, mechanical switch, optical element, flow element, pneumatic
Element, optical device (for example, interference of light device), molecule etc.) composition.Logic gate be usually can by electrically, mechanically, chemistry
Ground otherwise drives to change physical state to establish the physical device of the physical reality of Boolean logic.
Logic gate can be configured to form logic circuit, the logic circuit be usually can by electrically, mechanically, chemistry
Ground otherwise drives to establish the physical device of the physical reality of certain logic functions.The type of logic circuit includes
Such as the devices such as multiplexer, register, arithmetic logic unit (ALU), computer storage, each type of device can be with
In conjunction with the physical device to form another seed type, for example, central processing unit (CPU)-most well known central processing unit is micro- place
Manage device.Modern microprocessor includes (and being typically more than 1,000,000,000 more than 100,000,000 logic gates usually in its numerous logic circuit
A transistor).See, for example, http://en.wikipedia.org/wiki/Logic_gates (on June 5th, 2012,21:
Wikipedia 03GMT), Logic gates.
The logic circuit for forming microprocessor is configured to provide micro-architecture, which will execute and limited by microprocessor
Instruction set architecture defined in instruction.Instruction set architecture is to be related to a part of the microprocessor architecture design of programming, including the machine
Data type, instruction, register, addressing system, memory architecture, interruption and abnormality processing and external input/output.Referring to
Such as http://en.wikipedia.org/wiki/Computer_architecture (21:03GMT on June 5th, 2012)
Wikipedia, Computer architecture.
Instruction set architecture includes the specification that programmer may be used in/controlled the machine language of microprocessor.Due to machine
Sound instruction can be executed directly by microprocessor, so usually machine language instruction is by binary digit or the word of position
Symbol string composition.For example, typical machine language instruction can have many bit lengths (for example, 32,64 or 128 character strings are current
General).Typical machine language instruction can (32 refer to using " 11110000101011110000111100111111 "
Enable) form.
It is important here that although machine language instruction is written to sequence of binary digits, in reality, these binary systems
The specified physical reality of number.For example, if Boolean logic operation is made to become physical reality, machine using certain semiconductors
It is that mathematics position " 1 " and " 0 " effectively form the letter specified and apply specific voltage in specific circuit on surface in sound instruction
It writes.For example, the specified application of binary number " 1 " (for example, logical one) in some semiconductor technologies, in machine language instruction
About+the 5V in specific " route " (for example, metal trace on printed circuit board), and the binary system in machine language instruction
Specified about-the 5V being applied on specific " route " of number " 0 " (for example, logical zero).In addition to the voltage of specified machine configuration,
These machine language instructions are also selected from a logic gates up to a million of more common machine and activate the logic gate of particular demographic.Cause
This, even if being write as a string 0 and 1, also specifies various buildings far from abstract mathematical expression, machine language instruction repertorie
Physical machine or physical machine state.
Machine language be usually most people can not understand (for example, examples detailed above is an instruction, and one is a few
Per second execute of people's computer instructs more than 2,000,000).See, for example, http://en.wikipedia.org/wiki/
The Wikipedia, Instructions per of Instructions_per_second (on June 5th, 2012,21:04GMT)
second.Therefore, being write as the program-of machine language its length may be that up to ten million a machine language instructions-can not understand.
Machine language instruction is referred to since mnemonic code rather than directly using the numerical value of machine language instruction in consideration of it, developing and using
(for example, in order to execute multiplication operation, programmer's early stage assembler language will abridge " mult " code, and expression is in MIPS machine
Binary number " 011000 " in code).Although assembler language initially greatly helps the mankind to control microprocessor and executes work,
But as time goes by, the complexity for the work that human needs complete has exceeded the mankind and controls micro- place using only assembler language
Manage the ability of device.
In this point, it is noted that needs again and again complete same task, and complete these iterative tasks needs
Machine language is identical.In consideration of it, creating compiler.Compiler is using than machine language or assembler language more preferably quilt
The statement of human intelligible, such as " add 2+2 and export result ", and by it is human understandable statement be construed to it is complicated, dull and
Huge machine language code (for example, numeric string of up to a million 32,64 or 128 bit lengths).Compiler therefore will be high
Grade programming language translates into machine language.
The machine language of this compiling as described above is then used as technical specification, which sequentially constructs and make
Many difference computing machine compounding practices to complete the tangible and specific work useful to the mankind.For example, as described above,
This machine language --- compiled version of high-level language ---, which is served as, selects hardware logic door, specified voltage level, voltage mistake
The technical specification of calendar scheduling is crossed, so that completing the work useful to the mankind by hardware.
Therefore, function/operation technical description is in the opinion of those skilled in the art far from abstract concept.On the contrary, this function
The technical description of energy/operation is understood as that hardware is advised instead when available tool understands in this field for example, by just having described
The human understandable expression of model, complexity and remote anyone understandability of super large part of specificity.Accordingly, ability
Field technique personnel are it should be understood that knowledge in view of disclosure herein and those skilled in the art, any this behaviour
Work/function technical description is construed as forming the operation of physical reality by the following terms: (a) one or more mutual
The physical machine of link;(b) it is configured to establish being linked to each other for the one or more physical machines of order of representation/combinational logic
Logic gate;(c) composition logic gate is (for example, the electronic device (for example, transistor), DNA, the quantum device, machinery that are linked to each other
Switch, optical element, flow element, pneumatic element, molecule etc.) the orderly substance being linked to each other, the logic gate establishes table
Show the physical reality of logic;Or (d) in fact any combination of aforementioned items.In fact, have it is stable, measurable and
Changeable any physical object of state can be used for constructing machine based on above-mentioned technical description.For example, Charles Babbage is built
The First computer made made of timber and powered by swinging handle.
Therefore, far from abstract concept is interpreted as, function/operation technical description understanding is one by those skilled in that art
A or multiple human understandable expressions that can not almost imagine complicated and time sequencing hardware and illustrate.Function/operation
Technical description can make it be easy (or to be directed to by the advanced computational language for sharing identical word, structure, phrase etc. with natural language
The high-level block diagram of this thing) statement the fact as these function/operation technical descriptions cannot be abstract concept or abstract
The instruction of concept purely stated.In fact, according to summarizing herein, it is true really not so in technical field.When passing through this
When the available tool of field technical staff is observed, these function/operation technical descriptions are considered as almost imagining complexity
Hardware configuration.
According to above-mentioned general introduction, at least two using the reason of function/operation technical description for the use of.Firstly, using function/
The technical description of operation allows from will be in such a way that human thinking is capable of handling (for example, passing through natural imitation language and logic
Narration stream) the obtained machine of almost limitless complexity of the hardware element being linked to each other that is described and machine operate.Secondly, making
Description with function/operation technical description by offer more or less independently of the hardware component of any specific supplier has
Help the theme those skilled in the art understand that described.
Facilitate the theme those skilled in the art understand that described using function/operation technical description, because from above-mentioned
Although discussion, which will become apparent from people, not easily promptly to be adapted into many trillion for technical description described in this document
A 1 and 0, the horizontal machine code of billions of unilines compilation, millions of a logic gates, thousands of gate arrays or any number of
Intermediate abstraction hierarchy.However, if any this low-level technologies description will replace current technology description, this field
Technical staff can encounter excessive difficulty when implementation technology discloses, because this low-level technical description is likely to do not having
Increase complexity in the case where corresponding beneficial effect (for example, utilizing the hardware of one or more vendor-specifics by description
The theme of the agreement of component).Therefore, using function/operation technical description by by technical description from any vendor-specific
Hardware component agreement separate and it is helpful to those skilled in the art.
According to above content, logical operation/function described in current technology description represents various orderly substances and wants
The static state or sequence specification of element, so that this specification can be understood by human thinking and be suitable for creating numerous hardware configurations.This
Logical operation/function described in text should be treated in this way, and only should not scornfully be characterized as abstract concept, because these
Specification represented by logical operation/function be presented in such a way that those skilled in the art are understood that and with independently of
The mode application that the hardware of specific supplier is implemented.
It would be recognized by those skilled in the art that the prior art have evolved to the hardware of many aspects of system, software and/
Or the degree that firmware implementation only has very little to distinguish;The use of hardware, software and/or firmware is usually (but simultaneously not always
In this way, in some contexts, the selection between hardware and software becomes critically important) indicate that the design of cost and efficiency tradeoff is selected
It selects.Those skilled in the art will know that in the presence of method described herein and/or system and/or other technologies can be made to play
The various carriers (for example, hardware, software and/or firmware) of effect, and preferred carrier can be according to using method and/or system
And/or the background of other technologies variation and change.For example, if implementer determine speed and accuracy be it is most important, that
Implementer can choose main hardware and/or firmware vehicle;Alternatively, if flexibility is most important, implementer
It can choose main Software Implementation;Furthermore alternatively, implementer can choose that be limited to can according to 35USC 101
Some groups of one or more machines of the theme of patent, article combination and the hardware in article of manufacture, software, and/or firmware
It closes.Accordingly, there exist several feasible carriers that method described herein and/or equipment and/or other technologies can play a role,
They not inherently be better than other because any carrier that will be utilized be depending on will use carrier background selection with
And the specific of implementer considers (for example, speed, flexibility or predictability), any one may all change.This field
Technical staff will be recognized that the optics aspect of embodiment generallys use optically guiding hardware, software and/or firmware.
In some embodiments as described herein, logic and similar embodiment may include software or other controls
Structure.For example, electronic circuit can have the one or more electricity for being constructed and being arranged to carry out various functionality described herein
Flow path.In some embodiments, when this medium saves or sends operationally according to manner described herein execution
When the detectable instruction of device, one or more media may be configured to the detectable embodiment of load bearing equipment.Some
In modification, for example, embodiment may include one relevant to one or more operations as described herein for example, by executing
Or multiple instruction reception or conveying and update or modification to existing software or firmware or gate array or programmable hardware.It can
Alternatively or cumulatively, in some variations, a kind of embodiment may include specialized hardware, software, fastener components and/or hold
Row or the general purpose module for calling personal module.Specification or other embodiments can pass through tangible transmission media as described herein
One or more examples are transmitted in other words optionally by packet by being passed in different time via distribution medium
It is defeated.
Alternatively or additionally, embodiment may include for enabling, triggering, coordinate, request to cause in other words
In fact any feature operation described herein occurs one or many special instruction sequences or calls circuit.In some modifications
In, operation herein or other logical descriptions can be expressed as source code and be compiled as executable instruction sequence in other words
It is to be called as executable instruction sequence.In some cases, for example, embodiment can be entirely or partly by source code
It provides, such as C++ or other code sequences.In other embodiments, using commercially available and/or this field technology
The embodiment of source code or other codes, which can be compiled/implement ,/translation/is converted into high level description language (for example, initially real
Apply C or C++ programming language description technology, hereafter by programming language embodiment be converted into can logic synthesis language embodiment party
Formula, hardware description language embodiment, software design simulation embodiment and/or other similar form of presentation).For example, one
A little or all logic statements (for example, computer programming language embodiment) can behave as Verilog class hardware description (example
Such as, pass through hardware description language (HDL) and/or VHSIC hardware description language (VHDL)) or can be used for later
Establish other circuit models with the physical embodiments of hardware (for example, specific integrated circuit).Those skilled in the art
, it will be recognized that how obtaining, configuring and optimizing suitable delivery element or computing element, material supply, cause according to these introductions
Dynamic device or other common structures.
It will be understood by those skilled in the art that generally implementing device and/or process and/or system in this field,
Then the device implemented these using engineering and/or other practices and/or process and/or the system integration are to more complicated device
And/or in process and/or system.That is, at least part of device as described herein and/or process and/or system can
It is integrated into other devices and/or process and/or system with the experiment by fair amount.Those skilled in the art will appreciate that
It arrives, the example of these other devices and/or process and/or system may include, under background and the suitable situation of application, below
Every all or part of devices and/or process and/or system: (a) air transportation (for example, aircraft, rocket, helicopter etc.);
(b) ground transport (for example, automobile, truck, locomotive, tank, armored personnel carrier etc.);(c) building is (for example, house, warehouse, do
Public room etc.);(d) facility (for example, refrigerator, washing machine, drier etc.);(e) communication system is (for example, network system, phone system
System, ip voice system etc.);(f) entity is done business (for example, Internet Service Provider (ISP) enterprise, for example, Comcast
Cable, Qwest, Southwestern Bell etc.);Or (g) wire/wireless service entities (for example, Sprint, Cingular,
Nextel etc.) etc..
In some cases, even if component is located at outside some range, system or method can also be used in territory.Example
Such as, in distributed computing situation, even if the part of system can be located at outside some range (for example, in being located at outside the range
After device, server, processor, signal bearing medium, transmission computer, reception computer etc.), it can also use in the range
Distributed computing system.
It equally, can also even if the component of system or method is located at outside some range and/or uses outside some range
With marketing system in this range or method.In addition, being used to execute at least part of of the system of method in a range
Embodiment is not excluded for using the system in another range.
In general sense, it will be appreciated by those skilled in the art that various embodiments described herein can be by following
Individually and/or common implementing: various types of Mechatronic Systems with electronic component in extensive range, for example, hardware, soft
Part, firmware and/or in fact their any combination, are limited to the theme according to 35U.S.C.101 patentability;Machinery can be assigned
Power or the component in extensive range of movement, for example, rigid body, spring body or torsion body, hydraulic device, electromechanical actuators and/or
In fact their any combination.Therefore, " Mechatronic Systems " as described herein includes, but are not limited to: with energy converter (for example, causing
Dynamic device, motor, piezo-electric crystal, MEMS (MEMS) etc.) circuit that is operably associated, there is at least one discrete circuit
Circuit, at least one integrated circuit circuit, at least one specific integrated circuit circuit, formed by computer
The universal computing device of program configuration is (for example, by the computer journey at least partly executing method described herein and/or equipment
The general purpose computer of sequence configuration, or the computer program by least partly executing method described herein and/or equipment are matched
The microprocessor set) circuit, formed storage equipment circuit (for example, various forms of memories are (for example, arbitrary access is deposited
Reservoir, flash memory, read-only memory etc.)), it is formed communication equipment (for example, modem, communication switchboard, optoelectronic device etc.)
Circuit and/or any non-electrical analog circuit, such as optical analog circuit or other analog circuits are (for example, be based on graphene
Circuit).The example that those skilled in the art will also be recognized that Mechatronic Systems includes but is not limited to various consumer electronics systems
System, medical instrument and other systems, such as motorized transport systems, factory's automatic system, security system and/or communication/calculating
System.It will be understood by those skilled in the art that " electromechanics " used herein is not necessarily limited to electric actuator and machinery
The system of both actuators, in addition in addition showing.
It says in a general sense, it will be appreciated by those skilled in the art that can be by hardware in extensive range, software, firmware
And/or many aspects as described herein individually and/or jointly implemented of their any combination can regard as by
Various types of " circuits " composition.Therefore, " circuit " used herein includes, but are not limited to: having at least one discrete electrical
The circuit on road, the circuit at least one integrated circuit, the circuit at least one specific integrated circuit are formed by calculating
The universal computing device of machine system configuration is (for example, by the computer at least partly executing method described herein and/or equipment
The general purpose computer of program configuration, or the computer program by least partly executing method described herein and/or equipment
The microprocessor of configuration) circuit, formed storage equipment (for example, formed memory (for example, random access memory, flash memory,
Read-only memory etc.)) circuit, and/or formed communication equipment (for example, modem, communication switchboard, optoelectronic device etc.)
Circuit.It will be appreciated by those skilled in the art that theme as described herein may be embodied as analog or digital mode or they
Some combinations.
It will be understood by those skilled in the art that at least part of equipment as described herein and/or method can integrate
Into image processing system.It will be appreciated by those skilled in the art that typical image processing system generally comprises in following component
One or more: the memory of system component shell, video display apparatus, such as volatibility or nonvolatile memory, example
Such as microprocessor or the processor of digital signal processor, such as the computational entity of operating system, driver, application program, one
A or multiple interactive devices (for example, Trackpad, touch screen, antenna etc.), including feedback loop and control motor are (for example, be used for
The feedback for sensing lens position and/or speed, the control motor of required focus is provided for moving distorting lens) control
System processed.Image processing system can use suitable commercially available component to implement, for example, usually digital still system and/
Or the element found in digital motion systems.
It will be understood by those skilled in the art that at least part of equipment as described herein and/or method can integrate
Into data processing system.It will be appreciated by those skilled in the art that digital processing system generally comprises one in following component
It is or multiple: the memory of system component shell, video display apparatus, such as volatibility or nonvolatile memory, such as micro- place
Manage the processor of device or digital signal processor, such as the computational entity of operating system, driver, graphic user interface, application
Program, one or more interactive devices (for example, Trackpad, touch screen, antenna etc.), and/or including feedback loop and control electricity
Machine is (for example, for sensing the feedback of position and/or the feedback of speed, for moving and/or adjusting the control of component and/or quantization
Motor) control system.Digital processing system can use suitable commercially available component to implement, for example, usually in digital meter
The component found in calculation/communication and/or network calculations communication system.
It will be understood by those skilled in the art that at least part of equipment as described herein and/or method can integrate
Into miniature (mote) system.It will be appreciated by those skilled in the art that typical microsystem generally comprises: one or more is deposited
Reservoir, for example, volatibility or nonvolatile memory;Processor, for example, microprocessor or digital signal processor;It calculates real
Body, such as operating system, user interface, driver, sensor, actuator, application program, one or more interactive device (examples
Such as, antenna, USB port, acoustical ports etc.);Control system, including feedback loop and control motor are (for example, for sensing or commenting
The feedback for estimating position and/or speed, for moving and/or adjusting the control motor of component and/or quantization).Microsystem can
To be implemented using suitable component, for example, these components found in miniature calculating/communication system.The tool of these components
Body example includes the micromodule of Intel Corporation and/or Crossbow Corporation and supports hardware, soft
Part and/or firmware.
For the purpose of the application, " cloud " calculating can be understood as the meaning described in cloud computing document.For example, cloud meter
Calculate the method and/or system that can be transmission calculating capacity and/or memory capacity as service." cloud " also refer to transmission or
One or more hardware and or software components of calculating and/or memory capacity are transmitted in help, include but is not limited to be listed below
It is one or more: client, application, platform, framework and/or server.Cloud also refers to and client, application, platform, frame
Structure and/or the relevant any hardware of server and/or software.For example, cloud and cloud computing also refer to be listed below one
Or multiple: computer, processor, storage medium, router, interchanger, modem, virtual machine are (for example, Virtual Service
Device), data center, operating system, middleware, firmware, hardware rear end, software rear end and/or software application.What cloud can refer to
It is private clound, public cloud, mixed cloud and/or community cloud.Cloud can be the shared pool of configurable computing resource, configurable calculating
Resource can be it is disclosed, privately owned, half privately owned, assignable, expansible, flexible, interim, virtual and/or
Physics.Cloud or cloud service can be transmitted by the network (for example, mobile communications network and internet) of one or more types.
Cloud as used in this application or cloud service may include be listed below it is one or more: framework is as service
(" IaaS "), platform are as service (" PaaS "), software as service (" SaaS's ") and/or desktop as service
("DaaS").As non-exclusive example, Iaas may include, for example, can start, stop, accessing and/or configure virtual clothes
Business device and/or storage center (for example, provide one or more processors, memory space and/or Internet resources, example as needed
Such as, EMC and Rackspace) one or more virtual servers illustrate.PaaS may include, for example, being deposited in framework (example
Such as, client can establish the computing platform and/or solution storehouse of software interface and application from it, for example, Microsoft
Azure one or more softwares and/or developing instrument on).SaaS may include, for example, being presided over and can be led to by provider
The software of network access is crossed (for example, network can be retained in for the software of application and/or data relevant to software application
On, for example, Google Apps, SalesForce).DaaS may include, for example, by network provide the desktop for user,
Using, data and/or service (for example, by network, for example, Citrix, provide more application architectures, the application in framework, with answer
With relevant data and/or service relevant to application and/or data).It is above-mentioned to refer to being mentioned in this application as " cloud "
Or it " system and or method of the type of cloud computing and is not construed as complete or thorough.
It will be appreciated by those skilled in the art that for the purpose of clear concept, component (for example, operation) as described herein,
Device, object and it is used as example along with their discussion, and various configuration modifications are all in expection.Therefore, herein
The concrete example illustrated and adjoint discussion used is intended to represent their more generally classifications.In general, using any
Concrete example is intended to represent its classification, and does not include that specific component (for example, operation), device and object are not to be construed as limiting
System.
It is that theme as described herein sometimes illustrates to include in different other assemblies or connected from different other components
On different components.It should be appreciated that the framework of this description is only exemplary, and it is in fact possible to implement to obtain phase
Many other frameworks of congenerous.On conceptual sense, any component setting for obtaining identical function effectively " associated " makes
Required function must be obtained.Therefore, any two component for being herein combined to obtain specific function can be considered as " phase each other
Close " to obtain required function, and how ignore framework or intermediate module.Similarly, two components associated in this way
It can be considered as and " be operably connected " each other, or the function that " being operatively coupled to " is required with acquisition, and can close in this way
Any two component of connection, which can also be considered as, " to be operatively coupled to " each other to obtain required function.It can operationally couple
On specific example include, but are not limited to: physically can be matched and/or the component that physically interacts;And/or it is logical
Cross component that is that wireless mode can interact, and/or wirelessly interacting;And/or logically interaction and/
Or logically interactive component etc..
In the degree that formal outline headings are presented in this application, it should be appreciated that outline headings are for demonstration
Purpose, and different types of theme can discuss in entire application (for example, can retouch under process/operation title
Device/structure is stated, process/operation can be discussed under structure/prelude;And/or the description of single title can be horizontal
Across two or more topic headings).Therefore, it is used for the purpose of the purpose of demonstration simultaneously using formal outline headings in this specification
And it is not intended to be limited in any form.
In entire application, give with bracket, abbreviation " such as " or both example and enumerate.Unless otherwise clear
Illustrate, these examples and enumerating be only exemplary rather than in detail.In most cases, each example and each is enumerated
Combination will can't afford.Therefore, using smaller illustrative list and example, focus on the understanding that claim is provided rather than
Limit the range of these claims.
For the term of substantially any plural number used herein and/or odd number, those skilled in the art can be according to upper and lower
Plural number is understood singularization and/or odd number understanding pluralizes by the mode that text and/or application are suitble to.For clear mesh
, do not illustrate the replacement of various singular/plurals specially herein.
It will be appreciated by those skilled in the art that for the purpose of clear concept, component (for example, operation) as described herein,
Device, object and it is used as example along with their discussion, and envisions various configuration modifications all in expection.Therefore, originally
Illustrated concrete example used herein and adjoint discussion are intended to represent their more generally classifications.In general, using
Any concrete example is intended to represent its classification, and does not include that specific component (for example, operation), device and object are not to be construed as
Limitation.
Although (such as in Fig. 1) and other positions are illustrated/are described as the people individually illustrated to user 105 herein
Object, it will be appreciated that those skilled in the art that user 105 can represent one or more human users, robotic user
(for example, computational entity) and/or substantially any combination of them are (for example, one or more robot agents can help to use
Family), unless the context otherwise requires.It will be understood by those skilled in the art that in general, user can regard " transmission as
Person " and/or other take entity as the term (when these terms used herein) of guiding, opposite feelings unless the context
Shape.
In some cases, one or more components be properly termed as herein " being configured to ", " passing through ... configuration ",
" can be configured to ", " operationally/operatively with ", " suitable for/may be adapted to ", " energy ", " can follow/follow " etc..This field skill
Art personnel are, it will be recognized that these terms (for example, " being configured to ") generally comprise active state component and/or inactive state group
Part and/or standby mode component, unless the context otherwise requires.
In known systems, equipment relevant to one or more users, for example, mobile phone, tablet computer, notebook are electric
Brain, desktop computer, automobile, game system, household electrical appliances etc. can collect the data of relevant user.Third party can need these data.
In other embodiments, the method and system for the user data collected the following describe management by one or more equipment, this
A little user data may also to be not user entity it is useful, and these entities may not have permission to access these data.
Referring to Fig. 1, Fig. 1 illustrates exemplary environment 100, basis is can be implemented in wherein one or more personal devices 120
Method, system, circuit, product and the computer program product and framework of various embodiments.As shown in Figure 1A, one or more
People's equipment 120, one or more service providers 170, one or more services developers 160 and one or more calculating equipment
30 can be communicated by one or more communication networks 140.In one embodiment, service provider 170 can have individual
One or more services that equipment 120 may wish to.In one embodiment, calculating equipment 130 (can be and remotely-or locally take
Business device or distributed server group) can manage by personal device 120 it is passive or initiatively collect, store, control, access,
Limitation, monitoring ... under control, consult, check, verifying, certification, authorization, operation, update, change, filtering or otherwise
The data of effect.In one embodiment, as discussed in more detail herein, it calculates on the accessible personal device 120 of equipment 130
Some or all of data.In another embodiment, the only a part on the accessible personal device 120 of equipment 130 is calculated
Data.In other embodiment again, the revision of the data on the accessible personal device 120 of equipment 130 is calculated.Specifically
Ground is said, in one embodiment, calculates the accessible data being stored on personal device 120 of equipment 130, but with anonymity side
Formula.
In one embodiment, one or more services can be provided to personal device 120 by calculating equipment 130.At one
In embodiment, providing for one or more services with the partial data that is stored and/or is collected by personal device 120 or can own
The access authority of data is condition.In one embodiment, calculate equipment 130 can receive from service provider 170 and/or
One or more services of services developers 160, and can choose one or more received services for rendering to individual
Equipment 120.In one embodiment, the data from personal device 120 can be with one or more 170 kimonos of service provider
Business developer 160 is shared.In one embodiment, data from personal device 120 can with services developers 160 and/
Or service provider 170 is shared anonymous before.
Personal device 120 is shown referring again to Figure 1A, Figure 1A.Personal device 120 can be by one or more users
Operation or the portable or non-portable electronic device with one or more user-associations.Personal device 120 is illustrated as and user
105 interactions.As described above, user 105 can be personal or crowd or imitate other entities of user's operation.In some embodiments
In, user 105 can be the device of computer or computer control.Personal device 120 can be (but are not limited to) cellular handset,
Network mobile phone, smart phone, tablet computer, music player, intercom, radio station, usb driver, portable solid state driver,
Portable disc type hard disk drive, earphone, is worn augmented reality equipment (for example, augmented reality glasses and/or headphone)
Formula earphone, audio/video devices, media player, TV, projection screen, flat screen, display, clock, household electrical appliances are (such as micro-
Wave furnace, convection oven, kitchen range, refrigerator, refrigerator-freezer), navigation system (for example, global positioning system (" GPS ") system), medical alert
Device, long-range control, peripheral equipment, electronic safe, electronic lock, electronic safety system, video camera, personal video recording
Device, personal audio recordings device etc..
Referring again to Figure 1A, personal device 120 may include operating system 124.In this case, computing system 124
Finger is considered as the core of equipment or any hardware, software, firmware or the their combination on basis.For example, directly being handed over hardware
Mutual application is considered a part of operating system.In some embodiments, operating system 124 can be FPGA, print
Printed circuit board or other non-wireless means.In one embodiment, operating system 124 may include one or more Google
Various implementation schemes of Windows, Linux of iOS, Microsoft of Android, Apple etc..In some embodiments, it grasps
Making system 124 may include the root menu for one or more TVs, stereo system, media player etc..Some
In embodiment, operating system 124 can be " master " screen of device.
Referring again to Figure 1A, in one embodiment, personal device 120 may include user interface 123.User interface
123 may include that user 105 is allowed to interact and interact for personal device 120 with user 105 any with personal device 120
Hardware, software, firmware and their combination.In some embodiments, user interface 123 may include monitor, screen, touch
Screen, liquid crystal display (" LCD ") screen, light emitting diode (" LED ") screen, loudspeaker, microphone, earphone, keyboard, keypad,
Touch tablet, mouse, trace ball, remote controler, button group, microphone, video camera, camera, charge-coupled device (" CCD ") member
Part, photoelectric cell etc..
Referring again to Figure 1A, in some embodiments, personal device 120 may include device memory 126.In some realities
It applies in example, device memory 126 may include memory, random access memory (" RAM "), read-only memory (" ROM "), dodge
It deposits, is hard disk drive, the media based on disk, the media based on CD, magnetic memory, optical memory, volatile memory, non-
Any combination of volatile memory and they.In some embodiments, device memory 126 can be different from such as network
Equipment on it is available or separated by the equipment of the available equipment of radio etc.For example, in networked system, it may
There are many personal device 120, the device memory 126 of these personal devices is located at a few feet aways of potential range or in overseas
Central server.
Referring again to Figure 1A, in some embodiments, device memory 126 may include one or more protection data
126A and unprotected data 126B.And not all embodiment includes every kind or both of protection data or unprotected data, but
It is that there may be protection data 126A and unprotected data 126B in one or more embodiments.Protection data 126A can wrap
Any data are included, maintain the data, a at least partly controlled including the data that are stored on personal device 120, personal device 120
The monitoring of people's equipment 120 provides the data etc. of monitoring capability, needs some form of authorization to access these data.Authorization can be with
With any form and it is related to any subelement, including the inside and outside subelement of equipment.For example, in one embodiment
In, protection data 126A may include that at least one run on the computing device applies not available data.For another example, at one
In embodiment, protection data 126A can be used at any time for an application, and apply for another in specific time
It can use, or can be used when the first application is without using data.In one embodiment, protection data 126A includes that must award
The data of data 126A are protected in power application (for example, microsoft operation system authorization or user identifier are set as true) to access.
In one embodiment, protection data 126A includes the user of such as user 105 etc until user 105 verifies him
The data that can just see of identity (such as passing through Password Input or bio-identification).In one embodiment, data are protected
126A is not limited to equipment, and is not transmitted to any other system not under the directly controlling of personal device 120.In a reality
It applies in example, protection data 126A is not limited to personal device 120, and is only originated from personal device 120 or utilizes the origin of user 105
Protection data 126A is read using can permit.In one embodiment, personal device 120 is modified or for protection to be modified
Data 126A, so at least part of change or blurring protection data 126A.In one embodiment, personal device 120
Allow that data 126A is protected to be transmitted in the case where external entity will be changed or blurring at least part protects data 126A
To external entity.
Referring again to Figure 1A, in one embodiment, personal device 120 may include device memory 126, in some realities
It applies in example, device memory 126 may include unprotected data 126B.In one embodiment, unprotected data 126B does not have
Protection or limitation.In another embodiment, unprotected data 126B have protection or limitation, but compare protection data 126B by
To less protection and/or limitation.In one embodiment, broadcast or unprotected data are propagated otherwise in request
126B.In one embodiment, since equipment designs or other factors, the entity outside personal device 120, which can not access, not to be protected
Data 126B is protected, but unprotected data 126B is not protected specifically to prevent one or more other than personal device 120
A entity accesses.
Referring again to Figure 1A, in one embodiment, personal device 120 may include device interface component 128.At one
In embodiment, device interface component 128 includes any component for allowing equipment and its environmental interaction.For example, in one embodiment
In, device interface component 128 includes one or more sensors, for example, camera, microphone, accelerometer, thermometer, satellite
Positioning system (SPS) sensor, barometer, humidity sensor, compass, gyroscope, magnetometer, pressure sensor, oscillation inspection
Survey device, optical sensor, Inertial Measurement Unit (IMU), touch sensor, touch sensor, flexible transducer, MEMS
(MEMS), radio station, including radio station, transmitter, receiver, transmitter, broadcasting equipment etc..In one embodiment, equipment
Interface module 128 can also include one or more user's interface units, for example, user interface 122 is (for example, although individually retouch
Draw, in some embodiments, user interface 122 can be any kind of device interface component 128), and in some implementations
In example, including one or more users input receiving unit and component is presented in output.
Referring again to Figure 1A, in one embodiment, device interface component 128 may include protection component 128A.Protection
Component 128A may include that any interface module 128 is needed in some non-limiting examples for having enumerated interface module before this
Some form of authorization and/or proof are to access data.Authorization can have any form and be related to any subelement, including
The inside and outside subelement of equipment.In one embodiment, protection component 128A is similar to protection data 126A.For example,
In one embodiment, personal device 120 (for example, smart phone) can have 12 applications run on smart phone.?
In one embodiment, 6 accessible protection component 128A (for example, alignment sensor) in these applications, and other 6
It cannot access.It in some embodiments, is to protect a part of component 128A by the data that protection component 128A is collected.One
In a little embodiments, become protection data 126A by the data that protection component 128A is collected.In some embodiments, certain times
Become protection data 126A by the data that protection component 128A is collected, or there is no the time.In some embodiments, protection group
A part that the data that part 128A is collected can be protection component 128A continues special time amount (for example, two weeks), then changes
It at unprotected data or is not considered as the data being protected or not protected data.In some embodiments, any
People can protect component 128A in specific time and/or environment access.For example, protection component 128A (for example, radio station) can
Accessed between 7 points to 8 points in the afternoon for any entity, and specific entity and/or application can be only supplied in other times
Access.In some embodiments, protection component 128A (for example, image collection assembly) can be when meeting one or more conditions
It is accessed for any entity, these conditions can be related to or not be related to protection of component 128A or personal device 120, for example, as individual
When equipment 120 is in specific position.
Referring again to Figure 1A, in some embodiments, calculating equipment 130 may include personal device interface module 132.?
In some embodiments, personal device interface module 132 can be communicated with one or more personal devices 120.In some embodiments
In, personal device interface module 132 can receive from the received data 131 of personal device 120.The personal device data of acquisition
131 may include any data collected in any way from personal device 120.In some embodiments, calculating equipment 30 can
To request the data from personal device 120.In some embodiments, calculating equipment 130 can receive on schedule from a
The data of people's equipment 120.In some embodiments, when some condition is fulfilled, calculating equipment 130 can be retrieved sets from individual
Standby 120 data.In some embodiments, personal device 120 is just in broadcast data, and calculates equipment 130 and collect broadcast
Data.In some embodiments, the broadcast of personal device 120, which only calculates equipment 130, can use the data of (for example, decryption, explanation etc.).
In some embodiments, personal device 120 can be used one or more communication networks 140 and send the personal device data obtained
131, to equipment 30 is calculated, will be described in more detail herein.
Referring again to Figure 1A, in some embodiments, the personal device data 131 of acquisition can be anonymous data 131A.
In one embodiment, anonymous data refers to the data that can not uniquely determine data source.In some embodiments, data source can
To refer to personal device 120, for example, unique identifier, for example, MAC Address.In some embodiments, data source can refer to
By using power, using or with equipment other relationships (for example, user name, the title of user or user social insurance or its
His identifier or network address or identity) user 105 associated with the data.It is noted that in some embodiments, equipment
It can identify data source (for example, identity of personal device 120), i.e., send data since the attribute of data transmission determines,
But data source cannot be inferred by data itself, in this case, in some embodiments, this data still by
It is considered anonymous data 131A.
Anonymous data 131A may include the data for having been removed unique identifying information, or has hidden, obscures, made not
It determines, to obscure, shield, pretend, covering up, hiding, covering, concealing, encoding, decoding or otherwise change unique knowledge
The data of other information.In some embodiments, received anonymous data 131A never includes unique identifying information.In some implementations
In example, anonymous data 131A can partly or non-uniquely identify its source, for example, user 105 or anonymous data come from
Personal device 120.In some embodiments, additional information can be used, for example, look-up table, scattered table or other known
Algorithm extracts unique identifying information from anonymous data 131A.It in some embodiments, can be in the feelings for not using additional information
Unique identifying information is derived from anonymous data 131A under condition.In some embodiments, once data are in its anonymous format, with regard to nothing
Method retrieves unique identifying information from anonymous data 131A.
In one embodiment, the personal device data 131 of acquisition may include non-anonymous data 131B.In some implementations
In example, non-anonymous data 131B can explicitly or implicitly identify data source.In some embodiments, data source can be with
Refer to personal device 120, for example, unique identifier, for example, MAC Address.In some embodiments, data source can refer to logical
Cross the right to use, using or with equipment other relationships (for example, user name, the title of user or user social insurance or other
Identifier or network address or identity) user 105 associated with the data.
Referring to Figure 1A -1D, data anonymous system and method are illustrated.Although these system and method are illustrated as calculating
A part of equipment 130, but this is used for the purpose of facilitating diagram.In one embodiment, data go anonymization information to store
The one or more of module 135, data anonymous device module 134A and data obfuscation module 134B can be located at personal device 120
In.In one embodiment, these modules can directly be interacted with device memory 126.In one embodiment, such as Figure 1A institute
Show, calculating equipment 130 may include converting non-anonymous data 131B during the more detailed description of C to Fig. 1 D referring to Fig.1
At the data anonymous module 134A of anonymization data.In one embodiment, according to anonymization type, there may be for making to hide
Nameization data go back into the additional data of non-anonymous data (for example, look-up table).In some this embodiments, additional number
According to, such as anonymization data are gone, it can store and gone in anonymization information storage module 135 in data.
Referring again to Figure 1A -1D, in one embodiment, calculating equipment 130 may include data obfuscation module 134B.
For example, in one embodiment, data obfuscation module 134B can make non-anonymous data 131B fuzzy, it is similar to data anonymous
Device module 134A.For example, in one embodiment, data obfuscation module 134B can use data mask.Implement at one
In example, data obfuscation module 134B can be obscured by addition, for example, by increasing mistake in genuine identification information
Identification information so that from genuine identification information can not distinguish mistake identification information.Number can be lacked in some embodiments
According to removing anonymization information storage module 135, data anonymous device module 134A and data obfuscation module 134B.
Referring again to Figure 1A, in some embodiments, calculating equipment 130 may include services developers interface module 136.
Services developers interface module 136 can be communicated for example by communication network 140 with services developers 160.In particular, one
In a embodiment, services developers interface module 136 can provide the limited information of the personal device data 131 in relation to obtaining.
In one embodiment, for example, services developers interface module 136 can provide the information in relation to the data type collected to clothes
Be engaged in developer 160.In one embodiment, for example, services developers interface module 136 can provide the data in relation to collection
Summarize the information of brief introduction to services developers 160.In one embodiment, services developers 160 can receive these information simultaneously
And it for example determines to develop what type of service using development decision-making module 162.
Referring again to Figure 1A, in some embodiments, calculating equipment 130 may include service provider interface module 138.
In one embodiment, service provider interface module 138 can be for example logical by communication network 140 and service provider 170
Letter.
In one embodiment, service provider interface module 138 may include data permission management module 138A.One
In a embodiment, data permission management module 138A can keep tracking which service has the right which personal device number accessed
According to.For example, in one embodiment, service 172A can have permission certain anonymous data 131A.For another example, in one embodiment
In, service 172B can have permission the data for having already passed through data anonymous device 134A processing.
Referring again to Figure 1A, in one embodiment, service provider interface module 138 may include information on services module
138B.In one embodiment, information on services module 138B may include a series of services provided from service provider 170,
So that these information can be for transmission to personal device 120.In one embodiment, calculate equipment 130 can request when or
It detects and information on services module is presented to personal device 120 when personal device 120 may be interested in one or more services
The one or more services enumerated in 138B.
Referring again to Figure 1A, in one embodiment, service provider 170 can provide service to personal device 120.?
In one embodiment, these equipment can be transmitted directly to personal device 120.In one embodiment, service provider 170 with
Personal device 120 has limited communication or does not communicate, and communicates through intermediary (for example, calculating equipment 130) processing.
In one embodiment, the service and data calculated between the processing service provider 170 of equipment 130 and personal device 120 is transmitted,
So that protect data 126A and component 128A is protected to influence from service provider 170, but service provider 170 still can be with
Service is provided, for example, service 172A and service 172B, gives personal device 120.In one embodiment, service provider 170 wraps
The list of service management module 174 is included, which maintains to be presented to the service list for calculating equipment 130, example
Such as, the information in relation to various services is maintained with the information on services module 138B for allowing to calculate equipment 130.
In various embodiments, communication network 140 may include one or more local area networks (LAN), wide area network
(WAN), Metropolitan Area Network (MAN) (MAN), Wireless LAN (WLAN), personal area network (PAN), worldwide interoperability for microwave accesses (WiMAX),
Public switch telephone network (PTSN), General Packet Radio Service (GPRS) network, cellular network etc..Communication network 140 can be with
It is the combination of cable network, wireless network or cable network and wireless network.It is noted that as herein and used in attached drawing
" communication network " refers to can be interactively with each other or not interactively with each other and can intentionally or unintentionally connect in some embodiments
It works in order to the one or more communication networks communicated between one or more entities.
Referring now to Fig. 1 C, embodiment may include personal device 120A and personal device 120B.Personal device 120A can
To generate non-anonymous data 144A, and personal device 120B can produce non-anonymous data 144B.Non-anonymous data 144A and
Non-anonymous data 144B can for transmission to calculating equipment 130A, the calculating equipment can be calculate equipment 130 non-exclusive and
Non-limiting example.In one embodiment, calculating equipment 130A may include data anonymous device module 134A.Implement at one
In example, data anonymous device module 134A may include irreversible Anonymizing module 137A, which generates irreversible
Anonymous data had been removed the data of identification for example, in an example.In one embodiment, data anonymous device mould
Block 134A may include set Anonymizing module 137B, which can use non-anonymous data 144A and non-anonymous number
According to 144B and the general anonymous data summarized is established, as shown in Figure 1 C.In one embodiment, data anonymous device module 134A
It may include reversible Anonymizing module 137C, which can be used privately owned look-up table 135A thus by non-anonymous number
According to being converted into anonymous data.In one embodiment, privately owned look-up table 135A can store goes anonymous information to store mould in data
In block 135.
Referring again to Fig. 1 D, in one embodiment, calculating equipment 130B can have data anonymous device 134A, the data
Anonymizer can use anonymization function 132A, as shown in figure iD.For example, private mark method, perturbation side can be used in anonymous function
Method, DataFly algorithm, top-down specialized and/or Mondarian multidimensional K- are anonymous, as non-limiting and non-exclusive
Example.In another embodiment, data obfuscation module 134B obscures non-anonymous data.In one embodiment, obscuring can
Completed with being added to actual identification data by will appear to phase Sihe seemingly believable " mistake " data so that hereafter without
Method determines truthful data simply by look at data.In one embodiment, anonymous data can be by service provider interface mould
Block 38 thereby executing part of service, or determines which service can be used for one using to provide data to service provider 170
Or multiple personal devices 120.
Example shown in Fig. 1 C and 1D is only that how can implement the example of data anonymous device, and be not intended to limit
Or it excludes.There are many other technologies for being used for anonymization data, refer to some of technologies herein.
Referring now to Fig. 1 E, Fig. 1 E shows concern service provider 170 and calculates the implementation of the invention of equipment 130C
Example.Calculating equipment 130C can receive the data from one or more equipment, and these data can anonymization, or
Person can not have anonymization or can obscure.In one embodiment, calculating equipment 130C can be from one or more
The received data of equipment generate fuzzy data, either from one or more equipment it is directly received or from another source it is indirect
It is received.In one embodiment, received data can be obscured by calculating equipment 130C, even if received data are anonymous
Change.In another embodiment, additional step can not executed to anonymization before this or fuzzy data by calculating equipment 130C.
Referring again to Fig. 1 E, in one embodiment, calculating equipment 130C can be requested can be in one or more equipment
One or more services 190 of upper execution.One or more services 190 can independently be executed by one or more equipment, or
One or more parts that person can be executed by calculating equipment 130C in order to service.Calculating equipment 130C can request service to mention
One or more services that one or more equipment can be presented to are provided for quotient 170.In one embodiment, equipment is calculated
130C can transmit fuzzy data 185 to service provider 170.This transmission can be carried out by any type of network,
For example, communication network 140 (being not shown in fig. ie).In one embodiment, service provider 170 can be with calculating equipment
130C is integrated.In one embodiment, service provider 170 and calculating equipment 130C can be by the controls of single entity.
Referring again to Fig. 1 E, in one embodiment, service provider 170 can receive fuzzy data 185.Fuzzy data
185 can be any form, as described in several examples herein.The purpose of example shown in Fig. 1 E and the following drawings is only
In order to make it easy to understand, and should not regard as and can thoroughly or exclusive in a manner of fuzzy data enumerate.For example, one
In a embodiment, by the way that irreversible anonymous data 185A can be obscured from data-removal apparatus source-information, so that not being available
Irreversible anonymous data 185A restores data.It, can be in order to obtain the source device information to form irreversible anonymous data 185A
Retrieve the copy of derived data.For example, in one embodiment, calculating equipment 130C and can store leads to irreversible anonymous data
The independent copy of the data of 185A, existence anduniquess identifies facility information in the copy saved by calculating equipment 130C.
In one embodiment, fuzzy data 185 may include reversible anonymous data 185B.Data 185B is not limited to specific
The format of type, but show simple example.In instances, the equipment mark of one or more personal device 120A and 120B
Know symbol, for example, 00123 and 00124, it is converted into new identifier XYZ and YYZ (for example, as shown in Figure 1 C), is implemented at one
In example, this can be with the identity 00123 and 00124 of 170 facility for study of prevention service provider.In one embodiment, Ke Yitong
It crosses and one or more algorithms, look-up table, key, encryption key, hash function etc. are provided are converted into reversible anonymous data 185B
The data of unique identification one or more equipment.
In one embodiment, fuzzy data 185 may include general anonymous data 185C.In one embodiment, this
The data of seed type may include that any format summarizes data, these summarize data and provide the letter in relation to one or more equipment
Breath, but the one or more equipment for leading to summary information are not identified especially.For example, general anonymous data 185C may include this
A little data, such as " being found to have 35 equipment greater than 20 contact persons in the contact list " or more specific data, such as
" such as 35 smart phones of the Apple iPhone 4S of operation iOS 6.0 have more than 2.0Gb remaining space, in contact person
More than 20 contact persons are found to have in list ".
Referring again to Fig. 1 E, in one embodiment, service provider 170 can receive fuzzy data 185, such as Fig. 1 E institute
Show.In one embodiment, service provider 170 may include fuzzy data analysis module 173.Fuzzy data analysis module
173 can receive fuzzy data 185 and be determined one or more services using fuzzy data 185 or be can be used in fuzzy number
According to the service of the type for the equipment quoted in 185.Fuzzy data analysis module 173 can be it is completely automatic, or at this
It can have some human interferences in the process.In one embodiment, fuzzy data analyzer 173 can be from several different meters
Calculate equipment 130C and obtain fuzzy data 185, these fuzzy datas can permit service provider 170 more efficiently provide it is a kind of or
A variety of services.In one embodiment, service provider 170 may include service management module 174.Service management module 174
It may include existing service analysis module 174A and new service generation module 174B.Existing service analysis module 174A and
New service generation module 174B can together or work independently, and with or without the use of fuzzy data analysis module 173, with
Fuzzy data determines whether existing service meets determining requirement based on the received.If there is no this service, then newly
Service generation module 174B can be by requesting, requesting human interference (for example, people writes the journey of new service by third party
Sequence) generate new service, or new service can be automatically generated.
In one embodiment, service provider 170 may include service transmission module 175, which can
To transmit one or more services 186 back to equipment 130C is calculated, for example, back to receiving module 138B, this clothes are serviced
Business receiving module can be a part of service provider interface module 138 in one embodiment.In various embodiments, one
Denier executes one or more operations relative to one or more services 186 are received, and de-fuzzy data 187, which can be, can make mould
The data of 185 deblurring of data are pasted, de-fuzzy data 187 can be transferred to service provider 170, for example, being transferred to clothes
The data deblurring module 176 of business provider 170.In one embodiment, de-fuzzy data 187 and 185 knot of fuzzy data
It closes to obtain the data of deblurring.In another embodiment, de-fuzzy data 187 do not need to be combined with fuzzy data 185
To obtain the data of deblurring.In one embodiment, de-fuzzy can be transmitted when receiving one or more services 186
Data 187.In another embodiment, it can be executed before transmitting de-fuzzy data 187 and be related to one or more services
186 one or more operations, such as propose one or more services to one or more equipment.In one embodiment, such as
The certain amount of user of fruit is without using one or more services 186, then de-fuzzy number can not be transmitted by calculating equipment 130C
According to 187.
Referring now to Fig. 1 F, Fig. 1 F is shown such as exemplary embodiment 100 " " shown in the embodiment of the present invention.For example,
Fig. 1 F shows the calculating equipment 130D interacted with personal device 120.In one embodiment, equipment 130D reception is calculated to come from
The device data 188 of personal device 120.Although Fig. 1 F shows this transmission directly from personal device 120, one
In a embodiment, calculating equipment 130D can receive the device data 188 from any source, and the source includes third equipment, leads to
Communication network, social network sites, device manufacturer etc..In one embodiment, equipment 130D is calculated for the monitoring of device data 188 one
A or multiple personal devices 120.In one embodiment, it calculates equipment 130D and is directed to the device data in relation to personal device 120
The one or more other sources of 188 monitorings.
In one embodiment, device data 188 may include the data that personal device 120 has been collected.In a reality
It applies in example, device data 188 can the modified user with the identity of obscuring device 120 or equipment 120.In one embodiment
In, device data 188 is not blurred.In one embodiment, device data 188 can be about being stored in equipment 120 or
The data that person is otherwise controlled by personal device 120, rather than the real data of the control by personal device 120.
For example, as shown in fig. 1F, personal device 120 may include protection data 126A, protection data can wrap in one embodiment
Include last 30 position of the access of personal device 120.In one embodiment, device data 188 may include that individual sets
Last 30 position of standby 120 access.In another embodiment, device data 188 may include personal device 120
There is the instruction of 30 device locations in memory.In one embodiment, device data 188 may include personal device
There is the instruction of 30 device locations in 120 memory, and 20 in these positions are logical with calculating equipment 130D
The entity of letter has given expression to interested position.
Referring again to Fig. 1 F, in one embodiment, calculating equipment 130D may include personal device interface module 132.
Personal device interface module 132 may include data value monitoring modular 132A.In one embodiment, data value monitoring modular
It is valuable information (for example, position data or showing equipment on New Year's Day that 132A, which can receive related which type of data,
Position data etc. of the eve in Times Square), and have for personal device 120 and be evaluated as valuable data and number
One or more equipment and other positions can be monitored according to the one or more instructions whether being protected.In one embodiment
In, personal device interface module may include the facility information receiving module 132B for being configured to receiving device data 188.Equipment
Data 188 can have any number of format, as described above, and non-limiting in the example as further provided herein
Shown in example.
Referring again to Fig. 1 F, in one embodiment, calculating equipment 130D may include equipment monitoring module 132C.One
In a embodiment, equipment monitoring module 132C can monitor one or more personal devices 120 by any monitoring technology.One
In a embodiment, equipment monitoring module 132C may include that can be configured to back report with specific time interval to equipment
Software relevant to personal device 120, hardware or the firmware of monitoring modular 132C.In one embodiment, equipment monitoring module
132C can monitor personal device 120 by one or more 140 (not shown) of communication network, and can be with personal device
120 direct communications.In one embodiment, equipment monitoring module 132C can monitor personal device 120, example by indirect mode
Such as, the other equipment or system that can be used by personal device 120.
Referring again to Fig. 1 F, in one embodiment, personal device interface module 132 may include service providing module
132D.For example, as previously mentioned, one or more services can be required by calculating equipment 130D.These services can be presented to
Personal device 120 gives user for rendering, or for about whether receiving the automatic decision of service.In one embodiment, one
Kind or a variety of services 188 can require access protection data (for example, protection data 126A of personal device 120) or one or more
A protection component (for example, protection component 128A of personal device 120) or both.In one embodiment, equipment 130D is calculated
The user 105 of personal device 120 can be presented in order to pass through personal device 120 for one or more services.
The more detailed description of personal device 120 is shown referring again to Figure 1B, Figure 1B.In one embodiment, personal
Equipment 120 may include processor 110.Processor 110 may include one or more microprocessors, central processing unit
(" CPU "), graphics processor (" GPU "), physical processing unit, digital signal processor, network processing unit, floating point processor etc.
Deng.In some embodiments, processor 110 can be server.In some embodiments, processor 110 can be distribution
Core processor.Although processor 110 is as the single processor of a part of single personal device 120, processor 110 can
To be distributed across the multiprocessor of one or more equipment 120, these processors can with or be not configured to work together.Place
Reason device 110 is illustrated as executing computer-readable instruction, to execute said one or multiple operations, and as Fig. 6,7A-7C,
Shown in 8A-8D, 9A-9C and 10A-10D.In some embodiments, processor 110 is designed to be configured to according to processing module
150 operations, the processing module 150 may include 152 in relation to being configured to provide one or more services and selectively visiting
Ask one or more particular device protection portion separately win the data of the agency of module, 154 one or more services agency stop
Continue to access one or more particular device protection portion with agency and divides that detection module, 156 to continue proxy access one or more special
Locking equipment protection part and one or more service the indicator that module stops is presented and 158 stop proxy access one or
Multiple particular device protections part promotes the one or more of the data of the presentation of the option of module.
Referring again to Figure 1B, in one embodiment, personal device 120 may include device memory 126.In some realities
It applies in example, memory 126 may include one or more storage equipment, read-only memory (ROM), programmable read only memory
(PROM), Erasable Programmable Read Only Memory EPROM (EPROM), buffer memory are (for example, random access memory (RAM), sudden strain of a muscle
Deposit, synchronous RAM (SRAM), dynamic random access memory (DRAM)) and/or other kinds of storage equipment
It is one or more.In some embodiments, memory 126 can be located at single website.In some embodiments, memory
126 can be located at multiple websites, including website away from each other.
Referring again to Figure 1B, in one embodiment, personal device 120 may include protection component 128A and unprotected group
Part 128B, referring again to Figure 1A.Referring again to Figure 1B, protecting component 128A may include one or more components, and each
Component can be hardware, software, firmware, data structure, class, API, the data of any format, link, pointer or other data or
Reference, interface or their any combination of position etc..Similarly, unprotected component 128B may include one or more groups
Part.In one embodiment, interface module 128 also may include one or more optional components, including assemblies monitor module
128C, equipment monitoring module 128D, using monitoring modular 128E and/or security module 128F.According to embodiment, these are optional
Module may exist or be not present.Their presence is not necessary.For example, in one embodiment, component detection module
128C may exist, and can track which entity is accessing various protection component 128A.In another embodiment, may be used
To omit assemblies monitor module 128C.
Referring again to Figure 1B is arrived, in one embodiment, interface module 128 may include equipment monitoring module 128D.If
Standby monitoring modular 128D can be with one or more states of monitoring device, for example, which application is located in memory, which is applied
Which resource of equipment can be used, or can track using statistics, utilize statistics etc..Equipment monitoring module 128D can be supervised
The equipment for being in various level details is surveyed, for example, in whole equipment level, in application level, in process level, in resource water
It is flat, or in interface level or the similar level of any combination of these or details.
Referring again to Figure 1B, in one embodiment, interface module 128 may include using monitoring modular 128E.Using
Monitoring modular 128E can be a part of a part of application, hard coded or the operating system being hardwired in equipment, or
It can be being used alone of running in the prospect or background of equipment.It can be with one in monitoring device using monitoring modular 128E
Using, one group of application or all applications.The many aspects of one or more application can be monitored using monitoring modular 128E, such as
Purposes, utilization, the resource used etc..
Referring again to Figure 1B, in one embodiment, interface module 128 may include security module 128F.Security module
128F can with one or more level of access of the multiple portions of monitoring device, for example, using, component, interface, memory block, mould
Block etc..In one embodiment, security module 128F can only monitor level of security and report.In another embodiment, pacify
Full module 128F can execute other function, for example, the safety of one or more parts is visited in modification level of security or removal
The secure access asked or accessed from one or more parts.
It individually or with any combination can include in various embodiments or can exclude assemblies monitor module completely
128C, equipment monitoring module 128D, using each of monitoring modular 128E and security module 128F.
152 are illustrated in relation to being configured to provide one or more services and selectively visiting referring now to Fig. 2, Fig. 2
Ask one or more particular device protection portion separately win the data of the agency of module illustrative embodiments.As shown in Fig. 2,
In various alternate embodiments and embodiment, 152 in relation to being configured to provide one or more services and selectively accessing
One or more particular device protection portion separately win the data of the agency of module may include one or more sub- logic module.Example
Such as, as shown in Fig. 2, for example, Fig. 2A, in some embodiments, module 152 may include one of following data or a variety of:
202 separately win in relation to being configured to provide one or more services and selectively accessing one or more particular device protection portion
The existing data of the agency of module, 204 related be configured to provide one or more services and selectively access one
A or multiple particular device protection portion separately win the data of the installation condition of the agency of module, 206 related are configured to provide one
Kind or a variety of services and selectively access one or more particular device protection portion separately win the user of the agency of module swashs
Data living, 208 are in relation to being configured to provide the one or more clothes for requiring to access one or more particular devices protections part
Be engaged in and selectively access one or more particular device protection portion separately win the agency of module data (for example, some
It may include 210 in relation to being configured to provide needed for accessing one or more particular device protections part one in embodiment
Or the display of multiple cycle efficienies service and selectively access one or more particular device protection portion separately win module from
The data of driving efficiency monitoring agency), 212 related be configured to provide one or more services from particular device module is received
And the data and 214 of the agency of one or more particular device protections part are selectively accessed by scanning particular device
Module is obtained about to be configured to provide one or more services and selectively access one or more particular devices and protect
Protect the data of the agency of part.
Referring again to Fig. 2, for example, Fig. 2 B, in some embodiments, module 152 may include one of the following or more
Kind: 216 be obtained about from operating system module be configured to provide it is one or more service and selectively access one
Or multiple particular devices protect the data of the agency of part, 218 to protect part of module related from one or more particular devices
It is configured to provide one or more services and selectively accesses by protecting part mould to one or more particular devices
The data of the agency of one or more particular devices protection part of block and/or one or more transmission of monitoring, 220 come from
The related of one or more particular device logs is configured to provide one or more services and selective access one or more
A particular device protection portion separately win the data of the agency of module and 222 agency executed it is one or more service and after
The continuous detectable indicator for accessing one or more particular device protection portion and dividing the agency of detection module.
Referring again to Fig. 2, such as Fig. 2 C, as it appears from the above, in some embodiments, module 152 may include 224 agencies
It is terminated and is related to executing the activity of one or more services and continues access one or more after terminating activity detection module
The detectable indicator of a particular device protection part.In some embodiments, module 224 may include that 226 agencies are whole
Only it is related to executing the activity of one or more services and at the end of at least part detection by analysis particular device module
Only continue the detectable indicator for accessing one or more particular device protections part after activity, 228 agencies have terminated and related to
And the end for executing the activity of one or more services and being detected in the report at least partly using particular device module to issue
Only continue the detectable indicator for accessing one or more particular device protections part after activity, 230 agencies have terminated and related to
And it executes the activity of one or more services and is passing through the data analyzed one or more particular devices and protect part of module
Flow the detectable indicator for continuing to access one or more particular devices protections part after the termination activity of detection, 232 and
Agency has terminated the activity for being related to executing one or more services and has at least partly set using one or more is specific
Continue that access is one or more specific to be set after the termination activity of the report detection of the monitor agent publication of standby protection part of module
The detectable indicator of standby protection part.In some embodiments, module 232 may include that 234 agencies have terminated and are related to holding
The activity of the one or more services of row and at least partly using the base of one or more particular devices protection part of module
Continue to access one or more particular device protection portion after the termination activity for the report detection that the monitor agent of kernel is issued
The detectable indicator divided.
Stop referring now to the agency that Fig. 3, Fig. 3 illustrate 154 one or more services and agency continues access one
Or multiple particular device protection portion divide the illustrative embodiments of detection module.As shown in figure 3, in various alternative embodiments
In embodiment, the agency of 154 one or more services stops and agency continues to access one or more particular device protections
Part detection module may include one or more sub- logic modules.For example, as shown in Fig. 3 (for example, Fig. 3 A), in some implementations
In example, module 154 may include that the notice of the stopping of 302 one or more service receiving modules and 304 agencies continue access one
A or multiple particular device protection portion divide the one or more of the notice of receiving module.In some embodiments, module 302 can be with
Including 306 from the notice of the stoppings of the received one or more services of proxy module and 308 from particular device operating system module
The one or more of the expiry notification of received one or more services.In some embodiments, module 304 can include with 310
Continue to access one or more particular device protections part from the received agency of one or more particular devices protection part of module
Notice, 312 continue to access the logical of one or more particular devices protections part from the received agency of protection apparatus assembly module
Know and 316 continue to access the one of the notice of one or more particular device protections part from the received agency of notification agent module
It is a or multiple.In some embodiments, module 312 may include 314 from as one or more particular devices protection part mould
The received agency of the protection apparatus assembly of a part of block continues to access the notice of one or more particular device protections part.
Referring again to Fig. 3, for example, Fig. 3 B, in some embodiments, module 154 may include 318 terminations one or more
Agent operation is surveyed with executing one or more service detection modules and the one or more particular device protection portion sortings of 320 access
The one or more of agency's prevention of the stopping of module.In some embodiments, module 320 may include 322 by particular device
The agency that detection module accesses the stopping that one or more particular device protection portion sortings are surveyed prevents and 324 is specific by being presented to
The agency for the stopping that the particular device output access one or more particular device protection portion sorting of equipment user's monitoring modular is surveyed
Prevention.
Referring again to Fig. 3, for example, Fig. 3 C, in some embodiments, module 154 may include 326 one or more services
It obtains indicator that the agency of module stops and 328 agencies continues to access one or more particular device protection portion and separately win to obtain mould
The one or more of the indicator of block.In some embodiments, module 328 may include one or more of lower list: 330
By the agency that particular device state monitoring modular obtains continue to access one or more particular devices protect part indicator,
332 continue to access one or more particular devices protections part by the agency that monitor agent level of access data module obtains
Indicator, 334 access the agency that data module obtains by monitoring particular device and continue to access one or more particular devices guarantors
Protect part indicator, 336 by monitoring attempt to access agency that one or more particular devices protect part of module to obtain after
It is continuous to access the agency that one or more particular devices protect the indicator of part and 338 obtain by executing Agent Analysis module
Continue to access the indicator that one or more particular devices protect part.
Referring again to Fig. 3, for example, Fig. 3 D, in some embodiments, module 154 may include one in lower list or
Multiple: the agency of 340 one or more services stops and agency continues to access one or more particular device protection portion sortings surveys
Module, 342 it is one or more look for friend service look for friend act on behalf of stop and look for friend agency continue access particular device connection
The notice based on agency of the stopping of list detection module and one or more services and 346 agencies continue access one
Kind or a variety of particular device protection portion divide the notice of receiving module.In some instances, module 342 may include 344 completing
Particular device contacts list in one or more entities for listing look for the friend to act on behalf of positioning and one or more look for
The stopping and friend agency is looked for continue access spy after the positioning and identification of one or more entity detection modules that friend services
Locking equipment contacts list.In some embodiments, module 346 may include following one or more: 348 is one or more
The notice based on agency of the stopping of service and continue to access the base that one or more particular device protection portion divide receiving module
Continue access one or more in the notice of agency, the notice based on agency of the stopping of one or more services and 350 agencies
A particular device protection portion divides the notice based on particular device protection part of receiving module.
156 continuation proxy access one or more particular devices protection part and one are illustrated referring now to Fig. 4, Fig. 4
The exemplary embodiment of the indicator of the stopping of module is presented in a or multiple services.As shown in figure 4, in the embodiment party of various substitutions
In formula and embodiment, 156, which continue proxy access one or more particular device, protects part and one or more services to present
The indicator of the stopping of module may include one or more sub- logic modules.For example, as shown in figure 4, for example, Fig. 4 A, one
In a little embodiments, module 156 may include one of the following or a variety of: 402 are presented in particular device output precision module
Continue proxy access one or more particular device protection part and one or more services stopping vision present,
The 408 continuation proxy access one or more particular device protection parts and 410 presented to entity relevant to particular device
One or more service present modules stoppings indicators, continue proxy access one or more particular device protection part with
And one or more services are presented the notices of the stoppings of modules and 412 continue agency's visit by what particular device module was shown
Ask the visual notification of the stopping of one or more particular device protections part and one or more services.In some embodiments
In, module 402 may include that the 404 continuation proxy access tablet device positioning presented in particular device output precision module pass
The vision of the stopping of sensor and one or more services is presented.In some embodiments, module 404 may include 406 in spy
The trip of the continuation proxy access tablet device alignment sensor and children's highway that present in locking equipment output precision module assists
The vision of the stopping of service is presented.In some embodiments, module 412 may include 414 aobvious by particular device screen module
That shows continues the notification icon of the stopping of proxy access one or more particular device protection part and one or more services.
Referring again to Fig. 4, for example, Fig. 4 B, in some embodiments, module 156 may include one of the following terms or
Multiple: 416 have continued the lists of one or more agencies of proxy access one or more particular device protection part and
Stop one or more indicators that one or more of one or more agencies of module are presented in one or more services;
418 descriptions continue the report of proxy access one or more particular device protection part and whether show one or more services
The report of module is stopped obtaining;420 instruction particular devices, which are presented, continues the protection of proxy access one or more particular device
The indicator of the stopping of part and one or more service modules;And 422 change agency present with show to continue agency visit
Ask the stopping of one or more particular device protections part and one or more service modules.In some embodiments, module
422 may include the one or more of the following terms: the color that 424 visions for changing agency are presented is to show to continue proxy access
The agency of the stopping of one or more particular device protections part and one or more service modules and 426 changes will
Show to continue proxy access one or more particular device to select agency for the one or more steps that user executes and protect
The stopping of shield part and one or more service modules.In some embodiments, module 426 may include 428 increase requirements
Show to continue proxy access one or more particular device to select agency for one or more steps performed by the user
The stopping of protection part and one or more service modules.
Referring again to Fig. 4, for example, Fig. 4 C, in some embodiments, module 156 may include 430 changes to show to continue
The behaviour that the agency of the stopping of proxy access one or more particular device protection part and one or more service modules is presented
Make the relative position in system.
Stop referring now to the agency that Fig. 5, Fig. 5 illustrate 158 one or more services and agency continues access one
Or multiple particular device protection portion divide the illustrative embodiments of detection module.As shown in figure 5, in various alternative embodiments
In embodiment, the agency of 158 one or more services stops and agency continues to access one or more particular device protections
Part detection module may include one or more sub- logic modules.For example, as shown in figure 5, for example, Fig. 5 A, in some implementations
In example, module 158 may include appointing for 502 stopping proxy access one or more particular devices protection equipment component indicating module
The presentation of option and 508 is for stopping the optional choosing of proxy access one or more particular device protection part presentation module
It is one or more.In some embodiments, module 502 may include 504 being used to indicate the module of particular device to stop
Proxy access one or more particular device protects the presentation of the option of equipment component indicating module.In some embodiments
In, module 504 may include 506 be used to indicate the module of particular device with stop proxy access one or more particular device guarantor
Protect the presentation of the optional user-selectable options of equipment component indicating module.In some embodiments, module 508 may include
The 510 stopping proxy access one or more particular devices for being presented to the protection part access control part of particular device module are protected
Protect the option of part.
Referring again to Fig. 5, for example, Fig. 5 B, in some embodiments, module 158 may include that 512 indicating equipments stop generation
The presentation and 518 for managing the option of user setting for accessing one or more particular devices protections part promotion module give
The relevant entity of particular device, which is presented, stops the optional choosing that proxy access one or more particular device protection part promotes module
Presentation it is one or more.In some instances, module 512 may include 514 before agent operation indicating equipment stop
Only proxy access one or more particular device protection part promotes the presentation and 516 of the option of the user setting of module
Indicating equipment stopping proxy access one or more particular device protection part promotes the user of module to set before agency obtains
The presentation of standby option it is one or more.
Referring again to Fig. 5, for example, Fig. 5 C, in some embodiments, module 158 may include 520 stopping proxy access one
The optional option of a or multiple particular device protection part display modules, the protection of 522 proxy access one or more particular devices
Portion ends module, 530 promote module stopping proxy access one or more particular device to protect part by disabling agency
The presentation of option and 532 is by removing agency's promotion module stopping proxy access one or more particular device protection portion
Point option presentation it is one or more.In some embodiments, module 520 may include the multiple agencies of 524 stoppings
The optional option of (including agency) to the access of one or more particular devices protection part display module.In some embodiments
In, module 522 may include that one or more access of 526 one or more agency (including agency) classes are one or more specific
Each access one or more particular device of equipment protection portion ends module and 528 one or more agencies protect part
Terminate module.
Referring again to Fig. 5, for example, Fig. 5 D, in some embodiments, module 158 may include 534 for establishing agency's visit
The presentation and 546 for asking the option of the limitation of one or more particular device protections part promotion module are required for continuing
Proxy access one or more particular device protection part promotes one kind of the presentation of the option of the data anonymous of module
Or it is a variety of.In some embodiments, module 534 may include that proxy access one or more particular device guarantor is rebuild in 536 requirements
The presentation for the option that shield part promotes the express authorization of module to access, 538 settings, which allow to act on behalf of, rebuilds access one or more
A particular device protection part promotes the presentation of the option of the limitation of the number of module and 542 foundation that reconstruction is allowed to act on behalf of
Access the one or more of the presentation of the option of the prerequisite of one or more particular device protections part promotion module.
In some embodiments, module 538 may include 540 settings allow during special time period agency rebuild access one or
Multiple particular device protections part promotes the presentation of the option of the limitation of the number of module.In some embodiments, module
542 may include 544 establish specific position as allow rebuild proxy access one or more particular device protection part promote
The presentation of the option of the prerequisite of module.
It is a series of flow charts for describing embodiment below.For easy understanding, flow chart is organized such that initially
Flow chart by exemplary embodiment present embodiment, hereafter after flow chart present alternative embodiment and/or
The extension of initial flowchart is as the sub-component operation established on the flow chart that one or more early stages are presented or add-on assemble
Operation.It will be appreciated by those skilled in the art that utilize herein presentation mode (for example, with present the embodiment of example and
Hereafter provide subsequent flow add and/or the presentation of the flow chart of other details starts) allow generally for various processes
The rapidly and easily understanding of embodiment.In addition, this field designer is it will be further understood that presentation side used herein
Formula also well makes the example for itself becoming modularization and/or Object-oriented Programming Design.
In addition, in Fig. 6, and in attached drawing hereafter, various operations can be described in such a way that frame covers frame.These are retouched
State the optional example that the operation that may indicate that in inside casing may include the operating procedure illustrated in one or more outline borders
Embodiment.It will be appreciated, however, that inside casing operation can regard the independent operation separated to related outline border as, and can phase
The operation of every other diagram is executed in any order, or may be performed simultaneously.Furthermore these are grasped shown in Fig. 6-10
Other operations made and be described herein can be executed by at least one that machine, product or article combine.
Following instance is provided merely as the explanation of various embodiments how can be implemented.Following instance is all not intended to limit
System, and all examples enumerated herein can be in conjunction with the part of other examples enumerated herein, until these combinations are in logic
On consistent degree invariably.Because of space constraints, can implement not writing out each example when the example every time.Therefore, unless separately
Clearly state outside, each example should be understood to include instant example before and after each of enumerate other examples, and
It can be in conjunction with any or all part of other examples.Each example is not intended to limit single claim or in groups right
It is required that but the illustrations of one or more embodiments how can be implemented.The following contents, which must not be understood as limiting any right, to be wanted
The exhaustive list that one or more claimed embodiments how can be implemented sought or enumerate.
Operation 600 is shown referring now to Fig. 6, Fig. 6, which may include that description is obtained in relation to being configured to visit
Ask that the operation 602 of the data of the application of one or more protection parts of particular device, the application are configured to provide one kind
Or a variety of services.For example, Fig. 1, for example, Figure 1B, shows 152 in relation to being configured to provide one or more services and selecting
Access to property one or more particular device protection portion separately win the agency of module data, the particular device protection portion separately wins
Module obtains and (obtains, receives from list or other data structures, calculating, selecting, or receiving information in relation to inference, execute
Calculating is to find inference, retrieval shows the data of inference, receive notice, reception obtains the information of inference, either by people or certainly
Dynamic process, or participate in being notified, any movement or transaction of reasoning or deduction, including but not limited to not no feelings of absolute belief
Shape, including may and/or other threshold values) related be configured to access (for example, sending and receiving order, receiving and
Data check the data gone to and arrived etc.) particular device (for example, cellular phone, smart phone, IP phone, VOIP phone,
Telephone receiver, microphone, camera (for example, video camera, Still Camera, digital camera etc.), earphone, earpiece, screen, display
Device, TV, game system, receiver (for example, audio/video receiver), media player is (for example, DVD player, blue light
Player, CD Player, MP3 player, cassette tape player), tablet device, netbook computer, laptop, road
By device, wireless router, bridge, the network equipment, server, desktop computer, personal computer, individual calculus thermomechanical components (example
Such as, RAM, hard disk drive, video card, etc.), personal navigation system, Vehicular navigation system, motor vehicles, motor vehicles sound equipment,
Motor vehicles control system, motor vehicles communication system (for example, OnStar), household electrical appliances, security system is (for example, household safe system
System), electronic security device (for example, electronic safe, safety door system, door-locking system), sound system, loudspeaker, remote controler
(for example, universal remote control or appliance remote control), radio, two-way radio, intercom, ham radio, metal detection
Device, radar detedtor, weather station, robot (for example, Roomba), dust catcher, wearable article, the personal effects, enhancing are existing
Product in kind, " intelligence " clothes, the glasses etc. with augmented reality) one or more protection parts (for example, either virtual
, physics, opposite, absolute, dynamic or it is static any structure such as limit, be programmable, changeable, at least one
Physically apply demand to access the part, no matter this requirement is cumbersome or heavy, no matter and this requirement is consistent
It is application, always applying or applied in AD HOC) application (for example, one or more hardware, software, firmware,
The set in API, Internet resources, library etc.) data (for example, Apply Names, application type, application any property or attribute, be
It is no limited by application, equipment or third party, whether be general or local etc.), the application be configured to provide (for example,
Take help to execute at least part of one or more steps of one or more services) it is one or more service (for example, setting
Any group of any part of any task or any task or task that standby or equipment combines another equipment that can execute
It closes, may include the interaction of people, or can not include the interaction of people, and may be required in equipment and be local or remote from equipment
One or more resources, and may include hardware, software, firmware, the portion for being stored in any component, module, part or equipment
Divide data that are upper or being operated by it, including but not limited to, hardware, software, application, Application Programming Interface (" API "), one or more
A virtual machine, one or more dynamic read library (" DLL "), one or more relational databases, one or more GUI frame,
Any part of one or more COM structure memories or any other equipment controlled by equipment, for example, cloud resource etc.).
Referring again to Fig. 6, operation 600 may include operation 604, which depicts detection application and completed one
At least one and application of kind or a variety of services maintains the one or more of access particular device to protect parts.For example, Fig. 1,
For example, Figure 1B, the agency for showing 154 one or more services stops and agency continues to access one or more particular devices
Protection portion divides detection module, the particular device protection portion divide detection module detection application (for example, one or more hardware, software,
The set in firmware, API, Internet resources, library etc.) it has completed (for example, using such a point: observer's whole or portion is reached
Point ground sums up with the help of application has completed at least one task) at least one and application of one or more services
Maintain one or more protection parts of (for example, application access level does not change according to aforementioned completion) access particular device
(for example, either virtual, physics, opposite, absolute, dynamic or it is static limit, be programmable, changeable etc. appoint
What structure applies demand physically to access the part at least one, no matter this requirement is cumbersome or heavy, and
Though this require be unanimously apply, it is always applying or apply in AD HOC).
Referring again to Fig. 6, operation 600 may include operation 606, which depicts presentation and show to have completed one
Kind or a variety of services and application maintain the information of the one or more protection parts of access particular device.Such as.Fig. 1, for example,
Figure 1B, shows 156 continuation proxy access one or more particular devices protection part and mould is presented in one or more services
The indicator of the stopping of block, the service are presented module and present (for example, for example, visually may not be shown or be promoted with any medium
It has been shown that, the one or more of participating user feel or are connected with inhuman entity) show to have completed one or more services
And application maintains the information of the access to one or more protection parts of particular device.
Referring again to Fig. 6, operation 600 may include operation 608, which, which depicts promotion and present, stops application pair
The option of the access of one or more protection parts of particular device.Such as.Fig. 1, for example, Figure 1B, shows 158 stoppings agency
The option that one or more particular device protections part promotes module is accessed, particular device protection part promotes module to promote
Presented into (for example, executing the one or more operations for helping to execute or completing to present) (such as by vision and non-vision connect
Any combination of mouth is shown) stop (for example, stopping, or in stopped process, or attempting to stop, hit or miss, no matter being somebody's turn to do
Stopping whether being interim or permanent) options of one or more protection parts of application access particular device are (for example, non-must
The optional interface wanted).
Fig. 7 A-7C depicts the various embodiments of operation 602, and operation 602 describes acquisition in relation to being configured to access
The data of the application of one or more protection parts of particular device, the application are configured to provide one kind according to the embodiment
Or a variety of services.Referring now to Fig. 7 A, operation 602 may include operation 702, which describes acquisition in relation to being configured
At the existing data of the application of one or more protection parts of access particular device, the application is configured to provide one kind
Or a variety of services.For example, Fig. 2, for example, Fig. 2A, shows 202 in relation to being configured to provide one or more services and selecting
Access to property one or more particular device protection portion separately win the agency of module existing data, the particular device protection portion
Separately win to obtain one or more guarantors of the module acquisition in relation to being configured to access particular device (for example, network-enabled digital camera)
The existing data of the application (for example, report from device operating system) of shield part (for example, image data), the application
It is configured to provide one or more services (for example, picture tag service).
Referring again to Fig. 7 A, operation 602 may include operation 704, which describes acquisition in relation to being configured to visit
Ask the data of the installation of the application of one or more protection parts of particular device, the application is configured to provide a kind of or more
Kind service.For example, Fig. 2, for example, Fig. 2A, shows 204 and related be configured to provide one or more services and selectively
Access one or more particular device protection portion separately win the installation condition of the agency of module data, the particular device protection portion
Separately win to obtain one or more protecting of the module acquisition in relation to being configured to access particular device (for example, smartwatch of user's wearing)
The installation of shield part (for example, blood glucose monitor) is (for example, the application memory on the memory of equipment remotely-or locally, Huo Zhe
The foundation of interface between device operating system and application, for example, user's mechanism that can activate application is provided, for example, when using
Family from application shop selection can download application when) data, the application be configured to provide it is one or more service (for example,
Picture tag service).
Referring again to Fig. 7 A, operation 602 may include operation 706, which describes acquisition in relation to being configured to visit
Ask the user activated data of the application of one or more protection parts of particular device, the application is configured to provide one kind
Or a variety of services.For example, Fig. 2, for example, Fig. 2A, shows 206 in relation to being configured to provide one or more services and selecting
Property access one or more particular device protection portion separately win the agency of module user activated data, the particular device protect
Shield part obtains module and obtains one or more protection parts in relation to being configured to access particular device (for example, smart television)
The application (for example, internet using application) of (for example, network communication components) user's activation (such as user executes, for example, with
Family is to equipment, such as the operating system instruction of smart television, to run program, for example, internet uses monitoring service) number
According to the application is configured to provide one or more services (for example, the service for the content that monitoring is watched online).
Referring again to Fig. 7 A, operation 602 may include operation 708, which describes acquisition in relation to being configured to visit
Ask the data of the application of one or more protection parts of particular device, the application is configured to provide requirement and accesses specific set
One or more services of standby one or more protection parts.For example, Fig. 2, for example, Fig. 2A, shows 208 in relation to being configured
The one or more services for accessing one or more particular devices protections part and selectively access one are required at offer
Or multiple particular device protection portion separately win the agency of module data, the particular device protection portion separately win module obtain it is related
Being configured to access particular device, (for example, such as smart phone, and picture deposits a part that support is particular device, because special
Locking equipment controls it, and checks, modifies, changes, increases, subtracts and deletes as a part for depositing support for example, executing
One or more abilities of one or more files) one or more protection parts (for example, being stored in cloud network storage
Picture deposit support) application (for example, picture upload application) data, the application be configured to provide requirement access one or
One or more services (for example, picture upload service) of multiple particular device protections part.
Referring again to Fig. 7 A, operation 708 may include operation 710, which depicts acquisition in relation to being configured to visit
Ask the data of the bicycle efficiency application of the alignment sensor of particular device, the bicycle efficiency application is configured to specific
The user of equipment provides one or more cycling efficiency statistics after carrying the equipment when cycling, described to ride voluntarily
Vehicle cycle efficieny statistical data requires to use alignment sensor.For example, Fig. 2, for example, Fig. 2A, shows 210 in relation to being configured to
One or more cycling efficiency displays needed for accessing one or more particular device protections part are provided to service and select
Access to selecting property one or more particular device protection portion separately win the bicycle efficiency monitor agent of module data, this is specific
Equipment protection part obtains module and obtains in relation to being configured to access particular device (for example, tying up the monitoring in bicycle handlebar on hand
Equipment) alignment sensor bicycle efficiency application data (for example, obtain load application memory in position), institute
Bicycle efficiency application is stated to be configured to after the user of particular device carries the equipment when cycling (for example, ride connection
The bicycle of the equipment) one or more cyclings efficiency statistics (for example, height change hourly) are provided, it is described
Cycling efficiency statistics require using alignment sensor (for example, the equipment can be able to use three-dimensional triangulation measurement, and
And it is noted that can have other modes to measure height change, for example, by altimeter, but the equipment can not have
Altimeter, or can choose using three-dimensional position triangulation).
Referring again to Fig. 7 A, operation 602 may include operation 712, which describes reception from particular device
Show the data that there is the application for the one or more protection parts for being configured to access particular device, the application is configured to
One or more services are provided.For example, Fig. 2, for example, Fig. 2A, shows 212 in relation to being configured to provide one or more services
And the data for selectively accessing the agency from the received one or more particular device protections part of particular device module, should
Particular device shows to exist from particular device (for example, cellular smart mobile phone) reception is configured to access particular device (for example, setting
The list for the number that standby telephony feature calls in last seven days) one or more protection parts application (for example, in the presence of
Using, or link or other relative indicators of application) data (for example, application consumes one or more device resources, example
Such as, processor power, fixation or random access memory, Internet resources or using one or more sensors and/or input/
The indicator that the device operating system of output interface generates), the application be configured to provide one or more services (for example,
Use pattern generator service).
Referring again to Fig. 7 A, operation 602 may include operation 714, which describes scanning particular device to determine quilt
Be configured to the identity of the applications of one or more protection parts of access particular device, the application be configured to provide it is a kind of or
A variety of services.For example, Fig. 2, for example, Fig. 2 B, shows 214 and be obtained about by scanning particular device module and be configured to mention
For the data of the agency of one or more services and selectively access one or more particular devices protections part, this is specific
EM equipment module scanning (for example, one or more parts to equipment (including memory) execute any kind of analysis, if
Other scannings of fixed or movable and, for example, circuit, sensor, input/output interface etc., and further include that scanning is received
Collection related equipment data, for example, registry file or remote journal file) particular device with determination be configured to access spy
One or more protection parts of locking equipment (for example, video camera that Wi-Fi is enabled) are (for example, user is appointed as the figure of " privately owned "
The particular category of piece) application (for example, picture enhancing service) identity (for example, the title of application or the information of related application
Or internal code name, for example, process identifier number), the application is configured to provide one or more services.
Referring again to Fig. 7 B, operation 602 may include operation 716, which describes the operation system from particular device
System obtains the data of the application of one or more protection parts in relation to being configured to access particular device, and the application is configured
At the one or more services of offer.For example, Fig. 2, for example, Fig. 2 B, shows 216 and is obtained about from operating system module and matched
It is set to and one or more services and the selectively data of the agency of access one or more particular devices protections part is provided,
The operating system module obtains related from the operating system (for example, iOS) of particular device (such as tablet computer, for example, iPad)
Be configured to access one or more protection parts of particular device (such as tablet computer, for example, iPad) application (for example,
ATM search application) data, the application be configured to provide it is one or more service (for example, search user present bit
Set nearest ATM).
Referring again to Fig. 7 B, operation 602 may include operation 718, which describes monitoring and be sent to and/or come
Data from one or more protection parts of particular device, including be sent to and/or from being configured to access particular device
One or more protection parts applications data.For example, Fig. 2, for example, Fig. 2 B, show 218 by being sent to and/or
The related of one or more transmission of monitoring from one or more particular devices protection part of module is configured to provide one kind
Or the data of a variety of agencies for servicing and selectively accessing one or more particular devices protections part, the particular device are protected
Protect part of module monitoring (for example, all or part of of data being received, for example, a data packet in every ten data packets) hair
It is sent to and/or one or more protection parts from particular device (for example, onboard navigation system) is (for example, GPS positioning is tracked
Device) data, including be sent to and/or from be configured to access one of particular device (for example, onboard navigation system) or
The data of the application (for example, gas station's gas price compares application) of multiple protection parts.
Referring again to Fig. 7 B, operation 602 may include operation 720, which describes one of reception particular device
Or multiple usage logs, the usage log include one or more protection parts in relation to being configured to access particular device
The use information of one or more application.For example, Fig. 2, for example, Fig. 2 B, shows 220 and is configured to provide one kind from related
Or it a variety of services and selectively accesses one or more particular device protection portion and separately wins to obtain one or more of the agency of module
The data of a particular device log, the particular device protection portion separately win module receive particular device (for example, the intelligent hand of user
Machine) one or more usage logs (for example, looking for log of friend's application access equipment contacts list every time), the use
Log includes one or more protection parts (example in relation to being configured to access particular device (for example, smart phone of user)
Such as, the contacts list of user) one or more application (for example, using look for friend apply and may be related to the equipment
Zero or more other application frequency and/or look for friend application access user smart phone multiple portions (for example,
Be stored on smart phone or the frequency of the available contacts list of smart phone) log) use information.
Referring again to Fig. 7 B, operation 602 may include operation 722, which depicts detection application and executed one
At least one and application of kind or a variety of services maintains the one or more of access particular device to protect parts.For example, Fig. 2,
For example, Fig. 2 B, shows 222 agencies and has executed one or more services and continued to access one or more particular devices guarantors
The detectable indicator of part detection module is protected, which divides detection module detection application (for example, speech synthesis
Using) execute at least one of one or more services (for example, sound that user is covered up when communicating with telephone plant) simultaneously
And application maintains one or more protection parts of access particular device (for example, telephone system that VoIP is enabled) (for example, equipment
Microphone).
Referring now to Fig. 7 C, operation 602 may include operation 724, which depicts detection in application execution one kind
Or it terminates after at least one at least part of a variety of services and has been set using maintenance access is specific after termination
Standby one or more protection parts.For example, Fig. 2, such as Fig. 2 B, show 224 agencies terminated be related to executing it is a kind of or
The activity of a variety of services and continuing after terminating activity detection module accesses one or more particular devices protections part
Detectable indicator, termination activity detection module detection are executing one or more services (for example, being mounted on home computer
On with notice children surf the web content internet using monitoring service) at least one at least part after application
It is terminated (for example, stopping, provisionally or until reactivation etc.) and application maintains access particular device (example after termination
Such as, home computer) one or more protection parts (for example, the website column of the browser access operated on computers
Table).
Referring again to Fig. 7 C, operation 724 may include operation 726, which depicts by checking particular device
At least part of memory detects after at least one at least part of the one or more services of application execution
It terminates and application maintains to access one or more protection parts of particular device after termination.For example, Fig. 2, such as Fig. 2 B,
It shows 226 agencies and has terminated the activity for being related to executing one or more services and by analysis particular device module
Continue to access the detectable indicator that one or more particular devices protect part after the termination activity of at least part detection,
Memory (such as the operation application of memory that the particular device module passes through detection particular device (for example, home computer)
A part of deposit) at least part executing one or more services (for example, allow user have meal) at least to detect
It has terminated after a part using (for example, calorie consumption tracker) and has been set using maintenance access is specific after termination
The standby one or more protection parts database of how many calorie (such as in various foods).
Referring again to Fig. 7 C, operation 724 may include operation 728, which depicts by receiving from storage prison
The report detection for surveying application has terminated simultaneously after at least one at least part of the one or more services of application execution
And application maintains one or more protection parts of access particular device after termination.For example, Fig. 2, such as Fig. 2 C, it shows
228 agencies have terminated the activity for being related to executing one or more services and at least partly particular device module have been used to send out
Continue to access the detectable indicator that one or more particular devices protect part after the termination activity of the report detection of cloth, it should
Particular device module by receive from memory monitoring application report come detect execute it is one or more service (for example,
The positioning service of soda water vending machine) at least part after application terminated and using maintaining access special after termination
One or more protection parts (for example, alignment sensor) of locking equipment.
Referring again to Fig. 7 C, operation 724 may include operation 730, which depicts detection in application execution one kind
Or it is terminated after at least one at least part of a variety of services and particular device is flowed to and/or come from by monitoring
The data flows of one or more protection parts detect using the one or more for maintaining access particular device after termination
Protect part.For example, Fig. 2, such as Fig. 2 C, it shows 230 agencies and has terminated the activity for being related to executing one or more services
And continue to visit after the termination activity by the data-flow detection for analyzing one or more particular devices protection part of module
Ask the detectable indicator of one or more particular device protections part, particular device protection part of module detection is held in application
It has terminated and has monitored after at least one at least part of the one or more services of row and flowed to and/or set from specific
The data flow of standby one or more protection parts accesses particular device (for example, user using maintenance after termination to detect
Tablet device) one or more protection parts.
Referring again to Fig. 7 C, operation 724 may include operation 732, which depicts detection in application execution one kind
Or it is terminated after at least one at least part of a variety of services and has come from the monitoring application of protection part by receiving
Report detection application maintain one or more protection parts of access particular device after termination.For example, Fig. 2, such as scheme
2C shows 232 agencies and has terminated the activity for being related to executing one or more services and at least partly used one
Or continue access one after the termination activity of the report detection of the monitor agent publication of multiple particular device protection part of module
Or the detectable indicator of multiple particular devices protection part, particular device protection part of module detection execute it is a kind of or more
At least one of kind service (for example, the possible interested concert of the user for the selection of music equipment that user based on equipment listens)
At least part after application (for example, the use based on equipment (such as media player) or the equipment including media player
The music that family is listened collects concert information and selects the application of the possible interested concert of the user of equipment) it has terminated
And (such as it can be a part of operating system, or can be and individually answer by receiving the monitoring application from protection part
With) report detection application after termination maintain access particular device (for example, media player or operation music player answer
Computer or other equipment) one or more protection parts (music playlist that user establishes).
Referring again to Fig. 7 C, operation 732 may include operation 734, which depicts detection in application execution one kind
Or it is terminated after at least one at least part of a variety of services and has monitored one or more protect by receiving to come from
The report detection application for protecting the device operating system of part maintains one or more protections of access particular device after termination
Part.For example, Fig. 2, such as Fig. 2 C, show 234 agencies terminated the activity for being related to executing one or more services and
At least partly using the report of the monitor agent publication based on kernel of one or more particular device protection part of module
Continue to access the detectable indicator that one or more particular devices protect part, the particular device after the termination activity of detection
The detection of protection part of module is in the one or more services of application execution (for example, monitoring subjective situation to detect the clothes of medical emergency
Business) at least one at least part after terminated and by receiving from the one or more protection parts of monitoring
Device operating system is (for example, the Android by equipment supplier's modification run in the equipment of equipment supplier's manufacture operates system
System) report detection application maintain one or more protection parts of access particular device after termination.
Fig. 8 A-8D depicts the various embodiments of operation 604 according to the embodiment, which depicts detection and answer
With the one or more protection portion for having completed at least one of one or more services and application maintenance access particular device
Point.Referring now to Fig. 8 A, operation 604 may include operation 802, the operation 802 depict reception application completed it is a kind of or
At least one notice of a variety of services.For example, Fig. 3, for example, Fig. 3 A, shows 302 one or more service receiving modules
The notice of stopping, which, which receives, has completed one or more services using (for example, self-driving travel intended application)
At least one notice (for example, notification received data packet) of (for example, auxiliary plan self-driving travel).
Referring again to Fig. 8 A, operation 604 may include operation 804, which depicts reception application and maintain access special
The notice of one or more protection parts of locking equipment.For example, Fig. 3, for example, Fig. 3 A, shows 304 agencies and continues access one
Or multiple particular device protection portion divide the notice of receiving module, the particular device protection portion divide receiving module receive application (for example,
Video-game enhancing application) it maintains to access one of particular device (for example, video game system, for example, Nintendo Wii)
Or the notice (for example, the electric pulse for causing machine state to change) of multiple protection parts (for example, video card buffer memory).
Referring again to Fig. 8 A, operation 802 may include operation 806, which depicts from application and received application
Complete at least one notice of one or more services.For example, Fig. 3, for example, Fig. 3 A, shows 306 and receives from proxy module
One or more services stopping notice, the proxy module from application receive apply (for example, wireless network strength analysis)
At least one notice (example of one or more services (for example, available wireless network of analysis user's connection) is completed
Such as, indicator is received).
Referring again to Fig. 8 A, operation 802 may include operation 808, which depicts receives from device operating system
Using at least one notice for having completed one or more services.For example, Fig. 3, for example, Fig. 3 A, 308 are shown from specific
The notice of the stopping of the received one or more services of device operating system module, the particular device operating system module is from equipment
Operating system (for example, self-defining operation system of equipment supplier's modification) has received application (for example, speech processing applications)
Complete the notice of at least one of one or more services (for example, pre-processing from the received voice command of user).
Referring again to Fig. 8 A, operation 804 may include operation 810, the operation 810 depict from one of particular device or
Multiple protection portion taps receive the notice that application maintains one or more protection parts of access particular device.For example, Fig. 3, for example,
Fig. 3 A shows 310 and continues to access one or more spies from the received agency of one or more particular devices protection part of module
Locking equipment protects the notice of part, which protects part of module from particular device (for example, Windows phone, example
Such as, Nokia Lumia) one or more protection parts (for example, accelerometer of equipment) receive application (for example, sensing
The impact early warning application of equipment is protected when will impact) maintain the one of access particular device (for example, Windows phone)
The notice of a or multiple protection parts (for example, accelerometer).
Referring again to Fig. 8 A, operation 804 may include operation 812, which depicts to receive from apparatus assembly and apply
Maintain the notice of one or more protection parts of access particular device.For example, Fig. 3, for example, Fig. 3 A, shows 312 from protection
The received agency of apparatus assembly module continues to access the notice of one or more particular device protections part, the protection apparatus assembly
Module from apparatus assembly (for example, from hardware implement apply monitoring assembly) receive application maintain access particular device (for example, for
Answer quotient's special intelligent mobile phone) one or more protection parts notices.
Referring again to Fig. 8 A, operation 812 may include operation 814, which depicts from one as particular device
The apparatus assembly of a part of a or multiple protections part receives one or more protection portion that application maintains access particular device
The notice divided.For example, Fig. 3, for example, Fig. 3 A, shows 314 from one as one or more particular devices protection part of module
The received agency of partial protection apparatus assembly continues to access the notice of one or more equipment protection parts, which protects
Part of module is protected from one or more protection parts as particular device (such as laptop) (for example, the protection of equipment
Part includes sensor and determines which kind of entity just in the monitor for the sensor of access sensors, alternatively, another
In one embodiment, segment of the protection portion of equipment point including memory, and be designed to check the segment of memory and
Identification accessing or attempting access memory segment one or more entities application) apparatus assembly receive application tie up
Hold the notice of one or more protection parts of access particular device.
Referring again to Fig. 8 A, operation 804 may include operation 816, which depicts from having accessed particular device
The notice applications of one or more protection parts receive the one or more protection parts that application maintains access particular devices
Notice.For example, Fig. 3, for example, Fig. 3 A, shows 316 agencies and continue access and set from the received one or more of notification agent module
The notice of standby protection part, the notification agent module is from the one or more for having accessed particular device (for example, tablet device)
Protection part notice application (for example, at least one purpose be at least one entity and equipment at least part it is true
Which kind of fixed entity is just in the application of what part of access equipment) receive application (for example, the service of photo face recognition) maintenance visit
Ask the notice of one or more protection parts of particular device (for example, image acquiring sensor).
Referring now to Fig. 8 B, operation 604 may include operation 818, which depicts detection application and completed one
Kind or at least one of a variety of services.For example, Fig. 3, for example, Fig. 3 B, shows 318 termination one or more agent operations to hold
Row one or more service detection module, service detection module detection application (for example, running mileage tracks application program) is
Completed at least the one of one or more services (for example, service of a part of tracking running how many mileage as training program)
Kind.
Referring again to Fig. 8 B, operation 604 may include operation 820, which depicts reception application and maintain access special
The notice of one or more protection parts of locking equipment.For example, Fig. 3, for example, Fig. 3 B, it is specific to show 320 pairs of one or more
The agency of the stopping of the access of equipment protection part detection module prevents, which divides detection module to receive application
(for example, running mileage tracking application) maintains access (for example, after user has shown that running terminates, using still accessing
Alignment sensor) particular device (for example, exercise aiding apparatus) one or more protection parts (for example, alignment sensor)
Notice.
Referring again to Fig. 8 B, operation 820 may include operation 822, which describes one of observation particular device
Or one or more states of multiple portions are to determine that at least one of one or more services has been completed in application.For example, figure
3, for example, Fig. 3 B, shows 322 visits to one or more particular devices protection part detected by particular device monitoring modular
The agency for the stopping asked prevents, particular device monitoring modular observation (for example, the data in relation to one or more states are received,
Or the report in relation to one or more states is received, or be inserted into the communication line between two components, or virtual insertion two
Contact or interface between, or between serving as two or more components, sensor, interface, user etc.) particular device
One or more states of one or more parts of (for example, smart phone) are (for example, status information, for example, environmental factor dependence
And/or environmental factor dependence information) to determine that one or more clothes have been completed in application (for example, processor use of monitoring service)
At least one of business.
Referring again to Fig. 8 B, operation 820 may include operation 824, which describes one by particular device
Or one or more outputs that multiple output precision observations are presented to the user.For example, Fig. 3, for example, Fig. 3 B, shows 324 by being in
Now part is protected to access one or more particular devices to the particular device output detection of particular device user monitor module
Stopping agency prevention, the particular device user monitor module observation (for example, receive the number in relation to one or more states
According to, or the report in relation to one or more states is received, or be inserted into the communication line between two components, or be virtually inserted into two
Contact or interface between a application, or between serving as two or more components, sensor, interface, user etc.) by specific
One or more output precisions of equipment (for example, video game system and associated peripheral, for example, TV and controller)
The one or more that (for example, LED light, touch screen, LCD screen, loudspeaker, earphone, touch feedback button etc.) is presented to the user
It exports (for example, vision, the sense of hearing, output of tactile or other forms).
Referring now to Fig. 8 C, operation 604 may include operation 826, which depicts reception application and completed one
Kind or at least one notice of a variety of services.For example, Fig. 3, for example, Fig. 3 C, shows 326 one or more services and obtains mould
The indicator that the agency of block stops, the service obtain module reception and have completed one using (for example, network connection management application)
Kind or at least one notice of a variety of services (for example, being that the user of downloading film is requested to find high-efficiency network).
Referring again to Fig. 8 C, operation 604 may include operation 828, which depicts detection application and maintain access special
One or more protection parts of locking equipment.For example, Fig. 3, for example, Fig. 3 C, shows 328 agencies and continues access one or more
Particular device protection portion separately win module indicator, the particular device protection portion separately win module detection application (for example, network
Connection management application) it maintains to access one or more of particular device (for example, smart phone, tablet computer, laptop etc.)
A protection part (for example, input/output stream of network controller).
Referring again to Fig. 8 C, operation 828 may include operation 830, which depicts one of observation particular device
Or one or more states of multiple portions are to determine that application maintains one or more protection parts of access particular device.Example
Such as, Fig. 3, for example, Fig. 3 C, shows 330 and continue access one by the agency that particular device state detects monitoring modular acquisition
Or the indicator of multiple particular device protections part, the particular device state detect monitoring modular observation particular device (for example, public
The network user of department and the personal portfolio of employee) one or more parts one or more states with determine application maintain
Access one or more protection parts of particular device (for example, network computer in corporate networks corporate environment).
Referring again to Fig. 8 C, operation 828 may include operation 832, and it is related to particular device which depicts reading
One or more level of access data, the level of access statistics indicate that application one or more level of access.For example, figure
3, for example, Fig. 3 C, shows 332 and continues access one or more by the agency that monitor agent level of access data module obtains
Particular device protects the indicator of part, which reads one or more related with particular device
Level of access data are (for example, be allowed for list or the institutes such as various sensors and/or segment of the level of access of various applications
Need level of access list), the level of access statistics indicate that application one or more level of access (such as, if come
Self-application side or protection part side, and whether specially refer to applying or as application group or a part of application class).
Referring again to Fig. 8 C, operation 828 may include operation 834, which depicts the one of reading and particular device
The relevant access data of a or multiple protection portion point, the access is statistics indicate that the one or more that can access protection part is real
Body, which includes one or more application.For example, Fig. 3, for example, Fig. 3 C, it is special by monitoring to show 334
The agency that locking equipment access data module obtains continues to access the indicator of one or more particular device protections part, this is specific
Equipment accesses data module and reads and the relevant access number of one or more protection portion of particular device (for example, desktop computer) point
According to (for example, in relation to access one or more components, application, memory segment, data of section etc.), the access statistics indicate that
Can access protection part one or more entities (for example, people, application, using class, developer, operating system etc.), this
Or multiple entities include one or more application.
Referring again to Fig. 8 C, operation 828 may include operation 836, which depicts one of monitoring particular device
Or one or more access rights of multiple protection parts are to determine that application maintains one or more protection portion of access particular device
Point.For example, Fig. 3, for example, Fig. 3 C, shows 336 and protects part of module by the one or more particular devices of monitoring trial access
The agency of acquisition continues to access the indicator of one or more particular device protections part, which protects part of module prison
Survey particular device (for example, cellular communication apparatus) protection part (for example, velocity sensor) one or more access rights with
Determine that application (for example, location tracking equipment) maintains one or more protection parts of access particular device (for example, velocity pick-up
Device).
Referring again to Fig. 8 C, operation 828 may include operation 838, which depicts one or more of analysis application
A feature is to determine that application maintains one or more protection parts of access particular device.For example, Fig. 3, for example, Fig. 3 C, shows
338 continue to access the instruction of one or more particular devices protections part by executing the agencies that Agent Analysis module obtains
Symbol, the one or more features of Agent Analysis module analysis application are (for example, level, API level, interface water in source code
Equality, if directly processing application or processing relevant information) to determine that application maintains access particular device (for example, smart phone)
One or more protection parts.
Referring again to Fig. 8 D, operation 604 may include operation 840, which, which depicts detection, applies and complete one kind
Or one or more protection parts of at least one particular device of access later of a variety of services.For example, Fig. 3, for example, Fig. 3 D,
The agency for showing 340 one or more services stops and agency especially accesses one or more particular device protection portion sortings
Module is surveyed, which divides detection module detection application (for example, the positioning service of soda water vending machine) complete
(for example, positioning and/or providing to user has apart from nearest after at least one at one or more services
The guide of the soda water vending machine of Sunkist Orange stock) access one of particular device (for example, smart phone)
Or multiple protection parts (for example, alignment sensor).
Referring again to Fig. 8 D, operation 604 may include operation 842, which depicts detection and looked for friend's application
It completes that friend is looked for service and friend's application is looked for maintain the contacts list of access storage on a particular device.For example, Fig. 3, example
Such as, Fig. 3 D, show 342 it is one or more look for that friend services look for friend to act on behalf of stopping and to look for friend agency to continue access special
Locking equipment contacts list detection module, particular device contacts list detection module detection look for friend's application to complete to look for
Friend services and looks for friend's application that access is maintained to be stored in particular device (for example, having is including laptop, desktop
Between brain, tablet device and several equipment of smart phone share shared contacts list smart phone) on contact person
List.
Referring again to Fig. 8 D, operation 842 may include operation 844, which depicts detection and looked for friend's application
Positioning stores the one or more entities listed in contacts list on a particular device and knows to the user of particular device
The one or more entities not positioned, and looking for friend to apply is being that user positions and identifies in contacts list and lists
Contacts list is accessed after one or more entities.For example, Fig. 3, for example, Fig. 3 D, show 344 completion particular device
The one or more entities listed in contacts list look for friend act on behalf of positioning and it is one or more look for friend service stop
Only and friend agency is looked for continue to access particular device contact person after the positioning and identification of one or more entity detection modules
List, entity detection module detection are looked in the located contacts list being stored on particular device of friend's application and being listed
One or more entities and one or more entities that positioning is identified to the user of particular device, and friend is looked for apply
It is positioned for user and identifies that the one or more entities listed in contacts list access contacts list later.
Referring again to Fig. 8 D, operation 604 may include operation 846, which depicts from application and received application
It completes at least one notice of one or more services and receives one or more the protecting using maintenance access particular device
Protect the notice of part.For example, Fig. 3, for example, Fig. 3 D, shows the notice based on agency of the stopping of 346 one or more services
And agency continues to access the notice that one or more particular device protection portion divide receiving module, particular device protection portion tap
Receive module from application (for example, music assorting application) receive application completed one or more services at least one (for example,
By equipment record or from network download a piece of music classification) notice and receive application (for example, music assorting application)
One or more protection parts of maintenance access particular device are (for example, storing the part of the memory of music or for recording sound
Happy microphone) notice (for example, from operating system or from protection part or from another application).
Referring again to Fig. 8 D, operation 846 may include operation 848, which depicts from application and received application
Complete at least one notice of one or more services and from application receive application maintain one of access particular device or
The notice of multiple protection parts.For example, Fig. 3, for example, Fig. 3 D, show the stopping of 348 one or more services based on agency
Notice and continue to access the notice based on agency that one or more particular device protection portion divide receiving module, this is specific to set
Standby protection portion divides receiving module to complete one or more services from application (for example, walking mileage tracker) reception application
The notice of at least one (for example, using showing that it is being closed, or completed discrete tasks) and receive application (example
Such as, walking mileage tracker) maintain the one or more of access particular device (for example, portable pedometer device) to protect parts
The notice of (for example, pedometer).
Referring again to Fig. 8 D, operation 846 may include operation 850, which depicts from application and received application
It completes at least one notice of one or more services and taps from one or more protection portion of particular device to receive application
Maintain the notice of one or more protection parts of access particular device.For example, Fig. 3, for example, Fig. 3 D, show 350 it is a kind of or
The notice based on agency of the stopping of a variety of services and agency, which continue to access one or more particular device protection portion taps, to receive
The notice based on particular device protection part of module, the particular device protection portion divide receiving module from application (for example, tracking is worked as
The hiking path status of the availability in specific hiking path tracks application under the conditions of preclimax) reception application (for example,
The hiking path status of the availability in specific hiking path tracks application under tracking current weather conditions) it has completed
At least one of one or more services notifies and taps receipts notice from one or more protection portion of particular device.
Fig. 9 A-9C depicts the various embodiments of operation 606 according to the embodiment, which depicts presentation table
The bright information for having completed one or more services and one or more protection parts of application maintenance access particular device.It is existing
Referring to Fig. 8 A, operation 606 may include operation 902, which depicts the vision on the display of particular device and present
It has completed one or more services and application maintains to access the information of one or more protection parts of particular device.Example
Such as, Fig. 4, for example, Fig. 4 A, shows continuation proxy access one or more that 402 are presented in particular device output precision module
The vision of the stopping of a particular device protection part and one or more services is presented, which exists
It is presented on the display (for example, screen) of particular device and has completed one or more services and application (for example, wireless network
Intensive analysis device) maintain the vision of one or more protection parts of access particular device (for example, tablet device) that (example is presented
Such as, graphic icons are notified).
Referring now to Fig. 9 A, operation 902 may include operation 904, which depicts the display in particular device
Upper presentation has completed one or more services and has been configured to provide the application maintenance access plate of one or more services
The vision of the alignment sensor of equipment is presented.For example, Fig. 4, for example, Fig. 4 A, shows 404 in particular device output precision module
The vision of the stopping for continuing proxy access tablet device alignment sensor and one or more services of upper presentation is presented, the spy
Locking equipment output precision module is presented on the display of particular device (for example, smart phone) has completed one or more clothes
It is engaged in and the application for being configured to provide one or more services maintains the vision of the alignment sensor of access tablet device to present
(for example, the stop element of sensor being presented, for example, being used for the letter " GPS " of alignment sensor in stop element).
Referring now to Fig. 9 A, operation 904 may include operation 906, which depicts the display in particular device
Upper presentation has completed trip's ancillary service of children's highway and the application of trip's ancillary service for being configured to provide children's highway
The vision of the alignment sensor of access tablet device is maintained to present.For example, Fig. 4, for example, Fig. 4 A, shows 406 in particular device
What is presented in output precision module continues trip's ancillary service of proxy access tablet device alignment sensor and children's highway
The vision of stopping is presented, which is presented on the display of particular device has completed children's highway
Trip's ancillary service and be configured to provide children's highway trip's ancillary service application maintain access tablet device positioning
The vision of sensor is presented.
Referring again to Fig. 9 A, operation 606 may include operation 908, which depicts user's presentation table to equipment
The bright information for having completed one or more services and one or more protection parts of application maintenance access particular device.Example
Such as, Fig. 4, for example, Fig. 4 A, it is one or more special to show the continuation proxy access that 408 are presented to the entity for being related to particular device
The indicator of the stopping of module is presented in locking equipment protection part and one or more services, which is presented module to equipment
The one or more protection portion for showing to have completed one or more services and application maintenance access particular device are presented in user
The information divided.
Referring again to Fig. 9 A, operation 606 may include operation 910, the operation 910 depict presentation completed it is a kind of or
A variety of services and application maintain the notice of one or more protection parts of access particular device.For example, Fig. 4, for example, figure
4A, shows 410 continuation proxy access one or more particular devices protection part and module is presented in one or more services
Stopping notice, the service present module presentation has completed it is one or more service (for example, public lavatory searcher take
Business) and one or more protections of particular device (for example, smart phone) are accessed partially (for example, GPS location biography using maintenance
Sensor) notice.
Referring again to Fig. 9 A, operation 606 may include operation 912, which depicts shows on a particular device
It is completed one or more services and application maintains to access the notice of one or more protection parts of particular device.For example,
Fig. 4, for example, Fig. 4 A, shows 412 and protected by the continuation proxy access one or more particular device that particular device module is shown
The visual notification of the stopping of shield part and one or more services, the particular device module is in particular device (for example, plate is set
It is standby) on show completed one or more services (for example, picture classification is at directory service) and application maintain access it is specific
The notice of one or more protection parts (for example, image data of picture) of equipment (for example, tablet device).
Referring now to Fig. 9 A, operation 912 may include operation 914, which depicts on the screen of particular device
Display shows to have completed one or more services and application maintains to access one or more protection parts of particular device
Icon.For example, Fig. 4, for example, Fig. 4 A, show continuation proxy access one that 414 are shown by particular device screen module or
The notification icon of the stopping of multiple particular device protections part and one or more services, the particular device screen module is in spy
It is shown on the screen of locking equipment (for example, tablet device) and has completed one or more services (for example, being designed to based on equipment
The music and device location of broadcasting find the service of concert in the region of user) and application maintenance access particular device
One or more protection parts of (for example, tablet device) are (for example, the list of the song of storage on a user device, Yi Jishe
The broadcasting frequency of standby tracking) icon.
Referring now to Fig. 9 B, operation 606 may include operation 916, which depicts presentation and maintain access is specific to set
The list of the one or more applications of standby one or more protection parts and show one or more application which
Complete one or more services.For example, Fig. 4, for example, Fig. 4 B, shows 416 continuation proxy access one or more particular devices
It protects the list of one or more agencies of part and stops one or more agencies that module is presented in one or more services
One or more one or more indicators, which, which is presented module and presents, maintains access particular device (for example, plate is set
It is standby) one or more protection parts (for example, picture database) one or more applications (for example, picture enhancing service (example
Such as, go to see red) and the service of picture face recognition) list and show one or more application which completed it is a kind of or
A variety of services (for example, enhance one or more pictures and execute face recognition on one or more pictures).
Referring again to Fig. 9 B, operation 606 may include operation 918, which depicts generation and maintain access is specific to set
The report of the one or more application of standby one or more protection parts, wherein report shows to apply whether access specific set
Standby one or more protection parts are to execute one or more services.For example, Fig. 4, for example, Fig. 4 B, show 418 descriptions after
Continuous proxy access one or more particular device protects the report of part and shows whether one or more services have stopped
The report of module is obtained, which generates one or more of maintenance access particular device (for example, cellular handset of user)
The report of the one or more application (for example, contact person's positioning service) of a protection part (for example, equipment contacts list),
Middle report, which is shown, applies the one or more protection parts (example for whether accessing particular device (for example, cellular handset of user)
Such as, equipment contacts list) to execute one or more services (for example, whether anyone in identification contacts list be in spy
Positioning is set).
Referring again to Fig. 9 B, operation 606 may include operation 920, which depicts instruction particular device to equipment
User show to have completed one or more services and application maintains one or more protection parts of access particular device.
For example, Fig. 4, for example, Fig. 4 B, shows 420 instruction particular devices and presents and continue proxy access one or more particular device guarantor
The indicator of the stopping of shield part and one or more service modules, service module instruction (for example, providing instruction, or are set
Set identifier, or lead to one or more subprograms or hardware component activation and/or execution) user's table from particular device to equipment
It is bright completed one or more services (for example, music classifier service) and application maintain access one of particular device or
The information of multiple protection parts.
Referring again to Fig. 9 B, operation 606 may include operation 922, which depicts the presentation of change application with table
Bright application maintains one or more protection parts of access particular device.For example, Fig. 4, for example, Fig. 4 B, showed for 422 change generations
Reason is presented to show to continue stopping for proxy access one or more particular device protection part and one or more service module
Only, the service module change application (for example, make selection gray alternatively, or icon hovering when change text color,
Or on touch screen, when selecting to provide touch feedback when application) presentation (for example, change to user appearance) to show using dimension
Hold one or more protection parts of access particular device (for example, tablet device).
Referring again to Fig. 9 B, operation 922 may include operation 924, and it is related to application is executed which depicts change
Icon color to show using the one or more protection parts for maintaining access equipment.For example, Fig. 4, for example, Fig. 4 B, shows
The vision for having gone out 424 change agencies is presented to show to continue proxy access one or more particular device protection part and one
Or the stopping of multiple service modules, the service module change icon relevant to application (for example, self-driving travel intended services) are executed
Color to show using the one or more protection parts for maintaining access equipment (for example, smart phone).
Referring again to Fig. 9 B, operation 922 may include operation 926, which depicts the execution of configuration application to want
One or more additional steps are sought to show to user using the one or more protection parts for maintaining access equipment.Example
Such as, Fig. 4, for example, Fig. 4 B, shows the one or more steps that 426 changes will execute for user to select agency to table
The bright stopping for continuing proxy access one or more particular device protection part and one or more service modules, the service mould
The execution of block configuration application (for example, the application for executing the service of picture face recognition) is to require one or more additional steps
(for example, the dialog box for clicking additional " determining that you want to run this application ") is to show that access is specific to be set using maintaining to user
One or more protection parts of standby (for example, tablet device).
Referring again to Fig. 9 B, operation 926 may include operation 928, which depicts the execution of configuration application to want
User is asked to interact the additional time with particular device to activate using to show to user using maintenance access particular device
One or more protection parts.For example, Fig. 4, for example, Fig. 4 B, shows 428 increases and requires one performed by the user or more
A step is partially and one or more to show to continue the protection of proxy access one or more particular device to select agency
The stopping of service module, the execution of service module configuration application is to require user to interact additional time (example with particular device
Such as, again tap on, or on touch screen with finger drag pattern) so as to activate application (for example, motion tracker application) to
Show to user using the one or more protection parts for maintaining access particular device.
Referring again to Fig. 9 B, operation 606 may include operation 930, which depicts to change in operating system and represent
The relative position of one or more icons of application is to show to have completed one or more services and application maintenance access
One or more protection parts of particular device.For example, Fig. 4, for example, Fig. 4 B, shows 430 changes to show to continue agency and visit
Ask that the agency of the stopping of one or more particular device protections part and one or more service modules is presented on operating system
Interior relative position, the service module change relative position (example of the one or more icons for representing application in operating system
Such as, different window or menu or dedicated menu are moved to) to show to have completed one or more services and apply
Maintain one or more protection parts of access particular device (for example, tablet device).
Figure 10 A-10D depicts the various embodiments of operation 608 according to the embodiment, which depicts promotion
Using the presentation for the option for stopping the access to one or more protection parts of particular device.Referring now to Figure 10 A, operation
608 may include operation 1002, which depicts instruction particular device to present using stopping to the one of particular device
The option of the access of a or multiple protections part.For example, Fig. 5, for example, Fig. 5 A, shows 502 stopping proxy access one or more
The presentation of the option of a particular device protection equipment component indicating module, the particular device protect equipment component indicating module
Indicate that particular device (for example, Smartphone device) stops so that application (for example, looking for friend's tracker) is presented to particular device (example
Such as, Smartphone device) one or more protection parts (for example, being locally stored on cell phone apparatus or extensive from server
Multiple Facebook list of friends) access option.
Referring again to Figure 10 A, operation 1002 may include operation 1004, the operation 1004 depict instruction particular device with
The option that instruction particular device stops one or more protection parts access of the application to particular device is presented.For example, Fig. 5, example
Such as, Fig. 5 A shows 504 and is used to indicate the module of particular device to stop agency to one or more particular devices and protect part
The presentation of the option of the access of equipment indicating module, the particular device protect equipment component indicating module to indicate particular device
(for example, notebook computing device) is set so that instruction particular device (for example, notebook computing device) stopping application being presented to specific
The option of standby one or more protection part (for example, camera) access.
Referring again to Figure 10 A, operation 1004 may include operation 1006, which indicates that particular device is visited to control
It asks that a part of the particular device of one or more protection parts of particular device is presented and stops the one of application access particular device
The optional option of the user for equipment of a or multiple protections part.For example, Fig. 5, for example, Fig. 5 A, shows 506 for referring to
Show that the module of particular device stops proxy access one or more particular device and protects the user of equipment component indicating module optional
Optional option, particular device protection equipment component indicating module instruction particular device is presented instruction control access and specific sets
A part of the particular device of standby one or more protection parts (for example, alignment sensor) is specific to which application stops access
The option that the user for equipment of one or more protection parts of equipment (for example, smart phone) selects.
Referring again to Figure 10 A, operation 608 may include operation 1008, which depicts presentation and stop application visit
Ask the option of one or more protection parts of particular device.For example, Fig. 5, for example, Fig. 5 A, shows 508 stopping proxy access
The option of module is presented in one or more particular device protections part, and it is special that module instruction is presented in particular device protection part
One or more that application (for example, calorie tracking application) stops access particular device (for example, tablet device) is presented in locking equipment
The option of a protection part.
Referring again to Figure 10 A, operation 1008 may include operation 1010, which depicts specific to control access
One or more of stopping application access particular device is presented in a part of the particular device of one or more protection parts of equipment
The option of a protection part.For example, Fig. 5, for example, Fig. 5 A, shows the 510 protection part access for being presented to particular device module
The option of the stopping proxy access one or more particular device of control section, the particular device module are special to control access
One or more protection parts of locking equipment (for example, device operating system or device core layer or device hardware interface layer)
A part of particular device is presented application (for example, speech synthesizer) stops access particular device (for example, smart phone) one
The option of a or multiple protections part.
Referring now to Figure 10 B, operation 608 may include operation 1012, which depicts promotion and complete one kind
Or stops one or more parts of application access particular device after a variety of services and can configure by the user of particular device
The presentation of setting.For example, Fig. 5, for example, Fig. 5 B, shows 512 indicating equipment stoppings proxy access one for user setting
Or multiple particular device protections part promotes the presentation of the option of module, particular device protection part promotes module to promote
One or more services are completed (for example, closing in 5 prime ministers that the estimation user found according to the playlist of user may like
Song) stop accessing particular device (for example, making playlist part by oneself) later using (for example, relevant musical finds service)
The setting (for example, menu setting that the operating system of equipment promotes) that the user of the equipment of one or more parts can configure is in
It is existing.
Referring again to Figure 10 B, operation 608 may include operation 1014, which depicts promotion and complete one kind
Or the user by particular device of one or more parts of stopping application access particular device answers in operation after a variety of services
With the presentation of setting configurable before.For example, Fig. 5, for example, Fig. 5 B, show 514 before agent operation indicating equipment stop
Only proxy access one or more particular device protection part promotes the presentation of the option of the user setting of module, this is specific
Equipment protection part promotes module to promote to stop after completing one or more services using (for example, the service of picture face recognition)
One or more protection parts of particular device (for example, computer, smart phone or tablet device) are only accessed (for example, image
Acquire sensor) equipment (for example, control access sensors, for example, the physics of image acquiring sensor or alignment sensor is opened
Close, for example, soft key or hard wired buttons, switch, key, knob etc.) the setting that can configure before operation application of user be in
It is existing.
Referring again to Figure 10 B, operation 608 may include operation 1016, which depicts promotion and complete one kind
Or the user by particular device of one or more parts of stopping application access particular device sets specific after a variety of services
The standby upper presentation for receiving the setting that can configure before application.For example, Fig. 5, for example, Fig. 5 B, shows 516 before agency obtains
Indicating equipment stops the option of the user setting of proxy access one or more particular device protection part promotion module
It presents, particular device protection part promotes module to promote after completing one or more services (for example, friend is looked for service)
Using the particular device (for example, tablet device) for the one or more parts for stopping access particular device (for example, tablet device)
The presentation of setting (for example, the broadcast box checked on " user option " screen of device operating system) that can configure of user.
Referring again to Figure 10 B, operation 608 may include operation 1018, which depicts promotion to particular device
User the options that application stops one or more protection parts of access particular device are presented.For example, Fig. 5, for example, Fig. 5 B,
It shows 518 and is presented to entity relevant to particular device and stop proxy access one or more particular device protection part promotion
The option of module, the particular device protect part that module is promoted to promote (to help allowed or complete presentation for example, executing
One or more operation) present to the user of particular device (for example, smart phone) (such as by vision and non-vision section
Any combination is shown) using one of (for example, mileage tracking application of riding) stopping access particular device (for example, smart phone)
Or the option of multiple protection parts.
Referring now to Figure 10 C, operation 608 may include operation 1020, which depicts special using access is stopped
The display of the optional option of one or more protection parts of locking equipment.For example, Fig. 5, for example, Fig. 5 C, showed for 520 stopping generations
Reason accesses the optional option of one or more particular device protection part display modules, which protects part display module
Display application (for example, running mileage tracker) stopping access particular device (for example, wearable intelligent clothing, for example, can chase after
Socks that track mileage and/or detection bubble are formed to) one or more protection parts (for example, alignment sensor)
Optional option (for example, saying phrase " you want to stop access " to user by loudspeaker, and waits user to pass through microphone
It responds).
Referring again to Figure 10 C, operation 608 may include operation 1022, which, which depicts, is receiving stopping access
Using the one or more protection parts for stopping access particular device when the selection of option.For example, Fig. 5, for example, Fig. 5 C, shows
522 proxy access one or more particular devices protect portion ends modules, and particular device protection portion ends module exists
Stop application (for example, blood glucose level monitor application) when receiving the selection for stopping Access Options to particular device (for example, using belt
Blood/sweat the sampler for the probe that bundle connect physically and with smart phone) one or more parts of protecting
Access.
Referring again to Figure 10 C, operation 1020 may include operation 1024, which depicts display and stop more than one
The optional choosing of one or more protection parts of a application (application including executing one or more services) access particular device
?.For example, Fig. 5, for example, Fig. 5 C, shows the multiple agencies of 524 stoppings (including agency) and accesses one or more particular devices guarantors
The optional option of shield part display module, the more than one application of particular device protection part display module display stopping (including
Execute the application of one or more services (for example, ATM finds service)) particular device is accessed (for example, the ATM that bank provides connects
Jaws equipment) one or more protection parts (for example, bank account information) optional options (for example, display has text " you
Want stop access, Yes/No " dialog box).
Referring again to Figure 10 C, operation 1022 may include operation 1026, which, which depicts, is receiving stopping access
Stop including the access using class to one or more protection parts of particular device applied when the selection of option.For example, figure
5, for example, Fig. 5 C, the class for showing one or more agencies that 526 include agency protects part to one or more particular devices
The access of module is terminated, it includes answering which, which protects portion ends module to stop when receiving the selection for stopping Access Options,
Application class is (for example, all applications of manufacture " Apple company " or " weight-reducing used is applied " or " had more than 50Mb's
Using " or " all applications that user is appointed as 5 level securities level " or " device manufacturer is appointed as the institute of 5 level securities level
Have application " or all applications of alignment sensor " access " or " all applications of access equipment contacts list " or " most
All applications obtained in 50 days afterwards " etc.) access particular device one or more protection parts.
Referring again to Figure 10 C, operation 1022 may include operation 1028, which, which depicts, is receiving stopping application
Stop all applications pair present on particular device when accessing the selection of the option of one or more protection parts of particular device
The access of one or more protection parts of particular device.For example, Fig. 5, for example, Fig. 5 C, shows 528 one or more agencies
Each access one or more particular device protect portion ends module, the particular device protection portion ends module receiving
The selection of option is to stop particular device (example when stopping application access (for example, access protection part, for example, alignment sensor)
Such as, tablet device) present on all application access particular devices (for example, tablet device) one or more protection parts
(for example, alignment sensor).
Referring again to Figure 10 C, operation 608 may include operation 1030, which depicts promotion presentation disabling and answer
Option protects parts to stop accessing the one or more of particular device.For example, Fig. 5, for example, Fig. 5 C, shows 530
Being presented by the option that disabling agency promotes module to stop proxy access one or more particular device protection part is in
It is existing, the agency promote module promote (for example, executing one or more operations that auxiliary executes or complete to present) present (for example,
Showed by any combination of vision and non-vision interface) it disables (for example, preventing the component of user or another application or equipment
Operated) application (for example, 4G network speed measurement application) to stop accessing particular device (for example, augmented reality glasses) one
The option of a or multiple protection parts (for example, 4G radio).
Referring again to Figure 10 C, operation 608 may include operation 1032, which depicts promotion presentation removal and answer
Option protects parts to stop accessing the one or more of particular device.For example, Fig. 5, for example, Fig. 5 C, shows 532
It is in for act on behalf of the option for promoting module stopping proxy access one or more particular device to protect part by removal
It is existing, the agency promote module promote (for example, executing one or more operations that auxiliary executes or complete to present) present (for example,
Showed by any combination of vision and non-vision interface) removal application (for example, from memory removal application, or removal storage
One or more links and/or pointer in device to application site) to stop accessing particular device (for example, smart phone)
The option of one or more protection part (for example, loudspeaker output).
Referring again to Figure 10 D, operation 608 may include operation 1034, which depicts promotion presentation and be implemented with
Close the option of one or more limitations of one or more protection parts of application access particular device.For example, Fig. 5, for example, figure
5D shows the 534 optional choosings for promoting the limitation of module for establishing proxy access one or more particular device protection part
The presentation of item, particular device protection part promote module to promote (for example, execution auxiliary executes or complete one or more presented
A operation) the related application of (for example, showing by any combination of vision and non-vision interface) implementation is presented (for example, farm is counted
Draw application) one or more protection parts of particular device (for example, smart phone) are accessed (for example, serving as the figure of optical sensor
As acquisition sensor) one or more limitations (for example, limitation, condition, reduction, regulations etc.) options.
Referring again to Figure 10 D, operation 1034 may include operation 1036, which depicts when using trial access
One or more protection portion timesharing of particular device promote that the one or more protection portion for requiring authorization access particular device are presented
The option divided.For example, Fig. 5, for example, Fig. 5 D, it is one or more special for requiring express authorization to rebuild proxy access to show 536
Locking equipment protection part promote module option presentation, the particular device protection part promote module when using (for example,
Garden planning application) it attempts to access one or more protection portion timesharing promotion (example of particular device (for example, household weather station)
Such as, one or more operations that auxiliary executes or auxiliary completion is presented are executed) it requires to authorize access (for example, leading to level of access
Change to the horizontal operation for allowing to access) one or more protection parts (example of particular device (for example, household weather station)
Such as, barometer) option presentation (for example, being showed by any combination of vision and non-vision interface).
Referring again to Figure 10 D, operation 1034 may include operation 1038, which, which depicts promotion and present to limit, permits
Perhaps the option of the number of one or more protection parts of application access particular device.For example, Fig. 5, for example, Fig. 5 D, shows
538 for be arranged allow to act on behalf of rebuild access one or more particular devices protection part promote module number limit it is optional
The presentation of option, particular device protection part promote module to promote (for example, execution auxiliary executes or auxiliary completes the one of presentation
A or multiple operations) present (such as show by any combination in vision and non-vision section) limitation permission application access it is specific
The option of the number of one or more protection parts of equipment (for example, tablet device).
Referring again to Figure 10 D, operation 1038 may include operation 1040, which depicts promotion presentation and be limited in
Allow the option of the number of one or more protection parts of application access particular device during special time period.For example, Fig. 5,
For example, Fig. 5 D, show 540 for be arranged allow the agency during special time period to rebuild to one or more particular devices guarantor
Shield part promotes the presentation of the option of the number limitation of the access of module, and particular device protection part promotes module to promote
(executing or assist to complete the one or more operations presented for example, executing auxiliary) presentation (such as pass through vision and non-vision section
Any combination in face is shown) be limited in special time period during (for example, during the period that user is appointed as practice periods) permit
Perhaps using one or more protection parts of (for example, motion tracker) access particular device (for example, the caloric burn of storage
Data) number option.
Referring again to Figure 10 D, operation 1034 may include operation 1042, and it is related fair which depicts promotion setting
Perhaps when application accesses the presentation of the option of one or more conditions of one or more protection parts of particular device.For example,
Fig. 5, for example, Fig. 5 D, shows 542 foundation and protect part to promote mould one or more particular devices for allowing to rebuild agency
The presentation of the option of the prerequisite of the access of block, particular device protection part promote module to promote (for example, executing auxiliary
The one or more operations for helping execution or auxiliary to complete to present) it presents (for example, passing through any combination of vision and non-vision interface
Show) it is arranged in relation to allowing to apply the one or more protections for when accessing particular device (for example, cellular smart cell phone apparatus)
Partially (for example, position data) one or more conditions (for example, only when equipment is traveled beyond 30 miles per hours per hour, for example,
Show equipment on the rolling stock, position data could be accessed) option.
Referring again to Figure 10 D, operation 1042 may include operation 1044, which depicts promotion limitation when specific
Equipment allows the presentation of the option of the number of one or more protection parts of application access particular device when being located at specific position.
For example, Fig. 5, for example, Fig. 5 D, show 544 for establish for allowing reconstruction specific position as proxy access one or more
A particular device protection part promotes the presentation of the option of the prerequisite of module, and particular device protection part promotes mould
Block promotes (auxiliary executes or auxiliary completes the one or more operations presented for example, executing) to present (for example, by vision and non-
Any combination of visual interface shows) limitation allow when particular device is located at specific position (for example, Times Square) apply (example
Such as, open wireless network detector) particular device is accessed (for example, Portable thermal point device or the honeycomb with Wi-Fi broadcast
Cell phone apparatus) one or more protection parts (for example, radio broadcasting) numbers options.
Referring again to Figure 10 D, operation 608 may include operation 1046, which depicts promotion and application is required to make
The data anonymous separately won from one or more protection portion of particular device is to maintain the one or more to particular device
Protect the presentation of the option of the access of part.For example, Fig. 5, for example, Fig. 5 D, show 546 for require for continuing agency's visit
Ask the presentation that one or more particular device protections part promotes the option of the data anonymous of module, which protects
Shield part promote module promote present (for example, take one or more steps (for example, operation, subprogram, physical change etc.) with
Auxiliary executes) require application to make one or more protection parts from particular device (for example, smart phone) (for example, positioning passes
Sensor data) data anonymous (for example, fuzzy, removal, source of change data etc.) that obtains so as to maintain access (for example,
In the case where not anonymization, access can be interrupted) options of one or more protection parts of particular device.
Although having illustrated and having described the particular aspects of theme as described herein, it will be understood by the skilled person that
It, can be into the case where not departing from theme as described herein and its broad range it is readily apparent that according to the teaching of this article
Row change and modification, thus the appended claims will cover within its scope the true spirit that falls into theme as described herein and
All such changes and modifications in range.It will be understood by those skilled in the art that be, it is however generally that, term as described herein,
And the term especially in the appended claims (for example, main body of the appended claims) is generally intended to become " open
(for example, term " includes " should be understood to " including, but are not limited to ", term " having " should be understood to " at least have formula " term
Have ", term "comprising" should be understood to " including but not limited to " etc.).
Those skilled in the art will further appreciate that, if the claim statement of certain amount of introducing is intentional
Figure, then it is such to be intended to clearly state in the claims, and when this statement is not present, just there is no this
It is intended to.For example, following appended claims may include using leading question "at least one" and " one in order to help to understand
Or multiple " to introduce claim statement.However, should not be managed using this phraseSolution is at imply notDefinite article "one"
Or the claim statement that "an" introduces limits any specific rights requirement stated comprising the claim of this introducing
Only include a this statement for claims, in addition when same claim include guidance phrase " one or more " or
(for example, "one" and/or "an" should usually manage when the indefinite article of "at least one" and, for example, "one" or "an"
Solution is at "at least one" or " one or more ");For the definite article for introducing claim statement using same.
In addition, even if the particular number of the claim statement of introducing is clearly described, it will be appreciated by those skilled in the art that this table
The quantity that usually should be understood to mean at least to state is stated (for example, the blunt statement of " two statements ", is modified in no other
In the case where language, at least two statements or two or more statements are generally meant that).
In addition, when use is similar to these of the agreement of " at least one of A, B and C etc. ", general this knot
Structure be it will be understood by those skilled in the art that agreement the meaning (for example, " with A, B and C the system of at least one " can wrap
Include but unlimited: only the system of A, the system of only B, the system of only C, have A and B system together, have A and C together be
Unite, have B and C system together and/or have the system of A, B and C together etc.).Using similar to " at least one in A, B or C etc.
It is a " agreement these in the case of, general this structure be it will be understood by those skilled in the art that agreement the meaning (for example, " tool
Have the system of at least one of A, B or C " it can include but is not limited to: the system for there was only A, the system for there was only B, only C's is
It unites, has A and B system together, there is A and C system together, having B and C system together and/or have the system of A, B and C together
Deng).Those skilled in the art will further appreciate that, in general, indicate two or more options any separation word and/
Or word (either in specification, claims or attached drawing) be to be understood as consider include one of item including
Any one or a possibility that including two items, opposite situation unless the context.For example, the phrase of " A or B " is usual
A possibility that being understood as that including " A " or " B " or " A and B ".
For the appended claims, it will be understood by those skilled in the art that, the operation stated herein generally can be with
It executes in any order.In addition, while in accordance with multiple operating processes are sequentially provided it should be appreciated that Duo Gecao
Make to execute according to other sequences in addition to the sequence of explanation, or may be performed simultaneously.The reality of the sequence of this substitution
Example may include be overlapped, interlocks, interrupts, reordering, increasing, preparing, supplementing, synchronizing, reversely or other different sequences, unless
Context is otherwise indicated.In addition, being not intended to exclude this as " response ", " being related to " or the adjectival term of other past tenses
Kind variant, unless context is otherwise indicated.
The application is referred to one or more trade marks, for example, used by a manufacturer or whole seller and for making
Text, letter, symbol or the equipment of his or her product discrimination and/or the product for being different from other people.Trade mark used herein
Title with such language to be illustrated: that is, understanding their identity, they are different to common description noun, having
Fixed and specific meaning, or in many (if not all) situations, with other for the term for not including using trade mark
Special mark.In addition, brand name used herein has known and definition meaning in document, but it is not related to that it is needed to know
Know one or more business secrets so as to predict they meaning product or compound.What is referred in the present specification is all
Trade mark is the property of each owner, and the appearance of trade marks one or more in the present specification will not reduce or with
Other modes negatively affect the validity of one or more trade marks.The registration occurred in the present specification or unregistered institute
Having trade mark to be assumed includes suitable trade mark, for example, the R of zone circle or bracketed capitalization (for example, [brand name]),
Even if these trade marks do not occur by trade mark clearly.As long as referring to product or side using trade mark with describing mode
Method, the trade mark just should be understood to represent the corresponding product or method from the date for submitting this patent application.
In this description, can be used term " in embodiment ", " in one embodiment ", " in some embodiments
In ", " in several embodiments ", " at least one embodiment ", " in various embodiments " etc..These each terms and
All these similar terms should be understood to " at least one embodiment, thereby increases and it is possible to but may not be in all embodiments ", unless separately
It clearly states outside.In particular, unless explicitly stated otherwise, as the purpose of these phrases is to provide embodiments of the present invention
Non-exclusive and non-limiting example.One, some or many embodiments include one or more things or have one or more
The pure statement of a feature does not imply that all embodiments include one or more things or have one or more features, still
Do not imply that these embodiments there must be yet.It only refers only to example and should not otherwise understand, unless bright in this way
True explanation.
Claims (41)
1. a kind of equipment for data service comprising:
It is configured to obtain and related is configured to provide one or more services and selectively access is one or more specific sets
The acquisition module of the data of the agency of standby protection part;
The stopping and the agency for being configured to detect one or more services that the agency provides continue access one or
The detection module of multiple particular device protections part;
Be configured to present continuation proxy access one or more particular device protection part that the agency provides and it is a kind of or
The presentation module of the indicator of the stopping of a variety of services;And
It is configured to promote the presentation of the option for stopping proxy access one or more of particular device protections part
Promotion module.
2. equipment according to claim 1, wherein being configured to obtain in relation to being configured to provide one or more services simultaneously
And the acquisition module for selectively accessing the data of the agency of one or more particular device protections part includes:
It is configured to obtain and requires to access the one or more of one or more particular device protections part in relation to being configured to provide
Service and selectively access the acquisition module of the data of the agency of one or more of particular device protections part.
3. equipment according to claim 1, wherein being configured to obtain in relation to being configured to provide one or more services simultaneously
And the acquisition module for selectively accessing the data of the agency of one or more particular device protections part includes:
It is configured to obtain to be obtained about by the scanning particular device module and is configured to provide one or more services simultaneously
And selectively access the acquisition module of the data of the agency of one or more particular device protections part.
4. equipment according to claim 1, wherein being configured to obtain in relation to being configured to provide one or more services simultaneously
And the acquisition module for selectively accessing the data of the agency of one or more particular device protections part includes:
It is configured to obtain one or more transmission prisons by arriving and/or protecting from one or more of particular devices part
The related of survey is configured to provide one or more services and selectively accesses one or more particular devices protections part
Agency data acquisition module.
5. equipment according to claim 1, wherein being configured to obtain described in relation to being configured to provide one or more clothes
It is engaged in and selectively the acquisition module of the data of the agency of access one or more particular devices protections part includes:
Be configured to obtain from one or more particular device logs it is related be configured to provide one or more services and
Selectively access the acquisition module of the data of the agency of one or more particular device protections part.
6. equipment according to claim 1, wherein being configured to detect stopping for one or more services of agency's offer
The detection module for only continuing to access one or more of particular devices protections part with the agency includes:
It is configured to detect the agency and has terminated the activity for being related to executing one or more services and after termination activity
Continue to access the detection module of the detectable indicator of one or more particular devices protections part.
7. equipment according to claim 6, wherein being configured to detect the agency and terminated to be related to executing one kind or more
The activity of kind service and described can detect for continuing to access one or more particular devices protections part after termination activity
The detection module of indicator includes:
It is configured to detect the agency to have terminated the activity for being related to executing one or more services and at least partly made
Continue to access one or more particular device protections part after the termination activity for the report detection issued with the particular device
Detectable indicator detection module.
8. equipment according to claim 6, wherein being configured to detect the agency and terminated to be related to executing one kind or more
The activity of kind service and described can detect for continuing to access one or more particular devices protections part after termination activity
The detection module of indicator includes:
It is configured to detect the agency and has terminated the activity for being related to executing one or more services and by described in analysis
One or more particular devices protect the termination activity of the data-flow detection of part to continue later, and access one or more is specific to be set
The detection module of the detectable indicator of standby protection part.
9. equipment according to claim 6, wherein being configured to detect the agency and terminated to be related to executing one kind or more
The activity of kind service and described can detect for continuing to access one or more particular devices protections part after termination activity
The detection module of indicator includes:
It is configured to detect the agency to have terminated the activity for being related to executing one or more services and at least partly made
Continue to visit after termination activity with the report detection of the monitor agent publication of one or more of particular devices protection part
Ask the detection module of the detectable indicator of one or more particular device protections part.
10. equipment according to claim 9 is related to executing one or more clothes wherein being configured to detection agency and having terminated
The activity of business and at least partly using one or more of particular devices protection part monitor agent publication report
The termination activity for accusing detection continues to access the inspection of the detectable indicator of one or more particular devices protections part later
Surveying module includes:
It is configured to detect the agency to have terminated the activity for being related to executing one or more services and at least partly made
With the termination activity of the report detection of the monitor agent publication based on kernel of one or more of particular devices protection part
Continue to access the detection module of the detectable indicator of one or more particular devices protections part later.
11. equipment according to claim 1, wherein being configured to detect one or more services that the agency provides
Stopping and the agency continue to access the detection module of one or more of particular devices protections part and include:
It is configured to receive the receiving module of the notice of the stopping for one or more services that the agency provides;And
It is configured to receive the receiving module acted on behalf of and continue to access the notice of one or more of particular devices protections part.
12. equipment according to claim 11, wherein being configured to receive one or more clothes that the agency provides
The receiving module of the notice of the stopping of business includes:
It is configured to receive the receiving module of the notice from the stopping for acting on behalf of received one or more services.
13. equipment according to claim 11, wherein be configured to receive the agency continue to access it is one or more of
The receiving module of notice of particular device protection part includes:
Be configured to receive continue to access from point received agency of one or more of particular device protection portion it is one or more
The receiving module of the notice of a particular device protection part.
14. equipment according to claim 1, wherein being configured to detect one or more services that the agency provides
The stopping and the agency continue to access the detection module of one or more of particular devices protections part and include:
Terminate one that is configured to detect and be taken by least part that the agency executes one or more services
Or the termination of one or more agent operation detection modules of the termination of multiple operations;And
Access is configured to detect the agency and has prevented to access the stopping of one or more of particular device protections part
One or more particular device protection portion divide detection module stopping agency prevention.
15. equipment according to claim 1, wherein being configured to detect one or more services that the agency provides
The stopping and the agency continue to access the detection module of one or more of particular devices protections part and include:
It is configured to obtain the acquisition module of the indicator of agency's stopping of one or more services;And
It is configured to obtain the acquisition module for acting on behalf of the indicator for continuing to access one or more particular devices protections part.
16. equipment according to claim 15, wherein being configured to obtain the agency, to continue access one or more specific
The acquisition module of the indicator that equipment protection part obtains module includes:
It is configured to obtain and continues to visit by the agency that the one or more of particular device protection portion of monitoring trial access are separately won
Ask the acquisition module of the indicator of one or more particular device protections part.
17. equipment according to claim 15, wherein being configured to obtain the agency, to continue access one or more specific
The acquisition module of the indicator of equipment protection part includes:
It is configured to obtain and continues to access one or more particular device protection portion by executing the agency that Agent Analysis module obtains
The acquisition module of the indicator divided.
18. equipment according to claim 1, wherein being configured to detect the institute for one or more services that the agency provides
Stating the detection module for stopping continuing to access one or more of particular devices protections part with the agency includes:
It is configured to detect the stopping of the agency of one or more services and continues the one or more spies of proxy access
The detection module of locking equipment protection part.
19. equipment according to claim 1, wherein being configured to detect the institute for one or more services that the agency provides
Stating the detection module for stopping continuing to access one or more of particular devices protections part with the agency includes:
It is one or more that the notice based on agency and agency for being configured to receive the stopping of one or more services continue access
Particular device protects the receiving module of the notice of part.
20. equipment according to claim 19, wherein being configured to receive the described of the stopping of one or more services
The receiving module that notice and agency based on agency continue to access the notice of one or more particular devices protections part includes:
The notice and agency based on agency for being configured to receive the stopping of one or more services continues access one
The receiving module of the notice based on particular device protection part of a or multiple particular device protections part.
21. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or
Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is configured to present and be protected to the continuation proxy access one or more particular device that the entity for being related to the particular device is presented
The presentation module of the indicator for the stopping that shield part and one or more services are presented.
22. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or
Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is configured to present and continues proxy access one or more particular device protection part and one or more services
The presentation module of the notice of stopping.
23. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or
Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is configured to show the continuation proxy access one or more particular device protection part and one shown by particular device
The display module of the visual notification of the stopping of kind or a variety of services.
24. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or
Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is configured to the list in the one or more agencies for having continued proxy access one or more particular device protection part
And stopped one or more one or more indicators of one or more agencies of one or more services
Module is presented.
25. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or
Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is configured to obtain description and continues the report of proxy access one or more particular device protection part and show described one
Kind or a variety of acquisition modules for servicing the report whether stopped.
26. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or
Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
It is partially and described to be configured to indicate that continuation proxy access one or more particular device protection is presented in the particular device
The indicating module of the indicator of the stopping of one or more services.
27. equipment according to claim 1, wherein be configured to present continuation proxy access one that the agency provides or
Multiple particular device protections are partially and the presentation module of the indicator of the stopping of one or more services includes:
Change agency is configured to present to show to continue proxy access one or more particular device protection part and described one
The change module of the stopping of kind or a variety of services.
28. equipment according to claim 27 is presented wherein being configured to change agency to show to continue proxy access one
Or multiple particular devices are protected partially and the change module of the stopping of one or more services includes:
The one or more steps that change will execute for user is configured to show to continue proxy access one to select agency
The change module of the stopping of a or multiple particular device protections part and one or more services.
29. equipment according to claim 28, wherein being configured to the one or more steps that change will execute for user
With selection agency to show to continue proxy access one or more particular device protection part and one or more clothes
The change module of the stopping of business includes:
It is configured to increase and requires to be shown to continue to act on behalf of and be visited to select agency by the one or more steps that the user executes
Ask the increase module of the stopping of one or more particular device protections part and one or more services.
30. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets
The promotion module of the presentation for the option that standby protection part promotes includes:
It is configured to indicate that setting for the presentation for the option for stopping proxy access one or more of particular device protections part
Standby indicating module.
31. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets
The promotion module of the presentation of the option of standby protection part includes:
It is configured to that the presentation module for the option for stopping proxy access one or more particular device protection part is presented.
32. equipment according to claim 1, wherein being configured to stop the one or more of particular devices guarantors of proxy access
The promotion module of presentation for the option for protecting part includes:
It is configured to promote to indicate the user setting of equipment stopping proxy access one or more particular device protection part
The promotion module of the presentation of option.
33. equipment according to claim 32, wherein be configured to promote to indicate the equipment stop proxy access one or
The promotion module of the presentation of the option of the user setting of multiple particular devices protection part includes:
It is configured to promote to indicate that the equipment stops proxy access one or more particular device protection portion before agent operation
The promotion module of the presentation of the option for the user setting divided.
34. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets
The promotion module of the presentation of the option of standby protection part includes:
It is configured to promote to present to entity relevant to the particular device to stop proxy access one or more particular device guarantor
Protect the promotion module of the presentation of the option of part.
35. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets
The promotion module of the presentation of the option of standby protection part includes:
It is configured to the display module that display stops the optional option of proxy access one or more of particular device protections part;
And
It is configured to terminate the termination module of proxy access one or more particular device protection part.
36. equipment according to claim 35, wherein being configured to access one or more of particular device protections part
The termination module of the agency include:
It is configured to terminate the termination of each of one or more agencies for accessing one or more of particular device protections part
Module.
37. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets
The promotion module of the presentation of the option of standby protection part includes:
It is configured to promote the option of the limitation for establishing proxy access one or more of particular device protections part
Presentation promotion module.
38. the equipment according to claim 37, wherein be configured to promote it is described for establish proxy access it is one or
The promotion module of the presentation of the option of the limitation of multiple particular devices protection part includes:
It is configured to promote to allow the agency to rebuild time for accessing one or more of particular devices and protecting part for being arranged
The promotion module of the presentation of the option of number limitation.
39. the equipment according to claim 37, wherein being configured to promote one or more of for establishing proxy access
The promotion module of presentation of the option of the limitation of particular device protection part includes:
It is configured to promote to establish the prerequisite item for allowing to rebuild proxy access one or more of particular device protections part
The promotion module of the presentation of the option of part.
40. equipment according to claim 1, wherein being configured to promote to stop that proxy access is one or more of specific sets
The promotion module of the presentation of the option of standby protection part includes:
It is configured to promote to require appointing for the data anonymous for continuing proxy access one or more particular device protection part
The promotion module of the presentation of option.
41. a kind of equipment for data service comprising:
One or more universal integrated circuits are configured to receive instruction to be configured to obtain in one or more first specific times
Module is obtained, the acquisition module is configured to obtain in relation to being configured to provide one or more services and selectively accessing one
The data of the agency of a or multiple particular device protections part:
One or more universal integrated circuits are configured to receive instruction to be configured to examine in one or more second specific times
Module is surveyed, the detection module is configured to the stopping for detecting one or more services that the agency provides and the agency continues
Access one or more of particular device protections part;
One or more universal integrated circuits are configured to receive instruction to be configured to be in one or more third specific times
Existing module, the presentation module, which is configured to present, continues proxy access one or more particular device protection part and the generation
The indicator of the stopping of the one or more services provided is provided;And
One or more universal integrated circuits are configured to receive instruction to be configured to promote in one or more 4th specific times
Progressive die block, it is described that module is promoted to be configured to promote to stop the optional of proxy access one or more of particular device protections part
The presentation of option.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/781,456 | 2013-02-28 | ||
US13/781,194 | 2013-02-28 | ||
US13/781,194 US10216957B2 (en) | 2012-11-26 | 2013-02-28 | Methods and systems for managing data and/or services for devices |
US13/781,456 US20140123325A1 (en) | 2012-11-26 | 2013-02-28 | Methods and systems for managing data and/or services for devices |
PCT/US2014/019562 WO2014134516A1 (en) | 2013-02-28 | 2014-02-28 | Managing data and/or services for devices |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105190590A CN105190590A (en) | 2015-12-23 |
CN105190590B true CN105190590B (en) | 2019-04-19 |
Family
ID=51428860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201480024191.3A Expired - Fee Related CN105190590B (en) | 2013-02-28 | 2014-02-28 | For managing the method and system of data and/or for the service of equipment |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2962211A4 (en) |
CN (1) | CN105190590B (en) |
WO (1) | WO2014134516A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105785957B (en) * | 2016-04-29 | 2019-06-28 | 广东美的制冷设备有限公司 | A kind of internet of things home appliance control method, device, system and router |
DK201670581A1 (en) * | 2016-06-12 | 2018-01-08 | Apple Inc | Device-level authorization for viewing content |
CN107491538B (en) * | 2017-08-23 | 2021-01-29 | 成都安恒信息技术有限公司 | Storage process command and parameter value extraction method of DB2 database |
US10721360B2 (en) * | 2017-10-25 | 2020-07-21 | Idriss YOUSFI | Method and device for reducing telephone call costs |
US11867533B2 (en) * | 2018-02-23 | 2024-01-09 | The Boeing Company | Sensing systems and methods |
CN111562951B (en) * | 2020-05-11 | 2022-05-03 | 电子科技大学 | Radar application component service implementation method |
CN113032491B (en) * | 2021-04-07 | 2023-01-06 | 工银科技有限公司 | Method, device, electronic equipment and medium for realizing static data synchronization |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1543616A (en) * | 2001-06-29 | 2004-11-03 | ���ܿ���ϵͳ����˾ | Security system and method for computers |
CN101002180A (en) * | 2004-07-30 | 2007-07-18 | 捷讯研究有限公司 | Method and system for coordinating client and host security modules |
CN101535948A (en) * | 2006-11-01 | 2009-09-16 | 微软公司 | Securing distributed application information delivery |
US7873957B2 (en) * | 2006-07-27 | 2011-01-18 | Microsoft Corporation | Minimizing user disruption during modification operations |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060010047A1 (en) * | 2004-07-06 | 2006-01-12 | Oculus Inc | Sarbanes-Oxley Anonymous Reporting System |
KR20070099200A (en) * | 2006-04-03 | 2007-10-09 | 삼성전자주식회사 | Apparatus for restricting access to application module in mobile wireless device and method of restricting access to application module using the same |
US8069209B1 (en) * | 2006-06-16 | 2011-11-29 | Openwave Systems Inc. | Method for activating and deactivating client-side services from a distant server |
US8949421B2 (en) * | 2009-07-29 | 2015-02-03 | Teradata Us, Inc. | Techniques for discovering database connectivity leaks |
-
2014
- 2014-02-28 EP EP14757393.5A patent/EP2962211A4/en not_active Withdrawn
- 2014-02-28 CN CN201480024191.3A patent/CN105190590B/en not_active Expired - Fee Related
- 2014-02-28 WO PCT/US2014/019562 patent/WO2014134516A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1543616A (en) * | 2001-06-29 | 2004-11-03 | ���ܿ���ϵͳ����˾ | Security system and method for computers |
CN101002180A (en) * | 2004-07-30 | 2007-07-18 | 捷讯研究有限公司 | Method and system for coordinating client and host security modules |
US7873957B2 (en) * | 2006-07-27 | 2011-01-18 | Microsoft Corporation | Minimizing user disruption during modification operations |
CN101535948A (en) * | 2006-11-01 | 2009-09-16 | 微软公司 | Securing distributed application information delivery |
Also Published As
Publication number | Publication date |
---|---|
EP2962211A1 (en) | 2016-01-06 |
EP2962211A4 (en) | 2016-11-16 |
WO2014134516A1 (en) | 2014-09-04 |
CN105190590A (en) | 2015-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105190590B (en) | For managing the method and system of data and/or for the service of equipment | |
AU2020256380B2 (en) | Methods and systems for secure and reliable identity-based computing | |
DeNardis | The Internet in everything | |
US11507665B2 (en) | Methods and systems for secure and reliable identity-based computing | |
JP7064576B2 (en) | Systems and methods for implementing centralized privacy control in decentralized systems | |
Park et al. | CIoT-Net: a scalable cognitive IoT based smart city network architecture | |
Banos et al. | The Mining Minds digital health and wellness framework | |
CN105408873B (en) | System and method for the sampling based on activity of diagnostic data | |
Van Rijmenam | Think bigger: Developing a successful big data strategy for your business | |
US9825800B2 (en) | Methods and systems for managing data | |
CN110168570A (en) | Machine learning virtual sensor process model for multiple sensors | |
CN106575243A (en) | Hypervisor-hosted virtual machine forensics | |
CN106796627A (en) | Method and system for moving the behavioural analysis of equipment behavior based on user role information | |
Ballard et al. | Ibm infosphere streams: Assembling continuous insight in the information revolution | |
Preuveneers et al. | SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments | |
Vuppalapati | Building enterprise IoT applications | |
Xu | A system perspective to privacy, security and resilience in mobile applications | |
Speed et al. | Sensing data in the home | |
Bell et al. | What Is the Internet of Things? | |
Kodys | Semantic reasoning for ubiquitous smart living framework for well-being and digital health | |
Azubuike et al. | West African Journal of Industrial & Academic Research Vol. 19 No. 2. April 31, 2018 Engineering Research and Production Page No | |
Walczak et al. | Semantic exploration of distributed ar services | |
García-Luque et al. | Digital Avatars: An Application to eHealth | |
Woelfel | 4.29 Randomized Shared Memory Algorithms | |
Behan | Sensorial Networks embedded in Mobile Devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190419 |