CN106485163A - Control method and control device that mobile terminal data storehouse accesses - Google Patents

Control method and control device that mobile terminal data storehouse accesses Download PDF

Info

Publication number
CN106485163A
CN106485163A CN201610842829.5A CN201610842829A CN106485163A CN 106485163 A CN106485163 A CN 106485163A CN 201610842829 A CN201610842829 A CN 201610842829A CN 106485163 A CN106485163 A CN 106485163A
Authority
CN
China
Prior art keywords
application
database
access
module
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610842829.5A
Other languages
Chinese (zh)
Inventor
符兴富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201610842829.5A priority Critical patent/CN106485163A/en
Publication of CN106485163A publication Critical patent/CN106485163A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention discloses control method and the control device that a kind of mobile terminal data storehouse accesses, and described control method comprises the steps:Receive the database access request that application sends;Judge whether described application has the access rights in truthful data storehouse;If it is not, then establishment virtual data base, and described application is guided to access described virtual data base.Technical scheme, by when receiving the database access request that application sends, judging to the authority of application;When application does not have the access rights in truthful data storehouse; create virtual data base; and guide described application to access described virtual data base; because application can have access to data base; application energy effectively start then can be ensured; simultaneously as the data base that has access to of application is virtual data base, then can data message in effective protection truthful data storehouse safety.

Description

Control method and control device for mobile terminal database access
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for controlling access to a database of a mobile terminal.
Background
When an existing mobile terminal user installs an application by using a third party, the application collects user data in a large probability, and the collection of the data is just important privacy data security information of the user. And if we refuse the application to obtain the corresponding user data right, the third party application may refuse to start. Sometimes, in order to obtain better use and interaction experience by using a third-party application, the user often can only sacrifice the security of private data of the user, and the applications can obtain the data information which is important for the user.
Therefore, it is particularly necessary to provide a control method that can ensure the effective start of the third-party application and protect the security of the user data.
Disclosure of Invention
The invention mainly aims to provide a control method and a control device for mobile terminal database access, aiming at protecting user data security while ensuring the effective start of third-party application.
In order to achieve the above object, the file storage method of the mobile terminal provided by the present invention comprises the following steps:
receiving a database access request sent by an application;
judging whether the application has the access right of a real database;
and if not, creating a virtual database and guiding the application to access the virtual database.
Optionally, the step of determining whether the application has an access right to a real database includes:
judging whether the application is in a blacklist or not;
when the application is in the blacklist, determining that the application does not have access right of the real database.
Optionally, after the step of determining whether the application is in the blacklist, the method further includes:
when the application is not in the blacklist, sending a query request whether the application is allowed to access the real database;
receiving confirmation information input by a user, and judging whether the application is allowed to access an inquiry request of the real database or not;
and if not, creating a virtual database and guiding the application to access the virtual database.
Optionally, the control method further includes:
acquiring the number of times of the application to be added into the blacklist;
presenting the blacklisted number of applications to a user while sending an inquiry request whether the application is allowed to access the real database.
Optionally, the step of creating a virtual database includes:
acquiring a data model of the real database;
and generating random data information according to the data model to create a virtual database.
In addition, in order to achieve the above object, the present invention further provides a control device for accessing a database of a mobile terminal, which includes a receiving module, a determining module, and an executing module; wherein,
the receiving module is used for receiving a database access request sent by an application;
the judging module is used for judging whether the application has the access right of a real database;
and the execution module is used for creating a virtual database and guiding the application to access the virtual database when the application is judged not to have the access right of the real database.
Optionally, the judging module includes a judging unit and a judging unit; wherein,
the judging unit is used for judging whether the application is in a blacklist or not;
the judging unit is used for judging that the application does not have the access right of the real database when the application is in the blacklist.
Optionally, the control device further includes a sending module and a confirmation module; wherein,
the sending module is used for sending an inquiry request for whether the application is allowed to access the real database or not when the application is not in a blacklist;
the confirmation module is used for receiving confirmation information input by a user;
and the execution module is used for creating a virtual database and guiding the application to access the virtual database when the confirmation information is an inquiry request which does not allow the application to access the real database.
Optionally, the control device further includes an obtaining module and a presenting module; wherein,
the acquisition module is used for acquiring the number of times of the application to be added into the blacklist;
the presentation module is used for presenting the blacklisted times of the application to the user while the sending module sends the inquiry request of whether the application is allowed to access the real database.
Optionally, the execution module includes an obtaining unit and a generating unit; wherein,
the acquiring unit is used for acquiring a data model of the real database;
and the generating unit is used for generating random data information according to the data model so as to create a virtual database.
According to the technical scheme, when a database access request sent by an application is received, the application authority is judged; when the application does not have the access right of the real database, the virtual database is created, the application is guided to access the virtual database, the application can be effectively started as the application can access the database, and meanwhile, the safety of data information in the real database can be effectively protected as the database accessed by the application is the virtual database.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without creative efforts.
Fig. 1 is a schematic diagram of an alternative hardware architecture of a mobile terminal implementing various embodiments of the present invention;
FIG. 2 is a diagram of a wireless communication system for the mobile terminal shown in FIG. 1;
FIG. 3 is a flowchart illustrating a method for controlling database access of a mobile terminal according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for controlling database access of a mobile terminal according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating a method for controlling database access of a mobile terminal according to another embodiment of the present invention;
FIG. 6 is a flowchart illustrating a method for controlling database access of a mobile terminal according to another embodiment of the present invention;
FIG. 7 is a flowchart of the steps of creating a virtual database in FIG. 3;
fig. 8 is a block diagram of an embodiment of a mobile terminal database access control apparatus according to the present invention;
FIG. 9 is a block diagram illustrating an embodiment of the determining module shown in FIG. 8;
fig. 10 is a block diagram of another embodiment of a mobile terminal database access control device according to the present invention;
fig. 11 is a block diagram of a control apparatus for controlling database access of a mobile terminal according to another embodiment of the present invention;
FIG. 12 is a block diagram of an embodiment of the execution block of FIG. 8.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
The mobile terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a navigation device, and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. In the following, it is assumed that the terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Fig. 1 is a schematic diagram of a hardware structure of an optional mobile terminal for implementing various embodiments of the present invention.
The mobile terminal 100 may include a wireless communication unit 110, an a/V (audio/video) input unit 120, a user input unit 130, a sensing unit 140, an output unit 150, a memory 160, an interface unit 170, a controller 180, and a power supply unit 190, etc. Fig. 1 illustrates a mobile terminal having various components, but it is to be understood that not all illustrated components are required to be implemented. More or fewer components may alternatively be implemented. Elements of the mobile terminal will be described in detail below.
The wireless communication unit 110 typically includes one or more components that allow radio communication between the mobile terminal 100 and a wireless communication system or network. For example, the wireless communication unit 110 may include at least one of a broadcast receiving module 111, a mobile communication module 112, a wireless internet module 113, a short-range communication module 114, and a location information module 115.
The broadcast receiving module 111 receives a broadcast signal and/or broadcast associated information from an external broadcast management server via a broadcast channel. The broadcast channel may include a satellite channel and/or a terrestrial channel. The broadcast management server may be a server that generates and transmits a broadcast signal and/or broadcast associated information or a server that receives a previously generated broadcast signal and/or broadcast associated information and transmits it to a terminal. The broadcast signal may include a TV broadcast signal, a radio broadcast signal, a data broadcast signal, and the like. Also, the broadcast signal may further include a broadcast signal combined with a TV or radio broadcast signal. The broadcast associated information may also be provided via a mobile communication network, and in this case, the broadcast associated information may be received by the mobile communication module 112. The broadcast signal may exist in various forms, for example, it may exist in the form of an Electronic Program Guide (EPG) of Digital Multimedia Broadcasting (DMB), an Electronic Service Guide (ESG) of digital video broadcasting-handheld (DVB-H), and the like. The broadcast receiving module 111 may receive a signal broadcast by using various types of broadcasting systems. In particular, the broadcast receiving module 111 may receive digital broadcasting by using a digital broadcasting system such as a digital broadcasting-terrestrial (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video broadcasting-handheld (DVB-H), a data broadcasting system of forward link media (MediaFLO), a terrestrial digital broadcasting integrated service (ISDB-T), and the like. The broadcast receiving module 111 may be constructed to be suitable for various broadcasting systems that provide broadcast signals as well as the above-mentioned digital broadcasting systems. The broadcast signal and/or broadcast associated information received via the broadcast receiving module 111 may be stored in the memory 160 (or other type of storage medium).
The mobile communication module 112 transmits and/or receives radio signals to and/or from at least one of a base station (e.g., access point, node B, etc.), an external terminal, and a server. Such radio signals may include voice call signals, video call signals, or various types of data transmitted and/or received according to text and/or multimedia messages.
The wireless internet module 113 supports wireless internet access of the mobile terminal. The module may be internally or externally coupled to the terminal. The wireless internet access technology to which the module relates may include WLAN (wireless LAN) (Wi-Fi), Wibro (wireless broadband), Wimax (worldwide interoperability for microwave access), HSDPA (high speed downlink packet access), and the like.
The short-range communication module 114 is a module for supporting short-range communication. Some examples of short-range communication technologies include bluetooth (TM), Radio Frequency Identification (RFID), infrared data association (IrDA), Ultra Wideband (UWB), zigbee (TM), and the like.
The location information module 115 is a module for checking or acquiring location information of the mobile terminal. A typical example of the location information module is a GPS (global positioning system). According to the current technology, the GPS module 115 calculates distance information and accurate time information from three or more satellites and applies triangulation to the calculated information, thereby accurately calculating three-dimensional current location information according to longitude, latitude, and altitude. Currently, a method for calculating position and time information uses three satellites and corrects an error of the calculated position and time information by using another satellite. In addition, the GPS module 115 can calculate speed information by continuously calculating current position information in real time.
The a/V input unit 120 is used to receive an audio or video signal. The a/V input unit 120 may include a camera 121 and a microphone 122, and the camera 121 processes image data of still pictures or video obtained by an image capturing apparatus in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 151. The image frames processed by the cameras 121 may be stored in the memory 160 (or other storage medium) or transmitted via the wireless communication unit 110, and two or more cameras 121 may be provided according to the construction of the mobile terminal. The microphone 122 may receive sounds (audio data) via the microphone in a phone call mode, a recording mode, a voice recognition mode, or the like, and can process such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the mobile communication module 112 in case of a phone call mode. The microphone 122 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The user input unit 130 may generate key input data according to a command input by a user to control various operations of the mobile terminal. The user input unit 130 allows a user to input various types of information, and may include a keyboard, dome sheet, touch pad (e.g., a touch-sensitive member that detects changes in resistance, pressure, capacitance, and the like due to being touched), scroll wheel, joystick, and the like. In particular, when the touch pad is superimposed on the display unit 151 in the form of a layer, a touch screen may be formed.
The sensing unit 140 detects a current state of the mobile terminal 100 (e.g., an open or closed state of the mobile terminal 100), a position of the mobile terminal 100, presence or absence of contact (i.e., touch input) by a user with the mobile terminal 100, an orientation of the mobile terminal 100, acceleration or deceleration movement and direction of the mobile terminal 100, and the like, and generates a command or signal for controlling an operation of the mobile terminal 100. For example, when the mobile terminal 100 is implemented as a slide-type mobile phone, the sensing unit 140 may sense whether the slide-type phone is opened or closed. In addition, the sensing unit 140 can detect whether the power supply unit 190 supplies power or whether the interface unit 170 is coupled with an external device. The sensing unit 140 may include a proximity sensor 141 as will be described below in connection with a touch screen.
The interface unit 170 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The identification module may store various information for authenticating a user using the mobile terminal 100 and may include a User Identity Module (UIM), a Subscriber Identity Module (SIM), a Universal Subscriber Identity Module (USIM), and the like. In addition, a device having an identification module (hereinafter, referred to as an "identification device") may take the form of a smart card, and thus, the identification device may be connected with the mobile terminal 100 via a port or other connection means. The interface unit 170 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal and the external device.
In addition, when the mobile terminal 100 is connected with an external cradle, the interface unit 170 may serve as a path through which power is supplied from the cradle to the mobile terminal 100 or may serve as a path through which various command signals input from the cradle are transmitted to the mobile terminal. Various command signals or power input from the cradle may be used as signals for recognizing whether the mobile terminal is accurately mounted on the cradle. The output unit 150 is configured to provide output signals (e.g., audio signals, video signals, alarm signals, vibration signals, etc.) in a visual, audio, and/or tactile manner. The output unit 150 may include a display unit 151, an audio output module 152, an alarm unit 153, and the like.
The display unit 151 may display information processed in the mobile terminal 100. For example, when the mobile terminal 100 is in a phone call mode, the display unit 151 may display a User Interface (UI) or a Graphical User Interface (GUI) related to a call or other communication (e.g., text messaging, multimedia file downloading, etc.). When the mobile terminal 100 is in a video call mode or an image capturing mode, the display unit 151 may display a captured image and/or a received image, a UI or GUI showing a video or an image and related functions, and the like.
Meanwhile, when the display unit 151 and the touch pad are overlapped with each other in the form of a layer to form a touch screen, the display unit 151 may serve as an input device and an output device. The display unit 151 may include at least one of a Liquid Crystal Display (LCD), a thin film transistor LCD (TFT-LCD), an Organic Light Emitting Diode (OLED) display, a flexible display, a three-dimensional (3D) display, and the like. Some of these displays may be configured to be transparent to allow a user to view from the outside, which may be referred to as transparent displays, and a typical transparent display may be, for example, a TOLED (transparent organic light emitting diode) display or the like. Depending on the particular desired implementation, the mobile terminal 100 may include two or more display units (or other display devices), for example, the mobile terminal may include an external display unit (not shown) and an internal display unit (not shown). The touch screen may be used to detect a touch input pressure as well as a touch input position and a touch input area.
The audio output module 152 may convert audio data received by the wireless communication unit 110 or stored in the memory 160 into an audio signal and output as sound when the mobile terminal is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output module 152 may provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output module 152 may include a speaker, a buzzer, and the like.
The alarm unit 153 may provide an output to notify the mobile terminal 100 of the occurrence of an event. Typical events may include call reception, message reception, key signal input, touch input, and the like. In addition to audio or video output, the alarm unit 153 may provide output in different ways to notify the occurrence of an event. For example, the alarm unit 153 may provide an output in the form of vibration, and when a call, a message, or some other incoming communication (incomingmunication) is received, the alarm unit 153 may provide a tactile output (i.e., vibration) to inform the user thereof. By providing such a tactile output, the user can recognize the occurrence of various events even when the user's mobile phone is in the user's pocket. The alarm unit 153 may also provide an output notifying the occurrence of an event via the display unit 151 or the audio output module 152.
The memory 160 may store software programs or the like for processing and controlling operations performed by the controller 180, or may temporarily store data (e.g., a phonebook, messages, still images, videos, etc.) that has been output or is to be output. Also, the memory 160 may store data regarding various ways of vibration and audio signals output when a touch is applied to the touch screen.
The memory 160 may include at least one type of storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. Also, the mobile terminal 100 may cooperate with a network storage device that performs a storage function of the memory 160 through a network connection.
The controller 180 generally controls the overall operation of the mobile terminal. For example, the controller 180 performs control and processing related to voice calls, data communications, video calls, and the like. In addition, the controller 180 may include a multimedia module 181 for reproducing (or playing back) multimedia data, and the multimedia module 181 may be constructed within the controller 180 or may be constructed separately from the controller 180. The controller 180 may perform a pattern recognition process to recognize a handwriting input or a picture drawing input performed on the touch screen as a character or an image.
The power supply unit 190 receives external power or internal power and provides appropriate power required to operate various elements and components under the control of the controller 180.
The various embodiments described herein may be implemented in a computer-readable medium using, for example, computer software, hardware, or any combination thereof. For a hardware implementation, the embodiments described herein may be implemented using at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, an electronic unit designed to perform the functions described herein, and in some cases, such embodiments may be implemented in the controller 180. For a software implementation, the implementation such as a process or a function may be implemented with a separate software module that allows performing at least one function or operation. The software codes may be implemented by software applications (or programs) written in any suitable programming language, which may be stored in the memory 160 and executed by the controller 180.
Up to now, the mobile terminal has been described in terms of its functions. Hereinafter, a slide-type mobile terminal among various types of mobile terminals, such as a folder-type, bar-type, swing-type, slide-type mobile terminal, and the like, will be described as an example for the sake of brevity. Accordingly, the present invention can be applied to any type of mobile terminal, and is not limited to a slide type mobile terminal.
The mobile terminal 100 as shown in fig. 1 may be configured to operate with communication systems such as wired and wireless communication systems and satellite-based communication systems that transmit data via frames or packets.
A communication system in which a mobile terminal according to the present invention is operable will now be described with reference to fig. 2.
Such communication systems may use different air interfaces and/or physical layers. For example, the air interface used by the communication system includes, for example, Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunications System (UMTS) (in particular, Long Term Evolution (LTE)), global system for mobile communications (GSM), and the like. By way of non-limiting example, the following description relates to a CDMA communication system, but such teachings are equally applicable to other types of systems.
Referring to fig. 2, the CDMA wireless communication system may include a plurality of mobile terminals 100, a plurality of Base Stations (BSs) 270, Base Station Controllers (BSCs) 275, and a Mobile Switching Center (MSC) 280. The MSC280 is configured to interface with a Public Switched Telephone Network (PSTN) 290. The MSC280 is also configured to interface with a BSC275, which may be coupled to the base station 270 via a backhaul. The backhaul may be constructed according to any of several known interfaces including, for example, E1/T1, ATM, IP, PPP, frame Relay, HDSL, ADSL, or xDSL. It will be understood that a system as shown in fig. 2 may include multiple BSCs 275.
Each BS270 may serve one or more sectors (or regions), each sector covered by a multi-directional antenna or an antenna pointing in a particular direction being radially distant from the BS 270. Alternatively, each partition may be covered by two or more antennas for diversity reception. Each BS270 may be configured to support multiple frequency allocations, with each frequency allocation having a particular frequency spectrum (e.g., 1.25MHz,5MHz, etc.).
The intersection of partitions with frequency allocations may be referred to as a CDMA channel. The BS270 may also be referred to as a Base Transceiver Subsystem (BTS) or other equivalent terminology. In such a case, the term "base station" may be used to generically refer to a single BSC275 and at least one BS 270. The base stations may also be referred to as "cells". Alternatively, each sector of a particular BS270 may be referred to as a plurality of cell sites.
As shown in fig. 2, a Broadcast Transmitter (BT)295 transmits a broadcast signal to the mobile terminal 100 operating within the system. A broadcast receiving module 111 as shown in fig. 1 is provided at the mobile terminal 100 to receive a broadcast signal transmitted by the BT 295. In fig. 2, several Global Positioning System (GPS) satellites 300 are shown. The satellite 300 assists in locating at least one of the plurality of mobile terminals 100.
In fig. 2, a plurality of satellites 300 are depicted, but it is understood that useful positioning information may be obtained with any number of satellites. The GPS module 115 as shown in fig. 1 is generally configured to cooperate with satellites 300 to obtain desired positioning information. Other techniques that can track the location of the mobile terminal may be used instead of or in addition to GPS tracking techniques. In addition, at least one GPS satellite 300 may selectively or additionally process satellite DMB transmission.
As a typical operation of the wireless communication system, the BS270 receives reverse link signals from various mobile terminals 100. The mobile terminal 100 is generally engaged in conversations, messaging, and other types of communications. Each reverse link signal received by a particular base station 270 is processed within the particular BS 270. The obtained data is forwarded to the associated BSC 275. The BSC provides call resource allocation and mobility management functions including coordination of soft handoff procedures between BSs 270. The BSCs 275 also route the received data to the MSC280, which provides additional routing services for interfacing with the PSTN 290. Similarly, the PSTN290 interfaces with the MSC280, the MSC interfaces with the BSCs 275, and the BSCs 275 accordingly control the BS270 to transmit forward link signals to the mobile terminal 100.
Based on the above mobile terminal hardware structure and communication system, the present invention provides various embodiments of the method.
The invention provides a file storage method of a mobile terminal.
As shown in fig. 3, fig. 3 is a flowchart of a method for controlling access to a database of a mobile terminal according to an embodiment of the present invention.
The method for controlling the access of the mobile terminal database comprises the following steps:
step S10, receiving a database access request sent by an application;
step S20, judging whether the application has the access right of a real database; if not, step S30 is performed.
And step S30, creating a virtual database and guiding the application to access the virtual database.
Specifically, when the application installed in the mobile terminal is started, an access request to some databases is simultaneously sent out to access the databases to obtain data information (such as a phone book, a notepad, a clock, an sd card, an album, and system parameter information) of the user. When a database access request sent by an application is received, the authority of the application is judged so as to judge whether the application has the access authority of a real database. When the application does not have access rights to the real database, a virtual database is created and the application is directed to access the virtual database.
According to the technical scheme of the embodiment, when a database access request sent by an application is received, the application authority is judged; when the application does not have the access right of the real database, the virtual database is created, the application is guided to access the virtual database, the application can be effectively started as the application can access the database, and meanwhile, the safety of data information in the real database can be effectively protected as the database accessed by the application is the virtual database.
Further, as shown in fig. 4, fig. 4 is a flowchart of a method for controlling access to a database of a mobile terminal according to an embodiment of the present invention.
In this embodiment, the step of determining whether the application has an access right to the real database includes:
step S21, judging whether the application is in a blacklist;
and step S22, when the application is in the blacklist, judging that the application does not have the access right of the real database.
Specifically, when judging whether the application has the access right of the real database, searching is performed in a blacklist to find whether the application is in the blacklist. If so, determining that the application does not have access rights to the real database. Then, step S30 is executed to create a virtual database and direct the application to access the virtual database.
According to the technical scheme, the application permission is limited by setting the blacklist, so that the access permission of the application can be flexibly controlled, and different requirements of different users can be met.
Further, as shown in fig. 5, fig. 5 is a flowchart of another embodiment of a method for controlling access to a database of a mobile terminal according to the present invention.
Based on the above embodiments, in the present embodiment, when the application is not in the blacklist, step S23 is performed.
Step S23, sending an inquiry request for allowing the application to access the real database;
step S24, receiving confirmation information input by a user, and judging whether the user allows the application to access the inquiry request of the real database; if not, step S30 is executed to create a virtual database and direct the application to access the virtual database.
Specifically, when the application is not in the blacklist (i.e., when the application is in the whitelist), an inquiry request for whether to allow the application to access the real database is sent, and the inquiry request is displayed to the user through a display interface. Then, according to the selection of the user, corresponding operations are executed, such as: and when the user selects an inquiry request which does not allow the application to access the real database, creating a virtual database and guiding the application to access the virtual database.
The technical scheme of the embodiment is suitable for the first time of starting the application or not limiting the access authority of the application, so that the user can set the authority of the application according to the requirement of the user, and the operation is humanized.
Further, as shown in fig. 6, fig. 6 is a flowchart of another embodiment of a method for controlling access to a database of a mobile terminal according to the present invention.
Based on any one of the above embodiments, in this embodiment, the method for controlling access to a database of a mobile terminal further includes:
step S40, acquiring the number of times of the application to be added into the blacklist;
step S50, presenting the blacklisted number of applications to the user while sending an inquiry request whether to allow the application to access the real database.
Specifically, in this embodiment, all or most of the setting manners of the user's permission to the application (that is, the application is placed in the black list or the white list) are acquired from the cloud server. Then, while sending an inquiry request whether to allow the application to access the real database, presenting the blacklisted times of the application to the user, such as: when inquiring whether the application is authorized to access the phonebook, prompting the user that the xx bit user refuses the application to access the real database, if the user refuses to access the real database, directing the access authority to the virtual database (as shown in fig. 7).
Further, as shown in fig. 7, fig. 7 is a flowchart of the step of creating the virtual database in fig. 3.
Based on any one of the above embodiments, in this embodiment, the step of creating the virtual database includes:
step S31, acquiring a data model of the real database;
and step S32, generating random data information according to the data model to create a virtual database.
Specifically, in this embodiment, when a virtual database needs to be created, first, a data model of a corresponding real database is obtained to obtain a format of data information in the real database. And then randomly combining letters or Chinese characters according to the format of the data information obtained in the real database to generate random data information. And finally, adding the randomly generated data information into a virtual database to realize the creation of the virtual database.
According to the technical scheme, the virtual database with the same data model as the real database is established, so that only virtual data is novel and not real data information of a user is acquired by application, and the safety of the real data information of the user is effectively guaranteed.
The invention also provides a control device for accessing the mobile terminal database.
As shown in fig. 8, fig. 8 is a schematic block diagram of a control apparatus for controlling database access of a mobile terminal according to an embodiment of the present invention.
In this embodiment, the apparatus for controlling the access of the mobile terminal database includes a receiving module 410, a determining module 420 and an executing module 430; the receiving module 410 is configured to receive a database access request sent by an application; the determining module 420 is configured to determine whether the application has an access right to a real database; the executing module 430 is configured to create a virtual database and direct the application to access the virtual database when it is determined that the application does not have the access right of the real database.
Specifically, when the application installed in the mobile terminal is started, an access request to some databases is simultaneously sent out to access the databases to obtain data information (such as a phone book, a notepad, a clock, an sd card, an album, and system parameter information) of the user. When a database access request sent by an application is received, the authority of the application is judged so as to judge whether the application has the access authority of a real database. When the application does not have access rights to the real database, a virtual database is created and the application is directed to access the virtual database.
According to the technical scheme of the embodiment, when a database access request sent by an application is received, the application authority is judged; when the application does not have the access right of the real database, the virtual database is created, and the application is guided to access the virtual database, so that the safety of data information in the real database is effectively protected.
Further, as shown in fig. 9, fig. 9 is a schematic block diagram of an embodiment of the determining module in fig. 8.
In this embodiment, the determining module 420 includes a determining unit 422 and a determining unit 424; the determining unit 422 is configured to determine whether the application is in a blacklist; the determining unit 424 is configured to determine that the application does not have the access right of the real database when the application is in the blacklist.
Specifically, when judging whether the application has the access right of the real database, searching is performed in a blacklist to find whether the application is in the blacklist. If so, determining that the application does not have access rights to the real database. Then, step S30 is executed to create a virtual database and direct the application to access the virtual database.
According to the technical scheme, the application permission is limited by setting the blacklist, so that the access permission of the application can be flexibly controlled, and different requirements of different users can be met.
Further, as shown in fig. 10, fig. 10 is a schematic block diagram of a control apparatus for controlling database access of a mobile terminal according to another embodiment of the present invention.
In this embodiment, the apparatus for controlling the database access of the mobile terminal further includes a sending module 440 and a confirming module 450; wherein the sending module 440 is configured to send an inquiry request for whether to allow the application to access the real database when the application is not in the blacklist; the confirmation module 450 is configured to receive confirmation information input by a user; the executing module 430 is configured to create a virtual database when the confirmation information is an inquiry request that does not allow the application to access the real database.
Specifically, when the application is not in the blacklist (i.e., when the application is in the whitelist), an inquiry request for whether to allow the application to access the real database is sent, and the inquiry request is displayed to the user through a display interface. Then, according to the selection of the user, corresponding operations are executed, such as: and when the user selects an inquiry request which does not allow the application to access the real database, creating a virtual database and guiding the application to access the virtual database.
The technical scheme of the embodiment is suitable for the first time of starting the application or not limiting the access authority of the application, so that the user can set the authority of the application according to the requirement of the user, and the operation is humanized.
Further, as shown in fig. 11, fig. 11 is a schematic block diagram of a control apparatus for controlling database access of a mobile terminal according to another embodiment of the present invention.
In this embodiment, the apparatus for controlling the access of the mobile terminal database further includes an obtaining module 460 and a presenting module 470; the obtaining module 460 is configured to obtain the number of times of the application being added to the blacklist; the presenting module 470 is configured to present the blacklisted number of applications to the user while the sending module 440 sends the query request whether to allow the application to access the real database.
Specifically, in this embodiment, all or most of the setting manners of the user's permission to the application (that is, the application is placed in the black list or the white list) are acquired from the cloud server. Then, while sending an inquiry request whether to allow the application to access the real database, presenting the blacklisted times of the application to the user, such as: when inquiring whether the application is authorized to access the phonebook, prompting the user that the xx bit user refuses the application to access the real database, if the user refuses to access the real database, directing the access authority to the virtual database (as shown in fig. 7).
Further, as shown in fig. 12, fig. 12 is a block diagram of an embodiment of the execution block in fig. 8.
In this embodiment, the executing module 430 includes an acquiring unit 432 and a generating unit 434; the obtaining unit 432 is configured to obtain a data model of the real database; the generating unit 434 is configured to generate random data information according to the data model to create a virtual database.
Specifically, in this embodiment, when a virtual database needs to be created, first, a data model of a corresponding real database is obtained to obtain a format of data information in the real database. And then randomly combining letters or Chinese characters according to the format of the data information obtained in the real database to generate random data information. And finally, adding the randomly generated data information into a virtual database to realize the creation of the virtual database.
According to the technical scheme, the virtual database with the same data model as the real database is established, so that only virtual data is novel and not real data information of a user is acquired by application, and the safety of the real data information of the user is effectively guaranteed.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (which may be a mobile terminal, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A control method for mobile terminal database access is characterized by comprising the following steps:
receiving a database access request sent by an application;
judging whether the application has the access right of a real database;
and if not, creating a virtual database and guiding the application to access the virtual database.
2. The method of claim 1, wherein the step of determining whether the application has access rights to the real database comprises:
judging whether the application is in a blacklist or not;
when the application is in the blacklist, determining that the application does not have access right of the real database.
3. The method of claim 2, wherein after the step of determining whether the application is on a blacklist, further comprising:
when the application is not in the blacklist, sending a query request whether the application is allowed to access the real database;
receiving confirmation information input by a user, and judging whether the application is allowed to access an inquiry request of the real database or not;
and if not, creating a virtual database and guiding the application to access the virtual database.
4. The method for controlling access to a database of a mobile terminal according to claim 3, further comprising:
acquiring the number of times of the application to be added into the blacklist;
presenting the blacklisted number of applications to a user while sending an inquiry request whether the application is allowed to access the real database.
5. The method for controlling access to a database of a mobile terminal according to any of claims 1 to 4, wherein the step of creating a virtual database comprises:
acquiring a data model of the real database;
and generating random data information according to the data model to create a virtual database.
6. A control device for mobile terminal database access is characterized by comprising a receiving module, a judging module and an executing module; wherein,
the receiving module is used for receiving a database access request sent by an application;
the judging module is used for judging whether the application has the access right of a real database;
and the execution module is used for creating a virtual database and guiding the application to access the virtual database when the application is judged not to have the access right of the real database.
7. The apparatus for controlling access to a database of a mobile terminal according to claim 6, wherein the determining means comprises a determining unit and a determining unit; wherein,
the judging unit is used for judging whether the application is in a blacklist or not;
the judging unit is used for judging that the application does not have the access right of the real database when the application is in the blacklist.
8. The apparatus for controlling access to a database of a mobile terminal according to claim 7, further comprising a sending module and a confirmation module; wherein,
the sending module is used for sending an inquiry request for whether the application is allowed to access the real database or not when the application is not in a blacklist;
the confirmation module is used for receiving confirmation information input by a user;
and the execution module is used for creating a virtual database and guiding the application to access the virtual database when the confirmation information is an inquiry request which does not allow the application to access the real database.
9. The apparatus for controlling access to a database of a mobile terminal according to claim 8, further comprising an obtaining module and a presenting module; wherein,
the acquisition module is used for acquiring the number of times of the application to be added into the blacklist;
the presentation module is used for presenting the blacklisted times of the application to the user while the sending module sends the inquiry request of whether the application is allowed to access the real database.
10. The apparatus for controlling database access of a mobile terminal according to any of claims 6 to 9, wherein the execution module comprises an obtaining unit and a generating unit; wherein,
the acquiring unit is used for acquiring a data model of the real database;
and the generating unit is used for generating random data information according to the data model so as to create a virtual database.
CN201610842829.5A 2016-09-22 2016-09-22 Control method and control device that mobile terminal data storehouse accesses Pending CN106485163A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610842829.5A CN106485163A (en) 2016-09-22 2016-09-22 Control method and control device that mobile terminal data storehouse accesses

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610842829.5A CN106485163A (en) 2016-09-22 2016-09-22 Control method and control device that mobile terminal data storehouse accesses

Publications (1)

Publication Number Publication Date
CN106485163A true CN106485163A (en) 2017-03-08

Family

ID=58268813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610842829.5A Pending CN106485163A (en) 2016-09-22 2016-09-22 Control method and control device that mobile terminal data storehouse accesses

Country Status (1)

Country Link
CN (1) CN106485163A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480554A (en) * 2017-07-28 2017-12-15 中科创达软件科技(深圳)有限公司 A kind of right management method, rights management device and intelligent terminal
CN108932435A (en) * 2018-07-05 2018-12-04 宇龙计算机通信科技(深圳)有限公司 A kind of information security management method, terminal device and computer readable storage medium
CN109426735A (en) * 2017-08-29 2019-03-05 中兴通讯股份有限公司 A kind of method and system for protecting individual privacy
CN109960941A (en) * 2019-03-18 2019-07-02 中国科学院计算机网络信息中心 Data access method, device and storage medium based on via Self-reconfiguration
CN113946560A (en) * 2021-08-31 2022-01-18 北京中安星云软件技术有限公司 Database security management method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611805A (en) * 2011-01-24 2012-07-25 联想(北京)有限公司 Communication information notifying method, information reporting method, server and communication terminals
CN102801688A (en) * 2011-05-23 2012-11-28 联想(北京)有限公司 Data access method, device and terminal supporting data access
CN102811202A (en) * 2011-06-01 2012-12-05 网秦无限(北京)科技有限公司 Method and system for preventing harassment calls through cloud computing
CN103679028A (en) * 2013-12-06 2014-03-26 深圳酷派技术有限公司 Software behavior monitoring method and terminal
CN104579685A (en) * 2015-01-04 2015-04-29 宇龙计算机通信科技(深圳)有限公司 Information protection method and device
CN105072255A (en) * 2015-07-10 2015-11-18 北京奇虎科技有限公司 Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611805A (en) * 2011-01-24 2012-07-25 联想(北京)有限公司 Communication information notifying method, information reporting method, server and communication terminals
CN102801688A (en) * 2011-05-23 2012-11-28 联想(北京)有限公司 Data access method, device and terminal supporting data access
CN102811202A (en) * 2011-06-01 2012-12-05 网秦无限(北京)科技有限公司 Method and system for preventing harassment calls through cloud computing
CN103679028A (en) * 2013-12-06 2014-03-26 深圳酷派技术有限公司 Software behavior monitoring method and terminal
CN104579685A (en) * 2015-01-04 2015-04-29 宇龙计算机通信科技(深圳)有限公司 Information protection method and device
CN105072255A (en) * 2015-07-10 2015-11-18 北京奇虎科技有限公司 Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480554A (en) * 2017-07-28 2017-12-15 中科创达软件科技(深圳)有限公司 A kind of right management method, rights management device and intelligent terminal
CN107480554B (en) * 2017-07-28 2020-08-14 中科创达软件科技(深圳)有限公司 Authority management method, authority management device and intelligent terminal
CN109426735A (en) * 2017-08-29 2019-03-05 中兴通讯股份有限公司 A kind of method and system for protecting individual privacy
CN108932435A (en) * 2018-07-05 2018-12-04 宇龙计算机通信科技(深圳)有限公司 A kind of information security management method, terminal device and computer readable storage medium
CN109960941A (en) * 2019-03-18 2019-07-02 中国科学院计算机网络信息中心 Data access method, device and storage medium based on via Self-reconfiguration
CN113946560A (en) * 2021-08-31 2022-01-18 北京中安星云软件技术有限公司 Database security management method and system

Similar Documents

Publication Publication Date Title
CN106027804B (en) Unlocking method and unlocking device of mobile terminal
CN104932697B (en) Gesture unlocking method and device
CN106341817A (en) Access control system, access control method, mobile terminals and access server
CN106130734A (en) The control method of mobile terminal and control device
CN105262819B (en) A kind of mobile terminal and its method for realizing push
CN105898703B (en) Management method and device for identified pseudo base station
CN106485163A (en) Control method and control device that mobile terminal data storehouse accesses
CN104992109A (en) Method and device for password setting and method and device for password matching
CN106778123B (en) Mobile terminal and hardware equipment authority management method thereof
CN105353947A (en) Mobile terminal and application display content controlling method
CN106332030B (en) A kind of communication means and device based on virtual card
CN104935577B (en) Authentication method, smart card cloud, the cloud APP, apparatus and system
CN104951229A (en) Screen capturing method and device
CN107133508B (en) Application management method and mobile terminal
CN106484534B (en) Control method and control device for displayed mobile terminal
CN106507343A (en) A kind of information processing method, mobile terminal and server
CN106228043B (en) Application icon hidden method and terminal
CN105260096A (en) Method for controlling user operation and mobile terminal
CN105094598A (en) Device and method for processing operational objects
CN105357188B (en) A kind of method that realizing WIFI connections, server and mobile terminal
CN106792644A (en) Mobile terminal, server and information processing method
CN106162606A (en) A kind of method for switching network and mobile terminal
CN105245707A (en) Mobile terminal and method for processing information
CN106506786A (en) The terminal and method of protection user privacy information
CN106535196A (en) Routing equipment, terminal and method for controlling WiFi access

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170308