CN106874748A - A kind of method and apparatus that user data is provided - Google Patents
A kind of method and apparatus that user data is provided Download PDFInfo
- Publication number
- CN106874748A CN106874748A CN201510921136.0A CN201510921136A CN106874748A CN 106874748 A CN106874748 A CN 106874748A CN 201510921136 A CN201510921136 A CN 201510921136A CN 106874748 A CN106874748 A CN 106874748A
- Authority
- CN
- China
- Prior art keywords
- application
- user data
- source
- intended application
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
A kind of method and apparatus that user data is provided are the embodiment of the invention provides, methods described includes:It is in advance the state and the first user data of each intended application of each intended application configuration interface switch;When the user data acquisition order to intended application is detected, the state of the corresponding interface switch of the intended application is detected;When the state is closed mode, first interface is called to obtain the first user data of intended application;Acquired first user data are provided as the user data of intended application.Mobile terminal in the embodiment of the present invention can obtain preset first user data by first interface; there is provided first user data as the user data of intended application; thus solve the problems, such as third party software to obtain real user data and cause the privacy leakage of user; strengthen the protective effect to user data, it is ensured that the personal secrets of user.
Description
Technical field
The present invention relates to technical field of communication safety and comprising, more particularly to a kind of method that user data is provided and
A kind of device that user data is provided.
Background technology
With the fast development of the communication technology, especially with the popularization of mobile Internet, mobile terminal from
Simple call instrument becomes an integrated information processing platform.At present, mobile terminal is mainly by installing
Various application programs, to provide diversified service, meet the demand of user.
Generally, when user installs application program in the terminal, application program can automatically obtain reading and move
The authority of the user data of dynamic terminal, user data is read such that it is able to automatic, such as short message reading data,
The data such as address list, geographical position or account number cipher.It is special when application program is third party software
It is not rogue program, these authorities are likely to result in user data leakage, cause the personal information quilt of user
It is illegal to utilize, there is potential safety hazard.
Obviously, the application program installed on mobile terminals reads user data automatically, can cause user
Privacy leakage, existence information safety problem.
The content of the invention
In view of the above problems, it is proposed that the present invention overcomes above mentioned problem or at least part of to provide one kind
The method of offer user data that solves the above problems and the corresponding device that user data is provided.
According to one aspect of the present invention, there is provided a kind of method of offer user data, including:In advance
It is the state and the first user data of each intended application of each intended application configuration interface switch;In detection
When obtaining order to the user data to intended application, the corresponding interface switch of the intended application is detected
State;When the state is closed mode, first interface is called to obtain the first user number of intended application
According to;Acquired first user data are provided as the user data of intended application.
Alternatively, methods described also includes:When the state is opening, second interface is called to obtain
Take the second user data of intended application;Using acquired second user data as intended application user
Data are provided.
Alternatively, methods described also includes:The application transmitted user data in reception source obtains order;
The safe class of detection source application, determines the state of the corresponding interface switch of intended application;Or, detection
Source application obtains the authority of user data, determines the state of the corresponding interface switch of intended application.
Alternatively, the step of safe class of detection source application, including:Carried out by source application
Safety detection, determines the safety value of the source application;The peace that the source is applied is determined using the safety value
Congruent level.
Alternatively, safety detection is carried out by source application, determines the safety value of the source application,
Including:Each application message of source application of the local security software to installing is monitored respectively, determines that source should
Safety value, wherein, the application message include it is following at least one:Apply Names, application version,
Publisher and set-up time.
Alternatively, safety detection is carried out by source application, determines the safety value of the source application,
Including:When installation source is applied, the security evaluation result of the source application being currently installed on is obtained from Cloud Server;
The safety value that the source being currently installed on is applied is determined using the security evaluation result;Wherein, the safety is commented
Estimating result includes user's mark result and/or user's evaluation result.
Alternatively, interface switch includes following at least one type:Short message interface switch, address list interface
Switch, positional interface switch and picture interface switch;Then the second user data at least include following
One:Second note data, the second address book data, the second geographic position data and second picture data;
The first user data at least include following any one:First note data, the first address book data,
First geographic position data and the first image data.
Alternatively, the safe class of detection source application, determines the state of the corresponding interface switch of intended application,
Including:Whether judge the safe class of source application can reach preset secure threshold;When source application
Safe class can reach secure threshold, the corresponding interface switch of the intended application is set on shape
State;When the safe class of source application can not reach secure threshold, connect the intended application is corresponding
Mouth switch is set to off closed state.
Alternatively, when the safe class of source application can reach secure threshold, by the intended application pair
The interface switch answered is set on state, including:Determining the safe class of source application can reach safety threshold
The type of value, applies for the source and for the interface switch of respective type to be set on state;Wherein,
The secure threshold includes following at least one type:Short message secure threshold, address list secure threshold, position
Put secure threshold and picture secure threshold.
Alternatively, detection source application obtains the authority of user data, determines that the corresponding interface of intended application is opened
The state of pass, including:When source is applied in user data white list, then the source is used using with acquisition
The authority of user data, state is set on by the corresponding interface switch of the intended application;When source application
In user data blacklist, then the source is applied without the authority for obtaining user data, by the mesh
Mark is set to off closed state using corresponding interface switch.
Alternatively, methods described also includes:Detect user allow source application obtain user data when,
Source application is added in the user data white list;Obtained the source application of user's refusal is detected
During user data, source application is added in the user data blacklist.
Alternatively, methods described also includes:When the first user data for detecting user's modification intended application
When, obtain the modification information that user is submitted to;The of the intended application is updated using the modification information
One user data.
Alternatively, methods described also includes:Obtain the domain account of current system;Based on acquired domain account
Number the first user data after renewal are preserved.
According to another aspect of the present invention, there is provided it is a kind of provide user data device, including:Configuration
Module, is suitable to be in advance the state and the first use of each intended application of each intended application configuration interface switch
User data;Detection module, is suitable to when the user data acquisition order to intended application is detected, detection
The state of the corresponding interface switch of the intended application;First user data acquisition module, is suitable to described
When state is closed mode, first interface is called to obtain the first user data of intended application;Data are provided
Module, is suitable to be provided acquired first user data as the user data of intended application.
Alternatively, there is provided the device of user data also includes:Second user data acquisition module, is suitable to
When the state is opening, second interface is called to obtain the second user data of intended application;Then institute
State data providing module, be further adapted for using acquired second user data as intended application user data
There is provided.
Alternatively, described device also includes:Order receiver module, is suitable to the transmitted institute of reception source application
State user data and obtain order;Safety detection module, is adapted to detect for the safe class of source application, determines mesh
The state of the mark corresponding interface switch of application;Authority detection module, is adapted to detect for source application and obtains number of users
According to authority, determine the state of the corresponding interface switch of intended application.
Alternatively, the safety detection module, including:Safety value determination sub-module, is suitable to by institute
Stating source application carries out safety detection, determines the safety value of the source application;Safe class determination sub-module,
It is suitable for use with the safe class that the safety value determines the source application.
Alternatively, the safety value determination sub-module, including:Local detection unit, is suitable to local security
Each application message of source application of the software to installing is monitored respectively, determines the safety value of source application, its
In, the application message include it is following at least one:Apply Names, application version, publisher and installation
Time.
Alternatively, the safety value determination sub-module, including:Assessment result acquiring unit, is suitable in peace
During loading of source application, the security evaluation result of the source application being currently installed on is obtained from Cloud Server;Safety value is true
Order unit, is suitable for use with the security evaluation result and determines the safety value that the source being currently installed on is applied;Wherein,
The security evaluation result includes user's mark result and/or user's evaluation result.
Alternatively, the interface switch includes following at least one type:Short message interface switch, address list
Interface switch, positional interface switch and picture interface switch;Then the second user data at least include with
Lower any one:Second note data, the second address book data, the second geographic position data and second picture
Data;The first user data at least include following any one:First note data, the first address list
Data, the first geographic position data and the first image data.
Alternatively, the safety detection module, including:Judging submodule, is suitable to the peace of judgement source application
Whether congruent level can reach preset secure threshold;Interface switch opens submodule, and being suitable to should in the source
When safe class can reach secure threshold, the corresponding interface switch of the intended application is set on
Open state;Interface switch closes submodule, is suitable to that in the safe class of the source application safety can not be reached
During threshold value, the corresponding interface switch of the intended application is set to off closed state.
Alternatively, the interface switch opens submodule, and the safe class for being further adapted for the application of determination source can reach
To the type of secure threshold, applied for the source and the interface switch of respective type is set on shape
State;Wherein, the secure threshold includes following at least one type:Short message secure threshold, address list peace
Full threshold value, position secure threshold and picture secure threshold.
Alternatively, the authority detection module, including:Opening sets submodule, is suitable to when source should
In user data white list, then the authority for having and obtaining user data is applied in the source, by the mesh
Mark is set on state using corresponding interface switch;Closed mode sets submodule, is suitable to when source should
In user data blacklist, then the source, will be described using the authority without acquisition user data
The corresponding interface switch of intended application is set to off closed state.
Alternatively, described device also includes:White list module, is suitable to allow source to apply detecting user
When obtaining user data, source application is added in the user data white list;Black list module,
It is suitable to, when user's refusal source application acquisition user data is detected, source application is added into the use
In user data blacklist.
Alternatively, described device also includes:Modification information acquisition module, is suitable to that user's modification ought be detected
During the first user data of intended application, the modification information that user is submitted to is obtained;Update module, is suitable to
The first user data of the intended application are updated using the modification information.
Alternatively, described device also includes:Domain account acquisition module, is suitable to obtain the domain account of current system
Number;Preserving module, is suitable to preserve the first user data after renewal based on acquired domain account.
In embodiments of the present invention, the first user data of each intended application are pre-configured with, mesh is being detected
When the mark corresponding interface switch of application is closed mode, preset first user number is obtained by first interface
According to rear, provided first user data as the user data of intended application, thus solved the 3rd
The problem of the privacy leakage that square software obtains real user data and causes user, strengthens to number of users
According to protective effect, it is ensured that the personal secrets of user.
Described above is only the general introduction of technical solution of the present invention, in order to better understand skill of the invention
Art means, and can be practiced according to the content of specification, and it is of the invention above and other in order to allow
Objects, features and advantages can become apparent, below especially exemplified by specific embodiment of the invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are for this
Field those of ordinary skill will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment,
And it is not considered as limitation of the present invention.And in whole accompanying drawing, be denoted by the same reference numerals
Identical part.In the accompanying drawings:
The step of Fig. 1 shows a kind of method of offer user data according to an embodiment of the invention is flowed
Cheng Tu;
Fig. 2A shows a kind of step of method for providing user data in accordance with another embodiment of the present invention
Rapid flow chart;
Fig. 2 B show that a kind of safe class of detection source application of the embodiment of the present invention determines intended application
The step of state step of corresponding interface switch flow chart;
Fig. 3 A show a kind of structure of device for providing user data according to an embodiment of the invention
Block diagram;
Fig. 3 B show a kind of knot of device for providing user data in accordance with another embodiment of the present invention
Structure block diagram.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although being shown in accompanying drawing
The exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure without
Should be limited by embodiments set forth here.Conversely, there is provided these embodiments are able to more thoroughly
Understand the disclosure, and can by the scope of the present disclosure it is complete convey to those skilled in the art.
Mobile terminal can referred to as be applied by installing various application programs, to realize various work(
Can, there is provided diversified service, meet the demand of user.Wherein, the application that mobile terminal is installed can be with
Including:System application and third party application.System application is referred to as official's software,
Such as address list application program, short message application program, photograph album application program.Third party application also may be used
To be referred to as the 3rd software, such as email application, navigation application, mobile banking's attendant application,
Digital reading application program, multimedia player application program etc..It should be noted that mobile terminal is
The computer equipment that can be used in movement of finger, can include but are not limited to mobile phone, panel computer,
Notebook etc..
By taking smart mobile phone as an example, smart mobile phone can play audio by installing voice applications software;Also may be used
Video is played with by installing video player;Can also by install messaging application (such as wechat should
With program, footpath between fields footpath between fields application program) realize communication;Even can check ground by installing map application
Reason position, and navigation etc. can be realized by installing navigation application program.
Generally, it is necessary to the user of Open Access Journals mobile terminal during third party application is installed
The authority of data so that the 3rd application program can automatically obtain user data, to realize the 3rd application
The function of program.Wherein, the application program for obtaining user data (abbreviation source should equivalent to source application
With);The application program of user data is preserved equivalent to destination application (abbreviation intended application).For example,
When navigation application program is installed, it is necessary to the authority in Open Access Journals geographical position so that the navigation application journey
Sequence can automatically obtain the current geographical position of user, i.e., navigation application program (equivalent to source application) can
To obtain the geodata of system positioning application program (equivalent to intended application), led for the user provides
Boat service.
But, to the authority of the user data of third party application Open Access Journals mobile terminal, easily make
Into user data leakage, existence information safety problem.
Therefore, the present invention proposes a kind of method for providing user data, is pre-configured with the of intended application
One user data, equivalent to the fictitious users data of preset each intended application, by obtaining preset first
User data, is provided first user data as the user data of intended application, such that it is able to keep away
Exempt from source application to obtain the actual user data that is preserved of intended application and cause what privacy of user was revealed
Problem, protects the safety of user data.
Reference picture 1, shows a kind of method for providing user data according to an embodiment of the invention
Flow chart of steps, the method specifically may include steps of:
Step 101, in advance for each intended application configuration interface switch state and each intended application the
One user data.
Mobile terminal can configure the state of interface switch for each intended application in advance.Specifically, it is mobile
Terminal can automatically set each destination application corresponding source application according to the function needs of source application
Interface switch state.Certainly, mobile terminal can also set each target according to user's selection operation
The state of the interface switch of application program corresponding source application, the embodiment of the present invention is not any limitation as to this.Its
In, intended application refers to save the application of user data, and the address list for such as saving address book data should
With, save note data short message application, preserve geographic position data positioning application, preserve picture
Picture application of data etc., the embodiment of the present invention is not restricted to the type of intended application.
Additionally, mobile terminal can also pre-set the user data of falseness, false user data is protected
In in the presence of corresponding intended application, the first user data of the intended application are generated.Accordingly, can be by
The second user data of the non-preset actual user data referred to as intended application that intended application is preserved.
In fact, mobile terminal can respectively be controlled according to the state of the corresponding interface switch of intended application
Whether each source application can obtain the actual user data that intended application is preserved.Specifically, passing through
Interface switch can control whether to allow each source application to obtain the automatic power for reading actual user data
Limit, for the application of a certain source, if the corresponding interface switch of intended application is closed, does not permit
Perhaps source application obtains the automatic authority for reading actual user data, i.e. source application and cannot obtain target and answer
Second user data, but the first practical user data of intended application can be obtained;If intended application pair
When the interface switch answered is in opening, then the source is using the power with automatic reading actual user data
Limit, i.e. source application can obtain the second user data of intended application.For example, installing source application
Before, mobile terminal can close the corresponding interface switch of intended application so that the source application is not
The automatic authority for reading user data can be obtained, that is, causes that the source application should from reading target automatically
Second user data (i.e. non-preset actual user data), but the source application can be allowed
Read the first user data (i.e. preset fictitious users data) of intended application, it is to avoid its leakage user
Privacy.Accordingly, when the corresponding interface switch of intended application is in opening, the source application
The automatic authority for reading user data can be obtained, that is, allows the source application to read the of intended application
Two user data.
Certainly, can also be designed to interface switch in opening by those skilled in the art, source application
Program can not obtain the automatic authority for reading user data;When in off position, source application can be obtained
The dynamic authority for reading user data is taken from, the embodiment of the present invention need not be any limitation as to this.The present invention is implemented
When example is located at closed mode with interface switch, source application can not obtain the automatic power for reading user data
Example is limited to, is described.
It should be noted that the data that user data refers to intended application to be preserved, can include:It is preset
First user data and non-preset second user data, the type of user data can include but not only
Be limited to address list, short message, phone number, age of user, user's sex, geographical position, user account,
Access history and bookmark, log information, calendar and stroke, message registration, International Mobile Equipment Identity code
(International Mobile Equipment Identification Number, IMEI), international mobile use
Family identification code (International Mobile Subscriber Identification Number, IMSI), collection
Into circuit card identification code (Integrate Circuit Card Identity, ICCID), various kinds of sensors data,
One or more type therein such as mail, local file, the embodiment of the present invention is not any limitation as to this.
Step 103, detect order is obtained to the user data of intended application when, detect the target
Using the state of corresponding interface switch.
When source application needs to obtain the user data on mobile terminal, the source application can be to
Mobile terminal system sends user data and obtains request, i.e. user data acquisition order.Should in the source that receives
When obtaining order with transmitted user data, mobile terminal system can be obtained according to user data and ordered
Order, it is determined that the type of the user data of required acquisition, and the type of foundation user data determines the mesh
Mark application, order is obtained equivalent in detection to the user data of intended application.Should to target detecting
When user data obtains order, mobile terminal can be by searching in advance as the intended application configures right
The state of the interface switch answered, judges whether the corresponding interface switch of intended application is closed, i.e.,
Judge whether source application has the authority of the user data for reading intended application, should equivalent to detection target
With the state of corresponding interface switch, to determine whether that real user data is read in source application.
Step 105, when the status information be closed mode when, call first interface obtain intended application
First user data.
In fact, mobile terminal can set first interface, real user number is read source application is not allowed
In the case of, by calling first interface, the first user data of the intended application for pre-setting are obtained,
So that source application can get first user data, the need of source application acquisition user data are being met
While asking, it is to avoid source application obtains real user data and causes privacy of user to reveal.
Step 107, acquired first user data are carried as the user data of intended application
For.
Specifically, when the corresponding interface switch of intended application is closed, that is, user data is sent
The source of order is obtained using without the authority for reading user data, can be obtained by calling first interface
First user data, and acquired first user data are carried as the user data of intended application
For.In the case of in source using without the authority for reading user data, by the first preset use
User data feeds back to source application, so as to meet the demand that source application obtains data so that mobile terminal can
Service is provided with by intended application.
In embodiments of the present invention, mobile terminal can configure first user number for each intended application in advance
According to.When the acquisition data command of intended application is detected, can be preset by calling first interface to obtain
First user data, and be supplied to source to apply first user number, so as to avoid source application from obtaining true
User data by and cause privacy of user to be revealed, strengthen the protective effect to user data, it is ensured that
User information safety.
In fact, the application of some sources is got based on to real user data, its function could be realized.
Therefore, mobile terminal needs to open the authority for reading actual user data to these source applications.For example,
The navigation application program of smart mobile phone obtains the current geographical position of user and could be navigated for user, that is, need
To the authority in the navigation Open Access Journals geographical position so that the navigation application program can be chased after to user
Track, so as to provide the user the service of real-time navigation.
The mobile terminal of the embodiment of the present invention can also set second interface.Detecting intended application correspondence
Interface switch be in opening when, that is, send user data obtain order source using have read use
During the authority of user data, can by call second interface obtain intended application second user data (i.e.
Obtain real user data), and acquired second user data feedback is applied to source so that source
Using service can be provided the user based on actual user data, the demand of user is met.
Reference picture 2A, shows a kind of side for providing user data in accordance with another embodiment of the present invention
The step of method flow chart, the method specifically may include steps of:
Step 201, in advance for each intended application configuration interface switch state and each intended application the
One user data.
In implementing, mobile terminal can be the state that each intended application configures interface switch, and
The first user data of each application.When the interface switch of intended application is closed, by calling
First interface obtains the first user data of intended application;Shape is opened when the interface switch of intended application is in
During state, the second user data of intended application are obtained by calling second interface.So, can both meet
Source application obtains the demand of user data, realizes source using corresponding function, while leakage can also be avoided
Real user data, it is ensured that the personal secrets of user.
Step 203, the user data received transmitted by the application of source obtain order, determine intended application
The state of corresponding interface switch.
Specifically, during the application of the source of installation or operation source are applied, if source application needs to obtain mesh
The user data of application is marked, user data will be sent and obtained order, acquisition request intended application is preserved
User data.Mobile terminal is receiving the transmitted user data acquisition order of reception source application
When, i.e., when the user data acquisition order to intended application is detected, can be by detecting what source was applied
Safe class or source application obtain the authority of user data, determine the corresponding interface switch of intended application
State, that is, detect the state of the corresponding interface switch of intended application.If the corresponding interface switch of intended application
State be closed mode when, then perform step 205;If the state of the corresponding interface switch of intended application
During for opening, step 207 is performed.
Step 205, calls first interface to obtain the first user data of intended application, by acquired the
One user data is provided as the user data of intended application.
When the state of the corresponding interface switch of intended application is closed mode, equivalent to transmission to intended application
User data obtain order source using without obtain actual user data authority, such as the source application
Safe class can not reach the acquisition corresponding safe class of actual user data, may reveal and obtain its institute
The user data of acquisition, mobile terminal obtains the first use of preset intended application by calling first interface
User data, is supplied to the source to answer using acquired first user data as the user data of intended application
With.So, mobile terminal can both meet the demand that source application obtains user data, should by the source
With realizing corresponding function;Can also avoid revealing real user data, it is ensured that the personal secrets of user.
Step 207, calls second interface to obtain the second user data of intended application, by acquired the
Two user data are provided as the user data of intended application.
When the state of the corresponding interface switch of intended application is opening, should to target equivalent to sending
User data obtains the source of order using the authority with acquisition actual user data, such as source application
Safe class can not reach the acquisition corresponding safe class of actual user data, mobile terminal can pass through
Call second interface to obtain the second user data of intended application, that is, real user data is obtained, by institute
The second user data of acquisition are supplied to source to apply, and real user is read such that it is able to mark application by source
Data, provide the user service.
Used as a specific example of the invention, smart mobile phone is provided with second interface.For navigation application
(equivalent to source application), if positioning is in using the corresponding interface switch (equivalent to intended application) opening
When opening state, can by call second interface obtain positioning application second user data (i.e. user work as
Preceding geographic position data), it is supplied to navigation to answer the geographic position data of accessed active user
With so that navigation application can be based on the current geographical position of user and realize navigation feature, provide the user
Navigation Service.
In embodiments of the present invention, mobile terminal provides first interface and second interface, should in the source that receives
When obtaining order with transmitted user data, called according to the state of the corresponding interface switch of intended application
Corresponding interface obtains the user data of intended application, i.e., provided second user data by second interface
Apply to meet the functional requirement of the intended application to source, or used preset first by first interface
User data is supplied to source to apply to avoid source application from illegally obtaining real user data, such that it is able to avoid
Privacy of user is revealed, it is ensured that the safety of userspersonal information.
Substantially, mobile terminal is applied for different sources, sets the corresponding interface switch shape of intended application
State has various ways, such as a kind of is that the safe class applied by detection source determines intended application correspondence
Interface switch state, another kind be by detection source application obtain user data authority determine target
Using the state of corresponding interface switch, it is preferable to carry out with reference to of the invention, is specifically discussed.
(1) safe class applied by detection source determines the state of the corresponding interface switch of intended application
Reference picture 2B, shows that a kind of safe class of detection source application of the embodiment of the present invention determines mesh
The step of marking the state step of application corresponding interface switch flow chart.The safe class of detection source application,
The step of determining the state of intended application corresponding interface switch, can specifically wrap following sub-step:
Sub-step 20310, safety detection is carried out by source application, determines the peace of the source application
Total head.
Generally, when the user data acquisition order transmitted by the application of source is received, mobile terminal can be with pin
The source is applied, safety detection is carried out, to judge whether source application can reveal the number of users accessed by it
According to.Specifically, mobile terminal can be monitored by local fail-safe software to source application, source is determined
The safety value of application;The source application being currently installed on can also be obtained from Cloud Server when installation source is applied
Security evaluation result, based on state security evaluation result determine be currently installed on source application safety value.
In one preferred embodiment of the invention, safety detection is carried out by source application, it is determined that
The safety value of the source application, can include:Each application letter of source application of the local security software to installing
Breath is monitored respectively, determines the safety value of source application.Wherein, the application message include it is following at least
One:Apply Names, application version, publisher and set-up time.
Specifically, local security software can obtain the application message of source application, such as Apply Names, application
Version, publisher (i.e. the supplier of source application) or set-up time etc., according to preset security evaluation
Rule determines the corresponding safety value of each application message, and is determined based on the corresponding safety value of each application message
The safety value of source application.For example, the corresponding safety value of Apply Names of source application is 15, source application
The corresponding safety value of application version is 23, and the corresponding safety value of publisher is 50, and source application
Set-up time corresponding safety value is 5;The corresponding safety value of each application message to source application is counted,
Calculate the sum of the corresponding safety value of each application message, using the corresponding safety value of each application message and as should
The safety value of source application, you can to determine that the safety value that the source is applied is 93.Additionally, local security software
Can also be by monitoring source application operation behavior in an operating system, the operation behavior based on source application
Determine the safety value of source application.For example, carrying out non-secure operations in an operating system based on source application
Behavior record (as maliciously distorted user data), local security software can mark the source using for maliciously
Application program, the safety value for determining source application is 0.
Optionally, safety detection is carried out by source application, determines the safety value of the source application,
Can also include:When installation source is applied, the safety that the source application being currently installed on is obtained from Cloud Server is commented
Estimate result;The safety value that the source being currently installed on is applied is determined using the security evaluation result.Wherein, institute
Stating security evaluation result includes user's mark result and/or user's evaluation result.
In fact, user can be marked or comment on to source application, and Cloud Server can collect difference
Mark and comment that user applies to same source, generate the security evaluation result of source application.For example, cloud
Server can preserve the mark that the comment of user and user are carried out to the application of each source, the comment based on user
And mark determines safety label grade, source application is analyzed according to safety label grade, generates source
The security evaluation result of application.So, when installation source is applied, mobile terminal can be taken by connecting cloud
Business device, obtains the security evaluation result of the source application being currently installed on, based on what is got from Cloud Server
Security evaluation result determines the safety value of source application.
Sub-step 20312, the safe class that the source is applied is determined using the safety value.
In embodiments of the present invention, the different safety value scope of different safe class correspondences.By searching
Safety value scope belonging to the safety value of application program, the safety value scope that will can be found is corresponding
Safe class is defined as the safe class of the application program.For example, safety value is less than 60 points of corresponding peaces
Congruent level is danger;Safety value is safety more than 80 points of corresponding safe classes;Safety value is equal to or big
In 60 points, and no more than 80 points corresponding safe classes are control unknown risks.If the peace of application program
Total head is 80 points, so that it may which the safe class for determining the application program is control unknown risks.
In one preferred embodiment of the invention, interface switch includes following at least one type:Short message
Interface switch, address list interface switch, positional interface switch and picture interface switch;Then described second use
User data at least includes following any one:Second note data, the second address book data, the second geographical position
Put data and second picture data;The first user data at least include following any one:First is short
Letter data, the first address book data, the first geographic position data and the first image data.
In embodiments of the present invention, by setting the state of different types of interface switch, can be with voltage input
Application program obtains the authority of the actual user data of respective type, and such as short message interface switch can be used for control
Source application processed obtains the second note data or the first note data;Address list interface switch can be used
The second address list data or the first address list data are obtained in control source application;Positional interface is switched
Can be used for control source application and obtain the second geographic position data or the first geographic position data etc..
Whether sub-step 20314, judging the safe class of source application can reach preset secure threshold.
When the safe class of source application can reach secure threshold, sub-step 20316 is performed;When source application
Safe class can not reach secure threshold, perform sub-step 20318.
In embodiments of the present invention, can be by judging it is pre- whether the safe class of source application can reach
The secure threshold put, such that it is able to judge whether the source application can reveal number of users.Journey is applied in source
When the safe class of sequence can reach secure threshold, then can be determined that the source application will not reveal number of users
According to, open the corresponding interface switch of destination application, that is, perform sub-step 20316;Journey is applied in source
When the safe class of sequence can reach secure threshold, then can be determined that the source application can reveal number of users
According to, close the corresponding interface switch of the application program, that is, perform sub-step 20318.
It should be noted that secure threshold can represent that source application reveals the probability of user data, can
The margin of safety of user data may be revealed to be interpreted as source application.Specifically, if source should
The probability very little of safe class correspondence leakage user data, it can be understood as the source application can not
The safe class that user data, the i.e. source application can be revealed reaches preset secure threshold, can be by
The destination application to should the interface switch of source application be set on state, it is allowed to the source should
Real user data is read with program.If the safe class correspondence leakage user data of source application is general
Rate is than larger, it is possible to understand that the source application may reveal user data, the i.e. source application
Safe class can not reach secure threshold, can by destination application to should source application interface switch
It is set to off closed state so that the source application cannot read real user data, it is to avoid the use
Family program leakage user data.
Sub-step 20316, state is set on by the corresponding interface switch of the intended application.
Sub-step 20318, closed state is set to off by the corresponding interface switch of the intended application.
In fact, being directed to not homologous application, the safe class that mobile terminal can be based on source application sets each
The state of the corresponding interface switch of intended application of type.If the safe class of source application reaches preset
Secure threshold, the source application can be directed to, by the destination application of respective type to should source
The interface switch of application program is set on state, it is allowed to which the source application reads the mesh of correlation type
The second user data of application are marked, that is, causes the source using with the automatic real user for reading respective type
The authority of data.If the safe class of source application can not reach preset secure threshold, can be directed to
The source application, by the destination application of respective type to should the interface switch of source application set
Closed mode is set to, only allows the source application to read the first user number of the intended application of correlation type
According to that is, so that the source is using the authority without the automatic actual user data for reading respective type.
In one preferred embodiment of the invention, when the safe class of source application can reach safety threshold
Value, state is set on by the corresponding interface switch of the intended application, can be included:Determine that source should
Safe class can reach the type of secure threshold, applied for the source and open the interface of respective type
Pass is set on state.
Wherein, the secure threshold includes following at least one type:Short message secure threshold, address list peace
Full threshold value, position secure threshold and picture secure threshold.Short message secure threshold is used to control short message interface to open
Close;Address list secure threshold is used for communication control and records interface switch;Position secure threshold is used to control position
Mouth switch;The picture secure threshold is used to control picture interface switch.
As one of the invention specific implementation example, it is assumed that short message secure threshold is 85, position safety threshold
It is 75 to be worth, and picture secure threshold is 90, and safety detection is carried out by navigation application program, determines it
Safety value be 80, the safety value such that it is able to judge the navigation application can reach position secure threshold, and
Figure short message secure threshold and short message secure threshold can not be reached, you can to determine that the navigation application program can reach
Type to secure threshold is position.For the navigation application program, positional interface can be switched and set
It is opening so that the navigation application program can obtain the geographical position that user is currently located and (obtain
Take the second geographic position data), picture interface switch and short message interface switch can also be set off
State so that what the navigation application program got when image data and note data is read is preset
First image data and the first note data, it is to avoid it obtains real note data and image data.
Specifically, mobile terminal is directed to navigation application program, by the corresponding picture interface switch of picture application
And the corresponding short message interface switch of short message application is set to off closed state, positioning connects using corresponding position
Mouth switch is set on state.Life is obtained the user data transmitted by the navigation application program is detected
When making, mobile terminal is based on user data and obtains order, determines that intended application includes picture application, positioning
Using and positioning application, and then detect that picture application, positioning application and positioning apply corresponding interface switch
State, it is possible to by call first interface obtain the first note data and the first image data, and
The second geographic position data can be obtained by calling second interface, then can be by accessed first
Image data, the first note data and the second geographic position data are supplied to navigation application program, so that
The demand that navigation application program obtains user data can be met, the same of navigation Service is being provided the user
When, it is to avoid the navigation application program obtains real diagram data and note data.
Obviously, source application can once obtain a type of user data, it is also possible to once obtain two kinds
Or polytype user data, the embodiment of the present invention is not any limitation as to this.
(2) authority for obtaining user data by the application of detection source determines that the corresponding interface of intended application is opened
The state of pass
In embodiments of the present invention, detection source application obtains the authority of user data, determines intended application pair
The state of the interface switch answered, specifically can by judge source application whether in user data white list,
Or by judging source application whether in user data blacklist, to judge it is automatic whether source application has
Read the authority of actual user data.Wherein, the application in user data white list has and obtains truly
User data authority, application in user data blacklist has and obtains real user data
Authority.
In one preferred embodiment of the invention, detection source application obtains the authority of user data, it is determined that
The state of the corresponding interface switch of intended application, can include following sub-step:
Sub-step 20320, when source is applied in user data white list, then the source is using with acquisition
The authority of user data, state is set on by the corresponding interface switch of the intended application.
If specifically, mobile terminal finds source in the user data white list corresponding to intended application answering
Apply Names, it is possible to determine that source is applied in user data white list, then source application can have
The authority of user data is obtained, the corresponding interface switch of the intended application is set on state, made
Obtaining the source application can obtain the second user data of intended application.When mobile terminal is right in intended application institute
When the Apply Names less than source application is searched in the user data white list answered, mobile terminal can also be directed to
The source is applied, and is searched in the user data blacklist corresponding to intended application.If in intended application institute
The Apply Names of source application is found in corresponding user data blacklist, then performs sub-step 20322.
Sub-step 20322, when source is applied in user data blacklist, then the source is applied not having and is obtained
The authority of user data is taken, the corresponding interface switch of the intended application is set to off closed state.
If mobile terminal finds answering for source application in the user data blacklist corresponding to intended application
With title, it is possible to determine that source is applied in user data blacklist, i.e. source application is probably malicious application
Program, then the source is corresponding by the intended application using without the authority for obtaining real user data
Interface switch be set to off closed state so that the source user data that gets of application is intended application
First user data, such that it is able to avoid source application from obtaining real user data, it is ensured that privacy of user
Safety.
Certainly, if also being searched in the user data blacklist corresponding to intended application less than answering that source is applied
With title, mobile terminal can also carry out safety by local security software or Cloud Server to source application
Detection, and then can determine that the corresponding interface of intended application opens the light state, and being preserved, such as can be with
The Apply Names body for obtaining the source application of the second user data of intended application is added to the intended application institute
Corresponding user data white list, will obtain the application name of the source application of the first user data of intended application
Body is claimed to be added to the user data blacklist corresponding to the intended application.Mobile terminal can also be by user
Operation information, judge whether user allows source application to obtain real user data, that is, judge that user is
No permission source application obtains the second user data of intended application, and source application is added into the white name of user data
In list or user data blacklist.Specifically, allowing source application to obtain user data when user is detected
When, such as detect user and open the corresponding interface switch of intended application for source application, should by the source
With being added in the user data white list;User data is obtained when the source application of user's refusal is detected
When, such as detect user and close the corresponding interface switch of intended application for source application, should by the source
With being added in the user data blacklist.
In one preferred embodiment of the invention, the method for the offer user data can also include:When
When detecting the first user data of user's modification intended application, the modification information that user is submitted to is obtained;
The first user data of the intended application are updated using the modification information.
In implementing, user can change the first user that mobile terminal is configured by each intended application
Data, the first user data as the preset each intended application of operating system is deleted or modified.It is mobile whole
Hold when the first user data of user's modification intended application are detected, obtain the change letter that user is submitted to
Breath, the text message being input into such as acquisition user or the selected picture of user etc., using accessed
Modification information the first user data of intended application are updated, generation intended application it is new first use
User data.Additionally, mobile terminal can also be by new first user data by default first user data,
When calling first interface to obtain the first user data of intended application, the first user data of acquiescence are obtained
(i.e. new first user data).
Optionally, the method for the offer user data can also include:Obtain the domain account of current system;
The first user data after renewal are preserved based on acquired domain account.
In implementing, mobile terminal can also preserve the first user data that user is changed.Specifically
, after new first user data are generated, mobile terminal can by obtaining the domain account of current system,
New first user data are stored in the acquired corresponding database of domain account.
In embodiments of the present invention, mobile terminal can be used the first of intended application according to not same area account
User data is preserved, and when not same area account is switched, can be loaded according to domain account different independent
First user data, such that it is able to flexibly set the first user data of intended application, improve user's body
Test.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of combination of actions,
But those skilled in the art should know, the embodiment of the present invention is not limited by described sequence of movement
System, because according to the embodiment of the present invention, some steps can sequentially or simultaneously be carried out using other.Its
Secondary, those skilled in the art should also know, embodiment described in this description belongs to be preferable to carry out
Example, necessary to the involved action not necessarily embodiment of the present invention.
Reference picture 3A, shows a kind of device for providing user data according to an embodiment of the invention
Structured flowchart, can specifically include such as lower module:
Configuration module 301, is suitable in advance for the status information of each intended application configuration interface switch and each
The first user data of intended application.
Detection module 303, is suitable to when the user data acquisition order to intended application is detected, detection
The state of the corresponding interface switch of the intended application.
First user data acquisition module 305, is suitable to when the state of the interface switch is closed mode,
First interface is called to obtain the first user data of intended application.
Data providing module 307, be suitable to using acquired first user data as intended application user
Data are provided.
On the basis of Fig. 3 A, optionally, there is provided the device of user data can also include second user
Data acquisition module 309, as shown in Figure 3 B.
Wherein, second user data acquisition module 309, is suitable to the state in the interface switch to open
During state, second interface is called to obtain the second user data of intended application.Accordingly, data provide mould
Block 307, is further adapted for being provided acquired second user data as the user data of intended application.
In one kind of the invention is preferable to carry out, the device of the offer user data can also include following mould
Block:
Order receiver module 309, is suitable to the transmitted user data of reception source application and obtains order.
Safety detection module 311, is adapted to detect for the safe class of source application, determines that intended application is corresponding
The state of interface switch.
Authority detection module 313, is adapted to detect for the authority that source application obtains user data, determines that target should
With the state of corresponding interface switch.
Optionally, the safety detection module 311, can include following submodule:
Safety value determination sub-module 3110, is suitable to carry out safety detection by source application, determines institute
State the safety value of source application.
Safe class determination sub-module 3112, is suitable for use with the safety that the safety value determines the source application
Grade.
Judging submodule 3114, is suitable to judge whether the safe class of source application can reach preset safety threshold
Value.
Interface switch opens submodule 3116, is suitable to that in the safe class of the source application safety threshold can be reached
During value, the corresponding interface switch of the intended application is set on state.
Interface switch closes submodule 3118, is suitable to that in the safe class of the source application safety can not be reached
During threshold value, the corresponding interface switch of the intended application is set to off closed state.
In one preferred embodiment of the invention, safety value determination sub-module 3110 can include following
Unit:
Local detection unit 31100, is suitable to each application message of source application of the local security software to installing
It is monitored respectively, determines the safety value of source application.Wherein, source application application message include it is following extremely
One item missing:Apply Names, application version, publisher and set-up time.
Assessment result acquiring unit 31102, is suitable to, when installation source is applied, obtain current from Cloud Server
The security evaluation result of the source application of installation.
Safety value determining unit 31102, is suitable for use with the source that the security evaluation result determines to be currently installed on
The safety value of application.Wherein, the security evaluation result includes that user's mark result and/or user evaluate knot
Really.
In embodiments of the present invention, interface switch includes following at least one type:Short message interface switch,
Address list interface switch, positional interface switch and picture interface switch;Then the second user data are at least
Including following any one:Second note data, the second address book data, the second geographic position data and
Two image datas;The first user data at least include following any one:First note data, first
Address book data, the first geographic position data and the first image data.
Optionally, interface switch opens submodule 3116, and the safe class for being further adapted for the application of determination source can reach
To the type of secure threshold, applied for the source and the interface switch of respective type is set on shape
State.Wherein, the secure threshold includes following at least one type:Short message secure threshold, address list peace
Full threshold value, position secure threshold and picture secure threshold.
In a preferred embodiment of the invention, the authority detection module 313 can include following son
Module:
Opening sets submodule 3130, is suitable to be applied in user data white list when source, then described
Source obtains the authority of user data using having, and the corresponding interface switch of the intended application is set on
Open state.
Closed mode sets submodule 3130, is suitable to be applied in user data blacklist when source, then described
Be set to for the corresponding interface switch of the intended application using without the authority for obtaining user data by source
Closed mode.
In a preferred embodiment of the invention,
The device for providing user data can also include with lower module:
White list module 315, be suitable to detect user allow source application obtain user data when, by institute
Source application is stated to be added in the user data white list.
Black list module 317, is suitable to when user's refusal source application acquisition user data is detected, by institute
Source application is stated to be added in the user data blacklist.
Modification information acquisition module 319, is suitable to when the first user number for detecting user's modification intended application
According to when, obtain the modification information submitted to of user.
Update module 321, is suitable for use with the first user number that the modification information updates the intended application
According to.
Domain account acquisition module 323, is suitable to obtain the domain account of current system.
Preserving module 325, is suitable to carry out the first user data after renewal based on acquired domain account
Preserve.
For device embodiment, because it is substantially similar to embodiment of the method, so the comparing of description
Simply, the relevent part can refer to the partial explaination of embodiments of method.
Algorithm and display be not solid with any certain computer, virtual system or miscellaneous equipment provided herein
There is correlation.Various general-purpose systems can also be used together with based on teaching in this.As described above,
It is obvious to construct the structure required by this kind of system.Additionally, the present invention is not also for any specific
Programming language.It is understood that, it is possible to use various programming languages realize the content of invention described herein,
And the description done to language-specific above is to disclose preferred forms of the invention.
In specification mentioned herein, numerous specific details are set forth.It is to be appreciated, however, that this
Inventive embodiment can be put into practice in the case of without these details.In some instances, not
Known method, structure and technology are shown specifically, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect
Or it is multiple, in above to the description of exemplary embodiment of the invention, each feature of the invention is sometimes
It is grouped together into single embodiment, figure or descriptions thereof.However, should not be by the disclosure
Method be construed to reflect following intention:I.e. the present invention for required protection requirement ratio is in each claim
The middle more features of feature be expressly recited.More precisely, as the following claims reflect
As, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows
Thus claims of specific embodiment are expressly incorporated in the specific embodiment, wherein each right
It is required that in itself all as separate embodiments of the invention.
Those skilled in the art are appreciated that can be carried out certainly to the module in the equipment in embodiment
Adaptively change and they are arranged in one or more equipment different from the embodiment.Can be with
Module or unit or component in embodiment is combined into a module or unit or component, and in addition may be used
To be divided into multiple submodule or subelement or sub-component.Except such feature and/or process or
Outside at least some in unit exclude each other, can be using any combinations to this specification (including companion
With claim, summary and accompanying drawing) disclosed in all features and so disclosed any method or
All processes or unit of person's equipment are combined.Unless expressly stated otherwise, this specification (including companion
With claim, summary and accompanying drawing) disclosed in each feature can it is identical by offers, equally or phase
Replace like the alternative features of purpose.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include it
Some included features are rather than further feature, but the group of the feature of different embodiments in its embodiment
Conjunction means to be within the scope of the present invention and formed different embodiments.For example, in following power
In sharp claim, the one of any of embodiment required for protection mode can make in any combination
With.
All parts embodiment of the invention can be realized with hardware, or be processed with one or more
The software module run on device is realized, or is realized with combinations thereof.Those skilled in the art should
Understand, basis can be realized using microprocessor or digital signal processor (DSP) in practice
Some or all parts in the equipment of the offer user data of the embodiment of the present invention some or it is complete
Portion's function.The present invention is also implemented as performing some or all of method as described herein
Equipment or program of device (for example, computer program and computer program product).Such realization
Program of the invention can be stored on a computer-readable medium, or can be with one or more letter
Number form.Such signal can be downloaded from internet website and obtained, or above be carried in carrier signal
For, or provided in any other form.
It should be noted that above-described embodiment the present invention will be described rather than limiting the invention,
And those skilled in the art can design replacement without departing from the scope of the appended claims
Embodiment.In the claims, any reference symbol being located between bracket should not be configured to right
It is required that limitation.Word "comprising" does not exclude the presence of element or step not listed in the claims.It is located at
Word "a" or "an" before element does not exclude the presence of element as multiple.The present invention can be by
Realized in the hardware for including some different elements and by means of properly programmed computer.Enumerating
If in the unit claim of equipment for drying, several in these devices can be by same hardware
Embody.The use of word first, second, and third does not indicate that any order.Can be by
These words are construed to title.
The invention discloses A1, a kind of method of offer user data, including:In advance for each target should
With the state and the first user data of each intended application of configuration interface switch;Should to target detecting
When user data obtains order, the state of the corresponding interface switch of the intended application is detected;Work as institute
When stating state for closed mode, first interface is called to obtain the first user data of intended application;To be obtained
The first user data for taking are provided as the user data of intended application.
A2, the method as described in A1, also include:When the state is opening, second is called
Interface obtains the second user data of intended application;Using acquired second user data as intended application
User data provided.
A3, the method as described in A2, also include:The application transmitted user data in reception source is obtained
Take order;The safe class of detection source application, determines the state of the corresponding interface switch of intended application;Or
Person, detection source application obtains the authority of user data, determines the state of the corresponding interface switch of intended application.
The step of A4, the method as described in A3, safe class of detection source application, including:By right
The source application carries out safety detection, determines the safety value of the source application;Determined using the safety value
The safe class of the source application.
A5, the method as described in A4, safety detection is carried out by source application, determines the source
The safety value of application, including:Each application message of source application of the local security software to installing is carried out respectively
Monitoring, determine source application safety value, wherein, the application message include it is following at least one:Using
Title, application version, publisher and set-up time.
A6, the method as described in A4 or A5, safety detection is carried out by source application, it is determined that
The safety value of the source application, including:When installation source is applied, obtain what is be currently installed on from Cloud Server
The security evaluation result of source application;Determine what the source being currently installed on was applied using the security evaluation result
Safety value;Wherein, the security evaluation result includes user's mark result and/or user's evaluation result.
A7, the method as described in A2-A4 is any, the interface switch include following at least one type:
Short message interface switch, address list interface switch, positional interface switch and picture interface switch;Then described
Two user data at least include following any one:Second note data, the second address book data, the second ground
Reason position data and second picture data;The first user data at least include following any one:First
Note data, the first address book data, the first geographic position data and the first image data.
A8, the method as described in A7, the safe class of detection source application, determine that intended application is corresponding
The state of interface switch, including:Whether judge the safe class of source application can reach preset safety threshold
Value;When the safe class of source application can reach secure threshold, by the corresponding interface of the intended application
Switch is set on state;When the safe class of source application can not reach secure threshold, will be described
The corresponding interface switch of intended application is set to off closed state.
A9, the method as described in A8, when the safe class of source application can reach secure threshold, will
The corresponding interface switch of the intended application is set on state, including:Determine safety of source application etc.
Level can reach the type of secure threshold, applied for the source and be set on the interface switch of respective type
Open state;Wherein, the secure threshold includes following at least one type:Short message secure threshold, communication
Record secure threshold, position secure threshold and picture secure threshold.
A10, the method as described in A3, detection source application obtain the authority of user data, determine target
Using the state of corresponding interface switch, including:It is when source is applied in user data white list, then described
Source obtains the authority of user data using having, and the corresponding interface switch of the intended application is set on
Open state;When source is applied in user data blacklist, then the source is using without acquisition user data
Authority, the corresponding interface switch of the intended application is set to off closed state.
A11, the method as described in A10, methods described also include:Source is allowed to apply user is detected
When obtaining user data, source application is added in the user data white list;Detecting use
When family refusal source application obtains user data, source application is added to the user data blacklist
In.
A12, the method as described in A11, methods described also include:Should when user's modification target is detected
During first user data, the modification information that user is submitted to is obtained;Updated using the modification information
The first user data of the intended application.
A13, the method as described in A12, methods described also include:Obtain the domain account of current system;
The first user data after renewal are preserved based on acquired domain account.
The invention also discloses B7, a kind of device of offer user data, including:Configuration module, fits
It is that each intended application configures the state of interface switch and the first user data of each intended application in advance;
Detection module, is suitable to, when the user data acquisition order to intended application is detected, detect the target
Using the state of corresponding interface switch;First user data acquisition module, is suitable in the state to close
During closed state, first interface is called to obtain the first user data of intended application;Data providing module, fits
There is provided as the user data of intended application in using acquired first user data.
B15, the device as described in B14, also include:Second user data acquisition module, is suitable in institute
When stating state for opening, second interface is called to obtain the second user data of intended application;It is then described
Data providing module, is further adapted for entering acquired second user data as the user data of intended application
Row is provided.
B16, the device as described in B15, described device also include:Order receiver module, is suitable to receive
The application transmitted user data in source obtains order;Safety detection module, is adapted to detect for source application
Safe class, determines the state of the corresponding interface switch of intended application;Authority detection module, is adapted to detect for
Source application obtains the authority of user data, determines the state of the corresponding interface switch of intended application.
B17, the device as described in B16, the safety detection module, including:Safety value determines submodule
Block, is suitable to carry out safety detection by source application, determines the safety value of the source application;Safety
Grade determination sub-module, is suitable for use with the safe class that the safety value determines the source application.
B18, the device as described in B17, the safety value determination sub-module, including:Local detection list
Unit, each application message for being suitable to source application of the local security software to installing is monitored respectively, determines source
The safety value of application, wherein, the application message include it is following at least one:Apply Names, using version
Originally, publisher and set-up time.
B19, the device as described in B17 or B18, the safety value determination sub-module, including:
Assessment result acquiring unit, is suitable to, when installation source is applied, obtain what is be currently installed on from Cloud Server
The security evaluation result of source application;Safety value determining unit, is suitable for use with the security evaluation result and determines
The safety value of the source application being currently installed on;Wherein, the security evaluation result include user's mark result and
/ or user's evaluation result.
B20, the device as described in B15-B17 is any, the interface switch include following at least one
Type:Short message interface switch, address list interface switch, positional interface switch and picture interface switch;Then
The second user data at least include following any one:Second note data, the second address book data,
Second geographic position data and second picture data;The first user data at least include following any
:First note data, the first address book data, the first geographic position data and the first image data.
B21, the device as described in B20, the safety detection module, including:Judging submodule,
It is suitable to judge whether the safe class of source application can reach preset secure threshold;Interface switch opens submodule
Block, is suitable to when the safe class of source application can reach secure threshold, by intended application correspondence
Interface switch be set on state;Interface switch closes submodule, is suitable to the peace in source application
When congruent level can not reach secure threshold, the corresponding interface switch of the intended application is set off shape
State.
B22, the device as described in B21, the interface switch open submodule, and being further adapted for determination source should
Safe class can reach the type of secure threshold, applied for the source and open the interface of respective type
Pass is set on state;Wherein, the secure threshold includes following at least one type:Short message safety
Threshold value, address list secure threshold, position secure threshold and picture secure threshold.
B23, the device as described in B16 to B18 is any, the authority detection module, including:Open
State sets submodule, is suitable to be applied in user data white list when source, then the source is applied to have and obtained
The authority of user data is taken, the corresponding interface switch of the intended application is set on state;Close
State sets submodule, is suitable to be applied in user data blacklist when source, then the source is applied and do not had
The authority of user data is obtained, the corresponding interface switch of the intended application is set to off closed state.
B24, the device as described in B23, described device also include:White list module, is suitable in detection
When allowing source application to obtain user data to user, source application is added to the white name of the user data
Dan Zhong;Black list module, is suitable to when user's refusal source application acquisition user data is detected, will be described
Source application is added in the user data blacklist.
B25, the device as described in B23, described device also include:Modification information acquisition module, is suitable to
When the first user data of user's modification intended application are detected, the change letter that user is submitted to is obtained
Breath;Update module, is suitable for use with the first user data that the modification information updates the intended application.
B26, the device as described in B25, described device also include:Domain account acquisition module, is suitable to obtain
Take the domain account of current system;Preserving module, after being suitable to the domain account based on acquired in renewal first
User data is preserved.
Claims (10)
1. a kind of method for providing user data, methods described includes:
It is in advance the state and the first user number of each intended application of each intended application configuration interface switch
According to;
When the user data acquisition order to intended application is detected, detect that the intended application is corresponding
The state of interface switch;
When the state is closed mode, first interface is called to obtain the first user number of intended application
According to;
Acquired first user data are provided as the user data of intended application.
2. method according to claim 1, it is characterised in that methods described also includes:
When the state is opening, second interface is called to obtain the second user number of intended application
According to;
Acquired second user data are provided as the user data of intended application.
3. method according to claim 2, it is characterised in that also include:
The application transmitted user data in reception source obtains order;
The safe class of detection source application, determines the state of the corresponding interface switch of intended application;Or,
The application of detection source obtains the authority of user data, determines the shape of the corresponding interface switch of intended application
State.
4. method according to claim 3, it is characterised in that the safe class of detection source application
The step of, including:
Safety detection is carried out by source application, the safety value of the source application is determined;
The safe class that the source is applied is determined using the safety value.
5. method according to claim 4, it is characterised in that carried out by source application
Safety detection, determines the safety value of the source application, including:
Each application message of source application of the local security software to installing is monitored respectively, determines that source is applied
Safety value, wherein, the application message include it is following at least one:Apply Names, application version,
Publisher and set-up time.
6. the method according to claim 4 or 5, it is characterised in that applied by the source
Safety detection is carried out, the safety value of the source application is determined, including:
When installation source is applied, the security evaluation result of the source application being currently installed on is obtained from Cloud Server;
The safety value that the source being currently installed on is applied is determined using the security evaluation result;
Wherein, the security evaluation result includes user's mark result and/or user's evaluation result.
7. according to any described methods of claim 2-4, it is characterised in that the interface switch bag
Include following at least one type:Short message interface switch, address list interface switch, positional interface switch and figure
Piece interface switch;
Then the second user data at least include following any one:Second note data, the second address list
Data, the second geographic position data and second picture data;
The first user data at least include following any one:First note data, the first address list number
According to, the first geographic position data and the first image data.
8. method according to claim 7, it is characterised in that the safe class of detection source application,
Determine the state of the corresponding interface switch of intended application, including:
Whether judge the safe class of source application can reach preset secure threshold;
When the safe class of source application can reach secure threshold, by the corresponding interface of the intended application
Switch is set on state;
When the safe class of source application can not reach secure threshold, connect the intended application is corresponding
Mouth switch is set to off closed state.
9. method according to claim 8, it is characterised in that when the safety etc. of source application
Level can reach secure threshold, and the corresponding interface switch of the intended application is set on into state, including:
Determining the safe class of source application can reach the type of secure threshold, for the source using by accordingly
The interface switch of type is set on state;
Wherein, the secure threshold includes following at least one type:Short message secure threshold, address list peace
Full threshold value, position secure threshold and picture secure threshold.
10. it is a kind of provide user data device, including:
Configuration module, is suitable to be configured for each intended application in advance the state and each intended application of interface switch
First user data;
Detection module, is suitable to when the user data acquisition order to intended application is detected, and detection is described
The state of the corresponding interface switch of intended application;
First user data acquisition module, is suitable to, when the state is closed mode, call first interface
Obtain the first user data of intended application;
Data providing module, be suitable to using acquired first user data as intended application user data
There is provided.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510921136.0A CN106874748A (en) | 2015-12-11 | 2015-12-11 | A kind of method and apparatus that user data is provided |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510921136.0A CN106874748A (en) | 2015-12-11 | 2015-12-11 | A kind of method and apparatus that user data is provided |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106874748A true CN106874748A (en) | 2017-06-20 |
Family
ID=59177422
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510921136.0A Pending CN106874748A (en) | 2015-12-11 | 2015-12-11 | A kind of method and apparatus that user data is provided |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106874748A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107451488A (en) * | 2017-07-21 | 2017-12-08 | 珠海格力电器股份有限公司 | A kind of method, device and mobile terminal that personal information is provided |
WO2019109418A1 (en) * | 2017-12-05 | 2019-06-13 | 深圳云天励飞技术有限公司 | Data protection method and apparatus, computer apparatus, and readable storage medium |
CN109981873A (en) * | 2017-12-27 | 2019-07-05 | 珠海市君天电子科技有限公司 | A kind of address list permission open method, device and electronic equipment |
CN111487877A (en) * | 2019-01-28 | 2020-08-04 | 青岛海尔洗衣机有限公司 | Control method of household appliance |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070168578A1 (en) * | 2005-10-27 | 2007-07-19 | International Business Machines Corporation | System and method for data collection interface creation and data collection administration |
CN103246834A (en) * | 2012-02-07 | 2013-08-14 | 联想(北京)有限公司 | Control method and electronic device |
CN104091071A (en) * | 2014-07-09 | 2014-10-08 | 北京智谷睿拓技术服务有限公司 | Risk determining method and device for application programs |
CN105095788A (en) * | 2015-06-30 | 2015-11-25 | 北京奇虎科技有限公司 | Method, device and system for private data protection |
-
2015
- 2015-12-11 CN CN201510921136.0A patent/CN106874748A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070168578A1 (en) * | 2005-10-27 | 2007-07-19 | International Business Machines Corporation | System and method for data collection interface creation and data collection administration |
CN103246834A (en) * | 2012-02-07 | 2013-08-14 | 联想(北京)有限公司 | Control method and electronic device |
CN104091071A (en) * | 2014-07-09 | 2014-10-08 | 北京智谷睿拓技术服务有限公司 | Risk determining method and device for application programs |
CN105095788A (en) * | 2015-06-30 | 2015-11-25 | 北京奇虎科技有限公司 | Method, device and system for private data protection |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107451488A (en) * | 2017-07-21 | 2017-12-08 | 珠海格力电器股份有限公司 | A kind of method, device and mobile terminal that personal information is provided |
CN107451488B (en) * | 2017-07-21 | 2021-01-05 | 珠海格力电器股份有限公司 | Method and device for providing personal information and mobile terminal |
WO2019109418A1 (en) * | 2017-12-05 | 2019-06-13 | 深圳云天励飞技术有限公司 | Data protection method and apparatus, computer apparatus, and readable storage medium |
CN109981873A (en) * | 2017-12-27 | 2019-07-05 | 珠海市君天电子科技有限公司 | A kind of address list permission open method, device and electronic equipment |
CN111487877A (en) * | 2019-01-28 | 2020-08-04 | 青岛海尔洗衣机有限公司 | Control method of household appliance |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10778626B2 (en) | Determining authenticity of reported user action in cybersecurity risk assessment | |
US20220013036A1 (en) | Context-Aware Cybersecurity Training Systems, Apparatuses, and Methods | |
US9824609B2 (en) | Mock attack cybersecurity training system and methods | |
CN105144767B (en) | For checking the device and method and user terminal of message | |
US9215548B2 (en) | Methods and systems for rating privacy risk of applications for smart phones and other mobile platforms | |
US8650653B2 (en) | Trusted graphics rendering for safer browsing on mobile devices | |
US20170076099A1 (en) | An access method and apparatus for an application program based on an intelligent terminal device | |
KR101373986B1 (en) | Method and apparatus to vet an executable program using a model | |
CN106921799A (en) | A kind of mobile terminal safety means of defence and mobile terminal | |
CN106874748A (en) | A kind of method and apparatus that user data is provided | |
CN104462997B (en) | Method, device and system for protecting work data in mobile terminal | |
CN102801706A (en) | Terminal and security processing method for information contents | |
CN104980393B (en) | Method of calibration, system, server and terminal | |
CN106550031A (en) | The method and device of data backup | |
US20150215429A1 (en) | System and method for extracting identifiers from traffic of an unknown protocol | |
CN105827664B (en) | Leak detection method and device | |
CN107451488B (en) | Method and device for providing personal information and mobile terminal | |
CN109753808A (en) | A kind of privacy compromise methods of risk assessment and device | |
CN105095758B (en) | Screen locking applied program processing method, device and mobile terminal | |
US9047470B2 (en) | Secure provisioning of commercial off-the-shelf (COTS) devices | |
Schindler et al. | Privacy leak identification in third-party android libraries | |
CN108566643A (en) | APP access control methods, system, terminal device and storage medium | |
CN106295423A (en) | A kind of method for exhibiting data and client | |
CN108270743A (en) | A kind of information security verification method and terminal | |
CN109688096A (en) | Recognition methods, device, equipment and the computer readable storage medium of IP address |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170802 Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801 Applicant after: BEIJING ANYUNSHIJI TECHNOLOGY Co.,Ltd. Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park) Applicant before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170620 |
|
RJ01 | Rejection of invention patent application after publication |