CN106874748A - A kind of method and apparatus that user data is provided - Google Patents

A kind of method and apparatus that user data is provided Download PDF

Info

Publication number
CN106874748A
CN106874748A CN201510921136.0A CN201510921136A CN106874748A CN 106874748 A CN106874748 A CN 106874748A CN 201510921136 A CN201510921136 A CN 201510921136A CN 106874748 A CN106874748 A CN 106874748A
Authority
CN
China
Prior art keywords
application
user data
source
intended application
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510921136.0A
Other languages
Chinese (zh)
Inventor
连爽
杨帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510921136.0A priority Critical patent/CN106874748A/en
Publication of CN106874748A publication Critical patent/CN106874748A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of method and apparatus that user data is provided are the embodiment of the invention provides, methods described includes:It is in advance the state and the first user data of each intended application of each intended application configuration interface switch;When the user data acquisition order to intended application is detected, the state of the corresponding interface switch of the intended application is detected;When the state is closed mode, first interface is called to obtain the first user data of intended application;Acquired first user data are provided as the user data of intended application.Mobile terminal in the embodiment of the present invention can obtain preset first user data by first interface; there is provided first user data as the user data of intended application; thus solve the problems, such as third party software to obtain real user data and cause the privacy leakage of user; strengthen the protective effect to user data, it is ensured that the personal secrets of user.

Description

A kind of method and apparatus that user data is provided
Technical field
The present invention relates to technical field of communication safety and comprising, more particularly to a kind of method that user data is provided and A kind of device that user data is provided.
Background technology
With the fast development of the communication technology, especially with the popularization of mobile Internet, mobile terminal from Simple call instrument becomes an integrated information processing platform.At present, mobile terminal is mainly by installing Various application programs, to provide diversified service, meet the demand of user.
Generally, when user installs application program in the terminal, application program can automatically obtain reading and move The authority of the user data of dynamic terminal, user data is read such that it is able to automatic, such as short message reading data, The data such as address list, geographical position or account number cipher.It is special when application program is third party software It is not rogue program, these authorities are likely to result in user data leakage, cause the personal information quilt of user It is illegal to utilize, there is potential safety hazard.
Obviously, the application program installed on mobile terminals reads user data automatically, can cause user Privacy leakage, existence information safety problem.
The content of the invention
In view of the above problems, it is proposed that the present invention overcomes above mentioned problem or at least part of to provide one kind The method of offer user data that solves the above problems and the corresponding device that user data is provided.
According to one aspect of the present invention, there is provided a kind of method of offer user data, including:In advance It is the state and the first user data of each intended application of each intended application configuration interface switch;In detection When obtaining order to the user data to intended application, the corresponding interface switch of the intended application is detected State;When the state is closed mode, first interface is called to obtain the first user number of intended application According to;Acquired first user data are provided as the user data of intended application.
Alternatively, methods described also includes:When the state is opening, second interface is called to obtain Take the second user data of intended application;Using acquired second user data as intended application user Data are provided.
Alternatively, methods described also includes:The application transmitted user data in reception source obtains order; The safe class of detection source application, determines the state of the corresponding interface switch of intended application;Or, detection Source application obtains the authority of user data, determines the state of the corresponding interface switch of intended application.
Alternatively, the step of safe class of detection source application, including:Carried out by source application Safety detection, determines the safety value of the source application;The peace that the source is applied is determined using the safety value Congruent level.
Alternatively, safety detection is carried out by source application, determines the safety value of the source application, Including:Each application message of source application of the local security software to installing is monitored respectively, determines that source should Safety value, wherein, the application message include it is following at least one:Apply Names, application version, Publisher and set-up time.
Alternatively, safety detection is carried out by source application, determines the safety value of the source application, Including:When installation source is applied, the security evaluation result of the source application being currently installed on is obtained from Cloud Server; The safety value that the source being currently installed on is applied is determined using the security evaluation result;Wherein, the safety is commented Estimating result includes user's mark result and/or user's evaluation result.
Alternatively, interface switch includes following at least one type:Short message interface switch, address list interface Switch, positional interface switch and picture interface switch;Then the second user data at least include following One:Second note data, the second address book data, the second geographic position data and second picture data; The first user data at least include following any one:First note data, the first address book data, First geographic position data and the first image data.
Alternatively, the safe class of detection source application, determines the state of the corresponding interface switch of intended application, Including:Whether judge the safe class of source application can reach preset secure threshold;When source application Safe class can reach secure threshold, the corresponding interface switch of the intended application is set on shape State;When the safe class of source application can not reach secure threshold, connect the intended application is corresponding Mouth switch is set to off closed state.
Alternatively, when the safe class of source application can reach secure threshold, by the intended application pair The interface switch answered is set on state, including:Determining the safe class of source application can reach safety threshold The type of value, applies for the source and for the interface switch of respective type to be set on state;Wherein, The secure threshold includes following at least one type:Short message secure threshold, address list secure threshold, position Put secure threshold and picture secure threshold.
Alternatively, detection source application obtains the authority of user data, determines that the corresponding interface of intended application is opened The state of pass, including:When source is applied in user data white list, then the source is used using with acquisition The authority of user data, state is set on by the corresponding interface switch of the intended application;When source application In user data blacklist, then the source is applied without the authority for obtaining user data, by the mesh Mark is set to off closed state using corresponding interface switch.
Alternatively, methods described also includes:Detect user allow source application obtain user data when, Source application is added in the user data white list;Obtained the source application of user's refusal is detected During user data, source application is added in the user data blacklist.
Alternatively, methods described also includes:When the first user data for detecting user's modification intended application When, obtain the modification information that user is submitted to;The of the intended application is updated using the modification information One user data.
Alternatively, methods described also includes:Obtain the domain account of current system;Based on acquired domain account Number the first user data after renewal are preserved.
According to another aspect of the present invention, there is provided it is a kind of provide user data device, including:Configuration Module, is suitable to be in advance the state and the first use of each intended application of each intended application configuration interface switch User data;Detection module, is suitable to when the user data acquisition order to intended application is detected, detection The state of the corresponding interface switch of the intended application;First user data acquisition module, is suitable to described When state is closed mode, first interface is called to obtain the first user data of intended application;Data are provided Module, is suitable to be provided acquired first user data as the user data of intended application.
Alternatively, there is provided the device of user data also includes:Second user data acquisition module, is suitable to When the state is opening, second interface is called to obtain the second user data of intended application;Then institute State data providing module, be further adapted for using acquired second user data as intended application user data There is provided.
Alternatively, described device also includes:Order receiver module, is suitable to the transmitted institute of reception source application State user data and obtain order;Safety detection module, is adapted to detect for the safe class of source application, determines mesh The state of the mark corresponding interface switch of application;Authority detection module, is adapted to detect for source application and obtains number of users According to authority, determine the state of the corresponding interface switch of intended application.
Alternatively, the safety detection module, including:Safety value determination sub-module, is suitable to by institute Stating source application carries out safety detection, determines the safety value of the source application;Safe class determination sub-module, It is suitable for use with the safe class that the safety value determines the source application.
Alternatively, the safety value determination sub-module, including:Local detection unit, is suitable to local security Each application message of source application of the software to installing is monitored respectively, determines the safety value of source application, its In, the application message include it is following at least one:Apply Names, application version, publisher and installation Time.
Alternatively, the safety value determination sub-module, including:Assessment result acquiring unit, is suitable in peace During loading of source application, the security evaluation result of the source application being currently installed on is obtained from Cloud Server;Safety value is true Order unit, is suitable for use with the security evaluation result and determines the safety value that the source being currently installed on is applied;Wherein, The security evaluation result includes user's mark result and/or user's evaluation result.
Alternatively, the interface switch includes following at least one type:Short message interface switch, address list Interface switch, positional interface switch and picture interface switch;Then the second user data at least include with Lower any one:Second note data, the second address book data, the second geographic position data and second picture Data;The first user data at least include following any one:First note data, the first address list Data, the first geographic position data and the first image data.
Alternatively, the safety detection module, including:Judging submodule, is suitable to the peace of judgement source application Whether congruent level can reach preset secure threshold;Interface switch opens submodule, and being suitable to should in the source When safe class can reach secure threshold, the corresponding interface switch of the intended application is set on Open state;Interface switch closes submodule, is suitable to that in the safe class of the source application safety can not be reached During threshold value, the corresponding interface switch of the intended application is set to off closed state.
Alternatively, the interface switch opens submodule, and the safe class for being further adapted for the application of determination source can reach To the type of secure threshold, applied for the source and the interface switch of respective type is set on shape State;Wherein, the secure threshold includes following at least one type:Short message secure threshold, address list peace Full threshold value, position secure threshold and picture secure threshold.
Alternatively, the authority detection module, including:Opening sets submodule, is suitable to when source should In user data white list, then the authority for having and obtaining user data is applied in the source, by the mesh Mark is set on state using corresponding interface switch;Closed mode sets submodule, is suitable to when source should In user data blacklist, then the source, will be described using the authority without acquisition user data The corresponding interface switch of intended application is set to off closed state.
Alternatively, described device also includes:White list module, is suitable to allow source to apply detecting user When obtaining user data, source application is added in the user data white list;Black list module, It is suitable to, when user's refusal source application acquisition user data is detected, source application is added into the use In user data blacklist.
Alternatively, described device also includes:Modification information acquisition module, is suitable to that user's modification ought be detected During the first user data of intended application, the modification information that user is submitted to is obtained;Update module, is suitable to The first user data of the intended application are updated using the modification information.
Alternatively, described device also includes:Domain account acquisition module, is suitable to obtain the domain account of current system Number;Preserving module, is suitable to preserve the first user data after renewal based on acquired domain account.
In embodiments of the present invention, the first user data of each intended application are pre-configured with, mesh is being detected When the mark corresponding interface switch of application is closed mode, preset first user number is obtained by first interface According to rear, provided first user data as the user data of intended application, thus solved the 3rd The problem of the privacy leakage that square software obtains real user data and causes user, strengthens to number of users According to protective effect, it is ensured that the personal secrets of user.
Described above is only the general introduction of technical solution of the present invention, in order to better understand skill of the invention Art means, and can be practiced according to the content of specification, and it is of the invention above and other in order to allow Objects, features and advantages can become apparent, below especially exemplified by specific embodiment of the invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are for this Field those of ordinary skill will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, And it is not considered as limitation of the present invention.And in whole accompanying drawing, be denoted by the same reference numerals Identical part.In the accompanying drawings:
The step of Fig. 1 shows a kind of method of offer user data according to an embodiment of the invention is flowed Cheng Tu;
Fig. 2A shows a kind of step of method for providing user data in accordance with another embodiment of the present invention Rapid flow chart;
Fig. 2 B show that a kind of safe class of detection source application of the embodiment of the present invention determines intended application The step of state step of corresponding interface switch flow chart;
Fig. 3 A show a kind of structure of device for providing user data according to an embodiment of the invention Block diagram;
Fig. 3 B show a kind of knot of device for providing user data in accordance with another embodiment of the present invention Structure block diagram.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although being shown in accompanying drawing The exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure without Should be limited by embodiments set forth here.Conversely, there is provided these embodiments are able to more thoroughly Understand the disclosure, and can by the scope of the present disclosure it is complete convey to those skilled in the art.
Mobile terminal can referred to as be applied by installing various application programs, to realize various work( Can, there is provided diversified service, meet the demand of user.Wherein, the application that mobile terminal is installed can be with Including:System application and third party application.System application is referred to as official's software, Such as address list application program, short message application program, photograph album application program.Third party application also may be used To be referred to as the 3rd software, such as email application, navigation application, mobile banking's attendant application, Digital reading application program, multimedia player application program etc..It should be noted that mobile terminal is The computer equipment that can be used in movement of finger, can include but are not limited to mobile phone, panel computer, Notebook etc..
By taking smart mobile phone as an example, smart mobile phone can play audio by installing voice applications software;Also may be used Video is played with by installing video player;Can also by install messaging application (such as wechat should With program, footpath between fields footpath between fields application program) realize communication;Even can check ground by installing map application Reason position, and navigation etc. can be realized by installing navigation application program.
Generally, it is necessary to the user of Open Access Journals mobile terminal during third party application is installed The authority of data so that the 3rd application program can automatically obtain user data, to realize the 3rd application The function of program.Wherein, the application program for obtaining user data (abbreviation source should equivalent to source application With);The application program of user data is preserved equivalent to destination application (abbreviation intended application).For example, When navigation application program is installed, it is necessary to the authority in Open Access Journals geographical position so that the navigation application journey Sequence can automatically obtain the current geographical position of user, i.e., navigation application program (equivalent to source application) can To obtain the geodata of system positioning application program (equivalent to intended application), led for the user provides Boat service.
But, to the authority of the user data of third party application Open Access Journals mobile terminal, easily make Into user data leakage, existence information safety problem.
Therefore, the present invention proposes a kind of method for providing user data, is pre-configured with the of intended application One user data, equivalent to the fictitious users data of preset each intended application, by obtaining preset first User data, is provided first user data as the user data of intended application, such that it is able to keep away Exempt from source application to obtain the actual user data that is preserved of intended application and cause what privacy of user was revealed Problem, protects the safety of user data.
Reference picture 1, shows a kind of method for providing user data according to an embodiment of the invention Flow chart of steps, the method specifically may include steps of:
Step 101, in advance for each intended application configuration interface switch state and each intended application the One user data.
Mobile terminal can configure the state of interface switch for each intended application in advance.Specifically, it is mobile Terminal can automatically set each destination application corresponding source application according to the function needs of source application Interface switch state.Certainly, mobile terminal can also set each target according to user's selection operation The state of the interface switch of application program corresponding source application, the embodiment of the present invention is not any limitation as to this.Its In, intended application refers to save the application of user data, and the address list for such as saving address book data should With, save note data short message application, preserve geographic position data positioning application, preserve picture Picture application of data etc., the embodiment of the present invention is not restricted to the type of intended application.
Additionally, mobile terminal can also pre-set the user data of falseness, false user data is protected In in the presence of corresponding intended application, the first user data of the intended application are generated.Accordingly, can be by The second user data of the non-preset actual user data referred to as intended application that intended application is preserved.
In fact, mobile terminal can respectively be controlled according to the state of the corresponding interface switch of intended application Whether each source application can obtain the actual user data that intended application is preserved.Specifically, passing through Interface switch can control whether to allow each source application to obtain the automatic power for reading actual user data Limit, for the application of a certain source, if the corresponding interface switch of intended application is closed, does not permit Perhaps source application obtains the automatic authority for reading actual user data, i.e. source application and cannot obtain target and answer Second user data, but the first practical user data of intended application can be obtained;If intended application pair When the interface switch answered is in opening, then the source is using the power with automatic reading actual user data Limit, i.e. source application can obtain the second user data of intended application.For example, installing source application Before, mobile terminal can close the corresponding interface switch of intended application so that the source application is not The automatic authority for reading user data can be obtained, that is, causes that the source application should from reading target automatically Second user data (i.e. non-preset actual user data), but the source application can be allowed Read the first user data (i.e. preset fictitious users data) of intended application, it is to avoid its leakage user Privacy.Accordingly, when the corresponding interface switch of intended application is in opening, the source application The automatic authority for reading user data can be obtained, that is, allows the source application to read the of intended application Two user data.
Certainly, can also be designed to interface switch in opening by those skilled in the art, source application Program can not obtain the automatic authority for reading user data;When in off position, source application can be obtained The dynamic authority for reading user data is taken from, the embodiment of the present invention need not be any limitation as to this.The present invention is implemented When example is located at closed mode with interface switch, source application can not obtain the automatic power for reading user data Example is limited to, is described.
It should be noted that the data that user data refers to intended application to be preserved, can include:It is preset First user data and non-preset second user data, the type of user data can include but not only Be limited to address list, short message, phone number, age of user, user's sex, geographical position, user account, Access history and bookmark, log information, calendar and stroke, message registration, International Mobile Equipment Identity code (International Mobile Equipment Identification Number, IMEI), international mobile use Family identification code (International Mobile Subscriber Identification Number, IMSI), collection Into circuit card identification code (Integrate Circuit Card Identity, ICCID), various kinds of sensors data, One or more type therein such as mail, local file, the embodiment of the present invention is not any limitation as to this.
Step 103, detect order is obtained to the user data of intended application when, detect the target Using the state of corresponding interface switch.
When source application needs to obtain the user data on mobile terminal, the source application can be to Mobile terminal system sends user data and obtains request, i.e. user data acquisition order.Should in the source that receives When obtaining order with transmitted user data, mobile terminal system can be obtained according to user data and ordered Order, it is determined that the type of the user data of required acquisition, and the type of foundation user data determines the mesh Mark application, order is obtained equivalent in detection to the user data of intended application.Should to target detecting When user data obtains order, mobile terminal can be by searching in advance as the intended application configures right The state of the interface switch answered, judges whether the corresponding interface switch of intended application is closed, i.e., Judge whether source application has the authority of the user data for reading intended application, should equivalent to detection target With the state of corresponding interface switch, to determine whether that real user data is read in source application.
Step 105, when the status information be closed mode when, call first interface obtain intended application First user data.
In fact, mobile terminal can set first interface, real user number is read source application is not allowed In the case of, by calling first interface, the first user data of the intended application for pre-setting are obtained, So that source application can get first user data, the need of source application acquisition user data are being met While asking, it is to avoid source application obtains real user data and causes privacy of user to reveal.
Step 107, acquired first user data are carried as the user data of intended application For.
Specifically, when the corresponding interface switch of intended application is closed, that is, user data is sent The source of order is obtained using without the authority for reading user data, can be obtained by calling first interface First user data, and acquired first user data are carried as the user data of intended application For.In the case of in source using without the authority for reading user data, by the first preset use User data feeds back to source application, so as to meet the demand that source application obtains data so that mobile terminal can Service is provided with by intended application.
In embodiments of the present invention, mobile terminal can configure first user number for each intended application in advance According to.When the acquisition data command of intended application is detected, can be preset by calling first interface to obtain First user data, and be supplied to source to apply first user number, so as to avoid source application from obtaining true User data by and cause privacy of user to be revealed, strengthen the protective effect to user data, it is ensured that User information safety.
In fact, the application of some sources is got based on to real user data, its function could be realized. Therefore, mobile terminal needs to open the authority for reading actual user data to these source applications.For example, The navigation application program of smart mobile phone obtains the current geographical position of user and could be navigated for user, that is, need To the authority in the navigation Open Access Journals geographical position so that the navigation application program can be chased after to user Track, so as to provide the user the service of real-time navigation.
The mobile terminal of the embodiment of the present invention can also set second interface.Detecting intended application correspondence Interface switch be in opening when, that is, send user data obtain order source using have read use During the authority of user data, can by call second interface obtain intended application second user data (i.e. Obtain real user data), and acquired second user data feedback is applied to source so that source Using service can be provided the user based on actual user data, the demand of user is met.
Reference picture 2A, shows a kind of side for providing user data in accordance with another embodiment of the present invention The step of method flow chart, the method specifically may include steps of:
Step 201, in advance for each intended application configuration interface switch state and each intended application the One user data.
In implementing, mobile terminal can be the state that each intended application configures interface switch, and The first user data of each application.When the interface switch of intended application is closed, by calling First interface obtains the first user data of intended application;Shape is opened when the interface switch of intended application is in During state, the second user data of intended application are obtained by calling second interface.So, can both meet Source application obtains the demand of user data, realizes source using corresponding function, while leakage can also be avoided Real user data, it is ensured that the personal secrets of user.
Step 203, the user data received transmitted by the application of source obtain order, determine intended application The state of corresponding interface switch.
Specifically, during the application of the source of installation or operation source are applied, if source application needs to obtain mesh The user data of application is marked, user data will be sent and obtained order, acquisition request intended application is preserved User data.Mobile terminal is receiving the transmitted user data acquisition order of reception source application When, i.e., when the user data acquisition order to intended application is detected, can be by detecting what source was applied Safe class or source application obtain the authority of user data, determine the corresponding interface switch of intended application State, that is, detect the state of the corresponding interface switch of intended application.If the corresponding interface switch of intended application State be closed mode when, then perform step 205;If the state of the corresponding interface switch of intended application During for opening, step 207 is performed.
Step 205, calls first interface to obtain the first user data of intended application, by acquired the One user data is provided as the user data of intended application.
When the state of the corresponding interface switch of intended application is closed mode, equivalent to transmission to intended application User data obtain order source using without obtain actual user data authority, such as the source application Safe class can not reach the acquisition corresponding safe class of actual user data, may reveal and obtain its institute The user data of acquisition, mobile terminal obtains the first use of preset intended application by calling first interface User data, is supplied to the source to answer using acquired first user data as the user data of intended application With.So, mobile terminal can both meet the demand that source application obtains user data, should by the source With realizing corresponding function;Can also avoid revealing real user data, it is ensured that the personal secrets of user.
Step 207, calls second interface to obtain the second user data of intended application, by acquired the Two user data are provided as the user data of intended application.
When the state of the corresponding interface switch of intended application is opening, should to target equivalent to sending User data obtains the source of order using the authority with acquisition actual user data, such as source application Safe class can not reach the acquisition corresponding safe class of actual user data, mobile terminal can pass through Call second interface to obtain the second user data of intended application, that is, real user data is obtained, by institute The second user data of acquisition are supplied to source to apply, and real user is read such that it is able to mark application by source Data, provide the user service.
Used as a specific example of the invention, smart mobile phone is provided with second interface.For navigation application (equivalent to source application), if positioning is in using the corresponding interface switch (equivalent to intended application) opening When opening state, can by call second interface obtain positioning application second user data (i.e. user work as Preceding geographic position data), it is supplied to navigation to answer the geographic position data of accessed active user With so that navigation application can be based on the current geographical position of user and realize navigation feature, provide the user Navigation Service.
In embodiments of the present invention, mobile terminal provides first interface and second interface, should in the source that receives When obtaining order with transmitted user data, called according to the state of the corresponding interface switch of intended application Corresponding interface obtains the user data of intended application, i.e., provided second user data by second interface Apply to meet the functional requirement of the intended application to source, or used preset first by first interface User data is supplied to source to apply to avoid source application from illegally obtaining real user data, such that it is able to avoid Privacy of user is revealed, it is ensured that the safety of userspersonal information.
Substantially, mobile terminal is applied for different sources, sets the corresponding interface switch shape of intended application State has various ways, such as a kind of is that the safe class applied by detection source determines intended application correspondence Interface switch state, another kind be by detection source application obtain user data authority determine target Using the state of corresponding interface switch, it is preferable to carry out with reference to of the invention, is specifically discussed.
(1) safe class applied by detection source determines the state of the corresponding interface switch of intended application
Reference picture 2B, shows that a kind of safe class of detection source application of the embodiment of the present invention determines mesh The step of marking the state step of application corresponding interface switch flow chart.The safe class of detection source application, The step of determining the state of intended application corresponding interface switch, can specifically wrap following sub-step:
Sub-step 20310, safety detection is carried out by source application, determines the peace of the source application Total head.
Generally, when the user data acquisition order transmitted by the application of source is received, mobile terminal can be with pin The source is applied, safety detection is carried out, to judge whether source application can reveal the number of users accessed by it According to.Specifically, mobile terminal can be monitored by local fail-safe software to source application, source is determined The safety value of application;The source application being currently installed on can also be obtained from Cloud Server when installation source is applied Security evaluation result, based on state security evaluation result determine be currently installed on source application safety value.
In one preferred embodiment of the invention, safety detection is carried out by source application, it is determined that The safety value of the source application, can include:Each application letter of source application of the local security software to installing Breath is monitored respectively, determines the safety value of source application.Wherein, the application message include it is following at least One:Apply Names, application version, publisher and set-up time.
Specifically, local security software can obtain the application message of source application, such as Apply Names, application Version, publisher (i.e. the supplier of source application) or set-up time etc., according to preset security evaluation Rule determines the corresponding safety value of each application message, and is determined based on the corresponding safety value of each application message The safety value of source application.For example, the corresponding safety value of Apply Names of source application is 15, source application The corresponding safety value of application version is 23, and the corresponding safety value of publisher is 50, and source application Set-up time corresponding safety value is 5;The corresponding safety value of each application message to source application is counted, Calculate the sum of the corresponding safety value of each application message, using the corresponding safety value of each application message and as should The safety value of source application, you can to determine that the safety value that the source is applied is 93.Additionally, local security software Can also be by monitoring source application operation behavior in an operating system, the operation behavior based on source application Determine the safety value of source application.For example, carrying out non-secure operations in an operating system based on source application Behavior record (as maliciously distorted user data), local security software can mark the source using for maliciously Application program, the safety value for determining source application is 0.
Optionally, safety detection is carried out by source application, determines the safety value of the source application, Can also include:When installation source is applied, the safety that the source application being currently installed on is obtained from Cloud Server is commented Estimate result;The safety value that the source being currently installed on is applied is determined using the security evaluation result.Wherein, institute Stating security evaluation result includes user's mark result and/or user's evaluation result.
In fact, user can be marked or comment on to source application, and Cloud Server can collect difference Mark and comment that user applies to same source, generate the security evaluation result of source application.For example, cloud Server can preserve the mark that the comment of user and user are carried out to the application of each source, the comment based on user And mark determines safety label grade, source application is analyzed according to safety label grade, generates source The security evaluation result of application.So, when installation source is applied, mobile terminal can be taken by connecting cloud Business device, obtains the security evaluation result of the source application being currently installed on, based on what is got from Cloud Server Security evaluation result determines the safety value of source application.
Sub-step 20312, the safe class that the source is applied is determined using the safety value.
In embodiments of the present invention, the different safety value scope of different safe class correspondences.By searching Safety value scope belonging to the safety value of application program, the safety value scope that will can be found is corresponding Safe class is defined as the safe class of the application program.For example, safety value is less than 60 points of corresponding peaces Congruent level is danger;Safety value is safety more than 80 points of corresponding safe classes;Safety value is equal to or big In 60 points, and no more than 80 points corresponding safe classes are control unknown risks.If the peace of application program Total head is 80 points, so that it may which the safe class for determining the application program is control unknown risks.
In one preferred embodiment of the invention, interface switch includes following at least one type:Short message Interface switch, address list interface switch, positional interface switch and picture interface switch;Then described second use User data at least includes following any one:Second note data, the second address book data, the second geographical position Put data and second picture data;The first user data at least include following any one:First is short Letter data, the first address book data, the first geographic position data and the first image data.
In embodiments of the present invention, by setting the state of different types of interface switch, can be with voltage input Application program obtains the authority of the actual user data of respective type, and such as short message interface switch can be used for control Source application processed obtains the second note data or the first note data;Address list interface switch can be used The second address list data or the first address list data are obtained in control source application;Positional interface is switched Can be used for control source application and obtain the second geographic position data or the first geographic position data etc..
Whether sub-step 20314, judging the safe class of source application can reach preset secure threshold.
When the safe class of source application can reach secure threshold, sub-step 20316 is performed;When source application Safe class can not reach secure threshold, perform sub-step 20318.
In embodiments of the present invention, can be by judging it is pre- whether the safe class of source application can reach The secure threshold put, such that it is able to judge whether the source application can reveal number of users.Journey is applied in source When the safe class of sequence can reach secure threshold, then can be determined that the source application will not reveal number of users According to, open the corresponding interface switch of destination application, that is, perform sub-step 20316;Journey is applied in source When the safe class of sequence can reach secure threshold, then can be determined that the source application can reveal number of users According to, close the corresponding interface switch of the application program, that is, perform sub-step 20318.
It should be noted that secure threshold can represent that source application reveals the probability of user data, can The margin of safety of user data may be revealed to be interpreted as source application.Specifically, if source should The probability very little of safe class correspondence leakage user data, it can be understood as the source application can not The safe class that user data, the i.e. source application can be revealed reaches preset secure threshold, can be by The destination application to should the interface switch of source application be set on state, it is allowed to the source should Real user data is read with program.If the safe class correspondence leakage user data of source application is general Rate is than larger, it is possible to understand that the source application may reveal user data, the i.e. source application Safe class can not reach secure threshold, can by destination application to should source application interface switch It is set to off closed state so that the source application cannot read real user data, it is to avoid the use Family program leakage user data.
Sub-step 20316, state is set on by the corresponding interface switch of the intended application.
Sub-step 20318, closed state is set to off by the corresponding interface switch of the intended application.
In fact, being directed to not homologous application, the safe class that mobile terminal can be based on source application sets each The state of the corresponding interface switch of intended application of type.If the safe class of source application reaches preset Secure threshold, the source application can be directed to, by the destination application of respective type to should source The interface switch of application program is set on state, it is allowed to which the source application reads the mesh of correlation type The second user data of application are marked, that is, causes the source using with the automatic real user for reading respective type The authority of data.If the safe class of source application can not reach preset secure threshold, can be directed to The source application, by the destination application of respective type to should the interface switch of source application set Closed mode is set to, only allows the source application to read the first user number of the intended application of correlation type According to that is, so that the source is using the authority without the automatic actual user data for reading respective type.
In one preferred embodiment of the invention, when the safe class of source application can reach safety threshold Value, state is set on by the corresponding interface switch of the intended application, can be included:Determine that source should Safe class can reach the type of secure threshold, applied for the source and open the interface of respective type Pass is set on state.
Wherein, the secure threshold includes following at least one type:Short message secure threshold, address list peace Full threshold value, position secure threshold and picture secure threshold.Short message secure threshold is used to control short message interface to open Close;Address list secure threshold is used for communication control and records interface switch;Position secure threshold is used to control position Mouth switch;The picture secure threshold is used to control picture interface switch.
As one of the invention specific implementation example, it is assumed that short message secure threshold is 85, position safety threshold It is 75 to be worth, and picture secure threshold is 90, and safety detection is carried out by navigation application program, determines it Safety value be 80, the safety value such that it is able to judge the navigation application can reach position secure threshold, and Figure short message secure threshold and short message secure threshold can not be reached, you can to determine that the navigation application program can reach Type to secure threshold is position.For the navigation application program, positional interface can be switched and set It is opening so that the navigation application program can obtain the geographical position that user is currently located and (obtain Take the second geographic position data), picture interface switch and short message interface switch can also be set off State so that what the navigation application program got when image data and note data is read is preset First image data and the first note data, it is to avoid it obtains real note data and image data.
Specifically, mobile terminal is directed to navigation application program, by the corresponding picture interface switch of picture application And the corresponding short message interface switch of short message application is set to off closed state, positioning connects using corresponding position Mouth switch is set on state.Life is obtained the user data transmitted by the navigation application program is detected When making, mobile terminal is based on user data and obtains order, determines that intended application includes picture application, positioning Using and positioning application, and then detect that picture application, positioning application and positioning apply corresponding interface switch State, it is possible to by call first interface obtain the first note data and the first image data, and The second geographic position data can be obtained by calling second interface, then can be by accessed first Image data, the first note data and the second geographic position data are supplied to navigation application program, so that The demand that navigation application program obtains user data can be met, the same of navigation Service is being provided the user When, it is to avoid the navigation application program obtains real diagram data and note data.
Obviously, source application can once obtain a type of user data, it is also possible to once obtain two kinds Or polytype user data, the embodiment of the present invention is not any limitation as to this.
(2) authority for obtaining user data by the application of detection source determines that the corresponding interface of intended application is opened The state of pass
In embodiments of the present invention, detection source application obtains the authority of user data, determines intended application pair The state of the interface switch answered, specifically can by judge source application whether in user data white list, Or by judging source application whether in user data blacklist, to judge it is automatic whether source application has Read the authority of actual user data.Wherein, the application in user data white list has and obtains truly User data authority, application in user data blacklist has and obtains real user data Authority.
In one preferred embodiment of the invention, detection source application obtains the authority of user data, it is determined that The state of the corresponding interface switch of intended application, can include following sub-step:
Sub-step 20320, when source is applied in user data white list, then the source is using with acquisition The authority of user data, state is set on by the corresponding interface switch of the intended application.
If specifically, mobile terminal finds source in the user data white list corresponding to intended application answering Apply Names, it is possible to determine that source is applied in user data white list, then source application can have The authority of user data is obtained, the corresponding interface switch of the intended application is set on state, made Obtaining the source application can obtain the second user data of intended application.When mobile terminal is right in intended application institute When the Apply Names less than source application is searched in the user data white list answered, mobile terminal can also be directed to The source is applied, and is searched in the user data blacklist corresponding to intended application.If in intended application institute The Apply Names of source application is found in corresponding user data blacklist, then performs sub-step 20322.
Sub-step 20322, when source is applied in user data blacklist, then the source is applied not having and is obtained The authority of user data is taken, the corresponding interface switch of the intended application is set to off closed state.
If mobile terminal finds answering for source application in the user data blacklist corresponding to intended application With title, it is possible to determine that source is applied in user data blacklist, i.e. source application is probably malicious application Program, then the source is corresponding by the intended application using without the authority for obtaining real user data Interface switch be set to off closed state so that the source user data that gets of application is intended application First user data, such that it is able to avoid source application from obtaining real user data, it is ensured that privacy of user Safety.
Certainly, if also being searched in the user data blacklist corresponding to intended application less than answering that source is applied With title, mobile terminal can also carry out safety by local security software or Cloud Server to source application Detection, and then can determine that the corresponding interface of intended application opens the light state, and being preserved, such as can be with The Apply Names body for obtaining the source application of the second user data of intended application is added to the intended application institute Corresponding user data white list, will obtain the application name of the source application of the first user data of intended application Body is claimed to be added to the user data blacklist corresponding to the intended application.Mobile terminal can also be by user Operation information, judge whether user allows source application to obtain real user data, that is, judge that user is No permission source application obtains the second user data of intended application, and source application is added into the white name of user data In list or user data blacklist.Specifically, allowing source application to obtain user data when user is detected When, such as detect user and open the corresponding interface switch of intended application for source application, should by the source With being added in the user data white list;User data is obtained when the source application of user's refusal is detected When, such as detect user and close the corresponding interface switch of intended application for source application, should by the source With being added in the user data blacklist.
In one preferred embodiment of the invention, the method for the offer user data can also include:When When detecting the first user data of user's modification intended application, the modification information that user is submitted to is obtained; The first user data of the intended application are updated using the modification information.
In implementing, user can change the first user that mobile terminal is configured by each intended application Data, the first user data as the preset each intended application of operating system is deleted or modified.It is mobile whole Hold when the first user data of user's modification intended application are detected, obtain the change letter that user is submitted to Breath, the text message being input into such as acquisition user or the selected picture of user etc., using accessed Modification information the first user data of intended application are updated, generation intended application it is new first use User data.Additionally, mobile terminal can also be by new first user data by default first user data, When calling first interface to obtain the first user data of intended application, the first user data of acquiescence are obtained (i.e. new first user data).
Optionally, the method for the offer user data can also include:Obtain the domain account of current system; The first user data after renewal are preserved based on acquired domain account.
In implementing, mobile terminal can also preserve the first user data that user is changed.Specifically , after new first user data are generated, mobile terminal can by obtaining the domain account of current system, New first user data are stored in the acquired corresponding database of domain account.
In embodiments of the present invention, mobile terminal can be used the first of intended application according to not same area account User data is preserved, and when not same area account is switched, can be loaded according to domain account different independent First user data, such that it is able to flexibly set the first user data of intended application, improve user's body Test.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of combination of actions, But those skilled in the art should know, the embodiment of the present invention is not limited by described sequence of movement System, because according to the embodiment of the present invention, some steps can sequentially or simultaneously be carried out using other.Its Secondary, those skilled in the art should also know, embodiment described in this description belongs to be preferable to carry out Example, necessary to the involved action not necessarily embodiment of the present invention.
Reference picture 3A, shows a kind of device for providing user data according to an embodiment of the invention Structured flowchart, can specifically include such as lower module:
Configuration module 301, is suitable in advance for the status information of each intended application configuration interface switch and each The first user data of intended application.
Detection module 303, is suitable to when the user data acquisition order to intended application is detected, detection The state of the corresponding interface switch of the intended application.
First user data acquisition module 305, is suitable to when the state of the interface switch is closed mode, First interface is called to obtain the first user data of intended application.
Data providing module 307, be suitable to using acquired first user data as intended application user Data are provided.
On the basis of Fig. 3 A, optionally, there is provided the device of user data can also include second user Data acquisition module 309, as shown in Figure 3 B.
Wherein, second user data acquisition module 309, is suitable to the state in the interface switch to open During state, second interface is called to obtain the second user data of intended application.Accordingly, data provide mould Block 307, is further adapted for being provided acquired second user data as the user data of intended application.
In one kind of the invention is preferable to carry out, the device of the offer user data can also include following mould Block:
Order receiver module 309, is suitable to the transmitted user data of reception source application and obtains order.
Safety detection module 311, is adapted to detect for the safe class of source application, determines that intended application is corresponding The state of interface switch.
Authority detection module 313, is adapted to detect for the authority that source application obtains user data, determines that target should With the state of corresponding interface switch.
Optionally, the safety detection module 311, can include following submodule:
Safety value determination sub-module 3110, is suitable to carry out safety detection by source application, determines institute State the safety value of source application.
Safe class determination sub-module 3112, is suitable for use with the safety that the safety value determines the source application Grade.
Judging submodule 3114, is suitable to judge whether the safe class of source application can reach preset safety threshold Value.
Interface switch opens submodule 3116, is suitable to that in the safe class of the source application safety threshold can be reached During value, the corresponding interface switch of the intended application is set on state.
Interface switch closes submodule 3118, is suitable to that in the safe class of the source application safety can not be reached During threshold value, the corresponding interface switch of the intended application is set to off closed state.
In one preferred embodiment of the invention, safety value determination sub-module 3110 can include following Unit:
Local detection unit 31100, is suitable to each application message of source application of the local security software to installing It is monitored respectively, determines the safety value of source application.Wherein, source application application message include it is following extremely One item missing:Apply Names, application version, publisher and set-up time.
Assessment result acquiring unit 31102, is suitable to, when installation source is applied, obtain current from Cloud Server The security evaluation result of the source application of installation.
Safety value determining unit 31102, is suitable for use with the source that the security evaluation result determines to be currently installed on The safety value of application.Wherein, the security evaluation result includes that user's mark result and/or user evaluate knot Really.
In embodiments of the present invention, interface switch includes following at least one type:Short message interface switch, Address list interface switch, positional interface switch and picture interface switch;Then the second user data are at least Including following any one:Second note data, the second address book data, the second geographic position data and Two image datas;The first user data at least include following any one:First note data, first Address book data, the first geographic position data and the first image data.
Optionally, interface switch opens submodule 3116, and the safe class for being further adapted for the application of determination source can reach To the type of secure threshold, applied for the source and the interface switch of respective type is set on shape State.Wherein, the secure threshold includes following at least one type:Short message secure threshold, address list peace Full threshold value, position secure threshold and picture secure threshold.
In a preferred embodiment of the invention, the authority detection module 313 can include following son Module:
Opening sets submodule 3130, is suitable to be applied in user data white list when source, then described Source obtains the authority of user data using having, and the corresponding interface switch of the intended application is set on Open state.
Closed mode sets submodule 3130, is suitable to be applied in user data blacklist when source, then described Be set to for the corresponding interface switch of the intended application using without the authority for obtaining user data by source Closed mode.
In a preferred embodiment of the invention,
The device for providing user data can also include with lower module:
White list module 315, be suitable to detect user allow source application obtain user data when, by institute Source application is stated to be added in the user data white list.
Black list module 317, is suitable to when user's refusal source application acquisition user data is detected, by institute Source application is stated to be added in the user data blacklist.
Modification information acquisition module 319, is suitable to when the first user number for detecting user's modification intended application According to when, obtain the modification information submitted to of user.
Update module 321, is suitable for use with the first user number that the modification information updates the intended application According to.
Domain account acquisition module 323, is suitable to obtain the domain account of current system.
Preserving module 325, is suitable to carry out the first user data after renewal based on acquired domain account Preserve.
For device embodiment, because it is substantially similar to embodiment of the method, so the comparing of description Simply, the relevent part can refer to the partial explaination of embodiments of method.
Algorithm and display be not solid with any certain computer, virtual system or miscellaneous equipment provided herein There is correlation.Various general-purpose systems can also be used together with based on teaching in this.As described above, It is obvious to construct the structure required by this kind of system.Additionally, the present invention is not also for any specific Programming language.It is understood that, it is possible to use various programming languages realize the content of invention described herein, And the description done to language-specific above is to disclose preferred forms of the invention.
In specification mentioned herein, numerous specific details are set forth.It is to be appreciated, however, that this Inventive embodiment can be put into practice in the case of without these details.In some instances, not Known method, structure and technology are shown specifically, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect Or it is multiple, in above to the description of exemplary embodiment of the invention, each feature of the invention is sometimes It is grouped together into single embodiment, figure or descriptions thereof.However, should not be by the disclosure Method be construed to reflect following intention:I.e. the present invention for required protection requirement ratio is in each claim The middle more features of feature be expressly recited.More precisely, as the following claims reflect As, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows Thus claims of specific embodiment are expressly incorporated in the specific embodiment, wherein each right It is required that in itself all as separate embodiments of the invention.
Those skilled in the art are appreciated that can be carried out certainly to the module in the equipment in embodiment Adaptively change and they are arranged in one or more equipment different from the embodiment.Can be with Module or unit or component in embodiment is combined into a module or unit or component, and in addition may be used To be divided into multiple submodule or subelement or sub-component.Except such feature and/or process or Outside at least some in unit exclude each other, can be using any combinations to this specification (including companion With claim, summary and accompanying drawing) disclosed in all features and so disclosed any method or All processes or unit of person's equipment are combined.Unless expressly stated otherwise, this specification (including companion With claim, summary and accompanying drawing) disclosed in each feature can it is identical by offers, equally or phase Replace like the alternative features of purpose.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include it Some included features are rather than further feature, but the group of the feature of different embodiments in its embodiment Conjunction means to be within the scope of the present invention and formed different embodiments.For example, in following power In sharp claim, the one of any of embodiment required for protection mode can make in any combination With.
All parts embodiment of the invention can be realized with hardware, or be processed with one or more The software module run on device is realized, or is realized with combinations thereof.Those skilled in the art should Understand, basis can be realized using microprocessor or digital signal processor (DSP) in practice Some or all parts in the equipment of the offer user data of the embodiment of the present invention some or it is complete Portion's function.The present invention is also implemented as performing some or all of method as described herein Equipment or program of device (for example, computer program and computer program product).Such realization Program of the invention can be stored on a computer-readable medium, or can be with one or more letter Number form.Such signal can be downloaded from internet website and obtained, or above be carried in carrier signal For, or provided in any other form.
It should be noted that above-described embodiment the present invention will be described rather than limiting the invention, And those skilled in the art can design replacement without departing from the scope of the appended claims Embodiment.In the claims, any reference symbol being located between bracket should not be configured to right It is required that limitation.Word "comprising" does not exclude the presence of element or step not listed in the claims.It is located at Word "a" or "an" before element does not exclude the presence of element as multiple.The present invention can be by Realized in the hardware for including some different elements and by means of properly programmed computer.Enumerating If in the unit claim of equipment for drying, several in these devices can be by same hardware Embody.The use of word first, second, and third does not indicate that any order.Can be by These words are construed to title.
The invention discloses A1, a kind of method of offer user data, including:In advance for each target should With the state and the first user data of each intended application of configuration interface switch;Should to target detecting When user data obtains order, the state of the corresponding interface switch of the intended application is detected;Work as institute When stating state for closed mode, first interface is called to obtain the first user data of intended application;To be obtained The first user data for taking are provided as the user data of intended application.
A2, the method as described in A1, also include:When the state is opening, second is called Interface obtains the second user data of intended application;Using acquired second user data as intended application User data provided.
A3, the method as described in A2, also include:The application transmitted user data in reception source is obtained Take order;The safe class of detection source application, determines the state of the corresponding interface switch of intended application;Or Person, detection source application obtains the authority of user data, determines the state of the corresponding interface switch of intended application.
The step of A4, the method as described in A3, safe class of detection source application, including:By right The source application carries out safety detection, determines the safety value of the source application;Determined using the safety value The safe class of the source application.
A5, the method as described in A4, safety detection is carried out by source application, determines the source The safety value of application, including:Each application message of source application of the local security software to installing is carried out respectively Monitoring, determine source application safety value, wherein, the application message include it is following at least one:Using Title, application version, publisher and set-up time.
A6, the method as described in A4 or A5, safety detection is carried out by source application, it is determined that The safety value of the source application, including:When installation source is applied, obtain what is be currently installed on from Cloud Server The security evaluation result of source application;Determine what the source being currently installed on was applied using the security evaluation result Safety value;Wherein, the security evaluation result includes user's mark result and/or user's evaluation result.
A7, the method as described in A2-A4 is any, the interface switch include following at least one type: Short message interface switch, address list interface switch, positional interface switch and picture interface switch;Then described Two user data at least include following any one:Second note data, the second address book data, the second ground Reason position data and second picture data;The first user data at least include following any one:First Note data, the first address book data, the first geographic position data and the first image data.
A8, the method as described in A7, the safe class of detection source application, determine that intended application is corresponding The state of interface switch, including:Whether judge the safe class of source application can reach preset safety threshold Value;When the safe class of source application can reach secure threshold, by the corresponding interface of the intended application Switch is set on state;When the safe class of source application can not reach secure threshold, will be described The corresponding interface switch of intended application is set to off closed state.
A9, the method as described in A8, when the safe class of source application can reach secure threshold, will The corresponding interface switch of the intended application is set on state, including:Determine safety of source application etc. Level can reach the type of secure threshold, applied for the source and be set on the interface switch of respective type Open state;Wherein, the secure threshold includes following at least one type:Short message secure threshold, communication Record secure threshold, position secure threshold and picture secure threshold.
A10, the method as described in A3, detection source application obtain the authority of user data, determine target Using the state of corresponding interface switch, including:It is when source is applied in user data white list, then described Source obtains the authority of user data using having, and the corresponding interface switch of the intended application is set on Open state;When source is applied in user data blacklist, then the source is using without acquisition user data Authority, the corresponding interface switch of the intended application is set to off closed state.
A11, the method as described in A10, methods described also include:Source is allowed to apply user is detected When obtaining user data, source application is added in the user data white list;Detecting use When family refusal source application obtains user data, source application is added to the user data blacklist In.
A12, the method as described in A11, methods described also include:Should when user's modification target is detected During first user data, the modification information that user is submitted to is obtained;Updated using the modification information The first user data of the intended application.
A13, the method as described in A12, methods described also include:Obtain the domain account of current system; The first user data after renewal are preserved based on acquired domain account.
The invention also discloses B7, a kind of device of offer user data, including:Configuration module, fits It is that each intended application configures the state of interface switch and the first user data of each intended application in advance; Detection module, is suitable to, when the user data acquisition order to intended application is detected, detect the target Using the state of corresponding interface switch;First user data acquisition module, is suitable in the state to close During closed state, first interface is called to obtain the first user data of intended application;Data providing module, fits There is provided as the user data of intended application in using acquired first user data.
B15, the device as described in B14, also include:Second user data acquisition module, is suitable in institute When stating state for opening, second interface is called to obtain the second user data of intended application;It is then described Data providing module, is further adapted for entering acquired second user data as the user data of intended application Row is provided.
B16, the device as described in B15, described device also include:Order receiver module, is suitable to receive The application transmitted user data in source obtains order;Safety detection module, is adapted to detect for source application Safe class, determines the state of the corresponding interface switch of intended application;Authority detection module, is adapted to detect for Source application obtains the authority of user data, determines the state of the corresponding interface switch of intended application.
B17, the device as described in B16, the safety detection module, including:Safety value determines submodule Block, is suitable to carry out safety detection by source application, determines the safety value of the source application;Safety Grade determination sub-module, is suitable for use with the safe class that the safety value determines the source application.
B18, the device as described in B17, the safety value determination sub-module, including:Local detection list Unit, each application message for being suitable to source application of the local security software to installing is monitored respectively, determines source The safety value of application, wherein, the application message include it is following at least one:Apply Names, using version Originally, publisher and set-up time.
B19, the device as described in B17 or B18, the safety value determination sub-module, including:
Assessment result acquiring unit, is suitable to, when installation source is applied, obtain what is be currently installed on from Cloud Server The security evaluation result of source application;Safety value determining unit, is suitable for use with the security evaluation result and determines The safety value of the source application being currently installed on;Wherein, the security evaluation result include user's mark result and / or user's evaluation result.
B20, the device as described in B15-B17 is any, the interface switch include following at least one Type:Short message interface switch, address list interface switch, positional interface switch and picture interface switch;Then The second user data at least include following any one:Second note data, the second address book data, Second geographic position data and second picture data;The first user data at least include following any :First note data, the first address book data, the first geographic position data and the first image data.
B21, the device as described in B20, the safety detection module, including:Judging submodule, It is suitable to judge whether the safe class of source application can reach preset secure threshold;Interface switch opens submodule Block, is suitable to when the safe class of source application can reach secure threshold, by intended application correspondence Interface switch be set on state;Interface switch closes submodule, is suitable to the peace in source application When congruent level can not reach secure threshold, the corresponding interface switch of the intended application is set off shape State.
B22, the device as described in B21, the interface switch open submodule, and being further adapted for determination source should Safe class can reach the type of secure threshold, applied for the source and open the interface of respective type Pass is set on state;Wherein, the secure threshold includes following at least one type:Short message safety Threshold value, address list secure threshold, position secure threshold and picture secure threshold.
B23, the device as described in B16 to B18 is any, the authority detection module, including:Open State sets submodule, is suitable to be applied in user data white list when source, then the source is applied to have and obtained The authority of user data is taken, the corresponding interface switch of the intended application is set on state;Close State sets submodule, is suitable to be applied in user data blacklist when source, then the source is applied and do not had The authority of user data is obtained, the corresponding interface switch of the intended application is set to off closed state.
B24, the device as described in B23, described device also include:White list module, is suitable in detection When allowing source application to obtain user data to user, source application is added to the white name of the user data Dan Zhong;Black list module, is suitable to when user's refusal source application acquisition user data is detected, will be described Source application is added in the user data blacklist.
B25, the device as described in B23, described device also include:Modification information acquisition module, is suitable to When the first user data of user's modification intended application are detected, the change letter that user is submitted to is obtained Breath;Update module, is suitable for use with the first user data that the modification information updates the intended application.
B26, the device as described in B25, described device also include:Domain account acquisition module, is suitable to obtain Take the domain account of current system;Preserving module, after being suitable to the domain account based on acquired in renewal first User data is preserved.

Claims (10)

1. a kind of method for providing user data, methods described includes:
It is in advance the state and the first user number of each intended application of each intended application configuration interface switch According to;
When the user data acquisition order to intended application is detected, detect that the intended application is corresponding The state of interface switch;
When the state is closed mode, first interface is called to obtain the first user number of intended application According to;
Acquired first user data are provided as the user data of intended application.
2. method according to claim 1, it is characterised in that methods described also includes:
When the state is opening, second interface is called to obtain the second user number of intended application According to;
Acquired second user data are provided as the user data of intended application.
3. method according to claim 2, it is characterised in that also include:
The application transmitted user data in reception source obtains order;
The safe class of detection source application, determines the state of the corresponding interface switch of intended application;Or,
The application of detection source obtains the authority of user data, determines the shape of the corresponding interface switch of intended application State.
4. method according to claim 3, it is characterised in that the safe class of detection source application The step of, including:
Safety detection is carried out by source application, the safety value of the source application is determined;
The safe class that the source is applied is determined using the safety value.
5. method according to claim 4, it is characterised in that carried out by source application Safety detection, determines the safety value of the source application, including:
Each application message of source application of the local security software to installing is monitored respectively, determines that source is applied Safety value, wherein, the application message include it is following at least one:Apply Names, application version, Publisher and set-up time.
6. the method according to claim 4 or 5, it is characterised in that applied by the source Safety detection is carried out, the safety value of the source application is determined, including:
When installation source is applied, the security evaluation result of the source application being currently installed on is obtained from Cloud Server;
The safety value that the source being currently installed on is applied is determined using the security evaluation result;
Wherein, the security evaluation result includes user's mark result and/or user's evaluation result.
7. according to any described methods of claim 2-4, it is characterised in that the interface switch bag Include following at least one type:Short message interface switch, address list interface switch, positional interface switch and figure Piece interface switch;
Then the second user data at least include following any one:Second note data, the second address list Data, the second geographic position data and second picture data;
The first user data at least include following any one:First note data, the first address list number According to, the first geographic position data and the first image data.
8. method according to claim 7, it is characterised in that the safe class of detection source application, Determine the state of the corresponding interface switch of intended application, including:
Whether judge the safe class of source application can reach preset secure threshold;
When the safe class of source application can reach secure threshold, by the corresponding interface of the intended application Switch is set on state;
When the safe class of source application can not reach secure threshold, connect the intended application is corresponding Mouth switch is set to off closed state.
9. method according to claim 8, it is characterised in that when the safety etc. of source application Level can reach secure threshold, and the corresponding interface switch of the intended application is set on into state, including:
Determining the safe class of source application can reach the type of secure threshold, for the source using by accordingly The interface switch of type is set on state;
Wherein, the secure threshold includes following at least one type:Short message secure threshold, address list peace Full threshold value, position secure threshold and picture secure threshold.
10. it is a kind of provide user data device, including:
Configuration module, is suitable to be configured for each intended application in advance the state and each intended application of interface switch First user data;
Detection module, is suitable to when the user data acquisition order to intended application is detected, and detection is described The state of the corresponding interface switch of intended application;
First user data acquisition module, is suitable to, when the state is closed mode, call first interface Obtain the first user data of intended application;
Data providing module, be suitable to using acquired first user data as intended application user data There is provided.
CN201510921136.0A 2015-12-11 2015-12-11 A kind of method and apparatus that user data is provided Pending CN106874748A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510921136.0A CN106874748A (en) 2015-12-11 2015-12-11 A kind of method and apparatus that user data is provided

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510921136.0A CN106874748A (en) 2015-12-11 2015-12-11 A kind of method and apparatus that user data is provided

Publications (1)

Publication Number Publication Date
CN106874748A true CN106874748A (en) 2017-06-20

Family

ID=59177422

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510921136.0A Pending CN106874748A (en) 2015-12-11 2015-12-11 A kind of method and apparatus that user data is provided

Country Status (1)

Country Link
CN (1) CN106874748A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451488A (en) * 2017-07-21 2017-12-08 珠海格力电器股份有限公司 A kind of method, device and mobile terminal that personal information is provided
WO2019109418A1 (en) * 2017-12-05 2019-06-13 深圳云天励飞技术有限公司 Data protection method and apparatus, computer apparatus, and readable storage medium
CN109981873A (en) * 2017-12-27 2019-07-05 珠海市君天电子科技有限公司 A kind of address list permission open method, device and electronic equipment
CN111487877A (en) * 2019-01-28 2020-08-04 青岛海尔洗衣机有限公司 Control method of household appliance

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070168578A1 (en) * 2005-10-27 2007-07-19 International Business Machines Corporation System and method for data collection interface creation and data collection administration
CN103246834A (en) * 2012-02-07 2013-08-14 联想(北京)有限公司 Control method and electronic device
CN104091071A (en) * 2014-07-09 2014-10-08 北京智谷睿拓技术服务有限公司 Risk determining method and device for application programs
CN105095788A (en) * 2015-06-30 2015-11-25 北京奇虎科技有限公司 Method, device and system for private data protection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070168578A1 (en) * 2005-10-27 2007-07-19 International Business Machines Corporation System and method for data collection interface creation and data collection administration
CN103246834A (en) * 2012-02-07 2013-08-14 联想(北京)有限公司 Control method and electronic device
CN104091071A (en) * 2014-07-09 2014-10-08 北京智谷睿拓技术服务有限公司 Risk determining method and device for application programs
CN105095788A (en) * 2015-06-30 2015-11-25 北京奇虎科技有限公司 Method, device and system for private data protection

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451488A (en) * 2017-07-21 2017-12-08 珠海格力电器股份有限公司 A kind of method, device and mobile terminal that personal information is provided
CN107451488B (en) * 2017-07-21 2021-01-05 珠海格力电器股份有限公司 Method and device for providing personal information and mobile terminal
WO2019109418A1 (en) * 2017-12-05 2019-06-13 深圳云天励飞技术有限公司 Data protection method and apparatus, computer apparatus, and readable storage medium
CN109981873A (en) * 2017-12-27 2019-07-05 珠海市君天电子科技有限公司 A kind of address list permission open method, device and electronic equipment
CN111487877A (en) * 2019-01-28 2020-08-04 青岛海尔洗衣机有限公司 Control method of household appliance

Similar Documents

Publication Publication Date Title
US10778626B2 (en) Determining authenticity of reported user action in cybersecurity risk assessment
US20220013036A1 (en) Context-Aware Cybersecurity Training Systems, Apparatuses, and Methods
US9824609B2 (en) Mock attack cybersecurity training system and methods
CN105144767B (en) For checking the device and method and user terminal of message
US9215548B2 (en) Methods and systems for rating privacy risk of applications for smart phones and other mobile platforms
US8650653B2 (en) Trusted graphics rendering for safer browsing on mobile devices
US20170076099A1 (en) An access method and apparatus for an application program based on an intelligent terminal device
KR101373986B1 (en) Method and apparatus to vet an executable program using a model
CN106921799A (en) A kind of mobile terminal safety means of defence and mobile terminal
CN106874748A (en) A kind of method and apparatus that user data is provided
CN104462997B (en) Method, device and system for protecting work data in mobile terminal
CN102801706A (en) Terminal and security processing method for information contents
CN104980393B (en) Method of calibration, system, server and terminal
CN106550031A (en) The method and device of data backup
US20150215429A1 (en) System and method for extracting identifiers from traffic of an unknown protocol
CN105827664B (en) Leak detection method and device
CN107451488B (en) Method and device for providing personal information and mobile terminal
CN109753808A (en) A kind of privacy compromise methods of risk assessment and device
CN105095758B (en) Screen locking applied program processing method, device and mobile terminal
US9047470B2 (en) Secure provisioning of commercial off-the-shelf (COTS) devices
Schindler et al. Privacy leak identification in third-party android libraries
CN108566643A (en) APP access control methods, system, terminal device and storage medium
CN106295423A (en) A kind of method for exhibiting data and client
CN108270743A (en) A kind of information security verification method and terminal
CN109688096A (en) Recognition methods, device, equipment and the computer readable storage medium of IP address

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20170802

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUNSHIJI TECHNOLOGY Co.,Ltd.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170620

RJ01 Rejection of invention patent application after publication