CN107563187A - Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing - Google Patents

Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing Download PDF

Info

Publication number
CN107563187A
CN107563187A CN201710761500.0A CN201710761500A CN107563187A CN 107563187 A CN107563187 A CN 107563187A CN 201710761500 A CN201710761500 A CN 201710761500A CN 107563187 A CN107563187 A CN 107563187A
Authority
CN
China
Prior art keywords
access
access information
information
record
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710761500.0A
Other languages
Chinese (zh)
Inventor
张伟超
欧双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710761500.0A priority Critical patent/CN107563187A/en
Publication of CN107563187A publication Critical patent/CN107563187A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

Accessing operation monitoring method, device, mobile terminal and readable storage medium storing program for executing, method the embodiment of the invention discloses one kind includes:Monitor the access operation of each application in mobile terminal, whether the access operation for judging to monitor belongs to sensitive operation, if the access operation monitored belongs to sensitive operation, the then Apply Names of the application according to belonging to operating the access and above-mentioned access operation generation access information, then according to access information generation and display reminding message, whether allow to perform above-mentioned access operation with prompting.Access of the embodiment of the present invention by monitoring each application operates; when the current access operation of the application monitored belongs to sensitive operation; corresponding prompting message can then be generated; allowing users to the very first time finds existing sensitive operation in mobile terminal and the application of sensitive operation be present; the sensitive operation of application is prevented in time, so as to be effectively protected the personal information of storage in the terminal.

Description

Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of access to operate monitoring method, device, mobile terminal And readable storage medium storing program for executing.
Background technology
With the popularization of mobile terminal, the importance of mobile terminal in people's daily life also more and more higher, while Life to people brings great convenience, and has goed deep into the every aspect of people's life just because of mobile terminal, therefore The substantial amounts of privacy of user can be stored in mobile terminal and is related to the information of personal safety.
Because the authority of current intelligent operating system can not monitor various aspects, some applications are caused to utilize existing System vulnerability steal user profile, or such as supervised in the operation behavior of background monitoring user in the case of user is unwitting User's communication is listened, the storage dish of user is scanned, obtains contact person in address list, short message reading content etc., cause user to store Personal information in the terminal can not be effectively protected.
The content of the invention
The main purpose of the embodiment of the present invention, which is to provide, a kind of accesses operation monitoring method, device, mobile terminal and can Storage medium is read, the access operation that can not monitor application program in the prior art can be solved, cause user to be stored in mobile whole Personal information in end is difficult to the technical problem being effectively protected.
To achieve the above object, first aspect of the embodiment of the present invention provides a kind of access and operates monitoring method, this method bag Include:
The access operation of each application in mobile terminal is monitored, whether the access operation for judging to monitor belongs to sensitive behaviour Make;
If the access operation monitored belongs to sensitive operation, according to the Apply Names for accessing the application belonging to operating And described access operates generation access information;
According to access information generation and display reminding message, whether allow to perform the access operation with prompting.
To achieve the above object, second aspect of the embodiment of the present invention provides a kind of access and operates supervising device, the device bag Include:
Monitoring modular, the access for monitoring each application in mobile terminal operate, and the access operation for judging to monitor is It is no to belong to sensitive operation;
Information generating module, if belonging to sensitive operation for the access operation monitored, institute is operated according to described access The Apply Names of the application of category and described access operate generation access information;
Reminding module, for according to access information generation and display reminding message, whether allowing to perform institute with prompting State access operation.
To achieve the above object, the third aspect of the embodiment of the present invention provides a kind of mobile terminal, including memory, processor And store the computer program that can be run on a memory and on a processor, computer program described in the computing device When, realize each step in the access operation monitoring method that first aspect provides.
To achieve the above object, fourth aspect of the embodiment of the present invention provides a kind of readable storage medium storing program for executing, the readable storage Medium is computer-readable recording medium, is stored thereon with computer program, real when the computer program is executed by processor Each step in the access operation monitoring method that existing first aspect provides.
The embodiments of the invention provide one kind to access operation monitoring method, and this method includes:Monitor each in mobile terminal The access operation of application, and whether the access operation for judging to monitor belongs to sensitive operation, if the access operation monitored belongs to Sensitive operation, the then Apply Names of the application according to belonging to operating the access and above-mentioned access operation generation access information, and root According to access information generation and display reminding message, whether allow to perform above-mentioned access operation with prompting.Compared to prior art For, access of the embodiment of the present invention by monitoring each application operates, when the current access operation of the application monitored belongs to During sensitive operation, then corresponding prompting message can be generated so that user can have found existing quick in mobile terminal the very first time Sense operation and the application that sensitive operation be present, prevent the sensitive operation of application, shifting are stored in so as to be effectively protected in time Personal information in dynamic terminal.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those skilled in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is a kind of structured flowchart of mobile terminal;
Fig. 2 is the schematic flow sheet that operation monitoring method is accessed in first embodiment of the invention;
Fig. 3 is the schematic diagram of a scenario of display reminding message in first embodiment of the invention;
Fig. 4 is the schematic flow sheet of the refinement step of step 201 in first embodiment of the invention;
Fig. 5 is the schematic flow sheet that operation monitoring method is accessed in second embodiment of the invention;
Fig. 6 is the schematic flow sheet that operation monitoring method is accessed in third embodiment of the invention;
Fig. 7 is the program module schematic diagram that operation supervising device is accessed in fourth embodiment of the invention;
Fig. 8 is the elaborator module diagram that monitoring modular 701 is walked in fourth embodiment of the invention;
Fig. 9 is the program module schematic diagram that operation supervising device is accessed in fifth embodiment of the invention;
Figure 10 is the program module schematic diagram that operation supervising device is accessed in sixth embodiment of the invention.
Embodiment
To enable goal of the invention, feature, the advantage of the present invention more obvious and understandable, below in conjunction with the present invention Accompanying drawing in embodiment, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described reality It is only part of the embodiment of the present invention to apply example, and not all embodiments.Based on the embodiment in the present invention, people in the art The every other embodiment that member is obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 shows a kind of structured flowchart of mobile terminal.Access operation monitoring method provided in an embodiment of the present invention can Applied in mobile terminal 10 as shown in Figure 1, mobile terminal 10 can be, but not limited to include:Battery need to be relied on to maintain normal fortune Row and support network and the smart mobile phone of download function, notebook, tablet personal computer, wearing smart machine etc..
As shown in figure 1, mobile terminal 10 includes memory 101, storage control 102, one or more (is only shown in figure One) processor 103, Peripheral Interface 104, radio-frequency module 105, key-press module 106, audio-frequency module 107, Touch Screen 108.This A little components are mutually communicated by one or more communication bus/signal wire 109.
It is appreciated that the structure shown in Fig. 1 is only to illustrate, it does not cause to limit to the structure of mobile terminal.It is mobile whole End 10 may also include more either less components than shown in Fig. 1 or have the configuration different from shown in Fig. 1.Shown in Fig. 1 Each component can use hardware, software or its combination to realize.
Memory 101 can be used for storage software program and module, as the access in the embodiment of the present invention operates monitoring side Programmed instruction/module corresponding to method and mobile terminal, processor 103 are stored in the software program in memory 101 by operation And module, so as to perform various function application and data processing, that is, realize above-mentioned access operation monitoring method.
Memory 101 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 101 can further comprise Relative to the remotely located memory of processor 103, these remote memories can pass through network connection to mobile terminal 10.On The example for stating network includes but is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.Processor 103 And access of other possible components to memory 101 can be carried out under the control of storage control 102.
Various input/output devices are coupled to CPU and memory 101 by Peripheral Interface 104.The operation of processor 103 is deposited Various softwares in reservoir 101, instruction are to perform the various functions of mobile terminal 10 and carry out data processing.
In certain embodiments, Peripheral Interface 104, processor 103 and storage control 102 can be in one single chips Realize.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 105 is used to receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, so that with Communication network or other equipment are communicated.Radio-frequency module 105 may include the various existing electricity for being used to perform these functions Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (SIM) card, Memory etc..Radio-frequency module 105 can be with the wireless network progress of various networks such as internet, intranet, preset type Communication is communicated by the wireless network of preset type with other equipment.The wireless network of above-mentioned preset type can wrap Include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).The wireless network of above-mentioned preset type can use various communications Standard, agreement and technology, including but not limited to global system for mobile communications (Global System for Mobile Communication, GSM), enhanced mobile communication technology (Enhanced Data GSM Environment, EDGE) is wide Band CDMA (Wideband Code Division Multiple Access, W-CDMA), CDMA (Code Division Access, CDMA), TDMA (Time Division Multiple Access, TDMA), Bluetooth, adopting wireless fidelity technology (Wireless-Fidelity, WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE 802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE 802.11n), the networking telephone (Voice over Internet Protocal, VoIP), worldwide interoperability for microwave accesses (Worldwide Interoperability for Microwave Access, Wi-Max), other are used for the agreement of mail, instant messaging and short message, and any other is suitable Communications protocol.
Key-press module 106 provides the interface that is inputted to mobile terminal of user, user can by press it is different by Key is so that mobile terminal 10 performs different functions.
Audio-frequency module 107 provides a user COBBAIF, and it may include one or more microphones, one or more raises Sound device and voicefrequency circuit.Voicefrequency circuit receives voice data at Peripheral Interface 104, and voice data is converted into power information, Power information is transmitted to loudspeaker.Loudspeaker is converted to power information the sound wave that human ear can hear.Voicefrequency circuit is also from microphone Place receives power information, converts electrical signals to voice data, and by data transmission in network telephony into Peripheral Interface 104 to enter traveling one The processing of step.Voice data can obtain at memory 101 or by radio-frequency module 105.In addition, voice data can also Store into memory 101 or be transmitted by radio-frequency module 105.In some instances, audio-frequency module 107 may also include One earphone broadcasts hole, for providing COBBAIF to earphone or other equipment.
Touch Screen 108 provides an output and inputting interface simultaneously between mobile terminal and user.Specifically, touch-control Screen 108 shows video frequency output to user, and the contents of these video frequency outputs may include word, figure, video and its any group Close.Some output results correspond to some user interface objects.Touch Screen 108 also receives the input of user, such as user Click, the gesture operation such as slip, so that input of the user interface object to these users responds.Detect user's input Technology can be based on resistance-type, condenser type or other any possible touch control detection technologies.The display unit of Touch Screen 108 Instantiation include but is not limited to liquid crystal display or light emitting polymer displays.
Describe to access operation monitoring method in the embodiment of the present invention based on above-mentioned mobile terminal.
Because the access that in the prior art, can not monitor application program operates, user is caused to store in the terminal Personal information is difficult to the technical problem being effectively protected.
In order to solve the above problems, the present invention proposes that a kind of access operates monitoring method, in the method:It is each by monitoring The access operation of individual application, when arbitrarily belonging to sensitive operation using current access operation, then generation is corresponding reminds item, Allow users to find to be intended to the application for accessing personal information in time, so as to be effectively protected storage in the terminal Personal information.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet that operation monitoring method is accessed in first embodiment of the invention, this method Including:
Whether the access operation of each application in step 201, monitoring mobile terminal, the access operation for judging to monitor belong to Sensitive operation;
In the present embodiment, the access operation of each application in mobile terminal is monitored in real time, including monitoring background application is with before The access operation of platform application, above-mentioned access operation mainly include:The data manipulation of mobile terminal memory storage is accessed, such as accesses and moves The data stored in dynamic terminal memory;The operation of any functional module of mobile terminal is called, such as calls the bat of mobile terminal According to function, sound-recording function etc.;The other application having in mobile terminal is accessed, such as accesses photograph album, address list, notepad etc..
Wherein, after some access applied operation in mobile terminal is monitored, the access operation monitored is judged Whether sensitive operation is belonged to.Wherein, above-mentioned sensitive operation includes access camera operation, acquisition geographical position operates, it is short to read Letter operation, accessing address list operation, access photograph album operation, recording operation etc..
If step 202, the access monitored operation belong to sensitive operation, affiliated application is operated according to described access Apply Names and described access operate generation access information;
In the present embodiment, when the access operation monitored belongs to above-mentioned sensitive operation, then access operation institute is obtained The Apply Names of the application of category, then according to the Apply Names and above-mentioned access operation generation access information.Monitored for example, working as When application " microblogging " in mobile terminal has recording operation, then the access information of " microblogging-recording " is generated.
Step 203, according to the access information generation and display reminding message, with prompting whether allow to perform the access Operation.
In the present embodiment, after above-mentioned access information is generated, prompting message is generated according to the access information, then should Prompting message is shown in the display interface of mobile terminal, to cause the notice of user, prompts the user whether to allow in execution State access operation.For example, when above-mentioned access information is " microblogging-recording ", then the prompting of " microblogging is recorded from the background " is generated Message, the display interface of mobile terminal is then shown in, to remind whether user allows " microblogging " to carry out recording operation.
Wherein, the display mode of above-mentioned prompting message can be shown in the status bar of mobile terminal display interface, Or it can also be shown with the form of pop-up in mobile terminal display interface.
In order to be better understood from the present invention, reference picture 3, Fig. 3 is the field of display reminding message in first embodiment of the invention Scape schematic diagram.In figure 3, if " microblogging " of mobile terminal running background has recording operation, in the state of mobile terminal Column is shown:Prompting message of " microblogging " backstage recording, allow users to the very first time recognize in mobile terminal it is existing Sensitive operation and the application that sensitive operation be present.
In the present embodiment, the access by monitoring each application in mobile terminal operates, and judges the access monitored Whether operation belongs to sensitive operation, if the access operation monitored belongs to sensitive operation, answering according to belonging to operating the access Apply Names and above-mentioned access operation generation access information, and simultaneously display reminding message is generated according to the access information, with Whether prompting allows to perform above-mentioned access operation.Compared to existing technologies, the present embodiment is by monitoring the visit of each application Operation is asked, when the current access operation of the application monitored belongs to sensitive operation, then can generate corresponding prompting message so that User can have found existing sensitive operation in mobile terminal the very first time and the application of sensitive operation be present, prevent application in time Sensitive operation, so as to be effectively protected storage personal information in the terminal.
Further, based on first embodiment, referring to Fig. 4, Fig. 4 is the thin of step 201 in first embodiment of the invention Change the schematic flow sheet of step, the step 201 includes:
Step 401, obtain the target interface for accessing operation requests and accessing;
Access interface set corresponding to the sensitive operation that step 402, lookup are pre-set, if in the access interface set The target interface be present, it is determined that the access operation belongs to sensitive operation.
In the present embodiment, the access operation that sensitive operation is belonged in mobile terminal is first set, such as sets in mobile terminal " recording ", " access camera ", " acquisition geographical position ", " accessing address list ", the access such as " reading memory " operation belong to Sensitive operation, the title of access interface corresponding to each sensitive operation is then obtained again, such as recording access, camera are accessed and connect Mouth, geographical position obtain interface, address list access interface, memory read/write interface etc., and each access interface that will be got Title be stored in the memory or database specified.It is understood that third-party application is being accessed in mobile terminal When some application or function, it is necessary to conducted interviews by corresponding access interface.
Specifically, first monitoring the access operation of each application in mobile terminal, then obtaining the access operation monitored please The target interface of access is sought, then searches the target interface in the access interface set of above-mentioned sensitive operation, if above-mentioned access The target interface in set of interfaces be present, then it is assumed that the access operation monitored belongs to sensitive operation;If above-mentioned access interface collection The target interface is not present in conjunction, then it is assumed that the access operation monitored is not belonging to sensitive operation.
Wherein, user can self-defined addition or deletion sensitive operation, movement in the system setup menu of mobile terminal Addition or deletion action of the terminal according to user, the access interface set of the sensitive operation of real-time update mobile terminal memory storage.
In the present embodiment, the target interface that the access operation requests monitored by obtaining access, then judge sensitive It whether there is the target interface in access interface set corresponding to operation, if in the presence of, it is determined that the access operation monitored belongs to Sensitive operation, so as to detect the sensitive operation that whether there is in mobile terminal in real time, it is effectively protected and is stored in movement Personal information in terminal.
Further, referring to Fig. 5, Fig. 5 is the flow signal that operation monitoring method is accessed in second embodiment of the invention Figure, this method include:
Whether the access operation of each application in step 501, monitoring mobile terminal, the access operation for judging to monitor belong to Sensitive operation;
If step 502, the access monitored operation belong to sensitive operation, affiliated application is operated according to described access Apply Names and described access operate generation access information;
Step 503, according to the access information generation and display reminding message, with prompting whether allow to perform the access Operation;
In embodiments of the present invention, step 201 in step 501 describes to step 503 content and first embodiment to The content that step 203 describes is similar, refers to step 201 to step 203, does not repeat herein.
If step 504, the Authorized operation instruction for detecting user's triggering, allow to perform the access in the access information Operation, and the access information is preserved to access record;
In the present embodiment, include by above-mentioned prompting message after display interface, if detecting, user's clicking trigger should Prompting message, then in the prompting frame of display interface ejection " whether allow the access operate ", the prompting frame comprising " permissions " and " refusal " two kinds of trigger events, for prompting the user whether to allow to perform current access operation, and grasped according to the triggering of user Make to control above-mentioned access to operate.
Wherein, if detecting the Authorized operation instruction of user's triggering, that is, detect that user triggers " permission " trigger event, Then allow to perform the access operation in above-mentioned access information, and above-mentioned access information is preserved to access record.
If step 505, the refusal operational order for detecting user's triggering, refusal performs the access in the access information Operation.
In the present embodiment, if detecting the refusal operational order of user's triggering, that is, detect that user triggers " refusal " and touched Hair event, the then access that refusal is performed in above-mentioned access information operate.
In the present embodiment, after according to the generation of above-mentioned access information and display reminding message, if detecting, user triggers Authorized operation instruction, then allow to perform in above-mentioned access information access operation;If detect the refusal operation of user's triggering Instruction, the then access that refusal is performed in above-mentioned access information operate, i.e., the present embodiment can be according to the trigger action of user, to moving Existing sensitive operation is managed in dynamic terminal, on the premise of mobile terminal normal operation is not influenceed, is effectively protected and is deposited The personal information of storage in the terminal.
Further, referring to Fig. 6, Fig. 6 is the flow signal that operation monitoring method is accessed in third embodiment of the invention Figure, this method include:
Whether the access operation of each application in step 601, monitoring mobile terminal, the access operation for judging to monitor belong to Sensitive operation;
If step 602, the access monitored operation belong to sensitive operation, affiliated application is operated according to described access Apply Names and described access operate generation access information;
In embodiments of the present invention, step 201 in step 601 describes to step 602 content and first embodiment to The content that step 202 describes is similar, refers to step 201 to step 202, does not repeat herein.
Step 603, judge that described access in record whether there is the access information;
In the present embodiment, after according to the generation of above-mentioned access information and display reminding message, if detecting, user triggers Authorized operation instruction, then allow the access in access information described above to operate, and above-mentioned access information is preserved to access In record, when generating new access information next time, searched in the access records identical with the newly-generated access information Access information, then controlled the access in newly-generated access information to operate according to lookup result.
If step 604, described access in record have the access information, allow to perform the visit in the access information Ask operation;
If the access information is not present in step 605, described access in record, continue executing with according to the access information The step of generating simultaneously display reminding message.
Specifically, if presence and newly-generated access information identical access information in above-mentioned access record, allow to hold Access operation in the newly-generated access information of row, if being not present and newly-generated access information identical in above-mentioned access record Access information, then regenerated according to newly-generated access information and show new prompting message.User i.e. for monitoring The access information of authorized mistake, it is not necessary to regenerate and show above-mentioned prompting message, can directly allow to perform newly-generated Access operation in access information, to avoid same access frequent operation mandate of the user to same application.
Further, above-mentioned steps 604 are further comprising the steps of:
If there is the access information in described access in record, it is determined that allow the access in the access information to operate The number of execution;
When the number is equal to the frequency threshold value of setting, then the access letter for accessing and being preserved in record is deleted Breath, and continue executing with described according to the step of access information generation and display reminding message.
Wherein, for user's authorized access information, the access information is being preserved to after accessing and record, can be with The access is recorded a frequency threshold value (such as 10 times) is set, then recording, which has allowed the access in the access information to operate, performs Number, when the number is equal to above-mentioned frequency threshold value, then delete the above-mentioned access information preserved in above-mentioned access record, and root Generated according to newly-generated access information and show new prompting message.For example, it is assumed that above-mentioned access information is " microblogging-communication Record ", then microblogging is allowed to access 9 address lists, within this 9 times, it is not necessary to generate simultaneously display reminding message;But work as and monitor During the 10th accessing address list of microblogging, then generate and show the prompting message of " microblogging is just in accessing address list ".
Relative, can also be after according to the generation of above-mentioned access information and display reminding message, if inspection in the present embodiment The refusal operational order of user's triggering is measured, then refuses the access operation in access information described above, and above-mentioned access is believed Breath is preserved to accessing in record, when generating new access information next time, is searched in the access records newly-generated with this Access information identical access information, if presence and newly-generated access information identical access information in above-mentioned access record, Then refusal performs the access operation in newly-generated access information, believes if being not present in above-mentioned access record with newly-generated access Identical access information is ceased, then is regenerated according to newly-generated access information and shows new prompting message.I.e. for monitoring To the access information refused of user, it is not necessary to regenerate and show above-mentioned prompting message, can directly refuse to perform Access operation in newly-generated access information, to avoid user from refusing the same access frequent operation of same application Operation.
In the present embodiment, after the access in allowing access information described above operates, and by above-mentioned access information Preserve to access record, when generating new access information next time, judge to access in record with the presence or absence of newly-generated with this Access information identical access information, if in the presence of, allow to perform in newly-generated access information access operation;If no Deposit, then regenerated according to newly-generated access information and show new prompting message.Awarded for the user monitored The access information weighed, it is not necessary to regenerate simultaneously display reminding message, can directly allow to perform in newly-generated access information Access operation, to avoid same access frequent operation mandate of the user to same application.
Referring to Fig. 7, Fig. 7 is the program module schematic diagram that operation supervising device is accessed in fourth embodiment of the invention, should Device includes:
Monitoring modular 701, the access for monitoring each application in mobile terminal operate, and judge the access operation monitored Whether sensitive operation is belonged to;
In the present embodiment, monitoring modular 701 monitors the access operation of each application in mobile terminal in real time, including after monitoring Platform applies the access with foreground application to operate, and above-mentioned access operation mainly includes:The data manipulation of mobile terminal memory storage is accessed, Such as access the data stored in mobile terminal memory;The operation of any functional module of mobile terminal is called, such as calls and moves Move camera function, sound-recording function of terminal etc.;The other application having in mobile terminal is accessed, such as accesses photograph album, address list, note Thing this etc..
Wherein, after monitoring modular 701 monitors some access applied operation in mobile terminal, judge what is monitored Whether access operation belongs to sensitive operation.Wherein, above-mentioned sensitive operation includes accessing camera operation, obtains geographical position behaviour Make, short message reading operates, accessing address list operates, accesses photograph album operation, recording operation etc..
Information generating module 702, if belonging to sensitive operation for the access operation monitored, operated according to described access The Apply Names of affiliated application and described access operate generation access information;
In the present embodiment, when the access operation monitored when monitoring modular 701 belongs to above-mentioned sensitive operation, then information is given birth to The Apply Names of the application belonging to access operation is obtained into module 702, is then operated according to the Apply Names and above-mentioned access Generate access information.For example, when monitoring that the application " microblogging " in mobile terminal has recording operation, then " microblogging-record is generated The access information of sound ".
Reminding module 703, for according to access information generation and display reminding message, whether allowing to perform with prompting It is described to access operation.
In the present embodiment, after above-mentioned access information is generated, reminding module 703 generates prompting according to the access information and disappeared Breath, then the prompting message is included in the display interface of mobile terminal, to cause the notice of user, prompted the user whether Allow to perform above-mentioned access operation.For example, when above-mentioned access information is " microblogging-recording ", then " microblogging is recorded from the background for generation The prompting message of sound ", the display interface of mobile terminal is then shown in, to remind whether user allows " microblogging " to carry out recording behaviour Make.
Wherein, the display mode of above-mentioned prompting message can be shown in the status bar of mobile terminal display interface, Or it can also be shown with the form of pop-up in mobile terminal display interface.
In the present embodiment, monitoring modular 701 monitors the access operation of each application in mobile terminal, and judges to monitor Access operation whether belong to sensitive operation, if monitor access operation belong to sensitive operation, information generating module 702 According to the Apply Names and above-mentioned access operation generation access information of the application belonging to access operation, reminding module 703 is according to this Access information generation and display reminding message, whether allow to perform above-mentioned access operation with prompting.Compared to existing technologies, Access of the present embodiment by monitoring each application operates, when the current access operation of the application monitored belongs to sensitive operation When, then can generate corresponding prompting message so that user can find the very first time in mobile terminal existing sensitive operation and The application of sensitive operation be present, prevent the sensitive operation of application in time, so as to be effectively protected storage in the terminal Personal information.
Further, based on fourth embodiment, referring to Fig. 8, Fig. 8 is to walk monitoring modular in fourth embodiment of the invention 701 elaborator module diagram, the monitoring modular 701 include:
Acquisition module 801, the target interface accessed for obtaining the access operation requests;
Searching modul 802, for searching access interface set corresponding to the sensitive operation pre-set, if the access connects The target interface be present in mouth set, it is determined that the access operation belongs to sensitive operation.
In the present embodiment, the access operation that sensitive operation is belonged in mobile terminal is first set, such as sets in mobile terminal " recording ", " access camera ", " acquisition geographical position ", " accessing address list ", the access such as " reading memory " operation belong to Sensitive operation, the title of access interface corresponding to each sensitive operation is then obtained again, such as recording access, camera are accessed and connect Mouth, geographical position obtain interface, address list access interface, memory read/write interface etc., and each access interface that will be got Title be stored in the memory or database specified.It is understood that third-party application is being accessed in mobile terminal When some application or function, it is necessary to conducted interviews by corresponding access interface.
Specifically, first monitoring the access operation of each application in mobile terminal, then acquisition module 801 obtains what is monitored The target interface that operation requests access is accessed, then searching modul 802 is searched in the access interface set of above-mentioned sensitive operation Target interface, if the target interface in above-mentioned access interface set be present, then it is assumed that the access operation monitored belongs to sensitive Operation;If the target interface is not present in above-mentioned access interface set, then it is assumed that the access operation monitored is not belonging to sensitive behaviour Make.
Wherein, user can self-defined addition or deletion sensitive operation, movement in the system setup menu of mobile terminal Addition or deletion action of the terminal according to user, the access interface set of the sensitive operation of real-time update mobile terminal memory storage.
In the present embodiment, the target interface that the access operation requests monitored by obtaining access, then judge sensitive It whether there is the target interface in access interface set corresponding to operation, if in the presence of, it is determined that the access operation monitored belongs to Sensitive operation, so as to detect the sensitive operation that whether there is in mobile terminal in real time, it is effectively protected and is stored in movement Personal information in terminal.
Further, referring to Fig. 9, Fig. 9 is the program module that operation supervising device is accessed in fifth embodiment of the invention Schematic diagram, the device include:
Monitoring modular 701, the access for monitoring each application in mobile terminal operate, and judge the access operation monitored Whether sensitive operation is belonged to;
Information generating module 702, if belonging to sensitive operation for the access operation monitored, operated according to described access The Apply Names of affiliated application and described access operate generation access information;
Reminding module 703, for according to access information generation and display reminding message, whether allowing to perform with prompting It is described to access operation;
First control module 901, for after generating and showing the prompting message, if detecting awarding for user's triggering Operational order is weighed, then allows to perform the access operation in the access information, and the access information is preserved to access and recorded It is interior;
In the present embodiment, include by above-mentioned prompting message after display interface, if detecting, user's clicking trigger should Prompting message, then in the prompting frame of display interface ejection " whether allow the access operate ", the prompting frame comprising " permissions " and " refusal " two kinds of trigger events, for prompting the user whether to allow to perform current access operation, and grasped according to the triggering of user Make to control above-mentioned access to operate.
Wherein, if detecting the Authorized operation instruction of user's triggering, that is, detect that user triggers " permission " trigger event, Then allow to perform the access operation in above-mentioned access information, and above-mentioned access information is preserved to access record.
Second control module 902, for after generating and showing the prompting message, if detecting refusing for user's triggering Exhausted operational order, the then access that refusal is performed in the access information operate.
In the present embodiment, if detecting the refusal operational order of user's triggering, that is, detect that user triggers " refusal " and touched Hair event, the then access that refusal is performed in above-mentioned access information operate.
In the present embodiment, after according to the generation of above-mentioned access information and display reminding message, if detecting, user triggers Authorized operation instruction, then allow to perform in above-mentioned access information access operation;If detect the refusal operation of user's triggering Instruction, the then access that refusal is performed in above-mentioned access information operate, i.e., the present embodiment can be according to the trigger action of user, to moving Existing sensitive operation is managed in dynamic terminal, on the premise of mobile terminal normal operation is not influenceed, is effectively protected and is deposited The personal information of storage in the terminal.
Further, referring to Fig. 10, Figure 10 is the program mould that operation supervising device is accessed in sixth embodiment of the invention Block schematic diagram, the device include:
Monitoring modular 701, the access for monitoring each application in mobile terminal operate, and judge the access operation monitored Whether sensitive operation is belonged to;
Information generating module 702, if belonging to sensitive operation for the access operation monitored, operated according to described access The Apply Names of affiliated application and described access operate generation access information;
Judge module 1001, for judging that described access in record whether there is the access information;
In the present embodiment, after according to the generation of above-mentioned access information and display reminding message, if detecting, user triggers Authorized operation instruction, then allow the access in access information described above to operate, and above-mentioned access information is preserved to access In record, when generating new access information next time, searched in the access records identical with the newly-generated access information Access information, then controlled the access in newly-generated access information to operate according to lookup result.
3rd control module 1002, if the access information be present for described access in record, allow described in execution Access operation in access information;
4th control module 1003, if the access information is not present for described access in record, continues executing with and carry Show module 703.
Specifically, if presence and newly-generated access information identical access information in above-mentioned access record, allow to hold Access operation in the newly-generated access information of row, if being not present and newly-generated access information identical in above-mentioned access record Access information, then regenerated according to newly-generated access information and show new prompting message.User i.e. for monitoring The access information of authorized mistake, it is not necessary to regenerate and show above-mentioned prompting message, can directly allow to perform newly-generated Access operation in access information, to avoid same access frequent operation mandate of the user to same application.
Further, above-mentioned 3rd control module 1002 also includes:
Counting module, if the access information be present for described access in record, it is determined that allowed described access to believe The number that access operation in breath performs;
5th control module, for when the number is equal to the frequency threshold value set, then deleting described access in record The access information preserved, and continue executing with reminding module 703.
Wherein, for user's authorized access information, the access information is being preserved to after accessing and record, can be with The access is recorded a frequency threshold value (such as 10 times) is set, then recording, which has allowed the access in the access information to operate, performs Number, when the number is equal to above-mentioned frequency threshold value, then delete the above-mentioned access information preserved in above-mentioned access record, and root Generated according to newly-generated access information and show new prompting message.For example, it is assumed that above-mentioned access information is " microblogging-communication Record ", then microblogging is allowed to access 9 address lists, within this 9 times, it is not necessary to generate simultaneously display reminding message;But work as and monitor During the 10th accessing address list of microblogging, then generate and show the prompting message of " microblogging is just in accessing address list ".
Relative, can also be after according to the generation of above-mentioned access information and display reminding message, if inspection in the present embodiment The refusal operational order of user's triggering is measured, then refuses the access operation in access information described above, and above-mentioned access is believed Breath is preserved to accessing in record, when generating new access information next time, is searched in the access records newly-generated with this Access information identical access information, if presence and newly-generated access information identical access information in above-mentioned access record, Then refusal performs the access operation in newly-generated access information, believes if being not present in above-mentioned access record with newly-generated access Identical access information is ceased, then is regenerated according to newly-generated access information and shows new prompting message.I.e. for monitoring To the access information refused of user, it is not necessary to regenerate and show above-mentioned prompting message, can directly refuse to perform Access operation in newly-generated access information, to avoid user from refusing the same access frequent operation of same application Operation.
In the present embodiment, after the access in allowing access information described above operates, and by above-mentioned access information Preserve to access record, when generating new access information next time, judge to access in record with the presence or absence of newly-generated with this Access information identical access information, if in the presence of, allow to perform in newly-generated access information access operation;If no Deposit, then regenerated according to newly-generated access information and show new prompting message.Awarded for the user monitored The access information weighed, it is not necessary to regenerate simultaneously display reminding message, can directly allow to perform in newly-generated access information Access operation, to avoid same access frequent operation mandate of the user to same application.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the module, only Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple module or components can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed Mutual coupling or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical by some interfaces, device or module Letter connection, can be electrical, mechanical or other forms.
The module illustrated as separating component can be or may not be physically separate, show as module The part shown can be or may not be physical module, you can with positioned at a place, or can also be distributed to multiple On mixed-media network modules mixed-media.Some or all of module therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional module in each embodiment of the present invention can be integrated in a processing module, can also That modules are individually physically present, can also two or more modules be integrated in a module.Above-mentioned integrated mould Block can both be realized in the form of hardware, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
It should be noted that for foregoing each method embodiment, in order to which simplicity describes, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not all be this hairs Necessary to bright.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
It is that monitoring method, device, mobile terminal and readable storage medium are operated to a kind of access provided by the present invention above The description of matter, for those skilled in the art, according to the thought of the embodiment of the present invention, in embodiment and application Upper there will be changes, to sum up, this specification content should not be construed as limiting the invention.

Claims (12)

1. one kind accesses operation monitoring method, it is characterised in that methods described includes:
The access operation of each application in mobile terminal is monitored, whether the access operation for judging to monitor belongs to sensitive operation;
If the access operation monitored belongs to sensitive operation, according to the Apply Names for accessing the application belonging to operating and institute State access operation generation access information;
According to access information generation and display reminding message, whether allow to perform the access operation with prompting.
2. according to the method for claim 1, it is characterised in that whether the access operation for judging to monitor belongs to sensitive The step of operation, includes:
Obtain the target interface that the access operation requests access;
Access interface set corresponding to the sensitive operation pre-set is searched, if the target be present in the access interface set Interface, it is determined that the access operation belongs to sensitive operation.
3. according to the method for claim 1, it is characterised in that described to be disappeared according to access information generation and display reminding Also include after the step of breath:
If detecting the Authorized operation instruction of user's triggering, allow to perform the access operation in the access information, and by institute Access information is stated to preserve to access record;
If detecting the refusal operational order of user's triggering, refusal performs the access operation in the access information.
4. according to the method for claim 3, it is characterised in that described according to the application for accessing the application belonging to operating Title and described the step of accessing operation generation access information, also include afterwards:
Judge that described access in record whether there is the access information;
If described access in record has the access information, allow to perform the access operation in the access information;
If the access information is not present in described access in record, continues executing with and described generate and show according to the access information The step of showing prompting message.
5. according to the method for claim 4, it is characterised in that if described access has the access letter in record Breath, then allowing to perform the step of access in the access information operates includes:
If there is the access information in described access in record, it is determined that has allowed the access in the access information to operate and has performed Number;
When the number is equal to the frequency threshold value of setting, then the access information for accessing and being preserved in record is deleted, and Continue executing with described according to the step of access information generation and display reminding message.
6. one kind accesses operation supervising device, it is characterised in that described device includes:
Monitoring modular, the access for monitoring each application in mobile terminal operate, and whether the access operation for judging to monitor belongs to In sensitive operation;
Information generating module, if belonging to sensitive operation for the access operation monitored, according to belonging to the access operation The Apply Names of application and described access operate generation access information;
Reminding module, for according to access information generation and display reminding message, whether allowing to perform the visit with prompting Ask operation.
7. device according to claim 6, it is characterised in that the monitoring modular includes:
Acquisition module, the target interface accessed for obtaining the access operation requests;
Searching modul, for searching access interface set corresponding to the sensitive operation pre-set, if the access interface set In the target interface be present, it is determined that it is described access operation belong to sensitive operation.
8. device according to claim 6, it is characterised in that described device also includes:
First control module, for after generating and showing the prompting message, if detecting the Authorized operation of user's triggering Instruction, then allow to perform the access operation in the access information, and the access information is preserved to access record;
Second control module, for after generating and showing the prompting message, the refusal of user's triggering to operate if detecting Instruction, the then access that refusal is performed in the access information operate.
9. device according to claim 8, it is characterised in that described device also includes:
Judge module, for judging that described access in record whether there is the access information;
3rd control module, if the access information be present for described access in record, allow to perform the access information In access operation;
4th control module, if the access information is not present for described access in record, continue executing with the prompting mould Block.
10. device according to claim 9, it is characterised in that the 3rd control module includes:
Counting module, if the access information be present for described access in record, it is determined that allowed in the access information Access operation perform number;
5th control module, for when the number is equal to the frequency threshold value set, then deleting described access and being preserved in record The access information, and continue executing with the reminding module.
11. a kind of mobile terminal, including memory, processor and storage are on a memory and the calculating that can run on a processor Machine program, it is characterised in that described in the computing device during computer program, realize described in claim 1 to 5 any one Access operation monitoring method in each step.
12. a kind of readable storage medium storing program for executing, the readable storage medium storing program for executing is computer-readable recording medium, is stored thereon with computer Program, it is characterised in that when the computer program is executed by processor, realize the visit described in claim 1 to 5 any one Ask each step in operation monitoring method.
CN201710761500.0A 2017-08-30 2017-08-30 Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing Pending CN107563187A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710761500.0A CN107563187A (en) 2017-08-30 2017-08-30 Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710761500.0A CN107563187A (en) 2017-08-30 2017-08-30 Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing

Publications (1)

Publication Number Publication Date
CN107563187A true CN107563187A (en) 2018-01-09

Family

ID=60977830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710761500.0A Pending CN107563187A (en) 2017-08-30 2017-08-30 Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing

Country Status (1)

Country Link
CN (1) CN107563187A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108932435A (en) * 2018-07-05 2018-12-04 宇龙计算机通信科技(深圳)有限公司 A kind of information security management method, terminal device and computer readable storage medium
CN108944377A (en) * 2018-09-14 2018-12-07 南京理工技术转移中心有限公司 A kind of environment inside car regulating system and its working method
CN109145528A (en) * 2018-08-01 2019-01-04 上海碳蓝网络科技有限公司 A kind of calling hold-up interception method of mobile terminal and photographic device
CN109164223A (en) * 2018-09-14 2019-01-08 南京理工技术转移中心有限公司 A kind of water environment monitoring processing system and its working method
CN109451162A (en) * 2018-11-16 2019-03-08 努比亚技术有限公司 Recording control method, mobile terminal and computer readable storage medium
CN110336910A (en) * 2018-12-29 2019-10-15 华为技术有限公司 A kind of private data guard method and terminal
CN110737916A (en) * 2019-09-30 2020-01-31 青岛海信移动通信技术股份有限公司 Communication terminal and processing method
CN111625811A (en) * 2020-05-29 2020-09-04 数网金融有限公司 Data authorization method and device
CN112347505A (en) * 2020-10-19 2021-02-09 重庆传音通讯技术有限公司 Data protection method and device and computer storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368904A (en) * 2012-03-27 2013-10-23 百度在线网络技术(北京)有限公司 Mobile terminal, and system and method for suspicious behavior detection and judgment
CN103369520A (en) * 2012-03-27 2013-10-23 百度在线网络技术(北京)有限公司 Intention prejudging system and method for application program suspicious behavior of mobile terminal
CN104462970A (en) * 2014-12-17 2015-03-25 中国科学院软件研究所 Android application program permission abuse detecting method based on process communication
CN104978543A (en) * 2015-07-09 2015-10-14 黄凯锋 Mobile terminal information safety protection system and method
CN106778334A (en) * 2016-11-30 2017-05-31 上海创功通讯技术有限公司 The guard method of account information and mobile terminal
CN107045605A (en) * 2016-02-05 2017-08-15 中兴通讯股份有限公司 A kind of real-time metrics method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368904A (en) * 2012-03-27 2013-10-23 百度在线网络技术(北京)有限公司 Mobile terminal, and system and method for suspicious behavior detection and judgment
CN103369520A (en) * 2012-03-27 2013-10-23 百度在线网络技术(北京)有限公司 Intention prejudging system and method for application program suspicious behavior of mobile terminal
CN104462970A (en) * 2014-12-17 2015-03-25 中国科学院软件研究所 Android application program permission abuse detecting method based on process communication
CN104978543A (en) * 2015-07-09 2015-10-14 黄凯锋 Mobile terminal information safety protection system and method
CN107045605A (en) * 2016-02-05 2017-08-15 中兴通讯股份有限公司 A kind of real-time metrics method and device
CN106778334A (en) * 2016-11-30 2017-05-31 上海创功通讯技术有限公司 The guard method of account information and mobile terminal

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108932435A (en) * 2018-07-05 2018-12-04 宇龙计算机通信科技(深圳)有限公司 A kind of information security management method, terminal device and computer readable storage medium
CN109145528A (en) * 2018-08-01 2019-01-04 上海碳蓝网络科技有限公司 A kind of calling hold-up interception method of mobile terminal and photographic device
CN108944377A (en) * 2018-09-14 2018-12-07 南京理工技术转移中心有限公司 A kind of environment inside car regulating system and its working method
CN109164223A (en) * 2018-09-14 2019-01-08 南京理工技术转移中心有限公司 A kind of water environment monitoring processing system and its working method
CN109451162A (en) * 2018-11-16 2019-03-08 努比亚技术有限公司 Recording control method, mobile terminal and computer readable storage medium
CN109451162B (en) * 2018-11-16 2021-06-18 努比亚技术有限公司 Recording control method, mobile terminal and computer readable storage medium
CN110336910A (en) * 2018-12-29 2019-10-15 华为技术有限公司 A kind of private data guard method and terminal
CN110737916A (en) * 2019-09-30 2020-01-31 青岛海信移动通信技术股份有限公司 Communication terminal and processing method
CN111625811A (en) * 2020-05-29 2020-09-04 数网金融有限公司 Data authorization method and device
CN112347505A (en) * 2020-10-19 2021-02-09 重庆传音通讯技术有限公司 Data protection method and device and computer storage medium

Similar Documents

Publication Publication Date Title
CN107563187A (en) Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing
CN107346397B (en) Information processing method and related product
CN107918850A (en) A kind of express delivery information processing method, terminal and computer-readable recording medium
CN109656980A (en) Data processing method, electronic equipment, device and readable storage medium storing program for executing
CN107222914B (en) Application control method and related product
CN109190369A (en) A kind of camera control method, terminal and computer storage medium
CN104967683A (en) Message pushing method, terminal and server
CN104346560A (en) Security authentication method and security authentication device
CN106598676A (en) Application management method and apparatus, and terminal device
CN107872555A (en) Call recording method, device, terminal device and computer-readable recording medium
CN107360332A (en) Talking state display methods, device, mobile terminal and storage medium
CN105892822A (en) Mobile terminal and rapid setting method and device thereof
CN107371221A (en) Select method, apparatus, mobile terminal and the readable storage medium storing program for executing of network
CN106022071A (en) Fingerprint unlocking method and terminal
CN107871015A (en) Daily record data processing method and processing device, terminal and readable storage medium storing program for executing
CN107809437A (en) A kind of converged communication login method, device and computer-readable recording medium
CN106255102A (en) The authentication method of a kind of terminal unit and relevant device
CN105262878A (en) Processing method of automatic call recording and mobile terminal
CN106790926A (en) A kind of contact management method and terminal
CN107222629A (en) Call processing method and related product
CN106105168A (en) A kind of method, terminal and portable electric appts calling transfer
CN106599663A (en) Information security protecting method and mobile terminal
CN106817489A (en) The reminding method and mobile terminal of message
CN104575548A (en) File playing positioning method and device as well as terminal
CN107798821A (en) Safety prompt function method, apparatus, mobile terminal and readable storage medium storing program for executing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180109

RJ01 Rejection of invention patent application after publication