CN109543405B - Privacy calling behavior identification method and electronic equipment - Google Patents

Privacy calling behavior identification method and electronic equipment Download PDF

Info

Publication number
CN109543405B
CN109543405B CN201811491203.XA CN201811491203A CN109543405B CN 109543405 B CN109543405 B CN 109543405B CN 201811491203 A CN201811491203 A CN 201811491203A CN 109543405 B CN109543405 B CN 109543405B
Authority
CN
China
Prior art keywords
privacy
information
behavior
application program
calling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811491203.XA
Other languages
Chinese (zh)
Other versions
CN109543405A (en
Inventor
贾志军
朱鹏举
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Original Assignee
Baidu Online Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Baidu Online Network Technology Beijing Co Ltd filed Critical Baidu Online Network Technology Beijing Co Ltd
Priority to CN201811491203.XA priority Critical patent/CN109543405B/en
Publication of CN109543405A publication Critical patent/CN109543405A/en
Application granted granted Critical
Publication of CN109543405B publication Critical patent/CN109543405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides a privacy calling behavior identification method and electronic equipment, wherein the method comprises the following steps: carrying out privacy calling behavior monitoring on the application program; if the privacy calling behavior of the application program calling the privacy information is monitored, acquiring the context information of the electronic equipment in the process of calling the privacy information by the privacy calling behavior; and judging whether the privacy calling behavior meets a preset condition or not according to the context information, wherein when the preset condition is met, the electronic equipment cannot output related reminding information in the process. Therefore, the privacy scheduling information of the related reminding information which cannot be output by the electronic equipment in the process of calling the privacy information can be identified, and the management performance of the privacy calling behavior of the application program is improved.

Description

Privacy calling behavior identification method and electronic equipment
Technical Field
The invention relates to the technical field of internet, in particular to a privacy calling behavior identification method and device and electronic equipment.
Background
With the increase of usage scenarios of people using electronic devices, more and more private information is stored in the electronic devices, for example: an address book, a photograph, an account number, an account password, a geographic location of the electronic device, a chat history, and so forth. And with the development of internet technology, people pay more and more attention to the privacy information in the electronic equipment so as to avoid stealing the privacy by others. At present, privacy calling behaviors for calling privacy information often exist in a plurality of application programs, and only the privacy calling behaviors of the application programs are recorded in the related technology, but the privacy calling behaviors cannot be analyzed, so that the management performance of the privacy calling behaviors of the application programs is poor.
Disclosure of Invention
The embodiment of the invention provides a privacy calling behavior identification method and electronic equipment, and aims to solve the problem that the management performance of the privacy calling behavior of an application program is poor.
The embodiment of the invention provides a privacy calling behavior identification method, which is applied to electronic equipment and comprises the following steps:
carrying out privacy calling behavior monitoring on the application program;
if the privacy calling behavior of the application program calling the privacy information is monitored, acquiring the context information of the electronic equipment in the process of calling the privacy information by the privacy calling behavior;
and judging whether the privacy calling behavior meets a preset condition or not according to the context information, wherein when the preset condition is met, the electronic equipment cannot output related reminding information in the process.
Optionally, the context information includes at least one of:
the method comprises the following steps that the running environment of the application program, the screen locking state of the electronic equipment and the display content of the electronic equipment are obtained, wherein the running environment comprises foreground running or background running;
the preset conditions include:
the screen locking state of the electronic equipment is a black screen state or a bright screen locking state; or
The running environment of the electronic equipment is background running; or
The display content does not include the related reminding information; or
The semantic information of the display content does not include the related reminder information.
Optionally, the display content includes at least one of:
a screenshot of the electronic device and view layout information of an application interface of the application program displayed by the electronic device.
Optionally, the monitoring the private call behavior of the application program includes:
the method comprises the steps of carrying out privacy calling behavior monitoring on an application program through a preset piling point, wherein the piling point comprises a service function and/or a service interface, the service function comprises a system framework layer and/or a service function used for managing privacy information in the application program, and the service interface comprises a service interface used for managing privacy information in the system framework layer and/or the system application program.
Optionally, before the privacy call behavior monitoring is performed on the application program, the method further includes:
and simulating an application scene, and triggering the application behavior of the application program through a behavior trigger under the simulated application scene.
An embodiment of the present invention further provides an electronic device, including:
the monitoring module is used for carrying out privacy calling behavior monitoring on the application program;
the obtaining module is used for obtaining context information of the electronic equipment in the process of calling the privacy information by the privacy calling behavior if the privacy calling behavior of calling the privacy information by the application program is monitored;
and the judging module is used for judging whether the privacy calling behavior meets a preset condition or not according to the context information, wherein when the preset condition is met, the electronic equipment cannot output related reminding information in the process.
Optionally, the context information includes at least one of:
the method comprises the following steps that the running environment of the application program, the screen locking state of the electronic equipment and the display content of the electronic equipment are obtained, wherein the running environment comprises foreground running or background running;
the preset conditions include:
the screen locking state of the electronic equipment is a black screen state or a bright screen locking state; or
The running environment of the electronic equipment is background running; or
The display content does not include the related reminding information; or
The semantic information of the display content does not include the related reminder information.
Optionally, the display content includes at least one of:
a screenshot of the electronic device and view layout information of an application interface of the application program displayed by the electronic device.
Optionally, the monitoring module is configured to perform privacy call behavior monitoring on the application program through a preset piling point, where the piling point includes a service function and/or a service interface, the service function includes a system framework layer and/or a service function for managing privacy information in the application program, and the service interface includes a service interface for managing privacy information in the system framework layer and/or the system application program.
Optionally, the electronic device further includes:
and the triggering module is used for simulating an application scene and triggering the application behavior of the application program through the behavior trigger in the simulated application scene.
The embodiment of the invention also provides electronic equipment, which comprises a processor, a memory and a computer program which is stored on the memory and can run on the processor, wherein when the computer program is executed by the processor, the steps of the privacy calling behavior recognition method provided by the embodiment of the invention are realized.
The embodiment of the invention also provides a computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the privacy calling behavior identification method provided by the embodiment of the invention are realized.
According to the embodiment of the invention, the privacy calling behavior monitoring is carried out on the application program; if the privacy calling behavior of the application program calling the privacy information is monitored, acquiring the context information of the electronic equipment in the process of calling the privacy information by the privacy calling behavior; and judging whether the privacy calling behavior meets a preset condition or not according to the context information, wherein when the preset condition is met, the electronic equipment cannot output related reminding information in the process. Therefore, the privacy scheduling information of the related reminding information which cannot be output by the electronic equipment in the process of calling the privacy information can be identified, and the management performance of the privacy calling behavior of the application program is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a flowchart of a method for recognizing a privacy call behavior according to an embodiment of the present invention;
FIG. 2 is a flow chart of another privacy call behavior recognition method provided by an embodiment of the invention;
FIG. 3 is a schematic diagram of a privacy-invoked behavior recognition method according to an embodiment of the present invention;
FIG. 4 is a block diagram of an electronic device according to an embodiment of the present invention;
FIG. 5 is a block diagram of another electronic device provided by an embodiment of the invention;
fig. 6 is a block diagram of another electronic device provided in an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "comprises," "comprising," or any other variation thereof, in the description and claims of this application, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Furthermore, the use of "and/or" in the specification and claims means that at least one of the connected objects, such as a and/or B, means that three cases, a alone, B alone, and both a and B, exist.
In the embodiments of the present invention, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or descriptions. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
Referring to fig. 1, fig. 1 is a flowchart of a privacy invoking behavior recognition method according to an embodiment of the present invention, where the method is applied to an electronic device, and as shown in fig. 1, the method includes the following steps:
and 101, carrying out privacy calling behavior monitoring on the application program.
102, if the privacy calling behavior of the application program calling the privacy information is monitored, obtaining context information of the electronic equipment in the process of calling the privacy information by the privacy calling behavior.
Step 103, judging whether the privacy calling behavior meets a preset condition or not according to the context information, wherein when the preset condition is met, the electronic equipment cannot output related reminding information in the process.
The application program may be an application program tested before release or during development, or the application program may be an application program tested when applying for entering an application store, which is not limited, for example: the application program may be an application program downloaded and installed from an application store.
And the privacy invoking behavior may be a behavior that an application invokes privacy information, where the privacy information includes but is not limited to: an address book, a photograph, an account number, an account password, a geographic location of the electronic device, a chat history, and so forth.
And the context information may include at least one of state information, environment information, display information, and the like of the electronic device in the process of invoking the privacy information by the privacy invoking behavior. According to the embodiment of the invention, whether the privacy information meets the preset condition or not can be determined by identifying or judging the context information.
The preset condition may be pre-configured by the electronic device, and when the preset condition is met, the electronic device cannot output related reminding information in the process of calling the privacy information by the privacy calling behavior. That is, when the preset condition is satisfied, the user cannot perceive the privacy invoking behavior, or the privacy invoking behavior may be considered to be not compliant with the user's intention, so that the privacy invoking behavior does not satisfy the relevant compliance, where compliance may be understood as that the application program is executing the privacy invoking behavior, the user may perceive, or the privacy invoking behavior may be compliant with the user's intention, for example: in the process of calling the privacy information by the privacy calling behavior, if the electronic equipment outputs the related reminding information, the electronic equipment is considered to be in compliance, otherwise, the electronic equipment is confirmed not to be in compliance.
In addition, the outputting the related reminding information may be displaying the related reminding information, or outputting the related reminding information in an audio or other manner. In this embodiment of the present invention, the related reminding information may be information that enables the user to perceive the privacy invoking behavior as invoking the privacy information, for example: a reminder message reminding that certain privacy information is being called, or a request message requesting to call certain privacy information, and a response message of the request, or called privacy information, and so on. Therefore, if the relevant reminding information cannot be output, the fact that the user cannot perceive the privacy invoking behavior to invoke the privacy information can be determined, or the fact that the privacy invoking behavior invokes the privacy information is not in accordance with the intention of the user can be determined.
Of course, in the embodiment of the present invention, if the preset condition is not satisfied, it may be further determined whether the electronic device outputs the relevant reminder information in the process of calling the privacy information by the privacy calling behavior. For example: the preset condition is that the screen locking state of the electronic equipment is a blank screen state or a locking state, if the condition is met, the electronic equipment cannot output related reminding information in the process, if the condition is not met, further judgment is needed to judge the running environment of the application program, if the running is in a background, the electronic equipment cannot output the related reminding information in the process is determined, and if the running is in a foreground, whether the electronic equipment outputs the related reminding information or not can be judged according to the display content displayed by the electronic equipment.
Of course, in the embodiment of the present invention, when the preset condition is not satisfied, it may also be directly determined that the electronic device outputs the relevant reminding information in the process. For example: the preset conditions include: when the display content of the electronic equipment does not include the related reminding information, or when the semantic information of the display content does not include the related reminding information, the electronic equipment can be directly determined to output the related reminding information in the process when the preset condition is not met.
In the embodiment of the invention, when the privacy calling behavior is monitored, the privacy calling behavior can be judged according to the context information so as to identify the privacy calling behavior that the electronic equipment cannot output the related reminding information in the process of calling the privacy information, and the behavior can be understood as the privacy calling behavior which cannot be perceived by a user or does not accord with the intention of the user. Thereby improving the management performance of the privacy calling behavior of the application program. In addition, in some relevant compliance, the privacy calling behavior that the electronic equipment cannot output the relevant reminding information in the process of calling the privacy information is defined to be the non-compliant privacy calling behavior, so that the non-compliant privacy calling behavior can be identified through the steps, the legal risk can be reduced, and the compliance of the privacy calling behavior of the application program is guaranteed.
It should be noted that, in the embodiment of the present invention, before the application program is released, during a development process, or when an application store is requested to enter, the application program may be tested by the method to determine whether the privacy application behavior of the application program outputs related reminding information so as to meet the relevant compliance.
In addition, the electronic Device may be an electronic Device capable of running an application, such as a Computer, a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), or a Wearable Device (Wearable Device).
According to the embodiment of the invention, the privacy calling behavior monitoring is carried out on the application program; if the privacy calling behavior of the application program calling the privacy information is monitored, acquiring the context information of the electronic equipment in the process of calling the privacy information by the privacy calling behavior; and judging whether the privacy calling behavior meets a preset condition or not according to the context information, wherein when the preset condition is met, the electronic equipment cannot output related reminding information in the process. Therefore, the privacy scheduling information of the related reminding information which cannot be output by the electronic equipment in the process of calling the privacy information can be identified, and the management performance of the privacy calling behavior of the application program is improved.
Referring to fig. 2, fig. 2 is a flowchart of another privacy invoking behavior recognition method according to an embodiment of the present invention, where the method is applied to an electronic device, and as shown in fig. 2, the method includes the following steps:
step 201, simulating an application scene, and triggering an application behavior of the application program through a behavior trigger in the simulated application scene.
And step 202, carrying out privacy calling behavior monitoring on the application program.
Step 203, if the privacy calling behavior of the application program calling the privacy information is monitored, obtaining the context information of the electronic equipment in the process of calling the privacy information by the privacy calling behavior.
And 204, judging whether the privacy calling behavior meets a preset condition or not according to the context information, wherein when the preset condition is met, the electronic equipment cannot output related reminding information in the process.
The simulation application scenario may be an application scenario for simulating a difference of the application program, for example: a black screen state, a bright screen locking state, an unlocking state, a networking state, an non-networking state, an application foreground running state, an application background running state and the like. Therefore, by simulating different application scenes, the privacy calling behavior of the application program is judged under different application scenes, so that the identification performance of the privacy calling line of the application program is improved.
In addition, in step 201, the triggering of the application behavior of the application program by the behavior trigger may be triggering a click behavior, a communication behavior, or the like of the application program by a pre-configured application behavior trigger, so that the application program may not need to be operated by a user in real time in the method process, thereby improving the working efficiency and realizing the recognition of various privacy invoking behaviors of the application program in a short time.
Of course, the application behavior of the application program may also be triggered by the user, or triggered by the server, or the like, that is, in this embodiment, step 201 is optional.
As an optional implementation, the context information includes at least one of the following:
the method comprises the steps of running the application program, the screen locking state of the electronic equipment and the display content of the electronic equipment, wherein the running environment comprises foreground running or background running.
The screen locking state can be an unlocking state, a black screen state and a bright screen locking state. And the display content may be an application interface of the application program displayed by the electronic device, or may be a display interface in a bright-screen locked state.
In this embodiment, the preset condition may include:
the screen locking state of the electronic equipment is a black screen state or a bright screen locking state; or
The running environment of the electronic equipment is background running; or
The display content does not include the related reminding information; or
The semantic information of the display content does not include the related reminder information.
Through the operation environment and the screen locking state, the privacy calling behavior that the electronic equipment cannot output related reminding information in the process of calling the privacy information can be rapidly and directly identified.
The display content not including the related reminding information may be content identification of the display content to determine whether the related reminding information is included. If the privacy calling behavior meets the relevant compliance, the electronic equipment outputs the relevant reminding information, and the privacy calling behavior is determined to meet the relevant compliance.
The semantic information of the display content may be obtained by performing semantic analysis on the display content. For example: and analyzing the context-related properties of the display content comprising a plurality of contents so as to obtain the semantic information of the display content. The semantic information may be that the electronic device is invoking the private information or that the private information is being invoked according to an operation allowed by the user. Whether the electronic equipment outputs the related reminding information or not in the process of calling the privacy information can be more accurately judged through the semantic information.
At least one of the operating environment, the screen locking state and the display content can accurately and quickly identify the privacy calling behavior, such as: it is determined whether it complies with the relevant compliance.
Further, the display content includes at least one of the following items:
a screen shot of the electronic device and View (View) layout information of an application interface of the application program displayed by the electronic device.
The screen shots can be one or more screen shots of screen display content of the electronic equipment in the process of calling the privacy information, and whether the screen shots comprise the related reminding information or not or whether semantic information of the screen shots comprises the related reminding information or not can be accurately confirmed through the screen shots.
The view layout information of the application interface may be view layout information of a plurality of application interfaces of the application program, so that whether the display interface includes the related reminding information or not or whether the semantic information of the display interface includes the related reminding information may be determined by the view layout information. For example: the method comprises the steps of obtaining view layout information of a dynamic application interface, judging whether reminding calling privacy information is added to the application interface in the process of calling the privacy information or whether a view calling the privacy information is requested, of course, identifying the view layout information, obtaining semantic information of the application interface, and further judging whether the semantic information comprises related reminding information.
Because the privacy calling behavior is identified through the view layout information of the application interface, the calculation amount can be reduced compared with a screenshot mode.
Of course, in this embodiment, whether the privacy invoking behavior meets the preset condition may be determined by integrating the plurality of pieces of context information. For example: the screen locking state of the electronic equipment can be recognized firstly, if the screen locking state is a black screen state or a bright screen locking state, the preset condition is directly determined to be met, if the screen locking state is an unlocking state, the running environment of the application program is further judged, if the screen locking state is a background running state, the preset condition is determined to be met, if the screen locking state is a foreground running state, the display content is obtained, and whether the display content comprises the related reminding information or not or whether the semantic information of the display content comprises the related reminding information or not is judged.
Therefore, through the comprehensive judgment, the identification speed of the privacy calling behavior can be improved, and whether the privacy calling behavior is suitable for the relevant compliance can be identified more accurately.
Certainly, in this embodiment, the running environment of the application program, the lock screen state of the electronic device, and the display content of the electronic device are only some better context information, which is not limited in this embodiment, for example: the context information further includes networking states, i.e., an online state and an offline state, of the electronic device or the application. When the networking state of the electronic device or the application program is included, the networking state of the privacy invoking behavior may be recorded, and of course, other states may also be recorded, for example: lock screen status and run environment, etc.
As an optional implementation manner, the performing privacy call behavior monitoring on the application program includes:
the method comprises the steps of carrying out privacy calling behavior monitoring on an application program through a preset piling point, wherein the piling point comprises a service function and/or a service interface, the service function comprises a system framework layer and/or a service function used for managing privacy information in the application program, and the service interface comprises a service interface used for managing privacy information in the system framework layer and/or the system application program.
The foregoing pile driving point may be to pile the service functions for managing the private information and/or the service interfaces for managing the private information in the system framework layer and/or the application, that is, to inject the codes of the service functions and/or the service interfaces into the monitoring list to monitor the service functions and/or the service interfaces. In addition, the above system application (system APP) may be an operating system of the electronic device, or a system application for managing the above application, or the like.
In the embodiment, the privacy calling behavior of the application program can be accurately and dynamically monitored as the privacy calling behavior of the application program is monitored through the service function and/or the service interface.
In this embodiment, the service function and the service interface are not limited, and the following illustrates the embodiment with reference to fig. 3:
as shown in fig. 3, the system includes an application behavior trigger, a test application, a Framework (Framework) layer pile driving point, a system application (system APP) pile driving point, a core service, and a privacy invocation behavior collector;
the application behavior trigger is mainly used for triggering and testing the application behavior of the application program through simulated clicking;
the test application program executes various application behaviors under the trigger of the application behavior trigger, wherein the application behaviors comprise privacy calling behaviors;
the method comprises the following steps that a framework layer pile driving point and a system application program pile driving point are used for driving piles through a system framework layer and a system application program, the privacy behaviors of an application program to be tested are completely recorded, and the application privacy behaviors are reported to a core service;
wherein the above-mentioned framework layer piling occupies the piling point including but not limited to that shown in fig. 3:
an Account management service (Account Manager service), a Phone interface Manager (Phone interface Manager), and a Phone sub info controller (Phone sub info controller), etc.
While the above-described system applications pile driving points include, but are not limited to, the pile driving points shown in fig. 3:
call log provider, contact provider2, sms provider, and so on.
The core service is mainly used for recording application privacy behaviors reported by other services of a system and constructing privacy calling context information. The privacy calling context information may include relevant information such as application foreground or background conditions, whether the device is in a screen locking state, whether networking is performed, screen capture, current application View layout, and the like.
The privacy behavior collector is mainly used for sorting application privacy behaviors reported by a core service and calling context information thereof, and making a data user privacy call for compliance judgment, for example: and judging whether the privacy calling behavior meets the preset condition or not.
In this embodiment, multiple optional implementation manners are added on the basis of the embodiment shown in fig. 1, and the beneficial effects of improving the working efficiency, improving the privacy calling behavior monitoring accuracy and the recognition accuracy and the like can be achieved while improving the management performance of the privacy calling behavior of the application program.
Referring to fig. 4, fig. 4 is a structural diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 4, the electronic device 400 includes:
the monitoring module 401 is configured to perform privacy calling behavior monitoring on an application program;
an obtaining module 402, configured to, if a privacy invoking behavior of invoking privacy information by the application is monitored, obtain context information of the electronic device in a process of invoking the privacy information by the privacy invoking behavior;
a determining module 403, configured to determine whether the privacy invoking behavior meets a preset condition according to the context information, where when the preset condition is met, the electronic device cannot output related reminding information in the process.
Optionally, the context information includes at least one of:
the method comprises the following steps that the running environment of the application program, the screen locking state of the electronic equipment and the display content of the electronic equipment are obtained, wherein the running environment comprises foreground running or background running;
the preset conditions include:
the screen locking state of the electronic equipment is a black screen state or a bright screen locking state; or
The running environment of the electronic equipment is background running; or
The display content does not include the related reminding information; or
The semantic information of the display content does not include the related reminder information.
Optionally, the display content includes at least one of:
a screenshot of the electronic device and view layout information of an application interface of the application program displayed by the electronic device.
Optionally, the monitoring module is configured to perform privacy call behavior monitoring on the application program through a preset piling point, where the piling point includes a service function and/or a service interface, the service function includes a system framework layer and/or a service function for managing privacy information in the application program, and the service interface includes a service interface for managing privacy information in the system framework layer and/or the system application program.
Optionally, as shown in fig. 5, the electronic device 400 further includes:
the triggering module 404 is configured to simulate an application scenario and trigger an application behavior of the application program through a behavior trigger in the simulated application scenario.
The electronic device provided by the embodiment of the present invention can implement each process implemented by the electronic device in the method embodiments of fig. 1 and fig. 2, and can achieve the same beneficial effects, and for avoiding repetition, the details are not repeated here.
Referring to fig. 6, fig. 6 is a block diagram of another electronic device according to an embodiment of the present invention, and as shown in fig. 6, the electronic device 600 includes a processor 601, a memory 602, and a computer program stored in the memory 602 and capable of running on the processor.
Wherein the computer program when executed by the processor 601 realizes the steps of:
carrying out privacy calling behavior monitoring on the application program;
if the privacy calling behavior of the application program calling the privacy information is monitored, acquiring the context information of the electronic equipment in the process of calling the privacy information by the privacy calling behavior;
and judging whether the privacy calling behavior meets a preset condition or not according to the context information, wherein when the preset condition is met, the electronic equipment cannot output related reminding information in the process.
Optionally, the context information includes at least one of:
the method comprises the following steps that the running environment of the application program, the screen locking state of the electronic equipment and the display content of the electronic equipment are obtained, wherein the running environment comprises foreground running or background running;
the preset conditions include:
the screen locking state of the electronic equipment is a black screen state or a bright screen locking state; or
The running environment of the electronic equipment is background running; or
The display content does not include the related reminding information; or
The semantic information of the display content does not include the related reminder information.
Optionally, the display content includes at least one of:
a screenshot of the electronic device and view layout information of an application interface of the application program displayed by the electronic device.
Optionally, the monitoring the private call behavior of the application program includes:
the method comprises the steps of carrying out privacy calling behavior monitoring on an application program through a preset piling point, wherein the piling point comprises a service function and/or a service interface, the service function comprises a system framework layer and/or a service function used for managing privacy information in the application program, and the service interface comprises a service interface used for managing privacy information in the system framework layer and/or the system application program.
Optionally, before the privacy call behavior monitoring is performed on the application program, when executed by the processor 601, the computer program implements the following steps:
and simulating an application scene, and triggering the application behavior of the application program through a behavior trigger under the simulated application scene.
The electronic device provided by the embodiment of the present invention can implement each process implemented by the electronic device in the method embodiments of fig. 1 and fig. 2, and can achieve the same beneficial effects, and for avoiding repetition, the details are not repeated here.
The embodiment of the invention also provides a computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the privacy calling behavior identification method provided by the embodiment of the invention are realized.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A privacy calling behavior recognition method is applied to electronic equipment and is characterized by comprising the following steps:
carrying out privacy calling behavior monitoring on the application program;
if the privacy calling behavior of calling the privacy information by the application program is monitored, acquiring the context information of the electronic equipment in the process of calling the privacy information by the privacy calling behavior, wherein the context information of the electronic equipment comprises the display content of the electronic equipment;
judging whether the privacy calling behavior meets a preset condition or not according to the context information, wherein when the privacy calling behavior meets the preset condition, the electronic equipment cannot output related reminding information in the process of calling the privacy information by the privacy calling behavior, and the preset condition comprises: the display content does not include the related reminding information, or the semantic information of the display content does not include the related reminding information;
the privacy calling behavior monitoring of the application program comprises the following steps:
the method comprises the steps of carrying out privacy calling behavior monitoring on an application program through a preset piling point, wherein the piling point comprises a service function and/or a service interface, the service function comprises a system framework layer and/or a service function used for managing privacy information in the application program, and the service interface comprises a service interface used for managing privacy information in the system framework layer and/or the system application program.
2. The method of claim 1, wherein the contextual information comprises at least one of:
the electronic equipment comprises an application program running environment and a screen locking state of the electronic equipment, wherein the running environment comprises foreground running or background running.
3. The method of claim 2, wherein the display content comprises at least one of:
a screenshot of the electronic device and view layout information of an application interface of the application program displayed by the electronic device.
4. The method of any of claims 1-3, wherein prior to the privacy call behavior monitoring of the application, the method further comprises:
and simulating an application scene, and triggering the application behavior of the application program through a behavior trigger under the simulated application scene.
5. An electronic device, comprising:
the monitoring module is used for carrying out privacy calling behavior monitoring on the application program;
the obtaining module is used for obtaining context information of the electronic equipment in the process of calling the privacy information by the privacy calling behavior if the privacy calling behavior of calling the privacy information by the application program is monitored, wherein the context information of the electronic equipment comprises display content of the electronic equipment;
the judging module is used for judging whether the privacy calling behavior meets a preset condition or not according to the context information, wherein when the privacy calling behavior meets the preset condition, the judging module indicates that the electronic equipment cannot output related reminding information in the process of calling the privacy information by the privacy calling behavior, and the preset condition comprises: the display content does not include the related reminding information, or the semantic information of the display content does not include the related reminding information;
the monitoring module is specifically configured to perform privacy call behavior monitoring on the application program through a preset piling point, where the piling point includes a service function and/or a service interface, the service function includes a system framework layer and/or a service function for managing privacy information in the application program, and the service interface includes a service interface for managing privacy information in the system framework layer and/or the system application program.
6. The electronic device of claim 5, wherein the contextual information comprises at least one of:
the electronic equipment comprises an application program running environment and a screen locking state of the electronic equipment, wherein the running environment comprises foreground running or background running.
7. The electronic device of claim 6, wherein the display content comprises at least one of:
a screenshot of the electronic device and view layout information of an application interface of the application program displayed by the electronic device.
8. The electronic device of any of claims 5-7, wherein the electronic device further comprises:
and the triggering module is used for simulating an application scene and triggering the application behavior of the application program through the behavior trigger in the simulated application scene.
9. An electronic device comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the privacy-invoked behavior recognition method of any of claims 1-4.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the privacy-call behavior recognition method according to any one of claims 1 to 4.
CN201811491203.XA 2018-12-07 2018-12-07 Privacy calling behavior identification method and electronic equipment Active CN109543405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811491203.XA CN109543405B (en) 2018-12-07 2018-12-07 Privacy calling behavior identification method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811491203.XA CN109543405B (en) 2018-12-07 2018-12-07 Privacy calling behavior identification method and electronic equipment

Publications (2)

Publication Number Publication Date
CN109543405A CN109543405A (en) 2019-03-29
CN109543405B true CN109543405B (en) 2022-04-19

Family

ID=65853080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811491203.XA Active CN109543405B (en) 2018-12-07 2018-12-07 Privacy calling behavior identification method and electronic equipment

Country Status (1)

Country Link
CN (1) CN109543405B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113412603B (en) * 2019-04-16 2022-08-16 深圳市欢太科技有限公司 Privacy compliance detection method and related product
CN110990873B (en) * 2019-12-03 2023-06-02 浙江大华技术股份有限公司 Monitoring method for illegal operation, computer equipment and storage medium
CN111259421A (en) * 2020-01-15 2020-06-09 奇安信科技集团股份有限公司 Privacy authority anti-disclosure processing method and device, electronic equipment and storage medium
CN114116399B (en) * 2021-11-29 2024-02-23 深圳乐信软件技术有限公司 Monitoring method, device, equipment and medium for third party SDK in application
CN114510291B (en) * 2022-01-27 2023-10-24 百度在线网络技术(北京)有限公司 Data calling method, device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021062A (en) * 2013-03-01 2014-09-03 联想(北京)有限公司 Information processing method and electronic device
CN105072255A (en) * 2015-07-10 2015-11-18 北京奇虎科技有限公司 Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment
CN107103240A (en) * 2017-04-20 2017-08-29 中国科学院信息工程研究所 A kind of Android inter-module privacy leakage Activity recognition method and system based on contextual information

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819715A (en) * 2012-08-15 2012-12-12 腾讯科技(深圳)有限公司 API (application programming interface) monitoring method and device
CN105550595A (en) * 2015-12-22 2016-05-04 北京奇虎科技有限公司 Private data access method and system for intelligent communication equipment
CN106775680A (en) * 2016-11-30 2017-05-31 北京奇虎科技有限公司 Suspend processing method, device and the mobile terminal for notifying
CN107046595A (en) * 2016-12-22 2017-08-15 北京奇虎科技有限公司 Announcement information processing method, device and mobile terminal
CN107967154B (en) * 2017-12-14 2021-04-16 腾讯科技(深圳)有限公司 Reminding item generation method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021062A (en) * 2013-03-01 2014-09-03 联想(北京)有限公司 Information processing method and electronic device
CN105072255A (en) * 2015-07-10 2015-11-18 北京奇虎科技有限公司 Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment
CN107103240A (en) * 2017-04-20 2017-08-29 中国科学院信息工程研究所 A kind of Android inter-module privacy leakage Activity recognition method and system based on contextual information

Also Published As

Publication number Publication date
CN109543405A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
CN109543405B (en) Privacy calling behavior identification method and electronic equipment
CN110378749B (en) Client similarity evaluation method and device, terminal equipment and storage medium
CN105704005B (en) Malicious user reporting method and device, and reported information processing method and device
US20110161989A1 (en) Dynamic program integration
JP2011523737A5 (en)
CN112653670A (en) Service logic vulnerability detection method, device, storage medium and terminal
CN113792341B (en) Automatic detection method, device, equipment and medium for privacy compliance of application program
CN113037545A (en) Network simulation method, device, equipment and storage medium
CN112597020A (en) Interface testing method and device, computer equipment and storage medium
US9736222B1 (en) System, method, and computer program for automatically exposing application programming interfaces (APIS) associated with an application server to one or more client devices
CN109240916B (en) Information output control method, information output control device and computer readable storage medium
CN110598419A (en) Block chain client vulnerability mining method, device, equipment and storage medium
CN112423024A (en) Video transcoding method and device, computer equipment and storage medium
CN115934179B (en) Service function control method and equipment
CN112306826A (en) Method and apparatus for processing information for terminal
CN116015860A (en) Network asset simulation method, device, equipment and medium based on honeypot technology
CN110990275B (en) Page display test method and device for mobile banking
CN106648598B (en) Method and apparatus for displaying display information of application
CN112379967B (en) Simulator detection method, device, equipment and medium
CN106708605B (en) Method and device for detecting resource leakage
CN108810230B (en) Method, device and equipment for acquiring incoming call prompt information
CN113836135A (en) Platform data monitoring method, device, equipment and storage medium
CN114036551A (en) Data processing method and device for private data, computer equipment and medium
CN112231697A (en) Third-party SDK behavior detection method, device, medium and electronic equipment
CN111953583A (en) Information processing system and method, electronic device, and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant