CN110175452A - The guard method of data file and mobile terminal - Google Patents

The guard method of data file and mobile terminal Download PDF

Info

Publication number
CN110175452A
CN110175452A CN201910399670.8A CN201910399670A CN110175452A CN 110175452 A CN110175452 A CN 110175452A CN 201910399670 A CN201910399670 A CN 201910399670A CN 110175452 A CN110175452 A CN 110175452A
Authority
CN
China
Prior art keywords
object run
data file
user
prompt information
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910399670.8A
Other languages
Chinese (zh)
Inventor
史鹏刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910399670.8A priority Critical patent/CN110175452A/en
Publication of CN110175452A publication Critical patent/CN110175452A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The embodiment of the invention discloses a kind of guard method of data file and mobile terminals to avoid privacy compromise for protecting the data file of user.This method comprises: monitoring target data file;If listening to the object run for the target data file, suspend the object run, and export prompt information, the prompt information chooses whether to allow the object run for user;According to the selection result of the user, it is determined whether continue the object run.The embodiment of the present invention can be reduced effectively, prevent certain application programs from reading subscriber data file on backstage and then be used for illegal purposes, can be played a protective role to the data file of user.

Description

The guard method of data file and mobile terminal
Technical field
The present embodiments relate to field of terminal technology more particularly to a kind of guard method of data file and movements eventually End.
Background technique
With the development of mobile terminal technology, the type of mobile terminal (such as mobile phone) interior application APP also constantly increases More, part APP may read the data file (such as picture file) of user in the unwitting situation of user, cause user Privacy compromise.
In the related technology, in order to protect the data file of user, APP would generally be provided with user during installation and choose behaviour Make, for example, whether user chooses allows to read photograph album permission etc..But user just defaults hook when installing APP under normal circumstances Having selected allows to read photograph album permission, and is permanently, and user is subsequent will not generally also to go to pay close attention to this permission again, so above-mentioned side Case can not veritably play the role of protecting data file.
Summary of the invention
The embodiment of the present invention provides guard method and the mobile terminal of a kind of data file, to protect the data text of user Part avoids privacy compromise.
In order to solve the above-mentioned technical problem, the embodiments of the present invention are implemented as follows:
In a first aspect, providing a kind of guard method of data file, this method can be applied to mobile terminal, comprising:
Monitor target data file;
If listening to the object run for the target data file, suspend the object run, and exports prompt Information, the prompt information choose whether to allow the object run for user;
According to the selection result of the user, it is determined whether continue the object run.
Second aspect provides a kind of mobile terminal, comprising:
Module is monitored, for monitoring target data file;
Output module, if suspending the target behaviour for listening to the object run for the target data file Make, and export prompt information, the prompt information chooses whether to allow the object run for user;
Processing module, for the selection result according to the user, it is determined whether continue the object run.
The third aspect provides a kind of mobile terminal, which includes processor, memory and be stored in described deposit On reservoir and the computer program that can run on the processor, the computer program are realized when being executed by the processor The step of method as described in relation to the first aspect.
Fourth aspect provides a kind of computer readable storage medium, stores meter on the computer readable storage medium Calculation machine program, the step of method as described in relation to the first aspect is realized when the computer program is executed by processor.
In embodiments of the present invention, by monitoring target data file, the target for target data file is being listened to In the case where operation, suspends object run and export prompt information, which chooses whether to allow above-mentioned mesh for user Mark operation, finally result determines whether to continue object run according to the user's choice.The embodiment of the present invention is based on to data file It is real-time monitoring and Interception Technology, can effectively reduce, prevent certain application programs backstage read subscriber data file in turn For illegal purposes, can play a protective role to the data file of user.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes a part of the invention, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the guard method flow diagram for the data file that one embodiment of the present of invention provides;
Fig. 2 is the interface schematic diagram that prompt information is exported in one embodiment of the present of invention;
Fig. 3 is the number of operations schematic diagram that a variety of data files are directed in one embodiment of the present of invention;
Fig. 4 is the operation note schematic diagram that screenshotss file is directed in one embodiment of the present of invention;
Fig. 5 is the screenshotss listed files schematic diagram that an application program is read in one embodiment of the present of invention;
Fig. 6 is the interface schematic diagram that sensitive data monitoring is opened in one embodiment of the present of invention;
Fig. 7 is the mobile terminal structure schematic diagram that one embodiment of the present of invention provides;
A kind of hardware structural diagram of Fig. 8 mobile terminal of each embodiment to realize the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
As shown in Figure 1, one embodiment of the present of invention provides a kind of guard method 100 of data file, this method can be with Applied to mobile terminal, include the following steps:
S102: target data file is monitored.
Above-mentioned target data file can be the picture file stored in mobile terminal, video file, recording file, connection It is people and geographical location information etc..
Above-mentioned picture file can be collected by the camera of mobile terminal, be can also be and carried out to mobile terminal The screenshotss file that screenshotss obtain.
Above-mentioned video file, the camera and microphone that can be mobile terminal collect, and specifically can be audio-video File.
Above-mentioned recording file can specifically be collected by the microphone of mobile terminal.
The step can specifically monitor above-mentioned target data text by the FileObserver class under android.os packet Part specifically can be and monitor whether target data file is read, is written and deletes.Wherein, FileObserver is a pumping As class, each FileObserver object monitors the target complete for including in an individual target data file or file Data file.
S104: the object run for target data file whether is listened to.
If listening to the object run for target data file, S106 is executed;
If not listening to the object run for target data file, S102 is continued to execute.
Above-mentioned object run can be read operation, write operation or delete operation etc..Above-mentioned read operation, that is, read The particular content of target data file;Above-mentioned write operation, for example, the content of modification target data file;Above-mentioned delete operation, That is delete target data file.
If specific for example, it is ACCESS that FileObserver object, which listens to the event type for target data file, It is accessed to listen to target data file;If listening to the event type for target data file is MODIFY, that is, monitor It is written into target data file;If listening to the event type for target data file is DELETE, that is, listen to target Data file is deleted.
S106: pause object run, and export prompt information.
Above-mentioned prompt information chooses whether to allow the object run for user, specific as shown in Fig. 2, if user clicks Allow button, then can continue object run;If user clicks refusal button, object run can be terminated.
Optionally, the prompt information exported in the step is not limited to interface prompt, can also be that auditory tone cues etc. are other Prompting mode.
Optionally, continuation object run mentioned above can be this object run for only allowing application program, and It is not the object run for permanently allowing the application program to be directed to above-mentioned target data file.If subsequent listen to the application program For the object run of above-mentioned target data file, then it can continue to output above-mentioned prompt information and choose whether to allow for user.
S108: the selection result of user is received;
If the selection result received is confirmation input, for example, user clicks permission button in Fig. 2;Or receive user The voice messaging that can be identified for that confirmation issued, then continue above-mentioned object run;
If the selection result received is negative input, for example, user clicks refusal button in Fig. 2;Or receive user The voice messaging that can be identified for that negative issued, then terminate above-mentioned object run.
In view of some application programs may be stealthily to read the data file of user in the case where putting out screen state, and user at this time It may not be concerned about the prompt information of mobile terminal, therefore, in the embodiment, if being not received by user in preset duration Any selection result, then can also terminate above-mentioned object run.
In embodiments of the present invention, by monitoring target data file, the target for target data file is being listened to In the case where operation, suspends object run and export prompt information, which chooses whether to allow above-mentioned mesh for user Mark operation, finally result determines whether to continue object run according to the user's choice.The embodiment of the present invention is based on to data file It is real-time monitoring and Interception Technology, can effectively reduce, prevent certain application programs backstage read subscriber data file in turn For illegal purposes, can play a protective role to the data file of user.
Optionally, the pause of above-described embodiment S106 object run, and before exporting prompt information, can also include Following steps:
Judge whether the object run is to be triggered by user;
Wherein, the pause of above-described embodiment S106 object run, and if exporting prompt information includes: the target behaviour It is not to be triggered by user, then suspends the object run, and export prompt information.If the object run is by user's active Triggering, then it can also return and execute S102.
In the embodiment, by judging whether object run is to be triggered by user, if object run is triggered by user, It is shown to be some application program and stealthily operates target data file in the case where unauthorized, then can suspend target behaviour in time Make and issue prompt information, plays a protective role to data file.
Under other scenes, it may be possible to user's active operation target data file, for example, user is soft by instant messaging Part sends the video in oneself mobile phone to good friend;Or it is examined in such a scenario when some picture files in user's deletion photograph album The object run (for example, reading, deletion) for target data file (such as video file, picture file) is measured, but should Embodiment judges that object run is that user actively triggers, then can not export prompt information, avoid excessive prompt information User is interfered, user experience is promoted.
Specifically, judge whether the object run is to be triggered by user in the embodiment, camera detection can be passed through Whether detect face before mobile terminal, if detect the means such as the clicking operation of user, come judge object run whether be It is triggered by user.
Optionally, the pause of above-described embodiment S106 object run, and after exporting prompt information, can also include Following steps: to the cumulative digit of the record number of the object run;And record that the object run is corresponding to answer Use program.
Specifically, in sensitive information monitoring weekly as shown in Figure 3, for each data file, (screenshotss file, record are shielded File, photo files), the number for having the object run (including reading and writing) in one week is recorded, is looked into time convenient for user It sees.
Optionally, above-described embodiment further includes following steps: if receiving first checks request, showing the target behaviour The record number of work and the mark of the application program.Specifically, after a certain item record is clicked in Fig. 3, certain can be continued with A kind of details that data file is operated.Fig. 4 illustrates the specific details that a certain data file (screenshotss file) is operated, such as List which application program operates screenshotss file, and the number operated.
Optionally, above-described embodiment further includes following steps: if receiving second checks request, being shown described using journey The data file list of sequence operation.Specifically, after user clicks magnifying glass icon in Fig. 4, this application program tool can be continued with Which data file body operates.Fig. 5 then illustrates XX application and specifically has read which screenshotss file, very detailed to list Screenshotss file content or list, user open-and-shut can see which screenshotss file was read by XX application.
Optionally, S106 in above-mentioned multiple embodiments suspends the object run, and before exporting prompt information, described Method further include:
Judge whether the target data file includes preset content, which specifically can be comprising privacy of user Picture or the significant data file of user etc.;
Wherein, the pause object run, and export prompt information and include:
If the target data file includes preset content, suspend the object run, and export prompt information.
In the embodiment, user can be in advance marked the data file comprising preset content, in this way, according to label As a result it can determine whether target data file includes preset content.Certainly, if preset content is the picture comprising privacy of user, The embodiment can also be by means such as image detections, to detect whether target data file includes preset content.
When the guard method concrete application for the data file that the above-mentioned multiple embodiments of the present invention provide, as shown in fig. 6, Fig. 6 Show to be that system provides function to data file monitor, user can be configured that (this monitoring is defaulted as closing in the setting page Closed state), setting is broadly divided into:
1) whether setting opens this monitoring function switch, i.e., whether executes the protection side of the data file of the above-described embodiment Method;
2) setting monitors the switch of the data file of which type, the i.e. type for the target data file that S102 is monitored;
3) setting monitoring read permission be still written permission switch, i.e., object run be read operation, write operation or Both include.
Combine Fig. 1 to Fig. 6 that the guard method of data file according to an embodiment of the present invention is described in detail above.Below will Mobile terminal according to an embodiment of the present invention is described in detail in conjunction with Fig. 7, Fig. 7 is mobile terminal 700 according to an embodiment of the present invention Structural schematic diagram.As shown in fig. 7, mobile terminal 700 includes:
Module 702 is monitored, can be used for monitoring target data file;
Output module 704, if can be used for listening to the object run for the target data file, described in pause Object run, and prompt information is exported, the prompt information chooses whether to allow the object run for user;
Processing module 706 can be used for the selection result according to the user, it is determined whether continue the object run.
In embodiments of the present invention, by monitoring target data file, the target for target data file is being listened to In the case where operation, suspends object run and export prompt information, which chooses whether to allow above-mentioned mesh for user Mark operation, finally result determines whether to continue object run according to the user's choice.The embodiment of the present invention is based on to data file It is real-time monitoring and Interception Technology, can effectively reduce, prevent certain application programs backstage read subscriber data file in turn For illegal purposes, can play a protective role to the data file of user.
Optionally, as one embodiment, above-mentioned mobile terminal 700 further includes judgment module (not shown), be can be used for Judge whether the object run is to be triggered by user;
Wherein, the output module 704 is also used to: if the object run is triggered by user, suspending the mesh Mark operation, and export prompt information.
Optionally, as one embodiment, above-mentioned mobile terminal 700 further includes logging modle (not shown), be can be used for To the cumulative digit of the record number of the object run, and record the corresponding application program of the object run.
Optionally, as one embodiment, above-mentioned mobile terminal 700 further includes display module (not shown), be can be used for If receiving first checks request, the record number of the object run and the mark of the application program are shown;And/or
If display module, which can be used for receiving second, checks request, the data file of the application program operation is shown List.
Optionally, as one embodiment, above-mentioned mobile terminal 700 further includes judgment module (not shown), be can be used for Judge whether the target data file includes preset content;Wherein, the output module 704 is also used to: if the number of targets Include preset content according to file, then suspends the object run, and export prompt information.
Mobile terminal 700 according to an embodiment of the present invention is referred to the protection of the data file of the corresponding embodiment of the present invention The process of method, also, each unit/module in the mobile terminal 700 and other above-mentioned operation and/or functions respectively in order to The corresponding process in the guard method of above-mentioned data file is realized, for sake of simplicity, details are not described herein.
A kind of hardware structural diagram of Fig. 8 mobile terminal of each embodiment to realize the present invention, the mobile terminal 800 Including but not limited to: radio frequency unit 801, audio output unit 803, input unit 804, sensor 805, is shown network module 802 Show the components such as unit 806, user input unit 807, interface unit 808, memory 809, processor 810 and power supply 811. It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 8 does not constitute the restriction to mobile terminal, it is mobile whole End may include perhaps combining certain components or different component layouts than illustrating more or fewer components.In the present invention In embodiment, mobile terminal includes but is not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, can wear Wear equipment and pedometer etc..
Wherein, processor 810, for monitoring target data file;If listening to the mesh for the target data file Mark operation, then suspend the object run, and export prompt information, and the prompt information chooses whether described in permission for user Object run;According to the selection result of the user, it is determined whether continue the object run.
In embodiments of the present invention, by monitoring target data file, the target for target data file is being listened to In the case where operation, suspends object run and export prompt information, which chooses whether to allow above-mentioned mesh for user Mark operation, finally result determines whether to continue object run according to the user's choice.The embodiment of the present invention is based on to data file It is real-time monitoring and Interception Technology, can effectively reduce, prevent certain application programs backstage read subscriber data file in turn For illegal purposes, can play a protective role to the data file of user.
It should be understood that the embodiment of the present invention in, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 810 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 801 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set Standby communication.
Mobile terminal provides wireless broadband internet by network module 802 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 803 can be received by radio frequency unit 801 or network module 802 or in memory 809 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 803 can also be provided and be moved The relevant audio output of specific function that dynamic terminal 800 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input unit 804 is for receiving audio or video signal.Input unit 804 may include graphics processor (Graphics Processing Unit, GPU) 8041 and microphone 8042, graphics processor 8041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 806.Through graphics processor 8041, treated that picture frame can be deposited Storage is sent in memory 809 (or other storage mediums) or via radio frequency unit 801 or network module 802.Mike Wind 8042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 801 is converted in the case where telephone calling model.
Mobile terminal 800 further includes at least one sensor 805, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 8061, and proximity sensor can close when mobile terminal 800 is moved in one's ear Display panel 8061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify mobile terminal posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 806 is for showing information input by user or being supplied to the information of user.Display unit 806 can wrap Display panel 8061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 8061.
User input unit 807 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 807 include touch panel 8071 and Other input equipments 8072.Touch panel 8071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 8071 or in touch panel 8071 Neighbouring operation).Touch panel 8071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 810, receiving area It manages the order that device 810 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 8071.In addition to touch panel 8071, user input unit 807 can also include other input equipments 8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 8071 can be covered on display panel 8061, when touch panel 8071 is detected at it On or near touch operation after, send processor 810 to determine the type of touch event, be followed by subsequent processing device 810 according to touching The type for touching event provides corresponding visual output on display panel 8061.Although in fig. 8, touch panel 8071 and display Panel 8061 is the function that outputs and inputs of realizing mobile terminal as two independent components, but in some embodiments In, can be integrated by touch panel 8071 and display panel 8061 and realize the function that outputs and inputs of mobile terminal, it is specific this Place is without limitation.
Interface unit 808 is the interface that external device (ED) is connect with mobile terminal 800.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 808 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in mobile terminal 800 or can be used in 800 He of mobile terminal Data are transmitted between external device (ED).
Memory 809 can be used for storing software program and various data.Memory 809 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 809 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 809, and calls and is stored in storage Data in device 809 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 810 may include one or more processing units;Preferably, processor 810 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 810.
Mobile terminal 800 can also include the power supply 811 (such as battery) powered to all parts, it is preferred that power supply 811 Can be logically contiguous by power-supply management system and processor 810, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, mobile terminal 800 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor 810, and memory 809 is stored in On memory 809 and the computer program that can run on the processor 810, the computer program are executed by processor 810 Each process of the guard method embodiment of the above-mentioned data file of Shi Shixian, and identical technical effect can be reached, to avoid weight Multiple, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each mistake of the guard method embodiment of above-mentioned data file when being executed by processor Journey, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer-readable storage medium Matter, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (10)

1. a kind of guard method of data file is applied to mobile terminal characterized by comprising
Monitor target data file;
If listening to the object run for the target data file, suspend the object run, and export prompt information, The prompt information chooses whether to allow the object run for user;
According to the selection result of the user, it is determined whether continue the object run.
2. the method as described in claim 1, which is characterized in that the pause object run, and export prompt information it Before, the method also includes:
Judge whether the object run is to be triggered by user;
Wherein, the pause object run, and if to export prompt information, which include: the object run, is touched by user Hair, then suspend the object run, and export prompt information.
3. method according to claim 1 or 2, which is characterized in that the pause object run, and export prompt information Later, the method also includes:
To the cumulative digit of the record number of the object run;And it is corresponding using journey to record the object run Sequence.
4. method as claimed in claim 3, which is characterized in that the method also includes:
If receiving first checks request, the record number of the object run and the mark of the application program are shown; And/or
If receiving second checks request, the data file list of the application program operation is shown.
5. the method as described in claim 1, which is characterized in that the pause object run, and export prompt information it Before, the method also includes:
Judge whether the target data file includes preset content;
Wherein, the pause object run, and export prompt information and include:
If the target data file includes preset content, suspend the object run, and export prompt information.
6. a kind of mobile terminal characterized by comprising
Module is monitored, for monitoring target data file;
Output module, if suspend the object run for listening to the object run for the target data file, and Prompt information is exported, the prompt information chooses whether to allow the object run for user;
Processing module, for the selection result according to the user, it is determined whether continue the object run.
7. mobile terminal as claimed in claim 6, which is characterized in that further include judgment module, for judging the target behaviour It whether is triggered by user;
The output module is also used to: if the object run is triggered by user, suspending the object run, and export Prompt information.
8. mobile terminal as claimed in claims 6 or 7, which is characterized in that further include logging modle, for being grasped to the target The cumulative digit of the record number of work, and record the corresponding application program of the object run.
9. a kind of mobile terminal characterized by comprising memory, processor and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 5 is realized when the computer program is executed by the processor Any one of described in data file guard method the step of.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the guarantor of the data file as described in any one of claims 1 to 5 when the computer program is executed by processor The step of maintaining method.
CN201910399670.8A 2019-05-14 2019-05-14 The guard method of data file and mobile terminal Pending CN110175452A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910399670.8A CN110175452A (en) 2019-05-14 2019-05-14 The guard method of data file and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910399670.8A CN110175452A (en) 2019-05-14 2019-05-14 The guard method of data file and mobile terminal

Publications (1)

Publication Number Publication Date
CN110175452A true CN110175452A (en) 2019-08-27

Family

ID=67690981

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910399670.8A Pending CN110175452A (en) 2019-05-14 2019-05-14 The guard method of data file and mobile terminal

Country Status (1)

Country Link
CN (1) CN110175452A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112784223A (en) * 2021-01-28 2021-05-11 深信服科技股份有限公司 Application program protection method, device, medium and user behavior control method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105512549A (en) * 2015-12-02 2016-04-20 珠海市君天电子科技有限公司 Application program intercepting method and device
CN105550584A (en) * 2015-12-31 2016-05-04 北京工业大学 RBAC based malicious program interception and processing method in Android platform
CN105718802A (en) * 2015-10-01 2016-06-29 哈尔滨安天科技股份有限公司 Method and device for protecting safety of Android MTP equipment data
CN109711148A (en) * 2018-12-17 2019-05-03 深圳壹账通智能科技有限公司 Hold-up interception method, device, computer equipment and the storage medium of application behavior

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105718802A (en) * 2015-10-01 2016-06-29 哈尔滨安天科技股份有限公司 Method and device for protecting safety of Android MTP equipment data
CN105512549A (en) * 2015-12-02 2016-04-20 珠海市君天电子科技有限公司 Application program intercepting method and device
CN105550584A (en) * 2015-12-31 2016-05-04 北京工业大学 RBAC based malicious program interception and processing method in Android platform
CN109711148A (en) * 2018-12-17 2019-05-03 深圳壹账通智能科技有限公司 Hold-up interception method, device, computer equipment and the storage medium of application behavior

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112784223A (en) * 2021-01-28 2021-05-11 深信服科技股份有限公司 Application program protection method, device, medium and user behavior control method

Similar Documents

Publication Publication Date Title
CN107608514A (en) Information processing method and mobile terminal
CN108491123A (en) A kind of adjusting application program image target method and mobile terminal
CN109918930A (en) A kind of information protecting method and terminal device
CN110062105A (en) A kind of interface display method and terminal device
CN110058836A (en) A kind of output method and terminal device of audio signal
CN107908523A (en) Record screen method, apparatus and terminal device
CN110308839A (en) A kind of file management method and terminal device
CN109753350A (en) A kind of method for managing resource and terminal device
CN110309004A (en) The processing method and terminal of data
CN110035183A (en) Information sharing method and terminal
CN110149628A (en) A kind of information processing method and terminal device
CN109753331A (en) A kind of information preview method and mobile terminal
CN108170559A (en) A kind of data back up method and terminal
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN110138963A (en) A kind of message treatment method and mobile terminal
CN110505340A (en) A kind of message method and terminal device
CN109992192A (en) A kind of interface display method and terminal device
CN109348035A (en) A kind of recognition methods of telephone number and terminal device
CN108307048A (en) A kind of message output method and device and mobile terminal
CN110175452A (en) The guard method of data file and mobile terminal
CN110457921A (en) Right management method and terminal device
CN109992941A (en) A kind of right management method and terminal device
CN109963033A (en) A kind of voice-based control method and terminal device
CN109753776A (en) A kind of method, apparatus and mobile terminal of information processing
CN108600824A (en) A kind of record screen method and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190827

RJ01 Rejection of invention patent application after publication