CN110276209B - Alarm method and mobile terminal - Google Patents

Alarm method and mobile terminal Download PDF

Info

Publication number
CN110276209B
CN110276209B CN201910578962.8A CN201910578962A CN110276209B CN 110276209 B CN110276209 B CN 110276209B CN 201910578962 A CN201910578962 A CN 201910578962A CN 110276209 B CN110276209 B CN 110276209B
Authority
CN
China
Prior art keywords
target data
application program
preset
alarm
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910578962.8A
Other languages
Chinese (zh)
Other versions
CN110276209A (en
Inventor
黄莉莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910578962.8A priority Critical patent/CN110276209B/en
Publication of CN110276209A publication Critical patent/CN110276209A/en
Application granted granted Critical
Publication of CN110276209B publication Critical patent/CN110276209B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides an alarm method and a mobile terminal, wherein the method comprises the following steps: under the condition that the calling of the target data by the application program is monitored, whether the application program has authorization authority or not is confirmed; if the application program is confirmed not to have the authorization authority, outputting first alarm information on a first preset interface and displaying calling information corresponding to the target data; if the application program is confirmed to have the authorization authority, whether the target data meets the alarm condition is confirmed; and if the target data meets the alarm condition, outputting second alarm information on a second preset interface and displaying calling information corresponding to the target data. When the condition that the application program calls the target data is monitored, and the condition that the application program does not have the authorization authority and the target data meets the alarm condition, alarm information and calling information corresponding to the target data are output, so that a user can know the abnormal calling condition of the application program to the private data, and the user is prompted to control the private data, and the safety of the private data is guaranteed.

Description

Alarm method and mobile terminal
Technical Field
The present invention relates to the field of mobile terminal technologies, and in particular, to an alarm method and a mobile terminal.
Background
Currently, some application programs call the privacy information of the user during the use process of the mobile terminal, such as: reading the picture containing the personal privacy data causes the disclosure of the privacy data of the user. However, the user does not know the situation clearly, and the security of the private data cannot be guaranteed.
Disclosure of Invention
The embodiment of the invention provides an alarm method and a mobile terminal, and aims to solve the problem of safety of user privacy data in the prior art.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an alarm method, which is applied to a mobile terminal, and the method includes: under the condition that it is monitored that an application program calls target data of the mobile terminal, whether the application program has authorization permission or not is confirmed; if the application program is confirmed not to have the authorization authority, outputting first alarm information on a first preset interface and displaying calling information corresponding to the target data; if the application program is confirmed to have the authorization authority, whether the target data meets an alarm condition is confirmed; and if the target data is confirmed to meet the alarm condition, outputting second alarm information on a second preset interface and displaying calling information corresponding to the target data.
In a second aspect, an embodiment of the present invention further provides a mobile terminal, where the mobile terminal includes: the mobile terminal comprises a first determining module, a second determining module and a judging module, wherein the first determining module is used for determining whether an application program has authorization permission or not under the condition that the situation that the application program calls target data of the mobile terminal is monitored; the first output module is used for outputting first alarm information on a first preset interface and displaying calling information corresponding to the target data if the application program is determined not to have the authorization authority; the second determining module is used for determining whether the target data meets the alarm condition or not if the application program is determined to have the authorization authority; and the second output module is used for outputting second alarm information on a second preset interface and displaying calling information corresponding to the target data if the target data meets the alarm condition.
In a third aspect, an embodiment of the present invention further provides a mobile terminal, including a processor, a memory, and a computer program stored on the memory and operable on the processor, where the computer program, when executed by the processor, implements the steps of the alarm method.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the alarm method are implemented.
In the embodiment of the invention, when the situation that the application program does not have the authorization authority and the application program has the authorization authority and the target data meets the alarm condition is monitored, the alarm information and the call information corresponding to the target data are output, so that a user can know the abnormal call situation of the application program to the privacy data and is prompted to control the privacy data, and the safety of the privacy data of the user is ensured.
Drawings
FIG. 1 is a flowchart illustrating the steps of an alarm method according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating the steps of an alarm method according to a second embodiment of the present invention;
fig. 3 is a block diagram of a mobile terminal according to a third embodiment of the present invention;
fig. 4 is a block diagram of a mobile terminal according to a fourth embodiment of the present invention;
fig. 5 is a schematic diagram of a hardware structure of a mobile terminal according to a fifth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, a flowchart illustrating steps of an alarm method according to a first embodiment of the present invention is shown.
The alarm method provided by the embodiment of the invention comprises the following steps:
step 101: and under the condition that the application program calls the target data of the mobile terminal, determining whether the application program has authorization authority.
Monitoring the calling condition of the target data, and confirming whether the application program has an authorization right or not under the condition that the due program calling target data is monitored, for example: when the application program in the mobile terminal calls the target data, the application program has authorization authority, and when the third-party application program which is not installed in the mobile terminal calls the target data, the application program does not have authorization authority.
In particular, the condition of calling data of each application program is monitored in real time by using ROOT, and the ROOT is a user existing in a UNIX system and a UNIX-like system. It has all the rights in the system, such as starting or stopping a process, deleting or adding users, adding or disabling hardware, etc.
The target data may be related data related to the privacy information of the user, such as a picture containing a head portrait of the user, identification card information related to the identity of the user, and the like.
Step 102: and if the application program is confirmed not to have the authorization authority, outputting first alarm information on a first preset interface and displaying calling information corresponding to the target data.
And when the application program does not have the authorization authority, outputting first alarm information and calling information corresponding to the target data, wherein the first alarm information is used for prompting a user that the application program calling the target data does not have the authorization authority.
Wherein, the calling information at least comprises at least one of the following: the calling time of the target data, the reporting flow information of the target data and the reporting times of the target data.
Step 103: and if the application program is confirmed to have the authorization authority, confirming whether the target data meets the alarm condition.
When the application program calls the target data, detecting whether the target data meets an alarm condition or not, wherein the detection comprises the following steps: and under the condition that the application program has the authorization authority, determining an authorization range corresponding to the application program, and if the target data is not in the authorization range, determining that the target data does not meet the warning condition.
When the target data is within the authorized range, whether the target data meets the alarm condition can be detected through the following modes: whether the frequency of calling the target data by the application program exceeds a preset threshold value or not, or whether the report flow of uploading the target data exceeds the preset threshold value or not.
Step 104: and if the target data meets the alarm condition, outputting second alarm information on a second preset interface and displaying calling information corresponding to the target data.
It should be noted that the second preset interface may be a desktop of the mobile terminal, or an interface corresponding to the application program, and the second preset interface is not specifically limited in the present invention.
The user can process the application program for calling the target data according to the second warning information, and can uninstall the application program or change the authority range corresponding to the application program.
The second warning information is used for prompting the user that the calling times of the target data are too high or the reported flow of the uploaded target data exceeds a preset threshold value, and prompting the user to manage and control the authority of the related target data and the target data.
In the embodiment of the invention, when the situation that the application program does not have the authorization authority and the application program has the authorization authority and the target data meets the alarm condition is monitored, the alarm information and the call information corresponding to the target data are output, so that a user can know the abnormal call situation of the application program to the privacy data and is prompted to control the privacy data, and the safety of the privacy data of the user is ensured.
Example two
Referring to fig. 2, a flowchart illustrating steps of an alarm method according to a second embodiment of the present invention is shown.
The alarm method provided by the embodiment of the invention comprises the following steps:
step 201: and under the condition that the application program calls the target data of the mobile terminal, determining whether the application program has authorization authority.
Monitoring the calling condition of the target data, and confirming whether the application program has an authorization right or not under the condition that the due program calling target data is monitored, for example: when the application program in the mobile terminal calls the target data, the application program is confirmed to have the authorization authority, and when the third-party application program which is not installed in the mobile terminal calls the target data, the application program is confirmed to have no authorization authority.
In particular, the condition of calling data of each application program is monitored in real time by using ROOT, and the ROOT is a user existing in a UNIX system and a UNIX-like system. It has all the rights in the system, such as starting or stopping a process, deleting or adding users, adding or disabling hardware, etc.
Step 202: and if the application program is confirmed not to have the authorization authority, outputting first alarm information on a first preset interface and displaying calling information corresponding to the target data.
When the application program does not have the authorization authority, outputting first alarm information and calling information corresponding to the target data, wherein the first alarm information is used for prompting a user that the application program calling the target data does not have the authorization authority, and can also prompt the user to further control the target data.
Step 203: and if the application program is confirmed to have the authorization authority, determining the authorization authority range of the application program.
The mobile terminal stores the authorization range corresponding to each application program and determines the authorization range of each application program.
Step 204: and under the condition that the target data is within the authorized authority range, determining whether the target data meets the alarm condition.
And under the condition that the target data is out of the authorized authority range, outputting third alarm information on the first preview interface and displaying the target data and calling information corresponding to the target data.
And when the target data is out of the authorization range corresponding to the application program, outputting third alarm information on the first preset interface, wherein the third alarm information is used for prompting the user that the target data called by the mobile terminal is out of the authorization range, and prompting the user to further control the target data.
It should be noted that the first warning information, the second warning information, and the third warning information may be the same or different.
Step 205: and determining the alarm score of the target data.
When the target data is within the authorization range, it cannot be shown that the target data called by the application program does not have a threat to the privacy security of the user, and therefore, the target data within the authorization range needs to be further detected, and whether the called target data causes a danger to the security of the user is judged according to the alarm score of the target data.
The calculation of the alarm score specifically comprises the following steps: acquiring the access times and preset access times of target data in a first preset time period; acquiring the report flow and the preset report flow of the target data in a second preset time period; calculating a first difference value between the access times in a first preset time period and a preset access time; taking the smaller value of the first difference value and a first preset threshold value as a first target value; calculating a first product of the first target value and a first weight value of the number of accesses within a first preset time period; calculating a second difference value between the reported flow and the preset reported flow in a second preset time period; taking the smaller value of the second difference value and a second preset threshold value as a second target value; calculating a second product of the second target value and a second weighted value of the report flow in a second preset time period; calculating a sum of the first product and the second product; and taking the sum as the alarm score of the target data.
The preset access times are obtained according to the average value of the access times of the user for accessing the target data by the application program. The preset report flow is obtained according to the average value of the report flow of the user aiming at the target data accessed by the application program.
It should be noted that, a person skilled in the art may set the first preset threshold and the second preset threshold, where the first preset threshold and the second preset threshold may be set to 1, 1.5, and the like, and the embodiment of the present invention is not limited in this respect.
Those skilled in the art may also set the first weight value and the second weight value according to actual situations, where the first weight value may be set to 0.5, 0.6, or 0.7, and the second weight value may be set to 0.5, 0.4, or 0.3, which is not limited in this embodiment of the present invention.
Step 206: and confirming that the target data meets the alarm condition under the condition that the alarm score of the target data is greater than the preset alarm score.
And under the condition that the alarm score is less than or equal to the preset alarm score, confirming that the target data does not meet the alarm condition.
It should be noted that, a person skilled in the art may set the preset alarm score according to an actual situation, and the preset alarm score may be set to 6 points, 7 points, 8 points, and the like, which is not specifically limited in this embodiment of the present invention.
Step 207: and under the condition that the application program calling the target data is matched with the preset application program, determining display parameter information corresponding to the preset application program.
Step 208: and displaying the second alarm information and the calling information corresponding to the target data on a preset interface according to the display parameter information.
The preset application program is preset in the mobile terminal for a user, and when the target application program is matched with the preset application program, the display parameter information corresponding to the preset application program is determined, wherein the display parameter information can be a ground color when the alarm information and the calling information corresponding to the target data are displayed on a display interface, or an output mode when the alarm information and the calling information corresponding to the target data are displayed on the display interface. The display mode can be highlight display, vibration prompt and the like.
After the target data and the calling information corresponding to the target data are displayed on a preset display interface, backing up the target data in the mobile terminal; recording the operation of calling target data by the application program; recording the authorization range of the application program; and outputting prompt information on a third preset interface, wherein the prompt information is used for prompting a user to close the authorization authority corresponding to the application program, and can also prompt the user to further control the target data and the like.
The operation of calling the target data by the application program is recorded, so that the user can conveniently compare the information of the target data with the information of the target data called subsequently, and the calling condition of the target data is further analyzed.
In the embodiment of the invention, when the situation that the application program does not have the authorization authority and the application program has the authorization authority and the target data meets the alarm condition is monitored, the alarm information and the call information corresponding to the target data are output, so that a user can know the abnormal call situation of the application program to the privacy data and is prompted to control the privacy data, and the safety of the privacy data of the user is ensured.
EXAMPLE III
Referring to fig. 3, a block diagram of a mobile terminal according to an embodiment of the present invention is shown.
The mobile terminal provided by the embodiment of the invention comprises: a first determining module 301, configured to determine whether an application has an authorization right when it is monitored that the application calls target data of the mobile terminal; a first output module 302, configured to output first alarm information on a first preset interface and display call information corresponding to the target data if it is determined that the application program does not have the authorization right; a second determining module 303, configured to determine whether the target data meets an alarm condition if it is determined that the application has an authorization right; a second output module 304, configured to output second warning information on the first preset interface and display the call information corresponding to the target data if it is determined that the target data meets the warning condition.
In the embodiment of the invention, when the situation that the application program does not have the authorization authority and the application program has the authorization authority and the target data meets the alarm condition is monitored, the alarm information and the call information corresponding to the target data are output, so that a user can know the abnormal call situation of the application program to the privacy data and is prompted to control the privacy data, and the safety of the privacy data of the user is ensured.
Example four
Referring to fig. 4, a block diagram of a mobile terminal according to a fourth embodiment of the present invention is shown.
The mobile terminal provided by the embodiment of the invention comprises: a first determining module 401, configured to determine whether an application has an authorization right when it is monitored that the application calls target data of the mobile terminal; a first output module 402, configured to output first alarm information on a first preset interface and display call information corresponding to the target data if it is determined that the application program does not have the authorization right; a second determining module 403, configured to determine whether the target data meets an alarm condition if it is determined that the application has an authorization right; a second output module 404, configured to output second warning information on the first preset interface and display call information corresponding to the target data if it is determined that the target data meets the warning condition.
Preferably, the second determining module 403 includes: a first determining submodule 4031, configured to determine an authorized permission range of the application program if it is determined that the application program has an authorized permission; a second determining submodule 4032, configured to, when it is determined that the target data is within the authorized authority range, determine whether the target data meets an alarm condition.
Preferably, the second determining module 403 includes: a third determining submodule 4033, configured to determine an alarm score of the target data; a fourth determining submodule 4034, configured to determine that the target data meets an alarm condition when the alarm score of the target data is greater than a preset alarm score.
Preferably, the third determination sub-module 4033 includes: a first obtaining unit 40331, configured to obtain the number of accesses and a preset number of accesses to the target data in a first preset time period; a second obtaining unit 40332, configured to obtain a report traffic and a preset report traffic of the target data in a second preset time period; a first calculating unit 40333, configured to calculate a first difference between the number of accesses in the first preset time period and the preset number of accesses; a first determination unit 40334 configured to determine, as a first target value, a smaller value of the first difference and a first preset threshold; a second calculation unit 40335 configured to calculate a first product of the first target value and a first weight value of the number of accesses within the first preset time period; a third calculating unit 40336, configured to calculate a second difference between the reporting traffic in the second preset time period and the preset reporting traffic; a second determination unit 40337, configured to determine, as a second target value, a smaller value of the second difference value and a second preset threshold; a fourth calculating unit 40338, configured to calculate a second product between the second target value and a second weight value of the report traffic in the second preset time period; a fifth calculation unit 40339 for calculating the sum of the first product and the second product; a third determination unit 403310, configured to use the sum as the alert score of the target data.
Preferably, the second output module 404 includes: a fifth determining sub-module 4041, configured to determine, when the application program that calls the target data matches a preset application program, display parameter information corresponding to the preset application program; and the output sub-module 4042 is configured to display, on the second preset interface, second alarm information and call information corresponding to the target data according to the display parameter information.
Preferably, the mobile terminal further includes: a recording module 405, configured to output, at the second output module 404, second warning information on a second preset interface and display call information corresponding to the target data if it is determined that the target data meets the warning condition.
The mobile terminal provided in the embodiment of the present invention can implement each process implemented by the mobile terminal in the method embodiments of fig. 1 to fig. 2, and is not described herein again to avoid repetition.
In the embodiment of the invention, when the situation that the application program does not have the authorization authority and the application program has the authorization authority and the target data meets the alarm condition is monitored, the alarm information and the call information corresponding to the target data are output, so that a user can know the abnormal call situation of the application program to the privacy data and is prompted to control the privacy data, and the safety of the privacy data of the user is ensured.
EXAMPLE five
Referring to fig. 5, a hardware structure diagram of a mobile terminal for implementing various embodiments of the present invention is shown.
The mobile terminal 500 includes, but is not limited to: a radio frequency unit 501, a network module 502, an audio output unit 503, an input unit 504, a sensor 505, a display unit 506, a user input unit 507, an interface unit 508, a memory 509, a processor 510, and a power supply 511. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 5 is not intended to be limiting of mobile terminals, and that a mobile terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
A processor 510, configured to, when it is monitored that an application program calls target data of the mobile terminal, determine whether the application program has an authorization right; if the application program is confirmed not to have the authorization authority, outputting first alarm information on a first preset interface and displaying calling information corresponding to the target data; if the application program is confirmed to have the authorization authority, whether the target data meets an alarm condition is confirmed; and if the target data is confirmed to meet the alarm condition, outputting second alarm information on a second preset interface and displaying calling information corresponding to the target data.
In the embodiment of the invention, when the situation that the application program does not have the authorization authority and the application program has the authorization authority and the target data meets the alarm condition is monitored, the alarm information and the call information corresponding to the target data are output, so that a user can know the abnormal call situation of the application program to the privacy data and is prompted to control the privacy data, and the safety of the privacy data of the user is ensured.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 501 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 510; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 501 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 501 can also communicate with a network and other devices through a wireless communication system.
The mobile terminal provides the user with wireless broadband internet access through the network module 502, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 503 may convert audio data received by the radio frequency unit 501 or the network module 502 or stored in the memory 509 into an audio signal and output as sound. Also, the audio output unit 503 may also provide audio output related to a specific function performed by the mobile terminal 500 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 503 includes a speaker, a buzzer, a receiver, and the like.
The input unit 504 is used to receive an audio or video signal. The input Unit 504 may include a Graphics Processing Unit (GPU) 5041 and a microphone 5042, and the Graphics processor 5041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 506. The image frames processed by the graphic processor 5041 may be stored in the memory 509 (or other storage medium) or transmitted via the radio frequency unit 501 or the network module 502. The microphone 5042 may receive sounds and may be capable of processing such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 501 in case of the phone call mode.
The mobile terminal 500 also includes at least one sensor 505, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 5061 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 5061 and/or a backlight when the mobile terminal 500 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 505 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 506 is used to display information input by the user or information provided to the user. The Display unit 506 may include a Display panel 5061, and the Display panel 5061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 507 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 507 includes a touch panel 5071 and other input devices 5072. Touch panel 5071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 5071 using a finger, stylus, or any suitable object or attachment). The touch panel 5071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 510, and receives and executes commands sent by the processor 510. In addition, the touch panel 5071 may be implemented in various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 5071, the user input unit 507 may include other input devices 5072. In particular, other input devices 5072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 5071 may be overlaid on the display panel 5061, and when the touch panel 5071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 510 to determine the type of the touch event, and then the processor 510 provides a corresponding visual output on the display panel 5061 according to the type of the touch event. Although in fig. 5, the touch panel 5071 and the display panel 5061 are two independent components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 5071 and the display panel 5061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 508 is an interface through which an external device is connected to the mobile terminal 500. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 508 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 500 or may be used to transmit data between the mobile terminal 500 and external devices.
The memory 509 may be used to store software programs as well as various data. The memory 509 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 509 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 510 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 509 and calling data stored in the memory 509, thereby performing overall monitoring of the mobile terminal. Processor 510 may include one or more processing units; preferably, the processor 510 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 510.
The mobile terminal 500 may further include a power supply 511 (e.g., a battery) for supplying power to various components, and preferably, the power supply 511 may be logically connected to the processor 510 via a power management system, so that functions of managing charging, discharging, and power consumption are performed via the power management system.
In addition, the mobile terminal 500 includes some functional modules that are not shown, and thus, are not described in detail herein.
Preferably, an embodiment of the present invention further provides a mobile terminal, which includes a processor 510, a memory 509, and a computer program that is stored in the memory 509 and can be run on the processor 510, and when the computer program is executed by the processor 510, the processes of the foregoing alarm method embodiment are implemented, and the same technical effect can be achieved, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned alarm method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (12)

1. An alarm method is applied to a mobile terminal, and is characterized in that the method comprises the following steps:
under the condition that it is monitored that an application program calls target data of the mobile terminal, whether the application program has authorization permission or not is confirmed;
if the application program is confirmed not to have the authorization authority, outputting first alarm information on a first preset interface and displaying calling information corresponding to the target data;
if the application program is confirmed to have the authorization authority, whether the target data meets an alarm condition is confirmed;
if the target data are confirmed to meet the alarm condition, outputting second alarm information on a second preset interface and displaying calling information corresponding to the target data;
the determining whether the application program has the authorization right or not under the condition that the application program calls the target data of the mobile terminal is monitored comprises the following steps: when the application program in the mobile terminal calls the target data, the application program has the authorization authority, and when the application program of a third party which is not installed in the mobile terminal calls the target data, the application program of the third party does not have the authorization authority;
if the target data is confirmed to meet the alarm condition, outputting second alarm information on a second preset interface and displaying calling information corresponding to the target data, wherein the steps include:
under the condition that the application program calling the target data is matched with a preset application program, determining display parameter information corresponding to the preset application program;
and displaying second alarm information and calling information corresponding to the target data on the second preset interface according to the display parameter information.
2. The method of claim 1, wherein confirming whether the target data meets an alarm condition if the application program is confirmed to have the authorization authority comprises:
if the application program is confirmed to have the authorization authority, determining the authorization authority range of the application program;
and under the condition that the target data is determined to be in the authorized authority range, confirming whether the target data meets an alarm condition.
3. The method of claim 1, wherein the confirming that the target data satisfies an alarm condition comprises:
determining an alarm score of the target data;
and under the condition that the alarm score of the target data is larger than a preset alarm score, confirming that the target data meets an alarm condition.
4. The method of claim 3, wherein determining the alert score for the target data comprises:
acquiring the access times and preset access times of the target data in a first preset time period;
acquiring the report flow and the preset report flow of the target data in a second preset time period;
calculating a first difference value between the access times in the first preset time period and the preset access times;
taking the smaller value of the first difference value and a first preset threshold value as a first target value;
calculating a first product of the first target value and a first weight value of the number of accesses within the first preset time period;
calculating a second difference value between the reporting flow in the second preset time period and the preset reporting flow;
taking the smaller value of the second difference value and a second preset threshold value as a second target value;
calculating a second product of the second target value and a second weight value of the reported flow in the second preset time period;
calculating a sum of the first product and the second product;
and taking the sum as the alarm score of the target data.
5. The method according to claim 1, wherein after the step of outputting second warning information and displaying the calling information corresponding to the target data on a second preset interface if the target data is confirmed to satisfy the warning condition, the method further comprises:
and recording the operation of calling the target data by the application program.
6. A mobile terminal, characterized in that the mobile terminal comprises:
the mobile terminal comprises a first determining module, a second determining module and a judging module, wherein the first determining module is used for determining whether an application program has authorization permission or not under the condition that the situation that the application program calls target data of the mobile terminal is monitored;
the first output module is used for outputting first alarm information on a first preset interface and displaying calling information corresponding to the target data if the application program is determined not to have the authorization authority;
the second determining module is used for determining whether the target data meets the alarm condition or not if the application program is determined to have the authorization authority;
the second output module is used for outputting second alarm information on a second preset interface and displaying calling information corresponding to the target data if the target data meets the alarm condition;
the determining whether the application program has the authorization right or not under the condition that the application program calls the target data of the mobile terminal is monitored comprises the following steps: when the application program in the mobile terminal calls the target data, the application program has the authorization authority, and when the application program of a third party which is not installed in the mobile terminal calls the target data, the application program of the third party does not have the authorization authority;
the second output module includes:
the fifth determining submodule is used for determining display parameter information corresponding to a preset application program under the condition that the application program calling the target data is matched with the preset application program;
and the output submodule is used for displaying second alarm information and calling information corresponding to the target data on the second preset interface according to the display parameter information.
7. The mobile terminal of claim 6, wherein the second determining module comprises:
the first determining submodule is used for determining the authorization authority range of the application program if the application program is confirmed to have the authorization authority;
and the second determining submodule is used for determining whether the target data meets an alarm condition under the condition that the target data is determined to be in the authorized authority range.
8. The mobile terminal of claim 6, wherein the second output module comprises:
the third determining submodule is used for determining the alarm score of the target data;
and the fourth determining submodule is used for determining that the target data meets the alarm condition under the condition that the alarm score of the target data is greater than the preset alarm score.
9. The mobile terminal of claim 8, wherein the third determining submodule comprises:
the first acquisition unit is used for acquiring the access times and preset access times of the target data in a first preset time period;
a second obtaining unit, configured to obtain a report traffic and a preset report traffic of the target data in a second preset time period;
the first calculation unit is used for calculating a first difference value between the access times in the first preset time period and the preset access times;
a first determination unit configured to take a smaller value of the first difference and a first preset threshold as a first target value;
a second calculation unit configured to calculate a first product of the first target value and a first weight value of the number of accesses within the first preset time period;
a third calculating unit, configured to calculate a second difference between the reporting traffic in the second preset time period and the preset reporting traffic;
a second determining unit configured to set a smaller value of the second difference and a second preset threshold as a second target value;
a fourth calculating unit, configured to calculate a second product of the second target value and a second weight value of the report traffic within the second preset time period;
a fifth calculation unit configured to calculate a sum of the first product and the second product;
and the third determination unit is used for taking the sum as the alarm score of the target data.
10. The mobile terminal of claim 6, wherein the mobile terminal further comprises:
and the recording module is used for recording the operation of calling the target data by the application program after outputting second alarm information and displaying calling information corresponding to the target data on a second preset interface under the condition that the second output module confirms that the target data meets the alarm condition.
11. A mobile terminal, characterized in that it comprises a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the alerting method of any one of claims 1 to 5.
12. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the alerting method of one of the claims 1 to 5.
CN201910578962.8A 2019-06-28 2019-06-28 Alarm method and mobile terminal Active CN110276209B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910578962.8A CN110276209B (en) 2019-06-28 2019-06-28 Alarm method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910578962.8A CN110276209B (en) 2019-06-28 2019-06-28 Alarm method and mobile terminal

Publications (2)

Publication Number Publication Date
CN110276209A CN110276209A (en) 2019-09-24
CN110276209B true CN110276209B (en) 2022-01-28

Family

ID=67963680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910578962.8A Active CN110276209B (en) 2019-06-28 2019-06-28 Alarm method and mobile terminal

Country Status (1)

Country Link
CN (1) CN110276209B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114217931B (en) * 2021-12-21 2022-07-15 广州瑞修得信息科技有限公司 Application program management method and intelligent repair system for user terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136472A (en) * 2011-11-29 2013-06-05 腾讯科技(深圳)有限公司 Method and mobile device of stopping application program to steal privacy
CN105812378A (en) * 2016-04-21 2016-07-27 北京小米移动软件有限公司 Access request processing method and device
CN106778208A (en) * 2016-12-01 2017-05-31 深圳Tcl新技术有限公司 The access processing method and device of application program
CN109241769A (en) * 2018-08-09 2019-01-18 福州瑞芯微电子股份有限公司 A kind of electronic equipment personal secrets method for early warning and system
CN109918930A (en) * 2019-03-11 2019-06-21 维沃移动通信有限公司 A kind of information protecting method and terminal device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8346216B2 (en) * 2007-11-15 2013-01-01 Airwalk Communications, Inc. System, method, and computer-readable medium for abbreviated-code dialing in a network system
CN101873379A (en) * 2010-06-13 2010-10-27 上海工程技术大学 Multi-functional mobile phone
US9041812B2 (en) * 2012-11-13 2015-05-26 International Business Machines Corporation Automated authorization to access surveillance video based on pre-specified events
CN104200155A (en) * 2014-08-12 2014-12-10 中国科学院信息工程研究所 Monitoring device and method for protecting user privacy based on iPhone operating system (iOS)
CN109271297A (en) * 2018-11-08 2019-01-25 维沃移动通信有限公司 A kind of abnormal prompt method and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136472A (en) * 2011-11-29 2013-06-05 腾讯科技(深圳)有限公司 Method and mobile device of stopping application program to steal privacy
CN105812378A (en) * 2016-04-21 2016-07-27 北京小米移动软件有限公司 Access request processing method and device
CN106778208A (en) * 2016-12-01 2017-05-31 深圳Tcl新技术有限公司 The access processing method and device of application program
CN109241769A (en) * 2018-08-09 2019-01-18 福州瑞芯微电子股份有限公司 A kind of electronic equipment personal secrets method for early warning and system
CN109918930A (en) * 2019-03-11 2019-06-21 维沃移动通信有限公司 A kind of information protecting method and terminal device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Privacy, Discovery, and Authentication for the Internet of Things;David J. Wu 等;《ESORICS 2016》;20160915;第301-319页 *
大数据基础平台安全要求研究与分析;马卓元 等;《网络空间安全》;20180525;第09卷(第5期);第13-15页 *

Also Published As

Publication number Publication date
CN110276209A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
CN110995923B (en) Screen projection control method and electronic equipment
CN109918930A (en) A kind of information protecting method and terminal device
CN107580147B (en) Management method of notification message and mobile terminal
CN110674490B (en) Application permission display method and device and mobile terminal
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN111125696B (en) Information prompting method and electronic equipment
CN109753350B (en) Resource management method and terminal equipment
CN111064654A (en) Message display method and electronic equipment
CN108629280B (en) Face recognition method and mobile terminal
CN109815679B (en) Authority management method and mobile terminal
CN109522741B (en) Application program permission prompting method and terminal equipment thereof
CN111125680A (en) Permission setting method and terminal equipment
CN111597540A (en) Login method of application program, electronic device and readable storage medium
CN108093119B (en) Strange incoming call number marking method and mobile terminal
CN110276209B (en) Alarm method and mobile terminal
CN109753776B (en) Information processing method and device and mobile terminal
CN109660657B (en) Application program control method and device
CN109992941B (en) Authority management method and terminal equipment
CN109547330B (en) Information sharing method and device
CN110516515B (en) Unlocking method and mobile terminal
CN109005377B (en) Video processing method and terminal equipment
CN111310250A (en) Application sharing method and electronic equipment
CN110647727A (en) Terminal control method and terminal
CN107491685B (en) Face recognition method and mobile terminal
CN110096863B (en) Alarm method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant