CN110334529B - Data processing method, device, equipment, system and audio equipment - Google Patents
Data processing method, device, equipment, system and audio equipment Download PDFInfo
- Publication number
- CN110334529B CN110334529B CN201910551060.5A CN201910551060A CN110334529B CN 110334529 B CN110334529 B CN 110334529B CN 201910551060 A CN201910551060 A CN 201910551060A CN 110334529 B CN110334529 B CN 110334529B
- Authority
- CN
- China
- Prior art keywords
- data
- user
- risk index
- audio equipment
- security risk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 25
- 238000012546 transfer Methods 0.000 claims abstract description 92
- 230000005540 biological transmission Effects 0.000 claims abstract description 77
- 238000012545 processing Methods 0.000 claims abstract description 61
- 238000013475 authorization Methods 0.000 claims abstract description 44
- 238000000034 method Methods 0.000 claims abstract description 22
- 230000003993 interaction Effects 0.000 claims description 33
- 230000004044 response Effects 0.000 claims description 22
- 230000009467 reduction Effects 0.000 claims description 10
- 238000001514 detection method Methods 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 19
- 230000007423 decrease Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000001976 improved effect Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000001960 triggered effect Effects 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 238000012795 verification Methods 0.000 description 4
- 238000013473 artificial intelligence Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 230000000630 rising effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000003238 somatosensory effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a data processing method, a data processing device, data processing equipment, a data processing system and audio equipment. The method comprises the following steps: when the audio equipment is detected to transmit data, acquiring a data security risk index; intercepting data to be transmitted of the audio equipment when the data security risk index belongs to a preset high risk index range, and acquiring data transmission authorization from a user; and after obtaining the data transfer authorization, triggering the audio equipment to continue transferring data.
Description
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data processing method, apparatus, device, system, and audio device.
Background
In recent years, with the development of artificial intelligence technology and device manufacturing technology, the popularity of artificial intelligence devices has increased dramatically. For example, smart speakers have become essential home devices for many homes in recent years, and users can acquire information, perform entertainment, control application services such as home appliances and the like through natural language interaction, so that users can acquire brand-new and fast home experience.
However, as the popularity of smart speakers has increased, the user size has also increased explosively, and security issues associated with smart speakers have also become more pronounced. For example, the smart sound box may collect a large amount of privacy data of the user (including user usage habits, living habits, consumption habits, user-related image or voice data, and the like) during the use process of the user, but the user who has collected the privacy data does not know the transmission object and the use condition (the object using the data, the data use mode, and the like) of the privacy data at all, and once the privacy data of the user is revealed, a great security risk may be brought to the user. In addition, a plurality of user equipment may be connected to intelligent audio amplifier in service environment, if intelligent audio amplifier is maliciously hijacked by the third party, make the third party can control its other equipment of connecting through intelligent audio amplifier, also can bring very big security risk to the user.
Disclosure of Invention
It is an object of the present invention to provide a new solution for processing data.
According to a first aspect of the present invention, there is provided a data processing method implemented in an audio device, including:
when the audio equipment is detected to transmit data, acquiring a data security risk index;
intercepting data to be transmitted of the audio equipment when the data security risk index belongs to a preset high risk index range, and acquiring data transmission authorization to a user;
and after the data transmission authorization is obtained, triggering the audio equipment to continue transmitting data.
According to a second aspect of the present invention, there is provided a data processing apparatus, provided on an audio device side, comprising:
the risk detection unit is used for acquiring a data security risk index when the audio equipment is detected to transmit data;
the authorization obtaining unit is used for forbidding the audio equipment to transmit data and obtaining data transmission authorization to a user when the data security risk index belongs to a preset high risk index range;
and the transfer processing unit is used for allowing the audio equipment to continue transferring data after the data transfer authorization is obtained.
According to a third aspect of the present invention, there is provided a data processing apparatus comprising:
a memory for storing executable instructions;
a processor for operating the data processing apparatus to perform the data processing method according to the first aspect of the present invention, under the control of the executable instructions.
According to a fourth aspect of the present invention, there is provided an audio apparatus comprising:
a data processing apparatus as claimed in the second aspect of the invention, or a data processing device as claimed in the third aspect of the invention.
According to a fifth aspect of the present invention, there is provided a data processing system comprising:
an audio device according to the fourth aspect of the invention;
at least one mobile terminal;
the mobile terminal comprises a memory and a processor, wherein the memory stores executable instructions, the processor is used for operating the mobile terminal according to the control of the executable instructions, and executing the following data processing method, and the method comprises the following steps:
establishing a connection with the audio device;
receiving a data transmission application sent by the audio equipment, and returning a corresponding data transmission response;
and responding to the trigger of the audio equipment, performing identity authentication on the user, and returning a corresponding identity authentication result.
According to an embodiment of the disclosure, when audio equipment (such as an intelligent sound box, an intelligent earphone and the like) is detected to transmit data, a data security risk index is obtained, when the data security risk index belongs to a preset high risk index range, the data to be transmitted of the audio equipment is intercepted, data transmission authorization is obtained for a user, the audio equipment is triggered to continue transmitting the data after the data transmission authorization is given to the user, when the audio equipment is prevented from transmitting the data, data leakage risks and other information security risks are brought to the user, and a malicious third party can be prevented from hijacking other equipment connected with the audio equipment through the audio equipment, and the data transmission security of the audio equipment is improved.
Other features of the present invention and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a block diagram showing an example of a hardware configuration of an audio device that can be used to implement an embodiment of the present invention.
FIG. 2 shows a flow diagram of a data processing method of an embodiment of the invention.
Fig. 3 is a diagram showing an example of a relationship between a data transfer risk of an audio device and a user's attention.
Fig. 4 is a diagram showing an example of the preset time length index relationship.
Fig. 5 shows a block diagram of a data processing device 3000 of an embodiment of the present invention.
Fig. 6 shows a block diagram of a data processing device 4000 of an embodiment of the invention.
FIG. 7 shows a block diagram of a data processing system 7000 of an embodiment of the present invention.
FIG. 8 is a schematic diagram of an example of a data processing system 7000 implementing a data processing method in accordance with an embodiment of the present invention.
Detailed Description
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
< hardware configuration >
Fig. 1 is a block diagram showing a hardware configuration of an audio device 1000 that can implement an embodiment of the present invention.
The audio device 1000 may include a smart speaker, a smart headset, and the like. As shown in fig. 1, the audio apparatus 1000 may include a processor 1100, a memory 1200, an interface device 1300, a communication device 1400, a display device 1500, an input device 1600, a speaker 1700, a microphone 1800, and the like. The processor 1100 may be a central processing unit CPU, a microprocessor MCU, or the like. The memory 1200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface device 1300 includes, for example, a USB interface, a headphone interface, and the like. The communication device 1400 is capable of wired or wireless communication, for example, and may specifically include Wifi communication, bluetooth communication, 2G/3G/4G/5G communication, and the like. The display device 1500 is, for example, a liquid crystal display panel, a touch panel, or the like. The input device 1600 may include, for example, a touch screen, a keyboard, a somatosensory input, and the like. A user may input voice instructions through the microphone 1800 to trigger the audio device 1000 to execute the audio device 1000 to process the voice instructions under the control of the processor 1100 according to executable instructions stored in the memory 1200, and the processed results of the voice instructions are played to the user through the speaker 1700.
The audio device shown in fig. 1 is merely illustrative and is in no way meant to limit the invention, its application, or uses. In an embodiment of the present invention, the memory 1200 of the audio device 1000 is used for storing instructions for controlling the processor 1100 to operate so as to execute any data processing method provided by the embodiment of the present invention. It will be appreciated by those skilled in the art that although a plurality of devices are shown in fig. 1 for the audio device 1000, the present invention may relate to only some of the devices, for example, the audio device 1000 relates to only the processor 1100 and the storage device 1200. The skilled person can design the instructions according to the disclosed solution. How the instructions control the operation of the processor is well known in the art and will not be described in detail herein.
< example >
In this embodiment, a data processing method is provided and implemented in an audio device. The audio device is a product such as a sound box and an earphone realized based on an artificial intelligence technology (for example, an intelligent voice technology), and can provide corresponding application services by interacting with a user, for example, receiving a voice instruction of the user to play a song, shopping, inquiring weather information, and the like. In one example, the hardware configuration of the audio device may be as shown in fig. 1.
As shown in fig. 2, the data processing method includes: steps S2100-S2300.
Step S2100, when the audio device is detected to transmit data, a data security risk index is obtained.
During the use process of the audio device, a large amount of private data (including user use habits, living habits, consumption habits, image or voice data related to the user, and the like) of the user may be actively or passively collected by the audio device, and the private data is transferred to a corresponding transmission object (for example, a background server of the audio device or other electronic equipment connected to the audio device, and the like) for use by the transmission object, but the user using the audio device may not know the collection, transfer of the private data and how the transmission object uses the data, which may bring data leakage risk and other information security risks to the user. In addition, through such a data transfer approach, a malicious third party can hijack other devices connected with the audio device through the audio device, and also bring security risks to users using those devices.
In this embodiment, the detection of data transfer to the audio device may be implemented by listening to data transfer interfaces (including application program interfaces or hardware interfaces) supported by the audio device. The data transfer may include at least one of a data upload or a data download. And when the data transmission of the audio equipment is detected, acquiring the current data security risk index of the audio equipment. The data security risk index is used to characterize the risk of the audio device delivering data in the current interaction environment. The higher the data security risk index, the greater the risk that the corresponding audio device will deliver the data.
After the data security risk index is acquired, the subsequent steps are combined, the data transmission of the audio equipment is controlled according to the data security risk index, the data leakage risk and other information security risks brought to a user when the audio equipment transmits data are avoided, and the malicious third party can be prevented from hijacking other equipment connected with the audio equipment through the audio equipment, so that the data transmission security of the audio equipment is improved.
In one example, step S2100 may include: step S2110-step S2120.
Step S2110, acquiring a silence duration between the last interaction completion time of the audio device and the user for completing the voice interaction and the current time.
The user and the audio device complete voice interaction, which may be that the user sends a wake-up word to successfully wake up the audio device, or that the audio device actively sends a voice message to interact with the user to obtain a voice response of the user, and so on. In this example, the interaction between the audio device and the user may be monitored in real time, and the time when the audio device and the user complete the voice interaction each time may be recorded in real time, so as to obtain the last time when the audio device and the user complete the voice interaction.
At the time of the interaction completion, the audio device has completed the voice interaction with the user the last time, and the audio device has gained the attention of the user the last time. Correspondingly, the silent duration between the interaction completion moment and the current moment is obtained, and the change of the user attention of the user to the audio equipment can be represented through the silent duration. In this example, it is considered that the user attention of the audio device is inversely proportional to the data transfer risk of the audio device, i.e., the higher the user attention of the audio device, the lower the data transfer risk of the audio device, for example, as shown in fig. 3.
And S2120, determining a data security risk index according to the silent duration and a preset duration index relation.
The preset duration index relationship is used for describing the corresponding relationship between different silent durations and data security risk indexes. The preset duration exponential relationship can be obtained by extracting historical use data of the audio equipment or calculating a data transmission risk model constructed by the audio equipment. And determining a corresponding data security risk index according to the silent time length through a preset time length index relation. The silent duration reflects the change of the attention of the user, the data security risk index reflects the data transmission risk, and the longer the silent duration, the larger the corresponding data security risk index.
For example, suppose the audio device interacts with the user to include three stages of activating the wakeup word, (receiving and processing) the voice command, playing the information (including playing the processing result of the voice command), the user interaction time is the time when the audio equipment is activated by the awakening word sent by the user at the last time, and the silent duration is 0 when the current time is the user interaction time, the corresponding data security risk index is also 0, after which, as the current time moves backwards, the length of silence increases, assuming that every 10 seconds of increase in the length of silence, the corresponding data security risk index is increased by 1 until the corresponding data security risk index is increased to 60 minutes after the silent period is increased to 10 minutes, the time may be kept unchanged until the current time moves back to the next time when the audio device is activated by the next wakeup word, and the corresponding preset time index relationship may be as shown in fig. 4.
The data security risk index is determined according to the silent duration and the preset duration index relationship, the silent duration reflecting the change of the attention of the user and the preset duration index relationship can be utilized to accurately determine the data security risk index reflecting the data transmission risk, so that the data transmission of the audio equipment is accurately controlled based on the data security risk index and the subsequent steps, and the security risk in the data transmission is avoided.
In this example, step S2100 may further include: steps S2101-S2103.
Step S2101 is to obtain an operation interval duration between the user operation time of the latest user operation and the current time, which is received by the audio device after the interaction completion time.
In this example, the user operation received by the audio device may include an operation directly performed on the audio device by the user, such as clicking a button on the audio device, or a touch operation on a display screen on the audio device; alternatively, the user operation received by the audio device may include a control operation performed by the user on a device connected to the audio device (e.g., a mobile terminal such as a tablet computer or a mobile phone), including a click operation on a display screen of the device, a sliding operation, and the like.
The time when the audio equipment receives the user operation after the interaction completion time is the time when the last time the audio equipment completes the voice interaction with the user and receives the last time the user operation. In this example, the interaction between the audio device and the user may be monitored in real time, and the time when the audio device receives the user operation each time is recorded in real time, so as to obtain the user operation time after the interaction completion time of the audio device.
At the time of user operation, the audio device receives the latest user operation after the latest voice interaction with the user, which means that the user pays attention to the audio device and reversely changes after the voice interaction with the audio device. Correspondingly, the operation interval duration between the user operation time and the current time is obtained, and the reverse change of the user attention of the user to the audio equipment can be represented to a certain extent through the operation interval duration. For example, the silence duration is longer, and the attention of the corresponding identification user is decreasing, but at the same time, the operation interval duration is shorter, which may indicate that the attention of the user is rising to some extent.
In step S2102, an index decrease width is determined according to the operation interval duration.
In this example, the relationship between the operation interval duration and the exponential decrease amplitude may be preset according to a specific application scenario or application requirement, and the exponential decrease amplitude may be determined according to the operation interval duration through the relationship.
For example, the exponential decrease amplitude may be set to 10 when the operation interval duration is 0, and the exponential decrease amplitude decreases by 1 every 1 minute of the operation interval duration, and so on until the exponential decrease amplitude is 0 and does not increase.
And step S2103, after the data security risk index is determined, subtracting the index reduction amplitude from the data security risk index to obtain a final data security risk index.
In this example, after the data security risk index is determined according to the silent duration in step S2120, the index reduction amplitude is subtracted from the data security risk index to obtain a final data security risk index. For example, the data security risk index is determined to be 60 according to the silent duration, the index reduction amplitude is determined to be 10 according to the operation interval duration, and correspondingly, the final data security risk index is 50. In practical application, it may be further defined that the final data security risk index is not less than 0, that is, when the data security risk index minus the index reduction amplitude obtains a negative number, the final data security risk index is set to 0.
The operation interval duration is opposite to the silence duration, the change of the user attention can be reflected reversely, correspondingly, the rising change of the user attention can be reflected to a certain extent according to the index reduction amplitude determined according to the operation interval duration, the final data safety risk index is obtained by subtracting the index reduction amplitude determined according to the operation interval duration from the data safety risk index determined according to the silence duration, and the safety risk existing in the data transmission through the audio equipment at present can be reflected more accurately.
After acquiring the data security risk index at step S2100, the method proceeds to:
step S2200, when the data security risk index belongs to the preset high risk index range, intercepting the data to be transmitted by the audio equipment, and obtaining data transmission authorization to the user.
The preset high risk index range is a numerical range reflecting the data security risk index with high risk in data transmission, and can be set based on a specific acquisition mode of the data security risk index according to a specific application scene or application requirements.
For example, the data security risk index is determined according to a preset time index relation shown in fig. 4 based on the silence time length in the above example, the data security risk index is 0-60, and the preset high risk index range can be set to 31-59, that is, the data security risk index is not less than 31 and not more than 59, which reflects that the high risk exists in the transmitted data.
When the data security risk index belongs to the preset high risk index range, it is determined that high risk exists in data transmission, correspondingly, data to be transmitted of the audio equipment is intercepted, data transmission authorization is obtained for a user, subsequent steps can be combined, the audio equipment is allowed to continue transmitting data after the data transmission authorization is obtained, when the audio equipment is prevented from transmitting data, data leakage risk and other information security risks are brought to the user, other equipment connected with the audio equipment can be prevented from being hijacked by a malicious third party through the audio equipment, and the security of the audio equipment for transmitting data is improved.
The data transfer authorization is the right given by the user to allow the audio device to transfer data. In one example, the step of obtaining authorization for data transfer to the user may include steps S2210-S2230.
Step S2210, when the data transferred by the audio device belongs to the preset sensitive data, sending a data transfer application to the user.
The preset sensitive data can be configured by default according to a specific application scene or set by a user in a self-defined way. The preset sensitive data may include audio data of the user, image data, user privacy data reflecting user preference or usage habit, and the like. Or, in a scene with a higher security risk, the data transmitted by the audio device may be configured by default to belong to preset sensitive data.
In this example, the data delivery application may be sent to the user by the audio device through voice interaction. The data transfer application is used for applying for data transfer authority to a user, the data transfer application can include an application authority indication for indicating that the audio device requests the data transfer authority, and the data transfer application can also include other contents according to specific application requirements.
For example, the data transfer application may also include the rights content required by the audio device to transfer the data. For example, the data transferred by the audio device is audio data, and correspondingly, the right content required by the audio device for transferring the data includes microphone right and the like; or, the data transmitted by the audio device is video data, and correspondingly, the authority content required by the data transmitted by the audio device comprises camera authority and the like; or, the data transferred by the audio device is geographic position data, and correspondingly, the authority content required by the audio device for transferring the data comprises positioning authority and the like.
By the data transfer application including the authority content required by the audio equipment for transferring data, the user receiving the data transfer application can clearly know the authority involved in the data transfer, and the risk of the data transfer is more clearly prompted to the user.
Step S2220, after the data transfer response returned by the user indicates that data transfer is allowed, triggering the user to perform authentication.
After sending the data transfer application to the user, the audio device may wait for the user to return a corresponding data transfer response. After the data transfer response indicates that the data transfer is allowed, the user may be triggered to perform authentication through the audio device by issuing a corresponding voice instruction, for example, performing voiceprint authentication on a sound issued by the user or requesting the user to provide a corresponding voice authority password.
It should be understood that, after the data transfer response indicates that data transfer is not allowed, it may be determined that the user does not give the data transfer permission, and the data transfer permission acquisition fails, and the subsequent steps in this embodiment are not executed, and the data transfer is intercepted.
In step S2230, after the obtained authentication result indicates that the authentication is passed, it is determined to obtain the data transfer authorization.
After the identity verification result indicates that the identity verification is passed, the user allowing data transmission is a legal and effective user, the data transmission authorization can be correspondingly determined, the authenticity and the effectiveness of the obtained data transmission authorization are guaranteed, and the safety of data transmission based on the data transmission authorization is improved.
It should be understood that, when the authentication result indicates that the authentication fails, it may be determined that the user does not have a legal identity giving a data transfer authority, and the data transfer authority is failed to be obtained, and the subsequent steps in this embodiment will not be executed to intercept the data transfer.
In another example, the step of obtaining authorization for data transfer to the user may include steps S2201-S2203.
Step S2201, when the data transmitted by the audio device belongs to the preset sensitive data, sending a data transmission application to at least one mobile terminal used by the user and connected to the audio device.
The relevant content of the preset sensitive data, the data transfer application, and the like may be as described in the foregoing example, and will not be described herein again.
In this example, the audio device may be paired with a mobile terminal used by a user to establish a connection in a manner of WIFI, bluetooth, or other wireless connection. The mobile terminal may include a mobile phone, a tablet computer, and the like. The data transmission application is sent by at least one mobile terminal which is used by a user and is connected with the audio equipment, so that the voice transmission range of the audio equipment can be broken through, and the data transmission application is sent to the user in a mode of higher timeliness and higher safety and secrecy.
In this example, to improve the security of data interaction, encryption or data integrity protection may be applied to the connection between the audio device and the mobile terminal.
For data with higher sensitivity (for example, privacy data related to a plurality of users), a data transfer application can also be sent to the mobile terminals used by the plurality of users to ensure the security of data transfer.
Step S2202, after the data transfer response returned by the mobile terminal indicates permission of data transfer, triggers the user to perform authentication with the mobile terminal.
After sending the data transfer application to the mobile terminal, the mobile terminal may wait for the connection with the audio device and return a corresponding data transfer response. After the data transmission response indicates that the data transmission is allowed, the user can be triggered to perform identity authentication through the mobile terminal by the connection established between the audio equipment and the mobile terminal and by sending a corresponding instruction. The authentication mode can be fingerprint identification authentication, face identification authentication, digital password authentication, voice password authentication, gesture authentication and the like supported by the mobile terminal. The user identity authentication is implemented through the mobile terminal, the existing authentication module of the mobile terminal can be directly called to implement the user identity authentication, and compared with the method that the identity authentication module is arranged in the audio equipment to carry out the user identity authentication, the audio equipment does not need to be changed, the implementation is simpler, the implementation complexity is lower, and the popularization is easier.
It should be understood that, after the data transfer response indicates that data transfer is not allowed, it may be determined that the user does not give the data transfer permission, and the data transfer permission acquisition fails, and the subsequent steps in this embodiment are not executed, and the data transfer is intercepted. Or after sending data transfer applications to a plurality of mobile terminals, when data transfer responses indicating permission of data transfer returned by all the mobile terminals are not collected, it may be determined that the user does not give data transfer permission, and the acquisition of the data transfer permission fails, and subsequent steps in this embodiment will not be executed to intercept the data transfer.
Step S2203, after the authentication result returned by the mobile terminal indicates that the authentication is passed, determining to obtain the data transfer authorization.
After the identity verification result indicates that the identity verification is passed, the user allowing data transmission is a legal and effective user, the data transmission authorization can be correspondingly determined, the authenticity and the effectiveness of the obtained data transmission authorization are guaranteed, and the safety of data transmission based on the data transmission authorization is improved.
It should be understood that, when the authentication result indicates that the authentication fails, it may be determined that the user does not have a legal identity giving a data transfer authority, and the data transfer authority is failed to be obtained, and the subsequent steps in this embodiment will not be executed to intercept the data transfer.
After step S2200, the process proceeds to:
step S2300, after obtaining the data transfer authorization, triggering the audio device to continue transferring data.
When the data security risk index belongs to the preset high risk index range, the data to be transmitted of the audio equipment is intercepted, after the data transmission authorization of the user is obtained, the audio equipment is triggered to continue transmitting the data, the data leakage risk and other information security risks are brought to the user because the audio equipment does not allow the data to be transmitted by the user in a high risk environment, and the malicious third party can be prevented from hijacking other equipment connected with the audio equipment through the audio equipment, so that the data transmission security of the audio equipment is improved.
The data processing method as shown in fig. 2 has been described above in connection with an example. In one example, the data processing method provided in this embodiment includes, in addition to the steps shown in fig. 2, further:
and step S2400, when the data security risk index is not smaller than a preset extremely high risk threshold, prohibiting the audio equipment from transmitting data, and sending a risk prompt to a user.
The preset extremely high risk threshold is a numerical value reflecting that the transmitted data has extremely high risk and the data security risk index, and can be set based on a specific acquisition mode of the data security risk index according to a specific application scene or application requirements.
For example, the data security risk index is determined according to the preset time index relationship shown in fig. 4 based on the silence time length in the above example, the data security risk index is 0-60, and the preset high risk threshold may be set to 60, which reflects that there is a high risk in transferring data.
When the data security risk index is not less than the preset extremely high risk threshold value, it is determined that the extremely high risk exists in data transmission, and correspondingly, the security of the data transmission of the audio equipment can be guaranteed by intercepting the data to be transmitted of the audio equipment, prohibiting the audio equipment from transmitting the data, and sending a risk prompt to a user.
The risk prompt may be a voice message sent by an audio device, or may be a prompt message sent by a device (e.g., a mobile terminal such as a mobile phone or a tablet computer) connected to the audio device.
< data processing apparatus >
In the present embodiment, there is also provided a data processing apparatus 3000, as shown in fig. 5, including: a risk detection unit 3100, an authorization obtaining unit 3200, and a transfer processing unit 3300, configured to implement the data processing method provided in the embodiment.
The risk detection unit 3100 is configured to obtain a data security risk index when detecting that the audio device transmits data.
Optionally, the risk detection unit 3100 is further configured to:
acquiring the interaction completion time when the audio equipment completes voice interaction with a user last time and the silence duration between the interaction completion time and the current time;
determining the data security risk index according to the silent duration and a preset duration index relationship;
the preset duration index relationship is used for describing the corresponding relationship between different silence durations and the data security risk index.
Further optionally, the risk detection unit 3100 is further configured to:
acquiring the operation interval duration between the user operation time of the latest user operation and the current time, which is received by the audio equipment after the interaction completion time;
determining an exponential reduction amplitude according to the operation interval duration;
after the data security risk index is determined, subtracting the index reduction amplitude from the data security risk index to obtain the final data security risk index.
The authorization obtaining unit 3200 is configured to prohibit the audio device from transmitting data and obtain data transmission authorization to the user when the data security risk index belongs to a preset high risk index range.
Optionally, the authorization obtaining unit 3200 is further configured to:
when the data transmitted by the audio equipment belong to preset sensitive data, sending a data transmission application to a user;
after the data transmission response returned by the user indicates that the data transmission is allowed, triggering the user to carry out identity authentication;
and determining to acquire the data transfer authorization after the acquired authentication result indicates that the authentication is passed.
Optionally, the authorization obtaining unit 3200 is further configured to:
when the data transmitted by the audio equipment belong to preset sensitive data, sending a data transmission application to at least one mobile terminal used by a user and connected with the audio equipment;
after the data transmission response returned by the mobile terminal indicates that data transmission is allowed, triggering a user to carry out identity authentication through the mobile terminal;
and after the identity authentication result returned by the mobile terminal indicates that the identity authentication is passed, determining to acquire the data transmission authorization.
Optionally, the data transfer application further includes rights content required by the audio device to transfer data.
A transfer processing unit 3300, configured to allow the audio device to continue transferring data after obtaining the data transfer authorization.
Optionally, the data processing apparatus 3000 is further configured to:
and when the data security risk index is not less than a preset extremely high risk threshold value, forbidding the audio equipment to transmit data, and sending a risk prompt to a user.
It will be appreciated by those skilled in the art that the data processing apparatus 3000 may be implemented in various ways. For example, the data processing apparatus 3000 may be implemented by an instruction configuration processor. For example, the data processing apparatus 3000 may be implemented by storing instructions in a ROM and reading the instructions from the ROM into a programmable device when starting the device. For example, the data processing device 3000 may be incorporated into a dedicated device (e.g., an ASIC). The data processing apparatus 3000 may be divided into units independent of each other, or may be implemented by combining them together. The data processing apparatus 3000 may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
In this embodiment, the data processing apparatus 3000 is provided on the audio device side, and may be a software module provided in the audio device, or a patch, an insert, or the like loaded in the audio device, or may be an application program provided in a device that establishes a connection with the audio device. In one example, the data processing apparatus 3000 may also be packaged in a software development kit (e.g., SDK) for operation after installation by an audio device.
< data processing apparatus >
In the present embodiment, there is also provided a data processing apparatus 4000, as shown in fig. 6, including:
a memory 4100 for storing executable instructions;
the processor 4200 is configured to execute the data processing apparatus 4000 according to the control of the executable instructions to perform the data processing method provided in this embodiment.
In this embodiment, the data processing apparatus 4000 may be provided on the audio apparatus side, may be provided in the audio apparatus, or may be an independent apparatus that establishes wired or wireless connection with the audio apparatus.
< Audio apparatus >
In the present embodiment, there is also provided an audio device 5000 including:
such as the data processing apparatus 3000 shown in fig. 5 or the data processing device 4000 shown in fig. 6.
In the present embodiment, the hardware configuration of the audio device 5000 may be, as shown in fig. 1, for example, that the data processing apparatus 3000 is stored by the memory 1200, the data processing apparatus 3000 is loaded by the processor 1100, and the data processing method in the present embodiment is implemented, or that the executable instructions are stored by the memory 1200, and the data processing method in the present embodiment is implemented by the processor 1100 according to the control of the executable instructions. The audio device 5000 may be a smart speaker, a smart headset, or the like.
< data processing System >
In this embodiment, a data processing system 7000 is further provided, as shown in fig. 7, including:
the audio device 5000 provided in the present embodiment;
at least one mobile terminal 6000.
In this embodiment, the mobile terminal 6000 may be a mobile phone, a tablet computer, a palm computer, a notebook computer, or the like.
The mobile terminal 6000 includes a memory 6100 and a processor 6200. The processor 6100 may be a central processing unit CPU, a microprocessor MCU, or the like. The memory 6200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The memory 6200 stores executable instructions, and the processor 6100 is configured to execute the mobile terminal 6000 according to control of the executable instructions, and execute the following data processing methods, including: steps S6100-S6300.
In step S6100, a connection is established with the audio device 5000.
In this embodiment, the mobile terminal 6000 may pair with the audio device 5000 to establish a connection through WIFI, bluetooth or other connection methods. The connection between the mobile terminal 6000 and the audio device 5000 may be encrypted or data integrity protected to ensure the security of data transfer over the connection.
Step S6200, a data transfer application sent by the audio device 5000 is received, and a corresponding data transfer response is returned.
In this embodiment, the mobile terminal 6000 may receive the data transfer application through the connection established with the audio device 5000, prompt the user using the mobile terminal 6000 by sending a prompt tone, pushing a screen, or the like, and return a corresponding data transfer response after the receiving user performs a confirmation operation such as operating a key, clicking a screen, or the like, where the data transfer response may be used to indicate whether to allow or disallow data transfer.
Step S6300, in response to the trigger of the audio device 5000, performs authentication on the user, and returns a corresponding authentication result.
In this embodiment, the mobile terminal 6000 may receive a trigger signal of the audio device 5000 through a connection with the audio device 5000, and prompt the user to perform authentication. The authentication may be performed by fingerprint recognition, face recognition, digital password, voice password, gesture, or the like, which is supported by the mobile terminal 6000. After the user is authenticated, the smart terminal 6000 returns an authentication result to the audio device 5000, so that the audio device 5000 can determine the acquired data transfer right based on the authentication result.
< example >
The data processing method implemented by the data processing system 7000 in this embodiment will be further illustrated below with reference to fig. 8. In this example, data processing system 7000 includes smart sound box 5000 and a smart phone as mobile terminal 6000. The smart speaker 5000 and the mobile terminal 6000 are paired and connected through bluetooth.
As shown in fig. 8, the data processing method includes: steps S301-S315.
S301, the intelligent sound box 5000 is started.
S302, it is detected that smart speaker 5000 starts to transmit data.
And S303, acquiring a data security risk index of the intelligent sound box 5000 in the current environment.
S304, judging whether the data security risk indication is not less than the extremely high risk threshold, if so, entering S314, otherwise, entering S305.
S305, judging whether the data security risk indication belongs to a high risk index range, if so, entering S306, otherwise, entering S313.
And S306, judging whether the data transmitted by the intelligent sound box 5000 belongs to preset sensitive data, if so, entering S307, and otherwise, entering S313.
S307, the smart speaker 5000 obtains a permission requirement list including permission contents required for transferring data.
And S308, the smart sound box 5000 sends a data transfer application including the permission requirement list to the paired mobile terminal 6000.
S309, the mobile terminal 6000 displays the content of the data transfer application to the user for the user to read.
S310, the mobile terminal 6000 receives the confirmation operation performed by the user, and returns a corresponding data transfer response.
S311, determining whether the data transmission response indicates that the data transmission is allowed, and entering S312 when determining that the data transmission is allowed, or entering S315 if not.
S312, the user is triggered to perform authentication through the mobile terminal 6000, and a returned authentication result is obtained.
S314, judging whether the authentication result indicates that the authentication is passed, if so, entering the step S314, otherwise, entering the step S315.
And S314, allowing the data to be transferred and processing the data normally.
S315, not allowing to transmit the data and refusing to process the data.
When the data processing is refused, a corresponding risk prompt can be sent to the user through the intelligent sound box 5000 or the mobile terminal 6000.
In this example, through the above steps S301 to S314, when the smart speaker transfers data, a data security risk index that reflects a risk in implementing data transfer in the current environment may be obtained, and data transfer of the smart speaker is controlled based on the data security risk index, so that it may be avoided that, in a high risk environment, the smart speaker does not allow a user to transfer data, thereby bringing a risk of data leakage and a risk of other information security to the user, and it may be avoided that a malicious third party may hijack other devices connected to the smart speaker through the smart speaker, thereby improving security of the smart speaker in transferring data.
The embodiments of the present invention have been described above with reference to the accompanying drawings, and according to the embodiments, a data processing method, an apparatus, a device, a system, and an audio device are provided, where when it is detected that the audio device transmits data, a data security risk index is obtained, when the data security risk index belongs to a preset high risk index range, data to be transmitted by the audio device is intercepted, data transmission authorization is obtained for a user, and after the data transmission authorization is obtained for the user, the audio device is triggered to continue transmitting data, so that when the audio device transmits data, a risk of data leakage and a risk of other information security are caused to the user, and a malicious third party can be prevented from hijacking other devices connected to the audio device through the audio device, thereby improving security of data transmission by the audio device.
The present invention may be a system, method and/or computer program product. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied therewith for causing a processor to implement various aspects of the present invention.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present invention may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present invention are implemented by personalizing an electronic circuit, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA), with state information of computer-readable program instructions, which can execute the computer-readable program instructions.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, by software, and by a combination of software and hardware are equivalent.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the invention is defined by the appended claims.
Claims (10)
1. A data processing method, implemented in an audio device, comprising:
when the audio equipment is detected to transmit data, acquiring a data security risk index; the data security risk index is determined according to preset type time length information; the preset type of duration information comprises a silent duration, wherein the silent duration is the duration between the last interaction completion time when the audio equipment completes voice interaction with the user and the current time; the data security risk index is used for representing the risk of the audio equipment transferring data in the current interaction environment; intercepting data to be transmitted of the audio equipment when the data security risk index belongs to a preset high risk index range, and acquiring data transmission authorization to a user;
and after the data transmission authorization is obtained, triggering the audio equipment to continue transmitting data.
2. The method of claim 1, wherein the step of obtaining a data security risk index upon detecting that the audio device is delivering data comprises:
acquiring the silent duration;
determining the data security risk index according to the silent duration and a preset duration index relationship;
the preset duration index relationship is used for describing the corresponding relationship between different silence durations and the data security risk index.
3. The method of claim 2, wherein the duration information of the preset category further includes duration of operation interval, and the step of obtaining the data security risk index when the audio device is detected to transmit data further includes:
acquiring the operation interval duration between the user operation time of the latest user operation and the current time, which is received by the audio equipment after the interaction completion time;
determining an exponential reduction amplitude according to the operation interval duration;
after the data security risk index is determined, subtracting the index reduction amplitude from the data security risk index to obtain the final data security risk index.
4. The method of claim 1, wherein the step of obtaining authorization for data transfer to the user comprises:
when the data transmitted by the audio equipment belong to preset sensitive data, sending a data transmission application to a user;
after the data transmission response returned by the user indicates that the data transmission is allowed, triggering the user to carry out identity authentication;
determining to acquire the data transfer authorization after the acquired authentication result indicates that authentication passes;
or,
the step of obtaining data transfer authorization to the user comprises:
when the data transmitted by the audio equipment belong to preset sensitive data, sending a data transmission application to at least one mobile terminal used by a user and connected with the audio equipment;
after the data transmission response returned by the mobile terminal indicates that data transmission is allowed, triggering a user to carry out identity authentication through the mobile terminal;
and after the identity authentication result returned by the mobile terminal indicates that the identity authentication is passed, determining to acquire the data transmission authorization.
5. The method of claim 4,
the data transfer application also comprises the authority content required by the audio equipment for transferring data.
6. The method of claim 1, further comprising:
and when the data security risk index is not less than a preset extremely high risk threshold value, forbidding the audio equipment to transmit data, and sending a risk prompt to a user.
7. A data processing apparatus, provided on an audio device side, comprising:
the risk detection unit is used for acquiring a data security risk index when the audio equipment is detected to transmit data; the data security risk index is determined according to preset type time length information; the preset type of duration information comprises a silent duration, wherein the silent duration is the duration between the last interaction completion time when the audio equipment completes voice interaction with the user and the current time; the data security risk index is used for representing the risk of the audio equipment transferring data in the current interaction environment;
the authorization obtaining unit is used for forbidding the audio equipment to transmit data and obtaining data transmission authorization to a user when the data security risk index belongs to a preset high risk index range;
and the transfer processing unit is used for allowing the audio equipment to continue transferring data after the data transfer authorization is obtained.
8. A data processing apparatus, characterized by comprising:
a memory for storing executable instructions;
a processor for operating the data processing apparatus under control of the executable instructions to perform the data processing method of claims 1-6.
9. An audio device, comprising:
a data processing apparatus as claimed in claim 7 or a data processing device as claimed in claim 8.
10. A data processing system, comprising:
the audio device of claim 9;
at least one mobile terminal;
the mobile terminal comprises a memory and a processor, wherein the memory stores executable instructions, the processor is used for operating the mobile terminal according to the control of the executable instructions, and executing the following data processing method, and the method comprises the following steps:
establishing a connection with the audio device;
receiving a data transmission application sent by the audio equipment, and returning a corresponding data transmission response;
and responding to the trigger of the audio equipment, performing identity authentication on the user, and returning a corresponding identity authentication result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910551060.5A CN110334529B (en) | 2019-06-24 | 2019-06-24 | Data processing method, device, equipment, system and audio equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910551060.5A CN110334529B (en) | 2019-06-24 | 2019-06-24 | Data processing method, device, equipment, system and audio equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110334529A CN110334529A (en) | 2019-10-15 |
CN110334529B true CN110334529B (en) | 2021-11-05 |
Family
ID=68142595
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910551060.5A Active CN110334529B (en) | 2019-06-24 | 2019-06-24 | Data processing method, device, equipment, system and audio equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110334529B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111639339B (en) * | 2020-05-26 | 2023-06-23 | 珠海豹趣科技有限公司 | Process monitoring method and device, electronic equipment and storage medium |
CN111651764B (en) * | 2020-05-26 | 2023-12-26 | 珠海豹趣科技有限公司 | Process monitoring method and device, electronic equipment and storage medium |
CN115766319B (en) * | 2022-11-29 | 2024-06-11 | 深圳市品声科技有限公司 | Split wireless audio communication method and system |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9502031B2 (en) * | 2014-05-27 | 2016-11-22 | Apple Inc. | Method for supporting dynamic grammars in WFST-based ASR |
CN104376239B (en) * | 2014-11-26 | 2019-02-12 | 小米科技有限责任公司 | The unlocking method and a device of terminal |
CN104951072A (en) * | 2015-06-18 | 2015-09-30 | 广东欧珀移动通信有限公司 | Application control method and terminal equipment |
CN105072255A (en) * | 2015-07-10 | 2015-11-18 | 北京奇虎科技有限公司 | Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment |
CN105069374B (en) * | 2015-08-06 | 2018-02-13 | 上海斐讯数据通信技术有限公司 | A kind of private data intercepts guard method and system |
CN105718809A (en) * | 2016-01-15 | 2016-06-29 | 珠海格力电器股份有限公司 | Mobile communication terminal and data security monitoring method and device thereof |
CN108537011B (en) * | 2018-03-16 | 2021-03-23 | 维沃移动通信有限公司 | Application permission processing method, terminal and server |
CN109753820B (en) * | 2019-01-10 | 2023-01-03 | 贵州财经大学 | Method, device and system for data open sharing |
-
2019
- 2019-06-24 CN CN201910551060.5A patent/CN110334529B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN110334529A (en) | 2019-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110347862B (en) | Recording processing method, device, equipment, system and audio equipment | |
CN107643977B (en) | Anti-addiction method and related product | |
CN107491683B (en) | Application decryption method and device, terminal and computer readable storage medium | |
CN110334529B (en) | Data processing method, device, equipment, system and audio equipment | |
CN108040295B (en) | Public cutting method, server, user side and public cutting system | |
CN105072080B (en) | A kind of Information Authentication method, apparatus and system | |
CN109039990B (en) | Behavior verification method and device based on verification code | |
CN105407098A (en) | Identity verification method and device | |
CN106454392A (en) | Live broadcast processing method, device and terminal | |
TWI761843B (en) | Access control method and device, electronic device and storage medium | |
CN105577375B (en) | Identity verification method and device | |
CN106778295B (en) | File storage method, file display method, file storage device, file display device and terminal | |
CN108960839B (en) | Payment method and device | |
CN105281907B (en) | Encrypted data processing method and device | |
CN107729764A (en) | Guard method, device, storage medium and the electronic equipment of sensitive information | |
CN109219003B (en) | Information encryption method and device, storage medium and electronic equipment | |
CN111738715A (en) | Payment code payment method and device | |
CN110400562B (en) | Interactive processing method, device, equipment and audio equipment | |
CN104125267A (en) | Account protection method, device and terminal equipment | |
KR20170121040A (en) | Method and device for online payment | |
CN110278273B (en) | Multimedia file uploading method, device, terminal, server and storage medium | |
EP3145152B1 (en) | Short message service reading method and device | |
CN106060050B (en) | Auth method and terminal device | |
CN108650645B (en) | Method and related device for preventing malicious fee deduction | |
CN108763884B (en) | Authority management method, device, mobile terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |