CN110532803A - Private data guard method and device - Google Patents
Private data guard method and device Download PDFInfo
- Publication number
- CN110532803A CN110532803A CN201910827242.0A CN201910827242A CN110532803A CN 110532803 A CN110532803 A CN 110532803A CN 201910827242 A CN201910827242 A CN 201910827242A CN 110532803 A CN110532803 A CN 110532803A
- Authority
- CN
- China
- Prior art keywords
- permission
- system permission
- application program
- state
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Abstract
The private data guard method and device that embodiment of the disclosure provides, it is monitored by the licensing status to system permission, after application program gets the authorization of system permission, monitor the currently used state of the system permission in real time, when monitoring application program the system permission for having obtained authorization being used, it sends using notice to user to notify user application that the system permission is used, realize the monitoring that the system permission of authorization is obtained to application program, application program is used to the state notifying user of system permission, realize the transparence that application program uses system permission, user can specify specifically used time and the scene of system permission, to be conducive to the protection to privacy of user data.
Description
Technical field
Embodiment of the disclosure is related to field of computer technology, and in particular to private data guard method and device.
Background technique
Along with the fast development of smart machine, miscellaneous application program and service are also come into being, more and more
Application program (Application, APP) be pooled on smart machine.But APP brought convenience to people's lives it is same
When, the problem of there is also acquisitions without restraint for privacy of user data.
Currently, user, during making smart machine install APP, APP usually to be installed can send acquisition system power
The solicited message of access mandate is limited, if getting the system permission access mandate license of user, which can access after mounting
The related content of system permission.But this also cause once to license to APP some system permission (such as audio, video, short message, position,
Storage etc.), APP can use the system permission whenever and wherever possible, and use state is not known to user.Therefore it may lead
It applies the leakage of family private data.
Summary of the invention
Embodiment of the disclosure proposes private data guard method and device.
In a first aspect, embodiment of the disclosure provides a kind of private data guard method, this method comprises: monitoring system
The licensing status of permission, wherein the range that the application program that licensing status is used to indicate in system permission licensing system uses;It rings
Ying Yu monitors the authorization that application program obtains system permission, and records application program gets the authorization time of authorization
Stamp;Based on authorization timestamp, the currently used state of real-time monitoring system permission;In response to monitoring currently making for system permission
It is that the use notice of system permission is just being used to user's sending application program in use state with state.
It in some embodiments, is just in use state, Xiang Yong in response to the currently used state for monitoring system permission
The use notice of system permission is used in family sending application program, comprising: in response to monitoring the currently used of system permission
State is just to obtain system current operating conditions in use state;In response to determining that system current operating conditions are standby mode,
Display uses notice.
It in some embodiments, is just in use state, Xiang Yong in response to the currently used state for monitoring system permission
The use notice of system permission is used in family sending application program, further includes: is in response to determining system current operating conditions
Wake-up states, judge whether application program is in foreground application state;In response to determining that application program is not in foreground application shape
State is shown by notification bar using notice.
It in some embodiments, is just in use state, Xiang Yong in response to the currently used state for monitoring system permission
The use notice of system permission is used in family sending application program, further includes: in response to determining that application program is answered in foreground
With state, the icon of system permission is presented to show using notice by notification bar.
It in some embodiments, is just in use state, Xiang Yong in response to the currently used state for monitoring system permission
The use notice of system permission is used in family sending application program, further includes: obtains application program and begins to use system permission
First time stamp and application program use system permission function.
In some embodiments, this method further include: in response to monitoring the currently used state of system permission as stopping
Use state obtains application program and stops using the second timestamp of system permission, and stops presenting using notice.
In some embodiments, this method further include: indicated in response to the received shutoff operation to authorization
The authorization for terminating application program, the authorization for obtaining system permission terminate timestamp.
In some embodiments, first choice control is presented, wherein first choice control weighs system for receiving user
Limit the switch order of monitoring;The licensing status of monitoring system permission includes: in response to received user to first choice control
The selection operation of part indicates open system authorizing monitoring system, the licensing status of monitoring system permission.
In some embodiments, this method further include: the selection in response to received user to first choice control
Operation instruction closes system permission monitoring, stops the licensing status of monitoring system permission.
In some embodiments, this method further include: behaviour is checked to the use state of system permission in response to receiving
Make, the use state of system permission is presented.
In some embodiments, the use state that system permission is presented comprises at least one of the following: it is based on authorization timestamp,
The state that application program obtains the authorization of system permission is presented;It is stabbed based on first time, application program is presented and begins to use
The state of system permission, and the function that application program uses system permission is presented;Based on the second timestamp, presents and apply journey
Sequence stops using the state of system permission;Timestamp is terminated based on authorization, the authorization that application program loss system permission is presented is permitted
Can state.
In some embodiments, this method further include: system permission list is presented;System is weighed in response to receiving user
The selection operation for one of goal systems permission that limit list is presented, is presented the selection interface of goal systems permission, wherein
It chooses interface and the corresponding the application list of goal systems permission and the second selection control corresponding with the application list is presented
Part list;The selection operation instruction of the second selection control in the second selection list of controls is opened in response to received user
Open the monitoring of goal systems permission, the licensing status of monitoring objective system permission;Wherein, the second selection control is for receiving user couple
The switch order of goal systems permission monitoring.
Second aspect, embodiment of the disclosure provide a kind of private data guard device, which includes: monitoring mould
Block is configured to the licensing status of monitoring system permission, wherein licensing status is used to indicate answering in system permission licensing system
The range used with program;The authorization of system permission is obtained in response to monitoring application program, records application program obtains
To the authorization timestamp of authorization;Based on authorization timestamp, the currently used state of real-time monitoring system permission;Notify mould
Block, the currently used state for being configured in response to monitor system permission is just in use state, to user's sending application journey
The use notice of system permission is used in sequence.
In some embodiments, notification module is further configured to: in response to monitoring the currently used of system permission
State is just to obtain system current operating conditions in use state;In response to determining that system current operating conditions are standby mode,
Display uses notice.
In some embodiments, notification module is further configured to: in response to determining that system current operating conditions are to call out
The state of waking up, checks whether application program is in foreground application state;In response to determining that application program is not in foreground application shape
State is shown by notification bar using notice.
In some embodiments, notification module is further configured to: in response to determining that application program is in foreground application
The icon of system permission is presented by notification bar to show using notice in state.
In some embodiments, monitoring module is further configured to: being obtained application program and is begun to use system permission
Stamp and application program use the function of system permission at the first time.
In some embodiments, monitoring module is further configured to: in response to monitoring the currently used of system permission
State is state of stopping using, and obtains application program and stops using the second timestamp of system permission, and stops presenting using logical
Know.
In some embodiments, monitoring module is configured in response to the received shutoff operation to authorization
The authorization for indicating termination application program, the authorization for obtaining system permission terminate timestamp.
In some embodiments, device further include: display module;Display module is configured to present first choice control
Part, wherein first choice control is for receiving the switch order that user monitors system permission;Monitoring module is configured to ring
User received by Ying Yu indicates open system authorizing monitoring system, monitoring system power to the selection operation of first choice control
The licensing status of limit.
In some embodiments, monitoring module is further configured in response to received user to first choice
System permission monitoring is closed in the selection operation instruction of control, stops the licensing status of monitoring system permission.
In some embodiments, display module is configured to: in response to receiving looking into the use state of system permission
It sees operation, the use state of system permission is presented.
In some embodiments, display module is further configured to following at least one: based on authorization timestamp, being in
Existing application program obtains the state of the authorization of system permission;It is stabbed based on first time, presentation application program, which begins to use, is
The state for permission of uniting, and the function that application program uses system permission is presented;Based on the second timestamp, application program is presented
Stop using the state of system permission;Timestamp is terminated based on authorization, the authorization that application program loses system permission is presented
State.
In some embodiments, display module is configured to: system permission list is presented;Display module is further matched
Be set to: the selection operation in response to receiving one of goal systems permission that system permission list is presented in user is in
The selection interface of existing goal systems permission, wherein choose interface and present the corresponding the application list of goal systems permission;Prison
Module is controlled, is configured to: the selection in response to received user to the second selection control in the second selection list of controls
Operation instruction opens the monitoring of goal systems permission, the licensing status of monitoring objective system permission;Wherein, the second selection control is used for
Receive the switch order that user monitors goal systems permission.
The third aspect, this application provides a kind of electronic equipment, electronic equipment/terminal/server, including one or more
Processor;Storage device is stored thereon with one or more programs, when one or more programs are held by one or more processors
Row, so that one or more processors realize the method as described in implementation any in first aspect.
Fourth aspect, this application provides a kind of computer-readable mediums, are stored thereon with computer program, the program quilt
The method as described in implementation any in first aspect is realized when processor executes.
The private data guard method and device that embodiment of the disclosure provides, firstly, the authorization shape of monitoring system permission
State, wherein the range that the application program that the licensing status is used to indicate in system permission licensing system uses, then, in response to
The authorization that application program obtains the system permission is monitored, the authorization time that the application program gets authorization is recorded
Stamp is then based on the authorization timestamp, the currently used state of the system permission is monitored in real time, then, in response to monitoring this
The currently used state of system permission is to send the application program just in use state to user and the system permission is used
Use notice.By being monitored to system permission, after application program gets the authorization of system permission, answered when monitoring
When the system permission for having obtained authorization is used with program, send using notice to user to notify user application
The system permission is used, realizes the monitoring for obtaining the system permission of authorization to application program, application program is made
With the state notifying user of system permission, the transparence that application program uses system permission is realized, user can specify system
The specifically used time of permission and scene, to be conducive to the protection to privacy of user data.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the disclosure is other
Feature, objects and advantages will become more apparent upon:
Fig. 1, which shows some embodiments of the present disclosure, can be applied to exemplary system architecture figure therein;
Fig. 2 shows the flow charts of one embodiment of the private data guard method of the disclosure;
Fig. 3 shows the schematic diagram of an application scenarios of the private data guard method of the disclosure;
The process that the use that system permission is used to user's sending application program that Fig. 4 shows the disclosure notifies is shown
It is intended to;
Fig. 5 shows the flow chart of another embodiment of the private data guard method of the disclosure;
Fig. 6 shows the flow chart of another embodiment of the private data guard method of the disclosure;
Fig. 7 shows the flow chart of another embodiment of the private data guard method of the disclosure;
Fig. 8 shows an exemplary diagram of the embodiment shown in Fig. 7;
Fig. 9 shows the structural schematic diagram of one embodiment of the private data guard system of the disclosure;
Figure 10 shows the structural schematic diagram for being suitable for the electronic equipment for being used to realize embodiment of the disclosure.
Specific embodiment
The disclosure is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Convenient for description, part relevant to related invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the disclosure can phase
Mutually combination.The disclosure is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 shows the private data guard method or private data guard device that can apply embodiment of the disclosure
Exemplary system architecture 100.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104 and server 105.
Network 104 between terminal device 101,102,103 and server 105 to provide the medium of communication link.Network 104 can be with
Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with server 105, to receive or send out
Send message etc..Various client applications, such as web browser applications, purchase can be installed on terminal device 101,102,103
Species application, searching class application, instant messaging tools, mailbox client, social platform software etc..
Terminal device 101,102,103 can be hardware, be also possible to software.When terminal device 101,102,103 is hard
When part, it can be the various electronic equipments with display screen and supported web page browsing, including but not limited to smart phone, plate
Computer, E-book reader, pocket computer on knee and desktop computer etc..When terminal device 101,102,103 is soft
When part, it may be mounted in above-mentioned cited electronic equipment.It may be implemented into for example for providing the more of Distributed Services
Single software or software module also may be implemented into a software or software module.It is not specifically limited herein.
Server 105 can be to provide the server of various services, such as each function to terminal device 101,102,103
Server, the Cloud Server etc. supported are provided.Server can carry out the data received the processing such as storing, and processing is tied
Fruit feeds back to terminal device.
It should be noted that private data guard method provided by embodiment of the disclosure by terminal device 101,102,
103 execute.Correspondingly, private data guard device is set in terminal device 101,102,103.The application does not do this specifically
It limits.
It should be understood that the private data guard method as provided by the embodiment of the present application by terminal device 101,102,
103 execute, if terminal device 101,102,103 does not have the demand interacted with server 105, framework shown in FIG. 1 can be only
Include terminal device 101,102,103.In addition, the number of terminal device, network and server in Fig. 1 is only schematic
's.According to needs are realized, any number of terminal device, network and server can have.
With continued reference to Fig. 2, the process 200 of one embodiment of the private data guard method according to the disclosure is shown.
The private data guard method, may comprise steps of:
Step 210, the licensing status of monitoring system permission.
Wherein, system permission refers to the permission that access, acquisition privacy of user data need, and system permission may include Mike
The right to use, the right to use of camera, the right to use of position, the right to use of storage, the right to use of phone, the right to use of address list of wind
Or right to use of calendar etc..Privacy of user data may include hardware data and software data etc., and wheat can be used in application program
The access of the system permissions such as gram wind, camera, position, storage, phone, acquisition hardware data, address list, calendar etc., which also can be used, is
Permission of uniting access, acquisition software data.
Wherein, the range that the application program that licensing status is used to indicate in system permission licensing system uses can be same
One system permission is permitted the type of workable application program, and whether the right to use for being also possible to system permission has been obtained by application program
It takes.
In this step, the executing subject (such as terminal device shown in FIG. 1) of private data guard method can be to being
The licensing status of system permission is monitored, to obtain being used to indicate system permission, whether licensed application is used and license
The information for the range that application program uses.
Step 220, the authorization of system permission is obtained in response to monitoring application program, is obtained application program and is got
The authorization timestamp of authorization.
In this step, the licensing status of above-mentioned executing subject monitoring system permission, is obtained in response to monitoring application program
The authorization of system permission is taken, the authorization timestamp that application program gets authorization, authorization timestamp instruction are obtained
Be application program obtain authorization at the time of value.When application program (APP) initiates authorized application to user, monitor
APP obtains the right to use of the system permission, and record obtains the APP information of the system permission at this time, such as: APP ID, APP
Claim, APP icon, authorization timestamp etc..
Step 230, based on authorization timestamp, the currently used state of real-time monitoring system permission.
Wherein, the state of system permission can include but is not limited to following several states: holding rights state, is used
State stops using state and loses rights state.
In this step, above-mentioned executing subject get authorization timestamp after, real-time monitoring system permission it is currently used
State.As started based on the authorization timestamp, application program gets the authorization of system permission, and system permission is worked as at this time
Preceding state is to hold rights state;Application program is monitored using system permission, the current state of system permission is at this time
Use state;It monitors application program and stops using system permission, the current state of system permission is to stop using state at this time;
The authorization for monitoring application program acquisition terminates, and the current state of system permission is to lose rights state at this time.
It step 240, is just to send and answering to user in use state in response to the currently used state for monitoring system permission
The use notice of system permission is used with program.
In this step, above-mentioned executing subject is that shape is used in response to the currently used state for monitoring system permission
The use notice of system permission is used, to user's sending application program to notify user application that this is used in state
System permission.
The content using notice may include the title or icon of system permission currently in use, also may include
Using the title of the application program of system permission or icon etc., the application is not specifically limited in this embodiment.This can be led to using notice
It crosses the forms such as dialog box, prompting frame, system permission icon and is shown that the application is not specifically limited in this embodiment.For example, using logical
Knowing can be in the form of prompting frame, can be with using the content of notice are as follows: camera permission is used in APP1.
The method provided by the above embodiment of the disclosure is monitored by the licensing status to system permission, application program
After getting the authorization of system permission, the currently used state of the system permission is monitored in real time, when monitoring application program
When the system permission for having obtained authorization is used, send using notice to user to notify user application to make
With the system permission, the monitoring for obtaining the system permission of authorization to application program is realized, application program is used into system
The state notifying user of permission, realizes the transparence that application program uses system permission, and user can specify system permission
Specifically used time and scene, to be conducive to the protection to privacy of user data.
With continued reference to the signal that Fig. 3, Fig. 3 are according to the application scenarios of the private data guard method of the present embodiment
Figure.This method can be applied in the application scenarios of Fig. 3, and for user when installing APP1, APP1 initiates application system permission
The authorization requests of the right to use of microphone, user carry out authorization to the authorization requests of APP1, then APP1 can be awarded in acquisition
Microphone is used during power license, APP1 can be used microphone and be acquired, access to privacy of user data.Terminal device
In system permission monitoring mechanism monitor the authorization that APP1 gets microphone, then start the state of monitor microphone.
APP1 is used in user, and current interface is the interactive interface of APP1, when microphone is used in APP1, system permission monitoring
The currently used state of mechanism monitors to microphone is just to send APP1 just in use state to user and microphone is used
Using notice, as shown in figure 3, by showing that microphone icon 310 notifies user that microphone is being currently used in APP1.
In some optional implementations of the present embodiment, being weighed in response to monitoring system shown in step 240 in Fig. 2
The currently used state of limit is just in use state, and the use notice that system permission is used to user's sending application program can
To be executed further according to process 400 shown in Fig. 4.
Specifically, process shown in Fig. 4 includes:
It step 410, is that it is current just to obtain system in use state in response to the currently used state for monitoring system permission
Operating status.
Wherein, system current operating conditions refer to the operating status that the current time system is in, and can be standby mode,
It may be wake-up states.Standby mode refers to the booting of electronic equipment but without any substantive work (i.e. not to text
The various operations of part and program) state.Wake-up states refer to the state of electronic equipment operation application program or file.
In this step, above-mentioned executing subject is that shape is used in response to the currently used state for monitoring system permission
State obtains system current operating conditions.And after getting system current operating conditions, judge that the system got is currently transported
Row state is standby mode or wake-up states.It is in open state at current time for example, getting electronic equipment, is examined simultaneously
It measures system and does not run any application program or file, can determine that system current operating conditions are standby mode;Or it obtains
It gets electronic equipment and is in open state at current time, and detect that system is currently running application program or file, it can
To determine system current operating conditions as wake-up states.
Step 420, in response to determining that system current operating conditions are standby mode, display uses notice.
In this step, in response to determining that system current operating conditions are standby mode, display uses above-mentioned executing subject
Notice.When judging system current operating conditions for standby mode, can be shown by way of dialog box using notice to lead to
Know that system permission is used in user application, for example, when the system of above-mentioned executing subject is in black state, Ke Yitong
The form for crossing pop-up dialog box wakes up screen, or dialog box is presented by the way of breath screen display.
The content that the dialog box is shown may include the notice that system permission is used in application program, can also include supplying
User carries out the quick selection control of selection, this fast selects control to choose whether to continue awarding for system permission for receiving user
Weigh the instruction of license.Whether user can check service condition by the content selection that dialog box is shown and whether continue system
The authorization of permission.
Step 430, in response to determining that system current operating conditions are wake-up states, judge whether application program is in foreground
Application state.
Wherein, foreground application state refers to that application program is being used by a user, and the application interface of above-mentioned executing subject
For the state of the interactive interface of application program.
In this step, above-mentioned executing subject is in response to determining that system current operating conditions are wake-up states, and judgement is
It whether is in foreground application state using the application program of system permission, judges whether the application program is being used by a user.
In response to determining that the application program is not in foreground application state, step 440 is executed, is shown and is used by notification bar
Notice.
In this step, above-mentioned executing subject passes through notice in response to determining that application program is not in foreground application state
Column display uses notice.After the application program that system permission is used in determination is not on foreground application state, at possibility
In background operation state or in the state that has been switched off, shown at this time by notification bar using notice.
At this time this using notice may include application program name or icon and system permission name or icon,
For example, microphone is used in APP1, the application is not specifically limited in this embodiment.
It should be noted that the method for background application initiation notice is to study and apply known extensively at present
Technology, details are not described herein.
In response to determining that application program is in foreground application state, step 450 is executed, system permission is presented by notification bar
Icon with show using notice.
In this step, above-mentioned executing subject passes through notification bar in response to determining that application program is in foreground application state
The icon of system permission is presented to show using notice.Foreground application is in the determining application program that system permission is used
After state, the application program is used in possible user at this time, and the icon of system permission is presented to show by notification bar at this time
Use notice.The mode that the icon of system permission is presented can be uninterrupted display, be also possible to interruption flashing display, the application
It is not specifically limited in this embodiment.
When interactive interface is in the operation interface of the application program, show that the application program is in foreground application shape
State, when rights state is used in the application program, the icon of the system permission is presented in notification bar at this time.For example, interaction circle
Face is in the operation interface of APP1, and microphone is used in APP1, and the notification bar at interface shows the icon of microphone at this time, is used for
Microphone is used in prompt user APP1.
At the time of application program begins to use system permission, notification bar starts the icon of display system permission;It is applying
At the time of program stopped uses system permission, notification bar stops the icon of display system permission;It is used in application program and is
During permission of uniting, notification bar display system permission icon always.
In this implementation, by the judgement to system current operating conditions, and pass through the operation to application program
State is judged, realizes and various forms of advice methods are presented under different situations.
In some optional implementations of the present embodiment, being weighed in response to monitoring system shown in step 240 in Fig. 2
The currently used state of limit is just in use state, and the use notice that system permission is used to user's sending application program can
To further comprise: obtaining application program and the first time stamp of system permission and application program is begun to use to weigh using system
The function of limit.
Above-mentioned executing subject begins to use system permission monitoring application program, obtains and stabs at the first time, and obtains
Application program uses the function of the system permission.For example, this is answered after the application program gets the authorization of microphone
Microphone is used with the sound-recording function application of program, then when the application program begins to use microphone, record begins to use wheat
The first time stamp of gram wind and application use the sound-recording function of microphone.
In this implementation, records application program begins to use the first time of system permission to stab and apply using system
The function for permission of uniting realizes application so that user can be understood that time and function of the application program using system permission
Program uses the transparence of system permission.
With further reference to Fig. 5, it illustrates the processes 500 of another embodiment of private data guard method.The privacy
The process 500 of data guard method, can with the following steps are included:
Step 510, the licensing status of monitoring system permission.
In this step, step 510 is identical as the step 210 in embodiment illustrated in fig. 2, does not repeat herein.
Step 520, the authorization of system permission is obtained in response to monitoring application program, records application program is got
The authorization timestamp of authorization.
In this step, step 520 is identical as the step 220 in embodiment illustrated in fig. 2, does not repeat herein.
Step 530, based on authorization timestamp, the currently used state of real-time monitoring system permission.
In this step, step 530 is identical as the step 230 in embodiment illustrated in fig. 2, does not repeat herein.
It step 540, is just to send and answering to user in use state in response to the currently used state for monitoring system permission
The use notice of system permission is used with program.
In this step, step 540 is identical as the step 240 in embodiment illustrated in fig. 2, does not repeat herein.
Step 550, it is state of stopping using in response to the currently used state for monitoring system permission, obtains application program
The second timestamp of system permission is stopped using, and stops presenting using notice.
In this step, the state change of above-mentioned executing subject real-time monitoring system permission, stops when monitoring application program
When only using system permission, the second timestamp that application program stops using system permission is obtained, and stops presenting and notifies to use
The use notice of system permission is used in the family application program.For example, when microphone is used in application program, notification bar
Microphone icon is presented to notify user application that microphone permission is used, stops using wheat when monitoring application program
When gram wind permission, notification bar stops display microphone icon and records application program stops using the second time of microphone
Stamp.
In the present embodiment, it further obtains application program and stops using the timestamp of system permission, so that user is into one
The period that application program uses system permission is well understood in step, realizes that application program uses the transparence of system permission.
In some optional implementations of the present embodiment, the private data guard method is further comprising the steps of: ringing
The authorization for terminating application program received by Ying Yu to the shutoff operation instruction of authorization, obtains awarding for system permission
Power terminates timestamp.
Application program initiates the request of the application to the right to use of system permission in this implementation, and above-mentioned executing subject receives
The confirmation operation requested to user this application, application program obtain the authorization of system permission, obtain making for system permission
With power, the use state of the system permission is monitored in real time, it is above-mentioned when user needs to terminate the authorization of application program acquisition
Executing subject receives the shutoff operation for the authorization that user obtains application program, and being terminated according to shutoff operation triggering should
The instruction of authorization indicates the authorization for terminating application program based on the instruction.Meanwhile application program is terminated in instruction
When authorization, obtains authorization and terminate timestamp.
In this implementation, user can close the system permission by the rights management that application is arranged in existing system
Authorization, the system permission is for application program in loss rights state at this time.It obtains authorization and terminates timestamp, into one
Walk the state change more transparence so that the system permission that application program obtains.
It should be noted that the method for carrying out authorization or authorization termination to system permission is to study and answer extensively at present
Well-known technique, details are not described herein.
With further reference to Fig. 6, it illustrates the processes 600 of another embodiment of private data guard method.The privacy
The process 600 of data guard method, can with the following steps are included:
Step 610, first choice control is presented.
Wherein, first choice control is for receiving the switch order that user monitor system permission, be based on user to this
The selection operation of one selection control, instruction open or close system permission monitoring system.
In this step, interactive interface can be arranged to user's presentation first choice control in above-mentioned executing subject by system
Part.
Step 620, open system permission is indicated in response to selection operation of the received user to first choice control
Monitoring, the licensing status of monitoring system permission.
In this step, above-mentioned executing subject refers in response to selection operation of the received user to first choice control
Show that open system permission monitors, the licensing status of monitoring system permission.Above-mentioned executing subject receives user to first choice control
The selection operation of part triggers open command, is monitored according to the open command open system permission, starts awarding for monitoring system permission
Power state.
Step 630, system permission is closed to the selection operation instruction of first choice control in response to received user
Monitoring stops the licensing status of monitoring system permission.
In this step, above-mentioned executing subject refers in response to selection operation of the received user to first choice control
Show and close system permission monitoring, stops the licensing status of monitoring system permission.Above-mentioned executing subject receives user and selects first
The selection operation triggering out code for selecting control, closes system permission monitoring according to the out code, stops monitoring system permission
Licensing status.
In the present embodiment, whether user can input the selection operation to first choice control, can be opened with unrestricted choice
The monitoring of starting system permission.
In some optional implementations of the present embodiment, the private data guard method is further comprising the steps of: ringing
Ying Yu, which is received, checks operation to the use state of system permission, and the use state of system permission is presented.
Wherein, the use state of system permission includes but is not limited to following several: holding rights state, begins to use permission
State is used rights state, stops using rights state and loses rights state.
Above-mentioned executing subject checks operation to the use state of system permission in response to receiving in this implementation, is in
The use state of existing system permission.The use state of above-mentioned executing subject real-time monitoring system permission, records each of system permission
Kind of use state changes corresponding timestamp, when receive user's input to system permission when checking operation, can basis
The various use states of record change corresponding timestamp, and the corresponding state of system permission is presented to user.
In some optional implementations of the present embodiment, present system permission use state may include with down toward
Few one kind:
1) based on authorization timestamp, the state that application program obtains the authorization of system permission is presented.
Application program is initiated to obtain the application request of the right to use of system permission, when user is true based on this application request selecting
When recognizing authorization, application program gets the authorization of system permission, and the state of system permission is to hold rights state at this time.When
When application program gets the authorization of system permission, APP information and authorization timestamp are recorded, then when user's input is looked into
When seeing operation, the shape that application program obtains authorization is presented to user according to the authorization timestamp of record in above-mentioned executing subject
State, i.e. presentation APP hold rights state.The content of presentation may include authorization timestamp and the title of application program etc., example
Such as, the authorization of 10:00AM on July 30th, 2019, APP1 acquisition microphone.
2) based on stabbing at the first time, application program is presented and begins to use the state of system permission, and application program Shen is presented
It please use the function of system permission.
After application program gets the authorization of system permission, system permission is can be used in application program, when monitoring
When application program begins to use system permission, the state of system permission is to begin to use rights state, and record begins to use at this time
Application uses the function of system permission in the first time stamp and records application program of system permission, then when user inputs
When checking operation, above-mentioned executing subject is stabbed according to the first time of record, application program is presented to user, system is begun to use to weigh
The state of limit and presentation application use the function of system permission.The content of presentation may include first time stamp, application program
Title and application use system permission function etc., for example, 11:00AM on July 30th, 2019, the sound-recording function of APP1 are opened
Begin to use microphone.
3) it is based on the second timestamp, the state that application program stops using system permission is presented.
After application program begins to use system permission, when monitoring application program and stopping using system permission, system power
The state of limit is to stop using rights state, and record stops using the second timestamp of system permission at this time, then when user is defeated
When entering to check operation, above-mentioned executing subject is presented application program to user and stops using system according to the second timestamp of record
The state of permission.The content of presentation may include the second timestamp, title of application program etc., for example, on July 30th, 2019
11:30AM, APP1 stop using microphone.
4) timestamp is terminated based on authorization, the state that application program loses the authorization of system permission is presented.
Application program gets the authorization of system permission, and the state of system permission is to hold rights state at this time.When
When user inputs the operation for terminating authorization, record authorization terminates timestamp, above-mentioned then when operation is checked in user's input
Executing subject terminates timestamp according to the authorization of record, and the shape that application program loses the authorization of system permission is presented to user
State is in active rights state.The content of presentation may include that authorization terminates timestamp and the title of application program etc., example
Such as, the authorization of 12:00AM on July 30th, 2019, APP1 loss microphone.
In this implementation, based on stamp and the second timestamp at the first time, it can determine that application program is weighed using system
The time of limit, during this period of time, system permission are in and rights state are used.
In this implementation, user can choose the currently used state for checking system permission, i.e. system permission may
It is currently at and rights state is used or loses rights state etc., such as one of above-mentioned implementation way of realization.
In this implementation, user also can choose the history service condition for checking system permission, when user's input
Check that operation is when checking the operation of system permission history service condition, current time stamp to be obtained, according to the various uses of record
State changes corresponding timestamp, history service condition is presented to user, which may include various use states and turn
The title for becoming corresponding timestamp, application program, using the function etc. of system permission, for example, 10:00AM on July 30th, 2019,
The authorization of APP1 acquisition microphone;On July 30th, 2019 11:00AM, the sound-recording function of APP1 begins to use microphone;
On July 30th, 2019,11:30AM, APP1 stopped using microphone;On July 30th, 2019,12:00AM, APP1 lost microphone
Authorization.
This implementation allows users to be apparent from system by the use state to user's presentation system permission
The service condition of permission under various regimes, so that the use more transparence of system permission.
With further reference to Fig. 7, it illustrates the processes 700 of another embodiment of private data guard method.The privacy
The process 700 of data guard method, can with the following steps are included:
Step 710, system permission list is presented.
In this step, interactive interface presentation system permission list can be arranged in above-mentioned executing subject by system.This is
Permissions list of uniting includes multiple system permissions, and interactive interface can be shown as microphone, camera, position, storage, phone, communication
Record, calendar and information etc., user can choose for multiple system permissions in the system permission list, choose oneself
The system permission of care.
Step 720, one of goal systems permission system permission list being presented in response to receiving user
The selection interface of goal systems permission is presented in selection operation.
Wherein, choosing interface is presented after being chosen in system permission list to goal systems permission based on user
Interface.The selection interface may include that the application list and corresponding with the application list second select list of controls,
It is one-to-one relationship between application program and the second selection control.
Wherein, for the second selection control for receiving the switch order that user monitors goal systems permission, user can be right
The corresponding second selection list of controls of the application list is selected, and user can choose wherein one or more and select
Operation.Indicate whether to open the monitoring of goal systems permission based on selection operation of the user to the second selection control, if monitoring should
Service condition of the corresponding application program of second selection control to goal systems permission.
In this step, above-mentioned executing subject system permission list is presented in response to receiving user one of them
The selection interface of goal systems permission is presented in the selection operation of goal systems permission.User is in system permission list to oneself
The system permission of care is chosen, and the selection interface of the system permission of selection is presented, for example, user have chosen microphone this
A system permission, above-mentioned executing subject receive the selection operation to microphone of user's input, based on selection operation triggering choosing
It takes interface that instruction is presented, is presented according to selection interface and instruct the selection interface that microphone is presented to user.
Step 730, the selection in response to received user to the second selection control in the second selection list of controls
Operation instruction opens the monitoring of goal systems permission, the licensing status of monitoring objective system permission.
In this step, above-mentioned executing subject is in response to received user to second in the second selection list of controls
The selection operation instruction of control is selected to open the monitoring of goal systems permission, the licensing status of monitoring objective system permission.It is above-mentioned to hold
Row main body receives user to the selection operation of wherein one or more the second selection controls, triggers target based on the selection operation
The open command of system permission monitoring, since the second selection control and application program are correspondingly, according to the open command
The monitoring of goal systems permission is opened, service condition of the application program to goal systems permission of monitoring selection is started.
Fig. 8 shows a specific example, for example, including multiple system permissions, user in the system permission list presented
The goal systems permission chosen in system permission list is microphone, and it is corresponding that microphone is presented in the selection operation based on user
Selection interface, show comprising the application list, APP1, APP2, APP3 etc. application included in the application list
Program, wherein the corresponding one second selection control 810 of APP1, the corresponding one second selection control 820 of APP2, APP3 are one corresponding
Second selection control 830, user can select to open the monitoring of wherein one or more system permissions according to itself wish.Work as user
The second selection control 810 corresponding to APP1, the corresponding second selection control 820 of APP2 select opening operation, corresponding to APP3
The second selection control 830 select shutoff operation, then above-mentioned executing subject opens the corresponding goal systems permission of APP1 and APP2
Monitoring starts the licensing status for monitoring the corresponding goal systems permission of APP1 and APP2, and starts to monitor APP1 and APP2 pairs
The service condition of goal systems permission, above-mentioned executing subject close the corresponding goal systems permission monitoring of APP3, stop monitoring
The licensing status of the corresponding goal systems permission of APP3.
In the present embodiment, corresponding the application list of goal systems permission and corresponding is showed by the selection of user
The second selection list of controls, user can voluntarily select oneself to want by interaction the application program of concern using goal systems
The case where permission, this method have more flexibility.
To sum up, method described in above-described embodiment can be applied in mobile terminal, also can be applied to wearable set
In the standby scene being connect with mobile terminal, it can also be applied in Internet of Things (IOT) smart machine.
As a specific example, when wrist-watch and mobile phone are realized and interconnected, the outgoing running of user, mobile phone inconvenience band is in body
Bian Shi, user open the system permission monitoring of mobile phone to monitor the use state of the system permission in mobile phone, and wrist-watch also will receive
The use notice and fast select control that system permission monitoring issues.For example, when children are made a phone call using mobile phone at home,
When this system permission of phone is used, the wrist-watch of user can receive be used phone this system permission use it is logical
Control is known and fast selects, to notify user that children are used phone permission and make a phone call outward at this time.Do not allow in user
In the case where, so that it may the authorization of phone is directly closed by the quick selection control of watch displays, and then hangs up mobile phone
Dialing, the purpose of remote control electronic equipment has been achieved.
As a specific example, Internet of Things (IOT) smart machine can be in such a way that open system permission be monitored
Carry out monitoring device to the real-time service condition of system permission, although the friendship that IOT smart machine is not interacted with user directly
Mutual window, but can all be manipulated by other control terminals (generally mobile phone app), so intelligently being set when monitoring IOT
When the use state of standby system permission shifts, IOT smart machine can be sent to control terminal using notice by network
And control is fast selected, realize user for the real time monitoring of IOT smart machine.For example, when IOT smart machine is home cinema
When this smart machine very high for security level requirement, when monitoring equipment camera being used, Yong Hujie
It receives the use notice using camera and fast selects control, that is, receive logical using the use of camera access data
Know.User can identify the case where whether situation is non routine operation by using notice, be if user identifies this
The case where non routine operation, can thus pass through control terminal by fast selecting control to close the authorization of camera
Illegal invasion is prevented in real time, realizes the highly safe of data.
With further reference to Fig. 9, as the realization to method shown in above-mentioned each figure, this application provides a kind of private data guarantors
One embodiment of protection unit, the Installation practice is corresponding with embodiment of the method shown in Fig. 2, which can specifically apply
In various electronic equipments.
As shown in figure 9, the device 900 of the present embodiment includes: monitoring module 910 and notification module 920.Wherein, mould is monitored
Block 910 is configured to the licensing status of monitoring system permission, wherein licensing status is used to indicate in system permission licensing system
The range that uses of application program;The authorization of system permission, records application program are obtained in response to monitoring application program
Get the authorization timestamp of authorization;Based on authorization timestamp, the currently used state of real-time monitoring system permission;Notice
Module 920, the currently used state for being configured in response to monitor system permission is just to send and answering to user in use state
The use notice of system permission is used with program.
In some optional implementations of the present embodiment, notification module 920 is further configured to: in response to monitoring
Currently used state to system permission is just to obtain system current operating conditions in use state;In response to determining that system is worked as
Preceding operating status is standby mode, and display uses notice.
In some optional implementations of the present embodiment, notification module 920 is further configured to: in response to determination
System current operating conditions are wake-up states, check whether application program is in foreground application state;Journey is applied in response to determining
Sequence is not in foreground application state, is shown by notification bar using notice.
In some optional implementations of the present embodiment, notification module 920 is further configured to: in response to determination
Application program is in foreground application state, and the icon of system permission is presented to show using notice by notification bar.
In some optional implementations of the present embodiment, monitoring module 910 is further configured to: being obtained and is applied journey
Sequence begins to use the first time of system permission to stab the function of using system permission with application program.
In some optional implementations of the present embodiment, monitoring module 910 is configured to: being in response to monitoring
The currently used state of system permission is state of stopping using, and obtains the second timestamp that application program stops using system permission,
And stop presenting using notice.
In some optional implementations of the present embodiment, monitoring module 910 is configured in response to received
The authorization that application program is terminated to the shutoff operation instruction of authorization, the authorization for obtaining system permission terminate timestamp.
In some optional implementations of the present embodiment, monitoring module 910 is configured in response to received
User indicates open system authorizing monitoring system, the licensing status of monitoring system permission to the selection operation of first choice control;
Wherein, first choice control is for receiving the switch order that user monitors system permission.
In some optional implementations of the present embodiment, monitoring module 910 is further configured in response to being connect
The user received closes system permission monitoring to the selection operation instruction of first choice control, stops the authorization of monitoring system permission
State.
In some optional implementations of the present embodiment, device further include: display module is configured to: in response to
It receives and operation is checked to the use state of system permission, the use state of system permission is presented.
In some optional implementations of the present embodiment, display module is further configured to: based on the authorization time
The state that application program obtains the authorization of system permission is presented in stamp;It is stabbed based on first time, application program is presented and starts to make
With the state of system permission, and the function that application program uses system permission is presented;Based on the second timestamp, application is presented
Program stopped uses the state of system permission;Timestamp is terminated based on authorization, the authorization that application program loses system permission is presented
The state of license.
In some optional implementations of the present embodiment, display module is configured to: system permission list is presented;
In response to receiving the selection operation for one of goal systems permission that system permission list is presented in user, target is presented
The selection interface of system permission, wherein choose interface and present the corresponding the application list of goal systems permission;Monitor mould
Block is configured to: in response to received user to the selection operation of the second selection control in the second selection list of controls
The monitoring of goal systems permission, the licensing status of monitoring objective system permission are opened in instruction;Wherein, the second selection control is for receiving
The switch order that user monitors goal systems permission.
It will be understood by those skilled in the art that above-mentioned apparatus further includes some other known features, such as processor, storage
Device etc., in order to unnecessarily obscure embodiment of the disclosure, these well known structures are not shown in Fig. 9.
Below with reference to Figure 10, it illustrates the electronic equipment that is suitable for being used to realize embodiment of the disclosure, (example is as shown in figure 1
Terminal device) 1000 structural schematic diagram.Terminal device in embodiment of the disclosure can include but is not limited to such as move
(such as vehicle mounted guidance is whole for phone, laptop, PAD (tablet computer), PMP (portable media player), car-mounted terminal
End) etc. mobile terminal and such as number TV, desktop computer etc. fixed terminal.Terminal device shown in Figure 10 is only
Only an example, should not function to embodiment of the disclosure and use scope bring any restrictions.
As shown in Figure 10, electronic equipment 1000 may include processing unit (such as central processing unit, graphics processor etc.)
1001, it can be loaded at random according to the program being stored in read-only memory (ROM) 1002 or from storage device 1008
It accesses the program in memory (RAM) 1003 and executes various movements appropriate and processing.In RAM 1003, it is also stored with electricity
Sub- equipment 1000 operates required various programs and data.Processing unit 1001, ROM 1002 and RAM 1003 pass through bus
1004 are connected with each other.Input/output (I/O) interface 1005 is also connected to bus 1004.
In general, following device can connect to I/O interface 1005: including such as touch screen, touch tablet, keyboard, mouse, taking the photograph
As the input unit 1006 of head, microphone, accelerometer, gyroscope etc.;Including such as liquid crystal display (LCD), loudspeaker, vibration
The output device 1007 of dynamic device etc.;Storage device 1008 including such as tape, hard disk etc.;And communication device 1009.Communication
Device 1009 can permit electronic equipment 1000 and wirelessly or non-wirelessly be communicated with other equipment to exchange data.Although Figure 10 shows
The electronic equipment 1000 with various devices is gone out, it should be understood that being not required for implementing or having all dresses shown
It sets.It can alternatively implement or have more or fewer devices.Each box shown in Figure 10 can represent a device,
Also it can according to need and represent multiple devices.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, which can be downloaded and installed from network by communication device 1009, or from storage device
1008 are mounted, or are mounted from ROM 1002.When the computer program is executed by processing unit 1001, the disclosure is executed
Embodiment method in the above-mentioned function that limits.It should be noted that computer-readable Jie described in embodiment of the disclosure
Matter can be computer-readable signal media or computer readable storage medium either the two any combination.It calculates
Machine readable storage medium storing program for executing for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system,
Device or device, or any above combination.The more specific example of computer readable storage medium may include but unlimited
In: there is the electrical connection of one or more conducting wires, portable computer diskette, hard disk, random access storage device (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In embodiment of the disclosure, it counts
Calculation machine readable storage medium storing program for executing can be it is any include or storage program tangible medium, the program can be commanded execution system,
Device or device use or in connection.And in embodiment of the disclosure, computer-readable signal media can be with
Including in a base band or as carrier wave a part propagate data-signal, wherein carrying computer-readable program code.
The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal, optical signal or above-mentioned any conjunction
Suitable combination.Computer-readable signal media can also be any computer-readable Jie other than computer readable storage medium
Matter, the computer-readable signal media can be sent, propagated or transmitted for being made by instruction execution system, device or device
With or program in connection.The program code for including on computer-readable medium can pass with any suitable medium
It is defeated, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. or above-mentioned any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not
It is fitted into the electronic equipment.Above-mentioned computer-readable medium carries one or more program, when said one or more
When a program is executed by the electronic equipment, so that the electronic equipment: the licensing status of monitoring system permission, wherein licensing status
The range that the application program being used to indicate in system permission licensing system uses;System power is obtained in response to monitoring application program
The authorization of limit obtains the authorization timestamp that application program gets authorization;Based on authorization timestamp, real time monitoring system
The currently used state for permission of uniting;Currently used state in response to monitoring system permission is just in use state, to user
The use notice of system permission is used in sending application program.
The behaviour for executing embodiment of the disclosure can be write with one or more programming languages or combinations thereof
The computer program code of work, described program design language include object oriented program language-such as Java,
Smalltalk, C++ further include conventional procedural programming language-such as " C " language or similar program design language
Speech.Program code can be executed fully on the user computer, partly be executed on the user computer, as an independence
Software package execute, part on the user computer part execute on the remote computer or completely in remote computer or
It is executed on server.In situations involving remote computers, remote computer can pass through the network of any kind --- packet
Include local area network (LAN) or wide area network (WAN) --- it is connected to subscriber computer, or, it may be connected to outer computer (such as
It is connected using ISP by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse
Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding
The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction
Combination realize.
Above description is only the preferred embodiment of the disclosure and the explanation to institute's application technology principle.Those skilled in the art
Member it should be appreciated that embodiment of the disclosure involved in invention scope, however it is not limited to the specific combination of above-mentioned technical characteristic and
At technical solution, while should also cover do not depart from foregoing invention design in the case where, by above-mentioned technical characteristic or its be equal
Feature carries out any combination and other technical solutions for being formed.Such as disclosed in features described above and embodiment of the disclosure (but
It is not limited to) technical characteristic with similar functions is replaced mutually and the technical solution that is formed.
Claims (26)
1. a kind of private data guard method, which comprises
The licensing status of monitoring system permission, wherein the licensing status is used to indicate in the system permission licensing system
The range that application program uses;
The authorization that the system permission is obtained in response to monitoring application program, record the application program get it is described
The authorization timestamp of authorization;
Based on the authorization timestamp, the currently used state of the system permission is monitored in real time;
Currently used state in response to monitoring the system permission is just to send to user described using journey in use state
The use notice of the system permission is used in sequence.
2. according to the method described in claim 1, wherein, the currently used state in response to monitoring the system permission
Just in use state, to send the use notice that the system permission is used in the application program to user, comprising:
Currently used state in response to monitoring the system permission is just in use state, and acquisition system currently runs shape
State;
It is standby mode in response to the determination system current operating conditions, shows described using notice.
3. according to the method described in claim 2, wherein, the currently used state in response to monitoring the system permission
Just in use state, to send the use notice that the system permission is used in the application program to user, further includes:
It is wake-up states in response to the determination system current operating conditions, judges whether the application program is in foreground application
State;
It is not in foreground application state in response to the determination application program, is shown by notification bar described using notice.
4. according to the method described in claim 3, wherein, the currently used state in response to monitoring the system permission
Just in use state, to send the use notice that the system permission is used in the application program to user, further includes:
It is in foreground application state in response to the determination application program, the figure of the system permission is presented by the notification bar
It is described using notice to be marked with display.
5. method described in one of -4 according to claim 1, the currently used shape in response to monitoring the system permission
State is to send the use notice that the system permission is used in the application program to user just in use state, further includes:
Obtaining the application program begins to use the first time stamp of the system permission and the application program to use the system
The function for permission of uniting.
6. according to the method described in claim 5, wherein, the method also includes:
Currently used state in response to monitoring the system permission is to stop using state, obtains the application program and stops
Using the second timestamp of the system permission, and stop presenting described using notice.
7. according to the method described in claim 6, wherein, the method also includes:
In response to the received authorization for terminating the application program to the shutoff operation instruction of the authorization, obtain
The authorization of the system permission is taken to terminate timestamp.
8. method described in one of -7 according to claim 1, wherein the method also includes:
First choice control is presented, wherein the first choice control opens the system permission monitoring for receiving user
Close instruction;
The licensing status of the monitoring system permission includes:
Selection operation instruction open system permission monitoring in response to the received user to the first choice control,
Monitor the licensing status of the system permission.
9. according to the method described in claim 8, wherein, the method also includes:
The system permission is closed to the selection operation instruction of the first choice control in response to the received user
Monitoring stops the licensing status for monitoring the system permission.
10. according to the method described in claim 9, wherein, the method also includes:
Operation is checked to the use state of the system permission in response to receiving, the system permission is presented uses shape
State.
11. according to the method described in claim 10, wherein, the use state that the system permission is presented include with down toward
Few one kind:
Based on the authorization timestamp, the state that the application program obtains the authorization of the system permission is presented;
It is stabbed based on the first time, the state that the application program begins to use the system permission is presented, and described in presentation
Application program uses the function of the system permission;
Based on second timestamp, the state that the application program stops using the system permission is presented;
Timestamp is terminated based on the authorization, the state that the application program loses the authorization of the system permission is presented.
12. method described in one of -11 according to claim 1, wherein the method also includes:
System permission list is presented;
In response to receiving the selection for one of goal systems permission that the system permission list is presented in the user
The selection interface of goal systems permission is presented in operation, wherein the selection interface presentation goal systems permission is corresponding to answer
With program listing and the second selection list of controls corresponding with described the application list;
In response to the received user to the selection operation of the second selection control in the second selection list of controls
The goal systems permission monitoring is opened in instruction, monitors the licensing status of the goal systems permission;
Wherein, the second selection control is for receiving the switch order that the user monitors the goal systems permission.
13. a kind of private data guard device, comprising:
Monitoring module is configured to the licensing status of monitoring system permission, wherein the licensing status is used to indicate the system
The range that application program in permission licensing system uses;The authorization of the system permission is obtained in response to monitoring application program
License, records the authorization timestamp that the application program gets the authorization;Based on the authorization timestamp, supervise in real time
Control the currently used state of the system permission;
Notification module, be configured in response to monitor the system permission currently used state be just in use state, to
User sends the use notice that the system permission is used in the application program.
14. device according to claim 13, wherein the notification module is further configured to:
Currently used state in response to monitoring the system permission is just in use state, and acquisition system currently runs shape
State;
It is standby mode in response to the determination system current operating conditions, shows described using notice.
15. device according to claim 14, wherein the notification module is further configured to:
It is wake-up states in response to the determination system current operating conditions, checks whether the application program is in foreground application
State;
It is not in foreground application state in response to the determination application program, is shown by notification bar described using notice.
16. device according to claim 15, wherein the notification module is further configured to:
It is in foreground application state in response to the determination application program, the figure of the system permission is presented by the notification bar
It is described using notice to be marked with display.
17. device described in one of 3-16 according to claim 1, wherein the monitoring module is further configured to:
Obtaining the application program begins to use the first time stamp of the system permission and the application program to use institute
State the function of system permission.
18. device according to claim 17, wherein the monitoring module is further configured to: in response to monitoring
The currently used state of the system permission stops using state described in being, obtains the application program and stops using the system
Second timestamp of permission, and stop presenting described using notice.
19. device according to claim 18, wherein the monitoring module is configured in response to received pair
The shutoff operation instruction of the authorization terminates the authorization of the application program, and the authorization for obtaining the system permission is whole
Only timestamp.
20. device described in one of 3-19 according to claim 1, wherein described device further include: display module;
The display module is configured to present first choice control, wherein the first choice control is for receiving user couple
The switch order of the system permission monitoring;
The monitoring module is configured in response to the received user to the selection operation of the first choice control
It indicates open system authorizing monitoring system, monitors the licensing status of the system permission.
21. device according to claim 20, wherein the monitoring module is further configured in response to being received
The user arrived closes the system permission to the selection operation instruction of first choice control and monitors, and stops monitoring the system
The licensing status of permission.
22. device according to claim 21, wherein the display module is configured to: in response to receiving to described
The use state of system permission checks operation, and the use state of the system permission is presented.
23. device according to claim 22, wherein the display module is further configured to following at least one:
Based on the authorization timestamp, the state that the application program obtains the authorization of the system permission is presented;
It is stabbed based on the first time, the state that the application program begins to use the system permission is presented, and described in presentation
Application program uses the function of the system permission;
Based on second timestamp, the state that the application program stops using the system permission is presented;
Timestamp is terminated based on the authorization, the state that the application program loses the authorization of the system permission is presented.
24. device described in one of 3-23 according to claim 1, wherein
The display module, is configured to: system permission list is presented;
The display module, is further configured to: being presented in response to receiving the user to the system permission list
One of goal systems permission selection operation, present goal systems permission selection interface, wherein the selection interface
Present the corresponding the application list of the goal systems permission;
The monitoring module, is configured to: in response to the received user in the second selection list of controls
The goal systems permission monitoring is opened in the selection operation instruction of second selection control, monitors the authorization of the goal systems permission
State;
Wherein, the second selection control is for receiving the switch order that the user monitors the goal systems permission.
25. a kind of electronic equipment/terminal/server, comprising:
One or more processors;
Storage device is stored thereon with one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
The now method as described in any in claim 1-12.
26. a kind of computer-readable medium, is stored thereon with computer program, wherein real when described program is executed by processor
The now method as described in any in claim 1-12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910827242.0A CN110532803B (en) | 2019-09-03 | 2019-09-03 | Private data protection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910827242.0A CN110532803B (en) | 2019-09-03 | 2019-09-03 | Private data protection method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110532803A true CN110532803A (en) | 2019-12-03 |
CN110532803B CN110532803B (en) | 2023-03-24 |
Family
ID=68666407
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910827242.0A Active CN110532803B (en) | 2019-09-03 | 2019-09-03 | Private data protection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110532803B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112199255A (en) * | 2020-10-15 | 2021-01-08 | Oppo广东移动通信有限公司 | Authority use monitoring method, device, equipment and storage medium |
CN116720172A (en) * | 2023-08-07 | 2023-09-08 | 四川神州行网约车服务有限公司 | Verification method and device for system permission, computer equipment and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105072255A (en) * | 2015-07-10 | 2015-11-18 | 北京奇虎科技有限公司 | Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment |
CN110191465A (en) * | 2019-06-03 | 2019-08-30 | 努比亚技术有限公司 | Authority control method, mobile terminal and computer readable storage medium |
-
2019
- 2019-09-03 CN CN201910827242.0A patent/CN110532803B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105072255A (en) * | 2015-07-10 | 2015-11-18 | 北京奇虎科技有限公司 | Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment |
CN110191465A (en) * | 2019-06-03 | 2019-08-30 | 努比亚技术有限公司 | Authority control method, mobile terminal and computer readable storage medium |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112199255A (en) * | 2020-10-15 | 2021-01-08 | Oppo广东移动通信有限公司 | Authority use monitoring method, device, equipment and storage medium |
WO2022078108A1 (en) * | 2020-10-15 | 2022-04-21 | Oppo广东移动通信有限公司 | Method and apparatus for monitoring permission use, device, and storage medium |
CN116720172A (en) * | 2023-08-07 | 2023-09-08 | 四川神州行网约车服务有限公司 | Verification method and device for system permission, computer equipment and readable storage medium |
CN116720172B (en) * | 2023-08-07 | 2024-01-30 | 四川神州行网约车服务有限公司 | Verification method and device for system permission, computer equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110532803B (en) | 2023-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11093659B2 (en) | Controlling content visibility on a computing device based on wearable device proximity | |
JP6154906B2 (en) | Safety and emergency services | |
CN113785295A (en) | Configuring context-based restrictions for computing devices | |
CN110191231A (en) | A kind of unread message based reminding method, device, terminal device and storage medium | |
US20060099970A1 (en) | Method and system for providing a log of mobile station location requests | |
US9602653B2 (en) | Cognitive alert control framework for mobile devices | |
CN110471738B (en) | Theme switching method and device of application program, electronic equipment and storage medium | |
US11562051B2 (en) | Varying computing device behavior for different authenticators | |
US20190025992A1 (en) | Auto-reformatting of home screen graphical user interface depicting only administrator-approved applications | |
WO2018080198A1 (en) | Electronic device and method for performing authentication | |
CN110532803A (en) | Private data guard method and device | |
US20200342133A1 (en) | Controlling Content Visibility On A Computing Device Based On Computing Device Location | |
EP3021250B1 (en) | Electronic device and method for suggesting response manual in occurrence of denial | |
CN110275736A (en) | Obtain operation data method, apparatus, equipment and the readable medium of application program | |
CN112416616B (en) | Micro-service calling method and device, electronic equipment and storage medium | |
CN109656667A (en) | Implementation method, device, equipment and the medium of suspended window in a kind of client | |
WO2023083205A1 (en) | Display control method and apparatus, and electronic device and storage medium | |
CN110287657A (en) | Equipment supervises method, apparatus, equipment and storage medium | |
CN115022106B (en) | Group information processing method, device, equipment and medium | |
US11048390B2 (en) | Auto-reformatting of home screen graphical user interface depicting only administrator-approved applications | |
US11824861B2 (en) | Application accessing method, application accessing apparatus and storage medium | |
CN114519441A (en) | Conference room management method, conference room management apparatus, electronic device, storage medium, and program product | |
CN115913803A (en) | Information interaction method and device and electronic equipment | |
CN109960659A (en) | Method and apparatus for detecting application program | |
CN111723163A (en) | Information processing method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |