CN110532803A - Private data guard method and device - Google Patents

Private data guard method and device Download PDF

Info

Publication number
CN110532803A
CN110532803A CN201910827242.0A CN201910827242A CN110532803A CN 110532803 A CN110532803 A CN 110532803A CN 201910827242 A CN201910827242 A CN 201910827242A CN 110532803 A CN110532803 A CN 110532803A
Authority
CN
China
Prior art keywords
permission
system permission
application program
state
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910827242.0A
Other languages
Chinese (zh)
Other versions
CN110532803B (en
Inventor
杨荷花
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics China R&D Center, Samsung Electronics Co Ltd filed Critical Samsung Electronics China R&D Center
Priority to CN201910827242.0A priority Critical patent/CN110532803B/en
Publication of CN110532803A publication Critical patent/CN110532803A/en
Application granted granted Critical
Publication of CN110532803B publication Critical patent/CN110532803B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Abstract

The private data guard method and device that embodiment of the disclosure provides, it is monitored by the licensing status to system permission, after application program gets the authorization of system permission, monitor the currently used state of the system permission in real time, when monitoring application program the system permission for having obtained authorization being used, it sends using notice to user to notify user application that the system permission is used, realize the monitoring that the system permission of authorization is obtained to application program, application program is used to the state notifying user of system permission, realize the transparence that application program uses system permission, user can specify specifically used time and the scene of system permission, to be conducive to the protection to privacy of user data.

Description

Private data guard method and device
Technical field
Embodiment of the disclosure is related to field of computer technology, and in particular to private data guard method and device.
Background technique
Along with the fast development of smart machine, miscellaneous application program and service are also come into being, more and more Application program (Application, APP) be pooled on smart machine.But APP brought convenience to people's lives it is same When, the problem of there is also acquisitions without restraint for privacy of user data.
Currently, user, during making smart machine install APP, APP usually to be installed can send acquisition system power The solicited message of access mandate is limited, if getting the system permission access mandate license of user, which can access after mounting The related content of system permission.But this also cause once to license to APP some system permission (such as audio, video, short message, position, Storage etc.), APP can use the system permission whenever and wherever possible, and use state is not known to user.Therefore it may lead It applies the leakage of family private data.
Summary of the invention
Embodiment of the disclosure proposes private data guard method and device.
In a first aspect, embodiment of the disclosure provides a kind of private data guard method, this method comprises: monitoring system The licensing status of permission, wherein the range that the application program that licensing status is used to indicate in system permission licensing system uses;It rings Ying Yu monitors the authorization that application program obtains system permission, and records application program gets the authorization time of authorization Stamp;Based on authorization timestamp, the currently used state of real-time monitoring system permission;In response to monitoring currently making for system permission It is that the use notice of system permission is just being used to user's sending application program in use state with state.
It in some embodiments, is just in use state, Xiang Yong in response to the currently used state for monitoring system permission The use notice of system permission is used in family sending application program, comprising: in response to monitoring the currently used of system permission State is just to obtain system current operating conditions in use state;In response to determining that system current operating conditions are standby mode, Display uses notice.
It in some embodiments, is just in use state, Xiang Yong in response to the currently used state for monitoring system permission The use notice of system permission is used in family sending application program, further includes: is in response to determining system current operating conditions Wake-up states, judge whether application program is in foreground application state;In response to determining that application program is not in foreground application shape State is shown by notification bar using notice.
It in some embodiments, is just in use state, Xiang Yong in response to the currently used state for monitoring system permission The use notice of system permission is used in family sending application program, further includes: in response to determining that application program is answered in foreground With state, the icon of system permission is presented to show using notice by notification bar.
It in some embodiments, is just in use state, Xiang Yong in response to the currently used state for monitoring system permission The use notice of system permission is used in family sending application program, further includes: obtains application program and begins to use system permission First time stamp and application program use system permission function.
In some embodiments, this method further include: in response to monitoring the currently used state of system permission as stopping Use state obtains application program and stops using the second timestamp of system permission, and stops presenting using notice.
In some embodiments, this method further include: indicated in response to the received shutoff operation to authorization The authorization for terminating application program, the authorization for obtaining system permission terminate timestamp.
In some embodiments, first choice control is presented, wherein first choice control weighs system for receiving user Limit the switch order of monitoring;The licensing status of monitoring system permission includes: in response to received user to first choice control The selection operation of part indicates open system authorizing monitoring system, the licensing status of monitoring system permission.
In some embodiments, this method further include: the selection in response to received user to first choice control Operation instruction closes system permission monitoring, stops the licensing status of monitoring system permission.
In some embodiments, this method further include: behaviour is checked to the use state of system permission in response to receiving Make, the use state of system permission is presented.
In some embodiments, the use state that system permission is presented comprises at least one of the following: it is based on authorization timestamp, The state that application program obtains the authorization of system permission is presented;It is stabbed based on first time, application program is presented and begins to use The state of system permission, and the function that application program uses system permission is presented;Based on the second timestamp, presents and apply journey Sequence stops using the state of system permission;Timestamp is terminated based on authorization, the authorization that application program loss system permission is presented is permitted Can state.
In some embodiments, this method further include: system permission list is presented;System is weighed in response to receiving user The selection operation for one of goal systems permission that limit list is presented, is presented the selection interface of goal systems permission, wherein It chooses interface and the corresponding the application list of goal systems permission and the second selection control corresponding with the application list is presented Part list;The selection operation instruction of the second selection control in the second selection list of controls is opened in response to received user Open the monitoring of goal systems permission, the licensing status of monitoring objective system permission;Wherein, the second selection control is for receiving user couple The switch order of goal systems permission monitoring.
Second aspect, embodiment of the disclosure provide a kind of private data guard device, which includes: monitoring mould Block is configured to the licensing status of monitoring system permission, wherein licensing status is used to indicate answering in system permission licensing system The range used with program;The authorization of system permission is obtained in response to monitoring application program, records application program obtains To the authorization timestamp of authorization;Based on authorization timestamp, the currently used state of real-time monitoring system permission;Notify mould Block, the currently used state for being configured in response to monitor system permission is just in use state, to user's sending application journey The use notice of system permission is used in sequence.
In some embodiments, notification module is further configured to: in response to monitoring the currently used of system permission State is just to obtain system current operating conditions in use state;In response to determining that system current operating conditions are standby mode, Display uses notice.
In some embodiments, notification module is further configured to: in response to determining that system current operating conditions are to call out The state of waking up, checks whether application program is in foreground application state;In response to determining that application program is not in foreground application shape State is shown by notification bar using notice.
In some embodiments, notification module is further configured to: in response to determining that application program is in foreground application The icon of system permission is presented by notification bar to show using notice in state.
In some embodiments, monitoring module is further configured to: being obtained application program and is begun to use system permission Stamp and application program use the function of system permission at the first time.
In some embodiments, monitoring module is further configured to: in response to monitoring the currently used of system permission State is state of stopping using, and obtains application program and stops using the second timestamp of system permission, and stops presenting using logical Know.
In some embodiments, monitoring module is configured in response to the received shutoff operation to authorization The authorization for indicating termination application program, the authorization for obtaining system permission terminate timestamp.
In some embodiments, device further include: display module;Display module is configured to present first choice control Part, wherein first choice control is for receiving the switch order that user monitors system permission;Monitoring module is configured to ring User received by Ying Yu indicates open system authorizing monitoring system, monitoring system power to the selection operation of first choice control The licensing status of limit.
In some embodiments, monitoring module is further configured in response to received user to first choice System permission monitoring is closed in the selection operation instruction of control, stops the licensing status of monitoring system permission.
In some embodiments, display module is configured to: in response to receiving looking into the use state of system permission It sees operation, the use state of system permission is presented.
In some embodiments, display module is further configured to following at least one: based on authorization timestamp, being in Existing application program obtains the state of the authorization of system permission;It is stabbed based on first time, presentation application program, which begins to use, is The state for permission of uniting, and the function that application program uses system permission is presented;Based on the second timestamp, application program is presented Stop using the state of system permission;Timestamp is terminated based on authorization, the authorization that application program loses system permission is presented State.
In some embodiments, display module is configured to: system permission list is presented;Display module is further matched Be set to: the selection operation in response to receiving one of goal systems permission that system permission list is presented in user is in The selection interface of existing goal systems permission, wherein choose interface and present the corresponding the application list of goal systems permission;Prison Module is controlled, is configured to: the selection in response to received user to the second selection control in the second selection list of controls Operation instruction opens the monitoring of goal systems permission, the licensing status of monitoring objective system permission;Wherein, the second selection control is used for Receive the switch order that user monitors goal systems permission.
The third aspect, this application provides a kind of electronic equipment, electronic equipment/terminal/server, including one or more Processor;Storage device is stored thereon with one or more programs, when one or more programs are held by one or more processors Row, so that one or more processors realize the method as described in implementation any in first aspect.
Fourth aspect, this application provides a kind of computer-readable mediums, are stored thereon with computer program, the program quilt The method as described in implementation any in first aspect is realized when processor executes.
The private data guard method and device that embodiment of the disclosure provides, firstly, the authorization shape of monitoring system permission State, wherein the range that the application program that the licensing status is used to indicate in system permission licensing system uses, then, in response to The authorization that application program obtains the system permission is monitored, the authorization time that the application program gets authorization is recorded Stamp is then based on the authorization timestamp, the currently used state of the system permission is monitored in real time, then, in response to monitoring this The currently used state of system permission is to send the application program just in use state to user and the system permission is used Use notice.By being monitored to system permission, after application program gets the authorization of system permission, answered when monitoring When the system permission for having obtained authorization is used with program, send using notice to user to notify user application The system permission is used, realizes the monitoring for obtaining the system permission of authorization to application program, application program is made With the state notifying user of system permission, the transparence that application program uses system permission is realized, user can specify system The specifically used time of permission and scene, to be conducive to the protection to privacy of user data.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the disclosure is other Feature, objects and advantages will become more apparent upon:
Fig. 1, which shows some embodiments of the present disclosure, can be applied to exemplary system architecture figure therein;
Fig. 2 shows the flow charts of one embodiment of the private data guard method of the disclosure;
Fig. 3 shows the schematic diagram of an application scenarios of the private data guard method of the disclosure;
The process that the use that system permission is used to user's sending application program that Fig. 4 shows the disclosure notifies is shown It is intended to;
Fig. 5 shows the flow chart of another embodiment of the private data guard method of the disclosure;
Fig. 6 shows the flow chart of another embodiment of the private data guard method of the disclosure;
Fig. 7 shows the flow chart of another embodiment of the private data guard method of the disclosure;
Fig. 8 shows an exemplary diagram of the embodiment shown in Fig. 7;
Fig. 9 shows the structural schematic diagram of one embodiment of the private data guard system of the disclosure;
Figure 10 shows the structural schematic diagram for being suitable for the electronic equipment for being used to realize embodiment of the disclosure.
Specific embodiment
The disclosure is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to related invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the disclosure can phase Mutually combination.The disclosure is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 shows the private data guard method or private data guard device that can apply embodiment of the disclosure Exemplary system architecture 100.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104 and server 105. Network 104 between terminal device 101,102,103 and server 105 to provide the medium of communication link.Network 104 can be with Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with server 105, to receive or send out Send message etc..Various client applications, such as web browser applications, purchase can be installed on terminal device 101,102,103 Species application, searching class application, instant messaging tools, mailbox client, social platform software etc..
Terminal device 101,102,103 can be hardware, be also possible to software.When terminal device 101,102,103 is hard When part, it can be the various electronic equipments with display screen and supported web page browsing, including but not limited to smart phone, plate Computer, E-book reader, pocket computer on knee and desktop computer etc..When terminal device 101,102,103 is soft When part, it may be mounted in above-mentioned cited electronic equipment.It may be implemented into for example for providing the more of Distributed Services Single software or software module also may be implemented into a software or software module.It is not specifically limited herein.
Server 105 can be to provide the server of various services, such as each function to terminal device 101,102,103 Server, the Cloud Server etc. supported are provided.Server can carry out the data received the processing such as storing, and processing is tied Fruit feeds back to terminal device.
It should be noted that private data guard method provided by embodiment of the disclosure by terminal device 101,102, 103 execute.Correspondingly, private data guard device is set in terminal device 101,102,103.The application does not do this specifically It limits.
It should be understood that the private data guard method as provided by the embodiment of the present application by terminal device 101,102, 103 execute, if terminal device 101,102,103 does not have the demand interacted with server 105, framework shown in FIG. 1 can be only Include terminal device 101,102,103.In addition, the number of terminal device, network and server in Fig. 1 is only schematic 's.According to needs are realized, any number of terminal device, network and server can have.
With continued reference to Fig. 2, the process 200 of one embodiment of the private data guard method according to the disclosure is shown. The private data guard method, may comprise steps of:
Step 210, the licensing status of monitoring system permission.
Wherein, system permission refers to the permission that access, acquisition privacy of user data need, and system permission may include Mike The right to use, the right to use of camera, the right to use of position, the right to use of storage, the right to use of phone, the right to use of address list of wind Or right to use of calendar etc..Privacy of user data may include hardware data and software data etc., and wheat can be used in application program The access of the system permissions such as gram wind, camera, position, storage, phone, acquisition hardware data, address list, calendar etc., which also can be used, is Permission of uniting access, acquisition software data.
Wherein, the range that the application program that licensing status is used to indicate in system permission licensing system uses can be same One system permission is permitted the type of workable application program, and whether the right to use for being also possible to system permission has been obtained by application program It takes.
In this step, the executing subject (such as terminal device shown in FIG. 1) of private data guard method can be to being The licensing status of system permission is monitored, to obtain being used to indicate system permission, whether licensed application is used and license The information for the range that application program uses.
Step 220, the authorization of system permission is obtained in response to monitoring application program, is obtained application program and is got The authorization timestamp of authorization.
In this step, the licensing status of above-mentioned executing subject monitoring system permission, is obtained in response to monitoring application program The authorization of system permission is taken, the authorization timestamp that application program gets authorization, authorization timestamp instruction are obtained Be application program obtain authorization at the time of value.When application program (APP) initiates authorized application to user, monitor APP obtains the right to use of the system permission, and record obtains the APP information of the system permission at this time, such as: APP ID, APP Claim, APP icon, authorization timestamp etc..
Step 230, based on authorization timestamp, the currently used state of real-time monitoring system permission.
Wherein, the state of system permission can include but is not limited to following several states: holding rights state, is used State stops using state and loses rights state.
In this step, above-mentioned executing subject get authorization timestamp after, real-time monitoring system permission it is currently used State.As started based on the authorization timestamp, application program gets the authorization of system permission, and system permission is worked as at this time Preceding state is to hold rights state;Application program is monitored using system permission, the current state of system permission is at this time Use state;It monitors application program and stops using system permission, the current state of system permission is to stop using state at this time; The authorization for monitoring application program acquisition terminates, and the current state of system permission is to lose rights state at this time.
It step 240, is just to send and answering to user in use state in response to the currently used state for monitoring system permission The use notice of system permission is used with program.
In this step, above-mentioned executing subject is that shape is used in response to the currently used state for monitoring system permission The use notice of system permission is used, to user's sending application program to notify user application that this is used in state System permission.
The content using notice may include the title or icon of system permission currently in use, also may include Using the title of the application program of system permission or icon etc., the application is not specifically limited in this embodiment.This can be led to using notice It crosses the forms such as dialog box, prompting frame, system permission icon and is shown that the application is not specifically limited in this embodiment.For example, using logical Knowing can be in the form of prompting frame, can be with using the content of notice are as follows: camera permission is used in APP1.
The method provided by the above embodiment of the disclosure is monitored by the licensing status to system permission, application program After getting the authorization of system permission, the currently used state of the system permission is monitored in real time, when monitoring application program When the system permission for having obtained authorization is used, send using notice to user to notify user application to make With the system permission, the monitoring for obtaining the system permission of authorization to application program is realized, application program is used into system The state notifying user of permission, realizes the transparence that application program uses system permission, and user can specify system permission Specifically used time and scene, to be conducive to the protection to privacy of user data.
With continued reference to the signal that Fig. 3, Fig. 3 are according to the application scenarios of the private data guard method of the present embodiment Figure.This method can be applied in the application scenarios of Fig. 3, and for user when installing APP1, APP1 initiates application system permission The authorization requests of the right to use of microphone, user carry out authorization to the authorization requests of APP1, then APP1 can be awarded in acquisition Microphone is used during power license, APP1 can be used microphone and be acquired, access to privacy of user data.Terminal device In system permission monitoring mechanism monitor the authorization that APP1 gets microphone, then start the state of monitor microphone. APP1 is used in user, and current interface is the interactive interface of APP1, when microphone is used in APP1, system permission monitoring The currently used state of mechanism monitors to microphone is just to send APP1 just in use state to user and microphone is used Using notice, as shown in figure 3, by showing that microphone icon 310 notifies user that microphone is being currently used in APP1.
In some optional implementations of the present embodiment, being weighed in response to monitoring system shown in step 240 in Fig. 2 The currently used state of limit is just in use state, and the use notice that system permission is used to user's sending application program can To be executed further according to process 400 shown in Fig. 4.
Specifically, process shown in Fig. 4 includes:
It step 410, is that it is current just to obtain system in use state in response to the currently used state for monitoring system permission Operating status.
Wherein, system current operating conditions refer to the operating status that the current time system is in, and can be standby mode, It may be wake-up states.Standby mode refers to the booting of electronic equipment but without any substantive work (i.e. not to text The various operations of part and program) state.Wake-up states refer to the state of electronic equipment operation application program or file.
In this step, above-mentioned executing subject is that shape is used in response to the currently used state for monitoring system permission State obtains system current operating conditions.And after getting system current operating conditions, judge that the system got is currently transported Row state is standby mode or wake-up states.It is in open state at current time for example, getting electronic equipment, is examined simultaneously It measures system and does not run any application program or file, can determine that system current operating conditions are standby mode;Or it obtains It gets electronic equipment and is in open state at current time, and detect that system is currently running application program or file, it can To determine system current operating conditions as wake-up states.
Step 420, in response to determining that system current operating conditions are standby mode, display uses notice.
In this step, in response to determining that system current operating conditions are standby mode, display uses above-mentioned executing subject Notice.When judging system current operating conditions for standby mode, can be shown by way of dialog box using notice to lead to Know that system permission is used in user application, for example, when the system of above-mentioned executing subject is in black state, Ke Yitong The form for crossing pop-up dialog box wakes up screen, or dialog box is presented by the way of breath screen display.
The content that the dialog box is shown may include the notice that system permission is used in application program, can also include supplying User carries out the quick selection control of selection, this fast selects control to choose whether to continue awarding for system permission for receiving user Weigh the instruction of license.Whether user can check service condition by the content selection that dialog box is shown and whether continue system The authorization of permission.
Step 430, in response to determining that system current operating conditions are wake-up states, judge whether application program is in foreground Application state.
Wherein, foreground application state refers to that application program is being used by a user, and the application interface of above-mentioned executing subject For the state of the interactive interface of application program.
In this step, above-mentioned executing subject is in response to determining that system current operating conditions are wake-up states, and judgement is It whether is in foreground application state using the application program of system permission, judges whether the application program is being used by a user.
In response to determining that the application program is not in foreground application state, step 440 is executed, is shown and is used by notification bar Notice.
In this step, above-mentioned executing subject passes through notice in response to determining that application program is not in foreground application state Column display uses notice.After the application program that system permission is used in determination is not on foreground application state, at possibility In background operation state or in the state that has been switched off, shown at this time by notification bar using notice.
At this time this using notice may include application program name or icon and system permission name or icon, For example, microphone is used in APP1, the application is not specifically limited in this embodiment.
It should be noted that the method for background application initiation notice is to study and apply known extensively at present Technology, details are not described herein.
In response to determining that application program is in foreground application state, step 450 is executed, system permission is presented by notification bar Icon with show using notice.
In this step, above-mentioned executing subject passes through notification bar in response to determining that application program is in foreground application state The icon of system permission is presented to show using notice.Foreground application is in the determining application program that system permission is used After state, the application program is used in possible user at this time, and the icon of system permission is presented to show by notification bar at this time Use notice.The mode that the icon of system permission is presented can be uninterrupted display, be also possible to interruption flashing display, the application It is not specifically limited in this embodiment.
When interactive interface is in the operation interface of the application program, show that the application program is in foreground application shape State, when rights state is used in the application program, the icon of the system permission is presented in notification bar at this time.For example, interaction circle Face is in the operation interface of APP1, and microphone is used in APP1, and the notification bar at interface shows the icon of microphone at this time, is used for Microphone is used in prompt user APP1.
At the time of application program begins to use system permission, notification bar starts the icon of display system permission;It is applying At the time of program stopped uses system permission, notification bar stops the icon of display system permission;It is used in application program and is During permission of uniting, notification bar display system permission icon always.
In this implementation, by the judgement to system current operating conditions, and pass through the operation to application program State is judged, realizes and various forms of advice methods are presented under different situations.
In some optional implementations of the present embodiment, being weighed in response to monitoring system shown in step 240 in Fig. 2 The currently used state of limit is just in use state, and the use notice that system permission is used to user's sending application program can To further comprise: obtaining application program and the first time stamp of system permission and application program is begun to use to weigh using system The function of limit.
Above-mentioned executing subject begins to use system permission monitoring application program, obtains and stabs at the first time, and obtains Application program uses the function of the system permission.For example, this is answered after the application program gets the authorization of microphone Microphone is used with the sound-recording function application of program, then when the application program begins to use microphone, record begins to use wheat The first time stamp of gram wind and application use the sound-recording function of microphone.
In this implementation, records application program begins to use the first time of system permission to stab and apply using system The function for permission of uniting realizes application so that user can be understood that time and function of the application program using system permission Program uses the transparence of system permission.
With further reference to Fig. 5, it illustrates the processes 500 of another embodiment of private data guard method.The privacy The process 500 of data guard method, can with the following steps are included:
Step 510, the licensing status of monitoring system permission.
In this step, step 510 is identical as the step 210 in embodiment illustrated in fig. 2, does not repeat herein.
Step 520, the authorization of system permission is obtained in response to monitoring application program, records application program is got The authorization timestamp of authorization.
In this step, step 520 is identical as the step 220 in embodiment illustrated in fig. 2, does not repeat herein.
Step 530, based on authorization timestamp, the currently used state of real-time monitoring system permission.
In this step, step 530 is identical as the step 230 in embodiment illustrated in fig. 2, does not repeat herein.
It step 540, is just to send and answering to user in use state in response to the currently used state for monitoring system permission The use notice of system permission is used with program.
In this step, step 540 is identical as the step 240 in embodiment illustrated in fig. 2, does not repeat herein.
Step 550, it is state of stopping using in response to the currently used state for monitoring system permission, obtains application program The second timestamp of system permission is stopped using, and stops presenting using notice.
In this step, the state change of above-mentioned executing subject real-time monitoring system permission, stops when monitoring application program When only using system permission, the second timestamp that application program stops using system permission is obtained, and stops presenting and notifies to use The use notice of system permission is used in the family application program.For example, when microphone is used in application program, notification bar Microphone icon is presented to notify user application that microphone permission is used, stops using wheat when monitoring application program When gram wind permission, notification bar stops display microphone icon and records application program stops using the second time of microphone Stamp.
In the present embodiment, it further obtains application program and stops using the timestamp of system permission, so that user is into one The period that application program uses system permission is well understood in step, realizes that application program uses the transparence of system permission.
In some optional implementations of the present embodiment, the private data guard method is further comprising the steps of: ringing The authorization for terminating application program received by Ying Yu to the shutoff operation instruction of authorization, obtains awarding for system permission Power terminates timestamp.
Application program initiates the request of the application to the right to use of system permission in this implementation, and above-mentioned executing subject receives The confirmation operation requested to user this application, application program obtain the authorization of system permission, obtain making for system permission With power, the use state of the system permission is monitored in real time, it is above-mentioned when user needs to terminate the authorization of application program acquisition Executing subject receives the shutoff operation for the authorization that user obtains application program, and being terminated according to shutoff operation triggering should The instruction of authorization indicates the authorization for terminating application program based on the instruction.Meanwhile application program is terminated in instruction When authorization, obtains authorization and terminate timestamp.
In this implementation, user can close the system permission by the rights management that application is arranged in existing system Authorization, the system permission is for application program in loss rights state at this time.It obtains authorization and terminates timestamp, into one Walk the state change more transparence so that the system permission that application program obtains.
It should be noted that the method for carrying out authorization or authorization termination to system permission is to study and answer extensively at present Well-known technique, details are not described herein.
With further reference to Fig. 6, it illustrates the processes 600 of another embodiment of private data guard method.The privacy The process 600 of data guard method, can with the following steps are included:
Step 610, first choice control is presented.
Wherein, first choice control is for receiving the switch order that user monitor system permission, be based on user to this The selection operation of one selection control, instruction open or close system permission monitoring system.
In this step, interactive interface can be arranged to user's presentation first choice control in above-mentioned executing subject by system Part.
Step 620, open system permission is indicated in response to selection operation of the received user to first choice control Monitoring, the licensing status of monitoring system permission.
In this step, above-mentioned executing subject refers in response to selection operation of the received user to first choice control Show that open system permission monitors, the licensing status of monitoring system permission.Above-mentioned executing subject receives user to first choice control The selection operation of part triggers open command, is monitored according to the open command open system permission, starts awarding for monitoring system permission Power state.
Step 630, system permission is closed to the selection operation instruction of first choice control in response to received user Monitoring stops the licensing status of monitoring system permission.
In this step, above-mentioned executing subject refers in response to selection operation of the received user to first choice control Show and close system permission monitoring, stops the licensing status of monitoring system permission.Above-mentioned executing subject receives user and selects first The selection operation triggering out code for selecting control, closes system permission monitoring according to the out code, stops monitoring system permission Licensing status.
In the present embodiment, whether user can input the selection operation to first choice control, can be opened with unrestricted choice The monitoring of starting system permission.
In some optional implementations of the present embodiment, the private data guard method is further comprising the steps of: ringing Ying Yu, which is received, checks operation to the use state of system permission, and the use state of system permission is presented.
Wherein, the use state of system permission includes but is not limited to following several: holding rights state, begins to use permission State is used rights state, stops using rights state and loses rights state.
Above-mentioned executing subject checks operation to the use state of system permission in response to receiving in this implementation, is in The use state of existing system permission.The use state of above-mentioned executing subject real-time monitoring system permission, records each of system permission Kind of use state changes corresponding timestamp, when receive user's input to system permission when checking operation, can basis The various use states of record change corresponding timestamp, and the corresponding state of system permission is presented to user.
In some optional implementations of the present embodiment, present system permission use state may include with down toward Few one kind:
1) based on authorization timestamp, the state that application program obtains the authorization of system permission is presented.
Application program is initiated to obtain the application request of the right to use of system permission, when user is true based on this application request selecting When recognizing authorization, application program gets the authorization of system permission, and the state of system permission is to hold rights state at this time.When When application program gets the authorization of system permission, APP information and authorization timestamp are recorded, then when user's input is looked into When seeing operation, the shape that application program obtains authorization is presented to user according to the authorization timestamp of record in above-mentioned executing subject State, i.e. presentation APP hold rights state.The content of presentation may include authorization timestamp and the title of application program etc., example Such as, the authorization of 10:00AM on July 30th, 2019, APP1 acquisition microphone.
2) based on stabbing at the first time, application program is presented and begins to use the state of system permission, and application program Shen is presented It please use the function of system permission.
After application program gets the authorization of system permission, system permission is can be used in application program, when monitoring When application program begins to use system permission, the state of system permission is to begin to use rights state, and record begins to use at this time Application uses the function of system permission in the first time stamp and records application program of system permission, then when user inputs When checking operation, above-mentioned executing subject is stabbed according to the first time of record, application program is presented to user, system is begun to use to weigh The state of limit and presentation application use the function of system permission.The content of presentation may include first time stamp, application program Title and application use system permission function etc., for example, 11:00AM on July 30th, 2019, the sound-recording function of APP1 are opened Begin to use microphone.
3) it is based on the second timestamp, the state that application program stops using system permission is presented.
After application program begins to use system permission, when monitoring application program and stopping using system permission, system power The state of limit is to stop using rights state, and record stops using the second timestamp of system permission at this time, then when user is defeated When entering to check operation, above-mentioned executing subject is presented application program to user and stops using system according to the second timestamp of record The state of permission.The content of presentation may include the second timestamp, title of application program etc., for example, on July 30th, 2019 11:30AM, APP1 stop using microphone.
4) timestamp is terminated based on authorization, the state that application program loses the authorization of system permission is presented.
Application program gets the authorization of system permission, and the state of system permission is to hold rights state at this time.When When user inputs the operation for terminating authorization, record authorization terminates timestamp, above-mentioned then when operation is checked in user's input Executing subject terminates timestamp according to the authorization of record, and the shape that application program loses the authorization of system permission is presented to user State is in active rights state.The content of presentation may include that authorization terminates timestamp and the title of application program etc., example Such as, the authorization of 12:00AM on July 30th, 2019, APP1 loss microphone.
In this implementation, based on stamp and the second timestamp at the first time, it can determine that application program is weighed using system The time of limit, during this period of time, system permission are in and rights state are used.
In this implementation, user can choose the currently used state for checking system permission, i.e. system permission may It is currently at and rights state is used or loses rights state etc., such as one of above-mentioned implementation way of realization.
In this implementation, user also can choose the history service condition for checking system permission, when user's input Check that operation is when checking the operation of system permission history service condition, current time stamp to be obtained, according to the various uses of record State changes corresponding timestamp, history service condition is presented to user, which may include various use states and turn The title for becoming corresponding timestamp, application program, using the function etc. of system permission, for example, 10:00AM on July 30th, 2019, The authorization of APP1 acquisition microphone;On July 30th, 2019 11:00AM, the sound-recording function of APP1 begins to use microphone; On July 30th, 2019,11:30AM, APP1 stopped using microphone;On July 30th, 2019,12:00AM, APP1 lost microphone Authorization.
This implementation allows users to be apparent from system by the use state to user's presentation system permission The service condition of permission under various regimes, so that the use more transparence of system permission.
With further reference to Fig. 7, it illustrates the processes 700 of another embodiment of private data guard method.The privacy The process 700 of data guard method, can with the following steps are included:
Step 710, system permission list is presented.
In this step, interactive interface presentation system permission list can be arranged in above-mentioned executing subject by system.This is Permissions list of uniting includes multiple system permissions, and interactive interface can be shown as microphone, camera, position, storage, phone, communication Record, calendar and information etc., user can choose for multiple system permissions in the system permission list, choose oneself The system permission of care.
Step 720, one of goal systems permission system permission list being presented in response to receiving user The selection interface of goal systems permission is presented in selection operation.
Wherein, choosing interface is presented after being chosen in system permission list to goal systems permission based on user Interface.The selection interface may include that the application list and corresponding with the application list second select list of controls, It is one-to-one relationship between application program and the second selection control.
Wherein, for the second selection control for receiving the switch order that user monitors goal systems permission, user can be right The corresponding second selection list of controls of the application list is selected, and user can choose wherein one or more and select Operation.Indicate whether to open the monitoring of goal systems permission based on selection operation of the user to the second selection control, if monitoring should Service condition of the corresponding application program of second selection control to goal systems permission.
In this step, above-mentioned executing subject system permission list is presented in response to receiving user one of them The selection interface of goal systems permission is presented in the selection operation of goal systems permission.User is in system permission list to oneself The system permission of care is chosen, and the selection interface of the system permission of selection is presented, for example, user have chosen microphone this A system permission, above-mentioned executing subject receive the selection operation to microphone of user's input, based on selection operation triggering choosing It takes interface that instruction is presented, is presented according to selection interface and instruct the selection interface that microphone is presented to user.
Step 730, the selection in response to received user to the second selection control in the second selection list of controls Operation instruction opens the monitoring of goal systems permission, the licensing status of monitoring objective system permission.
In this step, above-mentioned executing subject is in response to received user to second in the second selection list of controls The selection operation instruction of control is selected to open the monitoring of goal systems permission, the licensing status of monitoring objective system permission.It is above-mentioned to hold Row main body receives user to the selection operation of wherein one or more the second selection controls, triggers target based on the selection operation The open command of system permission monitoring, since the second selection control and application program are correspondingly, according to the open command The monitoring of goal systems permission is opened, service condition of the application program to goal systems permission of monitoring selection is started.
Fig. 8 shows a specific example, for example, including multiple system permissions, user in the system permission list presented The goal systems permission chosen in system permission list is microphone, and it is corresponding that microphone is presented in the selection operation based on user Selection interface, show comprising the application list, APP1, APP2, APP3 etc. application included in the application list Program, wherein the corresponding one second selection control 810 of APP1, the corresponding one second selection control 820 of APP2, APP3 are one corresponding Second selection control 830, user can select to open the monitoring of wherein one or more system permissions according to itself wish.Work as user The second selection control 810 corresponding to APP1, the corresponding second selection control 820 of APP2 select opening operation, corresponding to APP3 The second selection control 830 select shutoff operation, then above-mentioned executing subject opens the corresponding goal systems permission of APP1 and APP2 Monitoring starts the licensing status for monitoring the corresponding goal systems permission of APP1 and APP2, and starts to monitor APP1 and APP2 pairs The service condition of goal systems permission, above-mentioned executing subject close the corresponding goal systems permission monitoring of APP3, stop monitoring The licensing status of the corresponding goal systems permission of APP3.
In the present embodiment, corresponding the application list of goal systems permission and corresponding is showed by the selection of user The second selection list of controls, user can voluntarily select oneself to want by interaction the application program of concern using goal systems The case where permission, this method have more flexibility.
To sum up, method described in above-described embodiment can be applied in mobile terminal, also can be applied to wearable set In the standby scene being connect with mobile terminal, it can also be applied in Internet of Things (IOT) smart machine.
As a specific example, when wrist-watch and mobile phone are realized and interconnected, the outgoing running of user, mobile phone inconvenience band is in body Bian Shi, user open the system permission monitoring of mobile phone to monitor the use state of the system permission in mobile phone, and wrist-watch also will receive The use notice and fast select control that system permission monitoring issues.For example, when children are made a phone call using mobile phone at home, When this system permission of phone is used, the wrist-watch of user can receive be used phone this system permission use it is logical Control is known and fast selects, to notify user that children are used phone permission and make a phone call outward at this time.Do not allow in user In the case where, so that it may the authorization of phone is directly closed by the quick selection control of watch displays, and then hangs up mobile phone Dialing, the purpose of remote control electronic equipment has been achieved.
As a specific example, Internet of Things (IOT) smart machine can be in such a way that open system permission be monitored Carry out monitoring device to the real-time service condition of system permission, although the friendship that IOT smart machine is not interacted with user directly Mutual window, but can all be manipulated by other control terminals (generally mobile phone app), so intelligently being set when monitoring IOT When the use state of standby system permission shifts, IOT smart machine can be sent to control terminal using notice by network And control is fast selected, realize user for the real time monitoring of IOT smart machine.For example, when IOT smart machine is home cinema When this smart machine very high for security level requirement, when monitoring equipment camera being used, Yong Hujie It receives the use notice using camera and fast selects control, that is, receive logical using the use of camera access data Know.User can identify the case where whether situation is non routine operation by using notice, be if user identifies this The case where non routine operation, can thus pass through control terminal by fast selecting control to close the authorization of camera Illegal invasion is prevented in real time, realizes the highly safe of data.
With further reference to Fig. 9, as the realization to method shown in above-mentioned each figure, this application provides a kind of private data guarantors One embodiment of protection unit, the Installation practice is corresponding with embodiment of the method shown in Fig. 2, which can specifically apply In various electronic equipments.
As shown in figure 9, the device 900 of the present embodiment includes: monitoring module 910 and notification module 920.Wherein, mould is monitored Block 910 is configured to the licensing status of monitoring system permission, wherein licensing status is used to indicate in system permission licensing system The range that uses of application program;The authorization of system permission, records application program are obtained in response to monitoring application program Get the authorization timestamp of authorization;Based on authorization timestamp, the currently used state of real-time monitoring system permission;Notice Module 920, the currently used state for being configured in response to monitor system permission is just to send and answering to user in use state The use notice of system permission is used with program.
In some optional implementations of the present embodiment, notification module 920 is further configured to: in response to monitoring Currently used state to system permission is just to obtain system current operating conditions in use state;In response to determining that system is worked as Preceding operating status is standby mode, and display uses notice.
In some optional implementations of the present embodiment, notification module 920 is further configured to: in response to determination System current operating conditions are wake-up states, check whether application program is in foreground application state;Journey is applied in response to determining Sequence is not in foreground application state, is shown by notification bar using notice.
In some optional implementations of the present embodiment, notification module 920 is further configured to: in response to determination Application program is in foreground application state, and the icon of system permission is presented to show using notice by notification bar.
In some optional implementations of the present embodiment, monitoring module 910 is further configured to: being obtained and is applied journey Sequence begins to use the first time of system permission to stab the function of using system permission with application program.
In some optional implementations of the present embodiment, monitoring module 910 is configured to: being in response to monitoring The currently used state of system permission is state of stopping using, and obtains the second timestamp that application program stops using system permission, And stop presenting using notice.
In some optional implementations of the present embodiment, monitoring module 910 is configured in response to received The authorization that application program is terminated to the shutoff operation instruction of authorization, the authorization for obtaining system permission terminate timestamp.
In some optional implementations of the present embodiment, monitoring module 910 is configured in response to received User indicates open system authorizing monitoring system, the licensing status of monitoring system permission to the selection operation of first choice control; Wherein, first choice control is for receiving the switch order that user monitors system permission.
In some optional implementations of the present embodiment, monitoring module 910 is further configured in response to being connect The user received closes system permission monitoring to the selection operation instruction of first choice control, stops the authorization of monitoring system permission State.
In some optional implementations of the present embodiment, device further include: display module is configured to: in response to It receives and operation is checked to the use state of system permission, the use state of system permission is presented.
In some optional implementations of the present embodiment, display module is further configured to: based on the authorization time The state that application program obtains the authorization of system permission is presented in stamp;It is stabbed based on first time, application program is presented and starts to make With the state of system permission, and the function that application program uses system permission is presented;Based on the second timestamp, application is presented Program stopped uses the state of system permission;Timestamp is terminated based on authorization, the authorization that application program loses system permission is presented The state of license.
In some optional implementations of the present embodiment, display module is configured to: system permission list is presented; In response to receiving the selection operation for one of goal systems permission that system permission list is presented in user, target is presented The selection interface of system permission, wherein choose interface and present the corresponding the application list of goal systems permission;Monitor mould Block is configured to: in response to received user to the selection operation of the second selection control in the second selection list of controls The monitoring of goal systems permission, the licensing status of monitoring objective system permission are opened in instruction;Wherein, the second selection control is for receiving The switch order that user monitors goal systems permission.
It will be understood by those skilled in the art that above-mentioned apparatus further includes some other known features, such as processor, storage Device etc., in order to unnecessarily obscure embodiment of the disclosure, these well known structures are not shown in Fig. 9.
Below with reference to Figure 10, it illustrates the electronic equipment that is suitable for being used to realize embodiment of the disclosure, (example is as shown in figure 1 Terminal device) 1000 structural schematic diagram.Terminal device in embodiment of the disclosure can include but is not limited to such as move (such as vehicle mounted guidance is whole for phone, laptop, PAD (tablet computer), PMP (portable media player), car-mounted terminal End) etc. mobile terminal and such as number TV, desktop computer etc. fixed terminal.Terminal device shown in Figure 10 is only Only an example, should not function to embodiment of the disclosure and use scope bring any restrictions.
As shown in Figure 10, electronic equipment 1000 may include processing unit (such as central processing unit, graphics processor etc.) 1001, it can be loaded at random according to the program being stored in read-only memory (ROM) 1002 or from storage device 1008 It accesses the program in memory (RAM) 1003 and executes various movements appropriate and processing.In RAM 1003, it is also stored with electricity Sub- equipment 1000 operates required various programs and data.Processing unit 1001, ROM 1002 and RAM 1003 pass through bus 1004 are connected with each other.Input/output (I/O) interface 1005 is also connected to bus 1004.
In general, following device can connect to I/O interface 1005: including such as touch screen, touch tablet, keyboard, mouse, taking the photograph As the input unit 1006 of head, microphone, accelerometer, gyroscope etc.;Including such as liquid crystal display (LCD), loudspeaker, vibration The output device 1007 of dynamic device etc.;Storage device 1008 including such as tape, hard disk etc.;And communication device 1009.Communication Device 1009 can permit electronic equipment 1000 and wirelessly or non-wirelessly be communicated with other equipment to exchange data.Although Figure 10 shows The electronic equipment 1000 with various devices is gone out, it should be understood that being not required for implementing or having all dresses shown It sets.It can alternatively implement or have more or fewer devices.Each box shown in Figure 10 can represent a device, Also it can according to need and represent multiple devices.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed from network by communication device 1009, or from storage device 1008 are mounted, or are mounted from ROM 1002.When the computer program is executed by processing unit 1001, the disclosure is executed Embodiment method in the above-mentioned function that limits.It should be noted that computer-readable Jie described in embodiment of the disclosure Matter can be computer-readable signal media or computer readable storage medium either the two any combination.It calculates Machine readable storage medium storing program for executing for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, Device or device, or any above combination.The more specific example of computer readable storage medium may include but unlimited In: there is the electrical connection of one or more conducting wires, portable computer diskette, hard disk, random access storage device (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In embodiment of the disclosure, it counts Calculation machine readable storage medium storing program for executing can be it is any include or storage program tangible medium, the program can be commanded execution system, Device or device use or in connection.And in embodiment of the disclosure, computer-readable signal media can be with Including in a base band or as carrier wave a part propagate data-signal, wherein carrying computer-readable program code. The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal, optical signal or above-mentioned any conjunction Suitable combination.Computer-readable signal media can also be any computer-readable Jie other than computer readable storage medium Matter, the computer-readable signal media can be sent, propagated or transmitted for being made by instruction execution system, device or device With or program in connection.The program code for including on computer-readable medium can pass with any suitable medium It is defeated, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. or above-mentioned any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not It is fitted into the electronic equipment.Above-mentioned computer-readable medium carries one or more program, when said one or more When a program is executed by the electronic equipment, so that the electronic equipment: the licensing status of monitoring system permission, wherein licensing status The range that the application program being used to indicate in system permission licensing system uses;System power is obtained in response to monitoring application program The authorization of limit obtains the authorization timestamp that application program gets authorization;Based on authorization timestamp, real time monitoring system The currently used state for permission of uniting;Currently used state in response to monitoring system permission is just in use state, to user The use notice of system permission is used in sending application program.
The behaviour for executing embodiment of the disclosure can be write with one or more programming languages or combinations thereof The computer program code of work, described program design language include object oriented program language-such as Java, Smalltalk, C++ further include conventional procedural programming language-such as " C " language or similar program design language Speech.Program code can be executed fully on the user computer, partly be executed on the user computer, as an independence Software package execute, part on the user computer part execute on the remote computer or completely in remote computer or It is executed on server.In situations involving remote computers, remote computer can pass through the network of any kind --- packet Include local area network (LAN) or wide area network (WAN) --- it is connected to subscriber computer, or, it may be connected to outer computer (such as It is connected using ISP by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Above description is only the preferred embodiment of the disclosure and the explanation to institute's application technology principle.Those skilled in the art Member it should be appreciated that embodiment of the disclosure involved in invention scope, however it is not limited to the specific combination of above-mentioned technical characteristic and At technical solution, while should also cover do not depart from foregoing invention design in the case where, by above-mentioned technical characteristic or its be equal Feature carries out any combination and other technical solutions for being formed.Such as disclosed in features described above and embodiment of the disclosure (but It is not limited to) technical characteristic with similar functions is replaced mutually and the technical solution that is formed.

Claims (26)

1. a kind of private data guard method, which comprises
The licensing status of monitoring system permission, wherein the licensing status is used to indicate in the system permission licensing system The range that application program uses;
The authorization that the system permission is obtained in response to monitoring application program, record the application program get it is described The authorization timestamp of authorization;
Based on the authorization timestamp, the currently used state of the system permission is monitored in real time;
Currently used state in response to monitoring the system permission is just to send to user described using journey in use state The use notice of the system permission is used in sequence.
2. according to the method described in claim 1, wherein, the currently used state in response to monitoring the system permission Just in use state, to send the use notice that the system permission is used in the application program to user, comprising:
Currently used state in response to monitoring the system permission is just in use state, and acquisition system currently runs shape State;
It is standby mode in response to the determination system current operating conditions, shows described using notice.
3. according to the method described in claim 2, wherein, the currently used state in response to monitoring the system permission Just in use state, to send the use notice that the system permission is used in the application program to user, further includes:
It is wake-up states in response to the determination system current operating conditions, judges whether the application program is in foreground application State;
It is not in foreground application state in response to the determination application program, is shown by notification bar described using notice.
4. according to the method described in claim 3, wherein, the currently used state in response to monitoring the system permission Just in use state, to send the use notice that the system permission is used in the application program to user, further includes:
It is in foreground application state in response to the determination application program, the figure of the system permission is presented by the notification bar It is described using notice to be marked with display.
5. method described in one of -4 according to claim 1, the currently used shape in response to monitoring the system permission State is to send the use notice that the system permission is used in the application program to user just in use state, further includes: Obtaining the application program begins to use the first time stamp of the system permission and the application program to use the system The function for permission of uniting.
6. according to the method described in claim 5, wherein, the method also includes:
Currently used state in response to monitoring the system permission is to stop using state, obtains the application program and stops Using the second timestamp of the system permission, and stop presenting described using notice.
7. according to the method described in claim 6, wherein, the method also includes:
In response to the received authorization for terminating the application program to the shutoff operation instruction of the authorization, obtain The authorization of the system permission is taken to terminate timestamp.
8. method described in one of -7 according to claim 1, wherein the method also includes:
First choice control is presented, wherein the first choice control opens the system permission monitoring for receiving user Close instruction;
The licensing status of the monitoring system permission includes:
Selection operation instruction open system permission monitoring in response to the received user to the first choice control, Monitor the licensing status of the system permission.
9. according to the method described in claim 8, wherein, the method also includes:
The system permission is closed to the selection operation instruction of the first choice control in response to the received user Monitoring stops the licensing status for monitoring the system permission.
10. according to the method described in claim 9, wherein, the method also includes:
Operation is checked to the use state of the system permission in response to receiving, the system permission is presented uses shape State.
11. according to the method described in claim 10, wherein, the use state that the system permission is presented include with down toward Few one kind:
Based on the authorization timestamp, the state that the application program obtains the authorization of the system permission is presented;
It is stabbed based on the first time, the state that the application program begins to use the system permission is presented, and described in presentation Application program uses the function of the system permission;
Based on second timestamp, the state that the application program stops using the system permission is presented;
Timestamp is terminated based on the authorization, the state that the application program loses the authorization of the system permission is presented.
12. method described in one of -11 according to claim 1, wherein the method also includes:
System permission list is presented;
In response to receiving the selection for one of goal systems permission that the system permission list is presented in the user The selection interface of goal systems permission is presented in operation, wherein the selection interface presentation goal systems permission is corresponding to answer With program listing and the second selection list of controls corresponding with described the application list;
In response to the received user to the selection operation of the second selection control in the second selection list of controls The goal systems permission monitoring is opened in instruction, monitors the licensing status of the goal systems permission;
Wherein, the second selection control is for receiving the switch order that the user monitors the goal systems permission.
13. a kind of private data guard device, comprising:
Monitoring module is configured to the licensing status of monitoring system permission, wherein the licensing status is used to indicate the system The range that application program in permission licensing system uses;The authorization of the system permission is obtained in response to monitoring application program License, records the authorization timestamp that the application program gets the authorization;Based on the authorization timestamp, supervise in real time Control the currently used state of the system permission;
Notification module, be configured in response to monitor the system permission currently used state be just in use state, to User sends the use notice that the system permission is used in the application program.
14. device according to claim 13, wherein the notification module is further configured to:
Currently used state in response to monitoring the system permission is just in use state, and acquisition system currently runs shape State;
It is standby mode in response to the determination system current operating conditions, shows described using notice.
15. device according to claim 14, wherein the notification module is further configured to:
It is wake-up states in response to the determination system current operating conditions, checks whether the application program is in foreground application State;
It is not in foreground application state in response to the determination application program, is shown by notification bar described using notice.
16. device according to claim 15, wherein the notification module is further configured to:
It is in foreground application state in response to the determination application program, the figure of the system permission is presented by the notification bar It is described using notice to be marked with display.
17. device described in one of 3-16 according to claim 1, wherein the monitoring module is further configured to:
Obtaining the application program begins to use the first time stamp of the system permission and the application program to use institute State the function of system permission.
18. device according to claim 17, wherein the monitoring module is further configured to: in response to monitoring The currently used state of the system permission stops using state described in being, obtains the application program and stops using the system Second timestamp of permission, and stop presenting described using notice.
19. device according to claim 18, wherein the monitoring module is configured in response to received pair The shutoff operation instruction of the authorization terminates the authorization of the application program, and the authorization for obtaining the system permission is whole Only timestamp.
20. device described in one of 3-19 according to claim 1, wherein described device further include: display module;
The display module is configured to present first choice control, wherein the first choice control is for receiving user couple The switch order of the system permission monitoring;
The monitoring module is configured in response to the received user to the selection operation of the first choice control It indicates open system authorizing monitoring system, monitors the licensing status of the system permission.
21. device according to claim 20, wherein the monitoring module is further configured in response to being received The user arrived closes the system permission to the selection operation instruction of first choice control and monitors, and stops monitoring the system The licensing status of permission.
22. device according to claim 21, wherein the display module is configured to: in response to receiving to described The use state of system permission checks operation, and the use state of the system permission is presented.
23. device according to claim 22, wherein the display module is further configured to following at least one:
Based on the authorization timestamp, the state that the application program obtains the authorization of the system permission is presented;
It is stabbed based on the first time, the state that the application program begins to use the system permission is presented, and described in presentation Application program uses the function of the system permission;
Based on second timestamp, the state that the application program stops using the system permission is presented;
Timestamp is terminated based on the authorization, the state that the application program loses the authorization of the system permission is presented.
24. device described in one of 3-23 according to claim 1, wherein
The display module, is configured to: system permission list is presented;
The display module, is further configured to: being presented in response to receiving the user to the system permission list One of goal systems permission selection operation, present goal systems permission selection interface, wherein the selection interface Present the corresponding the application list of the goal systems permission;
The monitoring module, is configured to: in response to the received user in the second selection list of controls The goal systems permission monitoring is opened in the selection operation instruction of second selection control, monitors the authorization of the goal systems permission State;
Wherein, the second selection control is for receiving the switch order that the user monitors the goal systems permission.
25. a kind of electronic equipment/terminal/server, comprising:
One or more processors;
Storage device is stored thereon with one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-12.
26. a kind of computer-readable medium, is stored thereon with computer program, wherein real when described program is executed by processor The now method as described in any in claim 1-12.
CN201910827242.0A 2019-09-03 2019-09-03 Private data protection method and device Active CN110532803B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910827242.0A CN110532803B (en) 2019-09-03 2019-09-03 Private data protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910827242.0A CN110532803B (en) 2019-09-03 2019-09-03 Private data protection method and device

Publications (2)

Publication Number Publication Date
CN110532803A true CN110532803A (en) 2019-12-03
CN110532803B CN110532803B (en) 2023-03-24

Family

ID=68666407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910827242.0A Active CN110532803B (en) 2019-09-03 2019-09-03 Private data protection method and device

Country Status (1)

Country Link
CN (1) CN110532803B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199255A (en) * 2020-10-15 2021-01-08 Oppo广东移动通信有限公司 Authority use monitoring method, device, equipment and storage medium
CN116720172A (en) * 2023-08-07 2023-09-08 四川神州行网约车服务有限公司 Verification method and device for system permission, computer equipment and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072255A (en) * 2015-07-10 2015-11-18 北京奇虎科技有限公司 Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment
CN110191465A (en) * 2019-06-03 2019-08-30 努比亚技术有限公司 Authority control method, mobile terminal and computer readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072255A (en) * 2015-07-10 2015-11-18 北京奇虎科技有限公司 Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment
CN110191465A (en) * 2019-06-03 2019-08-30 努比亚技术有限公司 Authority control method, mobile terminal and computer readable storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199255A (en) * 2020-10-15 2021-01-08 Oppo广东移动通信有限公司 Authority use monitoring method, device, equipment and storage medium
WO2022078108A1 (en) * 2020-10-15 2022-04-21 Oppo广东移动通信有限公司 Method and apparatus for monitoring permission use, device, and storage medium
CN116720172A (en) * 2023-08-07 2023-09-08 四川神州行网约车服务有限公司 Verification method and device for system permission, computer equipment and readable storage medium
CN116720172B (en) * 2023-08-07 2024-01-30 四川神州行网约车服务有限公司 Verification method and device for system permission, computer equipment and readable storage medium

Also Published As

Publication number Publication date
CN110532803B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
US11093659B2 (en) Controlling content visibility on a computing device based on wearable device proximity
JP6154906B2 (en) Safety and emergency services
CN113785295A (en) Configuring context-based restrictions for computing devices
CN110191231A (en) A kind of unread message based reminding method, device, terminal device and storage medium
US20060099970A1 (en) Method and system for providing a log of mobile station location requests
US9602653B2 (en) Cognitive alert control framework for mobile devices
CN110471738B (en) Theme switching method and device of application program, electronic equipment and storage medium
US11562051B2 (en) Varying computing device behavior for different authenticators
US20190025992A1 (en) Auto-reformatting of home screen graphical user interface depicting only administrator-approved applications
WO2018080198A1 (en) Electronic device and method for performing authentication
CN110532803A (en) Private data guard method and device
US20200342133A1 (en) Controlling Content Visibility On A Computing Device Based On Computing Device Location
EP3021250B1 (en) Electronic device and method for suggesting response manual in occurrence of denial
CN110275736A (en) Obtain operation data method, apparatus, equipment and the readable medium of application program
CN112416616B (en) Micro-service calling method and device, electronic equipment and storage medium
CN109656667A (en) Implementation method, device, equipment and the medium of suspended window in a kind of client
WO2023083205A1 (en) Display control method and apparatus, and electronic device and storage medium
CN110287657A (en) Equipment supervises method, apparatus, equipment and storage medium
CN115022106B (en) Group information processing method, device, equipment and medium
US11048390B2 (en) Auto-reformatting of home screen graphical user interface depicting only administrator-approved applications
US11824861B2 (en) Application accessing method, application accessing apparatus and storage medium
CN114519441A (en) Conference room management method, conference room management apparatus, electronic device, storage medium, and program product
CN115913803A (en) Information interaction method and device and electronic equipment
CN109960659A (en) Method and apparatus for detecting application program
CN111723163A (en) Information processing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant