CN111079134A - Method and device for controlling authority globally, storage medium and electronic equipment - Google Patents

Method and device for controlling authority globally, storage medium and electronic equipment Download PDF

Info

Publication number
CN111079134A
CN111079134A CN201911303219.8A CN201911303219A CN111079134A CN 111079134 A CN111079134 A CN 111079134A CN 201911303219 A CN201911303219 A CN 201911303219A CN 111079134 A CN111079134 A CN 111079134A
Authority
CN
China
Prior art keywords
target object
instruction
system interface
disabling
forbidding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911303219.8A
Other languages
Chinese (zh)
Inventor
袁伟
张更
左艳强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Qinghua Information Technology Co Ltd
Original Assignee
Chongqing Qinghua Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Qinghua Information Technology Co Ltd filed Critical Chongqing Qinghua Information Technology Co Ltd
Priority to CN201911303219.8A priority Critical patent/CN111079134A/en
Publication of CN111079134A publication Critical patent/CN111079134A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a method, a device, a storage medium and electronic equipment for controlling authority globally, wherein the method comprises the following steps: acquiring a triggered disabling instruction for disabling a target object, wherein the target object comprises a camera and/or a microphone; and calling a system interface corresponding to the target object, forbidding the system interface, and setting the system interface to be in a global forbidding state. According to the method, the device, the storage medium and the electronic equipment for controlling the overall authority, provided by the embodiment of the invention, after the forbidden instruction is obtained, the system interface is set to be in the overall forbidden state, the corresponding target object can be forbidden from the system level based on the forbidden instruction, so that all application programs can not use the functions of the target object, the authority of the application programs to use the target object is limited, the overall authority control is realized, the illegal application programs are prevented from stealing user information based on the target object, the privacy information of the user is prevented from being leaked, and the safety of the user information can be ensured.

Description

Method and device for controlling authority globally, storage medium and electronic equipment
Technical Field
The invention relates to the technical field of information security, in particular to a method and a device for controlling authority globally, a storage medium and electronic equipment.
Background
With the increasing popularity of intelligent terminal devices, the functions of the intelligent terminal devices are increasingly powerful, such as a photographing function and a recording function, and the functions of the intelligent terminal devices are generally opened to developers of most application programs. And the use of the photographing and recording permission in the terminal equipment belongs to dangerous permission, and if illegal application programs call the use permission of a camera or a microphone of the equipment randomly when users do not pay attention to the use permission, certain illegal application programs can automatically photograph or record. Even some viruses, trojans and the like can steal resources such as user pictures, audio and the like under the condition that the user does not know, so that serious consequences can be caused to the user, personal privacy is exposed, and life is influenced.
Besides the concern of personal privacy, the hidden dangers of peeping of the camera and eavesdropping of the microphone are great, so that the leakage of business secrets can be caused, and the national security can be affected. So the user privacy security issues are becoming increasingly prominent. In response to this problem, manufacturers are mainly aiming at preventing, for example, installing antivirus software, privacy guards, etc. to reduce the possible risks.
However, this preventive mode only minimizes risks and has limited effectiveness; the antivirus software occupies processing resources of the terminal equipment and influences the running speed of the terminal equipment; the privacy guard generally puts the privacy file into a certain privacy position, so that the purpose that the privacy data is not seen by others is achieved, the privacy guard can only cover the file path, prevent people from peeping or seeing the privacy data unintentionally, and cannot prevent the privacy data from being stolen by illegal application programs.
Disclosure of Invention
In order to solve the foregoing problems, embodiments of the present invention provide a method, an apparatus, a storage medium, and an electronic device for controlling authority globally.
In a first aspect, an embodiment of the present invention provides a method for controlling an authority globally, where the method includes:
acquiring a triggered disabling instruction for disabling a target object, wherein the target object comprises a camera and/or a microphone;
and calling a system interface corresponding to the target object, forbidding the system interface, and setting the system interface to be in a global forbidding state.
In one possible implementation manner, the obtaining the triggered disabling instruction for disabling the target object includes:
generating a forbidden icon for forbidding a target object and displaying the forbidden icon, and generating a forbidding instruction for forbidding the target object when receiving an operation which is input by a user and points to the forbidden icon;
or receiving a voice instruction input by a user, analyzing the voice instruction, and determining instruction content contained in the voice instruction; and when the instruction content is matched with the target object, generating a disabling instruction for disabling the target object.
In one possible implementation, the method further includes:
when a screen locking instruction is obtained, if a system interface corresponding to the target object is in a normal state, a temporary forbidding instruction for temporarily forbidding the target object is automatically generated;
and calling a system interface corresponding to the target object, forbidding the system interface, and setting the system interface to be in a temporary global forbidding state.
In one possible implementation, the method further includes:
when an unlocking instruction is obtained, judging whether a system interface corresponding to the target object is in a global forbidden state;
and when the system interface corresponding to the target object is not in the global disabled state, generating a recovery instruction for recovering the target object, and recovering the system interface corresponding to the target object to be in a normal state.
In one possible implementation, after setting the system interface to the global disabled state, the method further includes:
when a starting instruction for starting the target object is acquired, adjusting the system interface corresponding to the target object from a global forbidden state to a temporary normal state;
and when an exit instruction for exiting the target object is acquired, restoring the system interface corresponding to the target object from a temporary normal state to a global forbidden state.
In one possible implementation, after setting the system interface to the global disabled state, the method further includes:
intercepting a call request for calling the system interface, and generating an interception log, wherein the interception log comprises an identifier of an application program initiating the call request.
In a second aspect, an embodiment of the present invention further provides an apparatus for controlling an authority globally, where the apparatus includes:
the device comprises an acquisition module, a control module and a display module, wherein the acquisition module is used for acquiring a triggered disabling instruction for disabling a target object, and the target object comprises a camera and/or a microphone;
and the processing module is used for calling the system interface corresponding to the target object, forbidding the system interface and setting the system interface to be in a global forbidding state.
In one possible implementation manner, the acquiring module acquires the triggered disabling instruction for disabling the target object, and includes:
generating a forbidden icon for forbidding a target object and displaying the forbidden icon, and generating a forbidding instruction for forbidding the target object when receiving an operation which is input by a user and points to the forbidden icon;
or receiving a voice instruction input by a user, analyzing the voice instruction, and determining instruction content contained in the voice instruction; and when the instruction content is matched with the target object, generating a disabling instruction for disabling the target object.
In a third aspect, an embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions are used in any one of the above methods for globally controlling permissions.
In a fourth aspect, an embodiment of the present invention further provides an electronic device, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of global control authority as described in any one of the above.
In the solution provided by the foregoing first aspect of the embodiment of the present invention, after the disabling instruction is obtained, the system interface corresponding to the target object is called, and the system interface is disabled, so that the system interface can be set to the global disabling state, and all other application programs cannot call the system interface of the target object in the global disabling state. In this embodiment, a corresponding target object can be disabled from a system level based on a disable instruction, so that all application programs cannot use the functions of the target object, the application programs are restricted from using the rights of the target object, global rights control is realized, illegal application programs are prevented from stealing user information based on the target object, leakage of user privacy information is avoided, and the security of the user information can be ensured; and the global authority control can be realized through a forbidden instruction, so that the rapid control can be realized, and the operation of a user is convenient.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart illustrating a method for controlling permissions globally according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating automatically disabling an object in a method for global control authority according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of an apparatus for globally controlling authority according to an embodiment of the present invention;
fig. 4 shows a schematic structural diagram of an electronic device for executing a method for global control authority according to an embodiment of the present invention.
Detailed Description
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", and the like, indicate orientations and positional relationships based on those shown in the drawings, and are used only for convenience of description and simplicity of description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be considered as limiting the present invention.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
In the present invention, unless otherwise expressly specified or limited, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
According to the method for controlling the authority globally provided by the embodiment of the invention, the corresponding object can be controlled on a system layer through controlling a system interface, so that the global control is realized; the method for controlling the authority globally is executed by a terminal device, and the terminal device is embedded with an object needing global control, namely a target object. Specifically, referring to fig. 1, the method includes:
step 101: acquiring a triggered disabling instruction for disabling a target object, wherein the target object comprises a camera and/or a microphone.
In the embodiment of the invention, the target object is an object capable of acquiring data, and in order to ensure the safety of the data, the target object needs to be subjected to global authority control; the target object may be a camera capable of taking pictures or a microphone capable of collecting audio data, and when the application program calls the target object, the data can be collected by the target object, so that the corresponding application program can also collect the data. In this embodiment, when global rights control needs to be performed on the target object, a user may trigger a disabling instruction, where the disabling instruction is used to disable the target object.
Specifically, the step 101 of acquiring the triggered disabling instruction for disabling the target object includes:
step A1: and generating a disabling icon for disabling the target object and displaying the disabling icon, and generating a disabling instruction for disabling the target object when an operation pointing to the disabling icon is received, wherein the operation is input by a user.
In the embodiment of the invention, a forbidden icon can be generated in advance, and the forbidden icon can be displayed in a corresponding area of a screen of the terminal equipment when a user uses the terminal equipment, such as a system setting or a shortcut operation bar. When the screen of the terminal device displays the disable icon, the user is allowed to generate a disable instruction by inputting an operation directed to the disable icon. Specifically, the user may input a single-click operation, a double-click operation, a sliding operation, a long-press operation, or the like, which may be determined according to actual situations. When the operation pointing to the forbidden icon is received, it is indicated that the user currently needs the global authority to control the target object, and then a forbidden instruction for forbidding the corresponding target object can be generated. The disable icon is only used for receiving a disable instruction input by a user, and the disable icon itself cannot realize the function of disabling the target object.
Optionally, because there may be multiple target objects, a corresponding disable icon may be set for each target object, or a total disable icon may be set, that is, global authority control may be performed on multiple target objects simultaneously through the total disable icon. For example, global authority control is simultaneously performed on the camera and the microphone through one forbidden icon, so that one-key forbidden can be realized.
Alternatively, the step 101 of acquiring the triggered disabling instruction for disabling the target object includes:
step A2: receiving a voice instruction input by a user, analyzing the voice instruction, and determining instruction content contained in the voice instruction; and when the instruction content is matched with the target object, generating a disabling instruction for the target object.
In the embodiment of the invention, the user can also carry out global authority control in a voice mode. Specifically, after a voice instruction input by a user is received, the voice instruction can be analyzed based on a voice recognition method, and if it is determined that the voice instruction contains instruction content matched with a target object to be disabled, that is, when it is described that the user currently needs to disable the target object, a disabling instruction for disabling the target object can be generated. For example, a user sends a voice instruction of "forbidding a camera", and after receiving the voice instruction, the terminal device can analyze the instruction content therein, that is, "forbidding the camera", and further can generate a forbidding instruction for forbidding the camera.
Step 102: and calling a system interface corresponding to the target object, forbidding the system interface, and setting the system interface to be in a global forbidding state.
In the embodiment of the invention, after the disabling instruction is received, the corresponding system interface is called and disabled, so that the system interface can be set to be in a global disabling state. Specifically, when the function of the target object needs to be used by the existing application program, the interface of the target object needs to be called, and in this embodiment, the interface of the target object is set to the global disabled state, so that other application programs can be prohibited from calling the target object, and other application programs can be fundamentally prohibited from acquiring sensitive information based on the target object, so that the security of information in the process of using the terminal device by a user can be ensured.
Optionally, when the user needs to use the function of the target object normally, a recovery instruction for recovering the target object may be input after step 102, and the system interface corresponding to the target object is recovered to a normal state, so that the user may use the target object normally, and the application program in the terminal device may also call the target object normally to implement the corresponding function. Specifically, the terminal device may also display the disable icon, and the user inputs the recovery instruction by triggering the operation pointing to the disable icon again; or, the terminal device may display a recovery icon different from the disable icon, and the user inputs a recovery instruction by inputting an operation directed to the recovery icon; or, the user inputs the recovery instruction by inputting a voice containing the recovery instruction, and the embodiment does not limit the specific manner.
According to the method for controlling the overall control authority, after the disabling instruction is obtained, the system interface corresponding to the target object is called, and the system interface is disabled, so that the system interface can be set to be in the overall disabling state, and all other application programs cannot call the system interface of the target object in the overall disabling state. In this embodiment, a corresponding target object can be disabled from a system level based on a disable instruction, so that all application programs cannot use the functions of the target object, the application programs are restricted from using the rights of the target object, global rights control is realized, illegal application programs are prevented from stealing user information based on the target object, leakage of user privacy information is avoided, and the security of the user information can be ensured; and the global authority control can be realized through a forbidden instruction, so that the rapid control can be realized, and the operation of a user is convenient.
On the basis of the above embodiment, the method further includes a process of automatically disabling the object, specifically, referring to fig. 2, the process further includes:
step 201: when the screen locking instruction is acquired, if the system interface corresponding to the target object is in a normal state, a temporary disabling instruction for temporarily disabling the target object is automatically generated.
Step 202: and calling a system interface corresponding to the target object, forbidding the system interface, and setting the system interface to be in a temporary global forbidding state.
In the embodiment of the invention, when a user executes a screen locking operation, a corresponding screen locking instruction can be input into the terminal equipment, and the screen locking instruction can be a trigger instruction, for example, when the terminal equipment works, the user presses an on-off key, or the duration of the terminal equipment in an unoperated state exceeds a preset threshold, at this moment, the terminal equipment can lock the screen and trigger the corresponding screen locking instruction; the screen locking instruction can be actively input by a user or automatically triggered and generated when the screen of the terminal equipment is locked. When the screen locking instruction is obtained, it can be shown that the terminal device is currently in a screen locking state, that is, a target object such as a camera and a microphone is not needed, and the target object can be automatically disabled at this time.
Specifically, if the system interface of the target object is currently in the global disable state, that is, the user has already actively disabled the target object at this time, the automatic disable process does not need to be executed. If the system interface of the target object is not currently in the global disable state, that is, it is in the normal state, the terminal device may automatically generate an instruction for disabling the target object, that is, a temporary disable instruction. The temporary disabling instruction may be the same as the "disabling instruction" in step 101, that is, the temporary disabling instruction may also completely and globally disable the target object; accordingly, when the system interface of the target object is converted from the normal state to the temporary global disable state according to the temporary disable instruction, the temporary global disable state is completely the same as the "global disable state" in step 102, and then the system interface can be restored to the normal state only by actively inputting a restore instruction.
Alternatively, in this embodiment, the temporary disabling instruction is only used to temporarily disable the target object, and the temporary disabling instruction has lower control force than the disabling instruction in step 101. Correspondingly, all application programs can be prohibited from calling the system interface of the target object in the temporary global forbidden state, and the function of the temporary global forbidden state is the same as that of the system interface of the target object; however, when the recovery to the normal state is required, the temporary global disable state has a higher priority than the global disable state, or the temporary global disable state is easier to recover to the normal state.
Specifically, the terminal device may automatically recover to the normal state in the temporary global disable state, and the automatic recovery process includes:
step B1: and when the unlocking instruction is obtained, judging whether a system interface corresponding to the target object is in a global forbidden state.
Step B2: and when the system interface corresponding to the target object is not in the global disabled state, generating a recovery instruction for recovering the target object, and recovering the system interface corresponding to the target object to be in a normal state.
In the embodiment of the invention, automatic recovery is carried out when the terminal equipment is unlocked. Similar to the screen locking instruction, the terminal device can trigger the unlocking instruction in the unlocking process, and further can execute the automatic recovery process. If the system interface corresponding to the target object is in the global forbidden state, the system interface is forbidden actively for the user at present, and the system interface does not need to be restored to the normal state; on the contrary, if the system interface is not in the global disabled state, the system interface is in the temporary global disabled state after step 202, and in this embodiment, the recovery instruction is automatically generated, so that the system interface corresponding to the target object can be recovered to the normal state, and the user can normally use the function of the target object after unlocking the terminal device.
In the embodiment, the system interface can be automatically disabled based on the screen locking instruction, so that a user can automatically disable the target object when not using the terminal equipment, and the illegal application program is effectively prevented from stealing user information by using the target object; in addition, the process does not need other operations performed by the user, and the operation process of the user can be simplified. Meanwhile, when the user unlocks the terminal equipment, the intelligent terminal can be automatically recovered to be in a normal state, and the normal use of the intelligent terminal by the user is not influenced.
Optionally, after "setting the system interface to the global disabled state" in the step 102, the method further includes:
step C1: when a starting instruction for starting the target object is acquired, the system interface corresponding to the target object is adjusted from the global disabled state to the temporary normal state.
Step C2: and when an exit instruction for exiting the target object is acquired, restoring the system interface corresponding to the target object from the temporary normal state to the global disabled state.
In the embodiment of the present invention, the terminal device is provided with a system program directly corresponding to the target object, for example, the camera and the microphone are respectively provided with a system program "camera", "voice memo", and the like. When a user needs to use the system program, a starting instruction for starting a corresponding target object can be generated, and at this time, if the target object is in a global disabled state, the target object can be adjusted to be in a temporary normal state. In this embodiment, the "temporary normal state" is also a normal state, but the temporary normal state only exists in the target object enabling process. When the user exits the target object, namely when the user inputs a corresponding exit instruction, the temporary normal state is restored to the global forbidden state, so that the safety of the information is ensured as much as possible on the premise of not influencing the use of the system program by the user.
The "quitting" of the target object refers to completely closing the system program corresponding to the target object, or temporarily quitting the system program corresponding to the target object, that is, the background running also serves as the quitting of the target object. Accordingly, a "launch" target object may be a complete opening of the target object, or a switching of the target object from a background run to a foreground run.
Optionally, after "setting the system interface to the global disabled state" in the step 102, the method further includes: intercepting a call request for calling a system interface and generating an interception log, wherein the interception log comprises an identifier of an application program initiating the call request.
In the embodiment of the invention, after the system interface is set to the global forbidden state, the calling condition of the system interface can be monitored, and based on the generated interception log, which application programs illegally call the system interface when the system interface is in the global forbidden state can be determined, so that a user can conveniently screen out the illegal application programs.
The method flow of the global control authority is described in detail below by an embodiment.
In the embodiment of the invention, the mode switch for uniformly controlling the camera and the microphone is arranged, the mode switch can be specifically displayed to a user in an icon (such as a forbidden icon) mode, and the user realizes one-key control on the camera and the microphone by operating the mode switch. Specifically, the process comprises the following steps:
step D1: the terminal device generates a mode switch and displays the mode switch.
The mode switch can be displayed on a main screen of the terminal device or in a shortcut operation bar, and the mode switch can be determined based on actual conditions. Optionally, the mode switch may be displayed after receiving a display instruction input by the user, and the user may be reminded of the function of the mode switch. For example, a prompt box may be popped up, which contains "to prevent the user from being disturbed, the user turns on a mode switch to turn off all the applications to call the microphone and the camera, and the user cannot perform the photographing and recording operations".
Step D2: the user operates the mode switch and inputs a disable instruction.
Step D3: and the terminal equipment calls the system interface corresponding to the target object, disables the system interface and sets the system interface to be in a global disabled state.
In this embodiment, after the user selects and determines, the mode function is turned on, and at this time, the camera and the microphone do not allow any application to be invoked. In this mode, if the application program used by the user needs to call the camera or the microphone, a prompt that the mode is opened and the camera or the microphone cannot be used can be popped up.
Optionally, if the user uses the camera and voice memo of the system, the user can also prohibit the camera and voice memo; alternatively, as shown in steps C1 to C2, the temporary normal state may be adjusted, which may be determined based on actual conditions.
According to the method for controlling the overall control authority, after the disabling instruction is obtained, the system interface corresponding to the target object is called, and the system interface is disabled, so that the system interface can be set to be in the overall disabling state, and all other application programs cannot call the system interface of the target object in the overall disabling state. In this embodiment, a corresponding target object can be disabled from a system level based on a disable instruction, so that all application programs cannot use the functions of the target object, the application programs are restricted from using the rights of the target object, global rights control is realized, illegal application programs are prevented from stealing user information based on the target object, leakage of user privacy information is avoided, and the security of the user information can be ensured; and the global authority control can be realized through a forbidden instruction, so that the rapid control can be realized, and the operation of a user is convenient.
The above describes in detail the flow of the method for controlling the authority globally, which may also be implemented by a corresponding device, and the structure and function of the device are described in detail below.
The apparatus for controlling authority globally provided by an embodiment of the present invention, as shown in fig. 3, includes:
an obtaining module 31, configured to obtain a triggered disabling instruction for disabling a target object, where the target object includes a camera and/or a microphone;
and the processing module 32 is configured to call a system interface corresponding to the target object, disable the system interface, and set the system interface to a global disabled state.
On the basis of the above embodiment, the acquiring module 31 acquires the triggered disabling instruction for disabling the target object, including:
generating a forbidden icon for forbidding a target object and displaying the forbidden icon, and generating a forbidding instruction for forbidding the target object when receiving an operation which is input by a user and points to the forbidden icon;
or receiving a voice instruction input by a user, analyzing the voice instruction, and determining instruction content contained in the voice instruction; and when the instruction content is matched with the target object, generating a disabling instruction for disabling the target object.
On the basis of the above embodiment, the processing module 32 is further configured to:
when a screen locking instruction is obtained, if a system interface corresponding to the target object is in a normal state, a temporary forbidding instruction for temporarily forbidding the target object is automatically generated;
and calling a system interface corresponding to the target object, forbidding the system interface, and setting the system interface to be in a temporary global forbidding state.
On the basis of the above embodiment, the processing module 32 is further configured to:
when an unlocking instruction is obtained, judging whether a system interface corresponding to the target object is in a global forbidden state;
and when the system interface corresponding to the target object is not in the global disabled state, generating a recovery instruction for recovering the target object, and recovering the system interface corresponding to the target object to be in a normal state.
On the basis of the foregoing embodiment, after setting the system interface to the global disabled state, the processing module 32 is further configured to:
when a starting instruction for starting the target object is acquired, adjusting the system interface corresponding to the target object from a global forbidden state to a temporary normal state;
and when an exit instruction for exiting the target object is acquired, restoring the system interface corresponding to the target object from a temporary normal state to a global forbidden state.
On the basis of the foregoing embodiment, after setting the system interface to the global disabled state, the processing module 32 is further configured to:
intercepting a call request for calling the system interface, and generating an interception log, wherein the interception log comprises an identifier of an application program initiating the call request.
According to the device for global control authority provided by the embodiment of the invention, after the disabling instruction is obtained, the system interface corresponding to the target object is called, and the system interface is disabled, so that the system interface can be set to be in a global disabling state, and all other application programs cannot call the system interface of the target object in the global disabling state. In this embodiment, a corresponding target object can be disabled from a system level based on a disable instruction, so that all application programs cannot use the functions of the target object, the application programs are restricted from using the rights of the target object, global rights control is realized, illegal application programs are prevented from stealing user information based on the target object, leakage of user privacy information is avoided, and the security of the user information can be ensured; and the global authority control can be realized through a forbidden instruction, so that the rapid control can be realized, and the operation of a user is convenient.
Embodiments of the present invention further provide a computer storage medium, where the computer storage medium stores computer-executable instructions, which include a program for executing the method for global control authority, and the computer-executable instructions may execute the method in any of the method embodiments.
The computer storage medium may be any available medium or data storage device that can be accessed by a computer, including but not limited to magnetic memory (e.g., floppy disk, hard disk, magnetic tape, magneto-optical disk (MO), etc.), optical memory (e.g., CD, DVD, BD, HVD, etc.), and semiconductor memory (e.g., ROM, EPROM, EEPROM, nonvolatile memory (NANDFLASH), Solid State Disk (SSD)), etc.
Fig. 4 shows a block diagram of an electronic device according to another embodiment of the present invention. The electronic device 1100 may be a host server with computing capabilities, a personal computer PC, or a portable computer or terminal that is portable, or the like. The specific embodiment of the present invention does not limit the specific implementation of the electronic device.
The electronic device 1100 includes at least one processor (processor)1110, a Communications Interface 1120, a memory 1130, and a bus 1140. The processor 1110, the communication interface 1120, and the memory 1130 communicate with each other via the bus 1140.
The communication interface 1120 is used for communicating with network elements including, for example, virtual machine management centers, shared storage, etc.
Processor 1110 is configured to execute programs. Processor 1110 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present invention.
The memory 1130 is used for executable instructions. The memory 1130 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1130 may also be a memory array. The storage 1130 may also be partitioned and the blocks may be combined into virtual volumes according to certain rules. The instructions stored by the memory 1130 may be executable by the processor 1110 to enable the processor 1110 to perform the method of global control authority in any of the method embodiments described above.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the modifications or alternative embodiments within the technical scope of the present invention, and shall be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for globally controlling authority, comprising:
acquiring a triggered disabling instruction for disabling a target object, wherein the target object comprises a camera and/or a microphone;
and calling a system interface corresponding to the target object, forbidding the system interface, and setting the system interface to be in a global forbidding state.
2. The method of claim 1, wherein obtaining the triggered disabling instructions for disabling the target object comprises:
generating a forbidden icon for forbidding a target object and displaying the forbidden icon, and generating a forbidding instruction for forbidding the target object when receiving an operation which is input by a user and points to the forbidden icon;
or receiving a voice instruction input by a user, analyzing the voice instruction, and determining instruction content contained in the voice instruction; and when the instruction content is matched with the target object, generating a disabling instruction for disabling the target object.
3. The method of claim 1, further comprising:
when a screen locking instruction is obtained, if a system interface corresponding to the target object is in a normal state, a temporary forbidding instruction for temporarily forbidding the target object is automatically generated;
and calling a system interface corresponding to the target object, forbidding the system interface, and setting the system interface to be in a temporary global forbidding state.
4. The method of claim 3, further comprising:
when an unlocking instruction is obtained, judging whether a system interface corresponding to the target object is in a global forbidden state;
and when the system interface corresponding to the target object is not in the global disabled state, generating a recovery instruction for recovering the target object, and recovering the system interface corresponding to the target object to be in a normal state.
5. The method of claim 1, further comprising, after said setting the system interface to a globally disabled state:
when a starting instruction for starting the target object is acquired, adjusting the system interface corresponding to the target object from a global forbidden state to a temporary normal state;
and when an exit instruction for exiting the target object is acquired, restoring the system interface corresponding to the target object from a temporary normal state to a global forbidden state.
6. The method of claim 1, further comprising, after said setting the system interface to a globally disabled state:
intercepting a call request for calling the system interface, and generating an interception log, wherein the interception log comprises an identifier of an application program initiating the call request.
7. An apparatus for globally controlling authority, comprising:
the device comprises an acquisition module, a control module and a display module, wherein the acquisition module is used for acquiring a triggered disabling instruction for disabling a target object, and the target object comprises a camera and/or a microphone;
and the processing module is used for calling the system interface corresponding to the target object, forbidding the system interface and setting the system interface to be in a global forbidding state.
8. The apparatus of claim 7, wherein the obtaining module obtains the triggered disabling instruction for disabling the target object comprises:
generating a forbidden icon for forbidding a target object and displaying the forbidden icon, and generating a forbidding instruction for forbidding the target object when receiving an operation which is input by a user and points to the forbidden icon;
or receiving a voice instruction input by a user, analyzing the voice instruction, and determining instruction content contained in the voice instruction; and when the instruction content is matched with the target object, generating a disabling instruction for disabling the target object.
9. A computer storage medium having stored thereon computer-executable instructions for performing the method of globally controlling authority of any of claims 1-6.
10. An electronic device, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of global control authority of any of claims 1-6.
CN201911303219.8A 2019-12-17 2019-12-17 Method and device for controlling authority globally, storage medium and electronic equipment Pending CN111079134A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911303219.8A CN111079134A (en) 2019-12-17 2019-12-17 Method and device for controlling authority globally, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911303219.8A CN111079134A (en) 2019-12-17 2019-12-17 Method and device for controlling authority globally, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN111079134A true CN111079134A (en) 2020-04-28

Family

ID=70315252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911303219.8A Pending CN111079134A (en) 2019-12-17 2019-12-17 Method and device for controlling authority globally, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN111079134A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112181529A (en) * 2020-10-12 2021-01-05 Oppo广东移动通信有限公司 Application program control method and device and electronic equipment
CN112887482A (en) * 2021-01-27 2021-06-01 惠州Tcl移动通信有限公司 Method, device and storage medium for protecting user information
CN114547631A (en) * 2020-11-18 2022-05-27 成都鼎桥通信技术有限公司 Terminal control method and device and terminal

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130222609A1 (en) * 2012-02-29 2013-08-29 Aviv Soffer Secure video camera device
CN106791011A (en) * 2016-11-29 2017-05-31 维沃移动通信有限公司 The method and mobile terminal of a kind of control recording authority
CN107302626A (en) * 2017-05-23 2017-10-27 成都联宇云安科技有限公司 A kind of management-control method for Android smartphone microphone
CN107547720A (en) * 2016-06-23 2018-01-05 莫力江 Control system built in a kind of mobile phone for disabling mobile phone camera
CN108549798A (en) * 2018-04-12 2018-09-18 珠海市魅族科技有限公司 Terminal equipment control method and device, terminal device and computer readable storage medium
CN109067964A (en) * 2018-06-12 2018-12-21 Oppo广东移动通信有限公司 Camera control method, device, mobile terminal and storage medium
CN109905389A (en) * 2019-02-21 2019-06-18 华勤通讯技术有限公司 Method for controlling mobile terminal, device and computer readable storage medium
CN110476411A (en) * 2017-07-19 2019-11-19 惠普发展公司,有限责任合伙企业 Sensing calculates the position of the removable camera of equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130222609A1 (en) * 2012-02-29 2013-08-29 Aviv Soffer Secure video camera device
CN107547720A (en) * 2016-06-23 2018-01-05 莫力江 Control system built in a kind of mobile phone for disabling mobile phone camera
CN106791011A (en) * 2016-11-29 2017-05-31 维沃移动通信有限公司 The method and mobile terminal of a kind of control recording authority
CN107302626A (en) * 2017-05-23 2017-10-27 成都联宇云安科技有限公司 A kind of management-control method for Android smartphone microphone
CN110476411A (en) * 2017-07-19 2019-11-19 惠普发展公司,有限责任合伙企业 Sensing calculates the position of the removable camera of equipment
CN108549798A (en) * 2018-04-12 2018-09-18 珠海市魅族科技有限公司 Terminal equipment control method and device, terminal device and computer readable storage medium
CN109067964A (en) * 2018-06-12 2018-12-21 Oppo广东移动通信有限公司 Camera control method, device, mobile terminal and storage medium
CN109905389A (en) * 2019-02-21 2019-06-18 华勤通讯技术有限公司 Method for controlling mobile terminal, device and computer readable storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112181529A (en) * 2020-10-12 2021-01-05 Oppo广东移动通信有限公司 Application program control method and device and electronic equipment
CN114547631A (en) * 2020-11-18 2022-05-27 成都鼎桥通信技术有限公司 Terminal control method and device and terminal
CN114547631B (en) * 2020-11-18 2023-03-28 成都鼎桥通信技术有限公司 Terminal control method and device and terminal
CN112887482A (en) * 2021-01-27 2021-06-01 惠州Tcl移动通信有限公司 Method, device and storage medium for protecting user information
WO2022161221A1 (en) * 2021-01-27 2022-08-04 惠州Tcl移动通信有限公司 Method and device for protecting user information, and storage medium

Similar Documents

Publication Publication Date Title
CN110651270B (en) Data access method and device
KR101615571B1 (en) Always-available embedded theft reaction subsystem
RU2595511C2 (en) System and method of trusted applications operation in the presence of suspicious applications
EP3610404B1 (en) Methods and apparatus to monitor permission-controlled hidden sensitive application behavior at run-time
CN111079134A (en) Method and device for controlling authority globally, storage medium and electronic equipment
US20020171546A1 (en) Universal, customizable security system for computers and other devices
US20060161982A1 (en) Intrusion detection system
US10706171B2 (en) Method for providing a secure mode for mobile device applications
Wu et al. Analysis of clickjacking attacks and an effective defense scheme for android devices
EP2795517A1 (en) Always-available embedded theft reaction subsystem
EP2919499B1 (en) Version protection method and apparatus for mobile terminals
CN102722663B (en) Handheld smart device data security protection method
US11475123B2 (en) Temporary removal of software programs to secure mobile device
CN101667232A (en) Terminal credible security system and method based on credible computing
CN111259421A (en) Privacy authority anti-disclosure processing method and device, electronic equipment and storage medium
CN104091119A (en) Mobile terminal as well as protection method and protection system of data in mobile terminal
WO2016115760A1 (en) Terminal system control method, device, and terminal
CN106485170A (en) A kind of data inputting method and device
US8978150B1 (en) Data recovery service with automated identification and response to compromised user credentials
CN113360863A (en) Operation execution method and device, electronic equipment and medium
CN109873747A (en) Electronic device and its unlocking method
CN116821928A (en) Method and system for improving internal data security of power edge computing chip
KR101662944B1 (en) Laptop locking control method
KR102157747B1 (en) An apparatus for generating access and control history of personal video information and method thereof
Kim et al. Linux based unauthorized process control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination