CN111444497B - Application program detection method and device and electronic equipment - Google Patents

Application program detection method and device and electronic equipment Download PDF

Info

Publication number
CN111444497B
CN111444497B CN202010287323.9A CN202010287323A CN111444497B CN 111444497 B CN111444497 B CN 111444497B CN 202010287323 A CN202010287323 A CN 202010287323A CN 111444497 B CN111444497 B CN 111444497B
Authority
CN
China
Prior art keywords
control
application program
application
level
voice data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010287323.9A
Other languages
Chinese (zh)
Other versions
CN111444497A (en
Inventor
颜廷管
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202010287323.9A priority Critical patent/CN111444497B/en
Publication of CN111444497A publication Critical patent/CN111444497A/en
Application granted granted Critical
Publication of CN111444497B publication Critical patent/CN111444497B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application discloses an application program detection method and device and electronic equipment. The method comprises the following steps: when detecting that an application program in a specified state exists, detecting whether the application program belongs to a control application program or not, wherein the control application program comprises an application program which collects user voice data when authorization is not acquired; if the application program belongs to the control application program, determining the control level of the application program; and controlling the application program based on the control level. By detecting the state of the application program, when the application program is in the specified state, whether the application program is a control application program or not can be further determined, so that the application program can be controlled based on the control level, the application program which is maliciously collected with user voice data can be controlled more flexibly, and the probability of user information leakage is reduced.

Description

Application program detection method and device and electronic equipment
Technical Field
The present application relates to the field of terminal technologies, and in particular, to an application detection method, an application detection device, and an electronic device.
Background
In the case where the electronic device is provided with a microphone, the user can use the electronic device for daily audio collection. In addition, as the types of applications installed in electronic devices are increasing, more applications call microphones to perform some functions, which may cause some applications to maliciously call microphones.
Disclosure of Invention
In view of the above problems, the present application proposes an application detection method, an application detection device, and an electronic device, so as to improve the above problems.
In a first aspect, the present application provides an application detection method, the method including: when detecting that an application program in a specified state exists, detecting whether the application program belongs to a control application program or not, wherein the control application program comprises an application program which collects user voice data when authorization is not acquired; if the application program belongs to the control application program, determining the control level of the application program; and controlling the application program based on the control level.
In a second aspect, the present application provides an application detection apparatus, the apparatus comprising: the detection unit is used for detecting whether the application program belongs to a control application program or not when the application program in a specified state is detected, wherein the control application program comprises an application program which collects user voice data when authorization is not acquired; a control mode obtaining unit, configured to determine a control level of the application if the control mode belongs to the control application; and the control unit is used for controlling the application program based on the control level.
In a third aspect, the present application provides an electronic device comprising a processor and a memory; one or more programs are stored in the memory and configured to be executed by the processor to implement the methods described above.
In a fourth aspect, the present application provides a computer readable storage medium having program code stored therein, wherein the program code, when executed by a processor, performs the method described above.
According to the application program detection method, the application program detection device and the electronic equipment, when the application program in the appointed state is detected, whether the application program belongs to a control application program which collects user voice data when authorization is not acquired is detected, if the application program belongs to the control application program, the control level of the application program is determined, and then the application program is controlled based on the control level. By detecting the state of the application program, when the application program is in the specified state, whether the application program is a control application program or not can be further determined, so that the application program can be controlled based on the control level, the application program which is maliciously collected with user voice data can be controlled more flexibly, and the probability of user information leakage is reduced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart illustrating a method for detecting an application according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a prompt message in an embodiment of the present application;
FIG. 3 is a schematic diagram of another hint in an embodiment of the present application;
FIG. 4 is a flowchart of an application detection method according to another embodiment of the present application;
FIG. 5 is a schematic diagram of an interface of a history latest running in the foreground in an embodiment of the present application;
FIG. 6 shows a schematic diagram of an amplitude interval in an embodiment of the present application;
FIG. 7 is a flowchart of an application detection method according to a further embodiment of the present application;
FIG. 8 is a block diagram illustrating an application detection device according to an embodiment of the present application;
FIG. 9 is a block diagram showing an application detection apparatus according to another embodiment of the present application;
FIG. 10 is a block diagram showing an application detection apparatus according to still another embodiment of the present application;
FIG. 11 illustrates a block diagram of another electronic device of the present application for performing an application detection method according to an embodiment of the present application;
fig. 12 shows a storage unit for storing or carrying program codes for implementing the application program detection method according to the embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
In some electronic devices, microphones are among the devices with higher usage. For example, in a smart phone or tablet or smart watch, a microphone may be used to collect the user's voice during a conversation for delivery to the opposite end of the communication. With the increase of the intelligentization degree of the electronic device, more types of application programs are installed in the electronic device, and the application programs also use a microphone or collect voice data of a user in the running process.
For example, for an application program of the instant chat class, a microphone may be invoked to collect voice data of a user to generate a voice short message to send to other users. For example, for applications of the singing class, the voice data of the user may be collected during operation as an audio file entered by the user. For another example, the application program for the image acquisition class may acquire voice data of the user as dubbing content of the image at the same time in the process of image acquisition.
However, after research on related applications that call a microphone, the inventor finds that some applications call the microphone privately to collect voice without the user's knowledge, and thus information leakage of the user is caused.
Therefore, the inventor provides the application program detection method, the application program detection device and the electronic equipment, and when the application program in the specified state is detected, whether the application program belongs to a control application program which collects user voice data when the authorization is not acquired is detected, if so, the control grade of the application program is determined, and then the application program is controlled based on the control grade. By detecting the state of the application program, when the application program is in the specified state, whether the application program is a control application program or not can be further determined, so that the application program can be controlled based on the control level, the application program which is maliciously collected with user voice data can be controlled more flexibly, and the probability of user information leakage is reduced.
Embodiments of the present application will be described in detail below with reference to the accompanying drawings.
Referring to fig. 1, an application program detection method provided in an embodiment of the present application includes:
s110: when an application program in a specified state is detected, whether the application program belongs to a control application program or not is detected, wherein the control application program comprises an application program which collects user voice data when authorization is not acquired.
It should be noted that, in the embodiment of the present application, the state indicates a state before the application program will call the state of the microphone, or a state before the state where the voice data collected by the microphone will be obtained. The former state is understood to be the state that is further forward in the operation sequence. For example, the application may enter state a first, then enter state B after state a, and then state a is the previous state for state B. Furthermore, in order to effectively control an application program which can call a microphone or acquire voice data acquired by the microphone, the running state or the installation state can be configured to be a designated state, and when the running state or the installation state of the application program is detected, the application program is determined to be in the designated state.
The operation state may include a foreground operation or a background operation. It should be noted that, in this embodiment, the application running in the foreground refers to an application with an interface that can interact with a user, for example, when the user uses the instant messaging software to chat, the interface of the instant messaging software may be used to interact with the user to input text information or voice information, and in this case, the instant messaging software is the application running in the foreground. Correspondingly, when the application program does not have an interface which can interact with the user and is still in an operation state, the application program is operated in the background, for example, when the user switches the interface which is currently displayed from the interface of the instant messaging software to the desktop, the instant messaging software is the application program operated in the background.
Alternatively, as a way, according to the mechanism of the Android system, one application may run multiple processes, and all the processes correspond to one process priority, where the process priority may correspond to a state (a foreground running state, a background running state, etc.) where an application program to which the process belongs is currently in the system. When an interface of an application is being displayed, then the priority of the process running the interface is impurtance_foregroup=100. While the Android system allows the application to obtain the priorities of all the processes of the current application itself when running, by using the principle, the electronic device can traverse the priorities of all the processes of the application, and when detecting that a process priority=impurtance_foregroup exists in the processes included in the application, it determines that the application is running in the FOREGROUND.
The installation state may include an installation state when the application is first installed, or may be an installation state when the update file of the application is installed.
When it is detected that an application is in a specified state, it can be further determined whether the application belongs to a management application. In one manner, the electronic device may store a list of applications that belong to the administration application, and in this manner, the electronic device may determine whether an application in a specified state belongs to the administration application by querying the list of applications.
It should be noted that, in the embodiment of the present application, an application that collects user voice data when no authorization is obtained may be understood as an application that automatically invokes a microphone to collect user voice data. Wherein automatically invoking the microphone comprises invoking the microphone in response to an automation event, but the automation event is not configured by the user.
S120: and if the application program belongs to the control application program, determining the control level of the application program.
Alternatively, the level of control of the application may be determined based on the identity of the application in the specified state. In this way, all the control levels corresponding to the control applications can be preconfigured, and then after the control applications in the specified state are obtained, the control levels of the applications in the specified state are determined by querying the preconfigured control levels.
S130: and controlling the application program based on the control level.
It should be noted that, even though the applications belong to the control application, the applications belonging to the control application may correspond to different control levels, so as to perform targeted control, because the actions of calling the microphone or acquiring the voice data collected by the microphone are different. By way of example, some applications may only occasionally have unauthorized access to the microphone, but some applications may access the microphone at a higher frequency, and for those applications that may occasionally have unauthorized access to the microphone, the higher frequency access to the microphone may be better for those applications that may have unauthorized access to the microphone than for those applications that may have unauthorized access to the microphone, since the higher frequency access to the microphone may be better for those applications that may have a greater probability of stealing the user's private information.
As one way, the larger the number corresponding to the control level, the more strict the corresponding control manner. For example, if the control level is the first level, the number corresponding to the control level is 1, if the control level is the first level, the number corresponding to the control level is 2, and if 2 is greater than 1, the control mode corresponding to the second level is more strict than the control mode corresponding to the first level.
In this way, if the control level of the application is the first level, a prompt message about the application may be triggered. In this way, when the electronic device executing the method provided by the embodiment detects that the application program in the specified state belongs to the control application program and the corresponding control level is the first level, the prompting information shown in fig. 2 is triggered, so as to prompt the user that the application program in the specified state has the possibility of collecting the voice data of the user in a private manner. As shown in fig. 2, the electronic device may display a pop-up box 99 to display a prompt for "application a is using your microphone". Optionally, the electronic device may further configure an option control in the displayed alert information, so that the user selects whether to ignore the behavior of application a or to block the behavior of application a. As shown in fig. 3, if the user is detected to touch the control with the name "ignore", the electronic device does not take any measure to the application program, and if the user is detected to touch the control with the name "block", the electronic device kills the process of the application program a.
And if the control level of the application program is the second level, prohibiting the application program from acquiring the user voice data. It should be noted that, there may be various ways to collect the user voice data for an application program that does not obtain the authorization and collects the user voice data. Alternatively, the microphone may be invoked directly to collect the user's voice data in real time, or alternatively, a folder storing the user's voice data may be looked up directly in the electronic device, and then the folder is accessed privately to obtain the user's voice data. Correspondingly, prohibiting the application from acquiring the user voice data may include prohibiting the application from invoking the microphone and prohibiting the application from accessing a folder for storing the voice data acquired by the microphone.
According to the application program detection method, when the application program in the specified state is detected, whether the application program belongs to the control application program which is not authorized and collects the user voice data is detected, if so, the control level of the application program is determined, and then the application program is controlled based on the control level. By detecting the state of the application program, when the application program is in the specified state, whether the application program is a control application program or not can be further determined, so that the application program can be controlled based on the control level, the application program which is maliciously collected with user voice data can be controlled more flexibly, and the probability of user information leakage is reduced.
Referring to fig. 4, an application program detection method provided in an embodiment of the present application includes:
s210: when an application program in a specified state is detected, whether the application program belongs to a control application program or not is detected, wherein the control application program comprises an application program which collects user voice data when authorization is not acquired.
S220: and if the user voice data acquisition behavior belongs to the control application program, acquiring a first control strategy acquired from a server in advance, wherein the first control strategy is generated by the server based on feedback of the user voice data acquisition behavior of the application program.
In one mode, the electronic device may detect an application program that does not acquire authorization and collects voice data of the user, and further feed back a detection result to the server, so that the server may generate the first control policy after receiving the application program that does not acquire authorization and collects voice data of the user and is fed back by the plurality of electronic devices. Optionally, the first management and control policy includes a management and control application program and a management and control level corresponding to each management and control application program.
The electronic device may determine whether the application program has an unauthorized act of collecting user voice data in a number of ways.
In one mode, the electronic device may trigger a prompt when detecting that an application is calling the microphone, and if detecting that the user does not feed back the prompt, determine that the application has a behavior of acquiring voice data of the user without obtaining authorization. The form of the prompt information includes, but is not limited to, triggering a pop-up box to prompt and prompting through a short message.
Alternatively, the electronic device may determine whether the application has unauthorized activity to collect user voice data by detecting whether the activity of the calling microphone is triggered by the user. The inventor researches that if the action of calling the microphone is triggered by the user, an operation interface is usually displayed first, and then the user can trigger the application program to call the action of the microphone by operating on the operation interface. For example, for an application program of the recording class, an operation interface including a recording start control is displayed after the application program is started, and when the user is detected to touch the recording start control, the electronic device is triggered to call a microphone to collect voice data of the user. For another example, for applications of the talk class, after detecting that the user has completed dialing and triggering the talk control, the electronic device may begin to invoke the microphone to collect user voice data.
In this way, the electronic device may store the operation interface provided with the control for triggering the invoking microphone so as to detect whether the operation interface provided with the control for triggering the invoking microphone is running in the foreground when the microphone is invoked or whether the operation interface provided with the control for triggering the invoking microphone belongs to an interface in which the history is running in the foreground when the microphone is invoked (an interface in which the history is running in the foreground will be described later).
If the operation interface provided with the control for triggering the calling microphone is detected to be in the foreground operation when the microphone is called, the action of calling the microphone by the application program is judged to be triggered by a user, otherwise, the action of calling the microphone by the application program is judged to be performed without obtaining authorization.
If the operation interface provided with the control for triggering the calling microphone is detected to belong to the interface which runs in the foreground with the latest history when the microphone is called, the action of calling the microphone by the application program is judged to be triggered by a user, otherwise, the action of calling the microphone by the application program is judged to be performed without obtaining authorization.
The interface shown above where the history is newly run in the foreground will be described below by way of example.
As one way, each interface in the electronic device is configured with an interface name and an application identifier to which it belongs. In this way, the electronic device may store the running interfaces sequentially according to the running order, and the running time corresponding to the interface that is further back in the running order is closer to the current time, so that the interface whose corresponding running time is closest to the current time is determined as the interface that is running in the foreground with the latest history. As shown in fig. 5, fig. 5 shows an interface 10, an interface 11, an interface 12, an interface 13, an interface 14, and an interface 15, where the operation time (may be understood as a start time) corresponding to the interface 10 is T6, the operation time (may be understood as a start time) corresponding to the interface 11 is T5, the operation time (may be understood as a start time) corresponding to the interface 12 is T4, the operation time (may be understood as a start time) corresponding to the interface 13 is T3, the operation time (may be understood as a start time) corresponding to the interface 14 is T2, and the operation time (may be understood as a start time) corresponding to the interface 15 is T1. In addition, as can be seen from fig. 5, the interface with the corresponding running time closest to the current time is the interface 10, and thus, it can be determined that the interface 10 is the interface that has been running in the foreground most recently.
The interface nearest to the current moment can be determined by a time difference mode. Specifically, the running time corresponding to each interface is differenced from the current time to obtain a time difference value between the running time of each interface and the current time, and then the interface with the smallest corresponding time difference value is used as the interface with the closest running time to the current time.
S230: and determining a control level of the application program based on the first control strategy.
S240: and controlling the application program based on the control level.
As shown in the foregoing, after the server generates the first management policy according to the received application program that is fed back by the plurality of electronic devices and that is not authorized to collect the voice data of the user, the electronic device executing the embodiment of the present application may also send, when detecting that the application program that is not authorized to collect the voice data of the user exists, the application program that is not authorized to collect the voice data of the user to the server, so that the server generates the first management policy.
The server also screens and cleans data uploaded by the plurality of electronic devices in the process of generating the management and control strategy, so as to determine which application programs are determined to be management and control application programs.
As one way, the server may determine whether to determine the application as a policing application for the number of times that there is a behavioral application that invokes a microphone to obtain user voice data without obtaining authorization. It should be noted that, if some applications may trigger the call to the microphone only accidentally or call to the microphone due to a running error, the server may not count too many times, although there is a behavior of calling the microphone without obtaining authorization for these applications, which may be caused by the running error only accidentally. For example, for the same application, there may be only a single electronic device reporting that there is an unauthorized action to call the microphone, but most electronic devices that also install the application will not report that there is an unauthorized action to call the microphone, so in order to improve the accuracy of application control, such applications will not be determined to be control applications.
In this way, the server may count the total fed back times corresponding to the application program that is reported to have the unauthorized microphone behavior, and then determine the application program whose corresponding feedback times are greater than the threshold times as the management application program.
Optionally, the server may further determine a control level corresponding to the application program according to the magnitude of the corresponding feedback times exceeding the threshold times. As a way, the server may configure a plurality of amplitude intervals corresponding to the threshold number of times, where each amplitude interval corresponds to a control level, and when the obtained feedback number of times corresponding to the application program is greater than the threshold number of times, match the difference between the feedback number of times and the threshold number of times with the plurality of amplitude intervals, so as to determine the control level corresponding to the matched amplitude interval as the control level of the application program.
Illustratively, as shown in fig. 6, N represents the number of feedback times. Optionally, N1 corresponds to a threshold number of times. N1 to N2 are one amplitude interval, N2 to N3 are one amplitude interval, and N3 to N4 are one amplitude interval. If the difference between the feedback times corresponding to the application program and the threshold times is detected to be greater than N2 but less than N3, determining that the amplitude interval from N2 to N3 is the matched amplitude interval, and further determining the control level corresponding to the amplitude interval from N2 to N3 as the control level of the application program.
Alternatively, the server may determine whether to determine the application as a policing application for the frequency with which a behavioural application that invokes a microphone to obtain user speech data is fed back for the presence of an unauthorized acquisition. It should be noted that, there may be no behavior of calling the microphone without obtaining authorization before some application program, but there is a behavior of calling the microphone without obtaining authorization after updating to a certain version, in this case, if it is still determined whether to determine the application program as the control application program through the total feedback times, the application program that suddenly has a behavior of calling the microphone without obtaining authorization to obtain the user voice data may not be controlled immediately.
In this manner, the server may determine to be a frequency threshold, and then determine as a policing application, the application for which the corresponding feedback frequency is greater than the frequency threshold. The frequency threshold may be a frequency of feedback per hour greater than a predetermined threshold, a frequency of feedback per day greater than a predetermined threshold, or a frequency of feedback per week greater than a predetermined threshold. Similarly, the server may also determine the corresponding control level of the application program, in particular, based on the corresponding feedback frequency exceeding the threshold frequency magnitude. As a way, the server may configure a plurality of amplitude intervals corresponding to the threshold frequency, where each amplitude interval corresponds to a control level, and when the feedback frequency corresponding to the application program is obtained to be greater than the threshold frequency, match the difference between the feedback frequency and the threshold frequency with the plurality of amplitude intervals, so that the control level corresponding to the matched amplitude interval is determined as the control level of the application program.
According to the application program detection method, when the application program in the specified state is detected, whether the application program belongs to the control application program which collects user voice data when authorization is not obtained is detected, if the application program belongs to the control application program, a first control strategy which is obtained in advance from a server is obtained, so that the control grade of the application program is determined based on the first control strategy, and further the application program is controlled based on the control grade. By detecting the state of the application program, when the application program is in the specified state, whether the application program is a control application program or not can be further determined, so that the application program can be controlled based on the control level, the application program which is maliciously collected with user voice data can be controlled more flexibly, and the probability of user information leakage is reduced.
Referring to fig. 7, an application program detection method provided in an embodiment of the present application includes:
s310: when an application program in a specified state is detected, whether the application program belongs to a control application program or not is detected, wherein the control application program comprises an application program which collects user voice data when authorization is not acquired.
S320: and if the user voice data acquisition behavior belongs to the control application program, acquiring a first control strategy acquired from a server in advance, wherein the first control strategy is generated by the server based on feedback of the user voice data acquisition behavior of the application program.
S330: and acquiring a local second management and control strategy.
It should be noted that, in this embodiment, the second management policy may be directly generated according to an application program that is locally detected and that collects user voice data when no authorization is obtained, or may be generated according to the first management policy obtained from the server. Optionally, for the same application, the level of policing in the second policing policy is lower than the level of policing in the first policing policy. For example, the first management policy includes an application a, an application B, and an application C. The control level corresponding to the application program A is a first level, and the control level corresponding to the application program B and the application program C is a second level. In this case, if the second control policy is generated based on the first control policy, optionally, the application a does not need to perform control, and the control levels corresponding to the application B and the application C are the first level.
S340: and determining the control level of the application program based on the first control strategy and the second control strategy.
As one way, the determining the control level of the application program based on the first control policy and the second control policy includes: determining a control priority of the first control strategy and the second control strategy; if the control priority corresponding to the first control strategy is higher than the control priority of the second control strategy, determining the control level of the application program based on the first control strategy; and if the control priority corresponding to the second control strategy is higher than the control priority of the first control strategy, determining the control level of the application program based on the second control strategy.
Wherein, optionally, the determining the control priority of the first control policy and the second control policy includes: acquiring a current system mode; if the system mode is a visitor mode, determining that the control priority of the second control strategy is higher than that of the first control strategy; and if the system mode is a master mode, determining that the control priority of the first control strategy is higher than that of the second control strategy.
It should be noted that the user of the electronic device may also configure to control other users using the electronic device. For example, the user of the electronic device is a parent, and the child using the electronic device is expected to be managed, in this case, the electronic device may select a specific management and control policy according to the current actual running state, so as to implement more flexible application management and control.
S350: and controlling the application program based on the control level.
According to the application program detection method, when the application program in the specified state is detected, whether the application program belongs to the control application program which collects user voice data when authorization is not obtained is detected, if the application program belongs to the control application program, a first control strategy which is obtained in advance from a server is obtained, so that the control grade of the application program is determined based on the first control strategy, and further the application program is controlled based on the control grade. By detecting the state of the application program, when the application program is in the specified state, whether the application program is a control application program or not can be further determined, so that the application program can be controlled based on the control level, the application program which is maliciously collected with user voice data can be controlled more flexibly, and the probability of user information leakage is reduced.
In addition, in this embodiment, a locally stored second management and control policy is also obtained, so that it can be determined according to the priorities of the first management and control policy and the second management and control policy, and finally, according to which management and control policy, application program management and control is performed, so that flexibility, intelligence and suitability in the application program management and control process are improved.
Referring to fig. 8, an application detection apparatus 400 provided in an embodiment of the present application, the apparatus 400 includes:
the detecting unit 410 is configured to detect, when an application in a specified state is detected, whether the application belongs to a control application, where the control application includes an application that collects user voice data when authorization is not acquired.
Optionally, the detecting unit 410 is specifically configured to determine that the application is in the specified state when detecting that the application is in the running state or in the installation state.
And the control mode obtaining unit 420 is configured to determine a control level of the application if the application belongs to the control application.
As a way, the control mode obtaining unit 420 is specifically configured to obtain, if the first control policy belongs to the control application program, a first control policy obtained in advance from a server, where the first control policy is generated by the server based on feedback of a user voice data collection behavior of the application program; and determining a control level of the application program based on the first control strategy.
Alternatively, as shown in fig. 9, the apparatus further includes: the local policy obtaining unit 440 is configured to obtain a local second management policy. In this manner, the control mode obtaining unit 420 is specifically configured to determine a control level of the application program based on the first control policy and the second control policy.
Optionally, the control mode obtaining unit 420 is specifically configured to determine a control priority of the first control policy and the second control policy; if the control priority corresponding to the first control strategy is higher than the control priority of the second control strategy, determining the control level of the application program based on the first control strategy; and if the control priority corresponding to the second control strategy is higher than the control priority of the first control strategy, determining the control level of the application program based on the second control strategy.
Optionally, the control mode obtaining unit 420 is specifically configured to obtain a current system mode; if the system mode is a visitor mode, determining that the control priority of the second control strategy is higher than that of the first control strategy; and if the system mode is a master mode, determining that the control priority of the first control strategy is higher than that of the second control strategy.
And the control unit 430 is configured to control the application program based on the control level.
As one way, the control unit 430 is specifically configured to trigger a prompt message about the application program if the control level of the application program is a first level; and if the control level of the application program is the second level, prohibiting the application program from acquiring the user voice data.
As one way, as shown in fig. 10, the apparatus 400 further includes: the data uploading unit 450 is configured to send, if it is detected that there is an application program that acquires user voice data when authorization is not acquired, the application program that acquires user voice data when authorization is not acquired to a server, so that the server generates the first management and control policy.
According to the application program detection device, when the application program in the specified state is detected, whether the application program belongs to the control application program which is not authorized and collects the user voice data is detected, if so, the control grade of the application program is determined, and then the application program is controlled based on the control grade. By detecting the state of the application program, when the application program is in the specified state, whether the application program is a control application program or not can be further determined, so that the application program can be controlled based on the control level, the application program which is maliciously collected with user voice data can be controlled more flexibly, and the probability of user information leakage is reduced.
It should be noted that, in the present application, the device embodiment and the foregoing method embodiment correspond to each other, and specific principles in the device embodiment may refer to the content in the foregoing method embodiment, which is not described herein again.
An electronic device provided in the present application will be described with reference to fig. 11.
Referring to fig. 11, based on the above application detection method, another electronic device 200 including a processor 102 that can execute the above application detection method is further provided in the embodiments of the present application. The electronic device 200 further comprises a screen 103, a memory 104, an image acquisition device 105, and a network module 106. The memory 104 stores therein a program capable of executing the contents of the foregoing embodiments, and the processor 102 can execute the program stored in the memory 104.
Wherein the processor 102 utilizes various interfaces and lines to connect various portions of the overall electronic device 200, perform various functions of the electronic device 200 and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 104, and invoking data stored in the memory 104. Alternatively, the processor 102 may be implemented in hardware in at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA). The processor 102 may integrate one or a combination of several of a central processing unit (Central Processing Unit, CPU), an image processor (Graphics Processing Unit, GPU), and a modem, etc. The CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for being responsible for rendering and drawing of display content; the modem is used to handle wireless communications. It will be appreciated that the modem may not be integrated into the processor 102 and may be implemented solely by a single communication chip.
The screen 103 may be used to display the aforementioned picture to be identified and the final content identification result obtained by performing content identification. For example, the pictures shown in fig. 11 may be displayed at the same time, and the recognized recognition result "perhaps accumulated in cobra" may be displayed in a floating manner on the displayed pictures shown in fig. 11.
The Memory 104 may include random access Memory (Random Access Memory, RAM) or Read-Only Memory (RAM). Memory 104 may be used to store instructions, programs, code sets, or instruction sets. The memory 104 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (e.g., a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described below, etc. The storage data area may also store data created by the terminal 100 in use (such as phonebook, audio-video data, chat-record data), etc.
The image capture device 105 may be used to perform the capture of pictures as well as video.
The network module 106 is configured to receive and transmit electromagnetic waves, and to implement mutual conversion between the electromagnetic waves and the electrical signals, so as to communicate with a communication network or other devices, such as an audio playing device. The network module 106 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and the like. The network module 106 may communicate with various networks such as the Internet, intranets, wireless networks, or other devices via wireless networks. The wireless network may include a cellular telephone network, a wireless local area network, or a metropolitan area network. For example, the network module 106 may interact with base stations.
Referring to fig. 12, a block diagram of a computer readable storage medium according to an embodiment of the present application is shown. The computer readable medium 1100 has stored therein program code that can be invoked by a processor to perform the methods described in the method embodiments above.
The computer readable storage medium 1100 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Optionally, computer readable storage medium 1100 includes non-volatile computer readable medium (non-transitory computer-readable storage medium). The computer readable storage medium 1100 has storage space for program code 810 that performs any of the method steps described above. The program code can be read from or written to one or more computer program products. Program code 1110 may be compressed, for example, in a suitable form.
In summary, according to the application program detection method, device and electronic equipment provided by the application program detection method, device and electronic equipment, when an application program in a specified state is detected, whether the application program belongs to a control application program which collects user voice data when authorization is not acquired is detected, if the application program belongs to the control application program, a control level of the application program is determined, and then the application program is controlled based on the control level. By detecting the state of the application program, when the application program is in the specified state, whether the application program is a control application program or not can be further determined, so that the application program can be controlled based on the control level, the application program which is maliciously collected with user voice data can be controlled more flexibly, and the probability of user information leakage is reduced.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting thereof; although the present application has been described in detail with reference to the foregoing embodiments, one of ordinary skill in the art will appreciate that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not drive the essence of the corresponding technical solutions to depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (11)

1. An application detection method, the method comprising:
when an application program in a specified state is detected, detecting whether the application program belongs to a control application program or not, wherein the control application program comprises an application program with the number of times of acquiring user voice data being larger than a threshold number of times when no authorization is acquired, and the behavior of acquiring the user voice data when no authorization is acquired is determined according to the fact that whether the behavior of triggering and calling a microphone by a user on an operation interface is detected, wherein the operation interface is an interface provided with a control for triggering and calling the microphone;
if the application program belongs to the control application program, determining the control level of the application program;
And controlling the application program based on the control level.
2. The method according to claim 1, wherein the method further comprises:
and when detecting that the application program is in the running state or in the installation state, determining that the application program is in the specified state.
3. The method of claim 1, wherein the determining the control level of the application if the application belongs to the control application comprises:
if the user voice data acquisition behavior belongs to the control application program, acquiring a first control strategy acquired from a server in advance, wherein the first control strategy is generated by the server based on feedback of the user voice data acquisition behavior of the application program;
and determining a control level of the application program based on the first control strategy.
4. The method of claim 3, wherein prior to determining the level of control of the application based on the first control policy further comprises:
acquiring a local second management and control strategy;
the determining the control level of the application program based on the first control policy includes:
and determining the control level of the application program based on the first control strategy and the second control strategy.
5. The method of claim 4, wherein the determining the level of control of the application based on the first control policy and the second control policy comprises:
determining a control priority of the first control strategy and the second control strategy;
if the control priority corresponding to the first control strategy is higher than the control priority of the second control strategy, determining the control level of the application program based on the first control strategy;
and if the control priority corresponding to the second control strategy is higher than the control priority of the first control strategy, determining the control level of the application program based on the second control strategy.
6. The method of claim 5, wherein the determining the policing priority of the first policing policy and the second policing policy comprises:
acquiring a current system mode;
if the system mode is a visitor mode, determining that the control priority of the second control strategy is higher than that of the first control strategy;
and if the system mode is a master mode, determining that the control priority of the first control strategy is higher than that of the second control strategy.
7. A method according to claim 3, characterized in that the method further comprises:
if the application program which collects the user voice data when the authorization is not obtained is detected to exist, the application program which collects the user voice data when the authorization is not obtained is sent to a server, and the server is used for generating the first management and control strategy.
8. The method of any of claims 1-7, wherein the controlling the application based on the control level comprises:
triggering prompt information about the application program if the control level of the application program is a first level;
and if the control level of the application program is the second level, prohibiting the application program from acquiring the user voice data.
9. An application detection apparatus, the apparatus comprising:
the system comprises a detection unit, a control unit and a control unit, wherein the detection unit is used for detecting whether an application program in a specified state belongs to the control application program or not when the application program is detected, the control application program comprises an application program which is used for acquiring user voice data for times greater than a threshold number of times when authorization is not acquired, the behavior of acquiring the user voice data when the authorization is not acquired is determined according to the fact that whether the behavior of triggering and calling a microphone by a user on an operation interface exists or not is detected, and the operation interface is an interface provided with a control used for triggering and calling the microphone;
A control mode obtaining unit, configured to determine a control level of the application if the control mode belongs to the control application;
and the control unit is used for controlling the application program based on the control level.
10. An electronic device comprising a processor and a memory; one or more programs are stored in the memory and configured to be executed by the processor to implement the method of any of claims 1-8.
11. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a program code, wherein the program code, when being executed by a processor, performs the method of any of claims 1-8.
CN202010287323.9A 2020-04-13 2020-04-13 Application program detection method and device and electronic equipment Active CN111444497B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010287323.9A CN111444497B (en) 2020-04-13 2020-04-13 Application program detection method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010287323.9A CN111444497B (en) 2020-04-13 2020-04-13 Application program detection method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN111444497A CN111444497A (en) 2020-07-24
CN111444497B true CN111444497B (en) 2024-03-08

Family

ID=71654065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010287323.9A Active CN111444497B (en) 2020-04-13 2020-04-13 Application program detection method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111444497B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108712561A (en) * 2018-04-18 2018-10-26 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN108984234A (en) * 2018-08-01 2018-12-11 上海碳蓝网络科技有限公司 A kind of calling reminding method of mobile terminal and photographic device
CN109388963A (en) * 2017-08-08 2019-02-26 武汉安天信息技术有限责任公司 A kind of mobile terminal user's private data means of defence and device
CN109492391A (en) * 2018-11-05 2019-03-19 腾讯科技(深圳)有限公司 A kind of defence method of application program, device and readable medium
CN109543411A (en) * 2018-11-29 2019-03-29 北京元心科技有限公司 Method for monitoring application program, device, electronic equipment and readable storage medium storing program for executing
CN109918898A (en) * 2019-03-14 2019-06-21 上海龙旗科技股份有限公司 Method for secret protection and equipment
CN109918909A (en) * 2019-02-25 2019-06-21 上海传英信息技术有限公司 User's smart machine and its privacy of user guard method based on operation exception

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109388963A (en) * 2017-08-08 2019-02-26 武汉安天信息技术有限责任公司 A kind of mobile terminal user's private data means of defence and device
CN108712561A (en) * 2018-04-18 2018-10-26 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN108984234A (en) * 2018-08-01 2018-12-11 上海碳蓝网络科技有限公司 A kind of calling reminding method of mobile terminal and photographic device
CN109492391A (en) * 2018-11-05 2019-03-19 腾讯科技(深圳)有限公司 A kind of defence method of application program, device and readable medium
CN109543411A (en) * 2018-11-29 2019-03-29 北京元心科技有限公司 Method for monitoring application program, device, electronic equipment and readable storage medium storing program for executing
CN109918909A (en) * 2019-02-25 2019-06-21 上海传英信息技术有限公司 User's smart machine and its privacy of user guard method based on operation exception
CN109918898A (en) * 2019-03-14 2019-06-21 上海龙旗科技股份有限公司 Method for secret protection and equipment

Also Published As

Publication number Publication date
CN111444497A (en) 2020-07-24

Similar Documents

Publication Publication Date Title
CN105843615B (en) Notification message processing method and device
CN105653323B (en) Application management method and device
CN107748685B (en) Application program starting control method and device, terminal equipment and storage medium
CN105224349B (en) Application program deletion prompting method and device
CN107370772B (en) account login method and device and computer readable storage medium
CN107864297B (en) Group adding method, device, terminal and storage medium
CN101103617A (en) Method and device for inhibiting interruption of a running application by an event
CN104992096A (en) Data protection method and mobile terminal
CN106686557A (en) Broadcast processing method and device and terminal device
CN107943269B (en) Scheduling job control method, device, terminal equipment and storage medium
KR102322542B1 (en) Notification reminder method, terminal and storage medium
EP3486823B1 (en) System notification service control method, apparatus, terminal device, and storage medium
CN111246451A (en) Function setting method and device of SIM card, storage medium and terminal
CN103198252B (en) Device and method for the control information for managing the application program in portable terminal
CN110928600A (en) Cleaning method and device for terminal background application, mobile terminal and electronic equipment
CN111444497B (en) Application program detection method and device and electronic equipment
CN112040057B (en) Device control method, device, electronic device, control system and storage medium
CN105512050B (en) EMS memory management process and device
CN113934331A (en) Information processing method, device and storage medium
CN109040937B (en) Microphone blockage reminding method and related device
CN112989323B (en) Process detection method, device, terminal and storage medium
CN114124866A (en) Session processing method, device, electronic equipment and storage medium
CN114303130A (en) Process priority control method and device, electronic equipment and storage medium
CN103959207A (en) Information processing apparatus, control method and computer-readable recording medium
CN107391128B (en) Method and device for monitoring virtual file object model vdom

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant