CN112270015A - Data protection method and device, electronic equipment and readable storage medium - Google Patents
Data protection method and device, electronic equipment and readable storage medium Download PDFInfo
- Publication number
- CN112270015A CN112270015A CN202011166954.1A CN202011166954A CN112270015A CN 112270015 A CN112270015 A CN 112270015A CN 202011166954 A CN202011166954 A CN 202011166954A CN 112270015 A CN112270015 A CN 112270015A
- Authority
- CN
- China
- Prior art keywords
- application
- electronic device
- information
- service provider
- electronic equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 238000004891 communication Methods 0.000 claims abstract description 29
- 230000005540 biological transmission Effects 0.000 claims description 17
- 230000004044 response Effects 0.000 claims description 7
- 230000008569 process Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 101100055496 Arabidopsis thaliana APP2 gene Proteins 0.000 description 6
- 101100016250 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) GYL1 gene Proteins 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 230000000694 effects Effects 0.000 description 3
- 101150053844 APP1 gene Proteins 0.000 description 2
- 101100189105 Homo sapiens PABPC4 gene Proteins 0.000 description 2
- 102100039424 Polyadenylate-binding protein 4 Human genes 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000005096 rolling process Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The application discloses a data protection method and device, electronic equipment and a readable storage medium, belongs to the technical field of communication, and can solve the problem that sensitive data are easy to leak when communication connection is carried out between the electronic equipment. The method comprises the following steps: under the condition of communication connection between first electronic equipment and second electronic equipment, acquiring service provider information corresponding to each first application in N first applications installed in the first electronic equipment; under the condition that the service provider information of the second application is not matched with the service provider information of the second electronic equipment, displaying risk prompt information of the second application; the risk prompt information is used for prompting the user that the sensitive information in the second application has information leakage risk; the second application is at least one of the N first applications, and N is a positive integer. The embodiment of the application is applied to a scene of communication connection between two electronic devices.
Description
Technical Field
The embodiment of the application relates to the technical field of communication, and in particular relates to a data protection method and device, an electronic device and a readable storage medium.
Background
Because intelligent wearing equipment's size is little, handsome in appearance, function are abundant, more and more users begin to use intelligent wearing equipment, for example intelligent wrist-watch, intelligent bracelet etc.. The intelligent wearable device can realize data intercommunication with electronic equipment such as a mobile phone, a tablet or a computer through a Bluetooth protocol, and data (such as short messages) on the electronic equipment can be displayed on the intelligent wearable device, so that the life convenience is greatly improved.
However, since the electronic device may be in data communication with the wearable device, sensitive data (e.g., user personal privacy data, enterprise internal privacy data, etc.) on the electronic device may be leaked, causing loss to the user.
Disclosure of Invention
An object of the embodiments of the present application is to provide a data protection method, an apparatus, an electronic device, and a readable storage medium, which can solve the problem that sensitive data is easily leaked during communication connection between electronic devices.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a data protection method, where the method includes: under the condition of communication connection between first electronic equipment and second electronic equipment, acquiring service provider information corresponding to each first application in N first applications installed in the first electronic equipment; under the condition that the service provider information of the second application is not matched with the service provider information of the second electronic equipment, displaying risk prompt information of the second application; the risk prompt information is used for prompting the user that the sensitive information in the second application has information leakage risk; the second application is at least one of the N first applications, and N is a positive integer.
In a second aspect, an embodiment of the present application further provides a data protection device, where the device includes: the device comprises an acquisition module and a display module; the acquisition module is used for acquiring service provider information corresponding to each first application in N first applications installed in the first electronic equipment under the condition of communication connection between the first electronic equipment and the second electronic equipment; the display module is used for displaying risk prompt information of the second application under the condition that the service provider information of the second application is not matched with the service provider information of the second electronic equipment acquired by the acquisition module; the risk prompt information is used for prompting the user that the sensitive information in the second application has information leakage risk; the second application is at least one of the N first applications, and N is a positive integer.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, and a program or instructions stored on the memory and executable on the processor, where the program or instructions, when executed by the processor, implement the steps of the data protection method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In this embodiment of the application, under the condition of communication connection between first electronic equipment and second electronic equipment, service provider information corresponding to each of N first applications installed in the first electronic equipment is acquired and is respectively compared with service provider information of the second electronic equipment, and under the condition that the service provider information of the second application is not matched with the service provider information of the second electronic equipment, the second application is determined to be an application with a risk of leaking sensitive information, and then risk prompt information of the second application is displayed, so that a user can avoid leaking sensitive information contained in the second application to other electronic equipment through setting or other operations.
Drawings
Fig. 1 is a schematic diagram of data intercommunication between two electronic devices according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a data protection method according to an embodiment of the present application;
fig. 3 is one of schematic diagrams of an interface applied by a data protection method according to an embodiment of the present application;
fig. 4 is a second schematic diagram of an interface applied by a data protection method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a data protection apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
fig. 7 is a second schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The data protection method provided by the embodiment of the application can be applied to a scene of communication connection between two electronic devices.
Exemplarily, to the scene that user's bracelet and cell-phone pass through bluetooth and establish communication connection, because advantages such as wearable equipment light in weight, small, convenient to carry such as bracelet, the user looks over information such as motion time, step count, consumption heat through the bracelet usually when the motion. In the correlation technique, for the convenience of the user receiving information such as mobile phone incoming call reminding, short message, APP message through the bracelet, the bracelet can establish communication connection with the mobile phone, so that the mobile phone sends the information to the bracelet after receiving the information, and then the user can obtain the information content in time, and the user can control the APP message that the bracelet can receive through setting. However, for some sensitive information related to user privacy, there may be a possibility for the bracelet to divulge user privacy. For example, as shown in fig. 1, a schematic diagram of receiving a mobile phone short message and displaying the content of the short message is shown for a bracelet. When the mobile phone receives the bank short message, the mobile phone sends the short message content to the bracelet and displays the short message content on the bracelet due to the setting of the user, and in the process, the bracelet stores the short message content, and if the user bracelet is lost or the short message content is collected by a service provider of the bracelet, sensitive information can be leaked.
In view of the above problem, in the technical solution provided in the embodiment of the present application, when a communication connection is established between a mobile phone and a bracelet, by comparing facilitator information of an application installed in the mobile phone with facilitator information of the bracelet, when the facilitator information of the application is not matched with the facilitator information of the bracelet, the application is determined as an application with a risk of leaking sensitive information, and the application is graded according to the type of the application or the number of pieces of sensitive information included in the application, and then risk prompt information of the application is displayed. After seeing the risk prompt message, the user can prohibit the mobile phone from sending the information related to the application to the bracelet in the setting interface, and the mobile phone can also automatically prevent the sending of the information when detecting that the information related to the application is sent to the bracelet, or remind the user to manually interrupt data transmission so as to protect sensitive information from being leaked.
The data protection method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
As shown in fig. 2, a data protection method provided in an embodiment of the present application may include the following steps 201 and 202:
For example, the first electronic device may be an electronic device such as a mobile phone or a tablet, and the second electronic device may be a wearable electronic device such as a bracelet or a watch.
Each application installed in the first electronic device illustratively has a corresponding facilitator, the facilitator provides a vendor for the application, the user-related information collected, generated by the application is stored in a server of the facilitator, or the facilitator commissions servers hosted by other operators.
For example, the first electronic device may acquire the service provider information of each first application when establishing a connection with the second electronic device, and further, in order to avoid sensitive information leakage caused by a long time spent on acquiring the information, the first electronic device may perform an acquisition operation when being idle, and store the service provider information of each first application in the first electronic device. Therefore, when the first electronic device is connected with the second electronic device, the service provider information is directly used, and the first electronic device does not need to wait for executing the obtaining operation.
The risk prompt information is used for prompting a user that the sensitive information in the second application has an information leakage risk; the second application is at least one of the N first applications, N being a positive integer.
Illustratively, the sensitive information in the second application may be understood as sensitive information related to the second application. The sensitive information related to the second application stored in the first electronic device may be, or the sensitive information related to the second application received by the first electronic device may be.
For example, the first electronic device may obtain service provider information of the second electronic device when the second electronic device establishes a connection with the first electronic device, where the service provider provides a service for the second electronic device, including providing services such as software upgrade and hardware repair for the second electronic device. The information acquired or collected by the second electronic device is stored in a server of the facilitator.
For example, the first electronic device may determine the service provider information of the second electronic device by a device name or a device model of the second electronic device, and may query the service provider information of the second electronic device by an International Mobile Equipment Identity (IMEI) of the second electronic device.
Exemplarily, after the first electronic device acquires the service provider information of the second electronic device, the service provider information of the second electronic device is matched with the service provider information of the N first applications acquired in step 201, and if the matching is successful, it indicates that the first application and the second electronic device belong to the same service provider, at this time, the server of the service provider may store the sensitive information in the first application, and even if the first electronic device sends the sensitive information to the second electronic device, the privacy of the user is not leaked. If the matching is not successful, it indicates that the facilitator of the first application (i.e., the second application) is different from the facilitator of the second electronic device, and if the first electronic device sends the sensitive information in the first application to the second electronic device, the facilitator of the second electronic device may acquire the sensitive information, which may further cause leakage of the sensitive information. Therefore, the second application is an application in which the service provider information does not match with the service provider information of the second electronic device among the N first applications.
Further, the second application is an application containing sensitive information, the sensitive information is a secret that the user does not want to disclose or know to others (people outside a certain range) in life, and the secret is irrelevant to other people and social benefits. The sensitive information may also include: a business secret. The user may be an individual user or an enterprise user.
For example, the service provider information of the second application is matched with the service provider information of the second electronic device, and it can be understood that the service provider of the second application is associated with the service provider of the second electronic device. The association relationship may include: corporate stakeholders, physical controllers, directors, supervisors, relationships between a high-level manager and the enterprise it controls directly or indirectly, and other relationships that may result in a transfer of interest to the corporation.
Illustratively, after the first electronic device determines the second application, risk prompt information is displayed in the first interface, and the risk prompt information is used for prompting the user about the possible risk of the second application and the risk degree. The risk hint information may include an application icon for the second application.
For example, as shown in fig. 3, a schematic diagram of displaying risk notification information on a mobile terminal (i.e., the first electronic device) includes a risk notification interface 30 (i.e., the first interface), where the interface 30 includes two applications APP1 and APP2 that risk privacy disclosure, APP1 (shopping application) and APP2 (social application) that include sensitive information, and the facilitator of the two APPs is different from the facilitator of the bracelet of the XX vendor (i.e., the second electronic device), so that the mobile terminal determines the risk of privacy disclosure that the APPs may have according to the type of the APPs and displays the risk in the interface 30 to prompt a user. After the user knows the risk, can cancel the bracelet and receive the message warning of above-mentioned two APPs in setting up the interface.
Therefore, under the condition of communication connection between the first electronic device and the second electronic device, the service provider information corresponding to each first application in the N first applications installed in the first electronic device is acquired and is respectively compared with the service provider information of the second electronic device, the second application is determined to be the application with the risk of sensitive information leakage under the condition that the service provider information of the second application is not matched with the service provider information of the second electronic device, and then the risk prompt information of the second application is displayed, so that a user can avoid the sensitive information contained in the second application from being leaked to other electronic devices through setting or other operations.
Optionally, in this embodiment of the present application, after determining that there is a privacy risk for the second application, the first electronic device may further prevent data transmission of an information stream related to the second application when the information stream flows to the second electronic device.
For example, in a case that the service provider information of the second application does not match the service provider information of the second electronic device, the data protection method provided in the embodiment of the present application may further include the following steps 203a1 and 203a 2:
step 203a1, the data protection device receives a first input.
The first input instructs the first electronic device to send the target information to the second electronic device through the second application.
Illustratively, the first input may be: the specific gesture input by the user may be determined according to actual use requirements, and the embodiment of the present invention is not limited. Illustratively, the first input is an input instructing the first electronic device to send the sensitive information to the second electronic device through the second application.
In step 203a2, in the event that the target information includes sensitive information, the data protection device foregoes responding to the first input.
For example, after the first electronic device determines the second application, the data protection apparatus may prevent the data transmission process from being sent to the second electronic device when the first electronic device receives an instruction from a user to transmit data to the second electronic device through the second application. Further, the data protection means may prevent the transmission process when the first electronic device transmits data containing sensitive information to the second electronic device through the second application.
Illustratively, the foregoing forgoing is in response to the first input, and it is to be understood that the first electronic device received the first input but did not perform any operation.
In this way, the first electronic device may prevent the first electronic device from sending the sensitive information in the second application to the second electronic device after determining that the second electronic device is at risk of sensitive information disclosure, thereby protecting the privacy of the user from disclosure.
Optionally, in this embodiment of the application, in a case that the facilitator information of the second application does not match with the facilitator information of the second electronic device, the first electronic device may display a prompt message on the screen to prompt the user of the application with the risk of privacy disclosure.
For example, in a case that the facilitator information of the second application does not match the facilitator information of the second electronic device, the data protection method provided in the embodiment of the present application may further include the following step 204 a:
step 204 a: and displaying an icon of the second application in the target area of the first electronic equipment.
The target area is an area corresponding to a second electronic device, and the icon of the second application is used for indicating an application with an information leakage risk.
For example, since the first electronic device may be connected to multiple wearable devices at the same time, the first electronic device may display multiple regions, where one region corresponds to risk notification information of one wearable device. Therefore, the target area is an area corresponding to the second electronic device among the plurality of areas. The first electronic device displays an icon of a second application related to the second electronic device and having a privacy disclosure risk in the target area.
In this way, after detecting that the second application with leaked privacy exists, the first electronic device reminds the user on the screen in a mode of displaying the second application icon.
Further optionally, in this embodiment of the application, in order to guarantee the option of the user, the user may ignore the risk prompt for the second application, so that the second electronic device can continue to receive the sensitive information in the second application sent by the first electronic device. Or, the first electronic device detects that the second application has the privacy disclosure risk after transmitting information to the second electronic device through the second application. The first electronic device may again alert the user during the transmission of the sensitive information to the second electronic device.
For example, after the step 204a, the data protection method provided in the embodiment of the present application may further include the following step 204 b:
and 204b, when the first electronic equipment transmits the sensitive information to the second electronic equipment, the data protection device displays an indication mark in the target area.
The indication mark is used for indicating that the first electronic equipment is transmitting sensitive information to the second electronic equipment.
Illustratively, the indicator may be displayed in the second interface.
For example, since the first electronic device detects that the second application has the risk of privacy disclosure after the transmission process starts, at this time, the first electronic device may directly interrupt the transmission process, or may prompt the user on a screen about the currently executed transmission process, and wait for further operation of the user.
For example, as shown in fig. 4, after the process of transmitting information to the bracelet by the APP2, the mobile terminal detects that there may be a risk of privacy disclosure in the APP2, at this time, the mobile terminal displays a sensitive information disclosure indicator in the interface 40 (i.e., the second interface) for indicating that the mobile terminal is currently transmitting data to the bracelet through the APP2, and the transmitted data may include user privacy information.
Thus, the first electronic device may prompt the user for a transmission process with a current risk of privacy disclosure, and wait for further operation by the user.
Further optionally, after the first electronic device displays the indicator on the screen, the user may interrupt the transmission process of the first electronic device by inputting the indicator.
For example, after the step 204b, the data protection method provided in the embodiment of the present application may further include the following steps 204c1 and 204c 2:
step 204c1, a second input by the data protection device user to the indicator.
Step 204c2, the data protection device stops transmitting the sensitive information to the second electronic device in response to the second input.
For example, the second input may be: the specific gesture input by the user may be determined according to actual use requirements, and the embodiment of the present invention is not limited. Illustratively, the second input is an input that interrupts the first electronic device from sending the sensitive information to the second electronic device.
For example, the second interface may further include a target control, and the second input may be a click input of the target control by the user or a slide input of the preset area in the second interface by the user.
For example, for a second application that is revealing sensitive data, the first electronic device may highlight an icon of the second application. The icons of the second application, including but not limited to the marked risks, form a sequence that scrolls across the screen, color changes of the icons, adding special marks, re-arrangement, etc.
For example, as shown in fig. 4, when the mobile terminal sends the sensitive information in the APP2 to the bracelet, the sensitive information displayed by the mobile terminal leaks a prompt message, and the message is included in the interface 40 (i.e., the second interface). The user can interrupt the sending process of the sensitive information by clicking on the control 41 in the interface 40.
In this way, the user can manually interrupt the transmission process of the first electronic device for transmitting the sensitive information to the second electronic device through the second electronic device.
Optionally, in this embodiment of the application, since the types of the applications are different, and the importance degrees of the sensitive information in the applications of different types are also different, the first electronic device may further perform ranking for the second application according to the types of the applications.
For example, before the step 202, the data protection method provided in the embodiment of the present application may further include the following step 202a 1:
step 202a1, under the condition that the service provider information of the second application does not match the service provider information of the second electronic device, the data protection device performs security level classification on the second application according to the sensitive information in the second application, and determines the security level of the second application.
For example, since different classes of applications have different sensitive information, the second application may be security-rated according to the different sensitive information in the second application. Further, the sensitive information in the second application may be distinguished specifically according to the category of the second application.
For example, in the step 202, displaying the risk prompting message of the second application may include the following steps 202a 2:
step 202a2, displaying the security level of the second application.
For example, for a shopping application installed in the first electronic device, although the shopping application includes sensitive information such as a shopping record and a browsing record of the user, the leakage of the sensitive information has little influence on the user, and therefore, the security level of the application is high. For social applications, short message applications, bank applications and the like, sensitive information which is important for users is contained, and the leakage of the information has a large influence on the users, so that the security level of the applications is low.
In this way, the user can decide whether to prohibit the first electronic device from sending sensitive information related to the second application to the second electronic device according to the security level of the second application classified by the first electronic device.
Further optionally, in this embodiment of the application, in order to enable the user to more intuitively know the second application at which the risk of the sensitive information leakage exists, the first electronic device may present the risk prompt information in the following manner.
Exemplarily, the second application includes M second applications; the risk prompt information includes: an application icon for each second application.
For example, in the step 202, displaying the risk prompting message of the second application may include the following step 202 b:
step 202b, the data protection device displays the application icons of the M second applications in a rolling manner according to the security levels of the M second applications.
Therefore, when the first electronic device is connected with the second electronic device, a user can more intuitively see which applications are at privacy disclosure risk.
According to the data protection method provided by the embodiment of the application, under the condition that communication connection is established between first electronic equipment and second electronic equipment, through comparing service provider information of N first applications installed in the first electronic equipment with service provider information of the second electronic equipment, under the condition that the service provider information of the second application is not matched with the service provider information of the second electronic equipment, the second application is determined to be the application with the risk of leakage sensitive information, the second application is graded according to the type of the second application or the number of sensitive information contained in the second application, and then risk prompt information of the second application is displayed. The user can prohibit the first electronic device from sending the information related to the second application to the second electronic device on a setting interface according to the risk prompt information of the second application, and the first electronic device can also automatically prevent the sending of the information when detecting that the information related to the second application is sent to the second electronic device, or remind the user to manually interrupt data transmission so as to protect sensitive information from being leaked.
It should be noted that, in the data protection method provided in the embodiment of the present application, the execution main body may be a data protection device, or a control module in the data protection device, configured to execute the data protection method. In the embodiment of the present application, a data protection method performed by a data protection device is taken as an example, and the data protection device provided in the embodiment of the present application is described.
In the embodiments of the present application, the above-described methods are illustrated in the drawings. The data protection method is exemplarily described with reference to one of the drawings in the embodiments of the present application. In specific implementation, the data protection method shown in each method drawing may also be implemented in combination with any other drawing that may be combined, which is illustrated in the foregoing embodiments, and is not described herein again.
Fig. 5 is a schematic structural diagram of a possible data protection device according to an embodiment of the present application, and as shown in fig. 5, the data protection device 600 includes: an acquisition module 601 and a display module 602; the obtaining module 601 is configured to obtain, under a condition that a first electronic device is in communication connection with a second electronic device, service provider information corresponding to each of N first applications installed in the first electronic device; the display module 602 is configured to display risk prompt information of the second application when the facilitator information of the second application does not match with the facilitator information of the second electronic device acquired by the acquisition module 601; the risk prompt information is used for prompting the user that the sensitive information in the second application has information leakage risk; the second application is at least one of the N first applications, and N is a positive integer.
Optionally, the data protection apparatus 600 further includes: a receiving module 603 and a control module 604; the receiving module 603 is configured to receive a first input, where the first input indicates that the first electronic device sends target information to the second electronic device through the second application; a control module 604 for forgoing responding to the first input if the target information includes sensitive information.
Optionally, the display module 602 is further configured to display an icon of a second application in a target area of the first electronic device, where the target area is an area corresponding to the second electronic device, and the icon is used to indicate an application with an information leakage risk.
Optionally, the display module 602 is further configured to display an indication identifier in the target area when the first electronic device transmits the sensitive information to the second electronic device, where the indication identifier is used to indicate that the first electronic device is transmitting the sensitive information to the second electronic device.
Optionally, the receiving module 603 is configured to receive a second input of the indication identifier by the user; a control module 604, configured to stop transmitting the sensitive information to the second electronic device in response to the second input received by the receiving module 603.
The data protection device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. Illustratively, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The data protection device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The data protection device provided in the embodiment of the present application can implement each process implemented by the method embodiments of fig. 2 to fig. 4, and is not described here again to avoid repetition.
According to the data protection device provided by the embodiment of the application, under the condition that the first electronic device and the second electronic device are in communication connection, the server information of N first applications installed in the first electronic device is compared with the server information of the second electronic device, under the condition that the server information of the second application is not matched with the server information of the second electronic device, the second application is determined to be the application with the risk of leakage sensitive information, the second application is graded according to the type of the second application or the number of sensitive information contained in the second application, and then the risk prompt information of the second application is displayed. The user can prohibit the first electronic device from sending the information related to the second application to the second electronic device on a setting interface according to the risk prompt information of the second application, and the first electronic device can also automatically prevent the sending of the information when detecting that the information related to the second application is sent to the second electronic device, or remind the user to manually interrupt data transmission so as to protect sensitive information from being leaked.
Optionally, as shown in fig. 6, an electronic device M00 is further provided in this embodiment of the present application, and includes a processor M01, a memory M02, and a program or an instruction stored in the memory M02 and executable on the processor M01, where the program or the instruction when executed by the processor M01 implements each process of the foregoing data protection method embodiment, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic devices and the non-mobile electronic devices described above.
Fig. 7 is a schematic diagram of a hardware structure of an electronic device implementing various embodiments of the present application.
The electronic device 100 includes, but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, and a processor 110.
Those skilled in the art will appreciate that the electronic device 100 may further comprise a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 7 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
The processor 110 is configured to, under a condition that the first electronic device is in communication connection with the second electronic device, obtain service provider information corresponding to each of N first applications installed in the first electronic device; a display unit 106, configured to display risk prompt information of the second application in a case that the facilitator information of the second application does not match with the facilitator information of the second electronic device acquired by the processor 110; the risk prompt information is used for prompting the user that the sensitive information in the second application has information leakage risk; the second application is at least one of the N first applications, and N is a positive integer.
Therefore, under the condition of communication connection between the first electronic device and the second electronic device, the service provider information corresponding to each first application in the N first applications installed in the first electronic device is acquired and is respectively compared with the service provider information of the second electronic device, the second application is determined to be the application with the risk of sensitive information leakage under the condition that the service provider information of the second application is not matched with the service provider information of the second electronic device, and then the risk prompt information of the second application is displayed, so that a user can avoid the sensitive information contained in the second application from being leaked to other electronic devices through setting or other operations.
Optionally, the user input unit 107 receives a first input, where the first input instructs the first electronic device to send the target information to the second electronic device through the second application; and the radio frequency unit 101 is used for abandoning the response to the first input in the case that the target information comprises sensitive information.
In this way, the first electronic device may prevent the first electronic device from sending the sensitive information in the second application to the second electronic device after determining that the second electronic device is at risk of sensitive information disclosure, thereby protecting the privacy of the user from disclosure.
Optionally, the display unit 106 is further configured to display an icon of a second application in a target area of the first electronic device, where the target area is an area corresponding to the second electronic device, and the icon is used to indicate an application with an information leakage risk.
In this way, after detecting that the second application with leaked privacy exists, the first electronic device reminds the user on the screen in a mode of displaying the second application icon.
Optionally, the display unit 106 is further configured to display an indication identifier in the target area when the first electronic device transmits the sensitive information to the second electronic device, where the indication identifier is used to indicate that the first electronic device is transmitting the sensitive information to the second electronic device.
Thus, the first electronic device may prompt the user for a transmission process with a current risk of privacy disclosure, and wait for further operation by the user.
Optionally, a user input unit 107, configured to receive a second input of the indication identifier by the user; and the radio frequency unit 101 is configured to stop transmitting the sensitive information to the second electronic device in response to the second input received by the user input unit 107.
In this way, the user can manually interrupt the transmission process of the first electronic device for transmitting the sensitive information to the second electronic device through the second electronic device.
According to the electronic device provided by the embodiment of the application, under the condition that the communication connection is established between the first electronic device and the second electronic device, the service provider information of the N first applications installed in the first electronic device is compared with the service provider information of the second electronic device, under the condition that the service provider information of the second application is not matched with the service provider information of the second electronic device, the second application is determined to be the application with the risk of leakage sensitive information, the second application is graded according to the type of the second application or the number of the sensitive information contained in the second application, and then the risk prompt information of the second application is displayed. The user can prohibit the first electronic device from sending the information related to the second application to the second electronic device on a setting interface according to the risk prompt information of the second application, and the first electronic device can also automatically prevent the sending of the information when detecting that the information related to the second application is sent to the second electronic device, or remind the user to manually interrupt data transmission so as to protect sensitive information from being leaked.
It should be understood that, in the embodiment of the present application, the input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics Processing Unit 1041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 107 includes a touch panel 1071 and other input devices 1072. The touch panel 1071 is also referred to as a touch screen. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 109 may be used to store software programs as well as various data including, but not limited to, application programs and an operating system. The processor 110 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the data protection method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the data protection method embodiment, and can achieve the same technical effect, and the details are not repeated here to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling an electronic device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (12)
1. A method for data protection, the method comprising:
under the condition of communication connection between first electronic equipment and second electronic equipment, acquiring service provider information corresponding to each first application in N first applications installed in the first electronic equipment;
displaying risk prompt information of a second application under the condition that service provider information of the second application is not matched with service provider information of the second electronic equipment;
the risk prompt information is used for prompting a user that the sensitive information in the second application has an information leakage risk; the second application is at least one of the N first applications, and N is a positive integer.
2. The method of claim 1, wherein in the event that the facilitator information of the second application does not match the facilitator information of the second electronic device, the method further comprises:
receiving a first input instructing the first electronic device to send target information to the second electronic device through the second application;
in a case where the target information includes the sensitive information, forgoing responding to the first input.
3. The method of claim 1, wherein in the event that the facilitator information of the second application does not match the facilitator information of the second electronic device, the method further comprises:
and displaying an icon of the second application in a target area of the first electronic device, wherein the target area is an area corresponding to the second electronic device, and the icon is used for indicating an application with information leakage risk.
4. The method of claim 3, wherein after the icon of the second application is displayed in the target area of the first electronic device, the method further comprises:
when the first electronic device transmits the sensitive information to the second electronic device, displaying an indication mark in the target area, wherein the indication mark is used for indicating that the first electronic device is transmitting the sensitive information to the second electronic device.
5. The method of claim 4, wherein after the target area displays the indicator, the method further comprises:
receiving a second input of the indication identifier by the user;
in response to the second input, ceasing transmission of the sensitive information to the second electronic device.
6. A data protection device, the device comprising: the device comprises an acquisition module and a display module;
the obtaining module is used for obtaining service provider information corresponding to each first application in N first applications installed in first electronic equipment under the condition that the first electronic equipment is in communication connection with second electronic equipment;
the display module is used for displaying the risk prompt information of the second application under the condition that the service provider information of the second application is not matched with the service provider information of the second electronic equipment acquired by the acquisition module;
the risk prompt information is used for prompting a user that the sensitive information in the second application has an information leakage risk; the second application is at least one of the N first applications, and N is a positive integer.
7. The apparatus of claim 6, further comprising: the device comprises a receiving module and a control module;
the receiving module receives a first input, wherein the first input instructs the first electronic device to send target information to the second electronic device through the second application;
the control module is configured to forgo responding to the first input if the target information includes the sensitive information.
8. The apparatus of claim 6,
the display module is further configured to display an icon of the second application in a target area of the first electronic device, where the target area is an area corresponding to the second electronic device, and the icon is used to indicate an application with an information leakage risk.
9. The apparatus of claim 8,
the display module is further configured to display an indication identifier in the target area when the first electronic device transmits the sensitive information to the second electronic device, where the indication identifier is used to indicate that the first electronic device is transmitting the sensitive information to the second electronic device.
10. The apparatus of claim 9, further comprising: the device comprises a receiving module and a control module;
the receiving module is used for receiving a second input of the indication identifier by the user;
the control module is configured to stop transmitting the sensitive information to the second electronic device in response to the second input received by the receiving module.
11. An electronic device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the data protection method of any one of claims 1 to 5.
12. A readable storage medium, characterized in that it stores thereon a program or instructions which, when executed by a processor, implement the steps of the data protection method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011166954.1A CN112270015A (en) | 2020-10-27 | 2020-10-27 | Data protection method and device, electronic equipment and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011166954.1A CN112270015A (en) | 2020-10-27 | 2020-10-27 | Data protection method and device, electronic equipment and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112270015A true CN112270015A (en) | 2021-01-26 |
Family
ID=74342028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011166954.1A Pending CN112270015A (en) | 2020-10-27 | 2020-10-27 | Data protection method and device, electronic equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112270015A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112966297A (en) * | 2021-02-04 | 2021-06-15 | 华为技术有限公司 | Data protection method, system, medium and electronic device |
WO2024022310A1 (en) * | 2022-07-26 | 2024-02-01 | 华为技术有限公司 | Device security processing method and electronic devices |
WO2024027622A1 (en) * | 2022-08-01 | 2024-02-08 | International Business Machines Corporation | Internet-of-things device security optimization |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005071558A1 (en) * | 2004-01-21 | 2005-08-04 | Hitachi, Ltd. | Remote access system, gateway, client device, program, and storage medium |
JP2010102382A (en) * | 2008-10-21 | 2010-05-06 | Sharp Corp | Information protection system |
CN106650466A (en) * | 2016-09-13 | 2017-05-10 | 杭州联络互动信息科技股份有限公司 | User data protection method and apparatus, and intelligent wearable device |
CN107038385A (en) * | 2015-09-24 | 2017-08-11 | 三星电子株式会社 | Apparatus and method for protection information in a communications system |
US10079835B1 (en) * | 2015-09-28 | 2018-09-18 | Symantec Corporation | Systems and methods for data loss prevention of unidentifiable and unsupported object types |
CN109089229A (en) * | 2017-06-13 | 2018-12-25 | 腾讯科技(深圳)有限公司 | Carry out method, apparatus, storage medium and the terminal of indicating risk |
CN110363017A (en) * | 2019-07-15 | 2019-10-22 | 华瑞新智科技(北京)有限公司 | Mix the data safety sharing method and system based on client encryption under cloud environment |
CN111131189A (en) * | 2019-12-09 | 2020-05-08 | 维沃移动通信有限公司 | Data protection method and electronic equipment |
-
2020
- 2020-10-27 CN CN202011166954.1A patent/CN112270015A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005071558A1 (en) * | 2004-01-21 | 2005-08-04 | Hitachi, Ltd. | Remote access system, gateway, client device, program, and storage medium |
JP2010102382A (en) * | 2008-10-21 | 2010-05-06 | Sharp Corp | Information protection system |
CN107038385A (en) * | 2015-09-24 | 2017-08-11 | 三星电子株式会社 | Apparatus and method for protection information in a communications system |
US10079835B1 (en) * | 2015-09-28 | 2018-09-18 | Symantec Corporation | Systems and methods for data loss prevention of unidentifiable and unsupported object types |
CN106650466A (en) * | 2016-09-13 | 2017-05-10 | 杭州联络互动信息科技股份有限公司 | User data protection method and apparatus, and intelligent wearable device |
CN109089229A (en) * | 2017-06-13 | 2018-12-25 | 腾讯科技(深圳)有限公司 | Carry out method, apparatus, storage medium and the terminal of indicating risk |
CN110363017A (en) * | 2019-07-15 | 2019-10-22 | 华瑞新智科技(北京)有限公司 | Mix the data safety sharing method and system based on client encryption under cloud environment |
CN111131189A (en) * | 2019-12-09 | 2020-05-08 | 维沃移动通信有限公司 | Data protection method and electronic equipment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112966297A (en) * | 2021-02-04 | 2021-06-15 | 华为技术有限公司 | Data protection method, system, medium and electronic device |
WO2024022310A1 (en) * | 2022-07-26 | 2024-02-01 | 华为技术有限公司 | Device security processing method and electronic devices |
WO2024027622A1 (en) * | 2022-08-01 | 2024-02-08 | International Business Machines Corporation | Internet-of-things device security optimization |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112600977B (en) | Method and terminal for rapidly opening application or application function | |
EP3041205B1 (en) | Method, device and system for displaying content of short message, method and device for determining display of short message | |
CN112270015A (en) | Data protection method and device, electronic equipment and readable storage medium | |
US10652287B2 (en) | Method, device, and system for managing information recommendation | |
CN107038358B (en) | Self-starting processing method and device and mobile terminal | |
CN113141293B (en) | Message display method and device and electronic equipment | |
JP2019512113A (en) | Notification message processing method and apparatus | |
CN110457935B (en) | Permission configuration method and terminal equipment | |
CN113141294B (en) | Message prompting method and device and electronic equipment | |
CN104899083A (en) | Application share method and device | |
CN111866885A (en) | Verification information sharing method and device and electronic equipment | |
CN106709282B (en) | resource file decryption method and device | |
CN111917628B (en) | Message processing method and device and electronic equipment | |
CN110610090B (en) | Information processing method and device, and storage medium | |
CN112671635A (en) | Sending method, sending device and electronic equipment | |
CN113794795A (en) | Information sharing method and device, electronic equipment and readable storage medium | |
CN111656347A (en) | Project display method and terminal | |
CN109144609B (en) | Application downloading method and device, storage medium and terminal | |
CN108540645B (en) | Mobile terminal operation method and mobile terminal | |
CN113709307A (en) | Message display method and device and electronic equipment | |
CN112558833B (en) | Application running method and device and electronic equipment | |
CN113138786A (en) | Application updating method and device | |
CN112235412A (en) | Message processing method and device | |
CN112016080A (en) | Application authority management method and device and electronic equipment | |
CN111368329A (en) | Message display method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |