CN112597483A - Privacy protection method and device, intelligent terminal and storage medium - Google Patents

Privacy protection method and device, intelligent terminal and storage medium Download PDF

Info

Publication number
CN112597483A
CN112597483A CN202010684422.0A CN202010684422A CN112597483A CN 112597483 A CN112597483 A CN 112597483A CN 202010684422 A CN202010684422 A CN 202010684422A CN 112597483 A CN112597483 A CN 112597483A
Authority
CN
China
Prior art keywords
value
flag
virtual
intelligent terminal
flag bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010684422.0A
Other languages
Chinese (zh)
Inventor
刘锋
陈渝
武永卫
李健航
苗德行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Tsinghua Tongfang Co Ltd
Tongfang Co Ltd
Original Assignee
Tsinghua University
Tongfang Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University, Tongfang Co Ltd filed Critical Tsinghua University
Priority to CN202010684422.0A priority Critical patent/CN112597483A/en
Publication of CN112597483A publication Critical patent/CN112597483A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a privacy protection method, a privacy protection device, an intelligent terminal and a storage medium. The method comprises the following steps: detecting an access request of an application program in the intelligent terminal to the physical positioning equipment; after detecting the access request, acquiring authority information of an application program for setting operation records according to the authority of a user on the physical positioning equipment; the authority information comprises a first zone bit and a corresponding zone value, and a second zone bit and a corresponding zone value; if the permission setting operation is an operation of refusing authorization, the value of the first zone bit is a first zone value, and the value of the second zone bit is a second zone value; the first flag value is used for indicating that the user is authorized to the operating system of the intelligent terminal; a second flag value for indicating authorization to access the virtual positioning device; if the value of the first zone bit is the first zone value and the value of the second zone bit is the second zone value, starting the virtual positioning equipment to generate virtual information; and feeding back the virtual information generated by the virtual positioning equipment to the application program to protect the privacy information.

Description

Privacy protection method and device, intelligent terminal and storage medium
Technical Field
The present application relates to the field of intelligent terminal technologies, and in particular, to a privacy protection method and apparatus, an intelligent terminal, and a storage medium.
Background
In an operating system of an intelligent terminal, such as an android system, when an application installed in the intelligent terminal accesses a positioning device, since this may involve privacy information of a user, the access right to the positioning device belongs to a dangerous right, and the positioning device can be used only after being authorized, that is, dynamic right management is performed, some users may refuse authorization for the purpose of privacy protection, and at this time, the application cannot continue to run, such as being down, stopping running, and the like, which affects the use of the user.
Disclosure of Invention
An object of the present application is to provide a privacy protection method, apparatus, intelligent terminal and storage medium to solve the problems in the related art.
The purpose of the application is realized by the following technical scheme:
a privacy protection method is applied to an intelligent terminal with physical positioning equipment, wherein the intelligent terminal is provided with virtual positioning equipment, and the method comprises the following steps:
detecting an access request of an application program in the intelligent terminal to the physical positioning equipment;
after the access request is detected, acquiring authority information of the application program on the physical positioning equipment, which is recorded according to the authority setting operation of the user; the authority information comprises a first flag bit and a corresponding flag value, and a second flag bit and a corresponding flag value; if the permission setting operation is an operation of refusing authorization, the value of the first flag bit is a first flag value, and the value of the second flag bit is a second flag value; the first flag value is used for indicating that a user is authorized to an operating system of the intelligent terminal; the second flag value is used to indicate that the virtual positioning device is authorized to be accessed;
if the value of the first flag bit is the first flag value and the value of the second flag bit is the second flag value, starting the virtual positioning equipment to generate virtual information;
feeding back the virtual information generated by the virtual positioning device to the application program to protect private information.
Optionally, if the permission setting operation is an operation granting authorization, the value of the first flag bit is the first flag value, and the value of the second flag bit is a third flag value; the third flag value is used to indicate that the authorization is to authorize access to the physical locating device;
if the value of the first flag bit is the first flag value and the value of the second flag bit is the third flag value, starting the physical positioning device;
and feeding back real information generated by the physical positioning equipment to the application program.
Optionally, the method further includes:
and recording the authority information in an original file of an operating system installed in the intelligent terminal.
Optionally, the method further includes:
and recording the authority information in a configuration file except an original file of an operating system installed in the intelligent terminal.
Optionally, the operating system is an android system, the virtual locating device is set in a Linux kernel of the android system, and starting the virtual locating device includes:
and starting the virtual positioning equipment in the Linux kernel of the android system through a hardware abstraction layer of the android system.
Optionally, the method further includes:
detecting the authority setting operation of the user in real time;
and updating the recorded authority information of the application program to the physical positioning equipment according to the authority setting operation.
The utility model provides a privacy protection device, is applied to in the intelligent terminal who has physical locating equipment, be provided with virtual locating equipment in the intelligent terminal, the device includes:
the first detection module is used for detecting an access request of an application program in the intelligent terminal to the physical positioning equipment;
the acquisition module is used for acquiring the authority information of the application program on the physical positioning equipment according to the authority setting operation record of the user after the access request is detected; the authority information comprises a first flag bit and a corresponding flag value, and a second flag bit and a corresponding flag value; if the permission setting operation is an operation of refusing authorization, the value of the first flag bit is a first flag value, and the value of the second flag bit is a second flag value; the first flag value is used for indicating that a user is authorized to an operating system of the intelligent terminal; the second flag value is used to indicate that the virtual positioning device is authorized to be accessed;
a first starting module, configured to start the virtual positioning apparatus to generate virtual information if the value of the first flag bit is the first flag value and the value of the second flag bit is the second flag value;
the first feedback module is used for feeding back the virtual information generated by the virtual positioning equipment to the application program so as to protect private information.
Optionally, if the permission setting operation is an operation granting authorization, the value of the first flag bit is the first flag value, and the value of the second flag bit is a third flag value; the third flag value is used to indicate that the authorization is to authorize access to the physical locating device; the device also comprises a second starting module and a second feedback module;
the second starting module is configured to start the physical positioning device if the value of the first flag bit is the first flag value and the value of the second flag bit is the third flag value;
the second feedback module is used for feeding back real information generated by the physical positioning equipment to the application program.
An intelligent terminal, comprising:
the system comprises a processor, a memory and a physical positioning device, wherein the memory and the physical positioning device are connected with the processor;
the memory is used for storing a computer program;
the processor is configured to invoke and execute the computer program in the memory to perform the method of any of the above.
A storage medium having stored thereon a computer program which, when executed by a processor, implements a method as claimed in any one of the preceding claims.
This application adopts above technical scheme, has following beneficial effect:
in the scheme of the application, in the operation of setting the authority of the application program on the positioning equipment, even if the user performs the operation of refusing the authorization for protecting the privacy, the authorized operation of the user can still be represented to the operating system of the intelligent terminal through the first flag bit, but the authorized operation can be used for accessing the virtual positioning equipment, the authorized access to the virtual positioning equipment at the moment can be recorded through the second flag bit, under the condition of authorizing the access to the virtual positioning equipment, the virtual positioning equipment is started to generate virtual information, and based on the virtual information, the virtual information under the starting state of simulating the physical positioning equipment can be fed back to the application program, so that compared with the related technology, when the user performs the operation of refusing the authorization, the application program can continue to operate in a mode of authorizing the access to the virtual positioning equipment, thereby not only ensuring the privacy of the user and improving the safety of the system, and the conditions of downtime, stop running of the application program and the like caused by refusing authorization are avoided, and the user experience is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a privacy protection method according to an embodiment of the present application.
Fig. 2 is a schematic structural diagram of a privacy protecting apparatus according to another embodiment of the present application.
Fig. 3 is a schematic structural diagram of an intelligent terminal according to another embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail below. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without making any creative effort, shall fall within the protection scope of the present application.
For convenience of understanding the scheme of the present application, a brief description is provided below for an installation package management service and dynamic rights management in the android system.
The installation package management service is mainly responsible for management of installation packages in the android system, installation and uninstallation of application programs, information query and the like.
The dynamic authority management is a dynamic authority management mode introduced in an android 6.0, authentication is mainly placed in each service, if an application program applies for a certain authority, the service where the authority is located can inquire whether the authority of the application program is granted to the dynamic authority management, if authorization is needed, a system dialog box is popped up to allow a user to operate, a result is persisted in a file according to the operation of the user, if corresponding authority is set in the setting, the corresponding authority operation persisted file can be updated, and when the service is applied again next time, the service can identify the authority again.
In most operating systems of intelligent terminals, such as an android system, when an application installed in an intelligent terminal accesses a positioning device, since this involves privacy information of a user, the access right to the positioning device belongs to a dangerous right, and the positioning device can be used only after being authorized, some users may refuse authorization for the purpose of privacy protection, and at this time, the application cannot continue to run, such as being down, stopping running, and the like, which affects the use of the user.
In order to solve the technical problem, the application provides a privacy protection method, a privacy protection device, an intelligent terminal and a storage medium. The details are described below by way of examples.
Examples
Referring to fig. 1, fig. 1 is a flowchart of a privacy protection method according to an embodiment of the present application.
As shown in fig. 1, this embodiment provides a privacy protection method, which is applied to an intelligent terminal having a physical positioning device, where a virtual positioning device is disposed in the intelligent terminal, and the method at least includes the following steps:
and 11, detecting an access request of an application program in the intelligent terminal to the physical positioning equipment.
The physical positioning equipment refers to positioning equipment in a hardware form arranged on the intelligent terminal. In an application, some functions need to be realized by depending on a physical positioning device, and at this time, an access request to the physical positioning device is sent out.
Step 12, after detecting the access request, acquiring authority information of the application program on the physical positioning equipment, which is recorded according to the authority setting operation of the user; the authority information comprises a first flag bit and a corresponding flag value, and a second flag bit and a corresponding flag value; if the permission setting operation is an operation of refusing authorization, the value of the first flag bit is a first flag value, and the value of the second flag bit is a second flag value; the first flag value is used for indicating that a user is authorized to an operating system of the intelligent terminal; the second flag value is used to indicate that the virtual positioning device is authorized to be accessed.
The specific values of the first flag value and the second flag value may be set according to actual needs, for example, the first flag value is 1, and the second flag value is 0.
Step 13, if the value of the first flag bit is the first flag value and the value of the second flag bit is the second flag value, starting the virtual positioning device to generate virtual information.
The virtual positioning device is a virtual device, and the virtual device refers to a driver which is written according to a real device driving framework and generates virtual data relative to a physical device. Thus, the virtual pointing device may simulate the physical pointing device to generate virtual information, i.e., to generate virtual location information.
And step 14, feeding back the virtual information generated by the virtual positioning equipment to the application program so as to protect privacy information.
In an operating system in the related art, for example, in an android system, if a user performs an operation of rejecting authorization, the operation of the user is recorded through an original flag bit in an original file of the operating system, for example, the original flag bit is assigned to 0, and the operating system can know that the user does not authorize an application program through the original flag bit, at this time, the application program cannot continue to run because of no authority, and the running is stopped.
In the scheme of the application, even if the user performs the operation of refusing authorization to protect privacy in the operation of setting the authority of the positioning device by the application program, the authorized user can still be represented to the operating system of the intelligent terminal through the first flag bit, but the authorized user can access the virtual positioning device, the authorized virtual positioning device at the moment can be recorded through the second flag bit, and the virtual positioning device is started to generate virtual information under the condition of authorizing to access the virtual positioning device, so that the virtual information under the starting state of the physical positioning device can be simulated is fed back to the application program, therefore, compared with the related technology, when the user performs the operation of refusing authorization, the application program can continue to run through the mode of authorizing to access the virtual positioning device, thereby, the privacy of the user is ensured, and the system safety is improved, and the conditions of downtime, stop running of the application program and the like caused by refusing authorization are avoided, and the user experience is improved.
Of course, if the permission setting operation is an operation of granting authorization, the value of the first flag bit is the first flag value, and the value of the second flag bit is the third flag value; the third flag value is used to indicate that the authorization is to authorize access to the physical locating device; and if the value of the first flag bit is the first flag value and the value of the second flag bit is the third flag value, starting the physical positioning equipment and feeding back real information generated by the physical positioning equipment to an application program. The specific value of the third flag value may also be set according to actual needs, for example, set to 1. In this embodiment, the condition that the access to the physical positioning device is authorized can be recorded by different flag values of the second flag bit, and is distinguished from the condition that the access to the virtual positioning device is authorized, and under the condition that the access to the physical positioning device is authorized, it is indicated that the user considers that the environment is currently trustable, the physical positioning device can be turned on, and the privacy of the user is protected.
It should be noted that, the user may perform the authority setting operation of the user at an appropriate time as needed, and the authority setting operation of the user may be performed when the application is installed, or may be performed after the application is installed, for example, may be performed in an application start state, or may be performed in an application close state, for example, may be implemented by a setting function of the smart terminal.
In specific implementation, the permission setting operation of a user needs to be detected in real time; and updating the recorded authority information of the application program to the physical positioning equipment according to the authority setting operation. Therefore, accurate information can be fed back to the application program accurately at any time, and normal use of the application program is guaranteed.
In specific implementation, the authority information may be recorded in an original file of the operating system installed in the intelligent terminal, or may be recorded in a configuration file other than the original file of the operating system installed in the intelligent terminal.
If the former method is adopted for recording, the original file of the operating system needs to be changed, as described above, because an original mark bit is set in the original file of the operating system, in order to facilitate the change, the original mark bit can be directly used as a first mark bit, at this time, no matter whether the permission setting operation is an operation of granting the permission or an operation of refusing the permission, the original mark bit is recorded as authorized, the operating system considers that the application program has an access permission to the positioning device, then the added second mark bit is used for distinguishing whether the physical positioning device is authorized to be accessed or the virtual positioning device is authorized to be accessed, when the physical positioning device is authorized to be accessed, the physical positioning device is opened, when the virtual positioning device is authorized to be accessed, the virtual positioning device is opened, the virtual information is fed back, and the privacy information is protected.
Taking the android system as an example, the first flag bit and the second flag bit may be set in the following original files:
AppCompatActivity.java;
PackageManager.java;
Package Manager Service.java;
ActivityManager.java;
ActivityManagerService.java。
if the latter method is adopted for recording, the original file of the operating system does not need to be changed, but an additional configuration file is needed, and the development is also very convenient.
In the android system, the bottom layer part of the android system needs to be matched with a hardware abstraction layer, and the bottom layer part comprises the hardware abstraction layer and a Linux kernel. In this way, the hardware abstraction layer determines whether the permission information authorizes access to the virtual positioning device or the physical positioning device, and if the permission information authorizes access to the virtual positioning device, the virtual positioning device is started so as to generate the virtual information.
Certainly, the driver of the physical positioning device is also set in the Linux kernel, and if the physical positioning device needs to be started if the physical positioning device is authorized to access the physical positioning device, the driver of the physical positioning device in the Linux kernel of the android system can be started through the hardware abstraction layer of the android system.
The following describes a privacy protection method provided by the embodiment of the present application in more detail, taking an application scenario in which an authority setting operation is performed in a use process of an application program as an example.
In the scene of this embodiment, the intelligent terminal has a physical positioning device, and the android system is installed, and performs dynamic authority management on the application program, and the intelligent terminal is provided with a virtual positioning device.
After a user opens an application program, the application program normally displays a page, a function option which can be realized only by opening a positioning device is arranged on the displayed page A, and at the moment, if the user selects to open the function, whether the application program has the access right of the positioning device or not needs to be detected.
If the access authority exists, the application program continues to run, and the next page B is displayed.
If the access authority does not exist, an authorization popup is sent out, if the user carries out authorization rejection operation on the authorization popup, authority information is recorded according to the authorization rejection operation, at the moment, the virtual positioning equipment is started and the virtual information generated by the virtual positioning equipment is fed back to the application program according to the authority information, the privacy of the user is protected, the application program continues to run, and the next page B is displayed.
If the user agrees to the authorization operation on the authorization popup window, recording authority information according to the operation agreeing to the authorization, starting the physical positioning equipment and feeding back real information generated by the physical positioning equipment to the application program according to the authority information, and continuing to operate the application program to display the next page B.
Therefore, by the scheme, the application program can be ensured to normally run no matter the user agrees to authorize or refuses to authorize the use of the positioning equipment, the privacy of the user is protected, and the safety and the user experience effect are improved.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a privacy protecting apparatus according to another embodiment of the present application.
As shown in fig. 2, this embodiment provides a privacy protecting apparatus, which is applied to an intelligent terminal having a physical positioning device, where a virtual positioning device is disposed in the intelligent terminal, and the apparatus includes:
a first detection module 201, configured to detect an access request of an application in the intelligent terminal to the physical positioning device;
an obtaining module 202, configured to obtain, after the access request is detected, permission information of the application program on the physical positioning device, where the permission information is recorded according to a permission setting operation of a user; the authority information comprises a first flag bit and a corresponding flag value, and a second flag bit and a corresponding flag value; if the permission setting operation is an operation of refusing authorization, the value of the first flag bit is a first flag value, and the value of the second flag bit is a second flag value; the first flag value is used for indicating that a user is authorized to an operating system of the intelligent terminal; the second flag value is used to indicate that the virtual positioning device is authorized to be accessed;
a first starting module 203, configured to start the virtual positioning apparatus to generate virtual information if the value of the first flag bit is the first flag value and the value of the second flag bit is the second flag value;
a first feedback module 204, configured to feed back the virtual information generated by the virtual positioning apparatus to the application program to protect private information.
Optionally, if the permission setting operation is an operation granting authorization, the value of the first flag bit is the first flag value, and the value of the second flag bit is a third flag value; the third flag value is used to indicate that the authorization is to authorize access to the physical locating device; the device also comprises a second starting module and a second feedback module;
the second starting module is configured to start the physical positioning device if the value of the first flag bit is the first flag value and the value of the second flag bit is the third flag value;
the second feedback module is used for feeding back real information generated by the physical positioning equipment to the application program.
Optionally, the apparatus further comprises a recording module; the recording module is used for:
and recording the authority information in an original file of an operating system installed in the intelligent terminal.
Optionally, the apparatus further comprises a recording module; the recording module is used for:
and recording the authority information in a configuration file except an original file of an operating system installed in the intelligent terminal.
Optionally, the operating system is an android system, the virtual positioning device is disposed in a Linux kernel of the android system, and the first starting module is specifically configured to:
and starting the virtual positioning equipment in the Linux kernel of the android system through a hardware abstraction layer of the android system.
Optionally, the apparatus further includes a second detection module, where the second detection module is configured to: detecting the authority setting operation of the user in real time;
the recording module is specifically configured to update the recorded authority information of the application program to the physical positioning device according to the authority setting operation.
For a specific implementation of the privacy protection apparatus provided in the embodiment of the present application, reference may be made to the implementation of the privacy protection method described in any of the above examples, and details are not described here again.
Referring to fig. 3, fig. 3 is a schematic structural diagram of an intelligent terminal according to another embodiment of the present application.
As shown in fig. 3, the intelligent terminal provided in this embodiment includes:
a processor 301, a memory 302 connected with the processor, and a physical positioning device 303;
the memory 302 is used for storing computer programs;
the processor 301 is configured to invoke and execute the computer program in the memory to perform the privacy protecting method according to any of the above embodiments.
The specific implementation of the intelligent terminal provided in the embodiment of the present application may refer to the implementation of the method described in any of the above examples, and details are not described here.
Another embodiment of the present application further provides a storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the method according to any of the above embodiments.
For a specific implementation of the storage medium provided in the embodiment of the present application, reference may be made to the implementation of the method described in any of the above examples, and details are not described here again.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (10)

1. A privacy protection method is applied to an intelligent terminal with physical positioning equipment, wherein virtual positioning equipment is arranged in the intelligent terminal, and the method comprises the following steps:
detecting an access request of an application program in the intelligent terminal to the physical positioning equipment;
after the access request is detected, acquiring authority information of the application program on the physical positioning equipment, which is recorded according to the authority setting operation of the user; the authority information comprises a first flag bit and a corresponding flag value, and a second flag bit and a corresponding flag value; if the permission setting operation is an operation of refusing authorization, the value of the first flag bit is a first flag value, and the value of the second flag bit is a second flag value; the first flag value is used for indicating that a user is authorized to an operating system of the intelligent terminal; the second flag value is used to indicate that the virtual positioning device is authorized to be accessed;
if the value of the first flag bit is the first flag value and the value of the second flag bit is the second flag value, starting the virtual positioning equipment to generate virtual information;
feeding back the virtual information generated by the virtual positioning device to the application program to protect private information.
2. The method of claim 1, wherein if the permission setting operation is an grant operation, the first flag bit has the first flag value and the second flag bit has the third flag value; the third flag value is used to indicate that the authorization is to authorize access to the physical locating device;
if the value of the first flag bit is the first flag value and the value of the second flag bit is the third flag value, starting the physical positioning device;
and feeding back real information generated by the physical positioning equipment to the application program.
3. The method of claim 1, further comprising:
and recording the authority information in an original file of an operating system installed in the intelligent terminal.
4. The method of claim 1, further comprising:
and recording the authority information in a configuration file except an original file of an operating system installed in the intelligent terminal.
5. The method according to claim 1, wherein the operating system is an android system, the virtual location device is disposed in a Linux kernel of the android system, and the starting the virtual location device includes:
and starting the virtual positioning equipment in the Linux kernel of the android system through a hardware abstraction layer of the android system.
6. The method of claim 1, further comprising:
detecting the authority setting operation of the user in real time;
and updating the recorded authority information of the application program to the physical positioning equipment according to the authority setting operation.
7. The utility model provides a privacy protection device which characterized in that is applied to in the intelligent terminal who has physical locating device, be provided with virtual locating device in the intelligent terminal, the device includes:
the first detection module is used for detecting an access request of an application program in the intelligent terminal to the physical positioning equipment;
the acquisition module is used for acquiring the authority information of the application program on the physical positioning equipment according to the authority setting operation record of the user after the access request is detected; the authority information comprises a first flag bit and a corresponding flag value, and a second flag bit and a corresponding flag value; if the permission setting operation is an operation of refusing authorization, the value of the first flag bit is a first flag value, and the value of the second flag bit is a second flag value; the first flag value is used for indicating that a user is authorized to an operating system of the intelligent terminal; the second flag value is used to indicate that the virtual positioning device is authorized to be accessed;
a first starting module, configured to start the virtual positioning apparatus to generate virtual information if the value of the first flag bit is the first flag value and the value of the second flag bit is the second flag value;
the first feedback module is used for feeding back the virtual information generated by the virtual positioning equipment to the application program so as to protect private information.
8. The apparatus of claim 7, wherein if the permission setting operation is an grant operation, the first flag bit has a value of the first flag value and the second flag bit has a value of a third flag value; the third flag value is used to indicate that the authorization is to authorize access to the physical locating device; the device also comprises a second starting module and a second feedback module;
the second starting module is configured to start the physical positioning device if the value of the first flag bit is the first flag value and the value of the second flag bit is the third flag value;
the second feedback module is used for feeding back real information generated by the physical positioning equipment to the application program.
9. An intelligent terminal, comprising:
the system comprises a processor, a memory and a physical positioning device, wherein the memory and the physical positioning device are connected with the processor;
the memory is used for storing a computer program;
the processor is configured to invoke and execute the computer program in the memory to perform the method of any of claims 1-7.
10. A storage medium, having stored thereon a computer program which, when executed by a processor, carries out the method according to any one of claims 1-7.
CN202010684422.0A 2020-07-16 2020-07-16 Privacy protection method and device, intelligent terminal and storage medium Pending CN112597483A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010684422.0A CN112597483A (en) 2020-07-16 2020-07-16 Privacy protection method and device, intelligent terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010684422.0A CN112597483A (en) 2020-07-16 2020-07-16 Privacy protection method and device, intelligent terminal and storage medium

Publications (1)

Publication Number Publication Date
CN112597483A true CN112597483A (en) 2021-04-02

Family

ID=75180163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010684422.0A Pending CN112597483A (en) 2020-07-16 2020-07-16 Privacy protection method and device, intelligent terminal and storage medium

Country Status (1)

Country Link
CN (1) CN112597483A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480554A (en) * 2017-07-28 2017-12-15 中科创达软件科技(深圳)有限公司 A kind of right management method, rights management device and intelligent terminal
CN110084047A (en) * 2019-03-20 2019-08-02 努比亚技术有限公司 A kind of access right control method, terminal and computer readable storage medium
CN110619221A (en) * 2019-08-09 2019-12-27 深圳市轱辘汽车维修技术有限公司 Virtual authorization method, device, terminal equipment and storage medium
CN110781490A (en) * 2018-07-30 2020-02-11 中兴通讯股份有限公司 Information processing method, terminal and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480554A (en) * 2017-07-28 2017-12-15 中科创达软件科技(深圳)有限公司 A kind of right management method, rights management device and intelligent terminal
CN110781490A (en) * 2018-07-30 2020-02-11 中兴通讯股份有限公司 Information processing method, terminal and computer readable storage medium
CN110084047A (en) * 2019-03-20 2019-08-02 努比亚技术有限公司 A kind of access right control method, terminal and computer readable storage medium
CN110619221A (en) * 2019-08-09 2019-12-27 深圳市轱辘汽车维修技术有限公司 Virtual authorization method, device, terminal equipment and storage medium

Similar Documents

Publication Publication Date Title
US8621605B2 (en) Method for reducing the time to diagnose the cause of unexpected changes to system files
US8468522B2 (en) Virtual machine system, system for forcing policy, method for forcing policy, and virtual machine control program
US20090319527A1 (en) Method and apparatus for logging privilege use in a distributed computing environment
US8417969B2 (en) Storage volume protection supporting legacy systems
US20080301754A1 (en) Management of Mandatory Access Control For Graphical User Interface Applications
US20050177823A1 (en) License management
CN105930739A (en) Method and terminal for preventing file from being deleted
US10643004B2 (en) Techniques for enabling a software application to access files at a computing device while enforcing privacy measures
CN110598428A (en) USB (Universal Serial bus) equipment management and control system based on Linux user space
WO2023197916A1 (en) Access control method and device for linux file system
JPH1124918A (en) System and method for managing license of non-gratuitous software
US20050216466A1 (en) Method and system for acquiring resource usage log and computer product
CN112597484A (en) Privacy protection method and device, intelligent terminal and storage medium
CN108573153B (en) Vehicle-mounted operating system and using method thereof
US20110247085A1 (en) Electronic device and method of protecting software
CN106982428B (en) Security configuration method, security control device and security configuration device
CN108304222A (en) Apparatus management/control system and method
CN112597483A (en) Privacy protection method and device, intelligent terminal and storage medium
US8667604B2 (en) Protection of software on portable medium
CN112597482A (en) Privacy protection method and device, intelligent terminal and storage medium
CN112464176B (en) Authority management method and device, electronic equipment and storage medium
CN115964725A (en) Data protection method and device
JP2004139292A (en) Policy diagnostic system of access control
KR101458149B1 (en) Method of Controlling File With Backing-up Hidden Files
KR101462659B1 (en) Method of Controlling File With Giving an Attribut on Hidden Files

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination