CN112685733A - Security detection method, security detection device, and storage medium - Google Patents

Security detection method, security detection device, and storage medium Download PDF

Info

Publication number
CN112685733A
CN112685733A CN202011552019.9A CN202011552019A CN112685733A CN 112685733 A CN112685733 A CN 112685733A CN 202011552019 A CN202011552019 A CN 202011552019A CN 112685733 A CN112685733 A CN 112685733A
Authority
CN
China
Prior art keywords
detection
risk
displaying
item
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011552019.9A
Other languages
Chinese (zh)
Inventor
范林
张卫东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202011552019.9A priority Critical patent/CN112685733A/en
Publication of CN112685733A publication Critical patent/CN112685733A/en
Pending legal-status Critical Current

Links

Images

Abstract

The present disclosure relates to a security detection method, a security detection apparatus, and a storage medium. The security detection method is applied to a terminal, the terminal provides a privacy risk detection function, and the security detection method comprises the following steps: responding to the privacy risk detection function to be triggered, and executing privacy risk detection according to preset detection items, wherein the preset detection items comprise: at least one of application permission-related detection, application privacy-related detection, or illegal application detection; and displaying a detection result of the privacy risk detection based on the detection item. According to the embodiment of the disclosure, the privacy risk detection function is provided, the privacy risk detection is executed according to the preset detection items, and the detection result of the privacy risk detection is displayed, so that the user can master the risk of the terminal in the privacy aspect, and the privacy of the user is effectively protected by performing targeted optimization.

Description

Security detection method, security detection device, and storage medium
Technical Field
The present disclosure relates to the field of terminal technologies, and in particular, to a security detection method, a security detection apparatus, and a storage medium.
Background
With the development of the technology, the intelligent terminals of mobile phones and tablet computers become necessities of life of people, and various Applications (APP) installed on the intelligent terminals meet various requirements of people in work and life, such as communication, social contact, office work, payment and games. Personal privacy information of a large number of users, such as address books, positions, personal files, photos and the like, exists in the intelligent terminal.
In some cases, the application may request a permission related to the privacy of the user, and the application may illegally obtain the privacy risk of the application of the private data of the user, which not only causes the leakage of the private data of the user, but also causes many security problems.
Disclosure of Invention
To overcome the problems in the related art, the present disclosure provides a security detection method, a security detection apparatus, and a storage medium.
According to an aspect of the embodiments of the present disclosure, a security detection method is provided, which is applied to a terminal, where the terminal provides a privacy risk detection function, and the security detection method includes: responding to the privacy risk detection function to be triggered, and executing privacy risk detection according to preset detection items, wherein the preset detection items comprise: at least one of application permission-related detection, application privacy-related detection, or illegal application detection; and displaying a detection result of the privacy risk detection based on the detection item.
In one embodiment, the security detection method further includes: and responding to the triggering of the privacy risk detection function, and displaying a first page, wherein a display item used for representing the execution of privacy risk detection according to a preset detection item is displayed in the first page.
In one embodiment, the displaying the first page includes: and respectively setting a display item which is executing privacy risk detection based on one or more detection items in the preset detection items, and displaying the display item.
In an embodiment, the displaying, based on the detection item, a detection result of the privacy risk detection includes: and responding to the completion of the privacy risk detection, and displaying the detection result of the privacy risk detection of the detection item in the display item.
In one embodiment, displaying a detection result of the privacy risk detection based on the detection item includes: and displaying a second page, wherein a detection result and a repair suggestion corresponding to the detection item with the risk are displayed in the second page, and the repair suggestion is used for repairing the detection item with the risk.
In one embodiment, the displaying the second page includes: in response to the one or more risk detection items, displaying cards corresponding to the one or more risk detection items in a second page based on detection results corresponding to the one or more risk detection items; the card corresponding to each risk detection item comprises a prompt area and an operation area, the prompt area is used for displaying a detection result corresponding to the detection item with the risk, the operation area is used for displaying an operation control, and the operation control corresponds to a repair suggestion corresponding to the detection item with the risk.
In one embodiment, the displaying the second page includes: in response to the one or more risk detection items, displaying cards corresponding to the one or more risk detection items in a second page based on detection results corresponding to the one or more risk detection items; the card corresponding to each risk detection item comprises a prompt area and an operation area, the prompt area is used for displaying a detection result corresponding to the detection item with the risk, the operation area is used for displaying an operation control, and the operation control corresponds to a repair suggestion corresponding to the detection item with the risk.
In an embodiment, the displaying, in a second page, a card corresponding to the one or more risk detection items based on a detection result corresponding to the one or more risk detection items includes: responding to the detection result of the detection item with the risk that the protection function is not started, displaying a first card, displaying the protection function corresponding to the detection item with the protection function not started in a prompt area of the first card, and displaying a second control in an operation area of the first card, wherein the second control is used for prompting a user to select to start the protection function; and/or responding to the detection result of the detection item with risk as the application with risk, displaying a second card, displaying an application icon with risk in a prompt area of the second card, and displaying a third control element in an operation area of the second card, wherein the third control element is used for prompting a user to select the operation of eliminating the risk; and/or responding to the detection result of the detection item with the risk that the sensitive information authority and/or the dangerous information authority are/is used, displaying a third card, displaying the prompt information of the used authority in the prompt area of the third card, and displaying a fourth control in the operation area of the third card, wherein the fourth control is used for prompting the user to select the operation of setting the application authority.
In an embodiment, a fifth control is displayed in the first page, and the fifth control is used for prompting a user to determine to suspend the operation of the privacy risk detection.
According to another aspect of the embodiments of the present disclosure, there is provided a security detection apparatus, which is applied to a terminal that provides a privacy risk detection function, the security detection apparatus including: the detection module is used for responding to the privacy risk detection function to be triggered, and executing privacy risk detection according to preset detection items, wherein the preset detection items comprise: at least one of application permission-related detection, application privacy-related detection, or illegal application detection; and the display module is used for displaying the detection result of the privacy risk detection based on the detection item.
In one embodiment, the display module is further configured to: and responding to the triggering of the privacy risk detection function, and displaying a first page, wherein a display item used for representing the execution of privacy risk detection according to a preset detection item is displayed in the first page.
In one embodiment, the display module displays the first page as follows: and respectively setting a display item which is executing privacy risk detection based on one or more detection items in the preset detection items, and displaying the display item.
In an embodiment, the display module displays the detection result of the privacy risk detection based on the detection item in the following manner: and responding to the completion of the privacy risk detection, and displaying the detection result of the privacy risk detection of the detection item in the display item.
In an embodiment, the display module displays the detection result of the privacy risk detection based on the detection item in the following manner: and displaying a second page, wherein a detection result and a repair suggestion corresponding to the detection item with the risk are displayed in the second page, and the repair suggestion is used for repairing the detection item with the risk.
In one embodiment, the display module displays the second page as follows: in response to the one or more risk detection items, displaying cards corresponding to the one or more risk detection items in a second page based on detection results corresponding to the one or more risk detection items; the card corresponding to each risk detection item comprises a prompt area and an operation area, the prompt area is used for displaying a detection result corresponding to the detection item with the risk, the operation area is used for displaying an operation control, and the operation control corresponds to a repair suggestion corresponding to the detection item with the risk.
In an embodiment, the display module displays, in a second page, cards corresponding to the one or more risk detection items based on detection results corresponding to the one or more risk detection items in the following manner: responding to the detection result of the detection item with the risk that the protection function is not started, displaying a first card, displaying the protection function corresponding to the detection item with the protection function not started in a prompt area of the first card, and displaying a second control in an operation area of the first card, wherein the second control is used for prompting a user to select to start the protection function; and/or responding to the detection result of the detection item with risk as the application with risk, displaying a second card, displaying an application icon with risk in a prompt area of the second card, and displaying a third control element in an operation area of the second card, wherein the third control element is used for prompting a user to select the operation of eliminating the risk; and/or responding to the detection result of the detection item with the risk that the sensitive information authority and/or the dangerous information authority are/is used, displaying a third card, displaying the prompt information of the used authority in the prompt area of the third card, and displaying a fourth control in the operation area of the third card, wherein the fourth control is used for prompting the user to select the operation of setting the application authority.
In an embodiment, a fifth control is displayed in the first page, and the fifth control is used for prompting a user to determine to suspend the operation of the privacy risk detection.
According to still another aspect of the embodiments of the present disclosure, there is provided a security detection apparatus including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to: performing the security detection method of any one of the preceding claims.
According to yet another aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium having instructions stored thereon, which, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the security detection method of any one of the preceding claims.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: through providing privacy risk detection function, carry out privacy risk detection according to preset test item to show the testing result that privacy risk detected, the user can master the risk that the terminal exists in the aspect of the privacy risk, and have pointed according to self user demand and optimize, effectively protect user privacy.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flow chart illustrating a security detection method according to an exemplary embodiment of the present disclosure.
Fig. 2 is a flow chart illustrating a security detection method according to another exemplary embodiment of the present disclosure.
Fig. 3 is a flow chart illustrating a security detection method according to another exemplary embodiment of the present disclosure.
Fig. 4 is a flow chart illustrating a security detection method according to another exemplary embodiment of the present disclosure.
Fig. 5 is a flow chart illustrating a security detection method according to another exemplary embodiment of the present disclosure.
Fig. 6 is a flow chart illustrating a security detection method according to another exemplary embodiment of the present disclosure.
Fig. 7a and 7b are schematic application diagrams illustrating a security detection method according to an exemplary embodiment of the present disclosure.
Fig. 8 is a block diagram illustrating a security detection device according to an exemplary embodiment of the present disclosure.
FIG. 9 is a block diagram illustrating an apparatus for security detection in accordance with an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Various APP installed on intelligent terminals of mobile phones and tablet computers can meet various requirements of people in work and life such as communication, social contact, office work, payment and games. Therefore, there are a large number of private information of the user in the smart terminal, such as address book, location, personal file, call record, photo, etc.
When the terminal application is installed and operated, a part of permissions, such as permissions for accessing photos, address lists, positions and the like, need to be requested, and in some cases, the application can request the permissions related to the privacy of the user, so that the privacy risk of the application for illegally acquiring the privacy data of the user is caused, the leakage of the privacy data of the user is caused, and a plurality of safety problems are caused.
In the prior art, security-related applications such as security stewards and assistants scan and detect security of a terminal, but security detection is mostly limited to potential security hazards existing in terminal memory usage, system garbage cleaning, virus scanning and the like, and security detection items do not aim at privacy protection of users.
In view of this, the present disclosure provides a security detection method, which provides a privacy risk detection function, executes privacy risk detection according to preset detection items, and displays a detection result of the privacy risk detection, so that a user can perform operation processing according to a risk detection result provided by a terminal.
Fig. 1 is a flowchart illustrating a security detection method according to an exemplary embodiment of the present disclosure, where the security detection method is used in a terminal, and the terminal provides a privacy risk detection function, as shown in fig. 1. The terminal may be, for example, a smartphone, a tablet, a wearable device, or a PC. The embodiment of the present disclosure does not limit the kind of the applied device. Referring to fig. 1, the security detection method includes the following steps.
In step S101, in response to the privacy risk detection function being triggered, performing privacy risk detection according to preset detection items, where the preset detection items include: at least one of an application permission-related detection, an application privacy-related detection, or an illegal application detection.
In step S102, based on the detection item, a detection result of the privacy risk detection is displayed.
In the embodiment of the disclosure, the terminal provides a privacy risk detection function, and the detection item of the privacy risk detection may be, for example, detection related to application permission, detection related to privacy of an application, detection of an illegal application, or the like. The application authority can be a common authority, a sensitive information use authority and a dangerous authority use authority. And sensitive information such as contact information, recording record, call record, position information, sensor information and the like in the terminal. The application permission related detection may include sensitive information permission use, dangerous permission use, application privacy related detection, including whether a picture deletion prevention protection function is enabled, whether a latest task fuzzy overview function is enabled, and detection of an illegal application detection and other items.
The user can enter the security center to carry out privacy protection setting under the setting function of the terminal, namely the privacy risk detection function is triggered, and privacy risk detection is executed according to preset detection items. And displaying the detection result of the privacy risk detection based on the detection item.
According to the embodiment of the disclosure, by providing the privacy risk detection function, executing the privacy risk detection according to the preset detection items, and displaying the detection result of the privacy risk detection, the user can acquire the risk of the terminal in the privacy risk aspect, and perform targeted optimization, thereby effectively protecting the privacy of the user.
Fig. 2 is a flow chart illustrating a security detection method according to another exemplary embodiment of the present disclosure. As shown in fig. 2, the security detection method includes the following steps.
In step S201, in response to the privacy risk detection function being triggered, performing privacy risk detection according to preset detection items, where the preset detection items include: at least one of an application permission-related detection, an application privacy-related detection, or an illegal application detection.
In step S202, a first page is displayed, and a presentation item for representing that privacy risk detection is performed according to a preset detection item is displayed in the first page.
In step S203, based on the detection item, a detection result of the privacy risk detection is displayed.
In the embodiment of the disclosure, the terminal provides a privacy risk detection function, and the user may enter the security center to perform privacy protection setting under the setting function of the terminal, that is, the privacy risk detection function is triggered, and privacy risk detection is performed according to a preset detection item. The preset detection item can be application authority related detection, application privacy related detection or illegal application detection and the like.
When the privacy risk detection is carried out, a first page is displayed at the terminal, a display item is displayed in the first page, and the display item represents to execute the privacy risk detection according to a preset detection item. The user can obtain the detection state, for example, a detection item for performing privacy risk detection, an abstract of a detection result, a detection progress of a current detection item, and the like, through the display of the first page.
According to the embodiment of the disclosure, by providing the privacy risk detection function, performing privacy risk detection according to the preset detection item, displaying the first page, and displaying the display item for performing the privacy risk detection according to the preset detection item, the user can obtain details of performing the privacy risk detection and finally grasp the risk of the terminal in the privacy risk aspect, so that targeted optimization is performed, and the terminal is reasonably used.
Fig. 3 is a flow chart illustrating a security detection method according to another exemplary embodiment of the present disclosure. As shown in fig. 3, the security detection method includes the following steps.
In step S301, in response to the privacy risk detection function being triggered, performing privacy risk detection according to preset detection items, where the preset detection items include: at least one of an application permission-related detection, an application privacy-related detection, or an illegal application detection.
In step S302, presentation items that are performing privacy risk detection are respectively set based on one or more detection items among preset detection items, and the presentation items are displayed.
In step S303, based on the detection item, a detection result of the privacy risk detection is displayed.
In the embodiment of the disclosure, the terminal provides a privacy risk detection function, and the user may enter the security center to perform privacy protection setting under the setting function of the terminal, that is, the privacy risk detection function is triggered, and privacy risk detection is performed according to a preset detection item. The preset detection item can be application authority related detection, application privacy related detection or illegal application detection and the like.
When the privacy risk detection is carried out, a first page is displayed at the terminal, a display item is displayed in the first page, and the display item represents to execute the privacy risk detection according to a preset detection item. The display item of the first page may be a display item that is respectively set to perform privacy risk detection based on one or more detection items in preset detection items, and the display item is displayed. The user can acquire the detection state through the display of the first page. For example, the preset detection items may include: sensitive authority, privacy protection function, risk application, and the like. And respectively setting corresponding display items based on the three preset detection items, and displaying the display items. For example, the presentation item corresponding to the sensitive permission may include "2 risk items are detected", the presentation item corresponding to the privacy protection function may include "album picture anti-deletion protection not enabled", and the presentation item corresponding to the risk application may be a presentation of "security risk application".
According to the embodiment of the disclosure, by providing the privacy risk detection function, performing privacy risk detection according to preset detection items, displaying the first page, and respectively setting the display items which are performing the privacy risk detection based on one or more detection items in the preset detection items, a user can obtain details of performing the privacy risk detection and finally know the risk of the terminal in the privacy risk aspect, so that targeted optimization is performed, and the terminal is more reasonable to use.
Fig. 4 is a flow chart illustrating a security detection method according to another exemplary embodiment of the present disclosure. As shown in fig. 4, the security detection method includes the following steps.
In step S401, in response to the privacy risk detection function being triggered, performing privacy risk detection according to preset detection items, where the preset detection items include: at least one of an application permission-related detection, an application privacy-related detection, or an illegal application detection.
In step S402, a first page is displayed, where a presentation item for representing that privacy risk detection is performed according to a preset detection item is displayed in the first page.
In step S403, in response to the privacy risk detection being performed, a detection result of the privacy risk detection of the detection item is displayed in the presentation item.
In the embodiment of the disclosure, the terminal provides a privacy risk detection function, and the user may enter the security center to perform privacy protection setting under the setting function of the terminal, that is, the privacy risk detection function is triggered, and privacy risk detection is performed according to a preset detection item. The preset detection item can be application authority related detection, application privacy related detection or illegal application detection and the like.
When the privacy risk detection is carried out, a first page is displayed at the terminal, a display item is displayed in the first page, and the display item represents to execute the privacy risk detection according to a preset detection item. The user can obtain the detection state, for example, a detection item for performing privacy risk detection, an abstract of a detection result, a detection progress of a current detection item, and the like, through the display of the first page. And after the privacy risk detection is executed, displaying the detection result of the privacy risk detection of the detection item in the display item. The risk of the terminal in the privacy risk aspect is mastered by the user, so that the terminal can be optimized in a targeted mode according to the requirement.
According to the embodiment of the disclosure, by providing the privacy risk detection function, performing privacy risk detection according to the preset detection item, displaying the first page, and displaying the display item for performing the privacy risk detection according to the preset detection item, the user can obtain details of performing the privacy risk detection, and finally know the risk of the terminal in the privacy risk aspect, so as to perform targeted optimization.
Fig. 5 is a flow chart illustrating a security detection method according to another exemplary embodiment of the present disclosure. As shown in fig. 5, the security detection method includes the following steps.
In step S501, in response to the privacy risk detection function being triggered, performing privacy risk detection according to preset detection items, where the preset detection items include: at least one of an application permission-related detection, an application privacy-related detection, or an illegal application detection.
In step S502, a first page is displayed, and a presentation item for representing that privacy risk detection is performed according to a preset detection item is displayed in the first page.
In step S503, a second page is displayed, where the second page displays the detection result corresponding to the detection item with risk and the repair suggestion, and the repair suggestion is used to repair the detection item with risk.
In the embodiment of the disclosure, the terminal provides a privacy risk detection function, and the user may enter the security center to perform privacy protection setting under the setting function of the terminal, that is, the privacy risk detection function is triggered, and privacy risk detection is performed according to a preset detection item. The preset detection item can be application authority related detection, application privacy related detection or illegal application detection and the like.
When the privacy risk detection is carried out, a first page is displayed at the terminal, a display item is displayed in the first page, and the display item represents to execute the privacy risk detection according to a preset detection item. The user can obtain the detection state, for example, a detection item for performing privacy risk detection, an abstract of a detection result, a detection progress of a current detection item, and the like, through the display of the first page. And after the privacy risk detection is finished, displaying a second page, and displaying a detection result and a repair suggestion corresponding to the detection item with the risk in the second page, wherein the repair suggestion is used for repairing the detection item with the risk. The risk of the terminal in the privacy risk aspect is mastered by the user, so that the terminal can be optimized in a targeted mode according to the requirement.
According to the embodiment of the disclosure, by providing the privacy risk detection function, performing privacy risk detection according to the preset detection item, displaying the first page, and displaying the display item for performing the privacy risk detection according to the preset detection item, the user can obtain details of performing the privacy risk detection, and finally know the risk of the terminal in the privacy risk aspect, so as to perform targeted optimization.
Fig. 6 is a flow chart illustrating a security detection method according to another exemplary embodiment of the present disclosure. As shown in fig. 6, the security detection method includes the following steps.
In step S601, in response to the privacy risk detection function being triggered, performing privacy risk detection according to preset detection items, where the preset detection items include: at least one of an application permission-related detection, an application privacy-related detection, or an illegal application detection.
In step S602, a first page is displayed, where a presentation item for representing that privacy risk detection is performed according to a preset detection item is displayed in the first page.
In step S603, in response to the presence of one or more risk detection items, a card corresponding to the one or more risk detection items is displayed in the second page based on a detection result corresponding to the one or more risk detection items.
In the embodiment of the disclosure, the card corresponding to each risk detection item includes a prompt area and an operation area, the prompt area is used for displaying the detection result corresponding to the detection item with the risk, the operation area is used for displaying the operation control, and the operation control corresponds to the repair suggestion corresponding to the detection item with the risk.
The terminal provides a privacy risk detection function and executes privacy risk detection according to preset detection items. When the privacy risk detection is carried out, a first page is displayed at the terminal, a display item is displayed in the first page, and the display item represents to execute the privacy risk detection according to a preset detection item. The user can obtain the detection state, for example, a detection item for performing privacy risk detection, an abstract of a detection result, a detection progress of a current detection item, and the like, through the display of the first page. And after the privacy risk detection is finished, displaying a second page, and displaying a detection result and a repair suggestion corresponding to the detection item with the risk in the second page, wherein the repair suggestion is used for repairing the detection item with the risk.
And when the risk detection item exists, displaying the detection result in the second page based on the detection result corresponding to the risk detection item. It may be that in the second page, cards corresponding to the risk detection items are displayed. It is understood that the risk detection item may be one item or a plurality of items. The card corresponding to each risk detection item comprises a prompt area and an operation area, the prompt area displays the detection result corresponding to the detection item with the risk, the operation area displays an operation control, and a user can correspondingly repair the detection item with the risk by operating the control in the operation area.
According to the embodiment of the disclosure, by providing the privacy risk detection function, performing privacy risk detection according to the preset detection item, displaying the first page, and displaying the display item for performing the privacy risk detection according to the preset detection item, the user can obtain details of performing the privacy risk detection, and finally know the risk of the terminal in the privacy risk aspect, so as to perform targeted optimization.
According to the embodiment of the disclosure, by providing the privacy risk detection function, performing privacy risk detection according to the preset detection item, displaying the first page, and displaying the display item for performing the privacy risk detection according to the preset detection item, the user can obtain details of performing the privacy risk detection, and finally know the risk of the terminal in the privacy risk aspect, so as to perform targeted optimization.
In an embodiment of the disclosure, the privacy risk detection function is triggered, that is, when the privacy risk detection of the terminal is performed, the privacy risk detection is performed according to the preset detection item, the privacy risk detection is performed, and the detection result of the privacy risk detection of the detection item is displayed on the second page.
For example, whether a detection item with risk exists is detected, if the protection function is not started as a detection result, a first card is displayed, the protection function corresponding to the detection item with the protection function not started is displayed in a prompt area of the first card, and a second control is displayed in an operation area of the first card, and the second control is used for prompting a user to select starting of the protection function.
For example, the detection item is whether a latest task fuzzy overview function is enabled, the detection result indicates that the protection function is not enabled, a first card is displayed in a second page, a prompt of finding that 1 privacy protection function is not enabled is displayed in a prompt area of the first card, and specifically indicates the protection function of the latest task fuzzy overview function, namely, "important applications related to privacy display a fuzzy preview image in the latest task to prevent privacy information from being peeped", and a second control is displayed in an operation area to prompt a user to select to enable the protection function. For example, the second controls are virtual buttons of "ignore" and "one-key-on", respectively, and the user may not start the protection function by touching the "ignore" button, or start the protection function by clicking the "one-key-on" button.
For example, whether the risk application is installed or not is detected, the second card is displayed as a detection result, the application icon with the risk is displayed in the prompt area of the second card, and a third control element is displayed in the operation area of the second card and used for prompting the user to select the operation of eliminating the risk.
For example, one or more risk applications are detected, the detected application icons are displayed in the prompt area of the second card, and the operational area of the second card displays a third control, such as a virtual button to "ignore" or "uninstall". The user may retain the detected risky application by touching the "ignore" button, or unload the risky application by clicking the "unload" button.
And detecting the use condition of the user sensitive information authority or the use condition of the dangerous information authority, displaying a third card when the sensitive information authority and/or the dangerous information authority are/is used, displaying the prompt information of the authority used in a prompt area of the third card, and displaying a fourth control in an operation area of the third card, wherein the fourth control is used for prompting the user to select the operation of setting the application authority.
For example, it is detected that the authority related to the sensitive information is used, a third card is displayed, prompt information that the authority is used is displayed in a prompt area of the third card, "it is recommended that authorization of the application for the sensitive authority be cancelled according to actual needs", and a fourth control is displayed in an operation area of the third card, and the fourth control is, for example, a virtual button of "ignore" or "set up". The user can keep the condition of the application sensitive information related authority by touching the 'ignore' button, or forbid the application from using the sensitive information by clicking the 'set up' button.
According to the embodiment of the disclosure, by providing the privacy risk detection function, performing privacy risk detection according to the preset detection item, displaying the first page, and displaying the display item for performing the privacy risk detection according to the preset detection item, the user can obtain details of performing the privacy risk detection, and finally know the risk of the terminal in the privacy risk aspect, so as to perform targeted optimization.
In an embodiment of the present disclosure, a fifth control is displayed in the first page, and the fifth control is used for prompting the user to determine to suspend the operation of privacy risk detection. The fifth control can be a virtual key, a floating window, a prompt bar and the like, and a user can operate the fifth control as required to stop the current privacy risk detection operation.
Fig. 7a and 7b are schematic application diagrams illustrating a security detection method according to an exemplary embodiment of the present disclosure. Referring to fig. 7a and 7b, in the embodiment of the present disclosure, a terminal provides a privacy risk detection function, and performs privacy risk detection according to a preset detection item. When the privacy risk detection is performed, a first page, that is, fig. 7a, is displayed at the terminal, and a display item for detecting detection items such as a sensitive authority, a privacy protection function, and a risk application is displayed in the first page. The method comprises the steps that '2 risk items are detected out of a display item corresponding to the sensitive authority', album picture anti-deletion protection is not started in a display item corresponding to the privacy protection function, and 'safety risk application' of a display item corresponding to the risk application. And a fifth control, namely a button for stopping scanning, is displayed in the first page and is arranged below the first page, and when a user needs to stop the current privacy risk detection operation, the button for stopping scanning is clicked to stop the current privacy risk detection operation.
And after the privacy risk detection is finished, displaying a second page, as shown in fig. 7b, where the second page displays the detection result and the repair suggestion corresponding to the detection item with the risk.
And displaying a first card in the second page, displaying a prompt of finding that 1 privacy protection function is not started in a prompt area of the first card, and specifically prompting that the protection functions of a fuzzy preview picture and an album picture anti-error deletion are not started. The function of the ' fuzzy preview picture ' item, namely ' important application related to privacy ' displays a fuzzy preview picture in a recent task to prevent your privacy information from being peeped ', and the function of the ' photo album picture anti-error deletion ' item, namely ' when the application deletes pictures in the photo album, will remind you '. And displaying a second control in the operation area, namely, a virtual button for 'ignoring' and 'one-key opening', wherein a user can not open the protection function by touching the 'ignoring' button or open the protection function by clicking the 'one-key opening' button.
When one or more risk applications are detected, the detected application icons are displayed in the prompt area of the second card, and the operation area of the second card displays a third control element, such as a virtual button for "ignore" or "uninstall". The user may retain the detected risky application by touching the "ignore" button, or unload the risky application by clicking the "unload" button.
When sensitive information is detected, and the related authority of dangerous information is used, a third card is displayed, the prompt information that the authority is used is displayed in the prompt area of the third card, the authorization of the application to the sensitive authority is cancelled according to actual requirements, the authorization of the application to the dangerous authority is cancelled according to the actual requirements, and a fourth control is displayed in the operation area of the third card, namely, a virtual button for 'ignoring' and 'setting up' is ignored. The user can keep the condition of the application sensitive information related authority by touching the 'ignore' button, or forbid the application from using the sensitive information by clicking the 'set up' button.
According to the embodiment of the disclosure, by providing the privacy risk detection function, performing privacy risk detection according to the preset detection item, displaying the first page, and displaying the display item for performing the privacy risk detection according to the preset detection item, the user can obtain details of performing the privacy risk detection, and finally know the risk of the terminal in the privacy risk aspect, so as to perform targeted optimization.
Based on the same conception, the embodiment of the disclosure also provides a safety detection device.
It is understood that, in order to implement the above functions, the security detection apparatus provided in the embodiments of the present disclosure includes a hardware structure and/or a software module for performing each function. The disclosed embodiments can be implemented in hardware or a combination of hardware and computer software, in combination with the exemplary elements and algorithm steps disclosed in the disclosed embodiments. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
Fig. 8 is a block diagram illustrating a security detection device according to an exemplary embodiment of the present disclosure. Referring to fig. 8, the security detection apparatus 100 is applied to a terminal, which provides a privacy risk detection function and includes a detection module 101 and a display module 102.
The detection module 101 is configured to, in response to the privacy risk detection function being triggered, execute privacy risk detection according to a preset detection item, where the preset detection item includes: at least one of an application permission-related detection, an application privacy-related detection, or an illegal application detection.
And a display module 102, configured to display a detection result of the privacy risk detection based on the detection item.
In one embodiment, the display module 102 is further configured to: and responding to the triggering of the privacy risk detection function, and displaying a first page, wherein a display item used for representing the execution of privacy risk detection according to a preset detection item is displayed in the first page.
In one embodiment, the display module 102 displays the first page as follows: and respectively setting a display item which is executing privacy risk detection based on one or more detection items in the preset detection items, and displaying the display item.
In an embodiment, the display module 102 displays the detection result of the privacy risk detection based on the detection item in the following manner: and responding to the completion of the privacy risk detection, and displaying the detection result of the privacy risk detection of the detection item in the display item.
In an embodiment, the display module 102 displays the detection result of the privacy risk detection based on the detection item in the following manner: and displaying a second page, wherein the second page displays a detection result and a repair suggestion corresponding to the detection item with the risk, and the repair suggestion is used for repairing the detection item with the risk.
In one embodiment, the display module 102 displays the second page as follows: in response to the one or more risk detection items, displaying cards corresponding to the one or more risk detection items in a second page based on detection results corresponding to the one or more risk detection items; the card corresponding to each risk detection item comprises a prompt area and an operation area, the prompt area is used for displaying a detection result corresponding to the detection item with the risk, the operation area is used for displaying an operation control, and the operation control corresponds to a repair suggestion corresponding to the detection item with the risk.
In an embodiment, the display module 102 displays the cards corresponding to the one or more risk detection items in the second page based on the detection result corresponding to the one or more risk detection items as follows: responding to the detection result of the detection item with the risk that the protection function is not started, displaying a first card, displaying the protection function corresponding to the detection item with the protection function not started in a prompt area of the first card, and displaying a second control in an operation area of the first card, wherein the second control is used for prompting a user to select to start the protection function; and/or responding to the detection result of the detection item with risk as the application with risk, displaying a second card, displaying an application icon with risk in a prompt area of the second card, and displaying a third control element in an operation area of the second card, wherein the third control element is used for prompting a user to select the operation of eliminating the risk; and/or responding to the detection result of the detection item with the risk that the sensitive information authority and/or the dangerous information authority are/is used, displaying a third card, displaying the prompt information of the used authority in the prompt area of the third card, and displaying a fourth control in the operation area of the third card, wherein the third control is used for prompting the user to select the operation of setting the application authority.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 9 is a block diagram illustrating an apparatus 800 for security detection in accordance with an example embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 9, the apparatus 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 806 provides power to the various components of device 800. The power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
It is understood that "a plurality" in this disclosure means two or more, and other words are analogous. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. The singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It will be further understood that the terms "first," "second," and the like are used to describe various information and that such information should not be limited by these terms. These terms are only used to distinguish one type of information from another and do not denote a particular order or importance. Indeed, the terms "first," "second," and the like are fully interchangeable. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure.
It will be further understood that, unless otherwise specified, "connected" includes direct connections between the two without the presence of other elements, as well as indirect connections between the two with the presence of other elements.
It is further to be understood that while operations are depicted in the drawings in a particular order, this is not to be understood as requiring that such operations be performed in the particular order shown or in serial order, or that all illustrated operations be performed, to achieve desirable results. In certain environments, multitasking and parallel processing may be advantageous.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (18)

1. A security detection method is applied to a terminal, the terminal provides a privacy risk detection function, and the security detection method comprises the following steps:
responding to the privacy risk detection function to be triggered, and executing privacy risk detection according to preset detection items, wherein the preset detection items comprise: at least one of application permission-related detection, application privacy-related detection, or illegal application detection;
and displaying a detection result of the privacy risk detection based on the detection item.
2. The security detection method of claim 1, further comprising:
and responding to the triggering of the privacy risk detection function, and displaying a first page, wherein a display item used for representing the execution of privacy risk detection according to a preset detection item is displayed in the first page.
3. The security detection method of claim 2, wherein the displaying the first page comprises:
and respectively setting a display item which is executing privacy risk detection based on one or more detection items in the preset detection items, and displaying the display item.
4. The security detection method according to claim 2, wherein the displaying the detection result of the privacy risk detection based on the detection item comprises:
and responding to the completion of the privacy risk detection, and displaying the detection result of the privacy risk detection of the detection item in the display item.
5. The security detection method according to any one of claims 2 to 4, wherein displaying the detection result of the privacy risk detection based on the detection item comprises:
and displaying a second page, wherein a detection result and a repair suggestion corresponding to the detection item with the risk are displayed in the second page, and the repair suggestion is used for repairing the detection item with the risk.
6. The security detection method of claim 5, wherein the displaying the second page comprises:
in response to the one or more risk detection items, displaying cards corresponding to the one or more risk detection items in a second page based on detection results corresponding to the one or more risk detection items;
the card corresponding to each risk detection item comprises a prompt area and an operation area, the prompt area is used for displaying a detection result corresponding to the detection item with the risk, the operation area is used for displaying an operation control, and the operation control corresponds to a repair suggestion corresponding to the detection item with the risk.
7. The security detection method according to claim 6, wherein the displaying a card corresponding to the one or more risk detection items in a second page based on the detection result corresponding to the one or more risk detection items comprises:
responding to the detection result of the detection item with the risk that the protection function is not started, displaying a first card, displaying the protection function corresponding to the detection item with the protection function not started in a prompt area of the first card, and displaying a second control in an operation area of the first card, wherein the second control is used for prompting a user to select to start the protection function; and/or
Responding to the detection result of the detection item with risk as risk application, displaying a second card, displaying an application icon with risk in a prompt area of the second card, and displaying a third control element in an operation area of the second card, wherein the third control element is used for prompting a user to select operation for eliminating risk; and/or
And in response to the detection result of the detection item with the risk indicating that the sensitive information authority and/or the dangerous information authority is/are used, displaying a third card, displaying prompt information indicating that the authority is used in a prompt area of the third card, and displaying a fourth control in an operation area of the third card, wherein the fourth control is used for prompting a user to select the operation of setting the application authority.
8. The security detection method according to claim 6 or 7, wherein a fifth control is displayed in the first page, and the fifth control is used for prompting a user to determine to suspend the operation of the privacy risk detection.
9. A security detection device, applied to a terminal that provides a privacy risk detection function, the security detection device comprising:
the detection module is used for responding to the privacy risk detection function to be triggered, and executing privacy risk detection according to preset detection items, wherein the preset detection items comprise: at least one of application permission-related detection, application privacy-related detection, or illegal application detection;
and the display module is used for displaying the detection result of the privacy risk detection based on the detection item.
10. The security detection apparatus of claim 9, wherein the display module is further configured to:
and responding to the triggering of the privacy risk detection function, and displaying a first page, wherein a display item used for representing the execution of privacy risk detection according to a preset detection item is displayed in the first page.
11. The security detection apparatus of claim 10, wherein the display module displays the first page by:
and respectively setting a display item which is executing privacy risk detection based on one or more detection items in the preset detection items, and displaying the display item.
12. The security detection apparatus according to claim 10, wherein the display module displays the detection result of the privacy risk detection based on the detection item in the following manner:
and responding to the completion of the privacy risk detection, and displaying the detection result of the privacy risk detection of the detection item in the display item.
13. The security detection device according to any one of claims 10 to 12, wherein the display module displays the detection result of the privacy risk detection based on the detection item in the following manner:
and displaying a second page, wherein a detection result and a repair suggestion corresponding to the detection item with the risk are displayed in the second page, and the repair suggestion is used for repairing the detection item with the risk.
14. The security detection apparatus of claim 13, wherein the display module displays the second page by:
in response to the one or more risk detection items, displaying cards corresponding to the one or more risk detection items in a second page based on detection results corresponding to the one or more risk detection items;
the card corresponding to each risk detection item comprises a prompt area and an operation area, the prompt area is used for displaying a detection result corresponding to the detection item with the risk, the operation area is used for displaying an operation control, and the operation control corresponds to a repair suggestion corresponding to the detection item with the risk.
15. The security detection apparatus according to claim 14, wherein the display module displays a card corresponding to the one or more risk detection items in a second page based on the detection result corresponding to the one or more risk detection items by:
responding to the detection result of the detection item with the risk that the protection function is not started, displaying a first card, displaying the protection function corresponding to the detection item with the protection function not started in a prompt area of the first card, and displaying a second control in an operation area of the first card, wherein the second control is used for prompting a user to select to start the protection function; and/or
Responding to the detection result of the detection item with risk as risk application, displaying a second card, displaying an application icon with risk in a prompt area of the second card, and displaying a third control element in an operation area of the second card, wherein the third control element is used for prompting a user to select operation for eliminating risk; and/or
And in response to the detection result of the detection item with the risk indicating that the sensitive information authority and/or the dangerous information authority is/are used, displaying a third card, displaying prompt information indicating that the authority is used in a prompt area of the third card, and displaying a fourth control in an operation area of the third card, wherein the fourth control is used for prompting a user to select the operation of setting the application authority.
16. The security detection apparatus according to claim 14 or 15, wherein a fifth control is displayed in the first page, and the fifth control is configured to prompt a user to determine to suspend the operation of the privacy risk detection.
17. A security detection device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: -performing the security detection method of any one of claims 1 to 8.
18. A non-transitory computer readable storage medium having instructions therein that, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the security detection method of any one of claims 1 to 8.
CN202011552019.9A 2020-12-24 2020-12-24 Security detection method, security detection device, and storage medium Pending CN112685733A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011552019.9A CN112685733A (en) 2020-12-24 2020-12-24 Security detection method, security detection device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011552019.9A CN112685733A (en) 2020-12-24 2020-12-24 Security detection method, security detection device, and storage medium

Publications (1)

Publication Number Publication Date
CN112685733A true CN112685733A (en) 2021-04-20

Family

ID=75452877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011552019.9A Pending CN112685733A (en) 2020-12-24 2020-12-24 Security detection method, security detection device, and storage medium

Country Status (1)

Country Link
CN (1) CN112685733A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115906187A (en) * 2023-02-22 2023-04-04 山东经伟晟睿数据技术有限公司 User authority control method and system combining function authority and interface authority

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819715A (en) * 2012-08-15 2012-12-12 腾讯科技(深圳)有限公司 API (application programming interface) monitoring method and device
CN107045609A (en) * 2017-04-28 2017-08-15 努比亚技术有限公司 Method, storage medium and the mobile terminal of detecting system security
CN107566332A (en) * 2017-07-10 2018-01-09 电子科技大学 A kind of intelligent terminal checking and killing virus and burglary-resisting system based on Android

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819715A (en) * 2012-08-15 2012-12-12 腾讯科技(深圳)有限公司 API (application programming interface) monitoring method and device
CN107045609A (en) * 2017-04-28 2017-08-15 努比亚技术有限公司 Method, storage medium and the mobile terminal of detecting system security
CN107566332A (en) * 2017-07-10 2018-01-09 电子科技大学 A kind of intelligent terminal checking and killing virus and burglary-resisting system based on Android

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115906187A (en) * 2023-02-22 2023-04-04 山东经伟晟睿数据技术有限公司 User authority control method and system combining function authority and interface authority
CN115906187B (en) * 2023-02-22 2023-05-23 山东经伟晟睿数据技术有限公司 User permission control method and system combining function permission and interface permission

Similar Documents

Publication Publication Date Title
CN107436784B (en) Floating window display method and device
EP3151117B1 (en) Method and device for delaying information broadcasting
EP3089065B1 (en) Method and device for permission management
EP3098701B1 (en) Method and apparatus for managing terminal application
EP3242195A1 (en) Control implementation method and apparatus for intelligent hardware device
US9851895B2 (en) Terminal and method of sharing a handwriting therein
KR20160127625A (en) Method and device for deleting smart scene
EP3232316A1 (en) Method and device for data migration
EP3754959B1 (en) Quick access to an application in the lock screen
US20180121057A1 (en) Method and device for hiding application icon
CN105979062B (en) Communication event processing method and device
CN107145797A (en) Display control method, device and the terminal device of application icon
CN107463809B (en) Application icon display method and device
EP3255575B1 (en) Application triggering method and device
CN105760796B (en) Application security processing method and device
CN112685733A (en) Security detection method, security detection device, and storage medium
KR20150066422A (en) Message transmission method of application
KR101882266B1 (en) Mobile terminal and method for controlling thereof
EP3923135A1 (en) Method and device for processing information, and storage medium
CN112083841B (en) Information input method, device and storage medium
KR102028459B1 (en) Terminal and method for displaying icon
CN107133531B (en) Application lock use reminding method and device
CN113806161A (en) Application access method, application access device and storage medium
CN112887590B (en) Image processing method, device and storage medium
US20220309142A1 (en) Method for setting permission of application, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination