CN115033910A - Access record display method and electronic equipment - Google Patents

Access record display method and electronic equipment Download PDF

Info

Publication number
CN115033910A
CN115033910A CN202111343104.9A CN202111343104A CN115033910A CN 115033910 A CN115033910 A CN 115033910A CN 202111343104 A CN202111343104 A CN 202111343104A CN 115033910 A CN115033910 A CN 115033910A
Authority
CN
China
Prior art keywords
access record
access
record
sensitive interface
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111343104.9A
Other languages
Chinese (zh)
Other versions
CN115033910B (en
Inventor
蒲兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202111343104.9A priority Critical patent/CN115033910B/en
Publication of CN115033910A publication Critical patent/CN115033910A/en
Application granted granted Critical
Publication of CN115033910B publication Critical patent/CN115033910B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Telephone Function (AREA)

Abstract

An access record display method and electronic equipment relate to the technical field of terminals; the method can correct the access records of the native service, and improve the accuracy of the access records. When the electronic equipment detects that the sensitive interface is called, the electronic equipment identifies a correction mode of the called sensitive interface; the correction mode is a correction mode of the access record of the sensitive interface; the electronic equipment generates a first access record of the first application to the sensitive interface according to the correction mode and the first application calling the sensitive interface; the electronic equipment acquires a second access record of the sensitive interface; wherein the second access record is an access record of the first application of the native service record of the electronic device to the sensitive interface; the method comprises the steps that the electronic equipment receives a first operation of a user, wherein the first operation is used for triggering the electronic equipment to display an access record of a sensitive interface; and responding to the first operation, the electronic equipment corrects the second access record based on the first access record, obtains a third access record, and displays the third access record.

Description

Access record display method and electronic equipment
Technical Field
The application relates to the technical field of terminals, in particular to an access record display method and electronic equipment.
Background
With the increased awareness of users to protect privacy, access to sensitive data by applications becomes an important indicator of user interest. More and more manufacturers are beginning to provide a privacy access record interface to show the situations of the application accessing the user privacy data, such as the time and the number of times of the application accessing the user privacy data.
Disclosure of Invention
The application provides an access record display method and electronic equipment.
The native interface of the operating system provides the number of times the application accesses the user's privacy, and records one access as long as the application accesses the sensitive data native interface. However, for data that can be cached, the next access will not trigger the native interface to record. For the native satellite signal data, the data of each satellite is recorded as one visit, and actually, the data of all the satellites are calculated together to obtain one position data, so that the number of privacy visits displayed to the user is not accurate enough. For example, when an application acquires native satellite signals, since each satellite returns data and is periodically updated, the native interface records that the application accesses position information up to thousands of times per minute, which is inconsistent with the accuracy of the positioning application. According to some embodiments of the application, the data to be displayed can be determined by recording the access records of the application to the sensitive interface and the access records provided by the native service of the operating system, so that the displayed data can be more accurate for the user, and the privacy protection experience of the user is improved.
In a first aspect, the present application provides an access record displaying method, including: when the electronic equipment detects that the sensitive interface is called, identifying a correction mode of the called sensitive interface; the electronic equipment generates a first access record of the sensitive interface according to the correction mode and a first application calling the sensitive interface; then the electronic equipment acquires a second access record of the native service record of the sensitive interface; when receiving the user operation, the electronic device may modify the second access record by using the first access record, and obtain a third access record to be displayed, and display the third access record to the user.
By adopting the scheme, the electronic equipment can generate the first access record for correcting the access record according to the correction mode of the sensitive interface, so that the second access record of the sensitive interface provided by the native service is corrected by adopting the first access record to obtain the third access record, and the accuracy of the access record can be improved. In addition, the second access record provided by the native service is corrected, the problem that the user understands the access record wrongly when the access record provided by the native service is displayed to the user can be avoided, the legibility and the understandability of the displayed data are enhanced, and therefore the requirement of the user on privacy protection is met.
In a possible implementation manner of the first aspect of the present application, the modification manner is to add access records or delete access records; the electronic device corrects the second access record based on the first access record to obtain a third access record, and the method comprises the following steps: the electronic equipment performs addition and deletion processing on the second access record based on the correction mode in the first access record; and the electronic equipment counts the access times of the first application to the sensitive interface according to the second access record after the adding and deleting processing, and the access times are used as a third access record.
By adopting the scheme, the electronic equipment can delete or increase the second access records of different sensitive interfaces in a targeted manner according to the correction mode of the first access record. When the second access record is deleted, the excessive access records generated by the native service can be reduced, and when the second access record is increased, the missed access records of the native service can be made up, so that the access records of all sensitive interfaces are more correct.
In a possible implementation manner of the first aspect of the present application, the electronic device performs, based on a correction manner in the first access record, addition and deletion processing on the second access record, including: the electronic equipment matches a target access record from the second access record according to the first access time recorded in the first access record; wherein the second access time recorded in the target access record is closest to the first access time recorded in the first access record; if the modification mode in the first access record is to add an access record, the electronic equipment adds a target access record in the second access record; if the modification mode in the first access record is deleting the access record, the electronic equipment deletes the target access record in the second access record. The first access record and the second access record are matched through time, the second access record corresponding to the time point can be accurately corrected, and correction accuracy is guaranteed.
In one possible implementation of the first aspect of the present application, the electronic device determines a modification degree of the sensitive interface, where the modification degree is a number of access records to be added or subtracted each time an access record of the sensitive interface is modified. The electronic equipment adds and deletes the second access record based on the correction mode in the first access record, and the method comprises the following steps: and the electronic equipment performs addition and deletion processing on the second access record according to the correction degree based on the mark type in the first access record. Different correction degrees can be provided for different sensitive interfaces, so that the correction degree of each sensitive interface is controlled in a targeted manner, the method can adapt to scenes of different sensitive interfaces, and the correction accuracy of the access records is enhanced.
In a possible implementation manner of the first aspect of the present application, the modifying, by the electronic device, the second access record based on the first access record to obtain a third access record includes: the electronic equipment counts a plurality of first access records of the sensitive interface to obtain the total correction times of the access records of the first application to the sensitive interface; the electronic equipment counts a plurality of second access records of the sensitive interface to obtain the total access times of the first application to the sensitive interface; and the electronic equipment corrects the total access times by adopting the total correction times to obtain a third access record. By adopting the scheme, the electronic equipment can directly count the first access record and the second access record, so that the second access record is corrected at one time without one-to-one matching of the access records, the efficiency is higher, and the correction speed is higher.
In a possible implementation manner of the first aspect of the present application, the generating, by the electronic device, a first access record of the first application to the sensitive interface according to the modification manner and the first application calling the sensitive interface includes: the electronic device generates a first access record before the native service records a second access record. That is, the first access record is generated earlier in time than the second access record, such that the electronic device may record the corresponding first access record each time the native service generates the second access record. And each piece of first access record electronic equipment can inquire the corresponding second access record, so that the correction mode of the second access record is determined, the correction missing record can be avoided, and the correction accuracy is ensured.
In a possible implementation manner of the first aspect of the present application, the method further includes: the sensitive interface comprises at least one of an interface for acquiring position information and an interface for acquiring a file; the correction mode corresponding to the interface for acquiring the position information is to delete the access record, and the correction mode corresponding to the interface for acquiring the file is to add the access record. The electronic equipment can determine different correction modes according to different sensitive interfaces, so that the correction modes can be corrected in different modes according to different sensitive interfaces, the correction modes can adapt to all the sensitive interfaces, and the pertinence and the accuracy of the correction modes are guaranteed.
In a possible implementation manner of the first aspect of the present application, the method further includes: the electronic equipment displays a first page, and displays the access times of the sensitive interface in a first application preset time period on the first page according to a time sequence; or the electronic equipment displays the first page, calls each application of the sensitive interface within a preset time length and accesses times of each application. By adopting the scheme, the user can know the time for the application to access the sensitive interface and also can know each application accessing the sensitive interface, so that the privacy access condition of each application is determined, and the privacy protection experience of the user can be improved.
In a second aspect, the present application provides an electronic device comprising a memory, one or more processors. Wherein the memory has stored therein one or more computer programs comprising instructions which, when executed by the processor, cause the electronic device to perform the method as in the first aspect and any of its possible embodiments.
In a third aspect, the present application provides an electronic device comprising a memory, one or more processors. Wherein the memory has stored therein one or more computer programs comprising instructions which, when executed by the processor, cause the electronic device to perform the steps of: when the electronic equipment detects that the sensitive interface is called, the electronic equipment identifies a correction mode corresponding to the sensitive interface, wherein the correction mode corresponding to the sensitive interface is a correction mode of an access record of the sensitive interface; the electronic equipment generates a first access record of the first application to the sensitive interface according to the mark type and the first application calling the sensitive interface; the electronic equipment acquires a second access record of the sensitive interface; wherein the second access record is an access record of the first application of the native service record of the electronic device to the sensitive interface; the method comprises the steps that the electronic equipment receives a first operation of a user, wherein the first operation is used for triggering the electronic equipment to display an access record of a sensitive interface; and responding to the first operation, the electronic equipment corrects the second access record based on the first access record, obtains a third access record, and displays the third access record.
In one possible implementation of the third aspect of the present application, the above instructions, when executed by the processor, cause the electronic device to perform the steps of: the electronic equipment performs addition and deletion processing on the second access record based on the correction mode in the first access record; and the electronic equipment counts the access times of the first application to the sensitive interface according to the second access record after the addition and deletion processing, and the access times are used as a third access record.
In one possible implementation of the third aspect of the present application, the above instructions, when executed by the processor, cause the electronic device to perform the steps of: the electronic equipment matches a target access record from the second access record according to the first access time recorded in the first access record; wherein the second access time recorded in the target access record is closest to the first access time recorded in the first access record; if the modification mode in the first access record is to add an access record, the electronic equipment adds a target access record in the second access record; if the modification mode in the first access record is deleting the access record, the electronic equipment deletes the target access record in the second access record.
In one possible implementation of the third aspect of the present application, the above instructions, when executed by the processor, cause the electronic device to perform the steps of: the electronic equipment determines the correction degree of the sensitive interface, wherein the correction degree is the number of access records to be increased or decreased when the access records of the sensitive interface are corrected each time; and the electronic equipment performs addition and deletion processing on the second access record according to the correction degree based on the mark type in the first access record.
In one possible implementation of the third aspect of the present application, the above instructions, when executed by the processor, cause the electronic device to perform the steps of: the electronic equipment counts a plurality of first access records of the sensitive interface to obtain the total correction times of the access records of the first application to the sensitive interface; the electronic equipment counts a plurality of second access records of the sensitive interface to obtain the total access times of the first application to the sensitive interface; and the electronic equipment corrects the total access times by adopting the total correction times to obtain a third access record.
In one possible implementation of the third aspect of the present application, the above instructions, when executed by the processor, cause the electronic device to perform the steps of: the electronic device generates a first access record before the native service records a second access record.
In one possible implementation of the third aspect of the present application, the above instructions, when executed by the processor, cause the electronic device to perform the steps of: the sensitive interface comprises at least one of an interface for acquiring position information and an interface for acquiring a file; the electronic equipment determines that the correction mode corresponding to the interface for acquiring the position information is deleting the access record, and the correction mode corresponding to the interface for acquiring the file is increasing the access record.
In a fourth aspect, the present application provides a computer-readable storage medium having stored therein instructions that, when executed on an electronic device, cause the electronic device to perform an access record presentation method according to the first aspect and any one of its possible implementations.
In a fifth aspect, the present application provides a computer program product, which when run on an electronic device, causes the electronic device to execute a method for presenting an access record according to the first aspect and any one of the possible embodiments.
It is to be understood that, for the electronic device according to the second aspect, the third aspect, and any possible implementation manner thereof, the computer-readable storage medium according to the fourth aspect, and the computer program product according to the fifth aspect, reference may be made to the advantageous effects of the first aspect and any possible design manner thereof, and details thereof are not repeated here.
Drawings
Fig. 1 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram of a software architecture of an electronic device according to an embodiment of the present disclosure;
fig. 3 is an interaction flow diagram of an access record presentation method according to an embodiment of the present application;
fig. 4 is a first application scenario diagram of an access record presentation method according to an embodiment of the present application;
fig. 5 is a schematic view of an application scenario of an access record presentation method according to an embodiment of the present application;
fig. 6 is a schematic view of an application scenario three of the access record presentation method according to the embodiment of the present application.
Detailed Description
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present embodiment, "a plurality" means two or more unless otherwise specified.
As the awareness of the user's privacy increases, records of access to private data by Applications (APP) begin to be exposed to the user. An operating system of an electronic device provides native services for managing private data, such as Application Operations management (AppOps) in an android system, which may also be referred to as Application operation authority management.
AppOps can perform authority management on operations on an electronic device related to user privacy security. When the application performs a certain operation, the AppOps can authenticate the operation of the application and determine whether the application has the authority of the operation. For example, the application has a right to acquire location information, a right to read a file, a right to acquire microphone information, a right to acquire camera information, and the like. AppOps, when authenticating the operation of an application, also records the authentication, e.g., records that the positioning application is allowed to obtain location information. The electronic equipment can obtain the authentication record of the native service by calling an interface provided by AppOps, and the authentication record is used as the access record of the user privacy data and is displayed to the user.
For example, when a third party application obtains location information, the third party application may invoke an interface for native satellite signals. Assuming that there are 3 satellites providing positioning services, the native service performs authentication to generate an access record when each satellite returns position information at the current time, that is, the native service records three position accesses. The third-party application needs to calculate the actual position of the user at the current moment through the position information returned by the three satellites, that is, the third-party application acquires the position information once, and the native service records three times of accesses. With the continuous update of the satellite signals, the times of acquiring the position information by the third-party application of the native service statistics become very high, and reach thousands of times per minute, which is obviously inconsistent with the positioning accuracy of the third-party application.
It can be seen that the access record provided by the native service is different from the access record of the application to the user private data, and the access record of the native service is not accurate. When the access record is presented to the user, it is difficult for the user to understand up to thousands of location accesses per minute, resulting in a record of private accesses that is of no reference to the user.
Based on this, in the embodiment of the application, when the electronic device detects that the sensitive interface is called, the mark type of the called sensitive interface can be identified, and the electronic device can determine the correction mode of the access record of the native service according to the mark type, so that the access record of the native service is corrected, and the correct access record is obtained and then displayed to the user. Compared with the prior art that the access records of the native service are directly displayed, the method and the device for displaying the access records of the native service can improve accuracy of the displayed access records and meet requirements of users on privacy protection.
Embodiments of the present embodiment will be described in detail below with reference to the accompanying drawings.
For example, the access record displaying method provided in the embodiment of the present application may be applied to electronic devices with a display function, such as a mobile phone, a tablet computer, a notebook computer, a Personal Computer (PC), a wearable electronic device (e.g., a smart watch), an Augmented Reality (AR) \ Virtual Reality (VR) device, an in-vehicle computer, and a smart home device, and the embodiment of the present application does not limit the present application.
Fig. 1 shows a schematic structural diagram of the electronic device. Specifically, as shown in fig. 1, the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a button 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identity Module (SIM) card interface 195, and the like.
It should be understood that the connection relationship between the modules according to the embodiment of the present invention is only illustrative and is not limited to the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also adopt different interface connection manners or a combination of multiple interface connection manners in the above embodiments.
The software system of the electronic device 100 may employ a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. The embodiment of the invention takes an Android system with a layered architecture as an example, and exemplarily illustrates a software structure of an electronic device (such as a mobile phone).
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. And the layers communicate with each other through an interface. In some embodiments, the Android system may include an application layer, an application framework layer, an Android runtime (Android runtime) and system library, a Hardware Abstraction Layer (HAL), and a kernel layer. It should be noted that, in the embodiment of the present application, it is shown by an Android system, for example, in other operating systems (for example, an Android system, an IOS system, and the like), as long as the functions implemented by the functional modules are similar to the embodiment of the present application, the scheme of the present application can also be implemented.
Wherein the application layer may include a series of application packages.
As shown in FIG. 2, the application package may include settings, gallery, music, location, video applications, and the like. Of course, the application layer may also include other application packages, such as a map, a video conference, bluetooth, a calendar, a shopping application, a chat application, and the like, which is not limited in this application.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions. For example, the system may include an activity manager, a window manager, a view system, an asset manager, a notification manager, etc., which is not limited in any way by the embodiments of the present application.
The system library may include a plurality of functional modules. For example: surface manager (surface manager), Media Libraries (Media Libraries), OpenGL ES, SGL, and the like.
The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
OpenGL ES is used to implement three-dimensional graphics drawing, image rendering, compositing, and layer processing, among others.
SGL is a drawing engine for 2D drawing.
An Android Runtime (Android Runtime) includes a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system. The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android. The application layer and the application framework layer run in a virtual machine. And executing java files of the application program layer and the application program framework layer into a binary file by the virtual machine. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The kernel layer is a layer between hardware and software. The kernel layer at least includes a display driver, a Camera driver, an audio driver, a sensor driver, and the like, which is not limited in the present application.
The hardware layers may include displays, sensors, cameras, microphones/speakers, etc.
The sensors may include touch sensors, fingerprint sensors, pressure sensors, gyroscope sensors, temperature sensors, and the like, among others.
Taking the above-mentioned electronic device 100 as a mobile phone as an example, the data display method provided in the embodiment of the present application may include the following steps:
s10: when the mobile phone detects that the sensitive interface is called, the mobile phone identifies the correction mode of the called sensitive interface. The modification is a modification of the access record to the sensitive interface.
A sensitive interface may refer to an interface that is capable of obtaining private data. The private data includes personal data of the user on the mobile phone, such as name, identification number, bank account number, location information, stored files, microphone information, camera information, etc., or other information that is not suitable for publication. Various services on the mobile phone, such as window native services, notification native services and the like, can enable an application program (APP) to obtain information of each service by providing an interface. The native interfaces refer to interfaces provided by an operating system, and the APP can acquire information of various services provided by the mobile phone operating system by calling the native interfaces. For example, the positioning APP can obtain the location information of the mobile phone through a native interface provided by the positioning service, thereby providing a navigation service for the user.
For example, all the native interfaces in the mobile phone may be used as the sensitive interfaces, or a part of the native interfaces may be screened out as the sensitive interfaces. For example, an interface for reading position information, an interface for reading a file, an interface for acquiring a satellite signal, an interface for acquiring a base station position, an interface for acquiring microphone information, an interface for acquiring camera information, and the like in the native interface may be used as the sensitive interface, which is not particularly limited in this embodiment.
In addition, the operating system also provides a native service for managing the operation authority, such as AppOps, through which the privacy security of the user can be improved. When the APP executes various operations, the AppOps authenticates the operation of the APP, and if the APP has the authority of executing the operation, the corresponding service responds to the operation. For example, when a video APP is to play a video file stored on a mobile phone, an interface provided by a file native service may be called to obtain the video file. The Appops can check whether the video APP has the file reading permission, if the file reading permission is authorized to the video APP, the file management service responds to calling of the video APP, returns the video file to the video APP, and plays the video file in the video APP. Meanwhile, the APP ops can record the operation of the authentication, for example, the APP ops can record the application of calling the interface, namely the video APP, the time of calling the interface, the type of the interface and the like. The one-time authentication record of the Appops can be used as a one-time access record, so that the native service realizes the function of providing the access record for the user. Through a corresponding interface provided by the AppOps, an access record of the AppOps can be acquired.
The modification mode of the sensitive interface refers to a modification mode of an access record (such as the access record of the AppOps) of the sensitive interface to the native service record. Illustratively, the modification may be to discard, keep, add, or delete the access record of the native service. Illustratively, when the modification of the sensitive interface a is to add an access record, it indicates that the access record of the sensitive interface a of the native service is to be added. If the modification mode of the sensitive interface A is to delete the access record, it indicates that the access record of the sensitive interface A of the native service needs to be deleted. The mobile phone can mark a correction mode in advance for each sensitive interface, and each correction mode can correspond to a mark type. The mark type can be words, numbers, letters, symbols and combinations thereof, for example, the mobile phone can mark the sensitive interface a as a number "1", and the modification mode corresponding to the number "1" can be to add an access record. Specifically, based on one-time access to sensitive information understood by a user, a modification mode for a sensitive interface which is rarely recorded by native services can be determined as increasing access records; the manner of modification to the native service multi-logged sensitive interface may be determined as pruning the access records.
The tag type corresponding to an add access record may be "add" and the tag type corresponding to a pruned access record may be "pruned". For example, as described above, the native service generates an authentication record, i.e., a second access record, when it authenticates the operation of the sensitive interface. Some sensitive interfaces can be cached after authentication, and cannot be authenticated when the sensitive interfaces are called again subsequently, that is, the subsequent operation cannot be recorded by the native service, so that the operation is only recorded once. For example, an interface of a file management service that reads files. For such sensitive interfaces, the flag type may be determined to be "increased".
For some interfaces to obtain location information, for example, the interface to obtain satellite signals "locationmanager. When the sensitive interface is called, the native service authenticates and records each satellite respectively, thereby generating a plurality of access records. For such sensitive interfaces, the flag type may be determined as "truncated".
The method can be used for testing various operation scenes of the sensitive interfaces in advance, and determining the condition that the access records of the native service records have deviation from the actual access of the application, thereby determining the mark type of each sensitive interface. After testing, it is found that the sensitive interface for acquiring the position information has too many access records, and the sensitive interface for acquiring the file information has too few access records. Then the tag type for the sensitive interface that acquired the location information may be determined to be "truncated" and the tag type for the sensitive interface that acquired the file information may be determined to be "increased". If the native service's access record for a sensitive interface is correct, then the sensitive interface may not set the flag type.
In addition, the mark type of the sensitive interface may also include other types, for example, the mark type may be "none" or "no correction", and the corresponding correction manner is to correct the access record. For example, taking some native interfaces (i.e., sensitive interfaces) commonly used by the android system for obtaining a location as an example, each sensitive interface and the corresponding mark type may be as shown in table 1 below:
TABLE 1
Interface Type of mark Description of the invention
LocationManager.getLastKnownLocation Is free of Obtaining previously cached location information
LocationManager.getCurrentLocation Is free of Obtaining current location information
LocationManager.requestLocationUpdates Is free of Obtaining periodic position changes
LocationManager.requestSingleUpdate Is free of Obtaining a single position
LocationManager.registerGnssStatusCallback Pruning Obtaining original signals of satellites
TelephonyManager.getCellLocation Is free of Obtaining base station location
TelephonyManager.getNeighboringCellInfo Is free of Obtaining nearby base station information
TelephonyManager.getAllCellInfo Is composed of Obtaining all base station information
Wherein, the flag type is "none" and indicates that the modification mode corresponding to the sensitive interface is not to modify the access record. It is understood that, for the mark types of other sensitive interfaces not shown in the above table, according to the actual situation, it may be "added", or "deleted" or "none"; also, the mark types of the sensitive interfaces illustrated in the above table are for example, and the actual mark types may also be represented by other characters, such as adding may be represented as "PERMISSION _ ADD _ RECORD", and subtracting may be represented as "PERMISSION _ DELETE _ LATER _ RECORD"; for example, "1" may mean addition, "0" may mean deletion, and the like, and the embodiment does not particularly limit the specific embodiment of the mark type.
S20: and the mobile phone generates a first access record of the first application to the sensitive interface according to the correction mode and the first application calling the sensitive interface.
The first application calls the one-time sensitive interface to be an operation, and the first access record is data generated by recording the operation of the first application and a correction mode of the operation. The first access record may specifically include a flag type, interface information of the called sensitive interface, information of the first application calling the sensitive interface, and the like. Illustratively, the first access record may include the following parameters: a permission type; uid; pid; the application package name; time; the type of label. The permission type is used for identifying the operation corresponding to the sensitive interface, and the permission types of different sensitive interfaces are different. For example, the permission type may be to acquire location information, modify file information, delete a file, and the like. uid (user identification) refers to the user identification of the first application. pid (process identification) refers to the process identity of the current operation of the first application. The application package name refers to a name of a package of the first application. The time is the time when the first application calls the sensitive interface. The tag type is the above tag type of the called sensitive interface, e.g., add.
Specifically, as shown in fig. 3, the mobile phone may include an APP 301, a service 302, a native service 303 and a data presentation module 304. The APP 301 is an application on a mobile phone, such as a location application, and the service 302 is a service providing a sensitive interface, such as a location service; the native service 303 is a service for managing APP operation rights, such as AppOps; the data presentation module 304 is a module in the mobile phone that executes the above-described access record presentation method.
The APP 301 may serve as the first application. The APP 301 obtains the location information of the mobile phone by calling an interface provided by the service 302 of the mobile phone, i.e. the sensitive interface a, thereby implementing the location. When the APP 301 calls the sensitive interface a provided by the service 302 to obtain the location information, the native service 303 authenticates the operation of obtaining the location information by the APP 301, and returns an authentication result. If the native service 303 verifies that the APP 301 has the right to obtain the location information, the service 302 will respond to the call of the APP 301 and return the location information to the APP 301 after receiving the authentication result. Meanwhile, the native service 303 records whether the operation of obtaining the location information by the APP 301 is allowed or not during authentication, and data recorded by the native service 303 during authentication can be used as an access record.
In this embodiment, the mobile phone may monitor all the sensitive interfaces, and when the mobile phone detects that the sensitive interface a is called, the data display module 304 may identify the tag type of the called sensitive interface a. The flag type is used to indicate a modification manner of an access record (i.e., a second access record recorded by the native service 303) of the sensitive interface a, and different flag types correspond to different modification manners. After identifying the mark type, the data presentation module 304 generates a first access record of the APP 301 to the sensitive interface a based on the mark type. Illustratively, by inserting corresponding codes into a code file originally executed by the mobile phone through an embedded technology, the data presentation module 304 may generate a first access record before the native service 303 authenticates the operation of the sensitive interface a.
For example, when the APP 301 calls the sensitive interface a, the data presentation module 304 may generate the first access record by: addPermissionRecord (opCode, uid, pid, packageName, time, PERMISSION _ DELETE _ LATER _ RECORD). Wherein addPermissionRecord is the name of the method that generated the first access record; opCode represents the privilege type; the packageName represents the application package name; time represents time; PERMISSION _ DELETE _ LATER _ RECORD is the type of label for sensitive interface A, i.e. the label type for sensitive interface A is pruned.
S30: the mobile phone acquires a second access record of the sensitive interface; the second access record is an access record of the first application of the native service record on the cell phone to the sensitive interface.
And the access record of the first application of the native service record to the sensitive interface is used as a second access record. That is, the authentication record of the sensitive interface by the native service may be used as the second access record, for example, the APP 301 recorded by the native 303 calls the authentication record of the sensitive interface a. The interface provided by the native service, such as the noteopenothow interface of AppOps, can use the functions of the native service, and is used to detect whether the application has the authority of a certain operation and record the authority. The mobile phone can acquire the information recorded by the interface as a second access record. The second access record is data for recording whether the access of the first application to the sensitive interface is allowed, and the first access record is data for recording a correction mode of the second access record.
Illustratively, the second access record may specifically include the uid, pid, time, permission type, and the like of the called sensitive interface. It is understood that the second access record may further include a parameter indicating whether the authentication is passed, i.e. the authentication result, or other parameters.
The time in the first access record may be earlier than the time in the second access record for the same application invoking the operation of the sensitive interface. Referring to fig. 3, when the APP 301 calls the sensitive interface a, the operation may be notified to the data presentation module 304, and the data presentation module 304 generates a first access record for the APP 301 calling the sensitive interface a based on the mark type. And then the native service authenticates the operation that the APP 301 calls the sensitive interface A, and the generated record is a second access record.
S40: the mobile phone receives a first operation of a user, and the first operation is used for triggering the mobile phone to display an access record of the sensitive interface.
The mobile phone may provide a control for triggering the access record of the presentation sensitive interface, and the first operation may be an operation of the user clicking the control. For example, a cell phone may provide the above-described controls in a setup application. When the icon of the setting application of the mobile phone is clicked, the mobile phone may display an interface of the setting application, as shown in fig. 4. The interface 400 for setting the application may include an option 401 for privacy access record, where a control corresponding to the option 401 for privacy access record is a control for triggering the access record for presenting the sensitive interface. When the cell phone receives an option 401 that the user clicks on the privacy access record, the cell phone may determine that the first operation is received.
S50: and the mobile phone responds to the first operation, corrects the second access record through the first access record, and obtains and displays a third access record.
The mark type in the first access record indicates a correction mode for the second access record, and the mobile phone can correct the second access record according to the correction mode indicated by the first access record. For example, when the first access record a is an addition, the mobile phone may add a second access record, and when the first access record b is a deletion, the mobile phone may delete a second access record. The second access record after the correction may be the third access record. The mobile phone may also perform statistics on the corrected second access record, and use the information obtained through the statistics, for example, the total number of times that the sensitive interface is accessed, and the number of times that the first application accesses the sensitive interface, as a third access record.
In some embodiments, when the second access record is modified, the mobile phone may first match the second access record corresponding to the first access record, so as to determine a modification manner of the second access record. Specifically, the first access record and the second access record may include different records of operations of the first application on the sensitive interface, and the mobile phone may correspond the access records of the first access record and the second access record for the same operation to each other. For example, the mobile phone may determine that the first access record and the second access record, which have the same uid, pid, and permission types, correspond to each other. For a first access record, e.g. first access record a, the second access record corresponding to the first access record a is taken as the target access record.
When the mobile phone detects an operation of the sensitive interface, a first access record for the operation and a second access record for the native service are generated at almost the same time. When the first access record and the second access record are matched, the mobile phone can determine two access records corresponding to each other according to time. Specifically, the mobile phone may obtain the access time recorded in the first access record a as the first access time, and then query, from the second access record, the second access time closest to the first access time, and then the second access record including the second access time is the target access record. That is, the second access record closest in time to the first access record corresponds to the first access record.
After the mobile phone matches the target access record corresponding to each first access record, the mobile phone can add or delete the target access record according to the mark type of the first access record. Specifically, if the mark type in the first access record is increased, the mobile phone may add a target access record, and if the mark type in the first access record is deleted, the mobile phone may discard the corresponding target access record. For example, for the first access record L, the mobile phone may query the corresponding target access record L1 from the second access record, if the type of the flag in the first access record L is increased, the mobile phone may add a same target access record L1 in the second access record, and if the type of the flag in the first access record L is deleted, the mobile phone may delete the target access record L1 in the second access record.
In some embodiments, different sensitive interfaces may add or subtract different numbers of access records. The mobile phone may set a correction degree for each sensitive interface in advance, for example, two access records are corrected each time, that is, two access records are added or deleted each time. Or, different correction manners may correspond to different correction degrees, for example, two access records are added corresponding to the increase type, one access record is decreased corresponding to the decrease type, and the like. For example, if the type of the flag in the first access record of the sensitive interface a is "add", and the corresponding correction degree is to correct two access records, the mobile phone may add two target access records in the second access record of the sensitive interface a. If the mark type of the first access record is 'delete' and the corresponding correction degree is to correct two access records, the mobile phone can reduce two target access records in the second access record.
After the target access record is added or deleted from the second access record, the mobile phone can count the second access record and determine the total access times of the first application to the sensitive interface. For example, the APP 301 has 100 total accesses to the sensitive interface a. The information obtained by statistics can be used as a third access record, that is, the number of times the first application accesses the sensitive interface. The first application can access the user privacy data through the sensitive interface, and the total times of calling the sensitive interface by the first application is the times of accessing the corresponding user privacy data by the first application.
The mobile phone can count the second access records after the adding and deleting processing according to a certain time period, and obtain the total number of times that the sensitive interface is allowed to be accessed in the certain time period and the number of times that the first application accesses the sensitive interface. Specifically, the mobile phone may sum the access records of the same sensitive interface by the first application within a certain time period, for example, add the access records of the first application APP 301 calling the sensitive interface a to obtain the total number of times that the first application APP 301 accesses the sensitive interface a within one minute. The user may determine, via the third access record, the total number of times the application accesses the sensitive interface in each time period, e.g., application 1 accesses the sensitive interface 100 times in the first minute, accesses the sensitive interface 100 times in the second minute, etc. Or, the mobile phone may respectively count the total number of times that each application accesses the sensitive interface for different applications, for example, 5 times that application 1 accesses the sensitive interface a, 10 times that application 2 accesses the sensitive interface a, and the like.
In other embodiments, the mobile phone may count the first access records in a certain time period, and determine the total number of revisions of the first access records. Then, the mobile phone counts the total number of times of calling each sensitive interface in the second access record in the time period, and combines the results of the two times of counting to obtain a third access record.
Specifically, the mobile phone calculates the number of the same records in the first access record, that is, adds the first access records with the same authority type, uid, pid, and mark type to obtain the total correction times required to be corrected corresponding to the authority type. For example, if there are 2 first access records, the first access record L1 and the first access record L2 are both obtained satellite signals by applying 1, and the type of the flag corresponding to the interface for obtaining satellite signals is truncated, the statistical result is that the obtained satellite signals are truncated 2 times in total. And then, counting the second access record, and combining the total times obtained by counting with the total correction times to obtain a final third access record. For example, if the total number of times of acquiring the satellite signal after the second access record statistics is 100 times, the total number of times of accessing the record after the combination is 100-2 times to 98 times. Similarly, if the statistical result corresponding to the record of obtaining the file by applying 2 in the first access record is increased by 5 times, and the total number of times of obtaining the file by applying 2 after the second access record is counted is 1 time, the final third access record is: the number of times the application 2 acquires a file is 3.
In an exemplary embodiment, the mobile phone may count the number of times that the application is allowed to access or denied to access according to the modified second access record, respectively, as a third access record. The second access record may include an authentication result, and the mobile phone may determine whether the access type corresponding to the second access record is access permission or access denial according to the authentication result. According to the access type corresponding to each second access record, the mobile phone can respectively count the access times corresponding to the allowed access and the access times corresponding to the refused access, and therefore the counted result is used as a third access record to be displayed to the user. For example, the third access record is: application 1 is allowed to acquire the file 3 times and denied to acquire the file 2 times.
The mobile phone can provide a display page (namely the first page) with a privacy access record in response to the first operation, and the third access record obtained after the modification is displayed on the display page. Compared with the access record (namely, the second access record) for directly displaying the native service record, in the embodiment, the second access record is corrected by using the first access record, so that the accuracy of the access record can be improved, the user can be guaranteed to browse the correct and understandable access record, and the privacy protection experience of the user can be improved.
The third access record may be exposed according to a different application. The mobile phone can display all the applications calling the sensitive interface A in the preset time length and the access times of each application in the preset time length, so that a user can clearly browse the access times of each application to the sensitive interface. The third access record may also be presented in chronological order. The mobile phone can display the access times of the first application to the sensitive interface in each preset time period according to the time sequence, so that a user can know the calling of the application to the sensitive interface at different time points, and the privacy protection experience of the user is improved.
Illustratively, as shown in fig. 5, in the presentation page 500 of the private access records, the third access records are displayed in chronological order. According to a preset time period of one minute, the mobile phone can display the first application accessing the sensitive interface every minute, and the access times. For example, the number of times of map acquisition position information is 102 in one minute from 8 o 'clock 18 to 8 o' clock 19. In the embodiment, after the access record is corrected, the problem that the frequency of acquiring the position information by the application exceeds the application positioning precision is avoided, and the accuracy of the displayed information can be improved.
The third access record may also be separately presented according to different applications, and fig. 6 illustrates an interface in which the third access record is presented according to different applications. As shown in fig. 6, the number of times that each application accesses the sensitive interface may be displayed in a display page 600 of the mobile phone, where the number of times may be a preset number of times, for example, a day, a week, and the like. For example, a mobile phone may show the number of times each application accesses a sensitive interface in a day, for example, 1000 times for map acquisition of location information, 10 times for call acquisition of microphone information, 5 times for video acquisition of files, 10 times for music acquisition of files, and so on.
For example, the mobile phone may provide a switching control to switch the third access record from being exposed according to the time period to being exposed according to the application. With reference to fig. 5, the presentation page 500 may provide a control 501, and when the mobile phone detects a click operation of the user at a position corresponding to the control 501, for example, when the click operation is detected at an "application", the mobile phone may switch from the current display mode according to time to display a third access record according to the application, that is, switch the presentation page 500 to the presentation page 600. In addition, the triggering mode of the control 501 may also be other modes, for example, when the mobile phone receives an operation of sliding from left to right by the user, the display mode is switched to display according to the application; and when receiving that the user slides from right to left, switching the display mode into time display.
It should be understood that, in the above embodiments, the access record displaying method is executed in a mobile phone as an example, but the access record displaying method provided in the present embodiment may also be applied to other electronic devices such as a tablet computer, a personal computer, a wearable electronic device, and the like, which is not limited in this application.
An embodiment of the present application further provides an electronic device, which may include: a memory and one or more processors. The memory is for storing computer program code comprising computer instructions. When the processor executes the computer instructions, the electronic device may perform various functions or steps performed by the mobile phone in the above-described method embodiments. The structure of the electronic device may refer to the structure of the electronic device 100 shown in fig. 1.
The embodiment of the present application further provides a computer storage medium, where the computer storage medium includes computer instructions, and when the computer instructions are run on an electronic device, the electronic device is caused to perform each function or step performed by a mobile phone in the foregoing method embodiment.
The embodiment of the present application further provides a computer program product, which when running on a computer, causes the computer to execute each function or step executed by the mobile phone in the above method embodiments.
Through the description of the foregoing embodiments, it will be clear to those skilled in the art that, for convenience and simplicity of description, only the division of the functional modules is used for illustration, and in practical applications, the above function distribution may be completed by different functional modules as required, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the modules or units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another device, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, that is, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. An access record presentation method, comprising:
when the electronic equipment detects that a sensitive interface is called, the electronic equipment identifies a correction mode corresponding to the sensitive interface, wherein the correction mode is a correction mode of an access record of the sensitive interface;
the electronic equipment generates a first access record of the first application to the sensitive interface according to the correction mode and the first application calling the sensitive interface;
the electronic equipment acquires a second access record of the sensitive interface; wherein the second access record is of the sensitive interface of the first application of a native service record of the electronic device;
the electronic equipment receives a first operation of a user, wherein the first operation is used for triggering the electronic equipment to display an access record of the sensitive interface;
and responding to the first operation, the electronic equipment corrects the second access record based on the first access record, obtains a third access record, and displays the third access record.
2. The method of claim 1, wherein the modification is adding access records or deleting access records;
the electronic device corrects the second access record based on the first access record to obtain a third access record, and the method includes:
the electronic equipment performs addition and deletion processing on the second access record based on the correction mode in the first access record;
and the electronic equipment counts the access times of the first application to the sensitive interface according to the second access record after the addition and deletion processing, and the access times are used as the third access record.
3. The method according to claim 2, wherein the electronic device performs an add/delete process on the second access record based on the correction manner in the first access record, and the method comprises:
the electronic equipment matches a target access record from the second access record according to the first access time recorded in the first access record; wherein the second access time recorded in the target access record is closest to the first access time recorded in the first access record;
if the modification mode in the first access record is to add an access record, the electronic equipment adds one target access record in the second access record;
and if the correction mode in the first access record is deleting access records, the electronic equipment deletes the target access record in the second access record.
4. A method according to claim 2 or 3, characterized in that the method further comprises:
the electronic equipment determines the correction degree of the sensitive interface, wherein the correction degree is the number of access records to be added or deleted each time the access records of the sensitive interface are corrected;
the electronic device performs addition and deletion processing on the second access record based on the correction mode in the first access record, and the method comprises the following steps:
and the electronic equipment performs addition and deletion processing on the second access record according to the correction degree based on the mark type in the first access record.
5. The method of any of claims 2-4, wherein the electronic device revises the second access record based on the first access record to obtain a third access record, comprising:
the electronic equipment counts a plurality of first access records of the sensitive interface to obtain the total correction times of the access records of the first application to the sensitive interface;
the electronic equipment counts a plurality of second access records of the sensitive interface to obtain the total access times of the first application to the sensitive interface;
and the electronic equipment corrects the total access times by adopting the total correction times to obtain the third access record.
6. The method according to any one of claims 1 to 5, wherein the generating, by the electronic device, a first access record of the first application to the sensitive interface according to the modification mode and the first application that calls the sensitive interface includes:
the electronic device generates the first access record before the native service records the second access record.
7. The method of claim 1, wherein the sensitive interface comprises at least one of an interface for obtaining location information and an interface for obtaining a file;
the correction mode corresponding to the interface for acquiring the position information is to delete the access record, and the correction mode corresponding to the interface for acquiring the file is to add the access record.
8. The method of claim 1, further comprising:
the electronic equipment displays a first page, and the access times of a first application to the sensitive interface in a preset time period are displayed on the first page according to a time sequence; alternatively, the first and second electrodes may be,
the electronic equipment displays a first page, calls each application of the sensitive interface within a preset time length and accesses times of each application.
9. An electronic device, comprising:
a touch screen comprising a touch sensor and a display screen;
one or more processors;
a memory;
a communication interface;
wherein the memory has stored therein one or more computer programs, the one or more computer programs comprising instructions, which when executed by the electronic device, cause the electronic device to perform an access record presentation method as claimed in any one of claims 1-8.
10. A computer-readable storage medium having instructions stored thereon, which when run on an electronic device, cause the electronic device to perform an access record presentation method as claimed in any one of claims 1-8.
11. A computer program product, which, when run on an electronic device, causes the electronic device to perform a method of presenting an access record as claimed in any one of claims 1 to 8.
CN202111343104.9A 2021-11-12 2021-11-12 Access record display method and electronic equipment Active CN115033910B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111343104.9A CN115033910B (en) 2021-11-12 2021-11-12 Access record display method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111343104.9A CN115033910B (en) 2021-11-12 2021-11-12 Access record display method and electronic equipment

Publications (2)

Publication Number Publication Date
CN115033910A true CN115033910A (en) 2022-09-09
CN115033910B CN115033910B (en) 2023-04-07

Family

ID=83118158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111343104.9A Active CN115033910B (en) 2021-11-12 2021-11-12 Access record display method and electronic equipment

Country Status (1)

Country Link
CN (1) CN115033910B (en)

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050257265A1 (en) * 2003-06-11 2005-11-17 Cook Randall R Intrustion protection system utilizing layers
JP2011076541A (en) * 2009-10-01 2011-04-14 Hitachi Solutions Ltd Information leakage prevention program and starting recording program
US8327324B1 (en) * 2008-09-29 2012-12-04 Emc Corporation Message logging system
CN103927198A (en) * 2014-03-19 2014-07-16 北京奇虎科技有限公司 Software clearing method and software clearing device
US20150169616A1 (en) * 2010-12-09 2015-06-18 Tako Technology Ltd. Systems and methods for providing continuing access to a remote computer program
CN106991130A (en) * 2017-03-07 2017-07-28 广东欧珀移动通信有限公司 A kind of document handling method, device and intelligent terminal
CN108665297A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Detection method, device, electronic equipment and the storage medium of abnormal access behavior
CN108694329A (en) * 2018-05-15 2018-10-23 中国科学院信息工程研究所 A kind of mobile intelligent terminal security incident based on software and hardware combining is credible record system and method
CN109492391A (en) * 2018-11-05 2019-03-19 腾讯科技(深圳)有限公司 A kind of defence method of application program, device and readable medium
CN109992489A (en) * 2018-12-29 2019-07-09 上海连尚网络科技有限公司 It is a kind of for monitoring the method and apparatus for the process performing applied in user equipment
CN110825465A (en) * 2019-11-06 2020-02-21 北京达佳互联信息技术有限公司 Log data processing method and device, electronic equipment and storage medium
US10628263B1 (en) * 2013-08-02 2020-04-21 David Cowen Logfile-related technologies and techniques
CN111353146A (en) * 2020-05-25 2020-06-30 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for detecting sensitive permission of application program
CN112231667A (en) * 2020-11-09 2021-01-15 腾讯科技(深圳)有限公司 Identity verification method, device, storage medium, system and equipment
CN112685370A (en) * 2020-12-17 2021-04-20 福建新大陆软件工程有限公司 Log collection method, device, equipment and medium
CN113051229A (en) * 2019-12-26 2021-06-29 中兴通讯股份有限公司 User data acquisition method, device, terminal and readable storage medium
WO2021155127A1 (en) * 2020-01-31 2021-08-05 Reliant Immune Diagnostics, Inc. Automated data record classification and methods of use thereof
WO2021155103A1 (en) * 2020-01-31 2021-08-05 Reliant Immune Diagnostics, Inc. Automated dynamic generation of interface sequences for data record creation and methods of use thereof
CN113312241A (en) * 2021-06-29 2021-08-27 中国农业银行股份有限公司 Abnormal alarm method, access log generation method and operation and maintenance system

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050257265A1 (en) * 2003-06-11 2005-11-17 Cook Randall R Intrustion protection system utilizing layers
US8327324B1 (en) * 2008-09-29 2012-12-04 Emc Corporation Message logging system
JP2011076541A (en) * 2009-10-01 2011-04-14 Hitachi Solutions Ltd Information leakage prevention program and starting recording program
US20150169616A1 (en) * 2010-12-09 2015-06-18 Tako Technology Ltd. Systems and methods for providing continuing access to a remote computer program
US10628263B1 (en) * 2013-08-02 2020-04-21 David Cowen Logfile-related technologies and techniques
CN103927198A (en) * 2014-03-19 2014-07-16 北京奇虎科技有限公司 Software clearing method and software clearing device
CN106991130A (en) * 2017-03-07 2017-07-28 广东欧珀移动通信有限公司 A kind of document handling method, device and intelligent terminal
CN108665297A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Detection method, device, electronic equipment and the storage medium of abnormal access behavior
CN108694329A (en) * 2018-05-15 2018-10-23 中国科学院信息工程研究所 A kind of mobile intelligent terminal security incident based on software and hardware combining is credible record system and method
CN109492391A (en) * 2018-11-05 2019-03-19 腾讯科技(深圳)有限公司 A kind of defence method of application program, device and readable medium
CN109992489A (en) * 2018-12-29 2019-07-09 上海连尚网络科技有限公司 It is a kind of for monitoring the method and apparatus for the process performing applied in user equipment
CN110825465A (en) * 2019-11-06 2020-02-21 北京达佳互联信息技术有限公司 Log data processing method and device, electronic equipment and storage medium
CN113051229A (en) * 2019-12-26 2021-06-29 中兴通讯股份有限公司 User data acquisition method, device, terminal and readable storage medium
WO2021155127A1 (en) * 2020-01-31 2021-08-05 Reliant Immune Diagnostics, Inc. Automated data record classification and methods of use thereof
WO2021155103A1 (en) * 2020-01-31 2021-08-05 Reliant Immune Diagnostics, Inc. Automated dynamic generation of interface sequences for data record creation and methods of use thereof
CN111353146A (en) * 2020-05-25 2020-06-30 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for detecting sensitive permission of application program
CN112231667A (en) * 2020-11-09 2021-01-15 腾讯科技(深圳)有限公司 Identity verification method, device, storage medium, system and equipment
CN112685370A (en) * 2020-12-17 2021-04-20 福建新大陆软件工程有限公司 Log collection method, device, equipment and medium
CN113312241A (en) * 2021-06-29 2021-08-27 中国农业银行股份有限公司 Abnormal alarm method, access log generation method and operation and maintenance system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
陈震等: "移动网络软件架构中的安全技术研究", 《信息网络安全》 *
韦伟等: "基于内核层文件补丁的自启动方法研究", 《信息网络安全》 *

Also Published As

Publication number Publication date
CN115033910B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN113032766B (en) Application authority management method and device
KR102498815B1 (en) Electronic device and method for editing video thereof
KR20170101159A (en) A method and device for device state based encryption key
KR20170084934A (en) Electronic apparatus and method for authentication of identification information thereof
CN110084035B (en) Electronic device and method for suggesting a response guide when a rejection occurs
KR20150099341A (en) A method for editting one or more objects and an eletronic device therefor
CN108401167B (en) Electronic device and server for video playback
KR20140112399A (en) Application access control method and electronic device implementing the same
CN116302275A (en) Desensitization data display method and device, intelligent wearing equipment and augmented reality glasses
CN110825465B (en) Log data processing method and device, electronic equipment and storage medium
CN115033910B (en) Access record display method and electronic equipment
CN107071008B (en) Terminal equipment positioning method, device and equipment
KR20170059082A (en) File operation processing method and electronic device supporting the same
CN108139811B (en) Method of recording execution screen and electronic device processing the same
KR20160063793A (en) Electronic device and method for transmitting and receiving information in the electronic device
CN115017495B (en) Timing verification method, electronic device, and readable storage medium
CN116628773A (en) Data processing method, device, electronic equipment and storage medium
CN108132817B (en) Object management method and device
CN110222506A (en) Detection method, device, equipment and storage medium are applied fastly
CN114816600B (en) Session message display method, device, terminal and storage medium
WO2022193142A1 (en) Behavior monitoring method and apparatus, terminal device, and computer readable storage medium
CN112597417B (en) Page updating method and device, electronic equipment and storage medium
CN113642010B (en) Method for acquiring data of extended storage device and mobile terminal
CN111158748B (en) Information acquisition method and device and storage medium
CN112860625A (en) Data acquisition method, data storage method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant