WO2017050056A1 - 应用安全保护处理方法、装置及终端设备 - Google Patents
应用安全保护处理方法、装置及终端设备 Download PDFInfo
- Publication number
- WO2017050056A1 WO2017050056A1 PCT/CN2016/094814 CN2016094814W WO2017050056A1 WO 2017050056 A1 WO2017050056 A1 WO 2017050056A1 CN 2016094814 W CN2016094814 W CN 2016094814W WO 2017050056 A1 WO2017050056 A1 WO 2017050056A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- security protection
- sample
- icon
- terminal device
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/031—Protect user input by software means
Definitions
- the present application relates to the field of communications technologies, and in particular, to an application security protection processing method, apparatus, and terminal device.
- the present application aims to solve at least one of the technical problems in the related art to some extent.
- the first aspect of the present application provides an application security protection processing method, including: acquiring a sample application from an application on a terminal device; and performing image processing on the first sample icon of the sample application. a second sample icon having a protection mark; displaying an application security protection prompt message carrying the second sample icon on an interface of the terminal device.
- the application security protection processing method of the embodiment of the present application first obtains a sample application from an application on the terminal device; then performs image processing on the first sample icon of the sample application to generate a second sample icon with a protection mark; An application security protection prompt message carrying the second sample icon is displayed on an interface of the terminal device. Therefore, the user is promptly reminded to perform security monitoring and management of the system for various applications on the current terminal device to improve reliability and security.
- the obtaining the sample application from the application on the terminal device includes:
- the highest ranked application is obtained from the application on the terminal device as a sample application.
- the obtaining the sample application from the application on the terminal device includes:
- the application that has been used by the user for the longest time in the preset time is obtained from the user log as a sample application.
- the image processing of the first sample icon of the sample application generates a second sample icon having a protection mark, including:
- the user interface layer is drawn with a protection mark that matches the boundary of the protection area
- the user interface layer is overlaid onto the first sample icon such that the protection mark covers the protected area, and a second sample icon having the protection mark is generated.
- the parameter information of the protection tag includes:
- Shape information Color information, and size information.
- the method further includes:
- the security protection instruction includes: at least one security protection type
- the method further includes:
- a security protection prompt message carrying the second icon is displayed on an interface of the terminal device.
- the device monitors whether the storage capacity of the related application is greater than a preset corresponding threshold. If yes, it is learned that the running state of the related application triggers the corresponding security policy.
- the second aspect of the present application provides an application security protection processing apparatus, including: a first acquisition module, configured to acquire a sample application from an application on the terminal device; and a first processing module, configured to The first sample icon of the sample application performs image processing to generate a second sample icon having a protection mark; the first prompting module is configured to display an application security protection carrying the second sample icon on an interface of the terminal device Prompt message.
- the application security protection processing device of the embodiment of the present application acquires a sample application from an application on the terminal device by using the first acquiring module, and performs image processing on the first sample icon of the sample application by the first processing module to generate a protection mark. And displaying, by the first prompting module, an application security protection prompt message carrying the second sample icon on an interface of the terminal device. Therefore, the user is promptly reminded to perform security monitoring and management of the system for various applications on the current terminal device to improve reliability and security.
- the first acquiring module includes:
- a first querying unit configured to acquire a country name of the user according to the auxiliary information on the terminal device, query a correspondence between a pre-stored country name and an application ranking list, and obtain a name corresponding to the country name of the user.
- Application ranking list configured to acquire a country name of the user according to the auxiliary information on the terminal device, query a correspondence between a pre-stored country name and an application ranking list, and obtain a name corresponding to the country name of the user.
- the first obtaining unit is configured to obtain, according to the application ranking list, the highest ranked application from the application on the terminal device as a sample application.
- the first acquiring module includes:
- a second query unit configured to query a user log of the terminal device
- the second obtaining unit is configured to obtain, from the user log, an application that is used by the user for the longest time in a preset time as a sample application.
- the first processing module includes:
- a determining unit configured to determine, on the first sample icon, a protection area corresponding to the protection mark
- a generating unit configured to generate a user interface layer, where the user interface layer is drawn with a protection mark that matches the boundary of the protection area;
- a synthesizing unit configured to overlay the user interface layer onto the first sample icon, so that the protection mark covers the protection area, and generate a second sample icon having the protection mark.
- the parameter information of the protection tag includes:
- Shape information Color information, and size information.
- the method further includes:
- a receiving module configured to: after sending an application security protection prompt message carrying the second sample icon to a user, receiving a security protection instruction sent by the user, where the security protection instruction includes: at least one security protection type;
- a matching module configured to acquire, according to an application function on the terminal device, a related application that matches the security protection type
- a second processing module configured to perform image processing on the first icon of the related application to generate a second icon having a protection mark
- a storage module configured to store a correspondence between the application identifier of the related application and the second icon.
- the method further includes:
- a monitoring module configured to monitor an operating state of the related application according to a preset security policy corresponding to the security protection type
- a second acquiring module configured to: if it is determined that the running state of the related application triggers the corresponding security policy, query the corresponding relationship, and acquire a second icon with a protection mark corresponding to the application identifier of the related application;
- the second prompting module is configured to display, on the interface of the terminal device, a security protection prompt message carrying the second icon.
- the monitoring module is configured to monitor whether the power consumption and/or the temperature of the related application exceeds a preset threshold. If yes, it is learned that the running state of the related application triggers the corresponding security policy.
- the monitoring module is configured to monitor whether the interaction information of the related application includes preset sensitive information. If yes, it is learned that the running status of the related application triggers the corresponding security policy.
- the monitoring module is specifically configured to monitor whether the storage capacity of the related application is greater than a preset corresponding threshold, and if yes, it is learned that the running state of the related application triggers a corresponding security policy.
- a third aspect of the present application provides a terminal device including: a housing, a processor, a receiver, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed in the housing Inside the enclosed space, the processor and the memory are disposed on the circuit board; the power circuit is configured to be used for each terminal of the terminal device The circuit or the device is powered; the memory is for storing executable program code; the processor is configured to execute a program corresponding to the executable program code by reading the executable program code stored in the memory for execution: The application security protection processing method.
- the terminal device of the embodiment of the present application acquires a sample application from an application on the terminal device by using a security protection processing device, and performs image processing on the first sample icon of the sample application to generate a second sample icon having a protection mark; An application security protection prompt message carrying the second sample icon is displayed on an interface of the terminal device. Therefore, the user is promptly reminded to perform security monitoring and management of the system for various applications on the current terminal device to improve reliability and security.
- the fourth aspect of the present application proposes a storage medium storing one or more modules, when the one or more modules are executed by an electronic device, causing the electronic Device: Performs the application security protection processing method as described above.
- an embodiment of the fifth aspect of the present application provides an application program for performing an application security protection processing method as described above at runtime.
- FIG. 1 is a flowchart of an application security protection processing method according to an embodiment of the present application
- FIG. 2 is a schematic diagram 1 of an effect of applying a security protection prompt message
- FIG. 3 is a flowchart of an application security protection processing method according to another embodiment of the present application.
- FIG. 4 is a flowchart of an application security protection processing method according to another embodiment of the present application.
- FIG. 5 is a second schematic diagram of an effect of applying a security protection prompt message
- FIG. 6 is a schematic structural diagram of an application security protection processing apparatus according to an embodiment of the present application.
- FIG. 7 is a schematic structural diagram of an application security protection processing apparatus according to another embodiment of the present application.
- FIG. 8 is a schematic structural diagram of an application security protection processing apparatus according to another embodiment of the present application.
- FIG. 9 is a schematic structural diagram of an application security protection processing apparatus according to another embodiment of the present application.
- FIG. 10 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
- FIG. 1 is a flowchart of an application security protection processing method according to an embodiment of the present application.
- the application security protection processing method includes:
- the user installs at least one application on the terminal device according to the requirements of the user. Therefore, the sample application is obtained from the application used by the user, and the security protection prompt of the application is performed for the user, so that the user has more direct knowledge of the necessity of security protection.
- the sample application from the application on the terminal device, and the method may be selected according to the actual application requirements.
- the obtaining the sample application from the application on the terminal device includes:
- the highest ranked application is obtained from the application on the terminal device as a sample application.
- the name of the country where the user is located is obtained according to the auxiliary information on the terminal device, where the auxiliary information on the terminal device has many forms of expression, such as an interface language of the operating system, an input method language of the user, and an open webpage.
- the correspondence between the country name and the application ranking list is a regularly updated database, and the database source can be many, which records the current most popular application ranking list in each country. Therefore, by querying the correspondence, an application ranking list corresponding to the name of the country where the user is located can be obtained.
- the highest ranked application is obtained from the application on the terminal device as a sample application. That is to say, the most popular application on the terminal device is determined according to the application ranking on the application ranking list, and the application is used as a sample application.
- Taiwan determines that the most popular application on the mobile phone is LINE according to the application ranking list corresponding to Taiwan, and LINE is used as a sample application; for example, users in the US region are ranked according to the application corresponding to the United States.
- the list determines that the most popular application on the phone is Whatsapp, which will use Whatsapp as a sample application; for example, users in mainland China determine the hottest application on the mobile phone as WeChat based on the app ranking list corresponding to mainland China. Will use WeChat as a sample application.
- the obtaining the sample application from the application on the terminal device includes:
- the application that has been used by the user for the longest time in the preset time is obtained from the user log as a sample application.
- the user log of the terminal device is first queried, and the user logs record the details of various applications on the terminal device, including the frequency of use and the time of use.
- the application that has been used by the user for the longest time in the preset time is obtained from the user log as a sample application.
- the parameter information of the protection mark includes: shape information, color information, and size
- the parameter information of the protection mark includes: shape information, color information, and size
- the information and the protection mark have many expressions, and can be selected according to actual application requirements. This embodiment does not limit this, such as a shield form, but the specific form is not limited thereto, and is used to represent or identify the provider name or other application. Forms can be used.
- Image processing the first sample icon to generate a second sample icon with a protection mark can be done in a number of ways, including: direct mode and indirect mode.
- the direct method is to directly generate and generate a second sample icon with a protection mark according to the style of the first sample icon and the protection mark by using image creation software.
- an indirect generation method which specifically includes:
- a protection area corresponding to the protection mark is determined on the first sample icon, and then a user interface layer is generated.
- a protection mark matching the boundary of the protection area is drawn on the user interface layer, and finally the user interface layer is overlaid to the first sample icon. Up, thereby causing the protection mark to cover the protected area, generating a second sample icon with a protective mark.
- FIG. 2 is a schematic diagram 1 of an effect of applying a security protection prompt message.
- the application security protection processing method of the embodiment of the present application first obtains a sample application from an application on the terminal device; then performs image processing on the first sample icon of the sample application to generate a second sample icon with a protection mark; An application security protection prompt message carrying the second sample icon is displayed on an interface of the terminal device. Therefore, the user is promptly reminded to perform security monitoring and management of the system for various applications on the current terminal device to improve reliability and security.
- FIG. 3 is a flowchart of an application security protection processing method according to another embodiment of the present application.
- the application security protection processing method further includes:
- 201 Receive a security protection instruction sent by the user, where the security protection instruction includes: at least one security protection type.
- the security protection command is sent according to the security type to be protected, wherein
- the security protection instructions include: at least one type of security protection. It should be noted that there are many types of security protection, and users can choose according to their needs, such as power usage monitoring, memory usage monitoring, temperature usage monitoring, and information privacy protection.
- the security protection command sent by the user is parsed to obtain at least one security protection type, and the related application matching the security protection type is obtained according to the application function on the terminal device.
- the security protection type is power usage monitoring
- the type of security protection is information privacy protection, social applications need to be monitored.
- Performing image processing on the first icon of the related application to generate a second icon having a protection mark wherein the parameter information of the protection mark includes: shape information, color information, and size information, and the protection mark has many expression forms, which may be applied according to an actual application. There is a need to make a selection, and this embodiment does not limit this, such as a shield form.
- the image processing of the first icon of the related application to generate the second icon with the protection mark can be performed in a plurality of ways, including a direct mode and an indirect mode.
- a direct mode for details, refer to 102, and details are not described herein again.
- the correspondence between the application identifier of the related application and the second icon with the protection mark is stored, so that the call is made when the security prompt is subsequently performed.
- the application security protection processing method of the embodiment of the present application first receives a security protection command sent by the user, where the security protection instruction includes: at least one security protection type; and then acquiring the security protection type according to an application function on the terminal device. And matching the related application, and performing image processing on the first icon of the related application to generate a second icon having a protection mark; and finally storing a correspondence between the application identifier of the related application and the second icon.
- the security monitoring management of the terminal application is realized to improve reliability and security.
- FIG. 4 is a flowchart of an application security protection processing method according to another embodiment of the present application.
- the application security protection processing method further includes:
- the operating state of the related application is monitored according to a preset security policy corresponding to the security protection type, and the security policy is adjusted according to the specific security protection type.
- An example of the monitoring process is as follows:
- FIG. 5 is a schematic diagram 2 of an effect of applying a security protection prompt message.
- the storage quantity of the related application is greater than the preset corresponding threshold, if it is determined that the storage quantity of the related application is greater than the preset corresponding threshold, it is learned that the running status of the related application triggers the corresponding security policy. If it is determined that the storage amount of the relevant application is less than or equal to the preset corresponding threshold, it is known that the running state of the related application does not trigger the corresponding security policy.
- the application security protection processing method in the embodiment of the present application first monitors the running state of the related application according to a preset security policy corresponding to the security protection type; if it is determined that the running state of the related application is triggered, the corresponding The security policy queries the corresponding relationship, and obtains a second icon with a protection mark corresponding to the application identifier of the related application; and displays a security protection prompt message carrying the second icon on the interface of the terminal device. Therefore, the user is promptly reminded to perform security monitoring and management of various applications for various applications on the current terminal device, so as to improve reliability and security.
- the present application also proposes an application security protection processing device.
- FIG. 6 is a schematic structural diagram of an application security protection processing apparatus according to an embodiment of the present application.
- the application security protection processing device includes: a first acquisition module 11, a first processing module 12, and a first prompt module 13.
- the first obtaining module 11 is configured to obtain a sample application from an application on the terminal device.
- the first processing module 12 is configured to perform image processing on the first sample icon of the sample application to generate a second sample icon having a protection mark.
- the first prompting module 13 is configured to display an application security protection prompt message carrying the second sample icon on an interface of the terminal device.
- the application security protection processing device of the embodiment of the present application first obtains a sample application from an application on the terminal device; then performs image processing on the first sample icon of the sample application to generate a second sample icon with a protection mark; An application security protection prompt message carrying the second sample icon is displayed on an interface of the terminal device. Therefore, the user is promptly reminded to perform security monitoring and management of the system for various applications on the current terminal device to improve reliability and security.
- FIG. 7 is a schematic structural diagram of an application security protection processing apparatus according to another embodiment of the present application.
- the first obtaining module 11 includes: a first query unit 111 and a first acquisition.
- the unit 112, or the first obtaining module 11 includes: a second query unit 113 and a second obtaining unit 114.
- the first querying unit 111 is configured to obtain the country name of the user according to the auxiliary information on the terminal device, query the correspondence between the pre-stored country name and the application ranking list, and obtain the corresponding country name of the user. App ranking list.
- the first obtaining unit 112 is configured to obtain a ranking from an application on the terminal device according to the application ranking list.
- the highest application is used as a sample application.
- the second query unit 113 is configured to query a user log of the terminal device.
- the second obtaining unit 114 is configured to obtain, from the user log, an application that is used by the user for the longest time in the preset time as a sample application.
- the first processing module 12 includes: a determining unit 121, a generating unit 122, and a synthesizing unit 123.
- the determining unit 121 is configured to determine a protection area corresponding to the protection mark on the first sample icon.
- the generating unit 122 is configured to generate a user interface layer, and the user interface layer is drawn with a protection mark that matches the boundary of the protection area.
- the synthesizing unit 123 is configured to cover the user interface layer onto the first sample icon, so that the protection mark covers the protection area, and generate a second sample icon having the protection mark.
- the parameter information of the protection mark includes: shape information, color information, and size information.
- the application security protection processing device of the embodiment of the present application first obtains a sample application from an application on the terminal device; then performs image processing on the first sample icon of the sample application to generate a second sample icon with a protection mark; An application security protection prompt message carrying the second sample icon is displayed on an interface of the terminal device. Therefore, the user is promptly reminded to perform security monitoring and management of the system for various applications on the current terminal device to improve reliability and security.
- FIG. 8 is a schematic structural diagram of an application security protection processing apparatus according to another embodiment of the present application. As shown in FIG. 8 , based on the foregoing embodiment, with reference to FIG. 6 , the apparatus further includes: a receiving module 14 , a matching module 15 , The second processing module 16 and the storage module 17.
- the receiving module 14 is configured to receive, after the user sends the application security protection prompt message carrying the second sample icon, the security protection instruction sent by the user, where the security protection instruction comprises: at least one security protection type.
- the matching module 15 is configured to acquire, according to an application function on the terminal device, a related application that matches the security protection type.
- the second processing module 16 is configured to perform image processing on the first icon of the related application to generate a second icon having a protection mark.
- the storage module 17 is configured to store a correspondence between the application identifier of the related application and the second icon.
- the application security protection processing device of the embodiment of the present application first receives a security protection command sent by the user, where the security protection instruction includes: at least one security protection type; and then acquiring the security protection type according to an application function on the terminal device. And matching the related application, and performing image processing on the first icon of the related application to generate a second icon having a protection mark; and finally storing a correspondence between the application identifier of the related application and the second icon.
- FIG. 9 is a schematic structural diagram of an application security protection processing apparatus according to another embodiment of the present application. As shown in FIG. 9, the apparatus further includes: a monitoring module 18, a second obtaining module 19, and a first Two prompt module 20.
- the monitoring module 18 is configured to monitor an operating state of the related application according to a preset security policy corresponding to the security protection type.
- the second obtaining module 19 is configured to: if it is determined that the running state of the related application triggers the corresponding security policy, query the corresponding relationship, and acquire a second icon with a protection mark corresponding to the application identifier of the related application .
- the second prompting module 20 is configured to display a security protection prompt message carrying the second icon on an interface of the terminal device.
- the monitoring module 18 is configured to monitor whether the power consumption and/or the temperature of the related application exceeds a preset threshold. If yes, it is learned that the running state of the related application triggers the corresponding security policy.
- the monitoring module 18 is configured to monitor whether the interaction information of the related application includes preset sensitive information, and if yes, learn that the running state of the related application triggers the corresponding security policy.
- the monitoring module 18 is configured to monitor whether the storage capacity of the related application is greater than a preset corresponding threshold. If yes, it is learned that the running state of the related application triggers a corresponding security policy.
- the application security protection processing device of the embodiment of the present application first monitors an operation state of the related application according to a preset security policy corresponding to the security protection type; and if it is determined that the running state of the related application is triggered, a corresponding The security policy queries the corresponding relationship, and obtains a second icon with a protection mark corresponding to the application identifier of the related application; and displays a security protection prompt message carrying the second icon on the interface of the terminal device. Therefore, the user is promptly reminded to perform security monitoring and management of various applications for various applications on the current terminal device, so as to improve reliability and security.
- FIG. 10 is a schematic structural diagram of an embodiment of a terminal device according to the present application.
- the terminal device in this embodiment can implement the flow of the application security protection processing method proposed in this application.
- the terminal device may be a terminal device such as a smart phone, a smart watch, or a tablet computer.
- the configuration of the terminal device is not limited in this embodiment.
- the above terminal device may include a casing 81, a processor 82, a receiver 83, a memory 84, a circuit board 85, and a power supply circuit 86, wherein the circuit board 85 is disposed inside the space enclosed by the casing 81.
- the processor 82 and the memory 84 are disposed on the circuit board 85; the power supply circuit 86 is configured to supply power to the respective circuits or devices of the terminal device; the memory 84 is used to store executable program code; and the processor 82 is configured to read the memory 84.
- the obtaining the sample application from the application on the terminal device includes: obtaining the country name of the user according to the auxiliary information on the terminal device; querying the pre-stored country name and application The corresponding list of the ranking list obtains an application ranking list corresponding to the country name of the user; according to the application ranking list, the highest ranked application is obtained from the application on the terminal device as a sample application.
- the obtaining the sample application from the application on the terminal device includes: querying a user log of the terminal device, and obtaining, from the user log, the user has the longest use time in a preset time.
- the application is applied as a sample.
- the image processing of the first sample icon of the sample application generates a second sample icon having a protection mark, including: determining and describing the first sample icon Protecting a protection area corresponding to the mark; generating a user interface layer, the user interface layer is drawn with a protection mark that matches the boundary of the protection area; and the user interface layer is overlaid on the first sample icon, so that The protection mark covers the protected area and generates a second sample icon having the protection mark.
- the parameter information of the protection mark includes: shape information, color information, and size information.
- the processor 82 is further configured to: receive the security protection command sent by the user, where
- the security protection instruction includes: at least one security protection type; acquiring a related application that matches the security protection type according to an application function on the terminal device; performing image processing on the first icon of the related application to generate a second protection mark An icon; storing a correspondence between the application identifier of the related application and the second icon.
- the processor 82 is further configured to: monitor an operating state of the related application according to a preset security policy corresponding to the security protection type; and if the determination is to learn the related application
- the running state triggers the corresponding security policy, and the corresponding relationship is obtained, and the second icon with the protection mark corresponding to the application identifier of the related application is obtained; and the second icon is displayed on the interface of the terminal device Security protection alert message.
- the monitoring the running status of the related application when the security protection type is power supply monitoring, the monitoring the running status of the related application according to a preset security policy corresponding to the security protection type, including: monitoring the Whether the power consumption and/or temperature of the related application exceeds a preset threshold, and if so, it is learned that the running state of the related application triggers the corresponding security policy.
- the security protection type is privacy monitoring
- monitoring the running status of the related application according to a preset security policy corresponding to the security protection type including: monitoring the Whether the interaction information of the related application includes preset sensitive information, and if so, it is learned that the running state of the related application triggers the corresponding security policy.
- the security protection type is memory monitoring;
- the security policy corresponding to the security protection type, and monitoring the running status of the related application including: monitoring whether the storage quantity occupied by the related application is greater than a preset corresponding threshold, and if yes, learning the running status of the related application
- the corresponding security policy is triggered.
- the terminal device of the embodiment of the present application acquires a sample application from an application on the terminal device by using a security protection processing device, and performs image processing on the first sample icon of the sample application to generate a second sample icon having a protection mark; An application security protection prompt message carrying the second sample icon is displayed on an interface of the terminal device. Therefore, the user is promptly reminded to perform security monitoring and management of the system for various applications on the current terminal device to improve reliability and security.
- the embodiment of the present application further provides a storage medium, where the storage medium stores one or more modules, when the one or more modules are executed by one electronic device, causing the electronic device to perform any of the foregoing The application security protection processing method described in the embodiment.
- the embodiment of the present application further provides an application program for performing the application security protection processing method described in any of the foregoing embodiments at runtime.
- first and second are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated.
- features defining “first” or “second” may include at least one of the features, either explicitly or implicitly.
- the meaning of "a plurality” is at least two, such as two, three, etc., unless specifically defined otherwise.
- a "computer-readable medium” can be any apparatus that can contain, store, communicate, propagate, or transport a program for use in an instruction execution system, apparatus, or device, or in conjunction with the instruction execution system, apparatus, or device.
- Computer More specific examples (non-exhaustive list) of readable media include the following: electrical connections (electronic devices) with one or more wires, portable computer disk cartridges (magnetic devices), random access memory (RAM), only Read memory (ROM), erasable editable read only memory (EPROM or flash memory), fiber optic devices, and portable compact disk read only memory (CDROM).
- the computer readable medium may even be a paper or other suitable medium on which the program can be printed, as it may be optically scanned, for example by paper or other medium, followed by editing, interpretation or, if appropriate, other suitable The method is processed to obtain the program electronically and then stored in computer memory.
- portions of the application can be implemented in hardware, software, firmware, or a combination thereof.
- multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
- a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
- each functional unit in each embodiment of the present application may be integrated into one first processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
- the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
- the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
- the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like. While the embodiments of the present application have been shown and described above, it is understood that the above-described embodiments are illustrative and are not to be construed as limiting the scope of the present application. The embodiments are subject to variations, modifications, substitutions and variations.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (23)
- 一种应用安全保护处理方法,其特征在于,包括:从终端设备上的应用中获取样本应用;对所述样本应用的第一样本图标进行图像处理生成具有保护标记的第二样本图标;在所述终端设备的界面上显示携带所述第二样本图标的应用安全保护提示消息。
- 如权利要求1所述的应用安全保护处理方法,其特征在于,所述从终端设备上的应用中获取样本应用,包括:根据所述终端设备上的辅助信息获取所述用户所在的国家名称;查询预先存储的国家名称与应用排名列表的对应关系,获取与所述用户所在的国家名称对应的应用排名列表;根据所述应用排名列表,从所述终端设备上的应用中获取排名最高的应用作为样本应用。
- 如权利要求1所述的应用安全保护处理方法,其特征在于,所述从终端设备上的应用中获取样本应用,包括:查询所述终端设备的用户日志,从所述用户日志中获取用户在预设时间内使用时间最长的应用作为样本应用。
- 如权利要求1至3中任一项所述的应用安全保护处理方法,其特征在于,所述对所述样本应用的第一样本图标进行图像处理生成具有保护标记的第二样本图标,包括:在所述第一样本图标上确定与所述保护标记对应的保护区域;生成用户界面层,所述用户界面层上绘制有与所述保护区域边界吻合的保护标记;将所述用户界面层覆盖到所述第一样本图标上,以使所述保护标记覆盖所述保护区域,生成具有所述保护标记的第二样本图标。
- 如权利要求1至4中任一项所述的应用安全保护处理方法,其特征在于,所述保护标记的参数信息包括:形状信息、颜色信息和尺寸信息。
- 如权利要求1至5中任一项所述的应用安全保护处理方法,其特征在于,所述向用户发送携带所述第二样本图标的应用安全保护提示消息之后,还包括:接收所述用户发送的安全保护指令,所述安全保护指令包括:至少一个安全保护类型;根据终端设备上的应用功能获取与所述安全保护类型匹配的相关应用;对所述相关应用的第一图标进行图像处理生成具有保护标记的第二图标;存储所述相关应用的应用标识和所述第二图标的对应关系。
- 如权利要求6所述的应用安全保护处理方法,其特征在于,还包括:根据预设的与所述安全保护类型对应的安全策略,监控所述相关应用的运行状态;若判断获知所述相关应用的运行状态触发了对应的安全策略,则查询所述对应关系,获取与所述相关应用的应用标识对应的具有保护标记的第二图标;在所述终端设备的界面显示携带所述第二图标的安全保护提示消息。
- 如权利要求7所述的应用安全保护处理方法,其特征在于,当所述安全保护类型为电源监控;所述根据预设的与所述安全保护类型对应的安全策略,监控所述相关应用的运行状态,包括:监控所述相关应用的耗电量和/或温度是否超过预设的阈值,若是,则获知所述相关应用的运行状态触发了对应的安全策略。
- 如权利要求7所述的应用安全保护处理方法,其特征在于,当所述安全保护类型为隐私监控;所述根据预设的与所述安全保护类型对应的安全策略,监控所述相关应用的运行状态,包括:监控所述相关应用的交互信息是否包含预设的敏感信息,若是,则获知所述相关应用的运行状态触发了对应的安全策略。
- 如权利要求7所述的应用安全保护处理方法,其特征在于,当所述安全保护类型为内存监控;所述根据预设的与所述安全保护类型对应的安全策略,监控所述相关应用的运行状态,包括:监控所述相关应用所占的存储量是否大于预设的对应门限值,若是,则获知所述相关应用的运行状态触发了对应的安全策略。
- 一种应用安全保护处理装置,其特征在于,包括:第一获取模块,用于从终端设备上的应用中获取样本应用;第一处理模块,用于对所述样本应用的第一样本图标进行图像处理生成具有保护标记的第二样本图标;第一提示模块,用于在所述终端设备的界面上显示携带所述第二样本图标的应用安全保护提示消息。
- 如权利要求11所述的应用安全保护处理装置,其特征在于,所述第一获取模块, 包括:第一查询单元,用于根据所述终端设备上的辅助信息获取所述用户所在的国家名称,查询预先存储的国家名称与应用排名列表的对应关系,获取与所述用户所在的国家名称对应的应用排名列表;第一获取单元,用于根据所述应用排名列表,从所述终端设备上的应用中获取排名最高的应用作为样本应用。
- 如权利要求11所述的应用安全保护处理装置,其特征在于,所述第一获取模块,包括:第二查询单元,用于查询所述终端设备的用户日志,第二获取单元,用于从所述用户日志中获取用户在预设时间内使用时间最长的应用作为样本应用。
- 如权利要求11至13中任一项所述的应用安全保护处理装置,其特征在于,所述第一处理模块,包括:确定单元,用于在所述第一样本图标上确定与所述保护标记对应的保护区域;生成单元,用于生成用户界面层,所述用户界面层上绘制有与所述保护区域边界吻合的保护标记;合成单元,用于将所述用户界面层覆盖到所述第一样本图标上,以使所述保护标记覆盖所述保护区域,生成具有所述保护标记的第二样本图标。
- 如权利要求11至14中任一项所述的应用安全保护处理装置,其特征在于,所述保护标记的参数信息包括:形状信息、颜色信息和尺寸信息。
- 如权利要求11至15中任一项所述的应用安全保护处理装置,其特征在于,还包括:接收模块,用于在向用户发送携带所述第二样本图标的应用安全保护提示消息之后,接收所述用户发送的安全保护指令,所述安全保护指令包括:至少一个安全保护类型;匹配模块,用于根据终端设备上的应用功能获取与所述安全保护类型匹配的相关应用;第二处理模块,用于对所述相关应用的第一图标进行图像处理生成具有保护标记的第二图标;存储模块,用于存储所述相关应用的应用标识和所述第二图标的对应关系。
- 如权利要求16所述的应用安全保护处理装置,其特征在于,还包括:监控模块,用于根据预设的与所述安全保护类型对应的安全策略,监控所述相关应用的运行状态;第二获取模块,用于若判断获知所述相关应用的运行状态触发了对应的安全策略,则查询所述对应关系,获取与所述相关应用的应用标识对应的具有保护标记的第二图标;第二提示模块,用于在所述终端设备的界面显示携带所述第二图标的安全保护提示消息。
- 如权利要求17所述的应用安全保护处理装置,其特征在于,当所述安全保护类型为电源监控;监控模块,具体用于监控所述相关应用的耗电量和/或温度是否超过预设的阈值,若是,则获知所述相关应用的运行状态触发了对应的安全策略。
- 如权利要求17所述的应用安全保护处理装置,其特征在于,当所述安全保护类型为隐私监控;监控模块,具体用于监控所述相关应用的交互信息是否包含预设的敏感信息,若是,则获知所述相关应用的运行状态触发了对应的安全策略。
- 如权利要求17所述的应用安全保护处理装置,其特征在于,当所述安全保护类型为内存监控;监控模块,具体用于监控所述相关应用所占的存储量是否大于预设的对应门限值,若是,则获知所述相关应用的运行状态触发了对应的安全策略。
- 一种终端设备,其特征在于,包括:壳体、处理器、接收器、存储器、电路板和电源电路,其中,所述电路板安置在所述壳体围成的空间内部,所述处理器和所述存储器设置在所述电路板上;所述电源电路,用于为所述终端设备的各个电路或器件供电;所述存储器用于存储可执行程序代码;所述处理器,通过读取所述存储器中存储的可执行程序代码来运行与可执行程序代码对应的程序,用于执行:如权利要求1至10中任一项所述的应用安全保护处理方法。
- 一种存储介质,其特征在于,所述存储介质存储有一个或者多个模块,当所述一个或者多个模块被一个电子设备执行时,使得所述电子设备执行:如权利要求1至10中任一项所述的应用安全保护处理方法。
- 一种应用程序,其特征在于,用于在运行时,执行如权利要求1至10中任一项所述的应用安全保护处理方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/756,532 US10642974B2 (en) | 2015-09-22 | 2016-08-12 | Application security protection processing method and device, and terminal device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510607906.4A CN105205392B (zh) | 2015-09-22 | 2015-09-22 | 应用安全保护处理方法、装置及终端设备 |
CN201510607906.4 | 2015-09-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017050056A1 true WO2017050056A1 (zh) | 2017-03-30 |
Family
ID=54953066
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/094814 WO2017050056A1 (zh) | 2015-09-22 | 2016-08-12 | 应用安全保护处理方法、装置及终端设备 |
Country Status (3)
Country | Link |
---|---|
US (1) | US10642974B2 (zh) |
CN (1) | CN105205392B (zh) |
WO (1) | WO2017050056A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105205392B (zh) | 2015-09-22 | 2018-11-20 | 北京金山安全软件有限公司 | 应用安全保护处理方法、装置及终端设备 |
CN106060104B (zh) * | 2016-04-21 | 2020-04-07 | 北京小米移动软件有限公司 | 应用管理方法及装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102207823A (zh) * | 2011-05-13 | 2011-10-05 | 宇龙计算机通信科技(深圳)有限公司 | 应用程序的显示方法和装置 |
US20140038561A1 (en) * | 2012-08-01 | 2014-02-06 | Tencent Technology (Shenzhen) Company Limited | Method and mobile terminal for notifying and displaying message |
CN103853433A (zh) * | 2014-04-01 | 2014-06-11 | 联想(北京)有限公司 | 通知消息提示方法和通知消息提示装置 |
CN104461243A (zh) * | 2014-12-09 | 2015-03-25 | 北京元心科技有限公司 | 移动终端上显示和管理通知的方法以及移动终端 |
CN105205392A (zh) * | 2015-09-22 | 2015-12-30 | 北京金山安全软件有限公司 | 应用安全保护处理方法、装置及终端设备 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8725745B2 (en) * | 2009-04-13 | 2014-05-13 | Microsoft Corporation | Provision of applications to mobile devices |
KR101457632B1 (ko) * | 2012-12-20 | 2014-11-10 | 주식회사 팬택 | 프로그램 알림 기능을 갖는 휴대용 전자 기기 및 이를 위한 프로그램 알림 방법 |
US8595810B1 (en) * | 2013-01-13 | 2013-11-26 | Mourad Ben Ayed | Method for automatically updating application access security |
US9275206B2 (en) * | 2013-01-23 | 2016-03-01 | International Business Machines Corporation | Managing sensitive information |
WO2014201647A1 (zh) * | 2013-06-19 | 2014-12-24 | 华为终端有限公司 | 一种数据和消息处理的方法及装置 |
US9226155B2 (en) * | 2013-07-25 | 2015-12-29 | Airwatch Llc | Data communications management |
US20150121306A1 (en) * | 2013-10-30 | 2015-04-30 | United Video Properties, Inc. | Methods and systems for customizing functions of media guidance applications |
CN104049847A (zh) * | 2014-06-30 | 2014-09-17 | 宇龙计算机通信科技(深圳)有限公司 | 一种移动终端的信息提示方法及系统 |
US20160034695A1 (en) * | 2014-07-30 | 2016-02-04 | Microsoft Technology Licensing, Llc | Displaying Different Levels of Personal Information on a Screen |
CN104468583B (zh) * | 2014-12-11 | 2018-08-07 | 北京奇虎科技有限公司 | 单方采用匿名方式发送私信的方法及服务器 |
US10152197B1 (en) * | 2015-02-02 | 2018-12-11 | Symantec Corporation | Dynamic indication of a status of an application |
CN104679387B (zh) * | 2015-02-13 | 2018-05-01 | 广东欧珀移动通信有限公司 | 一种隐私信息保护方法及终端 |
-
2015
- 2015-09-22 CN CN201510607906.4A patent/CN105205392B/zh not_active Expired - Fee Related
-
2016
- 2016-08-12 US US15/756,532 patent/US10642974B2/en not_active Expired - Fee Related
- 2016-08-12 WO PCT/CN2016/094814 patent/WO2017050056A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102207823A (zh) * | 2011-05-13 | 2011-10-05 | 宇龙计算机通信科技(深圳)有限公司 | 应用程序的显示方法和装置 |
US20140038561A1 (en) * | 2012-08-01 | 2014-02-06 | Tencent Technology (Shenzhen) Company Limited | Method and mobile terminal for notifying and displaying message |
CN103853433A (zh) * | 2014-04-01 | 2014-06-11 | 联想(北京)有限公司 | 通知消息提示方法和通知消息提示装置 |
CN104461243A (zh) * | 2014-12-09 | 2015-03-25 | 北京元心科技有限公司 | 移动终端上显示和管理通知的方法以及移动终端 |
CN105205392A (zh) * | 2015-09-22 | 2015-12-30 | 北京金山安全软件有限公司 | 应用安全保护处理方法、装置及终端设备 |
Also Published As
Publication number | Publication date |
---|---|
CN105205392A (zh) | 2015-12-30 |
US10642974B2 (en) | 2020-05-05 |
US20180247056A1 (en) | 2018-08-30 |
CN105205392B (zh) | 2018-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10853979B2 (en) | Electronic device and method for displaying screen thereof | |
EP3171242B1 (en) | Electronic device and method for configuring display thereof | |
KR102276853B1 (ko) | 정보 처리 방법 및 이를 지원하는 전자 장치 | |
US20170235435A1 (en) | Electronic device and method of application data display therefor | |
CN102197362B (zh) | 窗口专用控件的显露和管理 | |
US9183072B1 (en) | Error troubleshooting using a correlated knowledge base | |
EP3391634B1 (en) | Electronic device and method for controlling application and component | |
US10546126B2 (en) | Method for detecting the tampering of application code and electronic device supporting the same | |
US20170011010A1 (en) | Method for displaying web content and electronic device supporting the same | |
CN108242837A (zh) | 电子设备和控制电子设备的充电的方法 | |
CN108549568A (zh) | 应用入口处理方法、装置、存储介质及电子设备 | |
US10705681B2 (en) | Electronic device and display method for selecting an area of an icon | |
US10168204B2 (en) | Electronic device and method for determining waterproofing of the electronic device | |
CN104137066A (zh) | 提供关于应用的信息的方法、用于执行所述方法的装置以及记录有用于运行所述方法的程序的计算机可读记录介质 | |
KR20160070571A (ko) | 제어 방법 및 그 방법을 처리하는 전자장치 | |
CN110266505A (zh) | 一种管理会话群的方法与设备 | |
WO2016019793A1 (zh) | 信息的监控方法、装置和移动终端 | |
CN104267987B (zh) | 一种应用程序app更新的检测方法、检测装置以及终端 | |
CN112464625B (zh) | 单据生成方法、装置、计算机设备和存储介质 | |
EP3569003B1 (en) | Electronic device and method for controlling communication thereof | |
CN105786481B (zh) | 一种设置应用自启动的方法、装置及电子设备 | |
US20160062964A1 (en) | Method for selecting area on web page and electronic device thereof | |
WO2017050056A1 (zh) | 应用安全保护处理方法、装置及终端设备 | |
EP3131031A1 (en) | Content security processing method and electronic device supporting the same | |
CN104239104B (zh) | 卸载应用程序app的方法、装置和终端 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16847938 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15756532 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 02/07/2018) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16847938 Country of ref document: EP Kind code of ref document: A1 |