WO2020248106A1 - 数据管理方法、数据管理装置、飞行器、移动终端和存储介质 - Google Patents

数据管理方法、数据管理装置、飞行器、移动终端和存储介质 Download PDF

Info

Publication number
WO2020248106A1
WO2020248106A1 PCT/CN2019/090597 CN2019090597W WO2020248106A1 WO 2020248106 A1 WO2020248106 A1 WO 2020248106A1 CN 2019090597 W CN2019090597 W CN 2019090597W WO 2020248106 A1 WO2020248106 A1 WO 2020248106A1
Authority
WO
WIPO (PCT)
Prior art keywords
service
data
request
networking request
status
Prior art date
Application number
PCT/CN2019/090597
Other languages
English (en)
French (fr)
Inventor
吴忠谦
海沃
Original Assignee
深圳市大疆创新科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市大疆创新科技有限公司 filed Critical 深圳市大疆创新科技有限公司
Priority to PCT/CN2019/090597 priority Critical patent/WO2020248106A1/zh
Priority to CN201980012303.6A priority patent/CN111727615A/zh
Publication of WO2020248106A1 publication Critical patent/WO2020248106A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • H04B7/18506Communications with or from aircraft, i.e. aeronautical mobile service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • This application relates to the field of data security technology, and in particular to a data management method, a data management device, an aircraft, a mobile terminal, and a storage medium.
  • drones can be widely used in judicial forensics, public security, traffic police, forestry, mining, and infrastructure construction. Since the data in these fields contains various privacy, security, and compliance issues, government units in these fields And enterprises are very sensitive to data security. How to reduce or eliminate the concerns of government and enterprise users about data security without affecting business development has become a relatively difficult problem in the industry.
  • this application provides a data management method, a data management device, an aircraft, a mobile terminal, and a storage medium, aiming to solve the confusion of the existing data management method on the authority management of data networking, and the data on the terminal is easily affected by software Technical issues such as uploading to the server or the software may obtain data from the server.
  • this application provides a data management method, including:
  • the status data of the data mode is read from the non-volatile memory, and the service status information is initialized according to the status data.
  • the service status information includes the prohibition status indicating that the service networking is prohibited and/or the permission indicating that the service networking is permitted status;
  • the service networking request corresponding to the permission status is obtained, the service networking request is sent to the target server to perform data transmission with the server.
  • this application provides a data management device, including a memory and a processor
  • the memory is used to store computer programs
  • the processor is configured to execute the computer program, and when executing the computer program, implement the following steps:
  • the status data of the data mode is read from the non-volatile memory, and the service status information is initialized according to the status data.
  • the service status information includes the prohibition status indicating that the service networking is prohibited and/or the permission indicating that the service networking is permitted status;
  • the service networking request corresponding to the permission status is obtained, the service networking request is sent to the target server to perform data transmission with the server.
  • this application provides an aircraft, including:
  • the above-mentioned data management device is used to control whether to send a service networking request to the target server;
  • Flight components used for flight.
  • this application provides a mobile terminal, including:
  • the above-mentioned data management device is used to control whether to send a service networking request to the target server.
  • the present application provides a computer-readable storage medium that stores a computer program, and when the computer program is executed by a processor, the processor implements the aforementioned data management method.
  • the embodiments of the application provide a data management method, a data management device, an aircraft, a mobile terminal, and a storage medium.
  • the service status information is initialized according to the status data stored in the non-volatile memory, so that the terminal and the server can be blocked based on the service status information.
  • the data transmission between the terminal and the server is allowed; the communication and data transmission between the terminal and the server are controlled through the service status information, which improves the security of the terminal’s local data, such as preventing some data from being transmitted to The server or the server writes some data to the terminal.
  • FIG. 1 is a schematic flowchart of a data management method provided by an embodiment of the present application
  • Figure 2 is a schematic diagram showing the status corresponding to the service status information in the interface
  • FIG. 3 is a schematic flowchart of an implementation manner of the data management method of this application.
  • FIG. 5 is a schematic flowchart of yet another embodiment of the data management method of this application.
  • FIG. 6 is a schematic flowchart of another implementation manner of the data management method of the present application.
  • FIG. 7 is a schematic flowchart of another embodiment of the data management method of the present application.
  • FIG. 8 is a schematic flowchart of another embodiment of the data management method of the present application.
  • FIG. 9 is a schematic flowchart of the interaction between the service layer, the interceptor, and the server in the terminal for implementing the data management method
  • FIG. 10 is a schematic diagram of another flow diagram of the interaction between the service layer, the interceptor and the server in the terminal for implementing the data management method;
  • FIG. 11 is a schematic flow chart of a data management method for the control device of the aircraft.
  • FIG. 12 is a schematic flowchart of an embodiment of generating a service networking request
  • FIG. 13 is a schematic diagram of the structure of a terminal and a server for implementing the data management method
  • FIG. 14 is a schematic block diagram of a data management device provided by an embodiment of the present application.
  • FIG. 15 is a schematic block diagram of an aircraft provided by an embodiment of the present application.
  • FIG. 16 is a schematic block diagram of a mobile terminal according to an embodiment of the present application.
  • FIG. 1 is a schematic flowchart of a data management method provided by an embodiment of the present application.
  • the data management method can be applied to a terminal device to manage the process of data transmission between the terminal device and the server;
  • the terminal device can be a mobile phone, tablet computer, notebook computer, desktop computer, personal digital assistant, wearable device , Remote control device or drone, etc.
  • the server can be an independent server or a server cluster.
  • the drone can be a rotary wing drone, such as a quadrotor drone, a hexarotor drone, an eight rotor drone, or a fixed wing drone.
  • the data management method of this embodiment includes steps S110 to S130.
  • S110 Read the status data of the data mode from the non-volatile memory, and initialize service status information according to the status data, where the service status information includes a prohibited status for indicating that service networking is prohibited and/or for indicating that service networking is permitted License status.
  • the non-volatile memory of the terminal stores the status data of the data mode, and the terminal can initialize the service status information according to the status data.
  • the relationship between status data and service status information is shown in Table 1.
  • LDM stands for Local Data Mode
  • the data on the terminal is only used locally and cannot be sent to the server, such as the server corresponding to the software that manages the data Or a third-party server; for another example, when the local data mode is turned on, the terminal can only use local data, but cannot obtain data from the server.
  • LDM enabled indicates that the local data mode is in the on state
  • LDM disabled indicates that the local data mode is in the off state
  • the service status information is initialized according to the status data to be a prohibited state indicating that the service is prohibited from connecting;
  • the status data read in the memory is LDM disabled, and the service status information is initialized according to the status data to indicate the permission status of the permission service networking.
  • the prohibition state used to indicate the prohibition of service networking can include LDM enabled, that is, the state where the local data mode is turned on.
  • the data on the terminal is only used locally and cannot be sent to the server, and the terminal can only use local data.
  • the license status used to indicate the license service networking can include LDM disabled, that is, the state where the local data mode is off, and the data on the terminal can be sent to the server or obtained from the server.
  • the terminal includes a non-volatile memory.
  • the content in the non-volatile memory will not disappear due to power failure, and is usually used to store programs or data that do not need to be changed frequently; for example, when the terminal is a mobile phone, the non-volatile memory
  • the sexual memory includes a read-only memory (ROM) in the terminal.
  • the status data of the data mode is stored in the non-volatile memory, so that even if the software process is closed, the status data can remain unchanged; after the software is restarted, the service status information corresponding to the status data can still be restored.
  • the service state information corresponding to the service networking request is determined according to the service state information.
  • the intercepting the service networking request includes: prohibiting sending the service networking request to the target server.
  • the software on the terminal generates a map loading request, which points to the map loading network address located on the map server; if the software determines that the map loading request corresponds to the prohibited state according to the service status information, it intercepts the map loading request to prevent The map loading request is sent to the map server.
  • the prohibited state corresponds to all service networking requests generated by the software
  • all service networking requests generated by the software are intercepted to prevent the terminal from connecting to any server for data transmission.
  • the service networking request after intercepting the service networking request, it includes: returning request failure information corresponding to the service networking request to the business layer of the software.
  • the terminal After intercepting the map loading request, the terminal returns the request failure information corresponding to the map loading request to the business layer of the software, so that the display interface of the terminal displays the request failure information to inform the user that the service status information corresponding to the service networking request is In the prohibited state, the service networking request was intercepted and not sent to the corresponding server.
  • the request failure information may also include a request permission prompt corresponding to the intercepted service networking request, for example, prompting the user to modify the state data corresponding to the map loading request to the state data corresponding to the permission state.
  • the software on the terminal judges that the service status information corresponding to the service networking request is the permission status according to the service status information, the service networking request is sent to the target server for data transmission with the server, for example, the terminal is locally Send the data to the server, or get data from the server and load it locally on the terminal.
  • the sending the service networking request to the target server includes at least one of the following:
  • the service networking request includes a firmware upgrade request, sending the service networking request to the firmware upgrade server;
  • the service networking request includes a flight restriction lifting request, sending the service networking request to the flight restriction management server;
  • the service networking request includes a map loading request, sending the service networking request to the map server;
  • the service networking request includes a data upload request
  • the service networking request is sent to the data storage server.
  • the terminal can send a firmware upgrade request to the firmware upgrade server to establish a communication connection with the firmware upgrade server to obtain firmware data from the firmware upgrade server to achieve firmware upgrades; the terminal can send a request to the management server to control the flight restriction
  • the management server establishes a communication connection to obtain data from the flight restriction management server for lifting the flight restriction status to realize the flight restriction lifting; the terminal can establish a communication connection with the map server by sending a map loading request to the map server to obtain it from the map server Map data; the terminal can establish a communication connection with the data storage by sending a data upload request to the data storage server to upload the local data of the terminal to the server for cloud storage.
  • the data management method provided by the embodiments of the present application initializes the service status information according to the status data stored in the non-volatile memory, and therefore can block the data transmission between the terminal and the server or allow the data transmission between the terminal and the server according to the service status information
  • the communication and data transmission between the terminal and the server are controlled by the service status information, which improves the security of the terminal’s local data, such as preventing some data from being transmitted to the server or the server from writing some data to the terminal.
  • step S110 reads the state data of the data mode from the non-volatile memory, and initializes the service state information according to the state data, including: reading the data mode from the local non-volatile memory when the software is started Status data; then initialize the service status information in the volatile memory according to the status data.
  • the terminal includes a non-volatile memory and a volatile memory; the content in the volatile memory will disappear due to power failure, and is usually used as a temporary storage medium for running programs; for example, when the terminal is a mobile phone, the volatile memory
  • the memory includes random access memory (Random Access Memory, RAM) in the terminal.
  • the software When the software on the terminal is started, the software reads the status data of the data mode from the non-volatile memory, and then initializes the service status information in the volatile memory occupied by the software during operation according to the status data.
  • the status data of the data mode is stored in the non-volatile memory, so that even if the software process is closed, the status data can remain unchanged; after the software is restarted, the service status information corresponding to the status data can still be restored.
  • the state data stored in the local non-volatile memory is encrypted state data.
  • the initialization of the service status information in the volatile memory according to the status data includes:
  • Table 2 Encrypted status data and service status information
  • the state data By encrypting and storing the state data in a non-volatile memory, the state data will not be easily tampered with, which further improves the reliability of data mode management and improves the security of data on the terminal.
  • step S110 after initializing the service status information in step S110, it includes: outputting the status corresponding to the service status information to the display interface.
  • the terminal displays the status corresponding to the service status information in the upper right corner of the display interface.
  • the state corresponding to the service state information shown in FIG. 2 is that the local data mode is on, that is, the state of LDM enabled.
  • the user when using the terminal, the user can observe the service status information of the corresponding software on the terminal and understand whether the service networking request will be intercepted according to the service status information.
  • the data management method further includes step S140.
  • S140 In response to the user's state modification operation, modify the state data of the data mode in the non-volatile memory.
  • Users can set the data mode independently through state modification operations; users can independently manage data usage rights without worrying about the security of their own data, such as unauthorized uploading of their terminal data to the server or unauthorized server Send data to the terminal; users have control over their own data and have a more secure sense of data security.
  • the user modifies the status data of the terminal to the status data corresponding to the prohibited state; during the drone operation, if the drone transmits aerial data to the terminal, the terminal intercepts the service networking request sent to the server according to the prohibited state , So the server cannot obtain aerial data from the terminal. It reduces users’ concerns about data security and can safely use drones and terminals for operations.
  • the local data mode can be temporarily closed to allow the corresponding service networking request to be sent to the corresponding server so that the corresponding network service can be obtained from the server.
  • the user can modify the status data of the terminal to the status data corresponding to the permission status in a safe and network environment, so the terminal can send a service networking request to the server and upload the aerial photography data to the server.
  • This can not only protect data security, but also freely control whether the data can be connected to the Internet with the user’s knowledge; thus, users can enjoy network services and ensure the security of their own data, which greatly reduces users’ data security when using software. concern.
  • the status data in response to the user's operation to close the local data mode, is changed from LDM enabled to LDM disabled, so that the terminal can send the service networking request corresponding to the license status to the target server for data transmission with the server; or In response to the user's operation of opening the local data mode, the status data is changed from LDM disabled to LDM enabled, so that the terminal can intercept the service networking request corresponding to the disabled state.
  • step S140 responds to the user's state modification operation, modifying the state data of the data mode in the non-volatile memory, including: modifying the non-volatile memory in response to the state modification instruction input by the user Status data in the data mode. Therefore, the user can set the data mode independently by inputting state modification instructions.
  • the terminal displays a virtual button for state modification, and the user inputs a state modification instruction to the terminal by clicking the virtual button; or, the terminal is provided with physical buttons corresponding to the state modification instruction or corresponding to different state data, and the user clicks the entity Press the key to input state modification instructions to the terminal.
  • step S140 responds to the user's state modification operation, modifying the state data of the data mode in the nonvolatile memory, including: modifying the permission data in response to the state input or imported by the user, and changing the non-volatile memory
  • the state data of the data mode in the volatile memory is modified to state data corresponding to the state modification permission data. Therefore, the user can independently set the data mode through the state modification permission data.
  • the state modification permission data is data issued by the software developer for modifying the state data of the data mode, for example, a license issued by the software developer, and the license includes data encrypted in a specific format.
  • the software on the terminal is equipped with an input interface or an import interface for state modification license data. The user can input or import the acquired state modification license data into the software installed on the terminal; after the software obtains and decrypts the state modification license data, the state data is modified to The status data corresponding to the status modification permission data.
  • the software modifies the status data to LDM enabled.
  • step S140 includes step S1401 before modifying the state data of the data mode in the non-volatile memory in response to the user's state modification operation.
  • step S140 responds to the user's state modification operation to modify the state data of the data mode in the non-volatile memory, including step S141.
  • the terminal modifies the status data of the data mode, it needs to verify whether the user has the authority to modify the status data. For example, the user needs to input verification information such as password and fingerprint to the terminal, and the terminal determines whether the verification information matches the user; if it is determined that the user has the right to modify the status data, it will respond to the user's status modification operation and modify the non- The status data of the data pattern in the volatile memory. Therefore, the security and accuracy of the status data of the data mode can be ensured, and the right of users to independently manage terminal data can be guaranteed.
  • verification information such as password and fingerprint
  • any modification of the status data requires first verifying whether the user has authority. Only when it is determined that the user has authority and the user's permission is obtained, can the status data be modified in response to the user's status modification operation.
  • step S140 after modifying the state data of the data mode in the non-volatile memory includes: reading the modified state data from the non-volatile memory, The service status information in the volatile memory is initialized according to the status data.
  • the terminal after modifying the state data of the data mode in the non-volatile memory, the terminal can actively refresh the service state information or refresh the service state information according to the user's operation, without restarting the terminal or restarting the software.
  • the terminal reads the modified state data from the non-volatile memory again, and then initializes the service state information in the volatile memory according to the state data; then, step S120 and step S130 are executed.
  • the service status information after initializing the service status information, it includes: outputting the status corresponding to the service status information to a display interface.
  • the status corresponding to the service status information displayed on the terminal display interface is updated in a timely manner, so that users can understand whether the service networking request will be intercepted.
  • step S140 includes step S1402 after modifying the state data of the data mode in the non-volatile memory in response to the user's state modification operation.
  • S1402 Output a software restart prompt to prompt the user to restart the software.
  • step S110 is executed to read the state data of the data mode modified by the user before the restart from the non-volatile memory, according to the state
  • the data initializes the service status information; thereby refreshing the service status information modified by the user.
  • the terminal reads the modified state data from the non-volatile memory again, and then initializes the service state information in the volatile memory according to the state data; then, step S120 and step S130 are executed.
  • the service status information after initializing the service status information, it includes: outputting the status corresponding to the service status information to a display interface.
  • the status corresponding to the service status information displayed on the terminal display interface is updated in a timely manner, so that users can understand whether the service networking request will be intercepted.
  • step S140 before modifying the state data of the data mode in the non-volatile memory includes: if a preset state modification trigger condition is triggered, outputting the state Modify the status modification prompt corresponding to the trigger condition.
  • the software determines that there is an operating failure and needs to report the failure to the server, it outputs a corresponding status modification prompt to prompt the user whether to modify the prohibition status used to indicate the prohibition of service networking to the permission status used to indicate the permission service networking .
  • the terminal obtains the service networking request corresponding to the prohibited state, it outputs a request permission prompt corresponding to the service networking request.
  • the terminal intercepts the service networking request; if the service networking request corresponds to a higher networking priority, it outputs a request permission prompt corresponding to the service networking request.
  • a certain service networking request is a map loading request. Since the accuracy of the map will affect the flight mission of the aircraft, the map loading request corresponds to a higher networking priority; then after intercepting the service networking request, the request is output The permission prompt prompts the user to modify the state data corresponding to the map loading request to the state data corresponding to the permission state.
  • the terminal can prompt the user to modify the status data of the data mode when necessary, so that the software and the terminal can complete the tasks specified by the user.
  • step S1401 After outputting the state modification prompt, obtain the verification information input by the user through step S1401, and determine whether the verification information matches the user; if the verification information matches the user, respond to the user's state modification operation , Modify the state data of the data mode in the non-volatile memory.
  • intercepting the service networking request includes step S121.
  • S121 If the service status information includes a global prohibition status corresponding to all network services, intercept the service networking request after obtaining any service networking request.
  • the terminal needs to cooperate with the server to complete the network service, that is, the preset network services include: firmware upgrade, flight restriction lifting, map loading, data upload, etc.; each network service service corresponds to: firmware upgrade request, flight restriction Service networking requests such as banning requests, map loading requests, and data upload requests.
  • the initialized service status information includes the global prohibition state, which is used to indicate the prohibition state for prohibiting all preset network service networking, all service networking requests generated by the terminal correspond to the prohibition state, so the terminal intercepts all acquired service networking Request, the terminal can only use local data.
  • the user can set the status data of the data mode in the non-volatile memory as the status data corresponding to the global prohibited state; only this setting can achieve a complete local data mode, in which the terminal cannot send service networking Request to the corresponding server.
  • the display interface displays an LDM enabled button used to indicate that the local data mode is in an on state, and an LDM disabled button used to indicate that the local data mode is in an off state. If the LDM enabled button is selected, the local data mode is turned on, and the state data of the data mode in the non-volatile memory is set to the state data corresponding to the global disabled state; if the LDM disabled button is selected, the local data mode is turned off and the non-volatile memory is set.
  • the status data of the data mode in the volatile memory is the status data corresponding to the global permission status.
  • sending the service networking request to the target server includes step S131.
  • the initialized service status information includes the global permission status, that is, it is used to indicate the permission status of all preset network service networking, then all service networking requests generated by the terminal correspond to the permission status, so the terminal does not intercept the acquired service networking In the request, any preset service networking request obtained can be sent to the target server for data transmission with the corresponding server.
  • the user can set the status data of the data mode in the non-volatile memory as the status data corresponding to the global license status; only this setting can realize the normal data transmission between the terminal and the server when needed, and obtain the firmware upgrade, Network services such as flight restriction lifting, map loading, and data uploading.
  • the initialized service status information includes a global prohibition state or a global permission state; in other embodiments, the initialized service state information may include multiple prohibition states, multiple permission states, single prohibition states, and single permission At least one of the states; various prohibition states or permission states may correspond to one or more service networking requests.
  • intercepting the service networking request includes step S122.
  • S122 If the service status information includes multiple prohibition states corresponding to multiple network services, intercept the service networking request after obtaining any service networking request corresponding to the multiple prohibition states.
  • Table 3 shows the correspondence between the service status information acquired by the terminal and the service networking request.
  • the terminal divides the service networking requests corresponding to multiple network services into multiple groups, such as the first group and the second group; the first group includes the firmware upgrade request corresponding to the firmware upgrade and the corresponding flight restriction release Flight restriction lifting request, the second group includes map loading request corresponding to map loading and data upload request corresponding to data upload.
  • the initialized service status information includes multiple prohibition states corresponding to the first set of service networking requests, if the terminal obtains any service networking request in the first set of service networking requests, the service networking request is intercepted.
  • the user can manage the terminal to intercept service networking requests for multiple network services.
  • step S130 if the service networking request corresponding to the permission state is obtained in step S130, sending the service networking request to the target server, including step S132.
  • S132 If the service state information includes multiple license states corresponding to multiple network services, after obtaining any service networking request corresponding to the multiple license states, send the service networking request to the target server.
  • the terminal divides the service networking requests corresponding to multiple network services into multiple groups, such as the first group and the second group.
  • the initialized service status information includes multiple license statuses corresponding to the second set of service networking requests
  • the terminal if it obtains any service networking request in the second set of service networking requests, it will send the service networking request to The target server sends to transmit data with the corresponding server.
  • the user can manage the terminal to release service networking requests for multiple network services, so as to realize the normal data transmission between the terminal and the server when needed.
  • various network services such as map loading and data uploading.
  • intercepting the service networking request includes step S123.
  • S123 If the service status information includes a single prohibition state corresponding to a network service, intercept the service networking request after obtaining the service networking request corresponding to the single prohibition state.
  • the user can set the global status corresponding to the status data to a global prohibition state or a global permission state, or set the service status information corresponding to each group of service networking requests to multiple prohibited states or multiple permitted states, and can also set The service status information corresponding to each service networking request is a single prohibition status or a single permission status.
  • Table 4 shows the display interface when the user sets the status data corresponding to the service status information.
  • the user sets the service status information corresponding to the group of service networking requests of firmware upgrade request and flight restriction removal request, that is, if multiple states are multiple prohibited states, then each service in the group is connected to the Internet
  • the requested service status information that is, the individual status is automatically set to the individual prohibited status.
  • the multiple states of each group are automatically set to multiple prohibited states, and the single state of each service networking request is automatically set to the single prohibited state; if the user sets the global state to Global licensing status, the multiple statuses of each group are automatically set to multiple licensing statuses, and the single status of each service networking request is automatically set to a single licensing status.
  • the user sets the service status information corresponding to the map loading request, that is, the single item status is a single item prohibited state, and the single item status of the data upload request is set to a single permission state. Because the individual statuses of the service networking requests in the same group are inconsistent, the multiple statuses corresponding to the group are invalid; because the multiple statuses of different groups are inconsistent, the global status is also invalid.
  • the service status information includes a single prohibition state corresponding to the map loading request.
  • the service networking request After obtaining the service networking request corresponding to the single prohibition state, such as a map loading request, the service networking request is intercepted, so the terminal will not provide map loading.
  • the server of the service communicates and connects for data transmission.
  • the user can accurately prevent the terminal from transmitting data to a specific server.
  • step S130 if the service networking request corresponding to the permission state is obtained in step S130, sending the service networking request to the target server, including step S133.
  • S133 If the service status information includes a single license status corresponding to a network service, after obtaining the service networking request corresponding to the single license status, send the service networking request to the target server.
  • the service status information includes a single permission status corresponding to the data upload request, and the service networking request corresponding to the single permission status is obtained, for example, after the data upload request, the service networking request is sent to the target server to communicate with the corresponding server. Communication connection, data transmission.
  • the user can accurately release the terminal and a specific server for data transmission and obtain a certain data service.
  • step S101 is included.
  • the terminal locally opens a virtual private network (Virtual Private Network, VPN) as an interceptor (Intercepter), and all data before the request reaches the physical network port can be obtained in the virtual private network.
  • VPN Virtual Private Network
  • Intercepter interceptor
  • the request feature of each service networking request corresponding to the global license status is used as the pending release request feature, such as the domain name of each service networking request as the pending release request feature; if the service status If the information includes the single permission status corresponding to a certain service networking request, the domain name of the service networking request is used as the pending release request feature, and the request characteristics corresponding to the single prohibition state, multiple prohibition states, and global prohibition state are not used as pending release Request characteristics.
  • intercepting the service networking request includes steps S1201 and S1202.
  • the virtual private network first obtains the service networking request.
  • the domain name of a service networking request acquired by a virtual private network in a certain time is different from all pending requests, it is determined that the service networking request corresponds to a prohibited state, and the service networking request is intercepted.
  • step S130 if the service networking request corresponding to the permission state is obtained in step S130, sending the service networking request to the target server to perform data transmission with the server, including step S1301.
  • the domain name of a service networking request acquired by a virtual private network has the same characteristics as a request to be released, it is determined that the service networking request corresponds to the permission state, the service networking request is released, and the service networking request is sent to Sent by the target server.
  • the characteristics of the pending release request in the virtual private network it is possible to comprehensively and accurately filter the service networking requests corresponding to the prohibited state, and to specifically release the service networking requests corresponding to the permission state.
  • step S110 initializes the service status information according to the status data
  • step S102 is included.
  • the terminal maintains a release whitelist according to the service status information as a condition for the interceptor to determine the interception or release of the service networking request.
  • the service status information includes the global permission status
  • the request feature of each service networking request corresponding to the global permission status is used as the request feature in the release whitelist, such as the domain name of each service networking request as the request feature in the release white list ;
  • the service status information includes a single permission status corresponding to a certain service networking request, the domain name of the service networking request is used as the request feature in the release whitelist, and will not correspond to the single prohibition state, multiple prohibition states, and global prohibition
  • the status of the request feature is used as the request feature in the release whitelist.
  • the terminal maintains an interception blacklist according to the service status information.
  • the service status information includes the global prohibition state
  • the request characteristics of each service networking request corresponding to the global prohibition state are used as the request characteristics in the interception blacklist, such as the domain name of each service networking request as the request feature in the interception blacklist ;
  • the service status information includes a single prohibition status corresponding to a certain service networking request
  • the domain name of the service networking request is used as the request feature in the interception blacklist, instead of corresponding to the single permission status, multiple permission status, and global permission
  • the status of the request feature is used as the request feature in the interception blacklist.
  • intercepting the service networking request includes step S1203 and step S1204.
  • the domain name of the service networking request is the same as the request characteristics in the release white list and/or interception black list.
  • the service networking request has the same characteristics as a certain request in the interception blacklist, it is determined that the service networking request corresponds to a prohibited state, and the service networking request is intercepted.
  • the service networking request does not match all the request characteristics in the release whitelist, it is determined that the service networking request corresponds to a prohibited state, and the service networking request is intercepted.
  • step S130 if the service networking request corresponding to the permission state is obtained in step S130, sending the service networking request to the target server to perform data transmission with the server includes step S1302.
  • the service networking request has the same characteristics as a certain request in the release whitelist, it is determined that the service networking request corresponds to the permission state, the service networking request is released, and the service networking request is sent to the target server.
  • the service networking request does not match all the request characteristics in the interception blacklist, it is determined that the service networking request corresponds to the prohibited state, the service networking request is released, and the service networking request is sent to the target server.
  • the release whitelist and/or interception blacklist maintained according to the service status information can comprehensively and accurately filter the service networking requests corresponding to the prohibited status, and the targeted release of the service networking requests corresponding to the permission status.
  • the local data mode (LDM) is turned on by default when the software is first started, and any network requests during this period will be filtered and cannot be sent to the Internet.
  • the status data read from the nonvolatile memory corresponds to the global prohibition status.
  • the local data mode is turned on by default, that is, LDM enabled; the data on the terminal can only be saved locally for use, and is prohibited from being sent to the server.
  • the initializing service status information according to the status data includes: initializing the service status information according to the status data to a global prohibited status corresponding to all network services. After obtaining any service networking request, the terminal intercepts the service networking request.
  • Figure 9 shows a schematic diagram of the interaction between the software business layer, the interceptor and the server in an implementation scenario, including the following steps 21 to S293.
  • the software is installed and started for the first time.
  • the interceptor adjusts the characteristics of the requests to be released in the local virtual private network or adjusts the characteristics of the requests in the release whitelist and/or interception blacklist according to the global prohibition status.
  • the software business layer generates a service networking request.
  • the interceptor intercepts the service networking request according to the global prohibition state.
  • the interceptor feeds back request failure information to the service layer.
  • the interceptor intercepts the service networking request according to the global prohibition state, and feeds back the request failure information to the business layer.
  • the software business layer generates a service networking request.
  • the interceptor intercepts the service networking request according to the global prohibition state.
  • the interceptor feeds back request failure information to the business layer.
  • the interceptor intercepts the service networking request according to the global prohibition state, and feeds back the request failure information to the business layer.
  • S26 Modify the service status information corresponding to the map loading request to the permission status.
  • the service state information corresponding to the at least one service networking request is modified from the prohibited state to the permitted state.
  • the service state information corresponding to the map loading request is modified from the prohibited state to the single permission state.
  • the terminal can actively refresh the service status information or refresh the service status information according to the user's operation; or after modifying the status data of the data mode in the nonvolatile memory, prompt The user restarts the software to refresh the service status information corresponding to the map loading request as a single license status.
  • the interceptor releases the map loading request generated by the software business layer, and sends the map loading request to the server.
  • the interceptor sends the map loading request to the target server, such as the map server, according to the single license status corresponding to the map loading request, so that the terminal can communicate with the target server.
  • Data transmission such as loading map data from a map server.
  • the user can perform a state modification operation to modify the service state information corresponding to the map loading request from a single permission state to a prohibited state, for example, through the state modification command Disable Map Request to request the corresponding service for the map loading
  • the status information is changed from a single permission status to a single prohibited status.
  • the terminal can actively refresh the service status information or refresh the service status information according to the user's operation; or after modifying the status data of the data mode in the nonvolatile memory, prompt The user restarts the software to refresh the service status information corresponding to the map loading request as a single prohibited state.
  • the software business layer generates a map loading request.
  • the interceptor intercepts the map loading request according to the prohibition state.
  • the interceptor feeds back request failure information to the business layer.
  • the interceptor intercepts the map loading request according to the single permission state, global prohibition state or multiple prohibition states corresponding to the map loading request, and feeds back the request failure information to the business layer.
  • the status data read from the non-volatile memory corresponds to the global permission status.
  • the local data mode is turned off by default, that is, LDM is disabled; the data on the terminal can be sent to the server, and data can also be obtained from the server.
  • the initializing service status information according to the status data includes: initializing the service status information according to the status data to a global permission status corresponding to all network services, and the multiple network services include at least a registration service and a login service.
  • sending the service networking request to the target server for data transmission with the server includes: if the service corresponding to the registered service is obtained The networking request is to send the service networking request to the server corresponding to the registration service. If the service networking request corresponding to the login service is obtained, the service networking request is sent to the server corresponding to the login service.
  • the user can register on the server and/or log in to the server.
  • Figure 10 is a schematic diagram of the interaction between the software business layer, the interceptor and the server in an implementation scenario, including the following steps 31 to S393.
  • the software is installed and started for the first time.
  • the interceptor adjusts the features of requests to be released in the local virtual private network or adjusts the features of the requests in the release whitelist and/or interception blacklist according to the global permission status.
  • the interceptor releases the service networking request corresponding to the login service and sends it to the server.
  • the service status information includes the global permission status corresponding to all network services including the login service
  • the login service is sent to the target server after the login service is acquired.
  • the service networking request can be sent to the server to obtain the network service.
  • the server feeds back information that the login is successful.
  • the server After the server receives the login service sent by the terminal, it verifies the login information; if the verification is passed, it returns the login information to the terminal.
  • the interceptor releases the service networking request generated by the software business layer and sends it to the server.
  • the service status information includes the global license status corresponding to all network services, after obtaining any service networking request, the service networking request is sent to the target server.
  • the server After receiving the service networking request sent by the terminal, the server sends service data, such as map data or firmware data, to the terminal according to the service networking request.
  • service data such as map data or firmware data
  • the user can perform a status modification operation to modify the service status information to a globally prohibited status.
  • the service state information is modified to the globally prohibited state.
  • the terminal can actively refresh the service status information or refresh the service status information according to the user's operation; or after modifying the status data of the data mode in the nonvolatile memory, prompt The user restarts the software to refresh the service status information as a global prohibited state.
  • any service networking request will be filtered by the interceptor and cannot be sent to the Internet.
  • the software business layer generates a service networking request.
  • the interceptor intercepts the service networking request according to the global prohibition state.
  • the interceptor feeds back request failure information to the business layer.
  • the interceptor intercepts the service networking request according to the global prohibition state, and feeds back the request failure information to the business layer.
  • the software business layer generates a service networking request.
  • the interceptor intercepts the service networking request according to the global prohibition state.
  • the interceptor feeds back request failure information to the business layer.
  • the interceptor intercepts the service networking request according to the global prohibition state, and feeds back the request failure information to the business layer.
  • S391 Modify the service status information corresponding to the map loading request to the permission status.
  • the user operates in the status data setting interface shown in Table 4 to modify the service status information.
  • the service state information corresponding to the at least one service networking request is modified from the prohibited state to the permitted state.
  • the service state information corresponding to the map loading request is modified from the prohibited state to the single permission state.
  • the terminal can actively refresh the service status information or refresh the service status information according to the user's operation; or after modifying the status data of the data mode in the nonvolatile memory, prompt The user restarts the software to refresh the service status information corresponding to the map loading request as a single license status.
  • the interceptor releases the map loading request generated by the software business layer, and sends the map loading request to the server.
  • the interceptor sends the map loading request to the target server, such as the map server, according to the single license status corresponding to the map loading request, so that the terminal can communicate with the target server.
  • Data transmission such as loading map data from a map server.
  • any other service networking requests will be intercepted by the interceptor.
  • S411 The software business layer generates a firmware upgrade request.
  • the interceptor intercepts the firmware upgrade request according to the prohibited state.
  • the interceptor feeds back request failure information to the business layer.
  • step S391 since step S391 only modifies the service status information corresponding to the map loading request to the permitted status, and the service status information corresponding to the firmware upgrade request is considered to be in the prohibited state, the interceptor intercepts the firmware upgrade request according to the prohibited state, and reports the request failure to the business layer information.
  • the user can perform a status modification operation to modify the service status information to the global permission status.
  • the service status information is modified to the global permission status.
  • the terminal can actively refresh the service status information or refresh the service status information according to the user's operation; or after modifying the status data of the data mode in the nonvolatile memory, prompt The user restarts the software to refresh the service status information as the global license status.
  • the interceptor releases the firmware upgrade request generated by the software business layer, and sends the firmware upgrade request to the server.
  • the interceptor sends the firmware upgrade request to the target server, such as the firmware upgrade server, according to the global license status corresponding to the firmware upgrade request, so that the terminal and the target server can perform data transmission. For example, load firmware data from a firmware server to implement firmware upgrades.
  • Fig. 11 is a schematic flow chart of a data management method implemented by an aircraft control device.
  • the control device may be, for example, an electronic device used to remotely control the aircraft, configure aircraft parameters, and/or perform data transmission with the aircraft, such as a mobile phone, a tablet, a remote control device and other equipment of the aircraft user.
  • control device implements the data management method including the following steps S510 to S620.
  • S520 Determine whether the state of the read local data mode is the on state (LDM enabled) or the off state (LDM disabled).
  • the service state information at this time includes the global license state corresponding to all network services; the control device executes step S531 to step S610.
  • MSDK MobileGame Software Development Kit
  • the software request is, for example, a network request sent to the server of the software service party, that is, the software server; for example, the software request is a network request used to communicate with the Flight Hub, or used to obtain Networking request for software or firmware update service.
  • the third-party request is, for example, a network request sent to a server of a non-software service party, that is, a third-party server, such as a server that provides map data; for example, the third-party request is a map loading request Or abnormal report request, etc.
  • the control device interacts with the aircraft, such as remotely controlling the aircraft, configuring aircraft parameters, and/or performing data transmission with the aircraft, etc.; including the steps of the control device sending a networking request to a software server or a third-party server, such as the control device upgrading firmware
  • the server sends a firmware update request to establish a communication link between the control device and the firmware update server, and then obtains firmware update data from the firmware update server to send the firmware update data to the aircraft and control the aircraft to perform firmware update.
  • the user can choose whether to modify the state of the local data mode, for example, change the local data mode from the off state to the on state.
  • S551 Determine whether the local data mode is enabled.
  • the user's state modification operation is detected and the local data mode is changed from the off state to the on state, the user's authority will be verified. If the user's status modification operation is not detected, it ends.
  • S552. Determine whether the authorization verification is passed; for example, determine whether the verification information matches the user according to verification information such as the user's password and fingerprint. If it fails the authorization verification, it ends.
  • the state of the local data mode is similar to a tree structure, including the state of the overall local data mode and the state of the local data mode of each sub-module. If the status of the overall local data mode is the on state, the status of the local data mode of each submodule is set to on, as in steps S561, S563, and S564.
  • the local data mode of the MSDK request is set to on; the MSDK request includes a registration request, a login request, a geographic location report request, etc., and the service status information corresponding to the MSDK request can be initialized to multiple prohibited states.
  • the control device interacts with the aircraft, such as remotely controlling the aircraft, configuring the aircraft parameters, and/or performing data transmission with the aircraft, etc. This includes the steps of the control device sending a networking request to a software server or a third-party server, for example, the control device sending a firmware upgrade request to a firmware upgrade server.
  • the control device intercepts any data sent to the server. Since the status of the overall local data mode is on, the status of the local data mode of each sub-module is set to on; any network request sent to the server will be intercepted by the control terminal.
  • the user can choose whether to modify the state of the local data mode, for example, change the local data mode from an on state to an off state.
  • the user's state modification operation is detected and the local data mode is changed from the on state to the off state, the user's authority will be verified. If the user's status modification operation is not detected, it ends.
  • the obtaining the service networking request includes: if a preset service request triggering condition is triggered, generating a service networking request corresponding to the service request triggering condition.
  • the service request trigger condition corresponding to the operation is triggered, and the service networking request corresponding to the operation is generated; for example, when the user clicks the button to upload local data, a data upload request is generated; Or, when the user clicks the button for releasing the ban, a request for releasing the ban is generated.
  • the terminal is preset with timed task conditions, for example, every month it queries the firmware upgrade server whether there is new firmware to be upgraded, and when the time for the director's task condition is met, the terminal generates a firmware upgrade request.
  • the generating the service networking request corresponding to the service request trigger condition includes step S150 to step S160.
  • the service request data corresponding to the service request trigger condition includes the user's account number, password, terminal physical address, firmware version information, device usage time and other data; the service networking request generated by the terminal needs to include this information so that the server can judge the authority And other processes.
  • obtaining the service request data corresponding to the service request trigger condition in S150 includes: if the service request trigger condition corresponds to the user's privacy data, outputting authorization request information; in response to the authorization permission input by the user, obtaining The service request data corresponding to the service request trigger condition.
  • the required service request data includes the user's privacy data when generating a service networking request
  • output the authorization request information such as a pop-up authorization window
  • the privacy in the service request data can be obtained Data, and then generate service networking requests.
  • S160 Perform anonymization processing and secret key signature processing on the service request data to obtain a service networking request.
  • the service request data will be anonymized and the secret key can be used to generate the service networking request; to protect the user's data security and privacy.
  • Figure 13 shows the structure diagram of the terminal and the server.
  • the state control module 51 of the terminal is used to set service state information.
  • the state control module 51 is a controller of the local data mode LDM, which is used to receive a user's command to turn on or off the local data mode.
  • the status control module 51 is responsible for the management of the life status of the entire service status information, and the service status information can still take effect after the software on the terminal is closed and restarted in time; unless the user writes to reinstall the software or clears all cached data.
  • the interception module 52 is used to adjust network requests that need to be intercepted or released according to the service status information. If the local data mode is enabled by the user, any network request will be intercepted and the request failure information will be sent to the business layer to handle the error; and the local data mode is transparent to the upper-layer business, and the developer adds a new network request in the business layer Don't worry about the network request being sent to the server when the local data mode is turned on. If the local data mode is turned off by the user, any network request will be sent to the server for data transmission with the server.
  • the request triggering module 53 is the initiator of the service networking request. If the parameters require the user's private data, an authorization window will pop up, and the networking request can be initiated after obtaining the user's permission.
  • the request processing module 54 is used for anonymizing the request data output by the request triggering module 53 and using the secret key to add a signature before sending it to the server.
  • the network interface 55 of the server is used to obtain data sent by the terminal from the Internet, or to send the data to a terminal.
  • the authority verification module 56 is used to check the signature of the data sent by the terminal and confirm whether the requested data of the terminal has the access authority.
  • the service module 57 is used to provide specific cloud services, such as obtaining map data requested by the terminal from a database, and then sending the map data to the terminal through the network interface 55.
  • the database 58 user saves data, and the server data will be encrypted and decrypted when it involves reading and writing the database, instead of being stored in plain text.
  • the data management method provided by the embodiments of the present application initializes the service status information according to the status data stored in the non-volatile memory, and therefore can block the data transmission between the terminal and the server or allow the data transmission between the terminal and the server according to the service status information
  • the communication and data transmission between the terminal and the server are controlled by the service status information, which improves the security of the terminal’s local data, such as preventing some data from being transmitted to the server or the server from writing some data to the terminal.
  • FIG. 14 is a schematic block diagram of a data management apparatus 600 according to an embodiment of the present application.
  • the data management device 600 includes a processor 601 and a memory 602.
  • the processor 601 and the memory 602 are connected by a bus 603, which is, for example, an I2C (Inter-integrated Circuit) bus.
  • I2C Inter-integrated Circuit
  • the processor 601 may be a micro-controller unit (MCU), a central processing unit (Central Processing Unit, CPU), a digital signal processor (Digital Signal Processor, DSP), or the like.
  • MCU micro-controller unit
  • CPU Central Processing Unit
  • DSP Digital Signal Processor
  • the memory 602 may be a Flash chip, a read-only memory (ROM, Read-Only Memory) disk, an optical disk, a U disk, or a mobile hard disk.
  • the processor 601 is used to run a computer program stored in the memory 602, and implement the aforementioned data management method when the computer program is executed.
  • the processor 601 is configured to run a computer program stored in the memory 602, and implement the following steps when executing the computer program:
  • the status data of the data mode is read from the non-volatile memory, and the service status information is initialized according to the status data.
  • the service status information includes the prohibition status indicating that the service networking is prohibited and/or the permission indicating that the service networking is permitted status;
  • the service networking request corresponding to the permission status is obtained, the service networking request is sent to the target server to perform data transmission with the server.
  • FIG. 15 is a schematic block diagram of an aircraft 10 according to an embodiment of the present application.
  • the aircraft 10 includes:
  • the above-mentioned data management device 600 is used to control whether to send a service networking request to the target server;
  • Flight component 11 used for flight.
  • FIG. 16 is a schematic block diagram of a mobile terminal 20 according to an embodiment of the present application.
  • the mobile terminal 20 includes:
  • the aforementioned data management device 600 is used to control whether to send a service networking request to the target server.
  • the mobile terminal 20 may be a mobile phone, a tablet, a remote control device, or other equipment.
  • the data management device, aircraft, and mobile terminal provided by the above-mentioned embodiments of the present application initialize service status information according to the status data stored in the non-volatile memory, and therefore can block the data transmission between the terminal and the server or allow the terminal according to the service status information Data transmission between the server and the server; the communication and data transmission between the terminal and the server are controlled by the service status information, which improves the security of the local data of the terminal, for example, prevents some data from being transmitted to the server or the server writing some data ⁇ terminal.
  • the embodiments of the present application also provide a computer-readable storage medium, the computer-readable storage medium stores a computer program, the computer program includes program instructions, and the processor executes the program instructions to implement the foregoing implementation The steps of the data management method provided in the example.
  • the computer-readable storage medium may be the internal storage unit of the data management device described in any of the foregoing embodiments, such as the hard disk or memory of the data management device.
  • the computer-readable storage medium may also be an external storage device of the data management device, such as a plug-in hard disk, a smart media card (SMC), and a secure digital (Secure Digital) equipped on the data management device. , SD) card, flash card (Flash Card), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

一种数据管理方法、数据管理装置、飞行器、移动终端和存储介质,所述方法包括:从非易失性存储器读取数据模式的状态数据,根据所述状态数据初始化服务状态信息,所述服务状态信息包括用于表示禁止服务联网的禁止状态和/或用于表示许可服务联网的许可状态(S110);若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求(S120);若获取到所述许可状态对应的服务联网求,将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输(S130)。

Description

数据管理方法、数据管理装置、飞行器、移动终端和存储介质 技术领域
本申请涉及数据安全技术领域,尤其涉及一种数据管理方法、数据管理装置、飞行器、移动终端和存储介质。
背景技术
软件产品长期以来一直存在着数据安全,尤其是隐私数据安全的问题和顾虑,2018年欧洲甚至推出了欧盟隐私法案试图从法律角度来保护用户的隐私数据安全。但是尽管如此,现有的软件产品仍然存在数据联网的权限管理混乱的问题。
例如,无人机可广泛应用于司法取证、公安、交警、林业、矿业和基础设施建设等领域,由于这些领域的数据本身包含着各种隐私、安全、合规等问题,这些领域的政府单位和企业对数据安全的敏感度都很高。如何能在不影响业务开展的同时减少或消除政企用户对数据安全的顾虑,成了目前业界比较难解决的问题。
发明内容
基于此,本申请提供了一种数据管理方法、数据管理装置、飞行器、移动终端和存储介质,旨在解决现有的数据管理方法对数据联网的权限管理较混乱,终端上的数据容易被软件上传至服务器或者软件可能会从服务器上获取数据等技术问题。
第一方面,本申请提供了一种数据管理方法,包括:
从非易失性存储器读取数据模式的状态数据,根据所述状态数据初始化服务状态信息,所述服务状态信息包括用于表示禁止服务联网的禁止状态和/或用于表示许可服务联网的许可状态;
若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求;
若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输。
第二方面,本申请提供了一种数据管理装置,包括存储器和处理器;
所述存储器用于存储计算机程序;
所述处理器,用于执行所述计算机程序并在执行所述计算机程序时,实现如下步骤:
从非易失性存储器读取数据模式的状态数据,根据所述状态数据初始化服务状态信息,所述服务状态信息包括用于表示禁止服务联网的禁止状态和/或用于表示许可服务联网的许可状态;
若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求;
若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输。
第三方面,本申请提供了一种飞行器,包括:
上述的数据管理装置,用于控制是否向目标服务器发送服务联网请求;
飞行组件,用于飞行。
第四方面,本申请提供了一种移动终端,包括:
上述的数据管理装置,用于控制是否向目标服务器发送服务联网请求。
第五方面,本申请提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时使所述处理器实现上述的数据管理方法。
本申请实施例提供了一种数据管理方法、数据管理装置、飞行器、移动终端和存储介质,根据非易失性存储器中存储的状态数据初始化服务状态信息,因此可以根据服务状态信息阻止终端与服务器之间的数据传输或者允许终端与服务器之间进行数据的传输;通过服务状态信息管控终端与服务器之间的通信和数据传输,提高了终端本地数据的安全性,例如防止某些数据被传输至服务器或者服务器将某些数据写入终端。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本申请。
附图说明
为了更清楚地说明本申请实施例技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一实施例提供的一种数据管理方法的流程示意图;
图2是显示界面中服务状态信息对应的状态的示意图;
图3是本申请数据管理方法一实施方式的流程示意图;
图4是本申请数据管理方法另一实施方式的流程示意图;
图5是本申请数据管理方法再一实施方式的流程示意图;
图6是本申请数据管理方法又一实施方式的流程示意图;
图7是本申请数据管理方法又一实施方式的流程示意图;
图8是本申请数据管理方法又一实施方式的流程示意图;
图9是用于实现数据管理方法的终端中业务层、拦截器和服务器之间交互关系的一种流程示意图;
图10是用于实现数据管理方法的终端中业务层、拦截器和服务器之间交互关系的另一种流程示意图;
图11是为飞行器的控制装置实现数据管理方法的一种流程示意图;
图12是生成服务联网请求的一种实施方式的流程示意图;
图13是实现数据管理方法终端与服务器的结构示意图;
图14是本申请一实施例提供的一种数据管理装置的示意性框图;
图15是本申请一实施例提供的一种飞行器的示意性框图;
图16是本申请一实施例提供的一种移动终端的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
附图中所示的流程图仅是示例说明,不是必须包括所有的内容和操作/步骤, 也不是必须按所描述的顺序执行。例如,有的操作/步骤还可以分解、组合或部分合并,因此实际执行的顺序有可能根据实际情况改变。
下面结合附图,对本申请的一些实施方式作详细说明。在不冲突的情况下,下述的实施例及实施例中的特征可以相互组合。
请参阅图1,图1是本申请一实施例提供的一种数据管理方法的流程示意图。所述数据管理方法可以应用在终端设备中,用于管理终端设备和服务器之间数据的传输等过程;其中终端设备可以为手机、平板电脑、笔记本电脑、台式电脑、个人数字助理、穿戴式设备、遥控装置或者无人机等,服务器可以为独立的服务器,也可以为服务器集群。进一步而言,无人机可以为旋翼型无人机,例如四旋翼无人机、六旋翼无人机、八旋翼无人机,也可以是固定翼无人机。
如图1所示,本实施例数据管理方法包括步骤S110至步骤S130。
S110、从非易失性存储器读取数据模式的状态数据,根据所述状态数据初始化服务状态信息,所述服务状态信息包括用于表示禁止服务联网的禁止状态和/或用于表示许可服务联网的许可状态。
终端的非易失性存储器中存储了数据模式的状态数据,终端根据状态数据可以初始化服务状态信息。
在一种实施方式中,状态数据与服务状态信息之间的关系如表1所示。
表1 状态数据与服务状态信息
状态 状态数据 服务状态信息
LDM enabled 禁止状态
LDM disabled 许可状态
示例性的,LDM表示本地数据模式(Local Data Mode);例如当本地数据模式开启的时候,终端上的数据只在本地使用,而不能被发送至服务器,如管理该数据的软件所对应的服务器或者第三方服务器;又例如当本地数据模式开启的时候,终端只能使用本地的数据,而不能从服务器获取数据。
示例性的,LDM enabled表示本地数据模式为开启状态,LDM disabled表示本地数据模式为关闭状态。
在本实施方式中,如果从非易失性存储器中读取的状态数据为LDM enabled,则根据所述状态数据初始化服务状态信息为用于表示禁止服务联网的禁止状态; 如果从非易失性存储器中读取的状态数据为LDM disabled,则根据所述状态数据初始化服务状态信息为用于表示许可服务联网的许可状态。
示例性的,用于表示禁止服务联网的禁止状态可以包括LDM enabled,即本地数据模式开启的状态,终端上的数据只在本地使用而不能被发送至服务器,且终端只能使用本地的数据而不能从服务器获取数据;用于表示许可服务联网的许可状态可以包括LDM disabled,即本地数据模式关闭的状态,终端上的数据可以被发送至服务器,也可以从服务器获取数据。
示例性的,终端包括非易失性存储器,非易失性存储器中的内容不会因为断电而消失,通常用以存储不需经常变更的程序或数据;例如终端为手机时,非易失性存储器包括终端中的只读存储器(Read-only memory,ROM)。
将数据模式的状态数据存储在非易失性存储器中,使得即使软件进程被关闭,状态数据也可以保持不变;在软件重启后,仍能恢复状态数据对应的服务状态信息。
S120、若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求。
示例性的,如果终端上的软件生成了指向某网络地址的服务联网请求,则根据服务状态信息判断该服务联网请求对应的服务状态信息。
在一些实施方式中,所述拦截所述服务联网请求,包括:禁止将所述服务联网请求向目标服务器发送。
例如,终端上的软件生成了地图加载请求,该地图加载请求指向位于地图服务器的地图加载网络地址;如果该软件根据服务状态信息判断地图加载请求对应于禁止状态,则拦截地图加载请求,以阻止地图加载请求被发送至地图服务器。
又例如,禁止状态对应于软件生成的所有服务联网请求,则拦截所述软件生成的所有服务联网请求,以阻止终端和任何服务器连接而进行数据的传输。
示例性的,所述拦截所述服务联网请求之后,包括:向软件的业务层返回所述服务联网请求对应的请求失败信息。
例如,在拦截地图加载请求之后,终端通过向软件的业务层返回地图加载请求对应的请求失败信息,使终端的显示界面显示请求失败信息,以告知用户由于该服务联网请求对应的服务状态信息为禁止状态,该服务联网请求被拦截, 未被发送至相应的服务器。
示例性的,请求失败信息还可以包括被拦截的服务联网请求对应的请求许可提示,例如提示用户将地图加载请求对应的状态数据修改为许可状态对应的状态数据。
S130、若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输。
示例性的,如果终端上的软件根据服务状态信息判断服务联网请求对应的服务状态信息为许可状态,则将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输,例如将终端本地的数据发送至服务器,或者从服务器获取数据并加载在终端本地。
在一些实施方式中,所述将所述服务联网请求向目标服务器发送,包括以下至少一项:
若所述服务联网请求包括固件升级请求,将所述服务联网请求向固件升级服务器发送;
若所述服务联网请求包括限飞解禁请求,将所述服务联网请求向限飞管理服务器发送;
若所述服务联网请求包括地图加载请求,将所述服务联网请求向地图服务器发送;
若所述服务联网请求包括数据上传请求,将所述服务联网请求向数据存储服务器发送。
终端可以通过向固件升级服务器发送固件升级请求,与固件升级服务器建立通信连接,以从固件升级服务器获取固件数据,实现固件升级;终端可以通过向限飞管理服务器发送限飞解禁请求,与限飞管理服务器建立通信连接,以从限飞管理服务器获取用于解禁限飞状态的数据,实现限飞解禁;终端可以通过向地图服务器发送地图加载请求,与地图服务器建立通信连接,以从地图服务器获取地图数据;终端可以通过向数据存储服务器发送数据上传请求,与数据存储建立通信连接,以将终端本地的数据上传至服务器进行云端存储。
本申请实施例提供的数据管理方法,根据非易失性存储器中存储的状态数据初始化服务状态信息,因此可以根据服务状态信息阻止终端与服务器之间的数据传输或者允许终端与服务器之间进行数据的传输;通过服务状态信息管控 终端与服务器之间的通信和数据传输,提高了终端本地数据的安全性,例如防止某些数据被传输至服务器或者服务器将某些数据写入终端。
示例性的,步骤S110从非易失性存储器读取数据模式的状态数据,根据所述状态数据初始化服务状态信息,包括:在软件启动时,从本地的非易失性存储器读取数据模式的状态数据;然后根据所述状态数据初始化易失性存储器中的服务状态信息。
示例性的,终端包括非易失性存储器和易失性存储器;易失性存储器中的内容会因为断电而消失,通常作为正在运行程序的临时存储介质;例如终端为手机时,易失性存储器包括终端中的随机存取记忆体(Random Access Memory,RAM)。
终端上的软件在启动时,该软件从非易失性存储器读取数据模式的状态数据,然后根据该状态数据对软件运行时所占用的易失性存储器中的服务状态信息进行初始化。
将数据模式的状态数据存储在非易失性存储器中,使得即使软件进程被关闭,状态数据也可以保持不变;在软件重启后,仍能恢复状态数据对应的服务状态信息。
在一些实施方式中,本地的非易失性存储器中存储的状态数据为加密的状态数据。
示例性的,所述根据所述状态数据初始化易失性存储器中的服务状态信息,包括:
解密所述状态数据,得到所述状态数据对应的服务状态信息;然后将易失性存储器中的服务状态信息初始化为解密得到的服务状态信息。
示例性的,加密的状态数据与服务状态信息之间的关系如表2所示。
表2 加密的状态数据与服务状态信息
状态 状态数据 服务状态信息
34erht34334cw5f LDM enabled
Iwxs90skd21hdad5 LDM disabled
通过将状态数据加密存储在非易失性存储器中,状态数据不会被轻易篡改,进一步提高了数据模式管理的可靠性,提高了终端上数据的安全性。
示例性的,步骤S110初始化服务状态信息之后,包括:输出所述服务状态 信息对应的状态至显示界面。
如图2所示,终端在显示界面的右上角显示服务状态信息对应的状态。示例性的,图2中显示的服务状态信息对应的状态是本地数据模式开启,即LDM enabled的状态。
因此,用户在使用终端时,可以观察到终端上相应软件的服务状态信息,并根据服务状态信息了解服务联网请求是否会被拦截。
在一些实施方式中,如图3所示,数据管理方法还包括步骤S140。
S140、响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据。
用户可以通过状态修改操作,自主设定数据模式;用户可以自主管理数据的使用权限,无需担心自己数据的安全性问题,例如无需担心自己终端的数据未经授权被上传至服务器或者服务器未经授权将数据发送至终端;用户对自己的数据具有控制权,对数据安全更有安全感。
例如,用户将终端的状态数据修改为对应于禁止状态的状态数据;则在在无人机作业期间,如无人机将航拍数据传输至终端,终端根据禁止状态拦截发送至服务器的服务联网请求,从而服务器无法从终端获取航拍数据。降低了用户对数据安全的顾虑,可以放心的使用无人机和终端进行作业。
示例性的,用户想使用一些网络服务时,可以把本地数据模式临时关闭,以许可相应的服务联网请求被发送至相应的服务器从而可以从服务器获取相应的网络服务。例如,用户可以在安全的而网络环境下将终端的状态数据修改为对应于许可状态的状态数据,因此终端可以向服务器发送服务联网请求,并将航拍数据上传至服务器。这样既能保护数据的安全,又可以在用户知情的情况下自由的控制数据是否可以联网;从而用户即可以享受网络服务,又能保证自己数据的安全,大大减少用户使用软件时对数据安全的顾虑。
示例性的,响应于用户关闭本地数据模式的操作,将状态数据由LDM enabled修改为LDM disabled,从而终端可以将许可状态对应的服务联网请求向目标服务器发送以与所述服务器进行数据传输;或者响应于用户开启本地数据模式的操作,将状态数据由LDM disabled修改为LDM enabled,从而使终端拦截禁止状态对应的服务联网请求。
在一些实施方式中,步骤S140响应于用户的状态修改操作,修改所述非易 失性存储器中数据模式的状态数据,包括:响应于用户输入的状态修改指令,修改所述非易失性存储器中数据模式的状态数据。从而用户可以通过输入状态修改指令,自主设定数据模式。
示例性的,终端显示状态修改的虚拟按钮,用户通过点击该虚拟按钮向终端输入状态修改指令;或者,终端上设有对应于状态修改指令或者对应于不同状态数据的实体按键,用户通过点击实体按键向终端输入状态修改指令。
在另一些实施方式中,步骤S140响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据,包括:响应于用户输入或导入的状态修改许可数据,将所述非易失性存储器中数据模式的状态数据修改为所述状态修改许可数据对应的状态数据。从而用户可以通过状态修改许可数据自主设定数据模式。
示例性的,状态修改许可数据为软件开发商发布的用于修改数据模式的状态数据的数据,例如为软件开发商发布的许可证(License),许可证包括通过特定格式加密的数据。终端上的软件设有状态修改许可数据的输入界面或者导入界面,用户可以将获取的状态修改许可数据输入或导入终端上安装的软件;软件获取并解密状态修改许可数据后,将状态数据修改为所述状态修改许可数据对应的状态数据。
例如,用户将对应于开启本地数据模式的许可证导入软件,则软件将状态数据修改为LDM enabled。
在一些实施方式中,如图4所示,步骤S140响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据之前,包括步骤S1401。
S1401、获取用户输入的验证信息,判断所述验证信息是否与所述用户匹配。
在本实施方式中,步骤S140响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据,包括步骤S141。
S141、若所述验证信息与所述用户匹配,响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据。
示例性的,终端在修改数据模式的状态数据之前,需要先验证用户是否有权限修改状态数据。例如,用户需要向终端输入密码、指纹等验证信息,终端判断所述验证信息是否与所述用户匹配;如果确定用户有修改状态数据的权限,才会响应用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数 据。从而可以保证数据模式的状态数据安全和准确,保证用户自主管理终端数据的权利。
示例性的,状态数据的任何修改,都需要先验证用户是否具有权限,只有判定用户具有权限,且获得用户许可时,才响应于用户的状态修改操作,修改所述状态数据。
在一些实施方式中,步骤S140响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据之后,包括:从所述非易失性存储器读取修改后的状态数据,根据所述状态数据初始化易失性存储器中的服务状态信息。
在本实施方式中,修改非易失性存储器中数据模式的状态数据之后,终端可以主动刷新服务状态信息或者根据用户的操作刷新服务状态信息,而无需重启终端或重启软件。
具体的,终端重新从非易失性存储器读取修改后的状态数据,然后根据状态数据初始化易失性存储器中的服务状态信息;之后执行步骤S120、步骤S130。
示例性的,初始化服务状态信息之后,包括:输出所述服务状态信息对应的状态至显示界面。以及时更新终端显示界面上显示的服务状态信息对应的状态,便于用户了解服务联网请求是否会被拦截。
在一些实施方式中,如图4所示,步骤S140响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据之后,包括步骤S1402。
S1402、输出重启软件提示,以提示所述用户重启软件。
示例性的,用户根据重启软件提示重启终端上安装的软件;软件在重启后,通过执行步骤S110,以从非易失性存储器读取重启前用户修改的数据模式的状态数据,根据所述状态数据初始化服务状态信息;从而实现刷新用户修改的服务状态信息。
具体的,终端重新从非易失性存储器读取修改后的状态数据,然后根据状态数据初始化易失性存储器中的服务状态信息;之后执行步骤S120、步骤S130。
示例性的,初始化服务状态信息之后,包括:输出所述服务状态信息对应的状态至显示界面。以及时更新终端显示界面上显示的服务状态信息对应的状态,便于用户了解服务联网请求是否会被拦截。
在一些实施方式中,步骤S140响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据之前,包括:若有预设的状态修改触发条件 被触发,输出所述状态修改触发条件对应的状态修改提示。
示例性的,若软件判断出现运行故障,需要向服务器反馈故障时,输出对应的状态修改提示,以提示用户是否将用于表示禁止服务联网的禁止状态修改为用于表示许可服务联网的许可状态。
示例性的,若终端获取到所述禁止状态对应的服务联网请求,输出所述服务联网请求对应的请求许可提示。
例如,终端在获取到禁止状态对应的服务联网请求之后,拦截所述服务联网请求;若该服务联网请求对应于较高的联网优先级,则输出所述服务联网请求对应的请求许可提示。
示例性的,某服务联网请求为地图加载请求,由于地图的准确性会影响到飞行器的飞行任务,地图加载请求对应于较高的联网优先级;则在拦截所述服务联网请求之后,输出请求许可提示,以提示用户将地图加载请求对应的状态数据修改为许可状态对应的状态数据。
因此,终端可以在必要时提示用户修改数据模式的状态数据,以便软件、终端完成用户规定的任务。
示例性的,输出状态修改提示之后,通过步骤S1401获取用户输入的验证信息,判断所述验证信息是否与所述用户匹配;若所述验证信息与所述用户匹配,响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据。
在一些实施方式中,如图5所示,步骤S120若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求,包括步骤S121。
S121、若所述服务状态信息包括对应于所有网络服务的全局禁止状态,在获取到任一服务联网请求之后拦截所述服务联网请求。
示例性的,终端需要和服务器配合完成的网络服务,即预设的网络服务包括:固件升级、限飞解禁、地图加载、数据上传等;各网络服务服务分别对应于:固件升级请求、限飞解禁请求、地图加载请求、数据上传请求等服务联网请求。
如果初始化的服务状态信息包括全局禁止状态,即用于表示禁止所有预设的网络服务联网的禁止状态,则终端生成的所有服务联网请求均对应于禁止状态,因此终端拦截所有获取到的服务联网请求,终端只能使用本地的数据。
具体的,用户可以设置非易失性存储器中数据模式的状态数据为对应于全局禁止状态的状态数据;仅需该项设置就可以实现彻底的本地数据模式,终端在该模式下不能发送服务联网请求至相应的服务器。
示例性的,显示界面显示用于表示本地数据模式为开启状态的LDM enabled按钮,以及用于表示本地数据模式为关闭状态的LDM disabled按钮。如果LDM enabled按钮被选中,则本地数据模式开启,设置非易失性存储器中数据模式的状态数据为对应于全局禁止状态的状态数据;如果LDM disabled按钮被选中,则本地数据模式关闭,设置非易失性存储器中数据模式的状态数据为对应于全局许可状态的状态数据。
在一些实施方式中,步骤S130若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送,包括步骤S131。
S131、若所述服务状态信息包括对应于所有网络服务的全局许可状态,在获取到任一服务联网请求之后将所述服务联网请求向目标服务器发送。
如果初始化的服务状态信息包括全局许可状态,即用于表示许可所有预设的网络服务联网的许可状态,则终端生成的所有服务联网请求均对应于许可状态,因此终端不拦截获取到的服务联网请求,可以将获取到的预设的任一服务联网请求向目标服务器发送以与相应的服务器进行数据传输。
具体的,用户可以设置非易失性存储器中数据模式的状态数据为对应于全局许可状态的状态数据;仅需该项设置就可以实现终端在需要时正常和服务器进行数据传输,获取固件升级、限飞解禁、地图加载、数据上传等网络服务。
在一些实施方式中,初始化的服务状态信息包括全局禁止状态或者全局许可状态;在另一些实施方式中,初始化的服务状态信息可以包括多项禁止状态、多项许可状态、单项禁止状态、单项许可状态中的至少一种;各种禁止状态或者许可状态可以对应于一个或多个服务联网请求。
示例性的,如图6所示,步骤S120若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求,包括步骤S122。
S122、若所述服务状态信息包括对应于多个网络服务的多项禁止状态,在获取到所述多项禁止状态对应的任一服务联网请求之后拦截所述服务联网请求。
示例性的,如表3所示为终端获取的服务状态信息和服务联网请求的对应关系。
表3 服务状态信息服务联网请求的对应关系
Figure PCTCN2019090597-appb-000001
如表3所示,终端将多个网络服务各自对应的服务联网请求分为多组,如第一组和第二组;其中第一组包括固件升级对应的固件升级请求以及限飞解禁对应的限飞解禁请求,第二组包括地图加载对应的地图加载请求以及数据上传对应的数据上传请求。
示例性的,如果初始化的服务状态信息包括对应于第一组服务联网请求的多项禁止状态,则终端若获取到第一组服务联网请求中的任一服务联网请求,拦截该服务联网请求。
具体的,用户通过设置各组服务联网请求对应的服务状态信息为多项禁止状态,就可以管理终端拦截多种网络服务的服务联网请求。
在一些实施方式中,如图6所示,步骤S130若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送,包括步骤S132。
S132、若所述服务状态信息包括对应于多个网络服务的多项许可状态,在获取到所述多项许可状态对应的任一服务联网请求之后将所述服务联网请求向目标服务器发送。
如表3所示,终端将多个网络服务各自对应的服务联网请求分为多组,如第一组和第二组。
示例性的,如果初始化的服务状态信息包括对应于第二组服务联网请求的多项许可状态,则终端若获取到第二组服务联网请求中的任一服务联网请求,将该服务联网请求向目标服务器发送以与相应的服务器进行数据传输。
具体的,用户通过设置各组服务联网请求对应的服务状态信息为多项许可状态,就可以管理终端放行多种网络服务的服务联网请求,以实现终端在需要时正常和服务器进行数据传输,获取例如地图加载、数据上传等多种网络服务。
在一些实施方式中,如图6所示,步骤S120若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求,包括步骤S123。
S123、若所述服务状态信息包括对应于一个网络服务的单项禁止状态,在获取到所述单项禁止状态对应的服务联网请求之后拦截所述服务联网请求。
示例性的,用户可以将状态数据对应的全局状态设置为全局禁止状态或者全局许可状态,也可以设置各组服务联网请求对应的服务状态信息为多项禁止状态或者多项许可状态,还可以设置各服务联网请求对应的服务状态信息为单项禁止状态或者单项许可状态。
示例性的,如表4所示为用户设置服务状态信息对应的状态数据时的显示界面。
表4 状态数据设置界面
Figure PCTCN2019090597-appb-000002
示例性的,如表4所示,用户设置固件升级请求和限飞解禁请求这组服务联网请求对应的服务状态信息,即多项状态为多项禁止状态,则该组内的各项服务联网请求的服务状态信息,即单项状态均被自动设置为单项禁止状态。
示例性的,若用户设置全局状态为全局禁止状态,则各组的多项状态均自动设置为多项禁止状态,各服务联网请求的单项状态自动设置为单项禁止状态;若用户设置全局状态为全局许可状态,则各组的多项状态均自动设置为多项许可状态,各服务联网请求的单项状态自动设置为单项许可状态。
示例性的,如表4所示,用户设置地图加载请求对应的服务状态信息,即单项状态为单项禁止状态,设置数据上传请求的单项状态为单项许可状态。由于同组内服务联网请求的单项状态不一致,则该组对应的多项状态为无效状态;由于不同组的多项状态不一致,则全局状态也为无效状态。
示例性的,服务状态信息包括对应于地图加载请求的单项禁止状态,在获取到该单项禁止状态对应的服务联网请求,如地图加载请求之后拦截该服务联网请求,因此终端不会和提供地图加载服务的服务器通信连接,进行数据传输。
具体的,用户通过针对性的设置某服务联网请求对应的服务状态信息为单 项禁止状态,可以准确的阻止终端和特定的服务器进行数据传输。
示例性的,如图6所示,步骤S130若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送,包括步骤S133。
S133、若所述服务状态信息包括对应于一个网络服务的单项许可状态,在获取到所述单项许可状态对应的服务联网请求之后将所述服务联网请求向目标服务器发送。
示例性的,服务状态信息包括对应于数据上传请求的单项许可状态,在获取到该单项许可状态对应的服务联网请求,如数据上传请求之后将该服务联网请求向目标服务器发送以与相应的服务器通信连接,进行数据传输。
具体的,用户通过针对性的设置某服务联网请求对应的服务状态信息为单项许可状态,可以准确的放行终端和特定的服务器进行数据传输,获取某项数据服务。
在一些实施方式中,如图7所示,步骤S110根据状态数据初始化服务状态信息之后,包括步骤S101。
S101、根据所述服务状态信息调整本地虚拟专用网络中的待放行请求特征。
示例性的,终端本地开启一个虚拟专用网络(Virtual Private Network,VPN)作为拦截器(Intercepter),在虚拟专用网络中可以获取到所有请求到达物理网口之前的数据。
示例性的,若服务状态信息包括全局许可状态,则将全局许可状态对应的各服务联网请求的请求特征作为待放行请求特征,如将各服务联网请求的域名作为待放行请求特征;若服务状态信息包括某一服务联网请求对应的单项许可状态,则将该服务联网请求的域名作为待放行请求特征,而不将对应于单项禁止状态、多项禁止状态、全局禁止状态的请求特征作为待放行请求特征。
示例性的,如图7所示,步骤S120若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求,包括步骤S1201、步骤S1202。
S1201、若获取到服务联网请求,将所述服务联网请求发送至所述本地虚拟专用网络。
具体的,在服务联网请求发送至物理网口之前,虚拟专用网络先获取服务联网请求。
S1202、若所述服务联网请求与调整后本地虚拟专用网络中的待放行请求特 征均不匹配,拦截所述服务联网请求。
例如,如果虚拟专用网络某次获取到的服务联网请求的域名与所有的待放行请求特征均不相同,则判定该服务联网请求对应于禁止状态,则拦截该服务联网请求。
示例性的,如图7所示,步骤S130若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输,包括步骤S1301。
S1301、若所述服务联网请求与调整后本地虚拟专用网络中的至少一个待放行请求特征相匹配,将所述服务联网请求向目标服务器发送。
例如,如果虚拟专用网络某次获取到的服务联网请求的域名与某一待放行请求特征相同,则判定该服务联网请求对应于许可状态,则放行该服务联网请求,将所述服务联网请求向目标服务器发送。
根据虚拟专用网络中的待放行请求特征,可以全面、准确过滤禁止状态对应的服务联网请求,针对性的放行许可状态对应的服务联网请求。
在另一些实施方式中,如图8所示,步骤S110根据状态数据初始化服务状态信息之后,包括步骤S102。
S102、根据所述服务状态信息调整放行白名单和/或拦截黑名单中的请求特征。
示例性的,终端根据服务状态信息维护一个放行白名单作为拦截器判定拦截或放行服务联网请求的条件。例如,若服务状态信息包括全局许可状态,则将全局许可状态对应的各服务联网请求的请求特征作为放行白名单中的请求特征,如将各服务联网请求的域名作为放行白名单中的请求特征;若服务状态信息包括某一服务联网请求对应的单项许可状态,则将该服务联网请求的域名作为放行白名单中的请求特征,而不将对应于单项禁止状态、多项禁止状态、全局禁止状态的请求特征作为放行白名单中的请求特征。
示例性的,终端根据服务状态信息维护一个拦截黑名单。例如,若服务状态信息包括全局禁止状态,则将全局禁止状态对应的各服务联网请求的请求特征作为拦截黑名单中的请求特征,如将各服务联网请求的域名作为拦截黑名单中的请求特征;若服务状态信息包括某一服务联网请求对应的单项禁止状态,则将该服务联网请求的域名作为拦截黑名单中的请求特征,而不将对应于单项 许可状态、多项许可状态、全局许可状态的请求特征作为拦截黑名单中的请求特征。
示例性的,如图8所示,步骤S120若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求,包括步骤S1203、步骤S1204。
S1203、若获取到服务联网请求,判断所述服务联网请求是否与所述放行白名单和/或拦截黑名单中的请求特征相匹配。
例如,获取到服务联网请求之后,判断所述服务联网请求的域名是否和放行白名单和/或拦截黑名单中的请求特征相同。
S1204、若所述服务联网请求与调整后拦截黑名单中的至少一个请求特征相匹配,和/或所述服务联网请求与调整后放行白名单中的请求特征均不匹配,拦截所述服务联网请求。
例如,如果服务联网请求与拦截黑名单中的某一个请求特征相同,则判定该服务联网请求对应于禁止状态,则拦截该服务联网请求。
例如,如果服务联网请求与放行白名单中的所有请求特征均不匹配,则判定该服务联网请求对应于禁止状态,则拦截该服务联网请求。
示例性的,如图8所示,步骤S130若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输,包括步骤S1302。
S1302、若所述服务联网请求与调整后放行白名单中的至少一个请求特征相匹配,和/或所述服务联网请求与调整后拦截黑单中的请求特征均不匹配,将所述服务联网请求向目标服务器发送。
例如,如果服务联网请求与放行白名单中的某一个请求特征相同,则判定该服务联网请求对应于许可状态,则放行该服务联网请求,将所述服务联网请求向目标服务器发送。
例如,如果服务联网请求与拦截黑名单中的所有请求特征均不匹配,则判定该服务联网请求对应于禁止状态,则放行该服务联网请求,将所述服务联网请求向目标服务器发送。
根据服务状态信息维护的放行白名单和/或拦截黑名单,可以全面、准确的过滤禁止状态对应的服务联网请求,针对性的放行许可状态对应的服务联网请求。
在一些实施方式中,若软件为首次安装,那么在首次启动时,本地数据模式(LDM)被默认开启,这期间的任何网络请求都会被过滤,无法发送到互联网上。从非易失性存储器读取的状态数据对应于全局禁止状态。例如,软件首次安装启动时,本地数据模式默认为开启状态,即LDM enabled;终端上的数据只能保存在本地使用,而被禁止发送至服务器。
所述根据所述状态数据初始化服务状态信息,包括:根据所述状态数据将服务状态信息初始化为对应于所有网络服务的全局禁止状态。终端在获取到任一服务联网请求之后拦截所述服务联网请求。
如图9所示为一种实施场景下,软件业务层、拦截器和服务器之间的交互关系示意图,包括以下步骤21至步骤S293。
S21、软件首次安装启动。
S22、初始化服务状态信息为全局禁止状态,调整拦截器。
具体的,拦截器根据全局禁止状态调整本地虚拟专用网络中的待放行请求特征或者调整放行白名单和/或拦截黑名单中的请求特征。
S231、软件业务层生成服务联网请求。
S232、拦截器根据全局禁止状态拦截该服务联网请求。
S233、拦截器向业务层反馈请求失败信息。
具体的,当软件业务层生成服务联网请求,如Network Request时,拦截器根据全局禁止状态拦截该服务联网请求,并向业务层反馈请求失败信息。
S24、软件再次启动。
当软件再次启动时,由于非易失性存储器中的状态数据没有修改,服务状态信息仍被初始化为全局禁止状态。
S251、软件业务层生成服务联网请求。
S252、拦截器根据全局禁止状态拦截该服务联网请求。
S253、拦截器向业务层反馈请求失败信息。
具体的,当软件业务层生成服务联网请求,如Network Request时,拦截器根据全局禁止状态拦截该服务联网请求,并向业务层反馈请求失败信息。
S26、将地图加载请求对应的服务状态信息修改为许可状态。
具体的,响应于用户输入的状态修改指令,将至少一种服务联网请求对应的服务状态信息由禁止状态修改为许可状态。例如,通过状态修改指令Enable  Map Request将地图加载请求对应的服务状态信息由禁止状态修改为单项许可状态。具体的,修改非易失性存储器中数据模式的状态数据之后,终端可以主动刷新服务状态信息或者根据用户的操作刷新服务状态信息;或者修改非易失性存储器中数据模式的状态数据之后,提示用户重启软件,以刷新地图加载请求对应的服务状态信息为单项许可状态。
S271、拦截器放行软件业务层生成的地图加载请求,将地图加载请求发送至服务器。
S272、从服务器获取地图数据。
具体的,当软件业务层生成地图加载请求,如Map Request时,拦截器根据地图加载请求对应的单项许可状态,将地图加载请求向目标服务器,如地图服务器发送以使终端与所述目标服务器进行数据传输,例如从地图服务器加载地图数据。
S28、将地图加载请求对应的服务状态信息修改为禁止状态。
具体的,在地图数据加载完成之后,用户可以进行状态修改操作,将地图加载请求对应的服务状态信息由单项许可状态修改为禁止状态,例如通过状态修改指令Disable Map Request将地图加载请求对应的服务状态信息由单项许可状态修改为单项禁止状态。具体的,修改非易失性存储器中数据模式的状态数据之后,终端可以主动刷新服务状态信息或者根据用户的操作刷新服务状态信息;或者修改非易失性存储器中数据模式的状态数据之后,提示用户重启软件,以刷新地图加载请求对应的服务状态信息为单项禁止状态。
S291、软件业务层生成地图加载请求。
S292、拦截器根据禁止状态拦截地图加载请求。
S293、拦截器向业务层反馈请求失败信息。
当软件业务层生成地图加载请求,如Map Request时,拦截器根据地图加载请求对应的单项许可状态、全局禁止状态或多项禁止状态,拦截地图加载请求,并向业务层反馈请求失败信息。
在另一些实施方式中,若软件为首次启动,从非易失性存储器读取的状态数据对应于全局许可状态。例如,软件首次安装启动时,本地数据模式默认为关闭状态,即LDM disabled;终端上的数据可以被发送至服务器,也可以从服务器获取数据。
所述根据所述状态数据初始化服务状态信息,包括:根据所述状态数据将服务状态信息初始化为对应于所有网络服务的全局许可状态,所述多个网络服务至少包括注册服务和登录服务。
示例性的,所示若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输,包括:若获取到所述注册服务对应的服务联网请求,将所述服务联网请求向所述注册服务对应的服务器发送。若获取到所述登录服务对应的服务联网请求,将所述服务联网请求向所述登录服务对应的服务器发送。
因此在软件首次安装启动时,用户可以进行在服务器上注册和/或登录服务器的操作。
如图10所示为一种实施场景下,软件业务层、拦截器和服务器之间的交互关系示意图,包括以下步骤31至步骤S393。
S31、软件首次安装启动。
S32、初始化服务状态信息为全局许可状态,调整拦截器。
具体的,拦截器根据全局许可状态调整本地虚拟专用网络中的待放行请求特征或者调整放行白名单和/或拦截黑名单中的请求特征。
S331、拦截器放行登录服务对应的服务联网请求,发送至服务器。
由于服务状态信息包括对应于包括登录服务的所有网络服务的全局许可状态,在获取到登录服务之后将登录服务向目标服务器发送。在服务状态信息未被修改以前,如本地数据模式未被开启以前,服务联网请求均可征程发送至服务器以获得网络服务。
S332、服务器反馈登录成功的信息。
服务器接收到终端发送的登录服务后,验证登录信息;若验证通过,则向终端反馈登录成功的信息。
S341、拦截器放行软件业务层生成的服务联网请求,发送至服务器。
由于服务状态信息包括对应于所有网络服务的全局许可状态,在获取到任一服务联网请求之后将所述服务联网请求向目标服务器发送。
S342、从服务器获取服务数据。
服务器接收到终端发送的服务联网请求后,根据服务联网请求向终端发送服务数据,如地图数据或固件数据等。
S35、将服务状态信息修改为全局禁止状态。
具体的,用户可以进行状态修改操作,将服务状态信息修改为全局禁止状态。例如通过状态修改指令Enable LDM将服务状态信息修改为全局禁止状态。具体的,修改非易失性存储器中数据模式的状态数据之后,终端可以主动刷新服务状态信息或者根据用户的操作刷新服务状态信息;或者修改非易失性存储器中数据模式的状态数据之后,提示用户重启软件,以刷新服务状态信息为全局禁止状态。
示例性的,用户把本地数据模式修改为开启状态后,任何服务联网请求均会拦截器过滤,无法发送至互联网上。
S361、软件业务层生成服务联网请求。
S362、拦截器根据全局禁止状态拦截该服务联网请求。
S363、拦截器向业务层反馈请求失败信息。
具体的,当软件业务层生成服务联网请求,如Network Request时,拦截器根据全局禁止状态拦截该服务联网请求,并向业务层反馈请求失败信息。
S37、软件再次启动。
当软件再次启动时,由于非易失性存储器中的状态数据没有修改,服务状态信息仍被初始化为全局禁止状态。
S381、软件业务层生成服务联网请求。
S382、拦截器根据全局禁止状态拦截该服务联网请求。
S383、拦截器向业务层反馈请求失败信息。
具体的,当软件业务层生成服务联网请求,如Network Request时,拦截器根据全局禁止状态拦截该服务联网请求,并向业务层反馈请求失败信息。
S391、将地图加载请求对应的服务状态信息修改为许可状态。
示例性的,用户在如表4所示的状态数据设置界面中进行操作,以修改服务状态信息。
具体的,响应于用户输入的状态修改指令,将至少一种服务联网请求对应的服务状态信息由禁止状态修改为许可状态。例如,通过状态修改指令Enable Map Request将地图加载请求对应的服务状态信息由禁止状态修改为单项许可状态。具体的,修改非易失性存储器中数据模式的状态数据之后,终端可以主动刷新服务状态信息或者根据用户的操作刷新服务状态信息;或者修改非易失 性存储器中数据模式的状态数据之后,提示用户重启软件,以刷新地图加载请求对应的服务状态信息为单项许可状态。
S392、拦截器放行软件业务层生成的地图加载请求,将地图加载请求发送至服务器。
S393、从服务器获取地图数据。
具体的,当软件业务层生成地图加载请求,如Map Request时,拦截器根据地图加载请求对应的单项许可状态,将地图加载请求向目标服务器,如地图服务器发送以使终端与所述目标服务器进行数据传输,例如从地图服务器加载地图数据。
具体的,除了服务状态信息为许可状态的服务联网请求会被拦截器放行而发送至服务器,其他任何服务联网请求均会被拦截器拦截。
S411、软件业务层生成固件升级请求。
S412、拦截器根据禁止状态拦截固件升级请求。
S413、拦截器向业务层反馈请求失败信息。
由于步骤S391仅将地图加载请求对应的服务状态信息修改为许可状态,而固件升级请求对应的服务状态信息认为禁止状态,因此拦截器根据该禁止状态拦截固件升级请求,并向业务层反馈请求失败信息。
S42、将服务状态信息修改为全局许可状态。
具体的,用户可以进行状态修改操作,将服务状态信息修改为全局许可状态。例如通过状态修改指令Disable LDM将服务状态信息修改为全局许可状态。具体的,修改非易失性存储器中数据模式的状态数据之后,终端可以主动刷新服务状态信息或者根据用户的操作刷新服务状态信息;或者修改非易失性存储器中数据模式的状态数据之后,提示用户重启软件,以刷新服务状态信息为全局许可状态。
S431、拦截器放行软件业务层生成的固件升级请求,将固件升级请求发送至服务器。
S432、从服务器获取固件升级数据。
具体的,当软件业务层生成固件升级请求时,拦截器根据固件升级请求对应的全局许可状态,将固件升级请求向目标服务器,如固件升级服务器发送以使终端与所述目标服务器进行数据传输,例如从固件服务器加载固件数据,实 现固件升级。
如图11所示为飞行器的控制装置实现数据管理方法的一种流程示意图。该控制装置例如可以为用于遥控飞行器、配置飞行器参数,和/或与飞行器进行数据传输的电子设备,如飞行器用户的手机、平板、遥控装置等设备。
如图11所示,控制装置实现数据管理方法包括以下步骤S510至步骤S620。
S510、在控制装置上的软件启动后,软件从遥控装置本地的非易失性存储器读取本地数据模式的状态。
S520、判断读取的本地数据模式的状态为开启状态(LDM enabled),或者关闭状态(LDM disabled)。
如果本地数据模式的状态为关闭状态,则此时服务状态信息包括对应于所有网络服务的全局许可状态;控制装置执行步骤S531至步骤S610。
S531、生成MSDK(MobileGame Software Development Kit)请求,如注册请求、登录请求、地理位置上报请求。
S532、生成软件请求,软件请求例如为用于向软件服务方的服务器,即软件服务器发送的联网请求;例如,软件请求为用于和飞行中心(Flight Hub)通信的联网请求,或者用于获取软件或固件更新服务的联网请求。
S533、生成第三方请求,第三方请求例如为用于向非软件服务方的服务器,即第三方服务器,如提供地图数据的服务器等发送的联网请求;例如,第三方请求为用于地图加载请求或者异常上报请求等。
S540、控制装置与飞行器进行交互,例如遥控飞行器、配置飞行器参数,和/或与飞行器进行数据传输等;其中包括控制装置向软件服务器或第三方服务器发送联网请求的步骤,例如控制装置向固件升级服务器发送固件升级请求,以建立控制装置和固件升级服务器之间的通信链路,然后从固件升级服务器获取固件更新数据,以将固件更新数据发送至飞行器并控制飞行器进行固件更新。
在控制装置和飞行器的交互任务结束之后,用户可以选择是否修改本地数据模式的状态,例如将本地数据模式由关闭状态修改为开启状态。
S551、判断是否开启本地数据模式。
若检测到用户的状态修改操作,将本地数据模式由关闭状态修改为开启状态,则对用户进行权限验证。若未检测到用户的状态修改操作,则结束。
S552、判断是否通过权限验证;例如,根据用户的密码、指纹等验证信息, 判断所述验证信息是否与所述用户匹配。若未通过权限验证,则结束。
S553、如果通过权限验证,则将本地数据模式开启的状态保存至本地的非易失性存储器。
S610、重启软件,以在重启后从非易失性存储器读取用户修改后的本地数据模式的状态。
在S520判断读取的本地数据模式的状态为开启状态(LDM enabled),或者关闭状态(LDM disabled)之后,如果本地数据模式的状态为开启状态,则此时服务状态信息包括对应于所有网络服务的全局禁止状态;控制装置执行步骤S561至步骤S620。
在一些实施方式中,本地数据模式的状态类似于树形的结构,包括总体的本地数据模式的状态和各子模块的本地数据模式的状态。如果总体的本地数据模式的状态为开启状态时,则将各子模块的本地数据模式的状态均置为开启,如步骤S561、S563和S564。
S561、将MSDK请求的本地数据模式置为开启;MSDK请求包括注册请求、登录请求、地理位置上报请求等,可以将MSDK请求对应的服务状态信息初始化为多项禁止状态。
S562、初始化MSDK管理器。示例性的,通过初始化MSDK管理器,使得控制装置可以执行未登陆状态时允许执行的步骤。
S563、将软件请求的本地数据模式置为开启;可以将软件请求对应的服务状态信息初始化为多项禁止状态。
S564、将第三方请求的本地数据模式置为开启;可以将第三方请求对应的服务状态信息初始化为多项禁止状态。
S570、控制装置与飞行器进行交互,例如遥控飞行器、配置飞行器参数,和/或与飞行器进行数据传输等。其中包括控制装置向软件服务器或第三方服务器发送联网请求的步骤,例如控制装置向固件升级服务器发送固件升级请求。
S580、控制装置拦截向服务器发送的任何数据。由于总体的本地数据模式的状态为开启状态,各子模块的本地数据模式的状态均置为开启;则向服务器发送的任何网络请求都会被控制终端拦截。
在控制装置和飞行器的交互任务结束之后,用户可以选择是否修改本地数据模式的状态,例如将本地数据模式由开启状态修改为关闭状态。
S591、判断是否关闭本地数据模式。
若检测到用户的状态修改操作,将本地数据模式由开启状态修改为关闭状态,则对用户进行权限验证。若未检测到用户的状态修改操作,则结束。
S592、判断是否通过权限验证;例如,根据用户的密码、指纹等验证信息,判断所述验证信息是否与所述用户匹配。若未通过权限验证,则结束。
S593、如果通过权限验证,则将本地数据模式关闭的状态保存至本地的非易失性存储器。
S620、重启软件,以在重启后从非易失性存储器读取用户修改后的本地数据模式的状态。
在一些实施方式中,所述获取服务联网请求,包括:若有预设的服务请求触发条件被触发,生成所述服务请求触发条件对应的服务联网请求。
示例性的,若获取到用户的某项操作,则判定该操作对应的服务请求触发条件被触发,生成该操作对应的服务联网请求;例如用户点击上传本地数据的按钮时,生成数据上传请求;或者用户点击限飞解禁的按钮时,生成限飞解禁请求。
示例性的,终端预设有定时任务条件,例如每隔一个月向固件升级服务器查询是否有新固件需要升级,则在该董事任务条件的时间满足时,终端生成固件升级请求。
示例性的,如图12所示,所述生成所述服务请求触发条件对应的服务联网请求,包括步骤S150至步骤S160。
S150、获取所述服务请求触发条件对应的服务请求数据。
示例性的,服务请求触发条件对应的服务请求数据包括用户的账号、密码、终端物理地址、固件版本信息、设备使用时长等数据;终端生成的服务联网请求需要包括这些信息,以便服务器进行权限判断等流程。
示例性的,S150获取所述服务请求触发条件对应的服务请求数据,包括:若所述服务请求触发条件对应于用户的隐私数据,输出授权请求信息;响应于所述用户输入的授权许可,获取所述服务请求触发条件对应的服务请求数据。
例如,若在生成某服务联网请求时,需要的服务请求数据包括用户的隐私数据,则输出授权请求信息,如弹出授权窗口;在获取用户输入的授权许可后,才能获取服务请求数据中的隐私数据,然后生成服务联网请求。
S160、对所述服务请求数据进行匿名化处理、秘钥签名处理,得到服务联网请求。
示例性的,服务请求数据会被进行匿名化以及使用秘钥进行前面后,才能用于生成服务联网请求;以保护用户的数据安全和隐私。
如图13所示为终端和服务器的结构示意图。
其中,终端的状态控制模块51用于设置服务状态信息。例如,状态控制模块51为本地数据模式LDM的控制器,用来接收用户的命令来开启或关闭本地数据模式。示例性的,状态控制模块51负责整个服务状态信息生命状态的管理,及时终端上的软件关闭后重启,服务状态信息仍能生效;除非用户写在重装软件或者清除掉所有缓存数据。
拦截模块52用于根据服务状态信息调整需要拦截或需要放行的联网请求。如果本地数据模式被用户开启,则任何网络请求都会被拦截且将请求失败信息发送给业务层来处理错误;并且本地数据模式对上层的业务是透明的,开发者在业务层添加新的网络请求后也不用关心网络请求在本地数据模式开启的时候被发送至服务器。如果本地数据模式被用户关闭,则任何网络请求都会被放行发送至服务器,以进行与服务器之间的数据传输。
请求触发模块53是服务联网请求的发起方,如果参数需要用到用户的隐私数据,会弹出授权窗口,获得用户的许可后可以发起联网请求。
请求处理模块54用于对请求触发模块53输出的请求数据进行匿名化以及使用秘钥来加上签名后才能用于向服务器发送。
服务器的网络接口55用于从互联网获取终端发送的数据,或者将数据发送个哦终端。
权限验证模块56用于检查终端发送数据的签名,确认终端的请求数据是否具有访问权限。
服务模块57用于提供具体的云端服务,例如从数据库获取终端请求的地图数据,然后通过网络接口55将地图数据发送给终端。
数据库58用户保存数据,服务器的数据涉及读写数据库的时候都会进行相应的加密和解密处理,而不是明文存储。
本申请实施例提供的数据管理方法,根据非易失性存储器中存储的状态数据初始化服务状态信息,因此可以根据服务状态信息阻止终端与服务器之间的 数据传输或者允许终端与服务器之间进行数据的传输;通过服务状态信息管控终端与服务器之间的通信和数据传输,提高了终端本地数据的安全性,例如防止某些数据被传输至服务器或者服务器将某些数据写入终端。
请参阅图14,图14是本申请一实施例提供的数据管理装置600的示意性框图。该数据管理装置600包括处理器601和存储器602,处理器601和存储器602通过总线603连接,该总线603比如为I2C(Inter-integrated Circuit)总线。
具体地,处理器601可以是微控制单元(Micro-controller Unit,MCU)、中央处理单元(Central Processing Unit,CPU)或数字信号处理器(Digital Signal Processor,DSP)等。
具体地,存储器602可以是Flash芯片、只读存储器(ROM,Read-Only Memory)磁盘、光盘、U盘或移动硬盘等。
其中,所述处理器601用于运行存储在存储器602中的计算机程序,并在执行所述计算机程序时实现前述的数据管理方法。
示例性的,所述处理器601用于运行存储在存储器602中的计算机程序,并在执行所述计算机程序时实现如下步骤:
从非易失性存储器读取数据模式的状态数据,根据所述状态数据初始化服务状态信息,所述服务状态信息包括用于表示禁止服务联网的禁止状态和/或用于表示许可服务联网的许可状态;
若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求;
若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输。
请参阅图15,图15是本申请一实施例提供的飞行器10的示意性框图。
如图15所示,飞行器10包括:
上述的数据管理装置600,用于控制是否向目标服务器发送服务联网请求;
飞行组件11,用于飞行。
请参阅图16,图16是本申请一实施例提供的移动终端20的示意性框图。
如图16所示,移动终端20包括:
上述的数据管理装置600,用于控制是否向目标服务器发送服务联网请求。
示例性的,移动终端20可以为手机、平板、遥控装置等设备。
本申请上述实施例提供的数据管理装置、飞行器、移动终端,根据非易失性存储器中存储的状态数据初始化服务状态信息,因此可以根据服务状态信息阻止终端与服务器之间的数据传输或者允许终端与服务器之间进行数据的传输;通过服务状态信息管控终端与服务器之间的通信和数据传输,提高了终端本地数据的安全性,例如防止某些数据被传输至服务器或者服务器将某些数据写入终端。
本申请的实施例中还提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序中包括程序指令,所述处理器执行所述程序指令,实现上述实施例提供的数据管理方法的步骤。
其中,所述计算机可读存储介质可以是前述任一实施例所述的数据管理装置的内部存储单元,例如所述数据管理装置的硬盘或内存。所述计算机可读存储介质也可以是所述数据管理装置的外部存储设备,例如所述数据管理装置上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (37)

  1. 一种数据管理方法,其特征在于,包括:
    从非易失性存储器读取数据模式的状态数据,根据所述状态数据初始化服务状态信息,所述服务状态信息包括用于表示禁止服务联网的禁止状态和/或用于表示许可服务联网的许可状态;
    若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求;
    若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输。
  2. 根据权利要求1所述的数据管理方法,其特征在于,所述从非易失性存储器读取状态数据,根据所述状态数据初始化服务状态信息,包括:
    在软件启动时,从本地的非易失性存储器读取数据模式的状态数据;
    根据所述状态数据初始化易失性存储器中的服务状态信息。
  3. 根据权利要求2所述的数据管理方法,其特征在于,所述状态数据为加密的状态数据,所述根据所述状态数据初始化易失性存储器中的服务状态信息,包括:
    解密所述状态数据,得到所述状态数据对应的服务状态信息;
    将易失性存储器中的服务状态信息初始化为解密得到的服务状态信息。
  4. 根据权利要求2所述的数据管理方法,其特征在于,还包括:
    响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据。
  5. 根据权利要求4所述的数据管理方法,其特征在于,所述响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据,包括:
    响应于用户输入的状态修改指令,修改所述非易失性存储器中数据模式的状态数据。
  6. 根据权利要求4所述的数据管理方法,其特征在于,所述响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据,包括:
    响应于用户输入或导入的状态修改许可数据,将所述非易失性存储器中数据模式的状态数据修改为所述状态修改许可数据对应的状态数据。
  7. 根据权利要求4所述的数据管理方法,其特征在于,所述响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据之前,包括:
    获取用户输入的验证信息,判断所述验证信息是否与所述用户匹配;
    所述响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据,包括:
    若所述验证信息与所述用户匹配,响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据。
  8. 根据权利要求4所述的数据管理方法,其特征在于,所述响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据之后,包括:
    从所述非易失性存储器读取修改后的状态数据,根据所述状态数据初始化易失性存储器中的服务状态信息。
  9. 根据权利要求4所述的数据管理方法,其特征在于,所述响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据之后,包括:
    输出重启软件提示,以提示所述用户重启软件。
  10. 根据权利要求4所述的数据管理方法,其特征在于,所述响应于用户的状态修改操作,修改所述非易失性存储器中数据模式的状态数据之前,包括:
    若有预设的状态修改触发条件被触发,输出所述状态修改触发条件对应的状态修改提示。
  11. 根据权利要求10所述的数据管理方法,其特征在于,所述若有预设的状态修改触发条件被触发,输出所述状态修改触发条件对应的状态修改提示,包括:
    若获取到所述禁止状态对应的服务联网请求,输出所述服务联网请求对应的请求许可提示。
  12. 根据权利要求1-11中任一项所述的数据管理方法,其特征在于,初始化服务状态信息之后,包括:
    输出所述服务状态信息对应的状态至显示界面。
  13. 根据权利要求1所述的数据管理方法,其特征在于,所述若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求,包括:
    若所述服务状态信息包括对应于所有网络服务的全局禁止状态,在获取到任一服务联网请求之后拦截所述服务联网请求。
  14. 根据权利要求1所述的数据管理方法,其特征在于,所述若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送,包括:
    若所述服务状态信息包括对应于所有网络服务的全局许可状态,在获取到任一服务联网请求之后将所述服务联网请求向目标服务器发送。
  15. 根据权利要求1所述的数据管理方法,其特征在于,所述若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求,包括:
    若所述服务状态信息包括对应于多个网络服务的多项禁止状态,在获取到所述多项禁止状态对应的任一服务联网请求之后拦截所述服务联网请求。
  16. 根据权利要求1所述的数据管理方法,其特征在于,所述若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送,包括:
    若所述服务状态信息包括对应于多个网络服务的多项许可状态,在获取到所述多项许可状态对应的任一服务联网请求之后将所述服务联网请求向目标服务器发送。
  17. 根据权利要求1-11、15或16中任一项所述的数据管理方法,其特征在于,所述若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求,包括:
    若所述服务状态信息包括对应于一个网络服务的单项禁止状态,在获取到所述单项禁止状态对应的服务联网请求之后拦截所述服务联网请求。
  18. 根据权利要求1-11、15或16中任一项所述的数据管理方法,其特征在于,所述若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送,包括:
    若所述服务状态信息包括对应于一个网络服务的单项许可状态,在获取到所述单项许可状态对应的服务联网请求之后将所述服务联网请求向目标服务器发送。
  19. 根据权利要求1-11、13-16中任一项所述的数据管理方法,其特征在于,所述拦截所述服务联网请求,包括:
    禁止将所述服务联网请求向目标服务器发送。
  20. 根据权利要求19所述的数据管理方法,其特征在于,所述拦截所述服务联网请求之后,包括:
    向软件的业务层返回所述服务联网请求对应的请求失败信息。
  21. 根据权利要求1-11、13-16中任一项所述的数据管理方法,其特征在于,所述根据所述状态数据初始化服务状态信息之后,包括:
    根据所述服务状态信息调整本地虚拟专用网络中的待放行请求特征。
  22. 根据权利要求21所述的数据管理方法,其特征在于,所述若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求,包括:
    若获取到服务联网请求,将所述服务联网请求发送至所述本地虚拟专用网络;
    若所述服务联网请求与调整后本地虚拟专用网络中的待放行请求特征均不匹配放行,拦截所述服务联网请求。
  23. 根据权利要求22所述的数据管理方法,其特征在于,所述若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送,包括:
    放行若所述服务联网请求与调整后本地虚拟专用网络中的至少一个待放行请求特征相匹配,将所述服务联网请求向目标服务器发送。
  24. 根据权利要求1-11、13-16中任一项所述的数据管理方法,其特征在于,所述根据所述状态数据初始化服务状态信息之后,包括:
    根据所述服务状态信息调整放行白名单和/或拦截黑名单中的请求特征。
  25. 根据权利要求24所述的数据管理方法,其特征在于,所述若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求,包括:
    若获取到服务联网请求,判断所述服务联网请求是否与所述放行白名单和/或拦截黑名单中的请求特征相匹配;
    若所述服务联网请求与调整后拦截黑名单中的至少一个请求特征相匹配,和/或所述服务联网请求与调整后放行白名单中的请求特征均不匹配,拦截所述服务联网请求。
  26. 根据权利要求25所述的数据管理方法,其特征在于,所述若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送,包括:
    若所述服务联网请求与调整后放行白名单中的至少一个请求特征相匹配,和/或所述服务联网请求与调整后拦截黑单中的请求特征均不匹配,将所述服务联网请求向目标服务器发送。
  27. 根据权利要求13所述的数据管理方法,其特征在于,若软件为首次启动,从非易失性存储器读取的状态数据对应于全局禁止状态;
    所述根据所述状态数据初始化服务状态信息,包括:
    根据所述状态数据将服务状态信息初始化为对应于所有网络服务的全局禁止状态。
  28. 根据权利要求14所述的数据管理方法,其特征在于,若软件为首次启动,从非易失性存储器读取的状态数据对应于全局许可状态;
    所述根据所述状态数据初始化服务状态信息,包括:
    根据所述状态数据将服务状态信息初始化为对应于所有网络服务的全局许可状态,所述所有网络服务至少包括注册服务和登录服务。
  29. 根据权利要求28所述的数据管理方法,其特征在于,所述若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送,包括:
    若获取到所述注册服务对应的服务联网请求,将所述服务联网请求向所述注册服务对应的服务器发送;
    若获取到所述登录服务对应的服务联网请求,将所述服务联网请求向所述登录服务对应的服务器发送。
  30. 根据权利要求1-11、13-16中任一项所述的数据管理方法,其特征在于,所述获取服务联网请求,包括:
    若有预设的服务请求触发条件被触发,生成所述服务请求触发条件对应的服务联网请求。
  31. 根据权利要求30所述的数据管理方法,其特征在于,所述生成所述服务请求触发条件对应的服务联网请求,包括:
    获取所述服务请求触发条件对应的服务请求数据;
    对所述服务请求数据进行匿名化处理、秘钥签名处理,得到服务联网请求。
  32. 根据权利要求31所述的数据管理方法,其特征在于,所述获取所述服务请求触发条件对应的服务请求数据,包括:
    若所述服务请求触发条件对应于用户的隐私数据,输出授权请求信息;
    响应于所述用户输入的授权许可,获取所述服务请求触发条件对应的服务请求数据。
  33. 根据权利要求1-11、13-16中任一项所述的数据管理方法,其特征在于,所述将所述服务联网请求向目标服务器发送,包括以下至少一项:
    若所述服务联网请求包括固件升级请求,将所述服务联网请求向固件升级服务器发送;
    若所述服务联网请求包括限飞解禁请求,将所述服务联网请求向限飞管理服务器发送;
    若所述服务联网请求包括地图加载请求,将所述服务联网请求向地图服务器发送;
    若所述服务联网请求包括数据上传请求,将所述服务联网请求向数据存储服务器发送。
  34. 一种数据管理装置,其特征在于,包括存储器和处理器;
    所述存储器用于存储计算机程序;
    所述处理器,用于执行所述计算机程序并在执行所述计算机程序时,实现如下步骤:
    从非易失性存储器读取数据模式的状态数据,根据所述状态数据初始化服务状态信息,所述服务状态信息包括用于表示禁止服务联网的禁止状态和/或用于表示许可服务联网的许可状态;
    若获取到所述禁止状态对应的服务联网请求,拦截所述服务联网请求;
    若获取到所述许可状态对应的服务联网请求,将所述服务联网请求向目标服务器发送以与所述服务器进行数据传输。
  35. 一种飞行器,其特征在于,包括:
    如权利要求34所述的数据管理装置,用于控制是否向目标服务器发送服务联网请求;
    飞行组件,用于飞行。
  36. 一种移动终端,其特征在于,包括:
    如权利要求34所述的数据管理装置,用于控制是否向目标服务器发送服务联网请求。
  37. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时使所述处理器实现如权利要求1-33中任一项所述的数据管理方法。
PCT/CN2019/090597 2019-06-10 2019-06-10 数据管理方法、数据管理装置、飞行器、移动终端和存储介质 WO2020248106A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2019/090597 WO2020248106A1 (zh) 2019-06-10 2019-06-10 数据管理方法、数据管理装置、飞行器、移动终端和存储介质
CN201980012303.6A CN111727615A (zh) 2019-06-10 2019-06-10 数据管理方法、数据管理装置、飞行器、移动终端和存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/090597 WO2020248106A1 (zh) 2019-06-10 2019-06-10 数据管理方法、数据管理装置、飞行器、移动终端和存储介质

Publications (1)

Publication Number Publication Date
WO2020248106A1 true WO2020248106A1 (zh) 2020-12-17

Family

ID=72564203

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/090597 WO2020248106A1 (zh) 2019-06-10 2019-06-10 数据管理方法、数据管理装置、飞行器、移动终端和存储介质

Country Status (2)

Country Link
CN (1) CN111727615A (zh)
WO (1) WO2020248106A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090221266A1 (en) * 2005-10-13 2009-09-03 Ntt Docomo, Inc. Mobile terminal, access control management device, and access control management method
CN104221025A (zh) * 2012-03-14 2014-12-17 三星电子株式会社 控制给便携式终端中的应用的权限的装置和方法
CN109196460A (zh) * 2017-10-31 2019-01-11 深圳市大疆创新科技有限公司 数据的传输方法、服务器、存储系统、终端设备及系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090221266A1 (en) * 2005-10-13 2009-09-03 Ntt Docomo, Inc. Mobile terminal, access control management device, and access control management method
CN104221025A (zh) * 2012-03-14 2014-12-17 三星电子株式会社 控制给便携式终端中的应用的权限的装置和方法
CN109196460A (zh) * 2017-10-31 2019-01-11 深圳市大疆创新科技有限公司 数据的传输方法、服务器、存储系统、终端设备及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "DJI Launches Privacy Mode For Drone Operators To Fly Without Internet Data Transfer", 2 October 2017 (2017-10-02), pages 1 - 2, XP055764107, Retrieved from the Internet <URL:https://www.dji.com/newsroom/news/dji-launches-privacy-mode-for-drone-operators-to-fly-without-internet-data-transfer> *

Also Published As

Publication number Publication date
CN111727615A (zh) 2020-09-29

Similar Documents

Publication Publication Date Title
US10972467B2 (en) Certificate based profile confirmation
RU2672712C2 (ru) Устройство мобильной связи и способ работы с ним
RU2675902C2 (ru) Способ авторизации операции, предназначенной для выполнения на заданном вычислительном устройстве
US10541806B2 (en) Authorizing account access via blinded identifiers
RU2673969C2 (ru) Устройство мобильной связи и способ работы с ним
US9641529B2 (en) Methods, systems and computer program products for an application execution container for managing secondary application protocols
US11882224B2 (en) Generic code signing client with downloadable modules
US10073966B2 (en) Operating system-independent integrity verification
US9396352B2 (en) System and method to provide server control for access to mobile client data
US9871821B2 (en) Securely operating a process using user-specific and device-specific security constraints
KR101861401B1 (ko) 장치 기능과 애플리케이션의 결합
CA2881539C (en) Secure app ecosystem with key and data exchange according to enterprise information control policy
EP4191453A1 (en) Platform security
US11288377B1 (en) Virtual machine-based trusted execution environment
US10341360B2 (en) Method and apparatus for user and entity access management for code signing one or more of a plurality of devices
US20150358357A1 (en) Processing device and method of operation thereof
CN110390201A (zh) 计算机系统以及初始化计算机系统的方法
US8646068B2 (en) Home image content securely isolated from corporate IT
WO2020248106A1 (zh) 数据管理方法、数据管理装置、飞行器、移动终端和存储介质
CN113132537B (zh) 基于情境的移动装置特征控制的方法、采用所述方法的移动装置及在安全位置管理信息访问的方法
US20230385207A1 (en) Methods and apparatus for communication between processing circuitry and a peripheral device
US20210192063A1 (en) Secure data leakage control in a third party cloud computing environment
WO2021038051A1 (en) Secure data processing in a third-party cloud environment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19932648

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19932648

Country of ref document: EP

Kind code of ref document: A1