WO2020259650A1 - 一种响应请求的方法及电子设备 - Google Patents

一种响应请求的方法及电子设备 Download PDF

Info

Publication number
WO2020259650A1
WO2020259650A1 PCT/CN2020/098355 CN2020098355W WO2020259650A1 WO 2020259650 A1 WO2020259650 A1 WO 2020259650A1 CN 2020098355 W CN2020098355 W CN 2020098355W WO 2020259650 A1 WO2020259650 A1 WO 2020259650A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
electronic device
data
storage area
request
Prior art date
Application number
PCT/CN2020/098355
Other languages
English (en)
French (fr)
Inventor
沈晨凯
唐发明
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020259650A1 publication Critical patent/WO2020259650A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Definitions

  • the embodiments of the present application relate to the field of application programs, and in particular to a method and electronic device for responding to a request.
  • applications need to obtain read and write permissions for data in the electronic device, and call related permissions such as calling the application in the electronic device to provide corresponding functions.
  • the electronic device can read all data in the electronic device at will, or write any data into the electronic device, or call any application installed in the electronic device at will.
  • the data that the application can read at will may include the user's sensitive data (for example, the user's personal information), which may cause the leakage of the user's privacy.
  • the application writes data at will there will be security risks (for example, the application changes the application code at will).
  • applications that randomly call applications installed in electronic devices may incur high costs to users (for example, applications call application stores, download a large number of application installation packages).
  • the embodiment of the present application provides a method for responding to a request, which can reduce the impact of the application installed in the electronic device on the security of the electronic device during operation, and protect the information security in the electronic device.
  • a method for responding to a request is provided, the method is applied to an electronic device, and the method includes: the electronic device receives a first request of a first application in the electronic device, the first request is used to request execution of a first operation, The first operation includes at least one or more of the following: accessing the first sensitive data in the electronic device, writing data to the electronic device, or invoking a second application in the electronic device; in response to the first request, The electronic device determines that the first application is an application to be controlled, and the electronic device performs a second operation corresponding to the first operation.
  • the electronic device performs other safer operations corresponding to the operation request through an operation request initiated by the application to obtain sensitive data, write data, and perform sensitive behavior.
  • the application normally provides subsequent functions.
  • the second operation when the first operation is to write data to the electronic device, the second operation includes: the electronic device writes data to the second preset storage area of the electronic device; the electronic device returns to the first application Indication of successful data writing.
  • the electronic device receives the application's request to write data to the electronic device, it can not only reduce the security risks caused by the application writing data to the electronic device at will, but also ensure that the application normally provides follow-up Features.
  • the second operation when the first operation is to access the first sensitive data in the electronic device, the second operation includes: the electronic device reads the first sensitive data and desensitizes the first sensitive data Processing; the electronic device returns the desensitized data to the first application; or, the electronic device reads the data in the second preset storage area; the electronic device uses the data read from the second preset storage area as the first The sensitive data is returned to the first application.
  • the electronic device receives the application's request to access the first sensitive data, by returning desensitized sensitive data to the application, or returning false data, it can not only prevent the leakage of sensitive data in the electronic device, but also ensure the normal provision of the application Follow-up function.
  • the second operation when the first operation is to invoke the second application, includes: the electronic device directly returns to the first application indication information that the second application is successfully invoked, but does not invoke the second application.
  • the electronic device receives the application's request to call the second application in the electronic device, by falsely calling the second application and falsely returning the result of successful execution, it can not only reduce the security risks caused by the application calling the application in the electronic device at will, but also Ensure that the application normally provides follow-up functions.
  • the first sensitive data includes: at least one of data in a preset type of application or data stored in a third preset storage area;
  • the second application includes at least one of the following Or multiple: camera application, instant messaging application, phone application, recording application or map application.
  • This application can prevent applications from stealing the above mentioned in preset types of applications involving users’ personal information, social information, financial information, as well as documents, pictures and other data stored in electronic devices; it can also prevent applications from arbitrarily calling electronic devices that may be involved Behaviors and operations with potential safety hazards such as leakage of sensitive data and possible losses to users can fully protect the safety of electronic devices.
  • the electronic device determining that the first application is the application to be controlled includes: the electronic device determines whether the first application meets the first condition; if the first application meets the first condition, the electronic device determines that the first application is Application to be controlled. If certain applications require permission control, users can make specific settings for that application. The electronic device can determine whether the application is an application to be controlled according to whether the application meets a specific setting.
  • the method before the electronic device receives the first request of the first application in the electronic device, the method further includes: in response to a user's operation, the electronic device starts the first application in the sandbox.
  • the electronic device starts the application in the security sandbox, which can more reliably protect the security of the electronic device and the information security in the electronic device.
  • the second preset storage area is a storage area corresponding to the sandbox.
  • This application can provide a relatively safe operating environment for the application by running the application in the security sandbox and responding to the first request of the application, reducing the impact of the application on the security of the electronic device, and ensuring the information security in the electronic device.
  • the method before the electronic device determines whether the first application satisfies the first condition, the method further includes: the electronic device determines that the first application has the permission to perform the first operation. By judging whether the first application has the permission to perform the first operation, it can avoid unnecessary processing caused by the method of responding to the request of this application when the first application does not have the permission to perform the first operation, causing waste of CPU resources .
  • an electronic device in a second aspect, includes: a receiving unit configured to receive a first request of a first application in the electronic device, the first request is used to request execution of a first operation, and the first operation includes at least One or more of the following: accessing the first sensitive data in the electronic device, writing data to the electronic device, or invoking the second application in the electronic device; a processing unit for determining that the first application is an application to be controlled, and Perform a second operation corresponding to the first operation.
  • the electronic device adopts an operation request for obtaining sensitive data, writing data, and performing sensitive behavior on the application, and performs other safer operations corresponding to the operation request.
  • the application normally provides subsequent functions.
  • the electronic device further includes a storage unit that includes a first preset storage area and a second preset storage area; when the first operation is to write data to the first preset storage area , The second operation includes: the processing unit writes data to the second preset storage area; the processing unit returns to the first application an indication that the data is successfully written.
  • the electronic device receives the application's request to write data to the electronic device, it can not only reduce the security risks caused by the application writing data to the electronic device at will, but also ensure that the application normally provides follow-up Features.
  • the second operation when the first operation is to access the first sensitive data in the electronic device, the second operation includes: the processing unit reads the first sensitive data, and desensitizes the first sensitive data ; The processing unit returns the desensitized data to the first application; or the processing unit reads the data in the second preset storage area; the processing unit returns to the first application in the second preset storage area read by the processing unit The data.
  • the electronic device receives the application's request to access the first sensitive data, by returning desensitized sensitive data to the application, or returning false data, it can not only prevent the leakage of sensitive data in the electronic device, but also ensure the normal provision of the application Follow-up function.
  • the second operation when the first operation is to invoke the second application, includes: the processing unit directly returns to the first application the indication information that the second application is successfully invoked, but the processing unit does not invoke the second application .
  • the electronic device receives the application's request to call the second application in the electronic device, by falsely calling the second application and falsely returning the result of successful execution, it can not only reduce the security risks caused by the application calling the application in the electronic device at will, but also Ensure that the application normally provides follow-up functions.
  • the storage unit further includes a third preset storage area
  • the first sensitive data includes: at least one of data in a preset type of application or data stored in the third preset storage area ;
  • the second application includes at least one or more of the following: camera application, instant messaging application, telephone application, recording application or map application.
  • This application can prevent applications from stealing the above mentioned in preset types of applications involving users’ personal information, social information, financial information, as well as documents, pictures and other data stored in electronic devices; it can also prevent applications from arbitrarily calling electronic devices that may be involved Behaviors and operations with potential safety hazards such as leakage of sensitive data and possible losses to users can fully protect the safety of electronic devices.
  • the processing unit determining that the first application is the application to be controlled includes: the processing unit determines whether the first application meets the first condition; if the first application meets the first condition, the processing unit determines that the first application is Application to be controlled. If certain applications require permission control, users can make specific settings for that application.
  • the electronic device can determine whether the application is an application to be controlled according to whether the application meets a specific setting.
  • the foregoing processing unit is further configured to, before the receiving unit receives the first request of the first application in the electronic device, in response to a user's operation, start the first application in the sandbox.
  • the electronic device starts the application in the security sandbox, which can more reliably protect the security of the electronic device and the information security in the electronic device.
  • the second preset storage area is a storage area corresponding to the sandbox.
  • This application can provide a relatively safe operating environment for the application by running the application in the security sandbox and responding to the first request of the application, reducing the impact of the application on the security of the electronic device, and ensuring the information security in the electronic device.
  • the processing unit is further configured to, before the processing unit determines that the first application satisfies the first condition, determine that the first application has the permission to perform the first operation. By judging whether the first application has the permission to perform the first operation, it can avoid unnecessary processing caused by the method of responding to the request of this application when the first application does not have the permission to perform the first operation, causing waste of CPU resources .
  • an electronic device in a third aspect, includes: a memory for storing computer program code, the computer program code includes instructions; when one or more computer programs stored in the memory are executed by a processor, the electronic device Device execution: receiving a first request of a first application in the electronic device, the first request is used to request execution of a first operation, and the first operation includes at least one or more of the following: accessing the first application in the electronic device Sensitive data, write data to the electronic device, or call a second application in the electronic device; determine that the first application is an application to be controlled, and perform a second operation corresponding to the first operation.
  • the electronic device adopts operation requests for obtaining sensitive data, writing data, and performing sensitive behaviors on the application, and performs other safer operations corresponding to the operation request.
  • the application normally provides subsequent functions.
  • the memory includes a first preset storage area and a second preset storage area; when the first operation is to write data to the first preset storage area, the second operation includes: when the memory stores When one or more of the computer programs are executed by the processor, the electronic device is caused to write data into the second preset storage area; the first application returns an indication that the data is successfully written.
  • the electronic device receives the application's request to write data to the electronic device, it can not only reduce the security risks caused by the application writing data to the electronic device at will, but also ensure that the application normally provides follow-up Features.
  • the second operation when the first operation is to access the first sensitive data in the electronic device, the second operation includes: when one or more computer programs stored in the memory are executed by the processor, causing the electronic device to read Fetch the first sensitive data, perform desensitization processing on the first sensitive data, and return the desensitized data to the first application; or make the electronic device read the data in the second preset storage area and send the data to the first application An application returns the data in the second preset storage area read by the electronic device.
  • the electronic device receives the application's request to access the first sensitive data, by returning desensitized sensitive data to the application, or returning false data, it can not only prevent the leakage of sensitive data in the electronic device, but also ensure the normal provision of the application Follow-up function.
  • the second operation when the first operation is to invoke the second application, includes: when one or more computer programs stored in the memory are executed by the processor, causing the electronic device to directly return to the first application The instruction information of the second application is successfully invoked, but the second application is not invoked.
  • the electronic device receives the application's request to call the second application in the electronic device, by falsely calling the second application and falsely returning the result of successful execution, it can not only reduce the security risks caused by the application calling the application in the electronic device at will, but also Ensure that the application normally provides follow-up functions.
  • the memory further includes a third preset storage area
  • the first sensitive data includes: at least one of data in a preset type of application or data stored in the third preset storage area
  • the second application includes at least one or more of the following: a camera application, an instant messaging application, a phone application, a recording application, or a map application.
  • This application can prevent applications from stealing the above mentioned in preset types of applications involving users’ personal information, social information, financial information, as well as documents, pictures and other data stored in electronic devices; it can also prevent applications from arbitrarily calling electronic devices that may be involved Behaviors and operations with potential safety hazards such as leakage of sensitive data and possible losses to users can fully protect the safety of electronic devices.
  • the electronic device determining that the first application is the application to be controlled includes: when one or more computer programs stored in the memory are executed by the processor, causing the electronic device to determine whether the first application satisfies the first condition ; If the first application meets the first condition, the electronic device determines that the first application is an application to be managed. If certain applications require permission control, users can make specific settings for that application. The electronic device can determine whether the application is an application to be controlled according to whether the application meets a specific setting.
  • the processor before the electronic device receives the first request of the first application in the electronic device, the processor is further configured to: when one or more computer programs stored in the memory are executed by the processor, make the electronic The device starts the first application in the sandbox in response to the user's operation.
  • the electronic device starts the application in the security sandbox, which can more reliably protect the security of the electronic device and the information security in the electronic device.
  • the second preset storage area is a storage area corresponding to the sandbox.
  • This application can provide a relatively safe operating environment for the application by running the application in the security sandbox and responding to the first request of the application, reducing the impact of the application on the security of the electronic device, and ensuring the information security in the electronic device.
  • the processor before the electronic device determines whether the first application is running in the third preset storage area, the processor is further configured to: when one or more computer programs stored in the memory are executed by the processor, make The electronic device determines that the first application has the permission to perform the first operation. By judging whether the first application has the permission to perform the first operation, it can avoid unnecessary processing caused by the method of responding to the request of this application when the first application does not have the permission to perform the first operation, causing waste of CPU resources .
  • a computer-readable storage medium stores a computer-executable instruction.
  • the computer-executable instruction When executed by a processor, it implements a response as in any one of the possible implementations of the first aspect The requested method.
  • a chip system in a fifth aspect, includes a processor and a memory, and instructions are stored in the memory; when the instructions are executed by the processor, the implementation is as in any possible implementation manner of the first aspect The method of responding to the request.
  • the chip system can be composed of chips, or can include chips and other discrete devices.
  • a computer program product which enables any method provided in the first aspect to be executed when it runs on a computer.
  • the computer may be at least one storage node.
  • 1A is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the application.
  • FIG. 1B is an architecture diagram of an Android operating system provided by an embodiment of the application.
  • FIG. 2 is a flowchart of a method for responding to a request provided by an embodiment of the application
  • FIG. 3 is an example diagram of setting an application management and control mode provided by an embodiment of this application.
  • FIG. 4 is an example diagram of an interface for setting an operating mode provided by an embodiment of the application.
  • Fig. 5 is a first diagram of an example of desensitization processing provided by an embodiment of the application.
  • Figure 6 is Figure 2 of an example of desensitization processing provided by an embodiment of the application.
  • Figure 7 is Figure 3 of an example of desensitization processing provided by an embodiment of the application.
  • Figure 8 is Figure 4 of an example of desensitization processing provided by an embodiment of the application.
  • FIG. 9 is a flowchart of another method for responding to a request provided by an embodiment of the application.
  • FIG. 10 is a structural schematic diagram 1 of a mobile phone provided by an embodiment of the present application.
  • FIG. 11 is a second structural diagram of a mobile phone according to an embodiment of the present application.
  • the embodiment of the application provides a method and electronic device for responding to a request. Through this method, the security performance of the electronic device can be improved, and the information security in the electronic device can be protected.
  • the electronic devices in the embodiments of the present application may be smart phones, tablet computers, netbooks, or other desktop devices, laptop devices, handheld devices, wearable devices, etc., such as personal computers.
  • PC Personal Digital Assistant
  • PDA Personal Digital Assistant
  • PMP Portable Multimedia Player
  • PMP Portable Multimedia Player
  • AR Augmented Reality
  • VR Virtual Reality
  • the embodiment of the present application does not limit the specific type and structure of the electronic device.
  • the mobile phone 100 may include a processor 110, a memory (including an external memory interface 120 and an internal memory 121), a universal serial bus (USB) interface 130, a charging management module 140, and a power management module 141 , Battery 142, antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, microphone 170C, sensor module 180, buttons 190, motor 191, indicator 192, camera 193, display 194 , And subscriber identification module (subscriber identification module, SIM) card interface 195, etc.
  • SIM subscriber identification module
  • the sensor module 180 may include a pressure sensor, a gyroscope sensor, an air pressure sensor, a magnetic sensor, an acceleration sensor, a distance sensor, a proximity light sensor, a fingerprint sensor, a temperature sensor, a touch sensor, an ambient light sensor, etc.
  • the structure illustrated in the embodiment of the present invention does not constitute a specific limitation on the mobile phone 100.
  • the mobile phone 100 may include more or fewer components than shown, or combine certain components, or split certain components, or arrange different components.
  • the illustrated components can be implemented in hardware, software, or a combination of software and hardware.
  • the processor 110 may include one or more processing units.
  • the processor 110 may include an application processor (AP), a modem processor, a graphics processing unit (GPU), an image signal processor (ISP), and a flight controller.
  • Video codec digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc.
  • the different processing units may be independent devices or integrated in one or more processors.
  • the processor 210 may also be provided with a memory for storing instructions and data.
  • the processor 110 may include one or more interfaces.
  • the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, and a universal asynchronous transmitter (universal asynchronous) interface receiver/transmitter, UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and / Or Universal Serial Bus (USB) interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • UART universal asynchronous transmitter
  • MIPI mobile industry processor interface
  • GPIO general-purpose input/output
  • SIM subscriber identity module
  • USB Universal Serial Bus
  • the charging management module 140 is used to receive charging input from the charger.
  • the charger can be a wireless charger or a wired charger.
  • the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
  • the power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, the memory 120, the display screen 194, the camera 193, and the wireless communication module 160.
  • the wireless communication function of the mobile phone 100 can be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor, and the baseband processor.
  • the antenna 1 and the antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in the mobile phone 100 can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
  • antenna 1 can be multiplexed as a diversity antenna of a wireless local area network.
  • the antenna can be used in combination with a tuning switch.
  • the mobile communication module 150 may provide a wireless communication solution including 2G/3G/4G/5G and the like applied on the mobile phone 100.
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), etc.
  • the mobile communication module 150 can receive electromagnetic waves by the antenna 1, and perform processing such as filtering, amplifying and transmitting the received electromagnetic waves to the modem processor for demodulation.
  • the mobile communication module 150 can also amplify the signal modulated by the modem processor, and convert it into electromagnetic waves for radiation via the antenna 1.
  • at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110.
  • at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
  • the modem processor may include a modulator and a demodulator.
  • the modulator is used to modulate the low frequency baseband signal to be sent into a medium and high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal. Then the demodulator transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the low-frequency baseband signal is processed by the baseband processor and then passed to the application processor.
  • the application processor outputs a sound signal through an audio device (not limited to the speaker 170A, etc.), or displays an image or video through the display screen 194.
  • the modem processor may be an independent device.
  • the modem processor may be independent of the processor 110 and be provided in the same device as the mobile communication module 150 or other functional modules.
  • the wireless communication module 160 can provide applications on the mobile phone 100 including WLAN (such as wireless fidelity (Wi-Fi) network), Bluetooth (BT), global navigation satellite system (GNSS), Frequency modulation (frequency modulation, FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions.
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2, frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110.
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110, perform frequency modulation, amplify it, and convert it into electromagnetic wave radiation via the antenna 2.
  • the antenna 1 of the mobile phone 100 is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the mobile phone 100 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technologies may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time-division code division multiple access (TD-SCDMA), long term evolution (LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi -zenith satellite system, QZSS) and/or satellite-based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite-based augmentation systems
  • the mobile phone 100 implements a display function through a GPU, a display screen 194, and an application processor.
  • the GPU is a microprocessor for image processing, connected to the display 194 and the application processor.
  • the GPU is used to perform mathematical and geometric calculations for graphics rendering.
  • the processor 110 may include one or more GPUs, which execute program instructions to generate or change display information.
  • the display screen 194 is used to display images, videos, etc.
  • the mobile phone 100 can realize a shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, and an application processor.
  • the mobile phone 100 can implement audio functions through the audio module 170, the speaker 170A, the microphone 170C, and an application processor. For example, music playback, recording, etc.
  • the audio module 170 is used to convert digital audio information into an analog audio signal for output, and is also used to convert an analog audio input into a digital audio signal.
  • the audio module 170 can also be used to encode and decode audio signals.
  • the audio module 170 may be provided in the processor 110, or part of the functional modules of the audio module 170 may be provided in the processor 110.
  • the speaker 170A also called a “speaker”, is used to convert audio electrical signals into sound signals.
  • the mobile phone 100 can perform voice playback or notification through the speaker 170A.
  • the receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
  • the mobile phone 100 answers a call or a voice message, it can receive the voice by bringing the receiver 170B close to the human ear.
  • the microphone 170C also called “microphone”, “microphone”, is used to convert sound signals into electrical signals.
  • the user can approach the microphone 170C through the mouth to make a sound, and input the sound signal to the microphone 170C.
  • the mobile phone 100 may be provided with at least one microphone 170C. In other embodiments, the mobile phone 100 may be provided with two microphones 170C, which can implement noise reduction functions in addition to collecting sound signals. In other embodiments, the mobile phone 100 may also be provided with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and realize directional recording functions.
  • the button 190 includes a power button, a volume button, and so on.
  • the button 190 may be a mechanical button. It can also be a touch button.
  • the mobile phone 100 can receive key input, and generate key signal input related to user settings and function control of the mobile phone 100.
  • the motor 191 can generate vibration prompts.
  • the motor 191 can be used for incoming call vibration notification, and can also be used for touch vibration feedback.
  • touch operations applied to different applications can correspond to different vibration feedback effects.
  • Acting on touch operations in different areas of the display screen 194, the motor 191 can also correspond to different vibration feedback effects.
  • Different application scenarios for example: time reminding, receiving information, alarm clock, games, etc.
  • the touch vibration feedback effect can also support customization.
  • the indicator 192 may be an indicator light, which may be used to indicate the charging status, power change, or to indicate messages, missed calls, notifications, and so on.
  • the SIM card interface 195 is used to connect to the SIM card.
  • the SIM card can be connected to and separated from the mobile phone 100 by inserting into the SIM card interface 195 or pulling out from the SIM card interface 195.
  • the mobile phone 100 may support 1 or N SIM card interfaces, and N is a positive integer greater than 1.
  • the SIM card interface 195 can support Nano SIM cards, Micro SIM cards, SIM cards, etc.
  • the same SIM card interface 195 can insert multiple cards at the same time. The types of the multiple cards can be the same or different.
  • the SIM card interface 195 can also be compatible with different types of SIM cards.
  • the SIM card interface 195 may also be compatible with external memory cards.
  • the mobile phone 100 interacts with the network through the SIM card to implement functions such as call and data communication.
  • the mobile phone 100 uses an eSIM, that is, an embedded SIM card.
  • the eSIM card can be embedded in the mobile phone 100 and cannot be separated from the mobile phone 100.
  • Sensitive data also known as private data.
  • Common sensitive data includes user personal information, contact information, short messages, call records, user current location information, data stored in memory, etc.
  • Sensitive data may also be the user's search records in the browser, browsing history, user's virtual order information, and other data that may reveal information such as user preferences and concerns.
  • data in a preset type of application for example, an application involving user financial information (such as China Merchants Bank).
  • Sensitive behavior It can be understood that some applications call electronic devices to perform certain operations without the user's knowledge. This includes, but is not limited to, calling the camera, calling the microphone, calling the wireless network in the background without the user's knowledge, sending messages, sending short messages, making phone calls, taking pictures, recording, recording, and malicious deductions. For example, some applications may call the short message application of the electronic device to send messages to subscribe to value-added services without the user's knowledge, or the telephone application may make a paid voice call. In this way, communication costs will be incurred without the user's knowledge, causing economic losses to the user.
  • some applications that call the electronic device to perform certain operations without the user's knowledge can be understood as: the request initiated by these applications to trigger the electronic device to perform certain operations is not generated in response to the user's operation.
  • Data Masking Also known as data bleaching, data deprivation or data deformation.
  • the desensitization process can deform the sensitive data contained in the data through the desensitization rule, so as to realize the reliable protection of the sensitive data.
  • Sandbox Also called sandbox, it is a virtual system program.
  • the virtual system program allows electronic devices to run applications (such as browsers, WeChat, navigation, etc.) in a sandbox environment, providing an independent operating environment similar to a container.
  • applications such as browsers, WeChat, navigation, etc.
  • the working principle of the sandbox is:
  • the sandbox uses redirection technology to direct the files generated and modified by the application to the folder corresponding to the program directory of the sandbox program.
  • the files generated and modified by the application include the application registry and the core data of the application. Therefore, the sandbox, as an independent virtual environment, protects the underlying data by loading its own drivers, which is a driver-level protection.
  • a relatively safe operating environment can be provided for applications, and applications running inside the sandbox have little impact on the security of the mobile phone 100.
  • An operating system (Operating System, OS) is installed in the electronic device in the embodiment of the application.
  • the operating system is a computer program that manages and controls the hardware and software resources of electronic equipment. It is the most basic system software that runs directly on the "bare metal". Any other software must be supported by the operating system to run.
  • the operating system is The interface between users and electronic devices is also an interface between electronic device hardware and applications.
  • the functions of the operating system include managing the software, hardware, and data resources of electronic devices, controlling the operation of programs, improving the man-machine interface, providing support for applications, and providing various forms of user interfaces, so that users have a good working environment for applications. Develop and provide necessary services and corresponding interfaces.
  • the operating system manages the hardware resources of the electronic device, and at the same time allocates resources according to the resource request of the application, such as dividing the CPU time, opening up the memory space, and so on.
  • the embodiment of the present application does not limit the specific operating system installed in the electronic device.
  • the operating system of the electronic device in the embodiment of the present application may be Android operating system, iOS operating system, Symbian operating system, BlackBerry operating system, Windows operating system, Mac operating system, or Tizen operating system.
  • the application running method of the embodiment of the present application can also be applied to an open source operating system including any of the foregoing operating systems.
  • open source operating systems suitable for the Android operating system MIUI system, Flyme system, EMUI system, Smartisan system, etc.
  • the applications in the embodiments of the present application can be understood as application software and the like.
  • Application is a computer program product provided to meet the application needs of users in different fields and different problems. It can broaden the application field of electronic device operating systems and enlarge the functions of electronic device hardware.
  • the applications that are included in the operating system of the electronic device at the factory such as camera, calendar, short message, wireless local area networks (WLAN), gallery, call, Bluetooth, etc.
  • applications installed independently by users such as WeChat, Weibo, Meitu, etc., downloaded and installed by users through an application store. This application does not limit the sources and categories of applications in the embodiments of this application.
  • Figure 1B uses the Android operating system as an example to introduce a possible framework diagram of the Android operating system.
  • the Android operating system may consist of an application program layer, an application program framework layer, a local runtime library layer, and a driver layer.
  • the application layer can provide some core applications (such as the first application in the following embodiments of this application), such as camera, calendar, map, music, short message, WLAN, gallery, call, navigation, Bluetooth, and video.
  • the application in the application layer is usually installed in the electronic device when the operating system is installed before the electronic device leaves the factory.
  • the application layer may also provide a security sandbox program.
  • the application framework layer can be used for input management services. Specifically, it can be implemented through a window manager, content provider, view system, phone manager, resource manager, notification manager, etc.
  • the window manager is used to manage window programs.
  • the window manager can obtain the size of the display, determine whether there is a status bar, lock the screen, take a screenshot, etc.
  • the content provider is used to store and retrieve data and make these data accessible to applications.
  • the data may include video, image, audio, phone calls made and received, browsing history and bookmarks, phone book, etc.
  • the view system includes visual controls, such as controls that display text and controls that display pictures.
  • the view system can be used to build applications.
  • the display interface can be composed of one or more views.
  • a display interface that includes a short message notification icon may include a view that displays text and a view that displays pictures.
  • the phone manager is used to provide the communication function of the electronic device. For example, the management of the call status (including connecting, hanging up, etc.).
  • the resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, etc.
  • the notification manager enables the application to display notification information in the status bar, which can be used to convey notification-type messages, and it can disappear automatically after a short stay without user interaction.
  • the notification manager is used to notify the download completion, message reminder, etc.
  • the notification manager can also be a notification that appears in the status bar at the top of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window.
  • text messages are displayed in the status bar, prompt sounds, electronic devices vibrate, and indicator lights flash.
  • the Android runtime is responsible for the scheduling and management of the Android system.
  • the core library consists of two parts: one part is the function function that the java language needs to call, and the other part is the core library of Android.
  • the application layer and the application framework layer run in a virtual machine.
  • the virtual machine executes the java files of the application layer and the application framework layer as binary files.
  • the virtual machine is used to perform functions such as object life cycle management, stack management, thread management, security and exception management, and garbage collection.
  • the system library can include multiple functional modules. For example: surface manager (surface manager), media library (Media Libraries), three-dimensional graphics processing library (for example: OpenGL ES), 2D graphics engine (for example: SGL), etc.
  • the surface manager is used to manage the display subsystem and provides a combination of 2D and 3D layers for multiple applications.
  • the media library supports playback and recording of a variety of commonly used audio and video formats, as well as still image files.
  • the media library can support multiple audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to realize 3D graphics drawing, image rendering, synthesis, and layer processing.
  • the 2D graphics engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least display driver, camera driver, audio driver, and sensor driver.
  • the methods in the following embodiments can all be implemented in an electronic device with the above hardware structure or an electronic device with a similar structure.
  • the electronic device as the mobile phone 100 shown in FIG. 1A as an example, the method for responding to the request provided in the embodiment of the present application is specifically introduced.
  • FIG. 2 it is a flowchart of a method for responding to a request provided in an embodiment of this application. As shown in Figure 2, the method may include:
  • the mobile phone 100 receives a first request of a first application.
  • At least one application is installed in the mobile phone 100.
  • the mobile phone 100 is installed with applications such as WeChat, browser, Taobao, navigation, stocks, Weibo, and bicycle sharing.
  • the first application is any one of at least one application installed in the mobile phone 100.
  • the first application may be an application that comes with the operating system of the mobile phone 100, such as navigation, Bluetooth, and video in the application layer in FIG. 1B.
  • other users' self-installed applications for example, WeChat, headlines, etc. downloaded and installed by users through the app store.
  • the first request is used to request to perform the first operation.
  • the first operation includes at least any one of the following: accessing the first sensitive data in the mobile phone 100, writing data to the mobile phone 100, and invoking the second application in the mobile phone 100.
  • the first sensitive data includes at least: data in a preset type of application or data stored in a third preset storage area.
  • the preset types of applications can include, but are not limited to, applications involving users' personal real information (such as Alipay, etc.), applications involving users' social information (such as WeChat, etc.), applications involving users' financial information (such as China Merchants Bank, Wukong Finance, etc.) ), applications involving user virtual order information (such as Taobao, Meituan, etc.), applications involving user travel information (such as China Railway 12306, etc.), or applications involving user location information (such as maps, etc.).
  • the third preset storage area refers to a storage area normally used by the user. For example, the storage area of pictures in the user's gallery, the storage area of the user's address book, the storage area of application account information or the storage area of user personal information, etc.
  • the first sensitive data in the embodiments of this application may specifically include but not limited to the following categories of data: user personal information (for example, gender, name, birthday, ID number, phone number, address, email address) , Bank account, etc.), contact information (for example, address book, WeChat friends, etc.), short messages, WeChat chat records, location information, calendar events, call records, browser search history, virtual order information (for example, Taobao order information )Wait.
  • user personal information for example, gender, name, birthday, ID number, phone number, address, email address
  • contact information for example, address book, WeChat friends, etc.
  • short messages for example, address book, WeChat friends, etc.
  • WeChat chat records for example, location information, calendar events, call records, browser search history
  • virtual order information for example, Taobao order information
  • the embodiments of the present application do not limit the specific content of the first request.
  • the first request can also be other related to user privacy, security threats to the mobile phone 100, or mobile phone. 100 normal use, etc., have hidden safety hazards and require management and control permission requests. For example, a request for application 1 to tamper with the account or password corresponding to application 2 and a request for application 1 to delete a certain picture stored in the mobile phone 100.
  • the first request in the embodiment of the present application is not triggered by the first application in response to the user's operation on the first application interface. Instead, the first application is automatically initiated, and the initiation of the first request is invisible to the user. Therefore, there is also the problem that the above-mentioned application invokes the electronic device to perform certain sensitive behaviors without the user's knowledge, which affects the security of the mobile phone 100.
  • the first request automatically initiated by the first application may be: when the user starts the navigation application, the navigation application automatically initiates a request to call the GPS in the mobile phone 100 for positioning.
  • the navigation application automatically initiates a request to call the GPS in the mobile phone 100 for positioning.
  • the user starts the application he only wants to query the location of a certain place, not to go to that place, so there is no need to inform the navigation application of the user's location information.
  • the navigation application automatically requests to call the GPS in the mobile phone 100 to obtain the user's location information, it may cause unnecessary leakage of the user's location information.
  • the aforementioned application may also request the mobile phone 100 to perform the first operation in response to the user's operation.
  • the mobile phone 100 displays the homepage of the Taobao application.
  • the mobile phone 100 can call the camera in the mobile phone 100 to scan the picture.
  • the first operation is triggered by the mobile phone 100 in response to the user's operation, rather than automatically initiated by the Taobao application.
  • a call interface is displayed on the display screen of the mobile phone 100, and the mobile phone 100 can call the recording application in the mobile phone 100 to record in response to the user's click operation of the recording button on the call interface.
  • the first operation is triggered by the mobile phone 100 in response to the user's operation, rather than automatically initiated by the call application.
  • the mobile phone 100 may perform behavior prediction on the user to determine whether to respond to a request from an application using the method for responding to a request in this embodiment of the application.
  • the mobile phone 100 may predict whether the user has a willingness to remove the first application from the list of applications to be controlled, and if it is predicted that the user has such a willingness.
  • the mobile phone 100 can automatically remove the first application from the list of applications to be controlled.
  • the mobile phone 100 may also pop up a window to remind the user to remove the first application from the application category to be controlled. Among them, the removal can be temporary or permanent.
  • the mobile phone 100 can predict whether the user intends to remove the first application from the list of applications to be controlled based on time information, location information, or historical behavior characteristics of the user when using the mobile phone 100, and predict the Whether the removal is temporary or permanent.
  • the historical behavior characteristics of the user when using the mobile phone 100 can be determined by the mobile phone 100 according to the name of the application used by the user, the application usage time, the usage duration, and the like. For example, the mobile phone 100 analyzes the user's historical behavior characteristics and finds that the user often opens the food delivery application around 6:00-7:00 pm, and the mobile phone 100 predicts that the user may be willing to order food delivery during this time period based on the historical behavior characteristics.
  • the takeaway application when the mobile phone 100 responds to a request for user location information initiated by the takeaway application after the time period is started, the takeaway application can be temporarily removed from the list of applications to be controlled, and the takeaway application can be faithfully transferred to the takeaway application. Feedback the actual location of the user.
  • the food delivery application may also pop up to remind the user that the food delivery application is currently an application to be controlled, and ask the user whether the food delivery application needs to be temporarily removed from the application category to be controlled.
  • the mobile phone 100 analyzes the logs of navigation applications and finds that the user has frequently used the navigation applications in the past few days, and the location of the user has been changing across regions. The mobile phone 100 speculates based on the historical behavior characteristics that the user may have frequent route query and navigation needs during the journey. In this case, the mobile phone 100 can temporarily remove the navigation application from the list of applications to be controlled when responding to a request for obtaining user location information after the navigation application is started, and faithfully feedback the user's actual location to the navigation application. Alternatively, the navigation application may also pop up to remind the user that the navigation application is currently an application to be controlled, and ask the user whether the navigation application needs to be temporarily removed from the list of applications to be controlled, as shown in Figure 3(a).
  • the navigation application may also pop up to remind the user to set a time limit for temporarily removing the navigation application from the list of applications to be controlled, as shown in (b) of FIG. 3. For example, the user will be on the road in the next week, so the user can set the navigation application to be temporarily removed from the list of applications to be controlled within the next week.
  • the user can also set the time limit and time period for each application to be controlled to be controlled when setting the application to be controlled, as shown in (c) in FIG. 3. For example, the user sets the food delivery application to be controlled in time periods other than the lunch time period (such as 12:00-13:00 noon) and the dinner time period (such as 17:00-19:00 in the evening).
  • the mobile phone 100 determines that the first application is an application to be controlled.
  • the mobile phone determining that the first application is the application to be controlled may include: in response to the first request, the mobile phone 100 determines whether the first application satisfies the first condition. If the first application meets the preset condition, the mobile phone 100 determines that the first application is an application to be controlled.
  • the first application meeting the first condition may include at least the following two situations:
  • the first application is an application in the list of applications to be controlled.
  • the list of applications to be controlled can be set by the user in the mobile phone 100.
  • the user may set a preset type of application such as an application involving the user's personal real information and an application involving the user's social information as the application to be controlled.
  • a preset type of application such as an application involving the user's personal real information and an application involving the user's social information as the application to be controlled.
  • Pre-defined types of applications may have security risks and require special precautions.
  • the user can group applications in the mobile phone 100 according to different security protection levels. For applications in a group with a higher security protection level, the mobile phone 100 can execute the method in the embodiments of the present application to respond to requests from these applications.
  • Case (2) The operating mode of the first application is the safe mode.
  • the operation mode of each application in the mobile phone 100 may be pre-configured; or, it may be set in the mobile phone 100 by the user.
  • the operating mode of the application may include: safe mode and general mode. If the operating mode of the first application is the safe mode, the mobile phone 100 may run the first application in the fourth preset storage area. If the running mode of the first application is the normal mode, the mobile phone 100 runs the first application in the third preset storage area. Wherein, the fourth preset storage area is different from the third preset storage area.
  • the fourth preset storage area refers to a storage area corresponding to a temporary virtual path provided by the mobile phone 100 for the application to be controlled for running the application.
  • the storage area corresponding to the temporary virtual path may be partitioned by the mobile phone 100 for running certain applications, so as to prevent certain behaviors of the application from permanently affecting the hard disk of the mobile phone 100.
  • the application randomly writes certain data in the hard disk of the mobile phone 100, such as writing a virus.
  • the application randomly changes the application file in the mobile phone 100, which causes the application function to be lost.
  • the fourth preset storage area may also be a storage area corresponding to a fixed virtual path allocated by the sandbox to the first application. It is used for the first application to always run applications in this storage area, etc.
  • an application in safe mode can only access three folders under the sandbox program directory, including Documents, Library, and temporary files.
  • the fourth preset storage area may be a storage area corresponding to Documents in the sandbox program directory.
  • the operating mode of the application may be set by the user when the application is installed on the mobile phone 100, or set by the user on a corresponding interface. For example, the user can set the running mode of each application through the "application permission setting" interface, as shown in Figure 4 (a).
  • a pop-up window reminds the user to set the running mode of the application, as shown in (b) of FIG. 4.
  • the mobile phone 100 may also remind the user to set the operating mode of the application while the pop-up window reminds the user to set the read and write permissions of the application when each application is installed, as shown in (c) in FIG. 4.
  • the mobile phone 100 performs a second operation corresponding to the first operation.
  • the second operation in the embodiment of the present application is a different operation from the first operation.
  • Example 1 The first operation is to write data into the first preset storage area of the mobile phone 100.
  • the first preset storage area may be the same as the third preset storage area. That is, the first preset storage area refers to the storage area normally used by the user. For example, the storage area of pictures in the user's gallery, the storage area of the user's address book, the storage area of application account information or the storage area of user personal information, etc.
  • the first preset storage area may also be another storage area.
  • the first preset storage area is a storage area corresponding to a temporary virtual path or a fixed virtual path allocated by the mobile phone 100 to other applications to be controlled. This application does not limit the first preset storage area.
  • the mobile phone 100 may directly return the execution result to the first application, and the execution result includes the indication information that the data is successfully written.
  • the mobile phone 100 does not perform the first operation, but performs the second operation.
  • the second operation is: the mobile phone 100 writes data to the second preset storage area of the mobile phone 100. That is, the mobile phone 100 provides an independent storage area for the first application to write data.
  • the execution result returned by the mobile phone 100 to the first application is used to indicate that the mobile phone 100 of the first application has successfully performed the first operation, so that the first application can provide corresponding functions normally.
  • the application A automatically initiates the first request to request the mobile phone 100 to call the camera in the mobile phone 100 to obtain the user image.
  • the first application needs to receive the response of the mobile phone 100 to the first request before it can provide subsequent functions normally.
  • the first operation is to call the camera in the mobile phone 100 to obtain the user image.
  • the mobile phone 100 does not actually call the camera in the mobile phone 100 to obtain the user image.
  • the second operation and after the second operation is completed, return a response message to the application A to inform the application A that it has completed the first operation. So that application A can provide subsequent functions normally, while avoiding the leakage of user privacy.
  • Example 2 The first operation is to access the first sensitive data in the mobile phone 100.
  • the second operation may be: the mobile phone 100 first reads the first sensitive data, and then performs desensitization processing on the first sensitive data.
  • the execution result returned by the mobile phone 100 to the first application includes data after desensitization processing.
  • the second operation may be: the mobile phone 100 reads the data in the second preset storage area as the first sensitive data.
  • the execution result returned by the mobile phone 100 to the first application includes the data in the second preset storage area read by the mobile phone 100.
  • the second preset storage area may be the first application provided by the mobile phone 100 for the first application to write the first request to the mobile phone 100 for writing data to the mobile phone 100. 2.
  • the storage area corresponding to the temporary virtual path of the data.
  • the second preset storage area may be a storage area corresponding to a fixed virtual path allocated by the sandbox to the first application. Used for the first sensitive data reading/acquisition, data writing, sensitive behavior response, etc. of the first application.
  • the sandbox will generate a private virtual path for each application, and randomly generate a number sequence as the path name for the application to access and write operations.
  • the second in the embodiment of this application The preset storage area can be understood as a storage area corresponding to a library or temporary file under the sandbox program directory. Since each application can only access its own virtual path, resources between various applications cannot be shared, thus forming a relatively safe mechanism.
  • the correspondence between different applications and virtual paths can be stored in the sandbox in a table form or in other forms.
  • the embodiment of the present invention is not limited.
  • Table 1 only The description is given in a form of a table, and the form may also be in other forms, and the embodiment of the present invention does not limit the form of the table.
  • the sandbox may also provide only one public virtual path for all applications installed in the mobile phone 100 to use.
  • the specific setting of the virtual path is not limited in the embodiment of the present application.
  • the mobile phone 100 performs desensitization processing on the first sensitive data, which may include but is not limited to the following two solutions:
  • Option 1 Replace the first sensitive data.
  • the mobile phone 100 may use null data as the first sensitive data.
  • the first request is to read the user's contact
  • the mobile phone 100 regards empty data as the first sensitive data
  • the first request is to read a call log
  • the mobile phone 100 may return to the first application first sensitive data indicating that there is no call log.
  • the mobile phone 100 may use data stored in the second preset storage area as the first sensitive data.
  • the first request is to obtain the user's WeChat avatar
  • the mobile phone 100 uses the first picture in the second preset storage area as the first sensitive data and returns it to the first application, as shown in FIG. 6.
  • the first picture in the second preset storage area may be a picture previously written in the second preset storage area by the first application.
  • the mobile phone 100 can use any rules to determine the first picture from them, for example, according to the picture size, according to the picture storage time, and so on.
  • the embodiment of the present application does not limit it.
  • the first request is to read a calendar event
  • the mobile phone 100 may return the virtual calendar event in the virtual calendar in the second preset storage area as the first sensitive data to the first application.
  • the virtual calendar event in the virtual calendar may be a calendar event written when the first application requests to write a calendar event before.
  • Option 2 Modify the first sensitive data.
  • the mobile phone 100 may block and display sensitive information in the picture.
  • the first request is to obtain the user's train ticket photo
  • the mobile phone 100 can mosaic the name, ID number, and starting location on the train ticket, and then return it to the first application. As shown in Figure 7 (a).
  • the first request is to obtain user personal information, including name, ID number, phone number, address, account number, password, etc.
  • the mobile phone 100 can process the above-mentioned information by partially displaying (for example, replacing part of the information with an asterisk "*"), and return it to the first application. As shown in Figure 7 (b).
  • the first request is to obtain user location information.
  • the mobile phone 100 may offset the user's actual longitude and latitude (eg 34°16′N, 108°54′E) by 5′ and 10′ (eg, 34 °21'N, 108°64'E) return to the first application, as shown in Figure 8.
  • the first request is to obtain the bank card number bound to the user's Alipay, and the mobile phone 100 may randomly modify the bank card number and return it to the first application.
  • the mobile phone 100 may return empty data.
  • the sensitive information in the picture can be hidden and displayed.
  • the first sensitive data (such as location information) suitable for modification processing can be modified randomly.
  • the mobile phone 100 may use the data stored in the second preset storage area as the first sensitive data. In this regard, the embodiment of the present application does not limit it.
  • the mobile phone 100 may determine how to process the first request of the first application by querying the correspondence between different pre-configured first operations and second operations.
  • Plan 1 / Plan 2 Read contacts Plan 1 / Plan 2 Read short message Plan 1 / Plan 2 Read memory content Plan 1 / Plan 2 Get location Plan 1 / Plan 2 Read call log Plan 1 / Plan 2 Read calendar events Plan 1 / Plan 2 Write contact Write to the second preset storage area Write to memory Write to the second preset storage area Write calendar event Write to the second preset storage area Call SMS to send SMS
  • the return has been completed, no actual operation Call the phone app to make a call
  • the return has been completed, no actual operation Call the camera to take a photo
  • the return has been completed, no actual operation Call camera
  • Example 3 The first operation is to call the second application.
  • the second application is any application installed in the mobile phone 100 except the first application.
  • the second application may be a camera application, an instant messaging application, a phone application, a recording application, or a map application.
  • the second operation is: the mobile phone 100 does not actually call the second application.
  • the execution result returned by the mobile phone 100 to the first application includes information indicating that the mobile phone 100 has successfully invoked the second application.
  • the first application that can normally provide the user with subsequent functions only after receiving the response message including the first operation result.
  • the first request automatically initiated by the application A is used to request the mobile phone 100 to call the camera in the mobile phone 100 to take a picture. And only after receiving the response message including the photographed picture, the application A can normally provide the follow-up function to the user.
  • the mobile phone 100 may send a response message including a false result (for example, a false picture) to the application. For example, sending a picture with a black background; or, the mobile phone 100 may also send the picture stored in the second preset storage area in the sandbox to the application.
  • a false result for example, a false picture
  • Example 1, Example 2, and Example 3 are examples to introduce several ways in this embodiment of the application that the mobile phone 100 performs a second operation corresponding to the first operation and returns the execution result to the first application.
  • Possible implementation methods there are not only the above three examples, but also other possible implementation methods for completing the first request of the application while protecting data and operating security.
  • the method for responding to the request in the embodiment of the present application may further include:
  • the mobile phone 100 starts the first application in the sandbox.
  • the startup of the first application may be triggered in response to the user clicking the application icon of the first application.
  • the mobile phone 100 launching the first application in the sandbox may include: the sandbox of the mobile phone 100 communicates with the first application, which is used to intercept the startup process of the first application, and put the startup process of the first application into the corresponding sandbox
  • the fourth preset storage area operates.
  • the mobile phone 100 can start the first application in the sandbox for all applications installed therein.
  • the mobile phone 100 may first determine whether the first application is a preset type of application, and if the first application is of a preset type The first application is started in the security sandbox. For example, the operating system of the mobile phone 100 can use the checkPermission interface to determine whether the first application is an application to be controlled. If the first application is an application to be controlled, the checkPermission interface returns information to the mobile phone 100 that the first application is an application to be controlled, and the mobile phone 100 can Start and run the first application in the security sandbox. For example, the mobile phone 100 may start and run the first application in the fourth preset storage area corresponding to the security sandbox.
  • the mobile phone 100 may determine whether the first application is a preset type of application after launching the first application outside the sandbox, and if the first application is a preset type of application, intercept the running process of the first application, The running program of the first application is run in the fourth preset storage area corresponding to the security sandbox.
  • the mobile phone 100 may also record at least the following information: the first requested information and the second operation.
  • the information of the first request includes at least the following information: the first operation corresponding to the first request, the time of the first request, and the initiating application of the first request.
  • the information of the first request may further include at least one of the following information: the access path of the first operation, the second operation corresponding to the first operation, the access path of the second operation, the return result, and the like. So that the user can understand the security of the first application, so that the operating mode of the first application can be adjusted at any time. For example, according to the first request information recorded by the mobile phone 100, the user finds that an application frequently tampered with data, the user may consider uninstalling the application or modifying the permissions of the application (such as not allowing the camera to be called).
  • the mobile phone 100 includes hardware structures and/or software modules corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
  • the embodiment of the present application may divide the mobile phone 100 into functional modules.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • the mobile phone 100 may include a receiving unit 1010 and a processing unit 1020.
  • the receiving unit 1010 can be used to support the mobile phone 100 to perform the above step S201
  • the processing unit 1020 can be used to support the mobile phone 100 to perform the above step S202, and/or other processes used in the technology described herein.
  • the mobile phone 100 may also include a storage unit 1030, which is used to read data for supply, write data for supply, or record information related to requests with potential security risks.
  • the processing unit 1020 may be the processor 110 shown in FIG. 1A. It can implement or execute various exemplary logical blocks, modules and circuits described in conjunction with the disclosure of this application.
  • the processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of digital signal processing (DSP) and a microprocessor, and so on.
  • the storage unit 1030 may be the memory shown in FIG. 1A and includes an external memory interface 120 and an internal memory 121.
  • the aforementioned mobile phone 100 may also include a radio frequency circuit.
  • the mobile phone 100 can receive and send wireless signals through a radio frequency circuit.
  • the radio frequency circuit includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the radio frequency circuit can also communicate with other devices through wireless communication.
  • the wireless communication can use any communication standard or protocol, including but not limited to global system for mobile communications, general packet radio service, code division multiple access, broadband code division multiple access, long-term evolution, email, short message service, etc.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • the steps of the method or algorithm described in the embodiments of the present application may be implemented in a hardware manner, or may be implemented in a manner in which a processor executes software instructions.
  • Software instructions can be composed of corresponding software modules, which can be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, mobile hard disk, CD-ROM or any other form of storage known in the art Medium.
  • An exemplary storage medium is coupled to the processor, so that the processor can read information from the storage medium and can write information to the storage medium.
  • the storage medium may also be an integral part of the processor.
  • the processor and the storage medium may be located in the ASIC.
  • the ASIC may be located in the detection device.
  • the processor and the storage medium may also exist as separate components in the detection device.
  • the disclosed user equipment and method can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the modules or units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be It can be combined or integrated into another device, or some features can be omitted or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate parts may or may not be physically separate.
  • the parts displayed as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a readable storage medium.
  • the technical solutions of the embodiments of the present application are essentially or the part that contributes to the prior art, or all or part of the technical solutions can be embodied in the form of software products, which are stored in a storage medium.
  • a device which may be a single-chip microcomputer, a chip, etc.
  • a processor processor
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)

Abstract

本申请公开了一种响应请求的方法及电子设备,涉及应用程序领域,可以降低电子设备中安装的应用在运行时对电子设备安全性的影响,保护电子设备中的信息安全。本申请中电子设备通过对电子设备中安装的应用的获取敏感数据、写入数据、进行敏感行为的操作请求,采取执行与操作请求对应的其他较为安全的操作,在保护电子设备的安全性,以及保护电子设备中的信息安全的前提下,又可以保证应用正常提供后续功能。

Description

一种响应请求的方法及电子设备
本申请要求在2019年6月28日提交中国国家知识产权局、申请号为201910578279.4的中国专利申请的优先权,发明名称为“一种响应请求的方法及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及应用程序领域,尤其涉及一种响应请求的方法及电子设备。
背景技术
现如今,随着移动通信高速化的发展和智能电子设备的快速发展,涌现了各式各样的应用(Application,APP)。用户可以随时随地通过电子设备中安装的应用,进行信息共享、社交、交易、办公、远程监控等。例如,通过导航类APP(例如,百度地图)查询目的地,通过微信APP与朋友视频等。
通常,应用需要获取对电子设备中数据的读写权限,以及调用电子设备中应用等相关权限,才能提供相应的功能。但是电子设备若获取了上述权限,则可以随意读取电子设备中的全部数据,或者向电子设备中写入任意数据,或者随意调用电子设备中安装的任何应用。在应用可随意读取的数据中,可能会包括用户的敏感数据(如,用户个人信息),会造成用户隐私的泄露。而应用随意写入数据,则会存在安全隐患(如,应用随意更改应用代码)。以及,应用随意调用电子设备中安装的应用,可能会给用户带来高额的花费(如,应用调用应用商店,下载大量的应用安装包)。
发明内容
本申请实施例提供一种响应请求的方法,可以降低电子设备中安装的应用在运行时对电子设备安全性的影响,保护电子设备中的信息安全。
为达到上述目的,本申请实施例采用如下技术方案:
第一方面,提供一种响应请求的方法,该方法应用于电子设备,该方法包括:电子设备接收该电子设备中第一应用的第一请求,该第一请求用于请求执行第一操作,第一操作至少包括以下中的一种或多种:访问该电子设备中的第一敏感数据、向该电子设备写入数据或者调用该电子设备中的第二应用;响应于该第一请求,电子设备确定第一应用为待管控应用,电子设备执行与第一操作对应的第二操作。
上述第一方面提供的技术方案,电子设备通过对应用发起的获取敏感数据、写入数据、进行敏感行为的操作请求,采取执行与操作请求对应的其他较为安全的操作。在保护电子设备的安全性,以及保护电子设备中的信息安全的前提下,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,当第一操作是向电子设备写入数据时,第二操作包括:电子设备向电子设备的第二预设存储区域写入数据;电子设备向第一应用返回数据写入成功的指示信息。电子设备在接收到应用的向电子设备写入数据的请求时,通过提供虚拟路径供应用写入数据,既可以降低应用向电子设备随意写入数据造成的安全隐患,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,当第一操作是访问电子设备中的第一敏感数据时,第二操作包括:该电子设备读取第一敏感数据,并对该第一敏感数据进行脱敏处理;电子设备向第一应用返回脱敏处理后的数据;或者,该电子设备读取第二预设存储区域中的数据;电子设备 将从第二预设存储区域读取的数据作为第一敏感数据向第一应用返回。电子设备在接收到应用的访问第一敏感数据的请求时,通过向应用返回经过脱敏处理的敏感数据,或者返回虚假数据,既可以防止电子设备中敏感数据的泄露,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,当第一操作是调用第二应用时,第二操作包括:该电子设备向第一应用直接返回成功调用第二应用的指示信息,但不调用第二应用。电子设备在接收到应用的调用电子设备中第二应用的请求时,通过虚假调用第二应用以及虚假返回执行成功的结果,既可以降低应用随意调用电子设备中的应用造成的安全隐患,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,第一敏感数据包括:预设类型的应用中的数据或保存在第三预设存储区域的数据中的至少一种;第二应用至少包括以下中的一种或多种:照相机应用、即时通讯应用、电话应用、录音应用或地图应用。本申请可以防止应用窃取涉及用户个人信息、社交信息、金融信息等预设类型的应用中的上述,以及电子设备中存储的文档、图片等资料;还可以防止应用随意调用电子设备中的可能涉及敏感数据泄露、可能带给用户损失等具有安全隐患的行为和操作,可以充分保护电子设备的安全性。
在一种可能的实现方式中,电子设备确定第一应用为待管控应用,包括:电子设备判断第一应用是否满足第一条件;若第一应用满足第一条件,电子设备确定第一应用为待管控应用。若某些应用需要权限管控,用户可以对该应用进行特定设置。而电子设备可以根据应用是否满足特定设置,确定该应用是否为待管控应用。
在一种可能的实现方式中,在电子设备接收该电子设备中第一应用的第一请求之前该方法还包括:响应于用户的操作,该电子设备在沙箱中启动第一应用。电子设备采取在安全沙箱中启动应用,可以更加可靠地保护电子设备的安全性,和电子设备中的信息安全。
在一种可能的实现方式中,第二预设存储区域是沙箱对应的存储区域。本申请通过在安全沙箱中运行应用,以及响应应用的第一请求可以为应用提供一个相对安全的运行环境,降低应用对电子设备安全性的影响,保证电子设备中的信息安全。
在一种可能的实现方式中,在电子设备判断第一应用是否满足第一条件之前,该方法还包括:电子设备确定第一应用具备执行第一操作的权限。通过判断第一应用是否具备执行第一操作的权限,可以避免第一应用不具备执行第一操作的权限时,仍然采用本申请的响应请求的方法导致的不必要的处理进程,造成CPU资源浪费。
第二方面,提供一种电子设备,该电子设备包括:接收单元,用于接收电子设备中第一应用的第一请求,该第一请求用于请求执行第一操作,该第一操作至少包括以下中的一种或多种:访问电子设备中的第一敏感数据、向电子设备写入数据或者调用电子设备中的第二应用;处理单元,用于确定第一应用为待管控应用,以及执行与第一操作对应的第二操作。
上述第二方面提供的技术方案,电子设备通过对应用的获取敏感数据、写入数据、进行敏感行为的操作请求,采取执行与操作请求对应的其他较为安全的操作。在保护电子设备的安全性,以及保护电子设备中的信息安全的前提下,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,电子设备还包括存储单元,该存储单元包括第一预设存储区域和第二预设存储区域;当第一操作是向第一预设存储区域写入数据时,第二操作包括:处理单元向第二预设存储区域写入数据;处理单元向所第一应用返回上数据写入成功的指示信息。电子设备在接收到应用的向电子设备写入数据的请求时,通过提供虚拟路径供应用写入数据,既可以降低应用向电子设备随意写入数据造成的安全隐患,又可以保证应用正常提供 后续功能。
在一种可能的实现方式中,当第一操作是访问电子设备中的第一敏感数据时,第二操作包括:处理单元读取第一敏感数据,并对该第一敏感数据进行脱敏处理;处理单元向第一应用返回脱敏处理后的数据;或者,处理单元读取第二预设存储区域中的数据;处理单元向第一应用返回处理单元读取的第二预设存储区域中的数据。电子设备在接收到应用的访问第一敏感数据的请求时,通过向应用返回经过脱敏处理的敏感数据,或者返回虚假数据,既可以防止电子设备中敏感数据的泄露,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,当第一操作是调用第二应用时,第二操作包括:处理单元向第一应用直接返回成功调用第二应用的指示信息,但处理单元不调用第二应用。电子设备在接收到应用的调用电子设备中第二应用的请求时,通过虚假调用第二应用以及虚假返回执行成功的结果,既可以降低应用随意调用电子设备中的应用造成的安全隐患,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,存储单元还包括第三预设存储区域,第一敏感数据包括:预设类型的应用中的数据或保存在第三预设存储区域的数据中的至少一种;第二应用至少包括以下中的一种或多种:照相机应用、即时通讯应用、电话应用、录音应用或地图应用。本申请可以防止应用窃取涉及用户个人信息、社交信息、金融信息等预设类型的应用中的上述,以及电子设备中存储的文档、图片等资料;还可以防止应用随意调用电子设备中的可能涉及敏感数据泄露、可能带给用户损失等具有安全隐患的行为和操作,可以充分保护电子设备的安全性。
在一种可能的实现方式中,处理单元确定第一应用为待管控应用,包括:处理单元判断第一应用是否满足第一条件;若第一应用满足第一条件,处理单元确定第一应用为待管控应用。若某些应用需要权限管控,用户可以对该应用进行特定设置。而电子设备可以根据应用是否满足特定设置,确定该应用是否为待管控应用。
在一种可能的实现方式中,上述处理单元还用于,在接收单元接收电子设备中第一应用的第一请求之前,响应于用户的操作,在沙箱中启动第一应用。电子设备采取在安全沙箱中启动应用,可以更加可靠地保护电子设备的安全性,和电子设备中的信息安全。
在一种可能的实现方式中,第二预设存储区域是沙箱对应的存储区域。本申请通过在安全沙箱中运行应用,以及响应应用的第一请求可以为应用提供一个相对安全的运行环境,降低应用对电子设备安全性的影响,保证电子设备中的信息安全。
在一种可能的实现方式中,处理单元还用于,在处理单元判断第一应用满足第一条件之前,确定第一应用具备执行第一操作的权限。通过判断第一应用是否具备执行第一操作的权限,可以避免第一应用不具备执行第一操作的权限时,仍然采用本申请的响应请求的方法导致的不必要的处理进程,造成CPU资源浪费。
第三方面,提供一种电子设备,该电子设备包括:存储器,用于存储计算机程序代码,该计算机程序代码包括指令;当该存储器存储的一个或多个计算机程序被处理器执行时,使得电子设备执行:接收该电子设备中第一应用的第一请求,该第一请求用于请求执行第一操作,第一操作至少包括以下中的一种或多种:访问该电子设备中的第一敏感数据、向该电子设备写入数据或者调用该电子设备中的第二应用;确定第一应用为待管控应用,以及执行与第一操作对应的第二操作。
上述第三方面提供的技术方案,电子设备通过对应用的获取敏感数据、写入数据、进行 敏感行为的操作请求,采取执行与操作请求对应的其他较为安全的操作。在保护电子设备的安全性,以及保护电子设备中的信息安全的前提下,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,存储器包括第一预设存储区域和第二预设存储区域;当第一操作是向第一预设存储区域写入数据时,第二操作包括:当存储器存储的一个或多个计算机程序被处理器执行时,使得电子设备向第二预设存储区域写入数据;向所第一应用返回上数据写入成功的指示信息。电子设备在接收到应用的向电子设备写入数据的请求时,通过提供虚拟路径供应用写入数据,既可以降低应用向电子设备随意写入数据造成的安全隐患,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,当第一操作是访问电子设备中的第一敏感数据时,第二操作包括:当存储器存储的一个或多个计算机程序被处理器执行时,使得电子设备读取第一敏感数据,并对该第一敏感数据进行脱敏处理,向第一应用返回脱敏处理后的数据;或者,使得该电子设备读取第二预设存储区域中的数据,向第一应用返回电子设备读取的第二预设存储区域中的数据。电子设备在接收到应用的访问第一敏感数据的请求时,通过向应用返回经过脱敏处理的敏感数据,或者返回虚假数据,既可以防止电子设备中敏感数据的泄露,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,当第一操作是调用第二应用时,第二操作包括:当存储器存储的一个或多个计算机程序被处理器执行时,使得电子设备向第一应用直接返回成功调用第二应用的指示信息,但不调用第二应用。电子设备在接收到应用的调用电子设备中第二应用的请求时,通过虚假调用第二应用以及虚假返回执行成功的结果,既可以降低应用随意调用电子设备中的应用造成的安全隐患,又可以保证应用正常提供后续功能。
在一种可能的实现方式中,存储器还包括第三预设存储区域,第一敏感数据包括:预设类型的应用中的数据或保存在第三预设存储区域的数据中的至少一种;第二应用至少包括以下中的一种或多种:照相机应用、即时通讯应用、电话应用、录音应用或地图应用。本申请可以防止应用窃取涉及用户个人信息、社交信息、金融信息等预设类型的应用中的上述,以及电子设备中存储的文档、图片等资料;还可以防止应用随意调用电子设备中的可能涉及敏感数据泄露、可能带给用户损失等具有安全隐患的行为和操作,可以充分保护电子设备的安全性。
在一种可能的实现方式中,电子设备确定第一应用为待管控应用,包括:当存储器存储的一个或多个计算机程序被处理器执行时,使得电子设备判断第一应用是否满足第一条件;若第一应用满足第一条件,电子设备确定第一应用为待管控应用。若某些应用需要权限管控,用户可以对该应用进行特定设置。而电子设备可以根据应用是否满足特定设置,确定该应用是否为待管控应用。
在一种可能的实现方式中,在电子设备接收该电子设备中第一应用的第一请求之前,处理器还用于:当存储器存储的一个或多个计算机程序被处理器执行时,使得电子设备响应于用户的操作,在沙箱中启动第一应用。电子设备采取在安全沙箱中启动应用,可以更加可靠地保护电子设备的安全性,和电子设备中的信息安全。
在一种可能的实现方式中,第二预设存储区域是沙箱对应的存储区域。本申请通过在安全沙箱中运行应用,以及响应应用的第一请求可以为应用提供一个相对安全的运行环境,降低应用对电子设备安全性的影响,保证电子设备中的信息安全。
在一种可能的实现方式中,在电子设备判断第一应用是否运行在第三预设存储区域之前, 处理器还用于:当存储器存储的一个或多个计算机程序被处理器执行时,使得电子设备确定第一应用具备执行第一操作的权限。通过判断第一应用是否具备执行第一操作的权限,可以避免第一应用不具备执行第一操作的权限时,仍然采用本申请的响应请求的方法导致的不必要的处理进程,造成CPU资源浪费。
第四方面,提供一种计算机可读存储介质,该计算机可读存储介质上存储有计算机执行指令,该计算机执行指令被处理器执行时实现如第一方面任一种可能的实现方式中的响应请求的方法。
第五方面,提供一种芯片系统,该芯片系统包括处理器、存储器,存储器中存储有指令;所述指令被所述处理器执行时,实现如第一方面任一种可能的实现方式中的响应请求的方法。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。
第六方面,提供一种计算机程序产品,当其在计算机上运行时,使得第一方面提供的任一方法被执行。例如,该计算机可以是至少一个存储节点。
附图说明
图1A为本申请实施例提供的一种电子设备的硬件结构示意图;
图1B为本申请实施例提供的一种安卓操作系统架构图;
图2为本申请实施例提供的一种响应请求的方法流程图;
图3为本申请实施例提供的一种设置应用管控模式的示例图;
图4为本申请实施例提供的一种设置运行模式的界面示例图;
图5为本申请实施例提供的脱敏处理示例图一;
图6为本申请实施例提供的脱敏处理示例图二;
图7为本申请实施例提供的脱敏处理示例图三;
图8为本申请实施例提供的脱敏处理示例图四;
图9为本申请实施例提供的另一种响应请求的方法流程图;
图10本申请实施例提供的一种手机的结构示意图一;
图11本申请实施例提供的一种手机的结构示意图二。
具体实施方式
本申请实施例提供一种响应请求的方法及电子设备。通过该方法可以提升电子设备的安全性能,保护电子设备中的信息安全。
示例性的,本申请实施例中的电子设备可以是智能手机、平板电脑、上网本,还可以是其他桌面型设备、膝上型设备、手持型设备、可穿戴设备等,例如个人计算机(personal computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、智能手表、便携式多媒体播放器(Portable Multimedia Player,PMP)、专用媒体播放器、AR(增强现实)/VR(虚拟现实)设备等。本申请实施例对电子设备的具体类型和结构不作限定。
请参考图1A,其以电子设备是手机100为例,示出电子设备的硬件结构示意图。如图1A所示,手机100可以包括处理器110,存储器(包括外部存储器接口120和内部存储器121),通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,麦克风170C,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器,陀螺仪传感器,气压传感器,磁传感器,加速度传感器,距离传感器, 接近光传感器,指纹传感器,温度传感器,触摸传感器,环境光传感器等。
可以理解的是,本发明实施例示意的结构并不构成对手机100的具体限定。在本申请另一些实施例中,手机100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器110可以包括一个或多个处理单元。例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),飞行控制器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。处理器210中还可以设置存储器,用于存储指令和数据。
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,存储器120,显示屏194,摄像头193,和无线通信模块160等供电。
手机100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。
天线1和天线2用于发射和接收电磁波信号。手机100中的每个天线可用于覆盖单个或多个通信频段。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在手机100上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。
无线通信模块160可以提供应用在手机100上的包括WLAN(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,手机100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得手机100可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
手机100通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
显示屏194用于显示图像,视频等。
手机100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。
手机100可以通过音频模块170,扬声器170A,麦克风170C以及应用处理器等实现音频功能。例如音乐播放,录音等。
音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。手机100可以通过扬声器170A进行语音播放或通知等。
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当手机100接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。手机100可以设置至少一个麦克风170C。在另一些实施例中,手机100可以设置两个麦克风170C,除了采集声音信号,还可以实现降噪功能。在另一些实施例中,手机100还可以设置三个,四个或更多麦克风170C,实现采集声音信号,降噪,还可以识别声音来源,实现定向录音功能等。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。手机100可以接收按键输入,产生与手机100的用户设置以及功能控制有关的键信号输入。
马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏194不同区域的触摸操作,马达191也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。
指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。
SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和手机100的接触和分离。手机100可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口195可以支持Nano SIM卡,Micro SIM卡,SIM卡等。同一个SIM卡接口195可以同时插入多张卡。所述多张卡的类型可以相同,也可以不同。SIM卡接口195也可以兼容不同类型的SIM卡。SIM卡接口195也可以兼容外部存储卡。手机100通过SIM卡和网络交互,实现通话以及数据通信等功能。在一些实施例中,手机100采用eSIM,即:嵌入式SIM卡。eSIM卡可以嵌在手机100中,不能和手机100分离。
为了便于理解,本申请实施例这里对本申请实施例中的术语进行介绍:
敏感数据:又称隐私数据。常见的敏感数据有用户个人信息、联系人信息、短消息、通话记录、用户当前位置信息、存储器中存储的数据等。敏感数据还可以是用户在浏览器中的搜索记录、浏览历史记录、用户的虚拟订单信息等其他可能泄露用户喜好、关注点等信息的数据。或者预设类型的应用中的数据,例如,涉及用户金融类信息的应用(如招商银行)。
敏感行为:可以理解为一些应用在用户不知情的情况下调用电子设备进行某些操作。包括但不限于在用户不知情的情况下后台调用摄像头、调用麦克风、调用无线网络,进行发送信息、发送短信、拨打电话、拍照、录像、录音和恶意扣费等行为。例如,一些应用可能会在用户不知情的情况下,调用电子设备的短消息应用发送消息订阅增值业务,或者电话应用拨打收费声讯电话。这样,会在用户不知情的情况下产生通信费用,给用户造成了经济损失。
其中,一些应用在用户不知情的情况下调用电子设备进行某些操作可以理解为:这些应用发起的用于触发电子设备执行某些操作的请求,并非响应于用户的操作产生的。
脱敏处理(Data Masking):又称数据漂白、数据去隐私化或数据变形。例如,脱敏处理可以通过脱敏规则对数据中包含的敏感数据进行数据变形,实现对敏感数据的可靠保护。
沙箱(Sandbox):又叫沙盒,是一个虚拟系统程序。该虚拟系统程序允许电子设备在沙盒环境中运行应用(例如:浏览器、微信、导航等),提供了一个类似容器的独立作业环境。其中,沙箱的工作原理是:对于运行在沙箱中的应用,沙箱通过重定向技术,把应用生成和修改的文件,定向到沙箱程序的程序目录对应的文件夹中。其中,应用生成和修改的文件包括应用注册表和应用的核心数据。因此,沙箱作为一个独立的虚拟环境,通过加载自身的驱动来保护底层数据,属于驱动级别的保护。可以为应用提供一个相对安全的运行环境,在沙箱内部运行的应用对手机100安全性影响较小。
本申请实施例中的电子设备中安装有操作系统(Operating System,OS)。其中,操作系统是管理和控制电子设备硬件与软件资源的计算机程序,是直接运行在“裸机”上的最基本的系统软件,任何其他软件都必须在操作系统的支持下才能运行,操作系统是用户和电子设备 的接口,同时也是电子设备硬件和应用的接口。操作系统的功能包括管理电子设备的软件、硬件以及数据资源,控制程序运行,改善人机界面,为应用提供支持,提供各种形式的用户界面,使用户有一个好的工作环境,为应用的开发提供必要的服务和相应的接口等。操作系统管理电子设备的硬件资源,同时按照应用的资源请求,分配资源,如:划分CPU时间,内存空间的开辟等等。
需要说明的是,本申请实施例对电子设备中安装的具体操作系统不作限定。例如,本申请实施例中的电子设备的操作系统可以是安卓Android操作系统、iOS操作系统、塞班Symbian操作系统、黑莓BlackBerry操作系统、Windows操作系统、Mac操作系统或泰泽Tizen操作系统等。
另外,本申请实施例的应用的运行方法还可以适用于包括上述任意操作系统的开源操作系统中。例如,适用于Android操作系统的开源操作系统:MIUI系统、Flyme系统、EMUI系统、Smartisan系统等。
另外,本申请实施例中的应用(本申请实施例中也称为“应用程序”)可以理解为应用软件等。应用是为了满足用户不同领域、不同问题的应用需求而提供的计算机程序产品,它可以拓宽电子设备操作系统的应用领域,放大电子设备硬件的功能。例如,电子设备在出厂时操作系统中自带的应用,如相机、日历、短消息、无线局域网(wireless local area networks,WLAN)、图库、通话、蓝牙等。又例如,用户自主安装的应用,如用户通过应用商店下载安装的微信、微博、美图等。对于本申请实施例中应用的来源和类别,本申请不作限定。
请参考图1B,图1B以安卓操作系统为例,介绍一种可能的安卓操作系统框架图。如图1B所示,安卓操作系统可以由应用程序层、应用程序框架层、本地运行库层和驱动层。
应用程序层可以提供一些核心应用程序(如本申请实施例下文中的第一应用),例如相机、日历、地图、音乐、短消息、WLAN、图库、通话、导航、蓝牙和视频等。应用程序层中的应用程序通常在电子设备出厂前,安装操作系统时便可以安装在电子设备中。
在一些实施例中,如图1B所示,应用程序层还可以提供安全沙箱程序。
应用程序框架层可以用于输入管理服务。具体的,可以通过窗口管理器、内容提供器、视图系统、电话管理器、资源管理器和通知管理器等实现。
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。
内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。
电话管理器用于提供电子设备的通信功能。例如通话状态的管理(包括接通,挂断等)。
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提 示文本信息,发出提示音,电子设备振动,指示灯闪烁等。
安卓运行时负责安卓系统的调度和管理。可以包括核心库和虚拟机。其中,核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。
应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(Media Libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。
2D图形引擎是2D绘图的绘图引擎。
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。
以下实施例中的方法均可以在具有上述硬件结构的电子设备或者具有类似结构的电子设备中实现。以下以电子设备是图1A所示的手机100为例,具体介绍本申请实施例提供的响应请求的方法。
如图2所示,为本申请实施例提供的一种响应请求的方法流程图。如图2所示,该方法可以包括:
S201、手机100接收第一应用的第一请求。
其中,手机100中安装有至少一个应用,例如,手机100中安装有微信、浏览器、淘宝、导航、股票、微博、共享单车等应用。第一应用是手机100中安装的至少一个应用中的任一个。例如,第一应用可以是手机100的操作系统自带的应用,如图1B中应用程序层中的导航、蓝牙和视频等。或者其他用户自主安装的应用,例如,用户通过应用商店下载安装的微信、头条新闻等。
在本申请实施例中,第一请求用于请求执行第一操作。第一操作至少包括以下中的任一种:访问手机100中的第一敏感数据、向手机100中写入数据,以及调用所手机100中的第二应用。
其中,第一敏感数据至少包括:预设类型的应用中的数据或者保存在第三预设存储区域的数据。预设类型的应用可以包括但不限于涉及用户个人真实信息的应用(如支付宝等)、涉及用户社交信息的应用(如微信等)、涉及用户金融类信息的应用(如招商银行、悟空理财等)、涉及用户虚拟订单信息的应用(如淘宝、美团等)、涉及用户出行信息的应用(如中国铁路12306等)或涉及用户位置信息的应用(如地图等)等。第三预设存储区域是指用户正常使用的存储区域。例如,用户图库中图片的存储区域,用户通信录的存储区域,应用账号信息的存储信息或用户个人信息的存储区域等。
从具体的数据类别来看,本申请实施例中的第一敏感数据具体可以包括但不限于以下类别的数据:用户个人信息(例如,性别、姓名、生日、身份证号、电话、住址、邮箱、银行账号等)、联系人信息(例如,通信录,微信好友等)、短消息、微信聊天记录、位置信息、 日历事件、通话记录、浏览器搜索历史、虚拟订单信息(例如,淘宝订单信息)等。
需要说明的是,本申请实施例对第一请求的具体内容不作限定。第一请求除了上述访问手机100中的第一敏感数据、向手机100中写入数据,以及调用所手机100中的第二应用,还可以是其他涉及用户隐私、涉及手机100安全威胁、涉及手机100正常使用等具有安全隐患,需要管控权限的请求。例如,应用1篡改应用2对应的账号或密码的请求、应用1删除手机100中存储的某一图片的请求等。
需要说明的是,本申请实施例中的第一请求并非是第一应用响应于用户在第一应用界面上的操作触发的。而是第一应用自动发起的,该第一请求的发起对用户是不可见的。因此,也就存在上文中提到的应用在用户不知情的情况下调用电子设备进行某些敏感行为,影响手机100的安全性的问题。
示例性的,第一应用自动发起第一请求可以是:导航类应用在用户开启该导航类应用时,自动发起请求调用手机100中的GPS进行定位的请求。而事实上,用户开启该应用仅仅想查询某一地方的位置,并非是要去往该地方,因此无需告知该导航类应用用户的位置信息。如此,导航类应用在开启时自动请求调用手机100中的GPS,获取用户的位置信息,则可能会造成用户位置信息不必要的泄露。
当然,上述应用也可能会响应于用户的操作,请求手机100执行第一操作。例如,假设手机100显示淘宝应用的首页。响应于用户对淘宝应用的首页上扫一扫按钮的点击操作,手机100可以调用手机100中的照相机,进行图片扫描。在这种情况下,第一操作是手机100响应于用户的操作触发的,而不是淘宝应用自动发起的。
又例如,手机100的显示屏上显示通话界面,手机100响应于用户对通话界面上录音按钮的点击操作,手机100可以调用手机100中的录音应用进行录音。在这种情况下,第一操作是手机100响应于用户的操作触发的,而不是通话应用自动发起的。
在一些实施例中,手机100可以对用户进行行为预测,以确定是否采用本申请实施例的响应请求的方法响应来自应用的请求。示例性的,手机100可以预测用户是否有将第一应用从待管控应用列表中移出的意愿,若预测用户有该意愿。手机100则可以自动将第一应用从待管控应用列表中移出。或者,手机100还可以弹窗提醒用户将第一应用从待管控应用类别中移出。其中,该移除可以是暂时性的,也可以是永久性的。
在一种可能的实现方式中,手机100可以根据时间信息、位置信息或用户使用手机100时的历史行为特征等预测用户是否有将第一应用从待管控应用列表中移出的意愿,以及预测该移除是暂时性的还是永久性的。其中,用户使用手机100时的历史行为特征可以由手机100根据用户使用的应用名、应用使用时间、使用时长等确定。例如,手机100分析用户历史行为特征发现,用户经常在下午6:00-7:00钟左右打开外卖类应用,手机100根据该历史行为特征预测用户在该时间段可能有叫外卖的意愿。在这种情况下,手机100在响应外卖类应用在该时间段启动后发起的获取用户位置信息的请求时,可以临时将该外卖类应用从待管控应用列表中移出,如实向该外卖类应用反馈用户的实际位置。或者,外卖类应用还可以弹窗提醒用户该外卖类应用目前为待管控应用,询问用户是否需要将该外卖类应用从待管控应用类别中暂时移出。
又例如,手机100通过分析导航类应用的日志,发现用户最近几天频繁使用该导航类应用,且用户的位置一直在跨地区变化。手机100根据该历史行为特征推测用户在旅途中,可能有频繁查询路线、导航等需求。在这种情况下,手机100在响应导航类应用启动后获取用 户位置信息的请求时,可以临时将该导航类应用从待管控应用列表中移出,如实向该导航类应用反馈用户的实际位置。或者,导航类应用还可以弹窗提醒用户该导航类应用目前为待管控应用,询问用户是否需要将该导航类应用从待管控应用列表中暂时移出,如图3中的(a)所示。
在一些实施例中,导航类应用还可以弹窗提醒用户设置将该导航类应用从待管控应用列表中暂时移出的期限,如图3中的(b)所示。例如,用户在未来的一周会在旅途中,因此用户可以设置在未来一周之内将该导航类应用从待管控应用列表中暂时移出。在一些实施例中,用户还可以在设置待管控应用时,设置每一个待管控应用被管控的期限、时间段等,如图3中的(c)所示。例如,用户设置外卖类应用在除午饭时间段(如中午12:00-13:00)和晚饭时间段(如傍晚17:00-19:00)以外的时间段受管控。
S202、手机100确定第一应用为待管控应用。
在一种可能的实现方式中,手机确定第一应用为待管控应用(即S202),可以包括:响应于第一请求,手机100判断第一应用是否满足第一条件。若第一应用是否满足预设条件,手机100确定第一应用为待管控应用。
其中,第一应用满足第一条件至少可以包括以下两种情况:
情况(1):第一应用是待管控应用列表中的应用。其中,该待管控应用列表可以由用户在手机100中设置。例如,用户可以将涉及用户个人真实信息的应用、涉及用户社交信息的应用等预设类型的应用设置为待管控应用。具体的,关于预设类型的应用的介绍,请参考上文中的内容。预设类型的应用可能会存在安全隐患,需要特别防范。例如,用户可以在手机100中将应用按照不同安全防范等级进行分组,对于安全防范等级较高的组中的应用,手机100可以执行本申请实施例的方法,响应这些应用的请求。
情况(2):第一应用的运行模式是安全模式。其中,手机100中每个应用的运行模式可以是预先配置的;或者,可以由用户在手机100中设置。应用的运行模式可以包括:安全模式和一般模式。如果第一应用是运行模式是安全模式,手机100可以在第四预设存储区域运行该第一应用。如果第一应用是运行模式是一般模式,手机100则在第三预设存储区域运行第一应用。其中,第四预设存储区域与第三预设存储区域不同。
其中,第四预设存储区域是指手机100为待管控应用提供的供其运行应用程序的临时虚拟路径对应的存储区域。例如,该临时虚拟路径对应的存储区域可以是手机100专门用于运行某些应用划分的,用于防止应用的某些行为对手机100硬盘永久性的影响。例如,应用在手机100硬盘中随意写入某些数据,如,写入病毒。又例如,应用随意更改手机100中的应用文件,造成应用使用功能丧失。
或者,第四预设存储区域还可以是沙箱为第一应用分配的固定虚拟路径对应的存储区域。用于第一应用始终在该存储区域运行应用程序等。例如,以iOS操作系统为例,处于安全模式下的应用只能访问沙箱程序目录下的三个文件夹,包括文档(Documents),库(Library)和临时文件。第四预设存储区域可以是沙箱程序目录下的文档(Documents)对应的存储区域。其中,应用的运行模式可以由用户在手机100安装应用时设置,或者由用户在相应的界面设置。例如,用户可以通过在“应用程序权限设置”界面设置每一个应用的运行模式,如图4中的(a)所示。又例如,每一个应用在手机100中安装时,弹窗提醒用户设置该应用的运行模式,如图4中的(b)所示。其中,手机100还可以在安装每一个应用时,在弹窗提醒用户设置该应用的读写权限的同时,提醒用户设置该应用的运行模式,如图4中的(c)所示。
S203、手机100执行与第一操作对应的第二操作。
需要说明的是,本申请实施例中的第二操作是与第一操作不同的操作。
以下结合几种可能的第一操作示例,具体说明手机100的第二操作,以及手机执行第二操作的方式:
示例1:第一操作是向手机100的第一预设存储区域中写入数据。
其中,第一预设存储区域可以与第三预设存储区域相同。即第一预设存储区域是指用户正常使用的存储区域。例如,用户图库中图片的存储区域,用户通信录的存储区域,应用账号信息的存储信息或用户个人信息的存储区域等。
或者,第一预设存储区域还可以是其他存储区域。例如,第一预设存储区域是手机100为其他待管控应用分配的临时虚拟路径或固定虚拟路径对应的存储区域。本申请对第一预设存储区域不作限定。
在这种情况下,手机100可以直接向第一应用返回的执行结果,该执行结果包括数据写入成功的指示信息。但是手机100并不执行第一操作,而是执行第二操作。第二操作是:手机100向手机100的第二预设存储区域写入数据。即,手机100为第一应用提供一个独立的供其写入数据的存储区域。
其中,手机100向第一应用返回的执行结果用于指示第一应用手机100已成功执行第一操作,以便第一应用可以正常提供相应的功能。例如,应用A在用户使用应用A的过程中,自动发起第一请求,用于请求手机100调用手机100中的照相机获取用户图像。而且第一应用需要接收到手机100对该第一请求的响应之后,才能正常提供后续的功能。
在上述示例中,第一操作即调用手机100中的照相机获取用户图像,而为了保护用户的隐私,本申请实施例中,手机100实际并不调用手机100中的照相机获取用户图像,而是进行第二操作,以及在完成第二操作之后,向应用A返回响应消息,用于告知应用A其已完成第一操作。以便应用A可以正常提供后续的功能,同时又可以避免用户隐私的泄露。
示例2:第一操作是访问手机100中的第一敏感数据。
在这种情况下,第二操作可以是:手机100先读取该第一敏感数据,然后对该第一敏感数据进行脱敏处理。对应的,手机100向第一应用返回的执行结果包括脱敏处理后的数据。
或者,第二操作可以是:手机100读取第二预设存储区域中的数据作为第一敏感数据。对应的,手机100向第一应用返回的执行结果包括手机100读取的第二预设存储区域中的数据。
在本申请实施例中,第二预设存储区域可以是第一应用在向手机100发送为向手机100备写入数据的第一请求时,手机100为第一应用提供的供其写入第二数据的临时虚拟路径对应的存储区域。
或者,该第二预设存储区域可以是沙箱为第一应用分配的固定虚拟路径对应的存储区域。用于第一应用的第一敏感数据读取/获取,数据写入,敏感行为响应等。
例如,以iOS操作系统为例,沙箱会为每个应用生成一个私有虚拟路径,并随机生成一个数字序列作为路径名,用于该应用访问写入等操作,本申请实施例中的第二预设存储区域可以理解为沙箱程序目录下的库(Library)或临时文件对应的存储区域。由于每一个应用只能访问自己的虚拟路径,各个应用之间的资源不能共享,这样就形成了一个相对安全的机制。
在一种可能的实现方式中,不同应用与虚拟路径的对应关系可以以表格形式存储于沙箱中,也可以以其他形式存储于沙箱中,本发明实施例不进行限定,以下表1仅以一种表格形 式进行说明,表格也可以是其他形式,本发明实施例对表格的形式不进行限定。
表1
应用 虚拟路径数字序列 虚拟路径
百度地图 5534 documentPath\documentPath[0]
微信 5825 documentPath\documentPath[1]
浏览器 8418 documentPath\documentPath[2]
共享单车 5797 documentPath\documentPath[3]
…… …… ……
需要说明的是,沙箱还可以仅提供一个公用的虚拟路径,供手机100中安装的所有应用使用。对于虚拟路径的具体设置,本申请实施例不作限定。
在一种可能的实现方式中,手机100对第一敏感数据进行脱敏处理,可以包括但不限于以下2种方案:
方案1:替换第一敏感数据。
示例性的,手机100可以以空数据作为第一敏感数据。
例如,第一请求为读取用户联系人,手机100将空数据作为第一敏感数据,向第一应用返回不包含任何联系人信息的第一敏感数据,如图5所示。
又例如,第一请求为读取通话记录,手机100可以向第一应用返回指示无通话记录的信息第一敏感数据。
又一示例性的,手机100可以将第二预设存储区域存储的数据作为第一敏感数据。
例如,第一请求为获取用户微信头像,手机100将第二预设存储区域的第一图片作为第一敏感数据,返回给第一应用,如图6所示。其中,第二预设存储区域的第一图片可以是第一应用之前在该第二预设存储区域已写入的图片。
其中,对于在第二预设存储区域中存储有若干个图片时,手机100可以采用任何规则从中确定出第一图片,如,按照图片大小、按照图片存储时间等。对此,本申请实施例不作限定。
又例如:第一请求为读取日历事件,手机100可以将第二预设存储区域的虚拟日历中的虚拟日历事件作为第一敏感数据返回给第一应用。其中,虚拟日历中的虚拟日历事件可以是第一应用之前请求写入日历事件时,写入的日历事件。
方案2:修改第一敏感数据。
示例性的,手机100可以对图片中的敏感信息遮挡显示。
例如:第一请求为获取用户的火车票照片,手机100可以对火车票票面上的姓名、身份证号、起始地点进行马赛克覆盖,再返回给第一应用。如图7中的(a)所示。
又例如:第一请求为获取用户个人信息,包括姓名、身份证号、电话号码、住址、账号、密码等。手机100可以对上述信息采取部分显示(例如用星号“*”替换部分信息)的方法进行处理,返回送给第一应用。如图7中的(b)所示。
再例如,第一请求为获取用户位置信息,手机100可以手机100将用户的实际经纬度(如,34°16′N,108°54′E)分别偏移5′和10′后(如,34°21′N,108°64′E)返回给第一应用,如图8所示。
又例如:第一请求为获取用户的支付宝中绑定的银行卡号,手机100可以将银行卡号作随机修改,返回给第一应用。
需要说明的是,对于第一应用访问手机100中的第一敏感数据的第一请求,实际采用方案1还是方案2,可以视具体情况而定。例如,对于无需返回包括实际内容的第一敏感数据的第一请求,手机100可以返回空数据。对于包含第一敏感数据的图片,可以对图片中的敏感信息遮挡显示。对于适合作修改处理的第一敏感数据(如位置信息),可以作随机修改。对于必须返回包括实际内容的第一敏感数据的第一请求,手机100可以将第二预设存储区域存储的数据作为第一敏感数据。对此,本申请实施例不作限定。
在一种可能的实现方式中,手机100可以通过查询预先配置的不同第一操作与第二操作的对应关系,确定如何处理第一应用的第一请求。
其中,上述不同第一操作与第二操作的对应关系可以以表格形式存储于沙箱中,如表2所示。
表2
第一操作 第二操作
读取用户信息 方案1/方案2
读取联系人 方案1/方案2
读取短消息 方案1/方案2
读取存储器内容 方案1/方案2
获取地理位置 方案1/方案2
读取通话记录 方案1/方案2
读取日历事件 方案1/方案2
写入联系人 写入第二预设存储区域
写入存储器 写入第二预设存储区域
写入日历事件 写入第二预设存储区域
调用短消息发送短息 返回已完成,实际不操作
调用电话应用拨打电话 返回已完成,实际不操作
调用照相机拍摄照片 返回已完成,实际不操作
调用照相机拍摄预览 返回已完成,实际不操作
调用照相机摄像 返回已完成,实际不操作
调用录音应用录音 返回已完成,实际不操作
…… ……
示例3:第一操作是调用第二应用。
其中,第二应用是手机100中安装的除第一应用以外的任一个应用。例如,第二应用可以是照相机应用、即时通讯应用、电话应用、录音应用或地图应用等。
在这种情况下,第二操作是:手机100实际不调用第二应用。对应的,手机100向第一应用返回的执行结果包括手机100已成功调用第二应用的指示信息。
在一些实施例中,对于只有在接收到包括有第一操作结果的响应消息,才能正常提供后续功能给用户的第一应用。例如,应用A自动发起的第一请求,用于请求手机100调用手机100中的照相机拍摄图片。且应用A只有在接收到包括有拍摄的图片的响应消息后,能正常提供后续功能给用户。
对于这类应用,手机100可以发送一个包括有虚假结果(例如,虚假图片)的响应消息给该应用。例如,发送背景全黑的图片;或者,手机100还可以发送沙箱中第二预设存储区 域中存储的图片给该应用。
需要说明的是,上述仅以示例1、示例2和示例3作为三种示例介绍本申请实施例中,手机100执行与第一操作对应的第二操作,向第一应用返回执行结果的几种可能的实现方法。实际并不仅存在上述三种示例,还可以通过其他在保护数据、操作安全性的同时,完成应用第一请求的其他可能的实现方法。
在一些实施例中,如图9所示,在手机100接收手机100中第一应用的第一请求(S201)之前,本申请实施例的响应请求的方法还可以包括:
S901、手机100在沙箱中启动第一应用。
其中,第一应用的启动可以是响应于用户点击第一应用的应用图标触发的。
手机100在沙箱中启动第一应用,可以包括:手机100的沙箱与第一应用通信,用于截获第一应用的启动进程,并将该第一应用的启动进程放入沙箱对应的第四预设存储区域运行。
在一些实施例中,手机100可以对其中安装的所有应用,都采用在沙箱中启动该第一应用。
在另一些实施例中,在手机100在沙箱中启动第一应用(S204)之前,手机100还可以先确定该第一应用是否为预设类型的应用,如果该第一应用是预设类型的应用,则采用在安全沙箱中启动该第一应用。例如:手机100的操作系统可以通过checkPermission接口确定第一应用是否为待管控应用,若第一应用是待管控应用,checkPermission接口向手机100返回该第一应用是待管控应用的信息,手机100可以在安全沙箱中启动以及运行第一应用。例如,手机100可以在安全沙箱对应的第四预设存储区域启动以及运行第一应用。
或者,手机100可以在沙箱外启动第一应用之后,确定该第一应用是否为预设类型的应用,如果该第一应用是预设类型的应用,则截获第一应用的运行进程,在安全沙箱对应的第四预设存储区域运行该第一应用的运行程序。
在一些实施例中,手机100还可以至少记录以下信息:第一请求的信息和第二操作。
其中,所述第一请求的信息至少包括以下信息:第一请求对应的第一操作、第一请求的时间和第一请求的发起应用。第一请求的信息还可以包括以下信息中的至少一种:第一操作的访问路径、第一操作对应的第二操作、第二操作的访问路径、返回结果等。以便用户对第一应用的安全性进行了解,从而可以随时调整第一应用的运行模式。例如,用户根据手机100记录的第一请求的信息,发现某一应用经常篡改数据,用户可以考虑卸载该应用,或者修改该应用的权限(如不允许调用照相机等)。
可以理解的是,手机100为了实现上述任一个实施例的功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以对手机100进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
比如,以采用集成的方式划分各个功能模块的情况下,如图10所示,为本申请实施例提 供的一种手机的结构示意图。该手机100可以包括接收单元1010和处理单元1020。
其中,接收单元1010可以用于支持手机100执行上述步骤S201,处理单元1020可以用于支持手机100执行上述步骤S202,和/或用于本文所描述的技术的其他过程。
需要说明的是,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。在一种可能得到结构中,如图11所示,该手机100还可以包括存储单元1030,用于供应用读取数据、供应用写入数据或记录应用具有安全隐患的请求的相关信息。
其中,处理单元1020可以是图1A中所示的处理器110。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,数字信号处理(digital signal processing,DSP)和微处理器的组合等等。存储单元1030可以是图1A中所示的存储器,包括外部存储器接口120和内部存储器121。
需要说明的是,上述手机100还可以包括射频电路。具体的,手机100可以通过射频电路进行无线信号的接收和发送。通常,射频电路包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频电路还可以通过无线通信和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统、通用分组无线服务、码分多址、宽带码分多址、长期演进、电子邮件、短消息服务等。
在一种可选的方式中,当使用软件实现数据传输时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地实现本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如软盘、硬盘、磁带)、光介质(例如DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
结合本申请实施例所描述的方法或者算法的步骤可以硬件的方式来实现,也可以是由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于RAM存储器、闪存、ROM存储器、EPROM存储器、EEPROM存储器、寄存器、硬盘、移动硬盘、CD-ROM或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于探测装置中。当然,处理器和存储介质也可以作为分立组件存在于探测装置中。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。
在本申请所提供的几个实施例中,应该理解到,所揭露的用户设备和方法,可以通过其 它的方式实现。例如,以上所描述的装置实施例仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (20)

  1. 一种响应请求的方法,其特征在于,所述方法应用于电子设备,所述方法包括:
    所述电子设备接收所述电子设备中第一应用的第一请求,所述第一请求用于请求执行第一操作,所述第一操作至少包括以下中的一种或多种:访问所述电子设备中的第一敏感数据、向所述电子设备写入数据或者调用所述电子设备中的第二应用;
    所述电子设备确定所述第一应用为待管控应用,所述电子设备执行与所述第一操作对应的第二操作。
  2. 根据权利要求1所述的方法,其特征在于,当所述第一操作是向所述电子设备的第一预设存储区域写入数据时,所述第二操作包括:
    所述电子设备向所述电子设备的第二预设存储区域写入数据;
    所述电子设备向所述第一应用返回数据写入成功的指示信息。
  3. 根据权利要求1或2所述的方法,其特征在于,当所述第一操作是访问所述电子设备中的第一敏感数据时,所述第二操作包括:
    所述电子设备读取所述第一敏感数据,并对所述第一敏感数据进行脱敏处理;
    所述电子设备向所述第一应用返回脱敏处理后的数据;
    或者,
    所述电子设备读取第二预设存储区域中的数据;
    所述电子设备将从所述第二预设存储区域读取的数据作为所述第一敏感数据向所述第一应用返回。
  4. 根据权利要求1所述的方法,其特征在于,当所述第一操作是调用所述第二应用时,所述第二操作包括:
    所述电子设备向所述第一应用直接返回成功调用所述第二应用的指示信息,但不调用所述第二应用。
  5. 根据权利要求1-4任一项所述的方法,其特征在于,所述第一敏感数据包括:预设类型的应用中的数据或保存在第三预设存储区域的数据中的至少一种;
    所述第二应用至少包括以下中的一种或多种:照相机应用、即时通讯应用、电话应用、录音应用或地图应用。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,所述电子设备确定所述第一应用为待管控应用,包括:
    所述电子设备判断所述第一应用是否满足第一条件;
    若所述第一应用满足第一条件,所述电子设备确定所述第一应用为待管控应用。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,在所述电子设备接收所述电子设备中第一应用的第一请求之前,所述方法还包括:
    响应于用户的操作,所述电子设备在沙箱中启动所述第一应用。
  8. 根据权利要求1-7任一项所述的方法,其特征在于,所述第二预设存储区域是所述沙箱对应的存储区域。
  9. 一种电子设备,其特征在于,所述电子设备包括:
    接收单元,用于接收所述电子设备中第一应用的第一请求,所述第一请求用于请求执行第一操作,所述第一操作至少包括以下中的一种或多种:访问所述电子设备中的第一敏感数据、向所述电子设备写入数据或者调用所述电子设备中的第二应用;
    处理单元,用于确定所述第一应用为待管控应用;以及执行与所述第一操作对应的第二 操作。
  10. 根据权利要求9所述的电子设备,其特征在于,所述电子设备还包括存储单元,所述存储单元包括第一预设存储区域和第二预设存储区域;
    当所述第一操作是向所述第一预设存储区域写入数据时,所述第二操作包括:
    所述处理单元向所述第二预设存储区域写入数据;
    所述处理单元向所述第一应用返回数据写入成功的指示信息。
  11. 根据权利要求9或10所述的电子设备,其特征在于,当所述第一操作是访问所述电子设备中的第一敏感数据时,所述第二操作包括:
    所述处理单元读取所述第一敏感数据,并对所述第一敏感数据进行脱敏处理;
    所述处理单元向所述第一应用返回所述脱敏处理后的数据;
    或者,
    所述处理单元读取第二预设存储区域中的数据;
    所述处理单元向所述第一应用返回所述处理单元读取的所述第二预设存储区域中的数据。
  12. 根据权利要求9所述的电子设备,其特征在于,当所述第一操作是调用所述第二应用时,所述第二操作包括:
    所述处理单元向所述第一应用直接返回成功调用所述第二应用的指示信息,但所述处理单元不调用所述第二应用。
  13. 根据权利要求9-12任一项所述的电子设备,其特征在于,所述存储单元还包括第三预设存储区域,所述第一敏感数据包括:预设类型的应用中的数据或保存在第三预设存储区域的数据中的至少一种;
    所述第二应用至少包括以下中的一种或多种:照相机应用、即时通讯应用、电话应用、录音应用或地图应用。
  14. 根据权利要求9-13任一项所述的电子设备,其特征在于,所述存储单元还包括第三预设存储单元,所述处理单元确定所述第一应用为待管控应用,包括:
    所述处理单元判断所述第一应用是否满足第一条件;
    若所述第一应用满足第一条件,所述处理单元确定所述第一应用为待管控应用。
  15. 根据权利要求9-14任一项所述的电子设备,其特征在于,所述处理单元还用于,在所述接收单元接收所述电子设备中第一应用的第一请求之前,响应于用户的操作,在沙箱中启动所述第一应用。
  16. 根据权利要求9-15任一项所述的电子设备,其特征在于,所述第二预设存储区域是所述沙箱对应的存储区域。
  17. 一种电子设备,其特征在于,所述电子设备包括:
    存储器,用于存储计算机程序代码,所述计算机程序代码包括指令;
    处理器,用于执行所述指令实现如权利要求1-8任一项所述的响应请求的方法。
  18. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机执行指令,所述计算机执行指令被处理电路执行时实现如权利要求1-8任一项所述的响应请求的方法。
  19. 一种芯片系统,其特征在于,所述芯片系统包括处理器、存储器,所述存储器中存储有指令;所述指令被所述处理器执行时,实现如权利要求1-8任一项所述的响应请求的方法。
  20. 一种计算机程序产品,其特征在于,所述计算机程序产品包括程序指令,所述程序 指令被执行时,以实现权利要求1-8中任一项所述的响应请求的方法。
PCT/CN2020/098355 2019-06-28 2020-06-28 一种响应请求的方法及电子设备 WO2020259650A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910578279.4 2019-06-28
CN201910578279.4A CN110460716A (zh) 2019-06-28 2019-06-28 一种响应请求的方法及电子设备

Publications (1)

Publication Number Publication Date
WO2020259650A1 true WO2020259650A1 (zh) 2020-12-30

Family

ID=68481737

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/098355 WO2020259650A1 (zh) 2019-06-28 2020-06-28 一种响应请求的方法及电子设备

Country Status (2)

Country Link
CN (1) CN110460716A (zh)
WO (1) WO2020259650A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110460716A (zh) * 2019-06-28 2019-11-15 华为技术有限公司 一种响应请求的方法及电子设备
CN114025358B (zh) * 2020-07-15 2024-02-13 成都鼎桥通信技术有限公司 数据脱敏方法、装置、设备及存储介质
CN112818383A (zh) * 2021-01-14 2021-05-18 内蒙古蒙商消费金融股份有限公司 一种表注册方法及装置
CN115484339A (zh) * 2021-06-15 2022-12-16 华为技术有限公司 通话录音方法及相关装置

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927476A (zh) * 2014-05-07 2014-07-16 上海联彤网络通讯技术有限公司 实现应用程序权限管理的智能系统及方法
CN104683336A (zh) * 2015-02-12 2015-06-03 中国科学院信息工程研究所 一种基于安全域的安卓隐私数据保护方法及系统
CN105592452A (zh) * 2014-10-24 2016-05-18 宇龙计算机通信科技(深圳)有限公司 防止私密数据被恶意读取的方法及其装置
CN108763921A (zh) * 2018-05-29 2018-11-06 北京迪诺益佳信息科技有限公司 一种应用软件和sdk管控的方法
CN108809913A (zh) * 2017-05-04 2018-11-13 中国移动通信集团重庆有限公司 数据脱敏的方法、装置和设备
US20190026503A1 (en) * 2017-07-23 2019-01-24 Albert C. Abnett Computer Security Environment
CN110460716A (zh) * 2019-06-28 2019-11-15 华为技术有限公司 一种响应请求的方法及电子设备

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105260663B (zh) * 2015-09-15 2017-12-01 中国科学院信息工程研究所 一种基于TrustZone技术的安全存储服务系统及方法
CN109426735A (zh) * 2017-08-29 2019-03-05 中兴通讯股份有限公司 一种保护个人隐私的方法及系统
CN107729764A (zh) * 2017-09-30 2018-02-23 广东欧珀移动通信有限公司 敏感信息的保护方法、装置、存储介质及电子设备
CN109241731B (zh) * 2018-09-11 2020-12-15 厦门市美亚柏科信息股份有限公司 一种基于虚拟应用的隐私信息保护方法、装置及存储介质

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927476A (zh) * 2014-05-07 2014-07-16 上海联彤网络通讯技术有限公司 实现应用程序权限管理的智能系统及方法
CN105592452A (zh) * 2014-10-24 2016-05-18 宇龙计算机通信科技(深圳)有限公司 防止私密数据被恶意读取的方法及其装置
CN104683336A (zh) * 2015-02-12 2015-06-03 中国科学院信息工程研究所 一种基于安全域的安卓隐私数据保护方法及系统
CN108809913A (zh) * 2017-05-04 2018-11-13 中国移动通信集团重庆有限公司 数据脱敏的方法、装置和设备
US20190026503A1 (en) * 2017-07-23 2019-01-24 Albert C. Abnett Computer Security Environment
CN108763921A (zh) * 2018-05-29 2018-11-06 北京迪诺益佳信息科技有限公司 一种应用软件和sdk管控的方法
CN110460716A (zh) * 2019-06-28 2019-11-15 华为技术有限公司 一种响应请求的方法及电子设备

Also Published As

Publication number Publication date
CN110460716A (zh) 2019-11-15

Similar Documents

Publication Publication Date Title
WO2020259650A1 (zh) 一种响应请求的方法及电子设备
US11947974B2 (en) Application start method and electronic device
US20240231890A1 (en) Memory management method and electronic device
WO2019061362A1 (zh) 一种访问设备标识符的方法及装置
CN113032766A (zh) 应用权限管理的方法和装置
CN111656347B (zh) 一种项目的显示方法及终端
WO2022253158A1 (zh) 一种用户隐私保护方法及装置
CN113836540A (zh) 管理应用权限的方法、设备、存储介质和程序产品
CN118153110B (zh) 一种数据处理方法及相关装置
CN115879088A (zh) 权限检查的方法和电子设备
CN114862398A (zh) 一种基于分布式安全设备的风险控制方法以及相关装置
US20210026807A1 (en) Method for managing data associated with application and electronic device therefor
CN114020377A (zh) 一种终端设备、图片信息保护方法和存储介质
CN114884685A (zh) 电子设备的安全管理方法、电子设备及其可读介质
CN115017473B (zh) 授权方法及电子设备
CN113850633B (zh) 信息推送方法和装置
CN115828227B (zh) 识别广告弹窗的方法、电子设备及存储介质
CN115250261B (zh) 一种信息的显示方法及电子设备
CN116088955B (zh) 进程处理方法和终端设备
CN117729561B (zh) 系统升级方法、终端及存储介质
CN116089320B (zh) 垃圾回收方法和相关装置
CN116095685B (zh) 关键信息的保护方法和终端设备
WO2024140720A1 (zh) 一种拦截方法、系统及相关装置
WO2024159912A1 (zh) 一种阻抗校准方法、电子设备、介质及产品
CN116033064B (zh) 卡片显示的方法、电子设备及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20830661

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20830661

Country of ref document: EP

Kind code of ref document: A1