WO2021022433A1 - Application monitoring method and apparatus, and storage medium and electronic device - Google Patents

Application monitoring method and apparatus, and storage medium and electronic device Download PDF

Info

Publication number
WO2021022433A1
WO2021022433A1 PCT/CN2019/099169 CN2019099169W WO2021022433A1 WO 2021022433 A1 WO2021022433 A1 WO 2021022433A1 CN 2019099169 W CN2019099169 W CN 2019099169W WO 2021022433 A1 WO2021022433 A1 WO 2021022433A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
color light
initial
brightness value
level state
Prior art date
Application number
PCT/CN2019/099169
Other languages
French (fr)
Chinese (zh)
Inventor
崔胜軫
孙波
曹奕松
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Priority to PCT/CN2019/099169 priority Critical patent/WO2021022433A1/en
Priority to CN201980098995.0A priority patent/CN114175026A/en
Publication of WO2021022433A1 publication Critical patent/WO2021022433A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Definitions

  • This application relates to the field of computer technology, and in particular to an application monitoring method, device, storage medium and electronic equipment.
  • the embodiments of the present application provide an application monitoring method, device, storage medium, and electronic equipment, which can reduce the risk of user privacy leakage and improve user information security.
  • the technical solution is as follows:
  • an embodiment of the present application provides an application monitoring method, and the method includes:
  • prompt information is output based on a preset prompt rule.
  • an embodiment of the present application provides an application monitoring device, the device including:
  • the application identification obtaining module is configured to obtain the application identification of the authorized application when it is monitored that the authorized application has opened the specified application permission;
  • the application identification judgment module is used to judge whether the application identification exists in the whitelist identification set
  • the prompt information output module is configured to output prompt information based on a preset prompt rule if the application identifier does not exist in the whitelist identifier set.
  • an embodiment of the present application provides a computer storage medium that stores a plurality of instructions, and the instructions are suitable for being loaded by a processor and executing the application monitoring method described above.
  • an embodiment of the present application provides an electronic device, which may include: a processor and a memory; wherein the memory stores a computer program, and the computer program is adapted to be loaded by the processor and execute the aforementioned Application monitoring method.
  • the user terminal when the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set. If so, then Output prompt information based on preset prompt rules.
  • the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set. If so, then Output prompt information based on preset prompt rules.
  • FIG. 1 is a schematic flowchart of an application monitoring method provided by an embodiment of the present application
  • FIG. 2a is a schematic diagram of opening an authorized application involved in an application monitoring method provided by an embodiment of the present application
  • 2b is a schematic diagram of a display interface of an authorized application involved in the application monitoring method provided by an embodiment of the present application;
  • 2c is a schematic diagram of a display interface of another authorized application involved in the application monitoring method provided by an embodiment of the present application;
  • FIG. 3a is a schematic diagram of a kind of prompt information involved in an application monitoring method provided by an embodiment of the present application
  • FIG. 3b is a schematic diagram of another prompt information involved in the application monitoring method provided by an embodiment of the present application.
  • FIG. 3c is a schematic diagram of another prompt information involved in the application monitoring method provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of another application monitoring method provided by an embodiment of the present application.
  • FIG. 5a is a schematic diagram of a prompt setting interface involved in an application monitoring method provided by an embodiment of the present application
  • FIG. 5b is a schematic diagram of a setting interface for a reminder light working mode involved in an application monitoring method provided by an embodiment of the present application;
  • Fig. 6 is a schematic structural diagram of an application monitoring device provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a prompt information output module provided by an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of another application monitoring device provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • plural means two or more.
  • “And/or” describes the association relationship of the associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone.
  • the character “/” generally indicates that the associated objects are in an "or” relationship.
  • the application monitoring method provided in the embodiments of the present application will be described in detail below in conjunction with specific embodiments.
  • the method can be implemented by relying on a computer program and can be run on an application monitoring device based on the von Neumann system.
  • the computer program can be integrated in the application or run as an independent tool application.
  • the application monitoring device in the embodiment of the present application may be a user terminal, including but not limited to: a personal computer, a tablet computer, a handheld device, a vehicle-mounted device, a wearable device, a computing device, or other processing devices connected to a wireless modem.
  • the application monitoring device is taken as an example of a user terminal for description in the embodiments of the present application.
  • the operating system of the user terminal includes, but is not limited to, an Android system, an IOS system, and a Windows phone system.
  • the operating system of the user terminal is an Android system as an example for description.
  • FIG. 1 provides a schematic flowchart of an application monitoring method for an embodiment of this application.
  • the method of the embodiment of the present application may include the following steps:
  • Step 101 Obtain the application identifier of the authorized application when it is monitored that the authorized application opens the specified application permission.
  • the authorized application can be understood as when the user terminal runs an application, it may need to call other application permissions to complete the function of the application. For example, when running an e-commerce shopping application, it may require “recording”, “navigation”, " For functions such as "photograph” and "video”, the application program needs to call the application program corresponding to the function to complete the above-mentioned functions, for example, call the camera application to complete the photographing function. At this time, before the application program wants to call the camera application program, it is necessary to grant the application program the permission to call or start the camera application program in advance, that is, the camera application permission. Usually the application permissions are granted to the application when it is first installed.
  • the application is the authorized application.
  • the authorized applications include, but are not limited to, applications developed by a third party and built in the operating system of the user terminal, including some applications, applets, plug-ins, etc. developed by a third party and built in the operating system of the user terminal.
  • the specified application permission can be understood as an application permission related to user privacy and information security.
  • the application permission may be an application permission to obtain current user location information, an application permission to read user address book information, It can be the application permission to obtain the chat history in the instant messaging software, or the application permission to use the camera to take the user's current photo.
  • the application identification may be understood as information that can be used to uniquely identify the application, and the application identification may be the id, package name, version number, etc. of the application.
  • the application identifier may be an application number matched to the application program based on a preset matching rule when the user terminal installs the application. The user terminal allocates an application number when each application is installed, and uses the number as an application identifier to identify the application.
  • the user terminal when the user terminal installs the authorized application, it first initializes the authorized application, and the initialization includes granting application permissions to the authorized application, allocating processes for the application, etc.
  • the authorized application is running When the user terminal will assign an active process.
  • the user terminal has an authorized application monitoring mechanism, which can be understood to mean that when the authorized application is initialized, a monitoring process for the authorized application can be created at the same time to monitor the active process of the authorized application when it is running, such as monitoring the authorized application Permissions for applications opened.
  • the active process and the listening process of the authorized application are in a level relationship, and the level relationship can be understood as when the authorized application is suspended or uninstalled, the life cycle of the listening process of the authorized application will not be affected .
  • the authorized application After the user opens the authorized application on the user terminal, the authorized application will be triggered to start the monitoring mechanism to monitor the status of the authorized application's invoking application permissions.
  • the authorized application When the user is using the authorized application, the authorized application is triggered to open the designated
  • the monitoring mechanism detects that the authorized application opens the designated application permissions. At this time, based on the time point when the authorized application opens the designated application permission, query and obtain the application identifier of the authorized application at the current time point in the data log stored locally of the user terminal.
  • the user opening the authorized application on the user terminal may be completed through an external device, for example, the user may select an icon of the authorized application on the display interface of the user terminal through a mouse connected to the user terminal and input an instruction to open the authorized application; It can be the user inputting the corresponding instruction through the keyboard or touchpad connected to the user terminal; it can be the instruction of the user to open the authorized application through voice input (such as voice input to open instant messaging software, etc.); it can be the user through the camera to collect gesture control instructions.
  • the operation of opening a specific authorized application may also be the selection of an icon of the authorized application by touching the screen of the user terminal.
  • the user terminal includes a touch screen, and the touch screen has a function of sensing user touch operations.
  • the opening of the authorized application and the triggering of the authorized application to open the specified application permission are both triggered by the user through a touch operation on the user terminal.
  • the structure of the touch screen includes at least three layers: a display, a sensor, and a controller.
  • the display is configured with a flexible display panel and a touch sensor arranged under the flexible display panel. The touch sensor can not only detect the location and area touched by the user but also the pressure of the touch.
  • the interface of the first news is as shown in Figure 2c.
  • the monitoring mechanism of the user terminal monitors that the authorized application opens the designated application permission-the application permission to read user address book information. Then the user terminal performs the next operation-based on the time point when the "news” application opens the designated application permissions, query and obtain the application of the "news” application corresponding to the time point "00:19" in the data log stored locally in the user terminal Logo.
  • the way for the user terminal to monitor the authorized application to enable the specified application permissions may be by monitoring whether the application interface (API) of the specified application corresponding to the specified application permission is called at the framework layer of the user terminal system Taking the user terminal system as the Android system as an example, when the authorized application of the user terminal opens the specified application permissions, it will call the interface of the specified application of the Framework framework layer to use the services of the specified application, such as all of the user terminal
  • the authorized application opens the location location permission to locate the current location, it will call the Location Manager (location location) interface of the location application in the Framework layer, and the authorized application can be monitored to open the specified application by monitoring the Location Manager (location location) interface Permissions-location targeting permissions.
  • the user terminal system when the authorized application calls the application interface (API) of the specified application corresponding to the specified application permission in the framework layer of the user terminal system, the user terminal system saves the record of the current call to the application interface (API) in In the corresponding data log, the record includes the call time, the application identification of the authorized application, etc. At this time, the user terminal can obtain the specified application permission from the corresponding data log based on the time point when the authorized application opens the specified application permission. The application identifier of the authorized application corresponding to the time point.
  • the manner in which the user terminal monitors the authorized application to open the specified application permissions may be obtained based on the analysis and processing of threads allocated by the user terminal to the third-party application, may be obtained based on the system log analysis of the user terminal system, or may be based on The application service corresponding to the specified application permission is monitored and so on.
  • the user terminal when the user terminal starts the authorized application, it establishes a monitoring process that can be used to monitor the authorized application.
  • the monitoring process can monitor multiple specified application permissions opened by the authorized application, or monitor Multiple authorized applications enable designated application permissions to save the resource space of the user terminal.
  • Step 102 Determine whether the application identifier exists in the whitelist identifier set.
  • the set of whitelist identifiers includes a totality of application identifiers of at least one whitelist application.
  • the whitelist application may be understood as an authorized application that has been authenticated as safe, and in this embodiment, the whitelist application may be understood as an application that does not involve leaking user privacy during the operation of the whitelist application.
  • the whitelisted application can be understood as an authorized application that uses the specified application to authenticate as safe by enabling the specified application right, that is, the authorized application does not involve in the running process of the authorized application calling the specified application after the specified permission is turned on Leak user privacy.
  • the whitelist identification set may be determined by the user terminal based on a security policy.
  • the user terminal is based on a security policy.
  • the authorized application opens the specified application permissions, the authorized application runs in the sandbox to monitor the authorization Whether the activity process of the application leaks user privacy; it can be determined based on third-party security protection software, for example, users can obtain the latest whitelist identifier on the server by the third-party security protection software, and update the local whitelist identifier set; also It can be added by the user on the whitelist setting interface of the user terminal, etc.
  • the user terminal invokes threads in the user terminal thread pool to perform matching calculations on the application identifiers in the whitelist identifier set, and when the match is found in the whitelist identifier set
  • the authorized application is determined as a whitelist application; when it is matched that the application identifier does not exist in the whitelist identifier set, the authorized application is determined as a risk application, and Risky applications can be understood as the risk of leaking user privacy in the authorized application in question.
  • Step 103 If the application identifier does not exist in the whitelist identifier set, output prompt information based on a preset prompt rule.
  • the preset prompt rule refers to a prompt manner preset by the user terminal, and the preset prompt rule may usually display the prompt information of the specified application opening corresponding to the specified application permission in the form of pictures, text, audio, etc.
  • the designated application can be understood as an application corresponding to an application permission related to user privacy and information security.
  • the specified application may be a camera, positioning, address book, microphone, etc.
  • the user terminal monitors that an authorized application opens designated application permissions, and the designated application permissions include, but are not limited to, location permissions, microphone access permissions, camera permissions, address book reading permissions, etc., and the application of the authorized application is obtained
  • Identification by judging that the application identification does not exist in the whitelist identification set, the authorized application is determined to be a risk application, and the user terminal pops up a prompt box in the display area of the screen and displays the specified application permission corresponding to the specified application authority. Information opened.
  • FIG. 2c when the user is using the "news application” application, select a news option to browse.
  • the interface diagram of the news is shown in Figure 2c.
  • the user triggers and opens the designated application permission related to user privacy-the application to read user address book information Permission
  • the monitoring mechanism of the user terminal detects that the authorized application opens the designated application permission-the application permission to read the user address book information. Then obtain the application identifier of the "news" application. After the user terminal matches, it is found that the application identifier does not exist in the whitelist identifier set.
  • the user terminal pops up a prompt box as shown in Figure 3a in the display area of the screen and displays "Please note that the address book is being read.”
  • the way for the user terminal to output the prompt information may be to load a corresponding text reminder notification on the current display interface.
  • the application permission set includes the specified application permission-location permission
  • the user terminal Push the prompt message "Please note that the current positioning is enabled" on the notification bar in the screen display area.
  • the user terminal can also provide the user with related operations based on the prompt information on the notification bar, and the related operations are understandable The user can choose to ignore the prompt information or close the "location" application by clicking the "operation" button shown in FIG. 3c.
  • the way for the user terminal to output the prompt information can be in the form of voice output, for example: the user terminal can voice broadcast "the current designated application (microphone, front camera, positioning, etc.) is enabled"; it can be vibration
  • the user terminal can call the internal vibration motor to prompt with a specific vibration frequency; it can also call the breathing light, flashing light, and fill light on the user terminal.
  • the user terminal when the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set, and if so, based on a preset prompt The rule outputs prompt information.
  • prompting information is output to the user in a timely manner, which can reduce the risk of user privacy leakage and thereby improve the user's information security.
  • FIG. 4 is a schematic flowchart of another embodiment of an application monitoring method proposed in this application. specific:
  • Step 201 When it is monitored that an authorized application opens the camera access permission, obtain the application identification of the authorized application.
  • the camera access permission can be understood as when the authorized application takes a photo of the current environment through the camera, the camera access permission needs to be granted to the authorized application.
  • the user terminal has an authorized application monitoring mechanism.
  • the authorized application monitoring mechanism can establish monitoring of the authorized application that grants the camera access permission, by monitoring the specified camera access permission.
  • the application interface (API) of the framework layer of the user terminal system is invoked to monitor the state of the at least one authorized application that grants camera access permission to open or invoke the camera access permission, when the user is using the at least one authorized application
  • the authorization application In the process of triggering the authorization application to enable the camera access permission, for example, the user needs to enable the camera access permission in the process of using the authorized application, scan and recognize the QR code, applet code, barcode, etc., or turn on the camera to take pictures and videos Wait.
  • the authorized application monitoring mechanism of the user terminal detects that the application interface (API) of the camera application in the framework layer of the user terminal system is called. At this time, the authorized application monitoring mechanism feeds back the notification to the user terminal that the authorized application opens the camera access permission , And then obtain the application identifier of the authorized application.
  • API application interface
  • the user terminal is a mobile phone and the user terminal system is an Android system
  • the user opens an authorized application on the mobile phone-a shopping application, and the user browses the goods that need to be purchased through the shopping application.
  • the shopping software is used without the user's knowledge.
  • the camera access permission is activated, and the camera is turned on by enabling the camera access permission.
  • the CameraService interface of the Framework layer of the Android system is called to use the camera application.
  • the authorized application monitoring mechanism of the mobile phone monitors this interface. At this time, it is monitored that the authorized application-shopping application opens the camera access permission, and then the application identification of the shopping application is obtained.
  • Step 202 Determine whether the application identifier exists in the whitelist identifier set.
  • step 102 For details, refer to step 102, which will not be repeated here.
  • Step 203 If the application identifier does not exist in the whitelist identifier set, flash an indicator light.
  • the indicator light may be understood as a light-emitting device such as a breathing light, a flashlight, and a fill light on the user terminal, and the user terminal can control the blinking of the indicator light by calling the program interface corresponding to the indicator light.
  • the user terminal monitors that an authorized application opens the camera access permission to obtain the application identifier of the authorized application, and through judgment, the application identifier does not exist in the whitelist identifier set, and the authorized application is determined as a risk application, Then the indicator light is configured to remind the user that the current authorized application has turned on the camera by means of flashing the indicator light.
  • the user terminal configures the indicator light by configuring the relevant parameters of the reminder light node of each color light on the user terminal system kernel.
  • the relevant parameters include the level state of the reminder light and the brightness value of the reminder light. , Reminder light flashing frequency, etc.
  • the node refers to a location in the system driver of the user terminal.
  • the location can be seen through a file manager with root permissions. Writing data in this location can facilitate the Framework of the Android system.
  • the application of the framework layer accesses the underlying driver, and then controls the hardware that is the indicator light.
  • the user terminal first obtains the first initial level state and the first initial brightness value of the first color light, and obtains the second initial level state and the second initial brightness value of the second color light.
  • the nodes of the first color light and the second color light in the system kernel of the user terminal correspond to an initial level state and a corresponding initial brightness value.
  • the first color light and the second color light may be one of common color lights (such as red, orange, peach, green, blue, purple, and yellow, etc.), for example, the first color light may be red light .
  • the second color light can be green light.
  • the initial level state can be understood as a high level state and a low level state. Generally, the high level state represents flickering and the low level state represents stop flickering.
  • the initial brightness value refers to the physical quantity corresponding to the initial state of the light, which is used to characterize the physical quantity of the luminous intensity on the surface of the luminous body (indicator lamp). Generally, the initial brightness value ranges from 0 to 255. The initial brightness value The larger the light, the higher the brightness of the color.
  • the user terminal can read the first initial level state and the second color light of the first color light through the read function.
  • An initial brightness value, the second initial level state of the second color light and the second initial brightness value are read, and the above values are obtained and stored in the corresponding global variables.
  • the read function that is, the first initial level state of the first color light-red light, and save it as Value1
  • the initial state of the first color light is low Status, that is, the value of Value1 is 0, and the first color light is in the state of stopping blinking.
  • the read function that is, the second initial level state of the second color light-green light, and save it as Value3, usually the initial state of the second color light is low Status, that is, the value of Value3 is 0, and the second color light is in the state of stopping blinking.
  • the user terminal can use the write function to set the first color light to a high level state and set the second color light in the indicator light to a low level state, that is, to set /sys/class/ through the write function
  • the value of leds/red/breath is set to 1, and the value of /sys/class/leds/green/breath is set to 0. So as to control the flickering of the first color light, and gradually increase the brightness value of the first color light from the first initial brightness value, that is, to change the value of /sys/class/leds/red/brightness through the write function
  • the value is accumulated from the initial state value to a fixed value, which is less than 255.
  • the user terminal can use the write function to set the first color light to a low level state and the second color light to a high level state, that is, to set the value of Value1 to 0 through the write function
  • /sys The value of /class/leds/red/breath is set to 0, and the value of /sys/class/leds/green/breath is set to 1, so as to control the flickering of the second color light and change the brightness of the second color light
  • the value gradually increases from the second initial brightness value, that is, the value of /sys/class/leds/green/brightness is accumulated from the initial state value to a fixed value through the write function, and the fixed value is less than 255 to achieve the indication
  • the light flashes in two colors.
  • the user terminal can set multi-color or single-color flashing of the indicator light, and also set the flashing frequency of the indicator light.
  • you can set the flashing frequency of the green light that is, read /sys/class/led/green/delay_on through the read function.
  • the initial value of /sys/class/led/green/delay_off reset the flashing frequency of the green light through the write function.
  • the way of flashing the reminder light of the user terminal can be set based on the selection instruction input by the user.
  • the user terminal provides the user with a flashing setting interface for the reminder light, and the user can select the corresponding one in the setting interface of the user terminal.
  • the reminder light flashes setting options to determine how the reminder light works.
  • the user can select the prompt light setting option in the setting interface of the user terminal, and then the user terminal displays the interface shown in Figure 5a in the screen display area, and the interface shown in Figure 5a displays “microphone on prompt” and “camera Turn on reminder, “Phonebook call reminder”, “Unified settings” and other reminder light setting options.
  • the user can click on “Camera Enable the prompt” option to trigger the user terminal to display an interface for selecting the prompt light-related options.
  • the interface may be the interface shown in Figure 5b.
  • the user can set the prompt light color, flashing frequency, and prompt on the interface.
  • the user terminal can be triggered to store the correspondence between the authorized application turning on the camera access permission and the working mode of the prompt light locally, and perform corresponding Setting, when it is detected that the application identifier of the authorized application is not in the whitelist identifier set, it is determined that the authorized application is a risk application, and based on the corresponding relationship, the indicator light flashes to prompt the user of the camera corresponding to the camera access permission Turned on.
  • Step 204 Receive a shutdown instruction input for the designated application corresponding to the camera access authority, and restore the indicator light to the initial state.
  • the user terminal after the user terminal prompts the user that the camera corresponding to the camera access permission is turned on by flashing the indicator light, the user can choose whether to close the designated application corresponding to the camera access permission—the camera application.
  • a camera application close instruction can be input to the user terminal.
  • the user terminal receives and responds to the camera application close instruction, sets the camera application to the closed state, and sets all The indicator light returns to the initial state, that is, the indicator light is turned off.
  • the camera application shutdown instruction may be that the user finds the third-party application by selecting the application management in the setting option in the screen display area of the user terminal, and then selects the startup process management of the third-party application, from the first The camera process corresponding to the camera application is found among all the processes of opening the third-party application, and finally, the input is input to the user terminal in a closed manner.
  • the camera application closing instruction may be that the user terminal provides a camera application closing option in the status bar of the screen display area, and the user inputs by selecting the camera shutdown button; it may be the user terminal detecting that the user closes the authorized application
  • the closing of the current camera application triggered by camera access rights it can be an instruction from the user to close the specified application-camera application through voice input; it can be an instruction from the specified application-camera application that the user collects gesture control instructions input through the camera; Press the designated physical key (power on/off key, volume key, etc.) to input the designated application-camera application instruction, etc.
  • the user terminal adjusts the first color light to the first initial level state and the first initial brightness value, and adjusts the second color light to the second initial level state And the second initial brightness value, so that the indicator light returns to the initial state, that is, the indicator light is turned off.
  • the user terminal sets the value of /sys/class/leds/red/brightness to Value1 through the write function, that is, the first color light- Adjusting the red light to the first initial level state;
  • the value of /sys/class/leds/green/brightness is set to Value4 through the write function, that is, the second color light-green light is adjusted to the second initial brightness value.
  • the prompt light After completing the above settings, the prompt light returns to the initial state, that is, the indicator light is turned off.
  • the user terminal has an automatic detection function.
  • the user terminal prompts the user to start the camera application by flashing an indicator light
  • the user terminal does not receive a close instruction input for the designated application corresponding to the camera access permission within a specified time, and the user terminal turns on the automatic detection function, That is to detect whether the user is currently using the camera application.
  • the detection may be based on the behavior characteristics when the camera application is started.
  • the behavior characteristics may be that after the user terminal authorizes the application to start or invoke the camera application, the display interface will display the imaging interface of the camera.
  • the behavior feature may be that when the user terminal starts the camera application, the user will operate the camera application (for example, focus, adjust exposure, etc.), When the operation is detected, the user terminal closes the background process that the camera is turned on;
  • the behavior characteristic may be that when the user terminal display interface malfunctions due to a malfunction, the user may frequently press the physical buttons (power on/off key, Back button, home button, etc.), at this time, when the user terminal detects the frequent pressing of the physical button operation, the background process that the camera is turned on is turned off, etc.
  • the user terminal when the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set, and if so, based on a preset prompt The rule outputs prompt information.
  • prompting information is output to the user in a timely manner, which can reduce the risk of user privacy leakage and thereby improve the user's information security.
  • FIG. 6 shows a schematic structural diagram of a positioning device provided by an exemplary embodiment of the present application.
  • the positioning device can be implemented as all or a part of the terminal through software, hardware or a combination of the two.
  • the device 1 includes an application identification acquisition module 11, an application identification judgment module 12, and a prompt information output module 13.
  • the application identification obtaining module 11 is configured to obtain the application identification of the authorized application when it is monitored that the authorized application opens the specified application permission;
  • the application identification judgment module 12 is used to judge whether the application identification exists in the whitelist identification set
  • the prompt information output module 13 is configured to output prompt information based on a preset prompt rule if the application identifier does not exist in the whitelist identifier set.
  • the device 1 further includes:
  • the application identification acquiring module 14 is used to acquire the application identification of the application when the application is monitored to be started;
  • the third-party application determining module 15 is configured to determine the application as a third-party application when the application identifier is inconsistent with the system application identifier.
  • the prompt information output module is specifically used for:
  • the prompt information output module 13 further includes:
  • the first control unit 132 is configured to control the first color light in the indicator light to a high level state and the second color light in the indicator light to a low level state. Color lights flicker;
  • the second control unit 133 is configured to control the flickering of the second color light when the first color light is set to a low level state and the second color light is set to a high level state.
  • the prompt information output module 13 further includes:
  • the initial state acquiring unit 131 is configured to acquire the first initial level state and the first initial brightness value of the first color light, and acquire the second initial level state and the second initial brightness value of the second color light .
  • the first control unit 132 is specifically configured to:
  • the second control unit 133 is specifically configured to:
  • the device further includes:
  • the prompt information closing module 14 is configured to receive a closing instruction input for the designated application corresponding to the designated application permission, and close the prompt information.
  • the prompt information closing module is specifically used for:
  • the prompt information output module 13 is specifically used for:
  • the application monitoring device when the application monitoring device provided in the above embodiment executes the application monitoring method, only the division of the above functional modules is used as an example for illustration. In actual applications, the above functions can be allocated by different functional modules as needed. , Divide the internal structure of the device into different functional modules to complete all or part of the functions described above.
  • the application monitoring device and the application monitoring method embodiments provided by the above embodiments belong to the same concept, and the implementation process is detailed in the method embodiments, which will not be repeated here.
  • the user terminal when the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set, and if so, based on a preset prompt The rule outputs prompt information.
  • prompting information is output to the user in a timely manner, which can reduce the risk of user privacy leakage and thereby improve the user's information security.
  • the embodiment of the present application also provides a computer storage medium.
  • the computer storage medium may store a plurality of instructions, and the instructions are suitable for being loaded by a processor and executed as described in the embodiment shown in FIG. 1 to FIG. 5b.
  • the specific execution process can refer to the specific description of the embodiment shown in FIG. 1 to FIG. 5b, which is not repeated here.
  • the present application also provides a computer program product that stores at least one instruction, and the at least one instruction is loaded by the processor and executed by the application monitoring of the embodiment shown in the above-mentioned FIG. 1 to FIG. 5b.
  • the at least one instruction is loaded by the processor and executed by the application monitoring of the embodiment shown in the above-mentioned FIG. 1 to FIG. 5b.
  • For the specific execution process of the method refer to the specific description of the embodiment shown in FIG. 1 to FIG. 5b, which will not be repeated here.
  • the server 1000 may include: at least one processor 1001, at least one network interface 1004, a user interface 1003, a memory 1005, and at least one communication bus 1002.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display screen (Display) and a camera (Camera), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • Display display screen
  • Camera Camera
  • the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the processor 1001 may include one or more processing cores.
  • the processor 1001 uses various excuses and lines to connect various parts of the entire server 1000, and executes the server by running or executing instructions, programs, code sets, or instruction sets stored in the memory 1005, and calling data stored in the memory 1005.
  • Various functions and processing data of 1000 may adopt at least one of digital signal processing (Digital Signal Processing, DSP), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), and Programmable Logic Array (Programmable Logic Array, PLA).
  • DSP Digital Signal Processing
  • FPGA Field-Programmable Gate Array
  • PLA Programmable Logic Array
  • the processor 1001 may integrate one or a combination of a central processing unit (CPU), a graphics processing unit (GPU), a modem, and the like.
  • the CPU mainly processes the operating system, user interface, and application programs; the GPU is used to render and draw the content that the display needs to display; the modem is used to process wireless communication. It is understandable that the above-mentioned modem may not be integrated into the processor 1001, but may be implemented by a chip alone.
  • the memory 1005 may include random access memory (RAM) or read-only memory (Read-Only Memory).
  • the memory 1005 includes a non-transitory computer-readable storage medium.
  • the memory 1005 may be used to store instructions, programs, codes, code sets or instruction sets.
  • the memory 1005 may include a storage program area and a storage data area, where the storage program area may store instructions for implementing the operating system and instructions for at least one function (such as touch function, sound playback function, image playback function, etc.), Instructions used to implement the foregoing method embodiments, etc.; the storage data area can store the data involved in the foregoing method embodiments.
  • the memory 1005 may also be at least one storage device located far away from the foregoing processor 1001.
  • the memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and an application monitoring application program.
  • the user interface 1003 is mainly used to provide an input interface for the user to obtain data input by the user; and the processor 1001 may be used to call the application monitoring application stored in the memory 1005 and execute The following operations:
  • prompt information is output based on a preset prompt rule.
  • the processor 1001 executes the output prompt information based on the preset prompt rule, and specifically performs the following operations:
  • the processor 1001 is executing the blinking indicator light, and specifically executes the following operations:
  • the second color light is controlled to flicker.
  • the processor 1001 when the processor 1001 sets the first color light in the indicator light to a high level and sets the second color light in the indicator light to a low level, the processor 1001 controls the Before the first color light flashes, perform the following operations:
  • the processor 1001 is performing the controlling the flickering of the first color light, and specifically performs the following operations:
  • the controlling the flashing of the second color light includes:
  • the processor 1001 further performs the following operations after executing the output of prompt information based on the preset prompt rule:
  • processor 1001 when the processor 1001 executes the closing of the prompt information, it specifically executes the following operations:
  • the processor 1001 specifically performs the following operations when performing the restoration of the indicator light to the initial state:
  • the user terminal when the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set, and if so, based on preset prompt rules Output prompt information.
  • the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set, and if so, based on preset prompt rules Output prompt information.
  • prompting information is output to the user in a timely manner, which can reduce the risk of user privacy leakage and thereby improve the user's information security.
  • the program can be stored in a computer readable storage medium. During execution, it may include the procedures of the above-mentioned method embodiments.
  • the storage medium can be a magnetic disk, an optical disc, a read-only storage memory or a random storage memory, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Telephone Function (AREA)

Abstract

Disclosed are an application monitoring method and apparatus, and a storage medium and a server. The method comprises: when it is detected that an authorized application enables a specified application permission, acquiring an application identifier of the authorized application; determining whether the application identifier is present in a whitelist identifier set; and if the application identifier is not present in the whitelist identifier set, outputting prompt information on the basis of a preset prompt rule. The embodiments of the present application can reduce the privacy leakage risk of a user, and improves the information security of the user.

Description

一种应用监控方法、装置、存储介质及电子设备Application monitoring method, device, storage medium and electronic equipment 技术领域Technical field
本申请涉及计算机技术领域,尤其涉及一种应用监控方法、装置、存储介质及电子设备。This application relates to the field of computer technology, and in particular to an application monitoring method, device, storage medium and electronic equipment.
背景技术Background technique
在移动互联网时代,用户终端(例如智能手机,平板电脑)可以安装的应用越来越多,通过这些应用能够为用户提供各种各样的服务,例如社交、购物、新闻、信息记录和天气查询等,满足了用户不同的需求,也方便了用户的生活、娱乐和学习。In the mobile Internet era, there are more and more applications that can be installed on user terminals (such as smart phones and tablets). These applications can provide users with various services, such as social networking, shopping, news, information recording, and weather inquiries And so on, to meet the different needs of users, but also to facilitate users' life, entertainment and learning.
当在用户终端上安装某个应用时,通常会默认授予一些应用访问权限(如开启麦克风、摄像头、听筒等)。然而,当所安装的应用为风险应用时,就有可能会在用户不知情的情况下开启某个或某些应用访问权限并且这些应用访问权限涉及用户隐私,则会导致用户隐私泄露,进而影响用户的信息安全。When an application is installed on a user terminal, access permissions for some applications are usually granted by default (such as turning on the microphone, camera, earpiece, etc.). However, when the installed application is a risky application, it is possible to enable certain or certain application access permissions without the user’s knowledge, and these application access permissions involve user privacy, which will result in the disclosure of user privacy and affect the user Information security.
发明内容Summary of the invention
本申请实施例提供了一种应用监控方法、装置、存储介质及电子设备,可以降低用户隐私泄露的风险,提高用户的信息安全。所述技术方案如下:The embodiments of the present application provide an application monitoring method, device, storage medium, and electronic equipment, which can reduce the risk of user privacy leakage and improve user information security. The technical solution is as follows:
第一方面,本申请实施例提供了一种应用监控方法,所述方法包括:In the first aspect, an embodiment of the present application provides an application monitoring method, and the method includes:
当监听到授权应用开启指定应用权限时,获取所述授权应用的应用标识;When it is monitored that an authorized application opens the specified application permission, acquiring the application identifier of the authorized application;
判断在白名单标识集合中是否存在所述应用标识;Determine whether the application identifier exists in the whitelist identifier set;
若在所述白名单标识集合中不存在所述应用标识时,则基于预设提示规则输出提示信息。If the application identifier does not exist in the whitelist identifier set, prompt information is output based on a preset prompt rule.
第二方面,本申请实施例提供了一种应用监控装置,所述装置包括:In a second aspect, an embodiment of the present application provides an application monitoring device, the device including:
应用标识获取模块,用于当监听到授权应用开启指定应用权限时,获取所述授权应用的应用标识;The application identification obtaining module is configured to obtain the application identification of the authorized application when it is monitored that the authorized application has opened the specified application permission;
应用标识判断模块,用于判断在白名单标识集合中是否存在所述应用标识;The application identification judgment module is used to judge whether the application identification exists in the whitelist identification set;
提示信息输出模块,用于若在所述白名单标识集合中不存在所述应用标识 时,则基于预设提示规则输出提示信息。The prompt information output module is configured to output prompt information based on a preset prompt rule if the application identifier does not exist in the whitelist identifier set.
第三方面,本申请实施例提供一种计算机存储介质,所述计算机存储介质存储有多条指令,所述指令适于由处理器加载并执行上述的所述的应用监控方法。In a third aspect, an embodiment of the present application provides a computer storage medium that stores a plurality of instructions, and the instructions are suitable for being loaded by a processor and executing the application monitoring method described above.
第四方面,本申请实施例提供一种电子设备,可包括:处理器和存储器;其中,所述存储器存储有计算机程序,所述计算机程序适于由所述处理器加载并执行上述的所述的应用监控方法。In a fourth aspect, an embodiment of the present application provides an electronic device, which may include: a processor and a memory; wherein the memory stores a computer program, and the computer program is adapted to be loaded by the processor and execute the aforementioned Application monitoring method.
本申请一些实施例提供的技术方案带来的有益效果至少包括:The beneficial effects brought about by the technical solutions provided by some embodiments of the present application include at least:
在本申请一个或多个实施例中,当用户终端监听到授权应用开启指定应用权限时,获取该授权应用的应用标识,并判断在白名单标识集合中是否存在该应用标识,若存在,则基于预设提示规则输出提示信息。通过基于应用标识对授权应用的风险性进行判断,当确定该授权应用为风险应用时,及时向用户输出提示信息,可以降低用户隐私泄露的风险,进而提高用户的信息安全。In one or more embodiments of the present application, when the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set. If so, then Output prompt information based on preset prompt rules. By judging the risk of an authorized application based on the application identifier, when the authorized application is determined to be a risky application, prompting information is output to the user in a timely manner, which can reduce the risk of user privacy leakage and thereby improve the user's information security.
附图说明Description of the drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to explain the embodiments of the present invention or the technical solutions in the prior art more clearly, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description are only These are some embodiments of the present invention. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without creative work.
图1是本申请实施例提供的一种应用监控方法的流程示意图;FIG. 1 is a schematic flowchart of an application monitoring method provided by an embodiment of the present application;
图2a是本申请实施例提供的一种应用监控方法涉及的授权应用开启示意图;FIG. 2a is a schematic diagram of opening an authorized application involved in an application monitoring method provided by an embodiment of the present application;
图2b是本申请实施例提供的应用监控方法的涉及的一种授权应用的显示界面示意图;2b is a schematic diagram of a display interface of an authorized application involved in the application monitoring method provided by an embodiment of the present application;
图2c是本申请实施例提供的应用监控方法的涉及的另一种授权应用的显示界面示意图;2c is a schematic diagram of a display interface of another authorized application involved in the application monitoring method provided by an embodiment of the present application;
图3a是本申请实施例提供的应用监控方法涉及的一种提示信息的示意图;FIG. 3a is a schematic diagram of a kind of prompt information involved in an application monitoring method provided by an embodiment of the present application;
图3b是本申请实施例提供的应用监控方法涉及的另一种提示信息的示意图;FIG. 3b is a schematic diagram of another prompt information involved in the application monitoring method provided by an embodiment of the present application;
图3c是本申请实施例提供的应用监控方法涉及的另一种提示信息的示意图;FIG. 3c is a schematic diagram of another prompt information involved in the application monitoring method provided by an embodiment of the present application;
图4是本申请实施例提供的另一种应用监控方法的流程示意图;4 is a schematic flowchart of another application monitoring method provided by an embodiment of the present application;
图5a是本申请实施例提供的应用监控方法涉及的一种提示设置界面的示意图;FIG. 5a is a schematic diagram of a prompt setting interface involved in an application monitoring method provided by an embodiment of the present application;
图5b是本申请实施例提供的应用监控方法涉及的一种提示灯工作方式设置界面的示意图;FIG. 5b is a schematic diagram of a setting interface for a reminder light working mode involved in an application monitoring method provided by an embodiment of the present application;
图6是本申请实施例提供的一种应用监控装置的结构示意图;Fig. 6 is a schematic structural diagram of an application monitoring device provided by an embodiment of the present application;
图7是本申请实施例提供的一种提示信息输出模块的结构示意图;FIG. 7 is a schematic structural diagram of a prompt information output module provided by an embodiment of the present application;
图8是本申请实施例提供的另一种应用监控装置的结构示意图;FIG. 8 is a schematic structural diagram of another application monitoring device provided by an embodiment of the present application;
图9是本申请实施例提供的一种电子设备的结构示意图。FIG. 9 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this application.
在本申请的描述中,需要理解的是,术语“第一”、“第二”等仅用于描述目的,而不能理解为指示或暗示相对重要性。在本申请的描述中,需要说明的是,除非另有明确的规定和限定,“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其他步骤或单元。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本申请中的具体含义。此外,在本申请的描述中,除非另有说明,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。In the description of this application, it should be understood that the terms "first", "second", etc. are only used for descriptive purposes, and cannot be understood as indicating or implying relative importance. In the description of this application, it should be noted that, unless expressly stipulated and defined otherwise, "including" and "having" and any variations thereof are intended to cover non-exclusive inclusions. For example, a process, method, system, product, or device that includes a series of steps or units is not limited to the listed steps or units, but optionally includes unlisted steps or units, or optionally also includes Other steps or units inherent to these processes, methods, products or equipment. For those of ordinary skill in the art, the specific meanings of the above-mentioned terms in this application can be understood under specific circumstances. In addition, in the description of this application, unless otherwise specified, "plurality" means two or more. "And/or" describes the association relationship of the associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone. The character "/" generally indicates that the associated objects are in an "or" relationship.
下面结合具体的实施例对本申请实施例提供的应用监控方法进行详细介绍。该方法可依赖于计算机程序实现,可运行于基于冯诺依曼体系的应用监控装置上。该计算机程序可集成在应用中,也可作为独立的工具类应用运行。其中,本申请实施例中的应用监控装置可以为用户终端,包括但不限于:个人电脑、平板电脑、手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备等。The application monitoring method provided in the embodiments of the present application will be described in detail below in conjunction with specific embodiments. The method can be implemented by relying on a computer program and can be run on an application monitoring device based on the von Neumann system. The computer program can be integrated in the application or run as an independent tool application. Wherein, the application monitoring device in the embodiment of the present application may be a user terminal, including but not limited to: a personal computer, a tablet computer, a handheld device, a vehicle-mounted device, a wearable device, a computing device, or other processing devices connected to a wireless modem.
为了描述方便,本申请实施例中以应用监控装置为用户终端为例进行说明,所述用户终端的操作系统包括但不限于安卓(Android)系统、IOS系统、Windows phone系统等。本实施例中,以所述用户终端的操作系统为安卓系统为例进行描述。For the convenience of description, the application monitoring device is taken as an example of a user terminal for description in the embodiments of the present application. The operating system of the user terminal includes, but is not limited to, an Android system, an IOS system, and a Windows phone system. In this embodiment, the operating system of the user terminal is an Android system as an example for description.
请参见图1,为本申请实施例提供了一种应用监控方法的流程示意图。如图1所示,本申请实施例的所述方法可以包括以下步骤:Please refer to FIG. 1, which provides a schematic flowchart of an application monitoring method for an embodiment of this application. As shown in Fig. 1, the method of the embodiment of the present application may include the following steps:
步骤101:当监听到授权应用开启指定应用权限时,获取所述授权应用的应用标识。Step 101: Obtain the application identifier of the authorized application when it is monitored that the authorized application opens the specified application permission.
所述授权应用可以理解为用户终端运行一个应用程序时,可能需要调用其他应用权限,才能完成该应用程序的功能,例如运行电商购物应用程序时,可能需要“录音”、“导航”、“拍照”、“录像”等功能,则该应用程序就需要调用该功能对应的应用程序来完成上述功能,例如调用相机应用完成拍照功能。此时,在该应用程序要调用相机应用程序之前,就需要提前授予该应用程序调用或开启相机应用程序的权限,即相机应用权限。通常对应用程序授予应用权限是在第一次安装时授予应用程序。这里该应用程序即所述授权应用。所述授权应用包括但不限于第三方开发、用户终端操作系统本身自带的应用,包括一些由第三方开发、用户终端操作系统本身自带的应用、小程序、插件等。The authorized application can be understood as when the user terminal runs an application, it may need to call other application permissions to complete the function of the application. For example, when running an e-commerce shopping application, it may require "recording", "navigation", " For functions such as "photograph" and "video", the application program needs to call the application program corresponding to the function to complete the above-mentioned functions, for example, call the camera application to complete the photographing function. At this time, before the application program wants to call the camera application program, it is necessary to grant the application program the permission to call or start the camera application program in advance, that is, the camera application permission. Usually the application permissions are granted to the application when it is first installed. Here, the application is the authorized application. The authorized applications include, but are not limited to, applications developed by a third party and built in the operating system of the user terminal, including some applications, applets, plug-ins, etc. developed by a third party and built in the operating system of the user terminal.
所述指定应用权限在本实施例可以理解为涉及到用户隐私及信息安全的应用权限,所述应用权限可以是获得当前用户位置信息的应用权限、可以是读取用户通讯录信息的应用权限、可以是获取即时通讯软件中聊天记录的应用权限、可以是使用相机拍摄用户当前照片的应用权限等。In this embodiment, the specified application permission can be understood as an application permission related to user privacy and information security. The application permission may be an application permission to obtain current user location information, an application permission to read user address book information, It can be the application permission to obtain the chat history in the instant messaging software, or the application permission to use the camera to take the user's current photo.
所述应用标识可以理解为可用于唯一识别应用程序的信息,所述应用标识可以是应用的id、包名、版本号等。该应用标识可以是用户终端在安装该应用 时基于预设匹配规则为所述应用程序匹配的应用编号。用户终端在每一个应用程序安装时分配一个应用编号,以编号作为应用标识来识别应用程序。The application identification may be understood as information that can be used to uniquely identify the application, and the application identification may be the id, package name, version number, etc. of the application. The application identifier may be an application number matched to the application program based on a preset matching rule when the user terminal installs the application. The user terminal allocates an application number when each application is installed, and uses the number as an application identifier to identify the application.
具体的,用户终端在安装所述授权应用时,先对所述授权应用进行初始化,所述初始化包含对所述授权应用授予应用权限、为所述应用程序分配进程等,所述授权应用在运行时用户终端会分配一个活动进程。用户终端具有授权应用监测机制,可以理解为在对所述授权应用进行初始化时,可以同时创建对所述授权应用的监听进程,监听所述授权应用运行时的活动进程,例如监测所述授权应用开启的应用权限。所述活动进程与所述授权应用的监听进程为平级关系,所述平级关系可以理解为当所述授权应用中止运行或卸载时,所述授权应用的监听进程的生命周期不会受到影响。Specifically, when the user terminal installs the authorized application, it first initializes the authorized application, and the initialization includes granting application permissions to the authorized application, allocating processes for the application, etc. The authorized application is running When the user terminal will assign an active process. The user terminal has an authorized application monitoring mechanism, which can be understood to mean that when the authorized application is initialized, a monitoring process for the authorized application can be created at the same time to monitor the active process of the authorized application when it is running, such as monitoring the authorized application Permissions for applications opened. The active process and the listening process of the authorized application are in a level relationship, and the level relationship can be understood as when the authorized application is suspended or uninstalled, the life cycle of the listening process of the authorized application will not be affected .
用户在开启用户终端上的所述授权应用之后,会触发授权应用启动监测机制监测所述授权应用的调用应用权限的状况,当用户在使用所述授权应用的过程中触发所述授权应用开启指定应用权限时,所述监测机制监测到所述授权应用开启指定应用权限。此时,基于所述授权应用开启指定应用权限的时间点,在用户终端的本地存储的数据日志中查询获取当前时间点的所述授权应用的应用标识。After the user opens the authorized application on the user terminal, the authorized application will be triggered to start the monitoring mechanism to monitor the status of the authorized application's invoking application permissions. When the user is using the authorized application, the authorized application is triggered to open the designated When applying permissions, the monitoring mechanism detects that the authorized application opens the designated application permissions. At this time, based on the time point when the authorized application opens the designated application permission, query and obtain the application identifier of the authorized application at the current time point in the data log stored locally of the user terminal.
可选的,用户开启用户终端上的所述授权应用可以是通过外部设备完成的,例如,用户可以通过连接用户终端的鼠标选中用户终端的显示界面的授权应用的图标输入的开启授权应用指令;可以是用户通过连接用户终端的键盘或者触摸板输入相应指令进行的;可以是用户通过语音输入开启授权应用的指令(例如语音输入开启即时通讯软件等);可以是用户通过摄像头采集手势控制指令完成开启特定的授权应用的操作,还可以是通过触控用户终端屏幕选中授权应用的图标等。Optionally, the user opening the authorized application on the user terminal may be completed through an external device, for example, the user may select an icon of the authorized application on the display interface of the user terminal through a mouse connected to the user terminal and input an instruction to open the authorized application; It can be the user inputting the corresponding instruction through the keyboard or touchpad connected to the user terminal; it can be the instruction of the user to open the authorized application through voice input (such as voice input to open instant messaging software, etc.); it can be the user through the camera to collect gesture control instructions. The operation of opening a specific authorized application may also be the selection of an icon of the authorized application by touching the screen of the user terminal.
以下为了本申请实施例描述的方便,具体以用户通过触控用户终端屏幕选中授权应用的图标为例进行说明,用户终端含有触控屏,触控屏具有感应用户触摸操作的功能。所述开启授权应用及触发授权应用开启指定应用权限均由用户通过在用户终端上的触摸操作触发的。所述触控屏的结构至少包括3层:显示器、传感器、控制器。显示器配置有柔性显示面板与布设于该柔性显示面板下的触摸传感器。触摸传感器不仅可以检测用户触摸的位置和区域而且可以检 测触摸的压力。For the convenience of the description of the embodiments of the present application, the following specifically takes the user to select an icon of an authorized application by touching the screen of the user terminal as an example. The user terminal includes a touch screen, and the touch screen has a function of sensing user touch operations. The opening of the authorized application and the triggering of the authorized application to open the specified application permission are both triggered by the user through a touch operation on the user terminal. The structure of the touch screen includes at least three layers: a display, a sensor, and a controller. The display is configured with a flexible display panel and a touch sensor arranged under the flexible display panel. The touch sensor can not only detect the location and area touched by the user but also the pressure of the touch.
例如:如图2a所示,当用户选中用户终端触控屏的显示层上授权应用-新闻的图标时,触摸传感器检测到存在触控输入时,与之对应的信号或多个信号被发送到控制器。控制器处理该信号或多个信号,用户终端识别到用户输入的开启“新闻”的指令,通过读取并执行开启“新闻”的控制逻辑对应的机器可执行指令,开启“新闻”。所述“新闻”应用开启之后的界面如图2b所示,在开启所述“新闻”应用时,触发授权应用启动监测机制监测所述“新闻”应用的调用或开启应用权限的状况,当用户在使用“新闻应用”应用通过具体触摸第一个新闻选项选择需要浏览的第一个新闻,所述第一个新闻的界面如图2c所示,此时开启所述第一个新闻的界面时,会触发涉及用户隐私的指定应用权限-读取用户通讯录信息的应用权限,用户终端的监测机制监测到所述授权应用开启指定应用权限-读取用户通讯录信息的应用权限。然后用户终端执行下一步操作-基于“新闻”应用开启指定应用权限的时间点,在用户终端的本地存储的数据日志中查询获取时间点“00:19”对应的所述“新闻”应用的应用标识。For example: as shown in Figure 2a, when the user selects the icon of an authorized application-news on the display layer of the touch screen of the user terminal, when the touch sensor detects the presence of a touch input, the corresponding signal or signals are sent to Controller. The controller processes the signal or multiple signals, and the user terminal recognizes the user's input to open the "news" instruction, and opens the "news" by reading and executing the machine executable instruction corresponding to the control logic to open the "news". The interface after the "news" application is started is shown in Figure 2b. When the "news" application is started, the authorized application is triggered to start a monitoring mechanism to monitor the invocation of the "news" application or the status of opening application permissions. When using the "news application" application to select the first news to be browsed by specifically touching the first news option, the interface of the first news is as shown in Figure 2c. At this time, when the interface of the first news is opened , Will trigger the designated application permission related to user privacy-the application permission to read user address book information, and the monitoring mechanism of the user terminal monitors that the authorized application opens the designated application permission-the application permission to read user address book information. Then the user terminal performs the next operation-based on the time point when the "news" application opens the designated application permissions, query and obtain the application of the "news" application corresponding to the time point "00:19" in the data log stored locally in the user terminal Logo.
在一种可行的实施方式中,用户终端监听所述授权应用开启指定应用权限的方式,可以是通过监听指定应用权限对应的指定应用在用户终端系统的框架层的应用接口(API)是否被调用,以用户终端系统为Android系统为例,用户终端的所述授权应用开启指定应用权限时,会调用Framework框架层的所述指定应用的接口来使用所述指定应用的服务,例如用户终端的所述授权应用开启位置定位权限以定位当前位置,会调用Framework框架层的所述定位应用的Location Manager(位置定位)接口,通过监听Location Manager(位置定位)接口可以监听到所述授权应用开启指定应用权限-位置定位权限。In a feasible implementation manner, the way for the user terminal to monitor the authorized application to enable the specified application permissions may be by monitoring whether the application interface (API) of the specified application corresponding to the specified application permission is called at the framework layer of the user terminal system Taking the user terminal system as the Android system as an example, when the authorized application of the user terminal opens the specified application permissions, it will call the interface of the specified application of the Framework framework layer to use the services of the specified application, such as all of the user terminal The authorized application opens the location location permission to locate the current location, it will call the Location Manager (location location) interface of the location application in the Framework layer, and the authorized application can be monitored to open the specified application by monitoring the Location Manager (location location) interface Permissions-location targeting permissions.
其中,所述授权应用在调用所述指定应用权限对应的指定应用在用户终端系统的框架层的应用接口(API)时,用户终端系统会将当前调用所述应用接口(API)的记录保存在对应的数据日志中,所述记录包含调用时间、授权应用的应用标识等,此时,用户终端可以基于所述授权应用开启指定应用权限的时间点,在所述对应的数据日志中获取所述时间点对应的授权应用的应用标识。Wherein, when the authorized application calls the application interface (API) of the specified application corresponding to the specified application permission in the framework layer of the user terminal system, the user terminal system saves the record of the current call to the application interface (API) in In the corresponding data log, the record includes the call time, the application identification of the authorized application, etc. At this time, the user terminal can obtain the specified application permission from the corresponding data log based on the time point when the authorized application opens the specified application permission. The application identifier of the authorized application corresponding to the time point.
可选,用户终端监听所述授权应用开启指定应用权限的方式可以是基于用户终端向所述第三方应用分配的线程分析处理得到、可以是基于用户终端系统的系统日志分析得到的、可以是基于指定应用权限对应的应用服务监测得到的等等。Optionally, the manner in which the user terminal monitors the authorized application to open the specified application permissions may be obtained based on the analysis and processing of threads allocated by the user terminal to the third-party application, may be obtained based on the system log analysis of the user terminal system, or may be based on The application service corresponding to the specified application permission is monitored and so on.
可选的,用户终端在启动所述授权应用时,建立一个可用于监控该授权应用的监听进程,通过所述监听进程可以对所述授权应用开启的多个指定应用权限进行监测,也可以监测多个授权应用开启指定应用权限,以节省用户终端的资源空间。Optionally, when the user terminal starts the authorized application, it establishes a monitoring process that can be used to monitor the authorized application. The monitoring process can monitor multiple specified application permissions opened by the authorized application, or monitor Multiple authorized applications enable designated application permissions to save the resource space of the user terminal.
步骤102:判断在白名单标识集合中是否存在所述应用标识。Step 102: Determine whether the application identifier exists in the whitelist identifier set.
所述白名单标识集合包含至少一个白名单应用的应用标识汇总而成的总体。所述白名单应用可以理解为经认证为安全的授权应用,所述白名单应用在本实施例中可以理解为在白名单应用运行的过程中不涉及泄露用户隐私的应用程序。在本实施例中所述白名单应用可以理解为通过开启指定应用权使用指定应用认证为安全的授权应用,即所述授权应用在开启指定权限之后的授权应用调用指定应用的运行过程中不涉及泄露用户隐私。The set of whitelist identifiers includes a totality of application identifiers of at least one whitelist application. The whitelist application may be understood as an authorized application that has been authenticated as safe, and in this embodiment, the whitelist application may be understood as an application that does not involve leaking user privacy during the operation of the whitelist application. In this embodiment, the whitelisted application can be understood as an authorized application that uses the specified application to authenticate as safe by enabling the specified application right, that is, the authorized application does not involve in the running process of the authorized application calling the specified application after the specified permission is turned on Leak user privacy.
其中,所述白名单标识集合可以是用户终端基于安全策略确定的,例如用户终端基于安全策略,在所述授权应用开启指定应用权限之后将所述授权应用在沙箱中运行,监测所述授权应用的活动进程是否泄漏用户隐私;可以是基于第三方安全防护软件的确定的,例如用户可以第三方安全防护软件获取服务器上的最新的白名单标识,对本地的白名单标识集合进行更新;也可以是用户在用户终端的白名单设置界面添加的等等。The whitelist identification set may be determined by the user terminal based on a security policy. For example, the user terminal is based on a security policy. After the authorized application opens the specified application permissions, the authorized application runs in the sandbox to monitor the authorization Whether the activity process of the application leaks user privacy; it can be determined based on third-party security protection software, for example, users can obtain the latest whitelist identifier on the server by the third-party security protection software, and update the local whitelist identifier set; also It can be added by the user on the whitelist setting interface of the user terminal, etc.
具体的,用户终端基于获取到的所述授权应用的应用标识,调用用户终端线程池中的线程对所述白名单标识集合中的应用标识进行匹配计算,当匹配到在所述白名单标识集合中存在所述应用标识时,将所述授权应用确定为白名单应用;当匹配到在所述白名单标识集合中不存在所述应用标识时,将所述授权应用确定为风险应用,所述风险应用可以理解为所诉授权应用存在泄漏用户隐私的风险。Specifically, based on the obtained application identifiers of the authorized applications, the user terminal invokes threads in the user terminal thread pool to perform matching calculations on the application identifiers in the whitelist identifier set, and when the match is found in the whitelist identifier set When the application identifier exists in the application identifier, the authorized application is determined as a whitelist application; when it is matched that the application identifier does not exist in the whitelist identifier set, the authorized application is determined as a risk application, and Risky applications can be understood as the risk of leaking user privacy in the authorized application in question.
步骤103:若在所述白名单标识集合中不存在所述应用标识时,则基于预设提示规则输出提示信息。Step 103: If the application identifier does not exist in the whitelist identifier set, output prompt information based on a preset prompt rule.
所述预设提示规则是指用户终端预先设置的提示方式,所述预设提示规则通常可以是以图片、文字、音频等方式展示指定应用权限对应的指定应用开启的提示信息。所述指定应用在本实施例中可以理解为涉及到用户隐私及信息安全的应用权限对应的应用。所述指定应用可以是相机、定位、通讯录、麦克风等。The preset prompt rule refers to a prompt manner preset by the user terminal, and the preset prompt rule may usually display the prompt information of the specified application opening corresponding to the specified application permission in the form of pictures, text, audio, etc. In this embodiment, the designated application can be understood as an application corresponding to an application permission related to user privacy and information security. The specified application may be a camera, positioning, address book, microphone, etc.
具体的,用户终端监听到授权应用开启指定应用权限,所述指定应用权限包括但不限于定位权限、开启麦克风访问权限、开启摄像头权限、读取通讯录权限等等,获取所述授权应用的应用标识,通过判断,在所述白名单标识集合中不存在所述应用标识,将所述授权应用确定为风险应用,用户终端在屏幕的显示区域弹出提示框并显示指定应用权限对应的指定应用已开启的信息。Specifically, the user terminal monitors that an authorized application opens designated application permissions, and the designated application permissions include, but are not limited to, location permissions, microphone access permissions, camera permissions, address book reading permissions, etc., and the application of the authorized application is obtained Identification, by judging that the application identification does not exist in the whitelist identification set, the authorized application is determined to be a risk application, and the user terminal pops up a prompt box in the display area of the screen and displays the specified application permission corresponding to the specified application authority. Information opened.
例如:如图2c所示,当用户在使用“新闻应用”应用时,选择一个新闻选项进行浏览。所述新闻的界面示意图如图2c所示,在这个过程中,用户在选择这个新闻跳转到新闻界面的过程中,触发并开启涉及用户隐私的指定应用权限-读取用户通讯录信息的应用权限,用户终端的监测机制监测到所述授权应用开启指定应用权限-读取用户通讯录信息的应用权限。然后获取所述“新闻”应用的应用标识,经用户终端匹配,发现所述白名单标识集合中不存在所述应用标识,用户终端在屏幕的显示区域弹出如图3a所示的提示框并显示“请注意,正在读取通讯录”的提示信息。For example: as shown in Figure 2c, when the user is using the "news application" application, select a news option to browse. The interface diagram of the news is shown in Figure 2c. In this process, when the user selects this news and jumps to the news interface, the user triggers and opens the designated application permission related to user privacy-the application to read user address book information Permission, the monitoring mechanism of the user terminal detects that the authorized application opens the designated application permission-the application permission to read the user address book information. Then obtain the application identifier of the "news" application. After the user terminal matches, it is found that the application identifier does not exist in the whitelist identifier set. The user terminal pops up a prompt box as shown in Figure 3a in the display area of the screen and displays "Please note that the address book is being read."
可选的,用户终端输出提示信息的方式可以是在当前显示界面加载相应的文字提醒通知,例如,如图3b所示,当所述应用权限集合中包含指定应用权限-定位权限时,用户终端在屏幕显示区域的通知栏上推送“请注意,当前定位已开启”的提示信息,所述用户终端还可以在通知栏上向用户提供基于所述提示信息的相关操作,所述相关操作可以理解为用户可以通过点击图3c所示的“操作”按钮,选择忽视所述提示信息或关闭所述“定位”应用等。Optionally, the way for the user terminal to output the prompt information may be to load a corresponding text reminder notification on the current display interface. For example, as shown in Figure 3b, when the application permission set includes the specified application permission-location permission, the user terminal Push the prompt message "Please note that the current positioning is enabled" on the notification bar in the screen display area. The user terminal can also provide the user with related operations based on the prompt information on the notification bar, and the related operations are understandable The user can choose to ignore the prompt information or close the "location" application by clicking the "operation" button shown in FIG. 3c.
可选的,用户终端输出提示信息的方式可以是以语音的形式输出的,例如:用户终端可以语音播报“当前指定应用(麦克风、前置摄像头、定位等)已开启”;可以是以震动的形式,例如:用户终端可以调用内部的震动马达以特定的震动频率进行提示;还可以是调用用户终端上的呼吸灯、闪光灯、补光灯等形式。Optionally, the way for the user terminal to output the prompt information can be in the form of voice output, for example: the user terminal can voice broadcast "the current designated application (microphone, front camera, positioning, etc.) is enabled"; it can be vibration For example, the user terminal can call the internal vibration motor to prompt with a specific vibration frequency; it can also call the breathing light, flashing light, and fill light on the user terminal.
需要说明的是,用户终端输出指定应用开启提示信息的方式有多种,可以是上述的一种或多种,此处不作具体限定。It should be noted that there are many ways for the user terminal to output the prompt information for starting the specified application, which may be one or more of the above, which is not specifically limited here.
在本申请实施例中,当用户终端监听到授权应用开启指定应用权限时,获取该授权应用的应用标识,并判断在白名单标识集合中是否存在该应用标识,若存在,则基于预设提示规则输出提示信息。通过基于应用标识对授权应用的风险性进行判断,当确定该授权应用为风险应用时,及时向用户输出提示信息,可以降低用户隐私泄露的风险,进而提高用户的信息安全。In the embodiment of this application, when the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set, and if so, based on a preset prompt The rule outputs prompt information. By judging the risk of an authorized application based on the application identifier, when the authorized application is determined to be a risky application, prompting information is output to the user in a timely manner, which can reduce the risk of user privacy leakage and thereby improve the user's information security.
请参见图4,图4是本申请提出的一种应用监控方法的另一种实施例的流程示意图。具体的:Please refer to FIG. 4, which is a schematic flowchart of another embodiment of an application monitoring method proposed in this application. specific:
步骤201:当监听到授权应用开启相机访问权限时,获取所述授权应用的应用标识。Step 201: When it is monitored that an authorized application opens the camera access permission, obtain the application identification of the authorized application.
所述相机访问权限可以理解为当授权应用通过相机拍摄当前环境的照片时,需要对所述授权应用授予相机访问权限。The camera access permission can be understood as when the authorized application takes a photo of the current environment through the camera, the camera access permission needs to be granted to the authorized application.
具体的,用户终端具有授权应用监测机制,当用户终端运行至少一个授权应用时,所述授权应用监测机制可以建立对授予所述相机访问权限的授权应用的监测,通过监听相机访问权限对应的指定应用在用户终端系统的框架层的应用接口(API)是否被调用,来监测授予相机访问权限的所述至少一个授权应用开启或调用相机访问权限的状态,当用户在使用所述至少一个授权应用的过程中触发所述授权应用开启相机访问权限时,例如用户在使用授权应用的过程中需要开启相机访问权限,对二维码、小程序码、条形码等进行扫描识别或开启相机进行拍照及录像等。用户终端的授权应用监测机制即检测到相机应用在用户终端系统的框架层的应用接口(API)被调用,此时所述授权应用监测机制向用户终端反馈所述授权应用开启相机访问权限的通知,然后获取所述授权应用的应用标识。Specifically, the user terminal has an authorized application monitoring mechanism. When the user terminal runs at least one authorized application, the authorized application monitoring mechanism can establish monitoring of the authorized application that grants the camera access permission, by monitoring the specified camera access permission. Whether the application interface (API) of the framework layer of the user terminal system is invoked to monitor the state of the at least one authorized application that grants camera access permission to open or invoke the camera access permission, when the user is using the at least one authorized application In the process of triggering the authorization application to enable the camera access permission, for example, the user needs to enable the camera access permission in the process of using the authorized application, scan and recognize the QR code, applet code, barcode, etc., or turn on the camera to take pictures and videos Wait. The authorized application monitoring mechanism of the user terminal detects that the application interface (API) of the camera application in the framework layer of the user terminal system is called. At this time, the authorized application monitoring mechanism feeds back the notification to the user terminal that the authorized application opens the camera access permission , And then obtain the application identifier of the authorized application.
例如,以用户终端为手机、用户终端系统为Android系统为例,用户开启手机上的授权应用-购物应用,用户通过该购物应用浏览需要购买的商品,该购物软件在用户不知情的情况下,触发了开启相机访问权限,通过开启相机访 问权限开启相机,在这个过程会调用Android系统的Framework框架层的所述CameraService的接口来使用所述相机应用,手机的授权应用监测机制通过监听该接口,此时监听到所述授权应用-购物应用开启相机访问权限,然后获取购物应用的应用标识。For example, if the user terminal is a mobile phone and the user terminal system is an Android system, the user opens an authorized application on the mobile phone-a shopping application, and the user browses the goods that need to be purchased through the shopping application. The shopping software is used without the user's knowledge. The camera access permission is activated, and the camera is turned on by enabling the camera access permission. In this process, the CameraService interface of the Framework layer of the Android system is called to use the camera application. The authorized application monitoring mechanism of the mobile phone monitors this interface. At this time, it is monitored that the authorized application-shopping application opens the camera access permission, and then the application identification of the shopping application is obtained.
具体获取所述授权应用的应用标识可参见具体步骤101,此处不再赘述。For details on obtaining the application identifier of the authorized application, please refer to specific step 101, which will not be repeated here.
步骤202:判断在白名单标识集合中是否存在所述应用标识。Step 202: Determine whether the application identifier exists in the whitelist identifier set.
具体可参见步骤102,此处不再赘述。For details, refer to step 102, which will not be repeated here.
步骤203:若在所述白名单标识集合中不存在所述应用标识时,闪烁指示灯。Step 203: If the application identifier does not exist in the whitelist identifier set, flash an indicator light.
所述指示灯可以理解为所述用户终端上的呼吸灯、闪光灯、补光灯等发光器件,用户终端可以通过调用所述指示灯对应的程序接口,控制指示灯的闪烁。The indicator light may be understood as a light-emitting device such as a breathing light, a flashlight, and a fill light on the user terminal, and the user terminal can control the blinking of the indicator light by calling the program interface corresponding to the indicator light.
具体的,用户终端监听到授权应用开启相机访问权限获取所述授权应用的应用标识,通过判断,在所述白名单标识集合中不存在所述应用标识,将所述授权应用确定为风险应用,然后对所述指示灯进行配置,以闪烁指示灯的方式提示用户当前授权应用已开启相机。Specifically, the user terminal monitors that an authorized application opens the camera access permission to obtain the application identifier of the authorized application, and through judgment, the application identifier does not exist in the whitelist identifier set, and the authorized application is determined as a risk application, Then the indicator light is configured to remind the user that the current authorized application has turned on the camera by means of flashing the indicator light.
具体的,用户终端对所述指示灯进行配置具体通过对各颜色灯光在用户终端系统内核上的提示灯节点相关参数进行配置,所述相关参数包含提示灯的电平状态、提示灯的亮度值、提示灯闪烁频率等。Specifically, the user terminal configures the indicator light by configuring the relevant parameters of the reminder light node of each color light on the user terminal system kernel. The relevant parameters include the level state of the reminder light and the brightness value of the reminder light. , Reminder light flashing frequency, etc.
需要说明的是,节点是指在用户终端的系统驱动程序中一个位置,对于安卓系统来说可以通过有root权限的文件管理器看到该位置,在该位置写入数据可以方便Android系统的Framework框架层的应用访问底层驱动程序,然后控制硬件即指示灯。It should be noted that the node refers to a location in the system driver of the user terminal. For the Android system, the location can be seen through a file manager with root permissions. Writing data in this location can facilitate the Framework of the Android system. The application of the framework layer accesses the underlying driver, and then controls the hardware that is the indicator light.
具体的,用户终端首先获取所述第一颜色灯光的第一初始电平状态以及第一初始亮度值,并获取所述第二颜色灯光的第二初始电平状态以及第二初始亮度值。Specifically, the user terminal first obtains the first initial level state and the first initial brightness value of the first color light, and obtains the second initial level state and the second initial brightness value of the second color light.
其中,所述第一颜色光及第二颜色光在用户终端的系统内核中的节点对应有初始电平状态及相应的初始亮度值。所述第一颜色光及第二颜色光可以是常见颜色光(如红色、橙色、桃红色、绿色、蓝色,紫色、和黄色等)的某一种,例如第一颜色光可以是红色灯光、第二颜色灯光可以是绿色灯光。所述初始电 平状态可以理解为高电平状态和低电平状态,通常高电平状态代表闪烁、低电平状态代表停止闪烁。所述初始亮度值是指灯光初始状态时对应的物理量,用来表征发光体(指示灯)表面发光强度的物理量,通常所述初始亮度值的取值范围在0到255之间,初始亮度值越大说明该颜色灯光的亮度越高。Wherein, the nodes of the first color light and the second color light in the system kernel of the user terminal correspond to an initial level state and a corresponding initial brightness value. The first color light and the second color light may be one of common color lights (such as red, orange, peach, green, blue, purple, and yellow, etc.), for example, the first color light may be red light , The second color light can be green light. The initial level state can be understood as a high level state and a low level state. Generally, the high level state represents flickering and the low level state represents stop flickering. The initial brightness value refers to the physical quantity corresponding to the initial state of the light, which is used to characterize the physical quantity of the luminous intensity on the surface of the luminous body (indicator lamp). Generally, the initial brightness value ranges from 0 to 255. The initial brightness value The larger the light, the higher the brightness of the color.
在一种可行的实施方式中:以第一颜色光是红色灯光、第二颜色灯光是绿色灯光为例,用户终端可以通过read函数分别读取第一颜色灯光的第一初始电平状态以及第一初始亮度值、读取第二颜色灯光的第二初始电平状态以及第二初始亮度值,获取上述值之后并保存至相应的全局变量中。如:In a feasible implementation manner: taking the first color light as red light and the second color light as green light as an example, the user terminal can read the first initial level state and the second color light of the first color light through the read function. An initial brightness value, the second initial level state of the second color light and the second initial brightness value are read, and the above values are obtained and stored in the corresponding global variables. Such as:
通过read函数读取/sys/class/leds/red/breath的值,即第一颜色灯光-红色灯光的第一初始电平状态,并保存为Value1,通常第一颜色灯光初始状态为低电平状态,即Value1的值为0,此时第一颜色灯光处于停止闪烁状态。Read the value of /sys/class/leds/red/breath through the read function, that is, the first initial level state of the first color light-red light, and save it as Value1, usually the initial state of the first color light is low Status, that is, the value of Value1 is 0, and the first color light is in the state of stopping blinking.
通过read函数读取/sys/class/leds/red/brightness的值,即第一颜色灯光的第一初始亮度值,并保存为Value2;Read the value of /sys/class/leds/red/brightness through the read function, that is, the first initial brightness value of the first color light, and save it as Value2;
通过read函数读取/sys/class/leds/green/breath的值,即第二颜色灯光-绿色灯光的第二初始电平状态,并保存为Value3,通常第二颜色灯光初始状态为低电平状态,即Value3的值为0,此时第二颜色灯光处于停止闪烁状态。Read the value of /sys/class/leds/green/breath through the read function, that is, the second initial level state of the second color light-green light, and save it as Value3, usually the initial state of the second color light is low Status, that is, the value of Value3 is 0, and the second color light is in the state of stopping blinking.
通过read函数读取/sys/class/leds/green/brightness的值,即第二颜色灯光的第二初始亮度值,并保存为Value4中。Read the value of /sys/class/leds/green/brightness through the read function, that is, the second initial brightness value of the second color light, and save it as Value4.
然后用户终端可以通过write函数将所述第一颜色灯光设置为高电平状态且将所述指示灯中的第二颜色灯光设置为低电平状态时,即通过write函数将/sys/class/leds/red/breath的值设置为1,/sys/class/leds/green/breath的值设置为0。从而控制所述第一颜色灯光闪烁,并将所述第一颜色灯光的亮度值从所述第一初始亮度值开始逐渐增大,即通过write函数将/sys/class/leds/red/brightness的值从初始状态值累加至固定值,所述固定值小于255。Then the user terminal can use the write function to set the first color light to a high level state and set the second color light in the indicator light to a low level state, that is, to set /sys/class/ through the write function The value of leds/red/breath is set to 1, and the value of /sys/class/leds/green/breath is set to 0. So as to control the flickering of the first color light, and gradually increase the brightness value of the first color light from the first initial brightness value, that is, to change the value of /sys/class/leds/red/brightness through the write function The value is accumulated from the initial state value to a fixed value, which is less than 255.
最后用户终端可以通过write函数将所述第一颜色灯光设置为低电平状态且将所述第二颜色灯光设置为高电平状态时,即通过write函数将Value1的值设置为0,/sys/class/leds/red/breath的值设置为0,/sys/class/leds/green/breath的值设置为1,从而控制所述第二颜色灯光闪烁,并将所述第二颜色灯光的亮度值从所述第二初始亮度值开始逐渐增大,即通过write函数将 /sys/class/leds/green/brightness的值从初始状态值累加至固定值,所述固定值小于255,以实现指示灯双色闪烁。Finally, when the user terminal can use the write function to set the first color light to a low level state and the second color light to a high level state, that is, to set the value of Value1 to 0 through the write function, /sys The value of /class/leds/red/breath is set to 0, and the value of /sys/class/leds/green/breath is set to 1, so as to control the flickering of the second color light and change the brightness of the second color light The value gradually increases from the second initial brightness value, that is, the value of /sys/class/leds/green/brightness is accumulated from the initial state value to a fixed value through the write function, and the fixed value is less than 255 to achieve the indication The light flashes in two colors.
可选的,用户终端可以设置指示灯多色或单色闪烁,还可以设置指示灯的闪烁频率,例如可以设置绿灯的闪烁频率,即通过read函数读取/sys/class/led/green/delay_on和/sys/class/led/green/delay_off的初始值,通过write函数重新设置绿灯的闪烁频率。Optionally, the user terminal can set multi-color or single-color flashing of the indicator light, and also set the flashing frequency of the indicator light. For example, you can set the flashing frequency of the green light, that is, read /sys/class/led/green/delay_on through the read function. And the initial value of /sys/class/led/green/delay_off, reset the flashing frequency of the green light through the write function.
在一种可行的实施方式中,用户终端提示灯闪烁的方式可以是基于用户输入的选择指令设置的,用户终端向用户提供提示灯闪烁设置界面,用户可以在用户终端的设置界面中选择相应的提示灯闪烁设置选项,从而确定提示灯的工作方式。In a feasible implementation manner, the way of flashing the reminder light of the user terminal can be set based on the selection instruction input by the user. The user terminal provides the user with a flashing setting interface for the reminder light, and the user can select the corresponding one in the setting interface of the user terminal. The reminder light flashes setting options to determine how the reminder light works.
例如:用户可以在用户终端的设置界面中选择提示灯设置选项,然后用户终端在屏幕显示区域显示如图5a所示的界面,图5a所示的界面中显示有“麦克风开启提示”、“摄像头开启提示”、“电话本调用提示”、“统一设置”等提示灯设置选项,用户如果需要对所述授权应用开启相机访问权限之后提示灯的工作方式进行设置,此时,用户可以点击“摄像头开启提示”选项,触发用户终端显示供选择的提示灯相关选项的界面,所述界面可以是如图5b所示的界面,用户可以在所述界面上设置提示灯颜色、提示灯闪烁频率、提示灯渐变时长、提示灯初始亮度值等选项,用户通过这些选项可以具体设置提示灯颜色、闪烁频率等。在完成对所述授权应用开启相机访问权限之后提示灯的工作方式设置之后,就可以触发用户终端将所述授权应用开启相机访问权限与提示灯的工作方式的对应关系存储至本地,并进行相应设置,当检测到所述授权应用的应用标识不在白名单标识集合时,即确定所述授权应用为风险应用,基于所述对应关系,闪烁指示灯,向用户提示所述相机访问权限对应的相机已开启。For example, the user can select the prompt light setting option in the setting interface of the user terminal, and then the user terminal displays the interface shown in Figure 5a in the screen display area, and the interface shown in Figure 5a displays "microphone on prompt" and "camera Turn on reminder, “Phonebook call reminder”, “Unified settings” and other reminder light setting options. If the user needs to set the working mode of the reminder after the authorized application turns on the camera access permission, the user can click on “Camera Enable the prompt" option to trigger the user terminal to display an interface for selecting the prompt light-related options. The interface may be the interface shown in Figure 5b. The user can set the prompt light color, flashing frequency, and prompt on the interface. Options such as the light gradual change time and the initial brightness value of the reminder light, and the user can specifically set the color of the reminder light, flashing frequency, etc. through these options. After completing the setting of the working mode of the prompt light after turning on the camera access permission for the authorized application, the user terminal can be triggered to store the correspondence between the authorized application turning on the camera access permission and the working mode of the prompt light locally, and perform corresponding Setting, when it is detected that the application identifier of the authorized application is not in the whitelist identifier set, it is determined that the authorized application is a risk application, and based on the corresponding relationship, the indicator light flashes to prompt the user of the camera corresponding to the camera access permission Turned on.
步骤204:接收针对所述相机访问权限对应的指定应用输入的关闭指令,将所述指示灯恢复至初始状态。Step 204: Receive a shutdown instruction input for the designated application corresponding to the camera access authority, and restore the indicator light to the initial state.
具体的,用户终端通过闪烁指示灯,向用户提示所述相机访问权限对应的相机已开启之后,用户可以选择是否关闭所述相机访问权限对应的指定应用-相机应用。当用户根据所述提示信息选择关闭所述相机应用时,可以向用户终端输入相机应用关闭指令,用户终端接收并响应所述相机应用关闭指令,将所 述相机应用设置为关闭状态,并将所述指示灯恢复至初始状态,即将所述指示灯关闭。Specifically, after the user terminal prompts the user that the camera corresponding to the camera access permission is turned on by flashing the indicator light, the user can choose whether to close the designated application corresponding to the camera access permission—the camera application. When the user chooses to close the camera application according to the prompt information, a camera application close instruction can be input to the user terminal. The user terminal receives and responds to the camera application close instruction, sets the camera application to the closed state, and sets all The indicator light returns to the initial state, that is, the indicator light is turned off.
具体的,所述相机应用关闭指令可以是用户在用户终端的屏幕显示区域通过选中设置选项中的应用管理找到所述第三方应用,然后选中所述第三方应用的开启进程管理,从所述第三方应用的开启的所有进程中中找到所述相机应用对应的相机进程,最后选择关闭的方式向所述用户终端输入的。Specifically, the camera application shutdown instruction may be that the user finds the third-party application by selecting the application management in the setting option in the screen display area of the user terminal, and then selects the startup process management of the third-party application, from the first The camera process corresponding to the camera application is found among all the processes of opening the third-party application, and finally, the input is input to the user terminal in a closed manner.
可选的,所述相机应用关闭指令可以是用户终端在屏幕显示区域的状态栏提供相机应用关闭选项,用户通过选中相机关闭的按钮输入的;可以是用户终端检测到用户关闭所述授权应用的相机访问权限触发的关闭所述当前相机应用;可以是用户通过语音输入关闭指定应用-相机应用的指令;可以是用户通过摄像头采集手势控制指令输入的指定应用-相机应用的指令;可以是用户通过按压指定的物理按键(开关机键、音量键等)输入的指定应用-相机应用的指令等等。Optionally, the camera application closing instruction may be that the user terminal provides a camera application closing option in the status bar of the screen display area, and the user inputs by selecting the camera shutdown button; it may be the user terminal detecting that the user closes the authorized application The closing of the current camera application triggered by camera access rights; it can be an instruction from the user to close the specified application-camera application through voice input; it can be an instruction from the specified application-camera application that the user collects gesture control instructions input through the camera; Press the designated physical key (power on/off key, volume key, etc.) to input the designated application-camera application instruction, etc.
具体的,用户终端通过将所述第一颜色灯光调整至所述第一初始电平状态以及所述第一初始亮度值,并将所述第二颜色灯光调整至所述第二初始电平状态以及所述第二初始亮度值,以使所述所述指示灯恢复至初始状态,即将所述指示灯关闭。Specifically, the user terminal adjusts the first color light to the first initial level state and the first initial brightness value, and adjusts the second color light to the second initial level state And the second initial brightness value, so that the indicator light returns to the initial state, that is, the indicator light is turned off.
以上述以第一颜色光是红色灯光、第二颜色灯光是绿色灯光为例,用户终端通过write函数设置/sys/class/leds/red/brightness的值为Value1,即将所述第一颜色灯光-红光调整至所述第一初始电平状态;Taking the above example that the first color light is red light and the second color light is green light as an example, the user terminal sets the value of /sys/class/leds/red/brightness to Value1 through the write function, that is, the first color light- Adjusting the red light to the first initial level state;
通过write函数设置/sys/class/leds/red/brightness的值为Value2,即所述第一颜色灯光-红光调整至第一初始亮度值;Set the value of /sys/class/leds/red/brightness to Value2 through the write function, that is, the first color light-red light is adjusted to the first initial brightness value;
通过write函数设置/sys/class/leds/green/brightness的值为Value3,即将所述第二颜色灯光-绿光调整至所述第二初始电平状态;Set the value of /sys/class/leds/green/brightness to Value3 through the write function, that is, adjust the second color light-green light to the second initial level state;
通过write函数设置/sys/class/leds/green/brightness的值为Value4,即所述第二颜色灯光-绿光调整至第二初始亮度值。The value of /sys/class/leds/green/brightness is set to Value4 through the write function, that is, the second color light-green light is adjusted to the second initial brightness value.
在完成上述设置之后,所提示灯恢复至初始状态,即将所述指示灯关闭。After completing the above settings, the prompt light returns to the initial state, that is, the indicator light is turned off.
在一种可行的实施方式中,用户终端具有自动检测功能。当用户终端向用户以闪烁指示灯的方式向用户提示相机应用开启时,用户终端在指定时间内未 接收到针对所述相机访问权限对应的指定应用输入的关闭指令,用户终端开启自动检测功能,即检测用户当前是否使用相机应用。所述检测可以是基于相机应用开启时的行为特征来检测的,所述行为特征可以是用户终端授权应用开启或调用相机应用之后,显示界面会显示相机的成像界面,若当前显示界面未显示当前成像界面,用户终端将所述相集开启的后台进程关闭;所述行为特征可以是用户终端在开启相机应用时,用户会对所述相机应用进行操作(例如对焦、调整曝光等),当未检测到所述操作时,用户终端将所述相机开启的后台进程关闭;所述行为特征可以是当用户终端显示界面因为故障导致触摸显示屏失灵,用户可能会频繁按压物理按钮(开关机键、返回键、home键等),此时用户终端检测到所述频繁按压物理按钮操作时,将所述相机开启的后台进程关闭等等。In a feasible implementation manner, the user terminal has an automatic detection function. When the user terminal prompts the user to start the camera application by flashing an indicator light, the user terminal does not receive a close instruction input for the designated application corresponding to the camera access permission within a specified time, and the user terminal turns on the automatic detection function, That is to detect whether the user is currently using the camera application. The detection may be based on the behavior characteristics when the camera application is started. The behavior characteristics may be that after the user terminal authorizes the application to start or invoke the camera application, the display interface will display the imaging interface of the camera. If the current display interface does not display the current In the imaging interface, the user terminal closes the background process of opening the photo gallery; the behavior feature may be that when the user terminal starts the camera application, the user will operate the camera application (for example, focus, adjust exposure, etc.), When the operation is detected, the user terminal closes the background process that the camera is turned on; the behavior characteristic may be that when the user terminal display interface malfunctions due to a malfunction, the user may frequently press the physical buttons (power on/off key, Back button, home button, etc.), at this time, when the user terminal detects the frequent pressing of the physical button operation, the background process that the camera is turned on is turned off, etc.
在本申请实施例中,当用户终端监听到授权应用开启指定应用权限时,获取该授权应用的应用标识,并判断在白名单标识集合中是否存在该应用标识,若存在,则基于预设提示规则输出提示信息。通过基于应用标识对授权应用的风险性进行判断,当确定该授权应用为风险应用时,及时向用户输出提示信息,可以降低用户隐私泄露的风险,进而提高用户的信息安全。In the embodiment of this application, when the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set, and if so, based on a preset prompt The rule outputs prompt information. By judging the risk of an authorized application based on the application identifier, when the authorized application is determined to be a risky application, prompting information is output to the user in a timely manner, which can reduce the risk of user privacy leakage and thereby improve the user's information security.
下述为本申请装置实施例,可以用于执行本申请方法实施例。对于本申请装置实施例中未披露的细节,请参照本申请方法实施例。The following are device embodiments of this application, which can be used to implement the method embodiments of this application. For details not disclosed in the device embodiment of this application, please refer to the method embodiment of this application.
请参见图6,其示出了本申请一个示例性实施例提供的定位装置的结构示意图。该定位装置可以通过软件、硬件或者两者的结合实现成为终端的全部或一部分。该装置1包括应用标识获取模块11、应用标识判断模块12和提示信息输出模块13。Please refer to FIG. 6, which shows a schematic structural diagram of a positioning device provided by an exemplary embodiment of the present application. The positioning device can be implemented as all or a part of the terminal through software, hardware or a combination of the two. The device 1 includes an application identification acquisition module 11, an application identification judgment module 12, and a prompt information output module 13.
应用标识获取模块11,用于当监听到授权应用开启指定应用权限时,获取所述授权应用的应用标识;The application identification obtaining module 11 is configured to obtain the application identification of the authorized application when it is monitored that the authorized application opens the specified application permission;
应用标识判断模块12,用于判断在白名单标识集合中是否存在所述应用标识;The application identification judgment module 12 is used to judge whether the application identification exists in the whitelist identification set;
提示信息输出模块13,用于若在所述白名单标识集合中不存在所述应用标识时,则基于预设提示规则输出提示信息。The prompt information output module 13 is configured to output prompt information based on a preset prompt rule if the application identifier does not exist in the whitelist identifier set.
可选的,如图8所示,所述装置1还包括:Optionally, as shown in FIG. 8, the device 1 further includes:
应用标识获取模块14,用于当监听到应用程序开启时,获取所述应用程序的应用标识;The application identification acquiring module 14 is used to acquire the application identification of the application when the application is monitored to be started;
第三方应用确定模块15,用于当所述应用标识与系统应用标识不一致时,将所述应用程序确定为第三方应用。The third-party application determining module 15 is configured to determine the application as a third-party application when the application identifier is inconsistent with the system application identifier.
可选的,当所述指定应用权限为相机访问权限时,所述提示信息输出模块,具体用于:Optionally, when the designated application permission is the camera access permission, the prompt information output module is specifically used for:
闪烁指示灯。Flashing indicator.
可选的,如图7所示,所述提示信息输出模块13,还包括:Optionally, as shown in FIG. 7, the prompt information output module 13 further includes:
第一控制单元132,用于将所述指示灯中的第一颜色灯光设置为高电平状态且将所述指示灯中的第二颜色灯光设置为低电平状态时,控制所述第一颜色灯光闪烁;The first control unit 132 is configured to control the first color light in the indicator light to a high level state and the second color light in the indicator light to a low level state. Color lights flicker;
第二控制单元133,用于将所述第一颜色灯光设置为低电平状态且将所述第二颜色灯光设置为高电平状态时,控制所述第二颜色灯光闪烁。The second control unit 133 is configured to control the flickering of the second color light when the first color light is set to a low level state and the second color light is set to a high level state.
可选的,如图7所示,所述提示信息输出模块13,还包括:Optionally, as shown in FIG. 7, the prompt information output module 13 further includes:
初始状态获取单元131,用于获取所述第一颜色灯光的第一初始电平状态以及第一初始亮度值,并获取所述第二颜色灯光的第二初始电平状态以及第二初始亮度值。The initial state acquiring unit 131 is configured to acquire the first initial level state and the first initial brightness value of the first color light, and acquire the second initial level state and the second initial brightness value of the second color light .
可选的,如图7所示,所述第一控制单元132,具体用于:Optionally, as shown in FIG. 7, the first control unit 132 is specifically configured to:
控制所述第一颜色灯光闪烁并将所述第一颜色灯光的亮度值从所述第一初始亮度值开始逐渐增大;Controlling the flickering of the first color light and gradually increasing the brightness value of the first color light from the first initial brightness value;
所述第二控制单元133,具体用于:The second control unit 133 is specifically configured to:
控制所述第二颜色灯光闪烁并将所述第二颜色灯光的亮度值从所述第二初始亮度值开始逐渐增大。Controlling the flickering of the second color light and gradually increasing the brightness value of the second color light from the second initial brightness value.
可选的,如图8所示,所述装置,还包括:Optionally, as shown in FIG. 8, the device further includes:
提示信息关闭模块14,用于接收针对所述指定应用权限对应的指定应用输入的关闭指令,关闭所述提示信息。The prompt information closing module 14 is configured to receive a closing instruction input for the designated application corresponding to the designated application permission, and close the prompt information.
可选的,所述提示信息关闭模块,具体用于:Optionally, the prompt information closing module is specifically used for:
将所述指示灯恢复至初始状态。Restore the indicator light to the initial state.
可选的,所述提示信息输出模块13,具体用于:Optionally, the prompt information output module 13 is specifically used for:
将所述第一颜色灯光调整至所述第一初始电平状态以及所述第一初始亮度值,并将所述第二颜色灯光调整至所述第二初始电平状态以及所述第二初始亮度值。Adjust the first color light to the first initial level state and the first initial brightness value, and adjust the second color light to the second initial level state and the second initial Brightness value.
需要说明的是,上述实施例提供的应用监控装置在执行应用监控方法时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的应用监控装置与应用监控方法实施例属于同一构思,其体现实现过程详见方法实施例,这里不再赘述。It should be noted that when the application monitoring device provided in the above embodiment executes the application monitoring method, only the division of the above functional modules is used as an example for illustration. In actual applications, the above functions can be allocated by different functional modules as needed. , Divide the internal structure of the device into different functional modules to complete all or part of the functions described above. In addition, the application monitoring device and the application monitoring method embodiments provided by the above embodiments belong to the same concept, and the implementation process is detailed in the method embodiments, which will not be repeated here.
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the foregoing embodiments of the present application are for description only, and do not represent the superiority of the embodiments.
在本申请实施例中,当用户终端监听到授权应用开启指定应用权限时,获取该授权应用的应用标识,并判断在白名单标识集合中是否存在该应用标识,若存在,则基于预设提示规则输出提示信息。通过基于应用标识对授权应用的风险性进行判断,当确定该授权应用为风险应用时,及时向用户输出提示信息,可以降低用户隐私泄露的风险,进而提高用户的信息安全。In the embodiment of this application, when the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set, and if so, based on a preset prompt The rule outputs prompt information. By judging the risk of an authorized application based on the application identifier, when the authorized application is determined to be a risky application, prompting information is output to the user in a timely manner, which can reduce the risk of user privacy leakage and thereby improve the user's information security.
本申请实施例还提供了一种计算机存储介质,所述计算机存储介质可以存储有多条指令,所述指令适于由处理器加载并执行如上述图1-图5b所示实施例的所述应用监控方法,具体执行过程可以参见图1-图5b所示实施例的具体说明,在此不进行赘述。The embodiment of the present application also provides a computer storage medium. The computer storage medium may store a plurality of instructions, and the instructions are suitable for being loaded by a processor and executed as described in the embodiment shown in FIG. 1 to FIG. 5b. For the application monitoring method, the specific execution process can refer to the specific description of the embodiment shown in FIG. 1 to FIG. 5b, which is not repeated here.
本申请还提供了一种计算机程序产品,该计算机程序产品存储有至少一条指令,所述至少一条指令由所述处理器加载并执行如上述图1-图5b所示实施例的所述应用监控方法,具体执行过程可以参见图1-图5b所示实施例的具体说明,在此不进行赘述。The present application also provides a computer program product that stores at least one instruction, and the at least one instruction is loaded by the processor and executed by the application monitoring of the embodiment shown in the above-mentioned FIG. 1 to FIG. 5b. For the specific execution process of the method, refer to the specific description of the embodiment shown in FIG. 1 to FIG. 5b, which will not be repeated here.
请参见图9,为本申请实施例提供了一种电子设备的结构示意图。如图9所示,所述服务器1000可以包括:至少一个处理器1001,至少一个网络接口 1004,用户接口1003,存储器1005,至少一个通信总线1002。Please refer to FIG. 9, which provides a schematic structural diagram of an electronic device according to an embodiment of this application. As shown in FIG. 9, the server 1000 may include: at least one processor 1001, at least one network interface 1004, a user interface 1003, a memory 1005, and at least one communication bus 1002.
其中,通信总线1002用于实现这些组件之间的连接通信。Among them, the communication bus 1002 is used to implement connection and communication between these components.
其中,用户接口1003可以包括显示屏(Display)、摄像头(Camera),可选用户接口1003还可以包括标准的有线接口、无线接口。The user interface 1003 may include a display screen (Display) and a camera (Camera), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
其中,网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。Among them, the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
其中,处理器1001可以包括一个或者多个处理核心。处理器1001利用各种借口和线路连接整个服务器1000内的各个部分,通过运行或执行存储在存储器1005内的指令、程序、代码集或指令集,以及调用存储在存储器1005内的数据,执行服务器1000的各种功能和处理数据。可选的,处理器1001可以采用数字信号处理(Digital Signal Processing,DSP)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、可编程逻辑阵列(Programmable Logic Array,PLA)中的至少一种硬件形式来实现。处理器1001可集成中央处理器(Central Processing Unit,CPU)、图像处理器(Graphics Processing Unit,GPU)和调制解调器等中的一种或几种的组合。其中,CPU主要处理操作系统、用户界面和应用程序等;GPU用于负责显示屏所需要显示的内容的渲染和绘制;调制解调器用于处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器1001中,单独通过一块芯片进行实现。The processor 1001 may include one or more processing cores. The processor 1001 uses various excuses and lines to connect various parts of the entire server 1000, and executes the server by running or executing instructions, programs, code sets, or instruction sets stored in the memory 1005, and calling data stored in the memory 1005. Various functions and processing data of 1000. Optionally, the processor 1001 may adopt at least one of digital signal processing (Digital Signal Processing, DSP), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), and Programmable Logic Array (Programmable Logic Array, PLA). A kind of hardware form to realize. The processor 1001 may integrate one or a combination of a central processing unit (CPU), a graphics processing unit (GPU), a modem, and the like. Among them, the CPU mainly processes the operating system, user interface, and application programs; the GPU is used to render and draw the content that the display needs to display; the modem is used to process wireless communication. It is understandable that the above-mentioned modem may not be integrated into the processor 1001, but may be implemented by a chip alone.
其中,存储器1005可以包括随机存储器(Random Access Memory,RAM),也可以包括只读存储器(Read-Only Memory)。可选的,该存储器1005包括非瞬时性计算机可读介质(non-transitory computer-readable storage medium)。存储器1005可用于存储指令、程序、代码、代码集或指令集。存储器1005可包括存储程序区和存储数据区,其中,存储程序区可存储用于实现操作系统的指令、用于至少一个功能的指令(比如触控功能、声音播放功能、图像播放功能等)、用于实现上述各个方法实施例的指令等;存储数据区可存储上面各个方法实施例中涉及到的数据等。存储器1005可选的还可以是至少一个位于远离前述处理器1001的存储装置。如图9所示,作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及应用监控应用程序。The memory 1005 may include random access memory (RAM) or read-only memory (Read-Only Memory). Optionally, the memory 1005 includes a non-transitory computer-readable storage medium. The memory 1005 may be used to store instructions, programs, codes, code sets or instruction sets. The memory 1005 may include a storage program area and a storage data area, where the storage program area may store instructions for implementing the operating system and instructions for at least one function (such as touch function, sound playback function, image playback function, etc.), Instructions used to implement the foregoing method embodiments, etc.; the storage data area can store the data involved in the foregoing method embodiments. Optionally, the memory 1005 may also be at least one storage device located far away from the foregoing processor 1001. As shown in FIG. 9, the memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and an application monitoring application program.
在图10所示的服务器1000中,用户接口1003主要用于为用户提供输入的接口,获取用户输入的数据;而处理器1001可以用于调用存储器1005中存储的应用监控应用程序,并具体执行以下操作:In the server 1000 shown in FIG. 10, the user interface 1003 is mainly used to provide an input interface for the user to obtain data input by the user; and the processor 1001 may be used to call the application monitoring application stored in the memory 1005 and execute The following operations:
当监听到授权应用开启指定应用权限时,获取所述授权应用的应用标识;When it is monitored that an authorized application opens the specified application permission, acquiring the application identifier of the authorized application;
判断在白名单标识集合中是否存在所述应用标识;Determine whether the application identifier exists in the whitelist identifier set;
若在所述白名单标识集合中不存在所述应用标识时,则基于预设提示规则输出提示信息。If the application identifier does not exist in the whitelist identifier set, prompt information is output based on a preset prompt rule.
在一个实施例中,当所述指定应用权限为相机访问权限时,所述处理器1001在执行所述基于预设提示规则输出提示信息,具体执行以下操作:In one embodiment, when the specified application permission is the camera access permission, the processor 1001 executes the output prompt information based on the preset prompt rule, and specifically performs the following operations:
闪烁指示灯。Flashing indicator.
在一个实施例中,所述处理器1001在执行所述闪烁指示灯,具体执行以下操作:In an embodiment, the processor 1001 is executing the blinking indicator light, and specifically executes the following operations:
将所述指示灯中的第一颜色灯光设置为高电平状态且将所述指示灯中的第二颜色灯光设置为低电平状态时,控制所述第一颜色灯光闪烁;When the first color light in the indicator light is set to a high level state and the second color light in the indicator light is set to a low level state, controlling the first color light to flash;
将所述第一颜色灯光设置为低电平状态且将所述第二颜色灯光设置为高电平状态时,控制所述第二颜色灯光闪烁。When the first color light is set to a low level state and the second color light is set to a high level state, the second color light is controlled to flicker.
在一个实施例中,所述处理器1001在所述将所述指示灯中的第一颜色灯光设置为高电平且将所述指示灯中的第二颜色灯光设置为低电平时,控制所述第一颜色灯光闪烁之前,具体执行以下操作:In one embodiment, when the processor 1001 sets the first color light in the indicator light to a high level and sets the second color light in the indicator light to a low level, the processor 1001 controls the Before the first color light flashes, perform the following operations:
获取所述第一颜色灯光的第一初始电平状态以及第一初始亮度值,并获取所述第二颜色灯光的第二初始电平状态以及第二初始亮度值。Acquire a first initial level state and a first initial brightness value of the first color light, and acquire a second initial level state and a second initial brightness value of the second color light.
在一个实施例中,所述处理器1001在执行所述控制所述第一颜色灯光闪烁,具体执行以下操作:In an embodiment, the processor 1001 is performing the controlling the flickering of the first color light, and specifically performs the following operations:
控制所述第一颜色灯光闪烁并将所述第一颜色灯光的亮度值从所述第一初始亮度值开始逐渐增大;Controlling the flickering of the first color light and gradually increasing the brightness value of the first color light from the first initial brightness value;
所述控制所述第二颜色灯光闪烁,包括:The controlling the flashing of the second color light includes:
控制所述第二颜色灯光闪烁并将所述第二颜色灯光的亮度值从所述第二初始亮度值开始逐渐增大。Controlling the flickering of the second color light and gradually increasing the brightness value of the second color light from the second initial brightness value.
在一个实施例中,所述处理器1001在执行所述基于预设提示规则输出提示信息之后,还执行以下操作:In an embodiment, the processor 1001 further performs the following operations after executing the output of prompt information based on the preset prompt rule:
接收针对所述指定应用权限对应的指定应用输入的关闭指令,关闭所述提示信息。Receive a close instruction input for the designated application corresponding to the designated application permission, and close the prompt message.
在一个实施例中,所述处理器1001在执行所述关闭所述提示信息,具体执行以下操作:In one embodiment, when the processor 1001 executes the closing of the prompt information, it specifically executes the following operations:
将所述指示灯恢复至初始状态。Restore the indicator light to the initial state.
在一个实施例中,所述处理器1001在执行所述将所述指示灯恢复至初始状态时,具体执行以下操作:In an embodiment, the processor 1001 specifically performs the following operations when performing the restoration of the indicator light to the initial state:
将所述第一颜色灯光调整至所述第一初始电平状态以及所述第一初始亮度值,并将所述第二颜色灯光调整至所述第二初始电平状态以及所述第二初始亮度值。Adjust the first color light to the first initial level state and the first initial brightness value, and adjust the second color light to the second initial level state and the second initial Brightness value.
在本实施例中,当用户终端监听到授权应用开启指定应用权限时,获取该授权应用的应用标识,并判断在白名单标识集合中是否存在该应用标识,若存在,则基于预设提示规则输出提示信息。通过基于应用标识对授权应用的风险性进行判断,当确定该授权应用为风险应用时,及时向用户输出提示信息,可以降低用户隐私泄露的风险,进而提高用户的信息安全。In this embodiment, when the user terminal monitors that an authorized application opens the specified application permission, it obtains the application identifier of the authorized application, and determines whether the application identifier exists in the whitelist identifier set, and if so, based on preset prompt rules Output prompt information. By judging the risk of an authorized application based on the application identifier, when the authorized application is determined to be a risky application, prompting information is output to the user in a timely manner, which can reduce the risk of user privacy leakage and thereby improve the user's information security.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体或随机存储记忆体等。A person of ordinary skill in the art can understand that all or part of the processes in the above-mentioned embodiment methods can be implemented by instructing relevant hardware through a computer program. The program can be stored in a computer readable storage medium. During execution, it may include the procedures of the above-mentioned method embodiments. Wherein, the storage medium can be a magnetic disk, an optical disc, a read-only storage memory or a random storage memory, etc.
以上所揭露的仅为本申请较佳实施例而已,当然不能以此来限定本申请之权利范围,因此依本申请权利要求所作的等同变化,仍属本申请所涵盖的范围。The above-disclosed are only the preferred embodiments of the application, which of course cannot be used to limit the scope of rights of the application. Therefore, equivalent changes made according to the claims of the application still fall within the scope of the application.

Claims (18)

  1. 一种应用监控方法,其特征在于,所述方法包括:An application monitoring method, characterized in that the method includes:
    当监听到授权应用开启指定应用权限时,获取所述授权应用的应用标识;When it is monitored that an authorized application opens the specified application permission, acquiring the application identifier of the authorized application;
    判断在白名单标识集合中是否存在所述应用标识;Determine whether the application identifier exists in the whitelist identifier set;
    若在所述白名单标识集合中不存在所述应用标识时,则基于预设提示规则输出提示信息。If the application identifier does not exist in the whitelist identifier set, prompt information is output based on a preset prompt rule.
  2. 根据权利要求1所述的应用监控方法,其特征在于,当所述指定应用权限为相机访问权限时,所述基于预设提示规则输出提示信息,包括:The application monitoring method according to claim 1, wherein when the designated application permission is camera access permission, the outputting prompt information based on a preset prompt rule comprises:
    闪烁指示灯。Flashing indicator.
  3. 根据权利要求2所述的应用监控方法,其特征在于,所述闪烁指示灯,包括:The application monitoring method according to claim 2, wherein the flashing indicator light comprises:
    将所述指示灯中的第一颜色灯光设置为高电平状态且将所述指示灯中的第二颜色灯光设置为低电平状态时,控制所述第一颜色灯光闪烁;When the first color light in the indicator light is set to a high level state and the second color light in the indicator light is set to a low level state, controlling the first color light to flash;
    将所述第一颜色灯光设置为低电平状态且将所述第二颜色灯光设置为高电平状态时,控制所述第二颜色灯光闪烁。When the first color light is set to a low level state and the second color light is set to a high level state, the second color light is controlled to flicker.
  4. 根据权利要求3所述的方法,其特征在于,所述将所述指示灯中的第一颜色灯光设置为高电平且将所述指示灯中的第二颜色灯光设置为低电平时,控制所述第一颜色灯光闪烁之前,还包括:The method of claim 3, wherein when the first color light in the indicator light is set to a high level and the second color light in the indicator light is set to a low level, the control Before the first color light flashes, it also includes:
    获取所述第一颜色灯光的第一初始电平状态以及第一初始亮度值,并获取所述第二颜色灯光的第二初始电平状态以及第二初始亮度值。Acquire a first initial level state and a first initial brightness value of the first color light, and acquire a second initial level state and a second initial brightness value of the second color light.
  5. 根据权利要求4所述的方法,其特征在于,所述控制所述第一颜色灯光闪烁,包括:The method according to claim 4, wherein the controlling the flickering of the first color light comprises:
    控制所述第一颜色灯光闪烁并将所述第一颜色灯光的亮度值从所述第一初始亮度值开始逐渐增大;Controlling the flickering of the first color light and gradually increasing the brightness value of the first color light from the first initial brightness value;
    所述控制所述第二颜色灯光闪烁,包括:The controlling the flashing of the second color light includes:
    控制所述第二颜色灯光闪烁并将所述第二颜色灯光的亮度值从所述第二初始亮度值开始逐渐增大。Controlling the flickering of the second color light and gradually increasing the brightness value of the second color light from the second initial brightness value.
  6. 根据权利要求4所述的方法,其特征在于,所述基于预设提示规则输出提示信息之后,还包括:The method according to claim 4, wherein after the prompt information is output based on a preset prompt rule, the method further comprises:
    接收针对所述指定应用权限对应的指定应用输入的关闭指令,关闭所述提示信息。Receive a close instruction input for the designated application corresponding to the designated application permission, and close the prompt message.
  7. 根据权利要求6所述的方法,其特征在于,所述关闭所述提示信息,包括:The method according to claim 6, wherein the closing the prompt information comprises:
    将所述指示灯恢复至初始状态。Restore the indicator light to the initial state.
  8. 根据权利要求7所述的方法,其特征在于,所述将所述指示灯恢复至初始状态,包括:The method according to claim 7, wherein said restoring said indicator light to an initial state comprises:
    将所述第一颜色灯光调整至所述第一初始电平状态以及所述第一初始亮度值,并将所述第二颜色灯光调整至所述第二初始电平状态以及所述第二初始亮度值。Adjust the first color light to the first initial level state and the first initial brightness value, and adjust the second color light to the second initial level state and the second initial Brightness value.
  9. 一种应用监控装置,其特征在于,所述装置包括:An application monitoring device, characterized in that the device includes:
    应用标识获取模块,用于当监听到授权应用开启指定应用权限时,获取所述授权应用的应用标识;The application identification obtaining module is configured to obtain the application identification of the authorized application when it is monitored that the authorized application has opened the specified application permission;
    应用标识判断模块,用于判断在白名单标识集合中是否存在所述应用标识;The application identification judgment module is used to judge whether the application identification exists in the whitelist identification set;
    提示信息输出模块,用于若在所述白名单标识集合中不存在所述应用标识时,则基于预设提示规则输出提示信息。The prompt information output module is configured to output prompt information based on preset prompt rules if the application identifier does not exist in the whitelist identifier set.
  10. 根据权利要求9所述的应用监控装置,其特征在于,当所述指定应用权限为相机访问权限时,所述提示信息输出模块,具体用于:The application monitoring device according to claim 9, wherein when the designated application permission is camera access permission, the prompt information output module is specifically configured to:
    闪烁指示灯。Flashing indicator.
  11. 根据权利要求10所述的应用监控装置,其特征在于,所述提示信息输出模块,包括:The application monitoring device according to claim 10, wherein the prompt information output module comprises:
    第一控制单元,用于将所述指示灯中的第一颜色灯光设置为高电平状态且将所述指示灯中的第二颜色灯光设置为低电平状态时,控制所述第一颜色灯光闪烁;The first control unit is configured to control the first color when the first color light in the indicator light is set to a high level state and the second color light in the indicator light is set to a low level state Lights flicker
    第二控制单元,用于将所述第一颜色灯光设置为低电平状态且将所述第二颜色灯光设置为高电平状态时,控制所述第二颜色灯光闪烁。The second control unit is configured to control the flashing of the second color light when the first color light is set to a low level state and the second color light is set to a high level state.
  12. 根据权利要求11所述的应用监控装置,其特征在于,所述提示信息输出模块,还包括:The application monitoring device according to claim 11, wherein the prompt information output module further comprises:
    初始状态获取单元,用于获取所述第一颜色灯光的第一初始电平状态以及第一初始亮度值,并获取所述第二颜色灯光的第二初始电平状态以及第二初始亮度值。The initial state acquiring unit is configured to acquire the first initial level state and the first initial brightness value of the first color light, and acquire the second initial level state and the second initial brightness value of the second color light.
  13. 根据权利要求12所述的应用监控装置,其特征在于,所述第一控制单元,具体用于:The application monitoring device according to claim 12, wherein the first control unit is specifically configured to:
    控制所述第一颜色灯光闪烁并将所述第一颜色灯光的亮度值从所述第一初始亮度值开始逐渐增大;Controlling the flickering of the first color light and gradually increasing the brightness value of the first color light from the first initial brightness value;
    所述第二控制单元,具体用于:The second control unit is specifically configured to:
    控制所述第二颜色灯光闪烁并将所述第二颜色灯光的亮度值从所述第二初始亮度值开始逐渐增大。Controlling the flickering of the second color light and gradually increasing the brightness value of the second color light from the second initial brightness value.
  14. 根据权利要求12所述的应用监控装置,其特征在于,所述装置还包括:The application monitoring device according to claim 12, wherein the device further comprises:
    提示信息关闭模块,用于接收针对所述指定应用权限对应的指定应用输入的关闭指令,关闭所述提示信息。The prompt information closing module is configured to receive a closing instruction input for the specified application corresponding to the specified application permission, and close the prompt information.
  15. 根据权利要求14所述的应用监控装置,其特征在于,所述提示信息 关闭模块,具体用于:The application monitoring device according to claim 14, wherein the prompt information closing module is specifically configured to:
    将所述指示灯恢复至初始状态。Restore the indicator light to the initial state.
  16. 根据权利要求15所述的应用监控装置,其特征在于,所述提示信息输出模块,具体用于:The application monitoring device according to claim 15, wherein the prompt information output module is specifically configured to:
    将所述第一颜色灯光调整至所述第一初始电平状态以及所述第一初始亮度值,并将所述第二颜色灯光调整至所述第二初始电平状态以及所述第二初始亮度值。Adjust the first color light to the first initial level state and the first initial brightness value, and adjust the second color light to the second initial level state and the second initial Brightness value.
  17. 一种计算机存储介质,其特征在于,所述计算机存储介质存储有多条指令,所述指令适于由处理器加载并执行如权利要求1~8任意一项的所述的应用监控方法。A computer storage medium, wherein the computer storage medium stores a plurality of instructions, and the instructions are suitable for being loaded by a processor and executing the application monitoring method according to any one of claims 1-8.
  18. 一种电子设备,其特征在于,包括:处理器和存储器;其中,所述存储器存储有计算机程序,所述计算机程序适于由所述处理器加载并执行如权利要求1~8任意一项的所述的应用监控方法。An electronic device, characterized by comprising: a processor and a memory; wherein the memory stores a computer program, and the computer program is adapted to be loaded by the processor and executed as claimed in any one of claims 1 to 8. The application monitoring method.
PCT/CN2019/099169 2019-08-05 2019-08-05 Application monitoring method and apparatus, and storage medium and electronic device WO2021022433A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2019/099169 WO2021022433A1 (en) 2019-08-05 2019-08-05 Application monitoring method and apparatus, and storage medium and electronic device
CN201980098995.0A CN114175026A (en) 2019-08-05 2019-08-05 Application monitoring method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/099169 WO2021022433A1 (en) 2019-08-05 2019-08-05 Application monitoring method and apparatus, and storage medium and electronic device

Publications (1)

Publication Number Publication Date
WO2021022433A1 true WO2021022433A1 (en) 2021-02-11

Family

ID=74502521

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/099169 WO2021022433A1 (en) 2019-08-05 2019-08-05 Application monitoring method and apparatus, and storage medium and electronic device

Country Status (2)

Country Link
CN (1) CN114175026A (en)
WO (1) WO2021022433A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779546A (en) * 2021-06-01 2021-12-10 武汉深之度科技有限公司 Recording permission management method, computing device and storage medium
CN113935014A (en) * 2021-10-14 2022-01-14 北京鲸鲮信息系统技术有限公司 Method and device for controlling starting of equipment node, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105487857A (en) * 2015-11-24 2016-04-13 小米科技有限责任公司 Method and apparatus for prompting image shooting part to be started
CN107622203A (en) * 2017-09-30 2018-01-23 广东欧珀移动通信有限公司 Guard method, device, storage medium and the electronic equipment of sensitive information
CN107729764A (en) * 2017-09-30 2018-02-23 广东欧珀移动通信有限公司 Guard method, device, storage medium and the electronic equipment of sensitive information
CN109639884A (en) * 2018-11-21 2019-04-16 惠州Tcl移动通信有限公司 A kind of method, storage medium and terminal device based on Android monitoring sensitive permission
CN109697359A (en) * 2018-12-19 2019-04-30 惠州Tcl移动通信有限公司 A kind of message prompt method, device, storage medium and electronic equipment
WO2019080713A1 (en) * 2017-10-26 2019-05-02 Huawei Technologies Co., Ltd. Method and apparatus for managing hardware resource access in an electronic device
CN109918930A (en) * 2019-03-11 2019-06-21 维沃移动通信有限公司 A kind of information protecting method and terminal device
CN110336910A (en) * 2018-12-29 2019-10-15 华为技术有限公司 A kind of private data guard method and terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105487857A (en) * 2015-11-24 2016-04-13 小米科技有限责任公司 Method and apparatus for prompting image shooting part to be started
CN107622203A (en) * 2017-09-30 2018-01-23 广东欧珀移动通信有限公司 Guard method, device, storage medium and the electronic equipment of sensitive information
CN107729764A (en) * 2017-09-30 2018-02-23 广东欧珀移动通信有限公司 Guard method, device, storage medium and the electronic equipment of sensitive information
WO2019080713A1 (en) * 2017-10-26 2019-05-02 Huawei Technologies Co., Ltd. Method and apparatus for managing hardware resource access in an electronic device
CN109639884A (en) * 2018-11-21 2019-04-16 惠州Tcl移动通信有限公司 A kind of method, storage medium and terminal device based on Android monitoring sensitive permission
CN109697359A (en) * 2018-12-19 2019-04-30 惠州Tcl移动通信有限公司 A kind of message prompt method, device, storage medium and electronic equipment
CN110336910A (en) * 2018-12-29 2019-10-15 华为技术有限公司 A kind of private data guard method and terminal
CN109918930A (en) * 2019-03-11 2019-06-21 维沃移动通信有限公司 A kind of information protecting method and terminal device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779546A (en) * 2021-06-01 2021-12-10 武汉深之度科技有限公司 Recording permission management method, computing device and storage medium
CN113779546B (en) * 2021-06-01 2024-03-26 武汉深之度科技有限公司 Recording authority management method, computing device and storage medium
CN113935014A (en) * 2021-10-14 2022-01-14 北京鲸鲮信息系统技术有限公司 Method and device for controlling starting of equipment node, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114175026A (en) 2022-03-11

Similar Documents

Publication Publication Date Title
US10853979B2 (en) Electronic device and method for displaying screen thereof
KR102187255B1 (en) Display method of electronic apparatus and electronic appparatus thereof
KR102405752B1 (en) Method for controlling the permission of application program and electronic device
US9871330B2 (en) Waterproof key apparatus
WO2019095563A1 (en) Screen watermark display method and apparatus, computer device, and storage medium
KR102320151B1 (en) Electronic devcie for installing application and method for cotrolling thereof
US9848072B2 (en) Electronic device monitoring method and apparatus
WO2016061924A1 (en) Multi-screen sharing based application management method and device, and storage medium
US10095527B2 (en) Method for managing device and electronic device supporting the same
CN106484518B (en) Display method and device of multi-open application and terminal
US11176228B2 (en) Application interface display method, apparatus, and terminal, and storage medium
JP6858256B2 (en) Payment application separation methods and devices, as well as terminals
TWI540920B (en) Method for managing data traffic of software and portable electronic apparatus using the same
KR102337990B1 (en) Electronic Device Using Token for Setting Permission
US9904794B2 (en) Processing secure data
WO2021022433A1 (en) Application monitoring method and apparatus, and storage medium and electronic device
CN106484547A (en) A kind of management method, device and terminal for opening application more
US20180198872A1 (en) Method, system and device for providing service
EP3131267A1 (en) Electronic device and method for commonly using the same
KR102510846B1 (en) Electronic apparatus and controlling method thereof
EP3021250B1 (en) Electronic device and method for suggesting response manual in occurrence of denial
CN104318185A (en) Application control method, application control equipment and mobile terminal
WO2016109944A1 (en) Method for presenting information on lock screen interface, information processing apparatus, portable electronic device and graphical user interface on portable electronic device
CN110851057A (en) Method and device for configuring configuration options of BIOS
KR102333425B1 (en) Method and apparatus to sandbox run-time android applications with lightweight container

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19940696

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19940696

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 19940696

Country of ref document: EP

Kind code of ref document: A1