WO2024022310A1 - 一种设备安全处理方法及电子设备 - Google Patents

一种设备安全处理方法及电子设备 Download PDF

Info

Publication number
WO2024022310A1
WO2024022310A1 PCT/CN2023/109017 CN2023109017W WO2024022310A1 WO 2024022310 A1 WO2024022310 A1 WO 2024022310A1 CN 2023109017 W CN2023109017 W CN 2023109017W WO 2024022310 A1 WO2024022310 A1 WO 2024022310A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
security
user interface
user
existing
Prior art date
Application number
PCT/CN2023/109017
Other languages
English (en)
French (fr)
Inventor
李城权
戴雨珵
胡东华
夏该致
杨海龙
刘志伟
王代斌
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024022310A1 publication Critical patent/WO2024022310A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/67Risk-dependent, e.g. selecting a security level depending on risk profiles

Definitions

  • the present application relates to the technical field of security technology, and in particular to an equipment security processing method and electronic equipment.
  • This application provides a device security processing method and electronic device, which realizes that the local device can also receive user operations to relieve security risks on the local device or other interconnected devices, so as to improve the security of the local device or other interconnected devices. Ensure the normal use of the device and prevent user privacy leakage.
  • this application provides a device security processing system.
  • the system includes a first electronic device and a second electronic device, wherein the first electronic device is used to display a first user interface or a first prompt information, and the first user The interface displays security risk items for the second electronic device, the first prompt information is used to prompt the security risk items for the second electronic device, and the security risk items for the second electronic device are related to user privacy; the first electronic device The device is also used to receive the user's first operation for the first user interface or the first prompt information; the first operation is used to eliminate security risks existing on the second electronic device; the first electronic device is also used to receive After the first operation, the first instruction is sent to the second electronic device; the second electronic device is used to eliminate security risks existing on the second electronic device after receiving the first instruction.
  • the user can view the security risk items existing on the second electronic device on the first electronic device.
  • the first electronic device can accept the user's operation to eliminate security risks existing on the second electronic device, ensure the safety of the second electronic device, and prevent the second electronic device from operating on the second electronic device. user data leaked.
  • the first electronic device is further configured to stop displaying the security information existing on the second electronic device in the first user interface after sending the first instruction to the second electronic device. Risk matters, or stop displaying the first prompt message.
  • the first electronic device can stop displaying the security risk events existing on the second electronic device.
  • the second electronic device is also configured to send a second instruction to the first electronic device after eliminating security risks on the second electronic device; the first electronic device , and is also used to stop displaying the security risk items existing on the second electronic device in the first user interface after receiving the second instruction, or stop displaying the first prompt information.
  • the first electronic device can stop displaying the security risk event existing on the second electronic device.
  • the security risk items existing on the second electronic device include one or more items
  • the first operation is to eliminate the first item among the security risk items existing on the second electronic device.
  • the second electronic device is specifically configured to eliminate the first item existing on the second electronic device after receiving the first instruction.
  • the first electronic device can accept the user's elimination of security risk items existing on the second electronic device one by one.
  • the purpose of selectively eliminating one or more security risk matters existing on the second electronic device In order to achieve the purpose of selectively eliminating one or more security risk matters existing on the second electronic device.
  • the security risk items existing on the second electronic device include one or more items, and the first operation is to eliminate all the security risk items existing on the second electronic device. Operation; the second electronic device is specifically configured to eliminate all matters existing on the second electronic device after receiving the first instruction.
  • the first electronic device can receive the user's "one-click elimination" of all security risk items existing on the second electronic device, saving the user's operations and making it convenient and fast.
  • the first electronic device is further configured to display a second user interface before displaying the first user interface, and the second user interface includes device options of the first electronic device. and device options of the second electronic device, the device options of the first electronic device include the security level indicator of the first electronic device, and the device options of the second electronic device include the security level indicator of the second electronic device; security The level indicator is used to indicate the security status of the electronic device.
  • the security status includes any one of high risk, medium risk, low risk and no risk; the first electronic device is specifically used to receive and respond to the user's request in the second user interface.
  • a second operation of a device option of the second electronic device displays the first user interface.
  • the security level indicator of the first electronic device is different from the security level indicator of the second electronic device.
  • the first electronic device can display the safety status of the first electronic device and/or other devices, so that the user can monitor the safety status of the first electronic device and the second electronic device, and manage and control electronic devices with poor safety status.
  • the first electronic device is also configured to receive and respond to the user's third operation in the second user interface, and display a third user interface, and the third user interface displays Aiming at the security risk items existing on the first electronic device and the security risk items existing on the second electronic device; the first electronic device is also used to receive the fourth operation of the user on the third user interface; the fourth operation is used to eliminate the third user interface.
  • Security risk items on one electronic device and security risk items on the second electronic device; the first electronic device is also used to eliminate the security risk items on the first electronic device in response to the fourth operation, and report the security risk items to the third electronic device.
  • the second electronic device sends the third command; the second electronic device is also used to eliminate security risks existing on the second electronic device after receiving the third command.
  • the user can operate on the first electronic device to eliminate security risks common to the first electronic device and the second electronic device one by one. For example, if application one and application two coexist on the first electronic device and the second electronic device, and application one and application two are bad applications, the user can operate on the first electronic device to "uninstall" the first electronic device and the second electronic device with one click. Application of coexistence of two electronic devices 1.
  • the first electronic device can also receive a user operation to "one-click uninstall" the second application that coexists with the first electronic device and the second electronic device.
  • the user can operate "one click" on the first electronic device to eliminate all security risk matters common to the first electronic device and the second electronic device. For example, if application one and application two coexist on the first electronic device and the second electronic device, and application one and application two are bad applications, the user can operate on the first electronic device to "uninstall" the first electronic device and the second electronic device with one click. Two electronic devices coexist Application One and Application Two, and the operation is simple.
  • the first electronic device is specifically configured to: after receiving the first operation, display second prompt information, the second prompt information includes the first control, and the second prompt The information is used to prompt whether to eliminate security risks existing on the second electronic device; receiving and responding to the fifth operation for the first control, sending the first instruction to the second electronic device.
  • the first electronic device can display prompt information to avoid misoperation by the user.
  • the prompt information can also be displayed on the second electronic device.
  • the second electronic device is also configured to send a second instruction to the first electronic device after eliminating security risks on the second electronic device; the first electronic device , and is also used to display a third prompt message after receiving the second instruction.
  • the third prompt message includes the second control, and the third prompt message is used to prompt whether to cancel the elimination of security risks existing on the second electronic device;
  • An electronic device specifically configured to: after receiving and responding to the sixth operation on the second control, confirm the elimination of security risks existing on the second electronic device.
  • the first electronic device can display prompt information to inform the user of the operations performed by the second electronic device, and can provide the user with the option to cancel the operation performed by the second electronic device. Options for the action to be performed.
  • the prompt information can also be displayed on the second electronic device.
  • eliminating security risks existing on the second electronic device includes enabling security functions supported by the second electronic device and eliminating security risks generated by the second electronic device within the first period of time. Event, implement security protection recommendations for the second electronic device.
  • this application provides a device security processing method.
  • the method includes: the first electronic device displays a first user interface or a first prompt message, and the first user interface displays information about security risks existing on the second electronic device. Matters, the first prompt information is used to prompt the existence of security risk matters on the second electronic device, and the existence of security risk matters on the second electronic device is related to user privacy; the first electronic device receives the user's response to the first user interface or to the first prompt information The first operation; the first operation is used to eliminate security risks existing on the second electronic device; after receiving the first operation, the first electronic device sends a first instruction to the second electronic device, and the first instruction is used to instruct The second electronic device eliminates security risks existing on the second electronic device.
  • the user can view the security risk items existing on the second electronic device on the first electronic device.
  • the first electronic device can accept the user's operation to eliminate security risks existing on the second electronic device, ensuring The device security of the second electronic device prevents leakage of user data on the second electronic device.
  • the method further includes: the first electronic device stops displaying the second electronic device in the first user interface. existing security risks, or stop displaying the first prompt message.
  • the first electronic device can stop displaying the security risk events existing on the second electronic device.
  • the method further includes: the first electronic device receives the second instruction sent by the second electronic device, and the The second instruction is used to instruct the second electronic device to eliminate the security risks existing on the second electronic device; in response to the second instruction, the first electronic device stops displaying the security risks existing on the second electronic device in the first user interface. Risk matters, or stop displaying the first prompt message.
  • the first electronic device can stop displaying the security risk event existing on the second electronic device.
  • the security risk items existing on the second electronic device include one or more items
  • the first operation is to eliminate the first item among the security risk items existing on the second electronic device. operation.
  • the first electronic device can accept the user's elimination of security risk items existing on the second electronic device one by one.
  • the purpose of selectively eliminating one or more security risk matters existing on the second electronic device In order to achieve the purpose of selectively eliminating one or more security risk matters existing on the second electronic device.
  • the security risk items existing on the second electronic device include one or more items
  • the first operation is to eliminate all the security risk items existing on the second electronic device. operate.
  • the first electronic device can receive the user's "one-click elimination" of all security risk items existing on the second electronic device, saving the user's operations and making it convenient and fast.
  • the method before the first electronic device displays the first user interface, the method further includes: the first electronic device displays a second user interface, and the second user interface includes the first electronic device.
  • the device options of the device and the device options of the second electronic device, the device options of the first electronic device include the security level indicator of the first electronic device, and the device options of the second electronic device include the security level of the second electronic device.
  • the security level indicator is used to indicate the security status of the electronic device, and the security status includes any one of high risk, medium risk, low risk and no risk;
  • the first electronic device displays the first user interface, specifically including: An electronic device receives and responds to the user's second operation on the device option of the second electronic device in the second user interface, and displays the first user interface.
  • the security level indicator of the first electronic device is different from the security level indicator of the second electronic device.
  • the first electronic device can display the safety status of the first electronic device and/or other devices, so that the user can monitor the safety status of the first electronic device and the second electronic device, and manage and control electronic devices with poor safety status.
  • the method further includes: the first electronic device receives and responds to the user For the third operation in the second user interface, a third user interface is displayed, and the third user interface displays security risk matters existing on the first electronic device and security risk matters existing on the second electronic device; the first electronic device The device receives a fourth operation from the user on the third user interface; the fourth operation is used to eliminate security risk matters on the first electronic device and security risk matters existing on the second electronic device; in response to the fourth operation, the first electronic device The device eliminates the security risk items existing on the first electronic device and sends a third instruction to the second electronic device; the third instruction is used to instruct the second electronic device to eliminate the security risk items existing on the second electronic device.
  • the user can operate on the first electronic device to eliminate security risks common to the first electronic device and the second electronic device one by one. For example, if application one and application two coexist on the first electronic device and the second electronic device, and application one and application two are bad applications, the user can operate on the first electronic device to "uninstall" the first electronic device and the second electronic device with one click. Application of coexistence of two electronic devices 1.
  • the first electronic device can also receive a user operation to "one-click uninstall" the second application that coexists with the first electronic device and the second electronic device.
  • the user can operate "one click" on the first electronic device to eliminate all security risk matters common to the first electronic device and the second electronic device. For example, if application one and application two coexist on the first electronic device and the second electronic device, and application one and application two are bad applications, the user can operate on the first electronic device to "uninstall" the first electronic device and the second electronic device with one click. Two electronic devices coexist Application One and Application Two, and the operation is simple.
  • the first electronic device after receiving the first operation, sends the first instruction to the second electronic device, specifically including: after receiving the first operation, the first electronic device The device displays second prompt information, the second prompt information includes the first control, and the second prompt information is used to prompt whether to eliminate security risks existing on the second electronic device; the first electronic device receives and responds to the first control.
  • the fifth operation is to send the first instruction to the second electronic device.
  • the first electronic device can display prompt information to avoid misoperation by the user.
  • the prompt information can also be displayed on the second electronic device.
  • the method further includes: the first electronic device receives the second instruction sent by the second electronic device, and the The second instruction is used to indicate that the second electronic device has eliminated the security risks existing on the second electronic device; after receiving the second instruction, the first electronic device displays the third prompt information, and the third prompt information includes the second control, The third prompt information is used to prompt whether to cancel the elimination of security risks existing on the second electronic device; after receiving and responding to the sixth operation for the second control, the first electronic device confirms the elimination of the security risks existing on the second electronic device. matter.
  • the first electronic device can display prompt information to inform the user of the operations that the second electronic device has performed, and can provide the user with information to cancel the operations that the second electronic device has performed. Options for the action to be performed.
  • the prompt information can also be displayed on the second electronic device.
  • eliminating security risks existing on the second electronic device includes enabling security functions supported by the second electronic device and eliminating security risks generated by the second electronic device within the first period of time. Event, implement security protection recommendations for the second electronic device.
  • this application provides an electronic device, which is a first electronic device.
  • the first electronic device includes: one or more processors, one or more memories; one or more memories and one or more processors Coupled, one or more memories are used to store computer program codes, the computer program codes include computer instructions, and one or more processors call the computer instructions to cause the first electronic device to execute any of the above aspects provided in any possible implementation manner A method for safe handling of equipment.
  • the present application provides a computer-readable storage medium for storing computer instructions.
  • the computer instructions When the computer instructions are run on a first electronic device, the first electronic device executes any possible implementation of any of the above aspects.
  • the present application provides a computer program product that, when run on a first electronic device, causes the first electronic device to execute a device security method provided in any possible implementation of any of the above aspects. Approach.
  • Figure 1 is a schematic diagram of a system architecture provided by an embodiment of the present application.
  • Figure 2 is a schematic diagram of a system architecture provided by an embodiment of the present application.
  • Figure 3 is a software structure block diagram of an electronic device 100 provided by an embodiment of the present application.
  • Figure 4A is a schematic diagram of the interaction of multiple functional modules on an electronic device 100 provided by an embodiment of the present application
  • Figure 4B is a schematic diagram of an electronic device 100 displaying prompt information provided by an embodiment of the present application.
  • Figure 4C is a schematic diagram of an electronic device 100 displaying a service card provided by an embodiment of the present application.
  • 5A to 5J are schematic diagrams showing that a set of electronic devices 100 according to an embodiment of the present application can display the device security status of one or more devices;
  • Figures 6A-6E are schematic diagrams of a set of electronic devices 100 provided by an embodiment of the present application showing the security status of a certain device;
  • 6F to 6J are schematic diagrams of a set of multiple security protection suggestions for the electronic device 200 provided by the embodiment of the present application.
  • Figures 6K-6N are schematic diagrams of a group of electronic devices 100 provided by an embodiment of the present application to receive user operations to "one-click elimination" of all security risks existing on the electronic devices 200;
  • 7A-7H are a set of schematic diagrams of viewing security events generated on the electronic device 200 within a certain period of time on the electronic device 100 provided by the embodiment of the present application;
  • Figure 8 is a schematic flowchart of a device security processing method provided by an embodiment of the present application.
  • first and second are used for descriptive purposes only and shall not be understood as implying or implying relative importance or implicitly specifying the referent. number of technical features shown. Therefore, the features defined as “first” and “second” may explicitly or implicitly include one or more of the features. In the description of the embodiments of this application, unless otherwise specified, “plurality” The meaning is two or more.
  • GUI graphical user interface
  • Security risks on electronic devices refer to risks in applications installed on electronic devices, or in certain information received on electronic devices. Some applications or certain information may steal users' personal data.
  • some applications can obtain call records, contact information, application usage data, account numbers and account passwords, property and other information stored on electronic devices, leading to the leakage of personal information.
  • certain information received on electronic devices may also steal users' personal data, leading to the leakage of personal information.
  • a text message application receives a spam text message
  • the server that sent the spam text message may steal the user's personal data on the electronic device, causing the user's personal information to be leaked.
  • the electronic device can score the safety factor of the electronic device based on factors such as the type and quantity of certain applications or certain information existing on the electronic device, the amount of acquired information, etc., as the safety status of the electronic device.
  • the security status of electronic equipment can be divided into different levels such as high risk, medium risk, low risk, and no risk.
  • the electronic device can also score the safety factor of the electronic device and obtain different scores, such as 100 points, such as 80 points, such as 60 points, and so on.
  • This score may correspond to the security status level of the above-mentioned electronic device.
  • the safety factor of a device is scored as 100 points, the safety status level of the corresponding device is risk-free.
  • the safety factor of a device is 70-100 points, the safety status level of the corresponding device is low risk.
  • the safety factor of the device is 50-70 points, the safety status level of the corresponding device is medium risk.
  • the safety factor score of a device is lower than 50 points, the safety status level of the corresponding device is high risk.
  • the safety factor score when the safety status of the electronic device is high risk is lower than the safety factor score when the safety status of the electronic device is medium risk.
  • the safety factor score when the safety status of the electronic device is medium risk is lower than the safety factor score when the safety status is low risk.
  • the safety factor score when the safety status of the electronic device is low risk is lower than the safety factor score when the safety status of the electronic device is no risk.
  • the security status of the electronic device can also be divided into more levels, or the security status of the electronic device can also be divided into levels different from the above. This application The embodiment does not limit this.
  • the electronic device can display different prompt information to prompt the user to improve the security status of the electronic device and avoid leakage of the user's personal information.
  • the electronic device can display the prompt message "Please optimize now".
  • the electronic device can display the prompt message "Please optimize in time”.
  • the electronic device can display a "recommended optimization” prompt message.
  • the electronic device can display a "good status" prompt message.
  • Security functions include but are not limited to: virus scanning function, harassing call interception function, WLAN security detection function, anti-counterfeiting base station detection function, pure mode activation function, secure input method activation function, verification code protection function, payment protection function, and device search function , lock screen password activation function, etc.
  • the virus scanning and killing function is used to detect whether the application installed on the electronic device is a virus application or whether it is a bad application.
  • the harassing call interception function is used to detect whether the incoming call number is a sales call or a scam or other harassment. If it is, refuse to answer it.
  • the WLAN security detection function is used to detect whether the nearby WLAN is a safe WLAN.
  • the anti-counterfeiting base station detection function is used to detect whether nearby base stations are safe base stations.
  • the pure mode turning on function is used to enable the electronic device to intercept automatically installed applications after turning on the pure mode function to avoid junk applications being installed without the user's knowledge.
  • the secure input method enablement function is used to enable the secure input method function on an electronic device.
  • the electronic device will automatically switch to a secure keyboard to avoid password leakage.
  • the verification code protection function is used to prevent some applications from obtaining the verification code after the verification code protection function is turned on on the electronic device.
  • the payment protection function is used to protect payment security after the electronic device turns on the payment protection function, such as prompting the user whether to continue payment when there is a risk.
  • the find device function is used to quickly locate and track the lost device after the find device function is turned on on the electronic device, and can receive user operations to remotely erase the data on the lost device to prevent the lost device from being deleted. of data breach.
  • the lock screen password activation function is used after the electronic device turns on the lock screen password activation function, after the electronic device turns off the screen, and after the electronic device turns on the screen again, the user is required to enter the lock screen password before entering the electronic device before locking the screen. user interface.
  • the security function on the electronic device may also include other functions, which are not limited in the embodiments of the present application.
  • the embodiment of this application provides a series of functions that display the security functions of local devices and other interconnected devices, the security status of the devices, security risks existing in the devices, and suggestions for eliminating device risks. This allows users to view the security status of the local device and other interconnected devices, the security functions on the local device and other interconnected devices, the security risks existing on the local device and other interconnected devices, and suggestions for eliminating device risks.
  • the local device can also receive user operations to eliminate security risks on the local device or other interconnected devices, so as to improve the security of the local device or other interconnected devices, ensure the normal use of the device, and prevent user privacy leaks.
  • Figure 1 is a schematic diagram of a system architecture provided by an embodiment of the present application.
  • the system may include multiple electronic devices.
  • the device types of the plurality of electronic devices may be of various types, and the embodiments of the present application do not specifically limit the specific types of the plurality of electronic devices.
  • the multiple electronic devices include mobile phones, and may also include tablet computers, desktop computers, laptop computers, handheld computers, notebook computers, smart screens, wearable devices, augmented reality (AR) devices, virtual Reality (VR) equipment, artificial intelligence (AI) equipment, cars, smart headsets, game consoles, and can also include Internet of things (IOT) equipment or smart home equipment such as smart water heaters, smart Lamps, smart air conditioners, etc.
  • multiple devices in the system 10 may also include non-portable terminal devices such as laptops with touch-sensitive surfaces or touch panels, desktop computers with touch-sensitive surfaces or touch panels, and the like.
  • the electronic device 100 has established communication connections with the electronic device 200 and the electronic device 300 respectively.
  • the electronic device 100 can not only display the electronic device 100's device security status, security capabilities and existing security risks on the electronic device 100.
  • Electronic device 100 can also display the device security status, security capabilities and existing security risks of electronic device 200 and electronic device 300 respectively.
  • the system may also include only one electronic device (for example, electronic device 100).
  • the electronic device 100 can demonstrate the security capabilities on the electronic device 100 as well as the security risks present.
  • the multiple electronic devices can be configured with different software operating systems (operating systems, OS), including but not limited to etc. in, For Huawei’s Hongmeng system.
  • OS software operating systems
  • the multiple electronic devices can also be configured with the same software operating system, for example
  • the multiple electronic devices can establish communication connections in any of the following ways.
  • Method 1 The multiple electronic devices can be connected to the same network.
  • the multiple electronic devices can be connected to the same local area network to establish a communication connection.
  • Method 2 The multiple electronic devices can also log in to the same system account and establish communication connections.
  • the system accounts logged in by the multiple electronic devices can all be "HW1234".
  • Method 3 The system accounts logged in on the multiple electronic devices can all belong to the same account group.
  • the system accounts logged in on the multiple electronic devices include "HW001", “HW002”, and “HW003”.
  • System accounts "HW001”, “HW002”, and “HW003” all belong to the account group "Huawei Home”.
  • Method 4 Multiple electronic devices can communicate through near field communication (NFC), Bluetooth (BT), wireless local area networks (WLAN), such as wireless fidelity point to point (Wireless fidelity point to point, Wi-Fi).
  • NFC near field communication
  • BT Bluetooth
  • WLAN wireless local area networks
  • -Fi Establish communication connections through P2P
  • infrared technology infrared, IR
  • Method 5 Multiple electronic devices can create a temporary account group by scanning the same QR code and establish a network connection to achieve communication.
  • the electronic device 100 is not limited to the above five methods, and the electronic device 100 can also establish communication connections through other methods, which are not limited in the embodiments of the present application.
  • Figure 2 shows a schematic diagram of the system architecture.
  • the electronic device 100 may be a mobile phone, a tablet computer, a desktop computer, a laptop computer, a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a cellular phone, a personal digital assistant (personal digital assistant) digital assistant (PDA), augmented reality (AR) device, virtual reality (VR) device, artificial intelligence (AI) device, wearable device, vehicle-mounted device, smart home device and/or Smart city equipment, the embodiment of this application does not place special restrictions on the specific type of electronic equipment.
  • PDA personal digital assistant
  • AR augmented reality
  • VR virtual reality
  • AI artificial intelligence
  • wearable device wearable device
  • vehicle-mounted device smart home device and/or Smart city equipment
  • the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2 , mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen 194, and Subscriber identification module (SIM) card interface 195, etc.
  • a processor 110 an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2 , mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display
  • the sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
  • the structure illustrated in the embodiment of the present invention does not constitute a specific limitation on the electronic device 100 .
  • the electronic device 100 may include more or fewer components than shown in the figures, or some components may be combined, some components may be separated, or some components may be arranged differently.
  • the components illustrated may be implemented in hardware, software, or a combination of software and hardware.
  • the processor 110 may include one or more processing units.
  • the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc.
  • application processor application processor, AP
  • modem processor graphics processing unit
  • GPU graphics processing unit
  • image signal processor image signal processor
  • ISP image signal processor
  • controller video codec
  • digital signal processor digital signal processor
  • DSP digital signal processor
  • baseband processor baseband processor
  • neural network processor neural-network processing unit
  • the controller can generate operation control signals based on the instruction operation code and timing signals to complete the control of fetching and executing instructions.
  • the processor 110 may also be provided with a memory for storing instructions and data.
  • the memory in processor 110 is cache memory. This memory may hold instructions or data that have been recently used or recycled by processor 110 . If the processor 110 needs to use the instructions or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 110 is reduced, thus improving the efficiency of the system.
  • processor 110 may include one or more interfaces.
  • Interfaces may include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous receiver and transmitter (universal asynchronous receiver/transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and /or universal serial bus (USB) interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • UART universal asynchronous receiver and transmitter
  • MIPI mobile industry processor interface
  • GPIO general-purpose input/output
  • SIM subscriber identity module
  • USB universal serial bus
  • the I2C interface is a bidirectional synchronous serial bus, including a serial data line (SDA) and a serial clock line (derail clock line, SCL).
  • processor 110 may include multiple sets of I2C buses.
  • the processor 110 can separately couple the touch sensor 180K, charger, flash, camera 193, etc. through different I2C bus interfaces.
  • the processor 110 can be coupled to the touch sensor 180K through an I2C interface, so that the processor 110 and the touch sensor 180K communicate through the I2C bus interface to implement the touch function of the electronic device 100 .
  • the I2S interface can be used for audio communication.
  • processor 110 may include multiple sets of I2S buses.
  • the processor 110 can be coupled with the audio module 170 through the I2S bus to implement communication between the processor 110 and the audio module 170 .
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface to implement the function of answering calls through a Bluetooth headset.
  • the PCM interface can also be used for audio communications to sample, quantize and encode analog signals.
  • the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface.
  • the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface to implement the function of answering calls through a Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
  • the UART interface is a universal serial data bus used for asynchronous communication.
  • the bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
  • a UART interface is generally used to connect the processor 110 and the wireless communication module 160 .
  • the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to implement the Bluetooth function.
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface to implement the function of playing music through a Bluetooth headset.
  • the MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 .
  • MIPI interfaces include camera serial interface (CSI), display serial interface (DSI), etc.
  • the processor 110 and the camera 193 communicate through the CSI interface to implement the shooting function of the electronic device 100 .
  • the processor 110 and the display screen 194 communicate through the DSI interface to implement the display function of the electronic device 100 .
  • the GPIO interface can be configured through software.
  • the GPIO interface can be configured as a control signal or as a data signal.
  • the GPIO interface can be used to connect the processor 110 with the camera 193, display screen 194, wireless communication module 160, audio module 170, sensor module 180, etc.
  • the GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
  • the USB interface 130 is an interface that complies with the USB standard specification, and may be a Mini USB interface, a Micro USB interface, a USB Type C interface, etc.
  • the USB interface 130 can be used to connect a charger to charge the electronic device 100, and can also be used to transmit data between the electronic device 100 and peripheral devices. It can also be used to connect headphones to play audio through them. This interface can also be used to connect other electronic devices, such as AR devices, etc.
  • the interface connection relationships between the modules illustrated in the embodiment of the present invention are only schematic illustrations and do not constitute a structural limitation of the electronic device 100 .
  • the electronic device 100 may also adopt different interface connection methods in the above embodiments, or a combination of multiple interface connection methods.
  • the charging management module 140 is used to receive charging input from the charger.
  • the charger can be a wireless charger or a wired charger.
  • the charging management module 140 may receive charging input from the wired charger through the USB interface 130 .
  • the charging management module 140 may receive wireless charging input through the wireless charging coil of the electronic device 100 . While the charging management module 140 charges the battery 142, it can also provide power to the electronic device through the power management module 141.
  • the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
  • the power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, the internal memory 121, the display screen 194, the camera 193, the wireless communication module 160, and the like.
  • the power management module 141 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters.
  • the power management module 141 may also be provided in the processor 110 .
  • the power management module 141 and the charging management module 140 may also be provided in the same device.
  • the wireless communication function of the electronic device 100 can be implemented through the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor and the baseband processor.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in electronic device 100 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization. For example: Antenna 1 can be reused as a diversity antenna for a wireless LAN. In other embodiments, antennas may be used in conjunction with tuning switches.
  • the mobile communication module 150 can provide solutions for wireless communication including 2G/3G/4G/5G applied on the electronic device 100 .
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), etc.
  • the mobile communication module 150 can receive electromagnetic waves through the antenna 1, perform filtering, amplification and other processing on the received electromagnetic waves, and transmit them to the modem processor for demodulation.
  • the mobile communication module 150 can also amplify the signal modulated by the modem processor and convert it into electromagnetic waves through the antenna 1 for radiation.
  • at least part of the functional modules of the mobile communication module 150 may be disposed in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided on the same device. middle.
  • a modem processor may include a modulator and a demodulator.
  • the modulator is used to modulate the low-frequency baseband signal to be sent into a medium-high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
  • the demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the application processor outputs sound signals through audio devices (not limited to speaker 170A, receiver 170B, etc.), or displays images or videos through display screen 194.
  • the modem processor may be a stand-alone device.
  • the modem processor may be independent of the processor 110 and may be provided in the same device as the mobile communication module 150 or other functional modules.
  • the wireless communication module 160 can provide applications on the electronic device 100 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), Bluetooth (bluetooth, BT), and global navigation satellites.
  • WLAN wireless local area networks
  • System global navigation satellite system, GNSS
  • frequency modulation frequency modulation, FM
  • near field communication technology near field communication, NFC
  • infrared technology infrared, IR
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110, frequency modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
  • the antenna 1 of the electronic device 100 is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi) -zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the electronic device 100 implements display functions through a GPU, a display screen 194, an application processor, and the like.
  • the GPU is an image processing microprocessor and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
  • the display screen 194 is used to display images, videos, etc.
  • Display 194 includes a display panel.
  • the display panel can use a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light emitting diode).
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • AMOLED organic light-emitting diode
  • FLED flexible light-emitting diode
  • Miniled MicroLed, Micro-oLed, quantum dot light emitting diode (QLED), etc.
  • the electronic device 100 may include 1 or N display screens 194, where N is a positive integer greater than 1.
  • the electronic device 100 can implement the shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
  • the ISP is used to process the data fed back by the camera 193. For example, when taking a photo, the shutter is opened, the light is transmitted to the camera sensor through the lens, the optical signal is converted into an electrical signal, and the camera sensor passes the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise and brightness. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 193.
  • Camera 193 is used to capture still images or video.
  • the object passes through the lens to produce an optical image that is projected onto the photosensitive element.
  • the photosensitive element can be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the optical signal into an electrical signal, and then passes the electrical signal to the ISP to convert it into a digital image signal.
  • ISP outputs digital image signals to DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other format image signals.
  • the electronic device 100 may include 1 or N cameras 193, where N is a positive integer greater than 1.
  • Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, When the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy.
  • Video codecs are used to compress or decompress digital video.
  • Electronic device 100 may support one or more video codecs. In this way, the electronic device 100 can play or record videos in multiple encoding formats, such as moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
  • MPEG moving picture experts group
  • MPEG2 MPEG2, MPEG3, MPEG4, etc.
  • NPU is a neural network (NN) computing processor.
  • NN neural network
  • Intelligent cognitive applications of the electronic device 100 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, etc.
  • the internal memory 121 may include one or more random access memories (RAM) and one or more non-volatile memories (NVM).
  • RAM random access memories
  • NVM non-volatile memories
  • Random access memory can include static random access memory (SRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (SDRAM), double data rate synchronous memory Dynamic random access memory (double data rate synchronous dynamic random access memory, DDR SDRAM, such as the fifth generation DDR SDRAM is generally called DDR5SDRAM), etc.;
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • DDR SDRAM double data rate synchronous dynamic random access memory
  • DDR SDRAM double data rate synchronous dynamic random access memory
  • DDR SDRAM double data rate synchronous dynamic random access memory
  • DDR5SDRAM double data rate synchronous dynamic random access memory
  • Non-volatile memory can include disk storage devices and flash memory.
  • Flash memory can be divided according to the operating principle to include NOR FLASH, NAND FLASH, 3D NAND FLASH, etc.
  • the storage unit potential level it can include single-level storage cells (single-level cell, SLC), multi-level storage cells (multi-level cell, MLC), third-level storage unit (triple-level cell, TLC), fourth-level storage unit (quad-level cell, QLC), etc., which can include universal flash storage (English: universal flash storage, UFS) according to storage specifications. , embedded multi media card (embedded multi media Card, eMMC), etc.
  • the random access memory can be directly read and written by the processor 110, can be used to store executable programs (such as machine instructions) of the operating system or other running programs, and can also be used to store user and application data, etc.
  • the non-volatile memory can also store executable programs and user and application program data, etc., and can be loaded into the random access memory in advance for direct reading and writing by the processor 110.
  • the external memory interface 120 can be used to connect an external non-volatile memory to expand the storage capacity of the electronic device 100 .
  • the external non-volatile memory communicates with the processor 110 through the external memory interface 120 to implement the data storage function. For example, save music, video and other files in external non-volatile memory.
  • the electronic device 100 can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playback, recording, etc.
  • the audio module 170 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signals. Audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be provided in the processor 110 , or some functional modules of the audio module 170 may be provided in the processor 110 .
  • Speaker 170A also called “speaker” is used to convert audio electrical signals into sound signals.
  • the electronic device 100 can listen to music through the speaker 170A, or listen to hands-free calls.
  • Receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
  • the electronic device 100 answers a call or a voice message, the voice can be heard by bringing the receiver 170B close to the human ear.
  • Microphone 170C also called “microphone” or “microphone” is used to convert sound signals into electrical signals. When making a call or sending a voice message, the user can speak close to the microphone 170C with the human mouth and input the sound signal to the microphone 170C.
  • the electronic device 100 may be provided with at least one microphone 170C. In other embodiments, the electronic device 100 may be provided with two microphones 170C, which in addition to collecting sound signals, may also implement a noise reduction function. In other embodiments, the electronic device 100 can also be provided with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions, etc.
  • the headphone interface 170D is used to connect wired headphones.
  • the headphone interface 170D may be a USB interface 130, or may be a 3.5mm open mobile terminal platform (OMTP) standard interface, or a Cellular Telecommunications Industry Association of the USA (CTIA) standard interface.
  • OMTP open mobile terminal platform
  • CTIA Cellular Telecommunications Industry Association of the USA
  • the pressure sensor 180A is used to sense pressure signals and can convert the pressure signals into electrical signals.
  • pressure sensor 180A may be disposed on display screen 194 .
  • pressure sensors 180A such as resistive pressure sensors, inductive pressure sensors, capacitive pressure sensors, etc.
  • a capacitive pressure sensor may include at least two parallel plates of conductive material.
  • touch operations acting on the same touch location but with different touch operation intensities may correspond to different operation instructions. For example: when a touch operation with a touch operation intensity less than the first pressure threshold is applied to the short message application icon, an instruction to view the short message is executed. When a touch operation with a touch operation intensity greater than or equal to the first pressure threshold is applied to the short message application icon, an instruction to create a new short message is executed.
  • the gyro sensor 180B may be used to determine the motion posture of the electronic device 100 .
  • the angular velocity of electronic device 100 about three axes may be determined by gyro sensor 180B.
  • the gyro sensor 180B can be used for image stabilization. For example, when the shutter is pressed, the gyro sensor 180B detects the angle at which the electronic device 100 shakes, calculates the distance that the lens module needs to compensate based on the angle, and allows the lens to offset the shake of the electronic device 100 through reverse movement to achieve anti-shake.
  • the gyro sensor 180B can also be used for navigation and somatosensory gaming scenarios.
  • Air pressure sensor 180C is used to measure air pressure. In some embodiments, the electronic device 100 calculates the altitude through the air pressure value measured by the air pressure sensor 180C to assist positioning and navigation.
  • Magnetic sensor 180D includes a Hall sensor.
  • the electronic device 100 may utilize the magnetic sensor 180D to detect opening and closing of the flip holster.
  • the electronic device 100 may detect the opening and closing of the flip according to the magnetic sensor 180D. Then, based on the detected opening and closing status of the leather case or the opening and closing status of the flip cover, features such as automatic unlocking of the flip cover are set.
  • the acceleration sensor 180E can detect the acceleration of the electronic device 100 in various directions (generally three axes). When the electronic device 100 is stationary, the magnitude and direction of gravity can be detected. It can also be used to identify the posture of electronic devices and be used in horizontal and vertical screen switching, pedometer and other applications.
  • Distance sensor 180F for measuring distance.
  • Electronic device 100 can measure distance via infrared or laser. In some embodiments, when shooting a scene, the electronic device 100 may utilize the distance sensor 180F to measure distance to achieve fast focusing.
  • Proximity light sensor 180G may include, for example, a light emitting diode (LED) and a light detector, such as a photodiode.
  • the light emitting diode may be an infrared light emitting diode.
  • the electronic device 100 emits infrared light outwardly through the light emitting diode.
  • Electronic device 100 uses photodiodes to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device 100 . When insufficient reflected light is detected, the electronic device 100 may determine that there is no object near the electronic device 100 .
  • the electronic device 100 can use the proximity light sensor 180G to detect when the user holds the electronic device 100 close to the ear for talking, so as to automatically turn off the screen to save power.
  • the proximity light sensor 180G can also be used in holster mode, and pocket mode automatically unlocks and locks the screen.
  • the ambient light sensor 180L is used to sense ambient light brightness.
  • the electronic device 100 can adaptively adjust the brightness of the display screen 194 according to the perceived ambient light brightness.
  • the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
  • the ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the electronic device 100 is in the pocket to prevent accidental touching.
  • Fingerprint sensor 180H is used to collect fingerprints.
  • the electronic device 100 can use the collected fingerprint characteristics to achieve fingerprint unlocking, access to application locks, fingerprint photography, fingerprint answering of incoming calls, etc.
  • Temperature sensor 180J is used to detect temperature.
  • the electronic device 100 utilizes the temperature detected by the temperature sensor 180J to execute the temperature processing strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device 100 reduces the performance of a processor located near the temperature sensor 180J in order to reduce power consumption and implement thermal protection. In other embodiments, when the temperature is lower than another threshold, the electronic device 100 heats the battery 142 to prevent the low temperature from causing the electronic device 100 to shut down abnormally. In some other embodiments, when the temperature is lower than another threshold, the electronic device 100 performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
  • Touch sensor 180K also known as "touch device”.
  • the touch sensor 180K can be disposed on the display screen 194.
  • the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen”.
  • the touch sensor 180K is used to detect a touch operation on or near the touch sensor 180K.
  • the touch sensor can pass the detected touch operation to the application processor to determine the touch event type.
  • Visual output related to the touch operation may be provided through display screen 194 .
  • the touch sensor 180K may also be disposed on the surface of the electronic device 100 at a location different from that of the display screen 194 .
  • Bone conduction sensor 180M can acquire vibration signals.
  • the bone conduction sensor 180M can acquire human body vocal vibrations. Vibration signal of moving bone block.
  • the bone conduction sensor 180M can also contact the human body's pulse and receive blood pressure beating signals.
  • the bone conduction sensor 180M can also be provided in an earphone and combined into a bone conduction earphone.
  • the audio module 170 can analyze the voice signal based on the vibration signal of the vocal vibrating bone obtained by the bone conduction sensor 180M to implement the voice function.
  • the application processor can analyze the heart rate information based on the blood pressure beating signal acquired by the bone conduction sensor 180M to implement the heart rate detection function.
  • the buttons 190 include a power button, a volume button, etc.
  • Key 190 may be a mechanical key. It can also be a touch button.
  • the electronic device 100 may receive key input and generate key signal input related to user settings and function control of the electronic device 100 .
  • the motor 191 can generate vibration prompts.
  • the motor 191 can be used for vibration prompts for incoming calls and can also be used for touch vibration feedback.
  • touch operations acting on different applications can correspond to different vibration feedback effects.
  • the motor 191 can also correspond to different vibration feedback effects for touch operations in different areas of the display screen 194 .
  • Different application scenarios such as time reminders, receiving information, alarm clocks, games, etc.
  • the touch vibration feedback effect can also be customized.
  • the indicator 192 may be an indicator light, which may be used to indicate charging status, power changes, or may be used to indicate messages, missed calls, notifications, etc.
  • the SIM card interface 195 is used to connect a SIM card.
  • the software system of the electronic device 100 may adopt a layered architecture, an event-driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture.
  • This embodiment of the present invention takes the Android system with a layered architecture as an example to illustrate the software structure of the electronic device 100 .
  • FIG. 3 is a software structure block diagram of the electronic device 100 according to the embodiment of the present invention.
  • the layered architecture divides the software into several layers, and each layer has clear roles and division of labor.
  • the layers communicate through software interfaces.
  • the Android system is divided into four layers, from top to bottom: application layer, application framework layer, Android runtime and system libraries, and kernel layer.
  • the application layer can include a series of application packages.
  • Application packages can include camera, gallery, calendar, calling, map, navigation, WLAN, Bluetooth, music, video, SMS and other applications.
  • the application layer also includes a device security status display module, a device security risk and security risk elimination suggestion display module, a device security function display module, and a device security event recording module.
  • the device security status display module is used for electronic equipment to display the security status of local devices or other interconnected devices.
  • the security status of electronic equipment can be divided into different levels such as high risk, medium risk, low risk, and no risk.
  • Electronic devices can also score the safety factor of electronic devices and obtain different scores, such as 100 points, such as 80 points, such as 60 points, and so on. This score may correspond to the security status level of the above-mentioned electronic device. For example, when the safety factor of a device is 100 points, the safety status level of the corresponding device is risk-free. When the safety factor of a device is 70-100 points, the safety status level of the corresponding device is low risk. When the safety factor of the device is 50-70 points, the safety status level of the corresponding device is medium risk. When the safety factor score of a device is lower than 50 points, the safety status level of the corresponding device is high risk.
  • the device security risk and security risk elimination suggestion display module is used by electronic devices to display security risks existing on local devices or other interconnected devices, as well as suggestions on how to eliminate the security risks.
  • FIGS. 6G-6N Specifically, reference may be made to the embodiments shown in FIGS. 6G-6N.
  • the device security function display module is used by electronic devices to display the security functions supported by local devices or other interconnected devices.
  • the device security event recording module is used by electronic devices to display security events that occur within a certain period of time on local devices or other interconnected devices.
  • FIGS. 7B-7F Reference may be made to the embodiments shown in FIGS. 7B-7F.
  • the application framework layer provides an application programming interface (API) and programming framework for applications in the application layer.
  • API application programming interface
  • the application framework layer includes some predefined functions.
  • the application framework layer can include window manager, content provider, view system, phone manager, resource manager, notification manager and secure data platform, etc.
  • a window manager is used to manage window programs.
  • the window manager can obtain the display size, determine whether there is a status bar, lock the screen, capture the screen, etc.
  • Content providers are used to store and retrieve data and make this data accessible to applications.
  • Said data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
  • the view system includes visual controls, such as controls that display text, controls that display pictures, etc.
  • a view system can be used to build applications.
  • the display interface can be composed of one or more views.
  • a display interface including a text message notification icon may include a view for displaying text and a view for displaying pictures.
  • the phone manager is used to provide communication functions of the electronic device 100 .
  • call status management including connected, hung up, etc.
  • the resource manager provides various resources to applications, such as localized strings, icons, pictures, layout files, video files, etc.
  • the notification manager allows applications to display notification information in the status bar, which can be used to convey notification-type messages and can automatically disappear after a short stay without user interaction.
  • the notification manager is used to notify download completion, message reminders, etc.
  • the notification manager can also be notifications that appear in the status bar at the top of the system in the form of charts or scroll bar text, such as notifications for applications running in the background, or notifications that appear on the screen in the form of conversation windows. For example, text information is prompted in the status bar, a beep sounds, the electronic device vibrates, the indicator light flashes, etc.
  • the security data platform provides the following capabilities: device discovery capabilities, device security event storage capabilities, device security risk calculation capabilities, device security function management capabilities, etc.
  • the device discovery capability is used for the electronic device 100 to discover interconnected devices.
  • the device security event storage capability is used to store device security events generated within a certain period of time and sent by other interconnected devices on the electronic device 100 and the security capabilities supported by the device.
  • the device security risk calculation capability is used by the electronic device 100 to calculate the device security risk level of the electronic device 100 based on the device security events on the electronic device 100, or the electronic device 100 can also calculate the mutual device security risk level based on the device security events sent by other interconnected devices.
  • the device security risk calculation capability is also used to present relevant suggestions for relieving the security risks based on the security risks existing on the electronic device 100 and/or the security risks existing on the electronic device 200 .
  • the device security function management capability is used for the electronic device 100 to display the security functions supported by the electronic device 100, or to display the security functions supported by other interconnected devices based on the device security capabilities sent by the other interconnected devices.
  • the electronic device 100 may also receive user operations to control the security functions of the electronic device 100 or control the security functions of other interconnected devices. For example, control the safety function to turn on or off, etc.
  • Android Runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system.
  • the core library contains two parts: one is the functional functions that need to be called by the Java language, and the other is the core library of Android.
  • the application layer and application framework layer run in virtual machines.
  • the virtual machine executes the java files of the application layer and application framework layer into binary files.
  • the virtual machine is used to perform object life cycle management, stack management, thread management, security and exception management, and garbage collection and other functions.
  • System libraries can include multiple functional modules. For example: surface manager (surface manager), media libraries (Media Libraries), 3D graphics processing libraries (for example: OpenGL ES), 2D graphics engines (for example: SGL), etc.
  • the surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications.
  • the media library supports playback and recording of a variety of commonly used audio and video formats, as well as static image files, etc.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, composition, and layer processing.
  • 2D Graphics Engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least display driver, camera driver, audio driver, and sensor driver.
  • the following exemplifies the workflow of the software and hardware of the electronic device 100 in conjunction with capturing the photographing scene.
  • the corresponding hardware interrupt is sent to the kernel layer.
  • the kernel layer processes touch operations into raw input events (including touch coordinates, timestamps of touch operations, and other information). Raw input events are stored in the kernel layer.
  • the application framework layer obtains the original input event from the kernel layer and identifies the control corresponding to the input event. Taking the touch operation as a touch click operation and the control corresponding to the click operation as a camera application icon control as an example, the camera application calls the interface of the application framework layer to start the camera application, and then starts the camera driver by calling the kernel layer. Camera 193 captures still images or video.
  • FIG. 4A exemplarily shows an interaction diagram of multiple functional modules on the electronic device 100 .
  • the device discovery module is used by the electronic device 100 to discover the electronic device currently establishing a communication connection with the electronic device 100 .
  • the electronic device 100 can only display the device security status of the electronic device 100 , security risks existing on the electronic device 100 , security functions supported by the electronic device 100 , security events on the electronic device 100 , etc. .
  • the electronic device 100 can display the device security status of the electronic device 100, the security risks existing on the electronic device 100, the security functions supported by the electronic device 100, and the information on the electronic device 100. security incidents
  • the device security status of other devices that have established communication connections with the electronic device 100, security risks existing on the electronic device 100, security functions supported by the electronic device 100, security events on the electronic device 100, etc. can also be displayed.
  • other electronic devices have established a communication connection with the electronic device 100.
  • the electronic device 200 can use the security functions supported by the electronic device 200 and the electronic device 200 within a certain period of time.
  • the generated security events and other information are sent to the electronic device 100.
  • the electronic device 100 calculates the device security risk.
  • the capability module determines the device security status of the electronic device 200 and the security risks existing on the electronic device 200 based on information such as security events generated by the electronic device 200 within a certain period of time.
  • the electronic device 200 can locally determine the device security status of the electronic device 200 and the security risks existing on the electronic device 200 based on information such as security events generated by the electronic device 200 within a certain period of time. The electronic device 200 Then, the security functions supported by the electronic device 200, the device security status of the electronic device 200, and the security risks existing on the electronic device 200 are sent to the electronic device 100.
  • the device security risk calculation module can also determine the device security status of the electronic device 100 and the security risks existing on the electronic device 100 based on information such as security events generated by the electronic device 100 within a certain period of time.
  • the device security risk calculation module determines the device security risk.
  • the computing module can display the device security status of the electronic device 100 through the device security status display module and the device security status of the electronic device 200 through the device security risk calculation module. It can also display the device security status of the electronic device 100 through the device security risk and security risk elimination suggestion display module.
  • Security risk device security risk calculation module security risks existing on the electronic device 200 .
  • the device security risk calculation module may also display corresponding security risk relief suggestions through the device security risk and security risk relief suggestion display module based on the security risks existing on the electronic device 100 and/or the security risks existing on the electronic device 200 .
  • the device security event storage module After acquiring the security events generated by the electronic device 100 and the security events generated by the electronic device 200 within a certain period of time, stores the security events generated by the electronic device 100 and the security events generated by the electronic device 200 within a certain period of time. Security events generated within a certain period of time are stored on the electronic device 100 . At the same time, the device security event storage module can respectively display security events generated by the electronic device 100 and the electronic device 200 within a certain period of time through the device security event recording module.
  • the device security function management module can display the security capabilities supported by the electronic device 100 and the security capabilities supported by the electronic device 200 through the device security display module.
  • the electronic device 100 can also receive user operations to control one or more security functions on the electronic device 100 and the electronic device 200 to turn on or off, thereby improving the security of personal information on the electronic device 100 and the electronic device 200 .
  • the electronic device 100 no longer displays the security status of the electronic device 200 and the security risks existing on the electronic device 200.
  • the electronic device 100 can pop up a window to prompt the user whether to Clean up the security risks existing on the electronic device 100.
  • the electronic device 100 can display prompt information 450 .
  • the prompt information 450 is used to prompt the user whether the security risks existing on the electronic device 200 need to be cleared.
  • the electronic device 100 can receive the user's input operation (such as click) on the control 460 in the prompt information 450. In response to the user's input operation, in a possible implementation, the electronic device 100 can first display and view it for the user.
  • the security risks existing on the electronic device 200 are then removed by the electronic device 100 by receiving user operations to clear the security risks existing on the electronic device 200 .
  • the electronic device 100 can first clear the security risks existing on the electronic device 200, and then display a prompt message to prompt the user to see what the cleared security risks include.
  • the electronic device 100 can also receive a user operation to cancel the cleared security risks.
  • Security risks existing on the electronic device 200 Specifically, reference may be made to the embodiments shown in FIGS. 6A to 6N and 7A to 7G, and the embodiments of the present application will not be described in detail here.
  • the electronic device 100 may also receive the user's input operation (such as a click) on the control 470 in the prompt information 450. In response to the user's input operation, the electronic device 100 ignores the prompt, that is, it does not check the security risks existing on the electronic device 200. The security risks present on the electronic device 200 are not cleared.
  • the user's input operation such as a click
  • the electronic device 200 may prompt the user in the service suggestion display area. Does it need to be cleared? Manage security risks existing on the electronic device 100. For example, as shown in FIG. 4C , the electronic device 200 may display the service card 480 on the service suggestion display area. The service card 480 is used to remind the user of security risks existing on the electronic device 200 and whether they need to be cleared. Among them, the electronic device 100 can receive the user's input operation (such as click) on the control 490 in the service card 480.
  • the electronic device 100 can first display and view it for the user.
  • the security risks existing on the electronic device 200 are then removed by the electronic device 100 by receiving user operations to clear the security risks existing on the electronic device 200 .
  • the electronic device 100 can first clear the security risks existing on the electronic device 200, and then display a prompt message to prompt the user to see what the cleared security risks include.
  • the electronic device 100 can also receive a user operation to cancel the cleared security risks.
  • Security risks existing on the electronic device 200 Specifically, reference may be made to the embodiments shown in FIGS. 6A to 6N and 7A to 7G, and the embodiments of the present application will not be described in detail here.
  • the electronic device 100 can also receive the user's input operation (such as a click) on the control 4110 in the service card 480. In response to the user's input operation, the electronic device 100 ignores this prompt, that is, it does not check the security risks existing on the electronic device 200. The security risks present on the electronic device 200 are not cleared.
  • the user's input operation such as a click
  • the electronic device 100 can also display prompt information in the drop-down notification bar to prompt the user whether to check and clear the security risks existing on the electronic device 200 .
  • the electronic device 100 may also prompt the user of the security risk existing on the electronic device 100 based on the embodiment shown in FIG. 4A and FIG. 4B.
  • the electronic device 100 may also prompt the user of the security risk existing on the electronic device 100 based on the embodiment shown in FIG. 4A and FIG. 4B.
  • the embodiments of the present application will not be described in detail here.
  • the electronic device 100 can also view security risks existing on the electronic device 100 and on the electronic devices connected to the electronic device 200 in the setting application.
  • 5A-5J illustrate schematic diagrams in which the electronic device 100 may display the device security status of one or more devices.
  • FIG. 5A exemplarily shows the main interface of the electronic device 100.
  • Figure 5A shows icons of multiple applications, such as file management application icons, email application icons, music application icons, smart life application icons, sports and health application icons, settings application icons, and camera application icons. Icons, icons for the Contacts app, icons for the Phone app, icons for the Messages app, etc.
  • Figure 5A also shows page indicators, weather indicators, calendar indicators, power indicators, time indicators, signal indicators, and so on.
  • the electronic device 100 receives a user's input operation (eg, click) on the icon of the setting application, and in response to the user's input operation, the electronic device 100 displays a user interface 501 as shown in FIG. 5B .
  • the user interface 501 shows multiple setting items, such as airplane mode setting items (the current flight mode is turned off), Wi-Fi setting items (the current Wi-Fi is turned off), Bluetooth setting items (the current Bluetooth function is turned off), personal Hotspot settings, mobile network settings, Do Not Disturb mode settings, display and brightness settings, Huawei account settings, security settings, etc.
  • the electronic device 100 receives a user's input operation (eg, click) on the security setting item, and in response to the user's input operation, the electronic device 100 displays a user interface 502 as shown in FIG. 5C .
  • a user's input operation eg, click
  • Three parts of content are shown in the user interface 502.
  • One is the device security status of the local device and/or the device security status of other interconnected devices.
  • Another is the security function of the electronic device 100 .
  • the last one is the security events of the local device and other interconnected devices within a certain period of time.
  • the security status of the device displayed in the user interface 502 is introduced.
  • the user interface 502 displays the security status of the electronic device 100 and the security status of other devices that have established communication connections with the electronic device 100 .
  • the security status of the device includes but is not limited to the device name, the device's security status indicator, the device's security recommendations, and so on. Depending on the security status level of the device, the corresponding security recommendations for the device are also different.
  • “Li's communication tool” is the device name of the electronic device 100, and the security status indicator of the electronic device 100 is 5021.
  • the security status indicator 5021 is used to indicate that the security status of the electronic device 100 is "low risk”.
  • the security recommendation of the electronic device 100 is "recommended optimization”.
  • “MatePad Pro” is the device name of one of the devices that establishes a communication connection with the electronic device 100 .
  • the security status indicator of the "MatePad Pro” device is 5022.
  • the security status indicator 5022 is used to indicate that the security status of "MatePad Pro” is "high risk” and the security recommendation of "MatePad Pro” is "please optimize immediately”.
  • “MatePad Pro2” is the device name of one of the devices that establishes a communication connection with the electronic device 100 .
  • the security status indicator of the "MatePad Pro2" device is 5023.
  • the security status indicator 5023 is used to indicate that the security status of "MatePad Pro2" is "risk-free”. Pro2" has a safety recommendation of "Good Status”.
  • “Lisa’s big screen” is the device name of one of the devices that establishes a communication connection with the electronic device 100 . Before the electronic device 100 determines the security status of "Lisa's Big Screen", the electronic device 100 may display the words "Synchronizing" to remind the user that the security status of "Lisa's Big Screen” is being synchronized.
  • the electronic device 100 may only display the security status of the electronic device 100 on the user interface 502.
  • the electronic device 100 may receive a user's sliding operation (such as an upward sliding operation) on the user interface 502 , and in response to the user's sliding operation, the electronic device 100 may display other undisplayed content.
  • a user's sliding operation such as an upward sliding operation
  • the electronic device 100 in response to the user's sliding operation, displays the user interface 503 .
  • Security functions supported by the electronic device 100 are also shown in the user interface 503, such as payment protection center and anti-fraud functions, etc.
  • the electronic device 100 can receive user operations to enable the one or more security functions to improve the security capabilities of the electronic device 100 .
  • security protection suggestions are for the security protection suggestions on the electronic device 100 .
  • security protection suggestions may include: the "Perfecto pinball” application installed on the electronic device 100 is detected as a virus application, and it is recommended that you uninstall it immediately or move it to the application control center.
  • the "Baofengyingyin” application installed on the electronic device 100 has been detected as a virus application. It is recommended that you uninstall it immediately or move it to the application control center.
  • the "Sudaidaitong” application installed on the electronic device 100 is detected as a fraudulent application and is recommended to be uninstalled.
  • the security protection suggestions are used to remind the user of security risks existing on the electronic device 100 and to prompt the user to eliminate security risks existing on the electronic device 100 through specific methods.
  • the electronic device 100 may continue to receive the user's sliding operation (such as an upward sliding operation) on the user interface 502 , and in response to the user's sliding operation, the electronic device 100 may display other undisplayed content.
  • the user's sliding operation such as an upward sliding operation
  • the electronic device 100 may display security event records generated by the electronic device 100 and/or other devices interconnected with the electronic device 100 within a certain period of time.
  • Security event records include but are not limited to: security event type, time when the security event occurred, content of the security event, etc.
  • the electronic device 100 can display security event records generated by the electronic device 100 and other devices interconnected with the electronic device 100 within a certain period of time.
  • the electronic device 100 may only display security event records generated by the electronic device 100 within a certain period of time.
  • the electronic device 100 displays the user interface 504 .
  • Displayed in the user interface 504 are security event records generated by the electronic device 100 and other devices interconnected with the electronic device 200 within a certain period of time.
  • the security event record can be: Today at 4:48 pm, the security event type is "harassment interception", and the specific content is "123123321232 was intercepted 3 times”.
  • the security event type was "system ROOT status” and the specific content was "the device is rooted”.
  • the security event type was "virus detection", and the specific content was "2 virus applications found”.
  • the user interface 503 may also display security protection suggestions for the electronic device 100 and/or other devices interconnected with the electronic device 100 .
  • the electronic device 100 may display security protection suggestions for the electronic device 100 and other devices interconnected with the electronic device 100.
  • the electronic device 100 may only display security protection suggestions for the electronic device 100.
  • the user interface 503 also includes a "one-click elimination" control 512.
  • the electronic device 100 can receive a user's input operation (such as a click) on the "one-click elimination" control 512, and in response to the user's input operation, the electronic device 100 can detect security risks existing on the electronic device 100 and/or the electronic device 200. Eliminate it with "one click", saving user operations.
  • the electronic device 100 may display a prompt bar 513 as shown in FIG. 5H.
  • the prompt bar 513 includes the prompt message “Confirm whether to uninstall the Perfecto pinball application, Baofengyingyin application, etc. on the electronic device 200 And enable the USB debugging function on the electronic device 200, and uninstall the Quick Loan application on the electronic device 100? ”, the prompt bar 513 also includes a cancel option and a confirmation option. In this way, the user's misoperation can be prevented.
  • the electronic device 100 may receive a user's input operation (such as a click) on the cancel option in the prompt bar 513, and in response to the user's input operation, the electronic device 100 suspends eliminating security risks existing on the electronic device 100 and the electronic device 200.
  • the electronic device 100 can also receive the user's input operation (such as click) on the confirmation option in the prompt bar 513. In response to the user's input operation, the electronic device 100 will eliminate all security risks existing on the electronic device 100 and the electronic device 200.
  • the electronic device 100 receives the user's input operation (such as click) for the confirmation option in the prompt bar 513 , and in response to the user's input operation, the electronic device 100 sends a control to the electronic device 200 through the communication connection.
  • the control instruction is used to instruct the electronic device 200 to uninstall the Perfecto pinball application and the Baofeng Video application on the electronic device 200, and to enable the USB debugging function on the electronic device 200.
  • the electronic device 200 After receiving the control command sent by the electronic device 100, the electronic device 200 uninstalls the Perfecto pinball application and the Baofeng Video application on the electronic device 200, and turns on the USB debugging function on the electronic device 200.
  • the electronic device 200 sends an execution success message to the electronic device 100 .
  • the electronic device 100 can uninstall the Quick Loan application installed on the electronic device 100 .
  • the electronic device 100 may display the user interface 520 as shown in Figure 5I .
  • the security protection suggestions for the electronic device 100 and the electronic device 200 shown in the user interface 520 are "no suggestions at the moment".
  • the prompt bar 513 can also be displayed on the electronic device 200, which is not limited in the embodiment of the present application.
  • the prompt bar or prompt information displayed on the electronic device 100 described in the following embodiments of the present application can be displayed on the electronic device 200 , or displayed on the electronic device 100 and the electronic device 200 at the same time.
  • the embodiments of the present application do not do this. limited.
  • the electronic device 100 may receive a user's input operation (eg, click) on the "one-key elimination" control 512 , and in response to the user's input operation, the electronic device 100 sends a control to the electronic device 200 through the communication connection.
  • the control instruction is used to instruct the electronic device 200 to uninstall the Perfecto pinball application, the Baofeng Video application, the Quick Loan application, and the Rose Pinball application on the electronic device 200, and to enable the USB debugging function on the electronic device 200.
  • the electronic device 200 After receiving the control command sent by the electronic device 100, the electronic device 200 applies Perfecto pinball and Baofeng Video on the electronic device 200, and turns on the USB debugging function on the electronic device 200.
  • the electronic device 200 sends an execution success message to the electronic device 100.
  • the electronic device 100 can uninstall the Sudaidai application installed on the electronic device 100.
  • the electronic device 100 may display the prompt bar 514 as shown in Figure 5J .
  • the prompt bar 514 includes the prompt message "The Perfecto pinball application and Baofengyingyin application have been uninstalled on the electronic device 200, and the USB debugging function on the electronic device 200 has been enabled.
  • the Sudaidai application on the electronic device 100 has been uninstalled. Do you need to Restore previous settings?", the prompt bar 514 also includes a cancel option and a confirmation option. In this way, user's misoperation can be prevented.
  • the electronic device 100 may receive a user's input operation (such as a click) on the cancel option in the prompt bar 514. In response to the user's input operation, the electronic device 100 confirms that the security risks existing on the electronic device 100 and the electronic device 200 are eliminated. The electronic device 100 may also receive a user's input operation (such as a click) on the confirmation option in the prompt bar 514. In response to the user's input operation, the electronic device 100 cancels the execution of eliminating all security risks existing on the electronic device 100 and the electronic device 200.
  • a user's input operation such as a click
  • the electronic device 100 receives the user's input operation (such as click) for the cancel option in the prompt bar 514 , and in response to the user's input operation, the electronic device 100 confirms the execution of the elimination of the electronic device 100 and the electronic device. 200 security risks. Afterwards, the electronic device 200 may display the user interface 520 shown in FIG. 5I.
  • the user's input operation such as click
  • the electronic device 200 may display the user interface 520 shown in FIG. 5I.
  • the prompt bar 514 can also be displayed on the electronic device 200, which is not limited in the embodiment of the present application.
  • the electronic device 100 can receive the user's operation and display the security status of a certain device, the security protection suggestions of the certain device, the security functions supported by the certain device, and the information generated by the certain device within a certain period of time. security incidents, etc.
  • the certain device may be the electronic device 100, or may be a device that establishes a communication connection with the electronic device 100, which is not limited in the embodiment of the present application.
  • 6A-6E exemplarily illustrate a schematic diagram in which the electronic device 100 displays the security status of a certain device.
  • the certain device may be a device that establishes a communication connection with the electronic device 100, such as a MatePad Pro, and the electronic device corresponding to the MatePad Pro may be called the electronic device 200.
  • the electronic device 100 receives a user's input operation (such as a single click) on the icon of the electronic device 200 in the user interface 502 . click), in response to the user's input operation, the electronic device 100 may display the user interface 601 as shown in FIG. 6B.
  • a user's input operation such as a single click
  • the electronic device 100 may display the user interface 601 as shown in FIG. 6B.
  • Protection functions supported by the electronic device 200 are shown in the user interface 601 .
  • the protection functions supported by the electronic device 200 include but are not limited to: virus scanning function, harassing call interception function, WLAN security detection function, anti-counterfeiting base station function, pure mode function, secure input method function, and verification code protection function. , payment protection function, find device function, lock screen password function, etc.
  • the protection functions supported by the electronic device 200 may be different from the protection functions supported by the electronic device 100 , and this is not limited in the embodiments of the present application.
  • the electronic device 200 needs to send the supported security functions to the electronic device 100, so that the electronic device 100 can display the security functions supported by the electronic device 200 on the interface.
  • the electronic device 100 can receive the user's operation in the user interface 601 and turn on/off one or more protection functions supported by the electronic device 200 .
  • the embodiment of this application takes how to enable the "screen lock password function" on the electronic device 200 on the electronic device 100 as an example to illustrate.
  • the electronic device 100 receives the user's input operation (for example, click) for the "lock screen password function” option in the user interface 601 .
  • the electronic device 100 may display as shown in FIG. 6C User interface 602.
  • the "lock screen password function" option shown in the user interface 602 is in a closed state.
  • the electronic device 100 receives the user's input operation (such as click) for the "lock screen password function” option in the user interface 602 , and responds to the user's input operation, as shown in FIG. 6D "lock screen password function"
  • the display status of the option switches from the off status to the "on status".
  • the electronic device 100 sends an opening instruction to the electronic device 200 through the communication connection, and the electronic device 200 receives the After receiving the opening instruction, in response to the opening instruction, the lock screen password function on the electronic device 200 is enabled.
  • the electronic device 200 enables the screen lock password function on the electronic device 200
  • the electronic device 200 sends an activation success message to the electronic device 100.
  • the electronic device 100 can switch the display state of the "screen lock password function” option shown in Figure 6D from the off state to the "On status".
  • the electronic device 100 can also switch the display state of the "lock screen password function" option in the user interface 601 from the off state to the "on state".
  • FIGS. 6F to 6J exemplarily illustrate schematic diagrams of multiple security protection suggestions given for the electronic device 200 .
  • the electronic device 100 can receive the user's sliding operation (such as an upward sliding operation) on the user interface 601, and in response to the user's sliding operation, the electronic device 100 can display other security risk items on the electronic device 200, For example, security protection recommendations.
  • the user's sliding operation such as an upward sliding operation
  • the electronic device 100 can display other security risk items on the electronic device 200, For example, security protection recommendations.
  • the electronic device 100 may display a user interface 602 , and the user interface 602 shows some security protection suggestions, which are targeted at the security protection suggestions on the electronic device 200 .
  • security protection suggestions may include: Perfecto pinball is detected as a virus application, and it is recommended that you uninstall it immediately or move it to the application control center. Sudaidaitong has been detected as a fraudulent application and it is recommended to uninstall it. Rose Pinpin has been detected as a fraudulent application and is recommended to be uninstalled. Z4root has been detected as a risky application. It is recommended that you uninstall it immediately or move it to the application control center. It is recommended to turn off the USB debugging function to prevent malicious applications from stealing data through the USB interface.
  • the electronic device 100 can receive a user operation to view detailed content of a certain security protection recommendation. For example, as shown in FIG. 6G , the electronic device 100 may receive a user's input operation (eg, click) for option 603 , and in response to the user's input operation, the electronic device 100 may display a user interface 604 as shown in FIG. 6H .
  • a user's input operation eg, click
  • the electronic device 100 may display a user interface 604 as shown in FIG. 6H .
  • user interface 604 is a management and control interface for the "Z4root” application.
  • Security recommendations for the "Z4root” application are shown in user interface 604.
  • the "Z4root” application is a risky application.
  • the risk level of the "Z4root” application is medium risk.
  • the risk details are that there is risk code in the "Z4root” application. This risk code may steal the user's personal information. Please use it before Notice.
  • Also shown in the user interface 604 are options to control the "Z4root” application and to uninstall the "Z4root” application.
  • the user can turn off some permissions of the "Z4root” application on the electronic device 200 by operating the options for controlling the "Z4root” application, such as turning off the permission to access the photo album, turning off the permission to access text messages, etc.
  • the user can also uninstall the "Z4root” application installed on the electronic device 200 by operating the option to uninstall the "Z4root” application.
  • the electronic device 100 receives the user's input operation (eg, click) for the option of uninstalling the "Z4root” application in the user interface 604 .
  • the electronic device 100 may display as shown in FIG. 6I Prompt bar 605 is used to prompt the user whether to continue uninstalling the "Z4root” application.
  • the electronic device 100 may receive a user's input operation (eg, click) on the cancel control in the prompt bar 605 , and in response to the user's input operation, the electronic device 100 will suspend the uninstallation of the "Z4root” application installed on the electronic device 200 .
  • the electronic device 100 may also receive a user's input operation (such as a click) on the uninstall control in the prompt bar 605.
  • a user's input operation such as a click
  • the electronic device 100 uninstalls the "Z4root" application installed on the electronic device 200.
  • the electronic device 100 receives the user's request for the prompt bar
  • the electronic device 100 can send an uninstall instruction to the electronic device 200 through the communication connection.
  • the electronic device 200 responds to the uninstall instruction and installs the "Z4root" application installed on the electronic device 200. Uninstall it.
  • the electronic device 100 may first send an instruction to the second electronic device to Instruct the second electronic device to perform a corresponding operation.
  • the second electronic device sends a successful execution message to the first electronic device.
  • the first electronic device receives the successful execution message sent by the second electronic device, it can then display the following:
  • the prompt information shown in FIG. 6L is used to prompt the user about the operation performed by the second electronic device, and to ask the user whether to cancel the operation performed by the second electronic device. The user can again choose to accept the operation performed by the second electronic device or cancel the operation performed by the second electronic device.
  • the electronic device 200 may send an uninstallation success message to the electronic device 100.
  • the electronic device 100 may display the user interface 606.
  • the difference between the user interface 606 and the user interface 602 is that the security protection suggestions for the electronic device 200 displayed in the user interface 606 do not include "Z4root has been detected as a risky application. It is recommended that you uninstall it immediately or move it to the application control center", which means that "Z4root "After the application is deleted from the electronic device 200, the security threat caused by the installed "Z4root” application on the electronic device 200 is eliminated.
  • the electronic device 100 can receive the user's input operation for the "view all recommendations" option in the user interface 606, so that the electronic device 100 can display all security protection recommendations for the electronic device 200.
  • This embodiment of the present application does not include Again.
  • only part of the security protection suggestions are exemplarily shown in the user interface 602 and the user interface 606. Compared with the security protection suggestions that are not shown, these part of the security protection suggestions can be understood as providing protection for electronic devices. 200 has greater safety protection.
  • FIGS. 6G and 6J exemplarily illustrate that the electronic device 100 can receive user operations to eliminate security risks existing on the electronic device 200 one by one (one by one). In some examples, the electronic device 100 can also receive user operations to "eliminate" all security risks existing on the electronic device 200 with one click, thereby reducing the user's operations.
  • 6K to 6N exemplarily illustrate a schematic diagram in which the electronic device 100 receives a user's operation to "eliminate" all security risks existing on the electronic device 200 with one click.
  • a "one-click elimination” option 608 is shown in the user interface 607.
  • the electronic device 100 may receive a user's input operation (eg, click) for the "one-click elimination” option 608, and in response to the user's input operation, the electronic device 100 may display a prompt bar 609 as shown in FIG. 6L.
  • the prompt bar 609 includes the prompt message "Confirm whether to uninstall the Perfecto pinball application, the Baofeng Yingyin application, the Quick Loan application, the Rose Pinball application on the electronic device 200, and enable the USB debugging function.”
  • the prompt bar 609 also includes a cancel option. and confirmation options. In this way, user's misoperation can be prevented.
  • the electronic device 100 may receive the user's input operation (eg, click) on the cancel option in the prompt bar 609, and in response to the user's input operation, the electronic device 100 pauses to eliminate the security risks existing on the electronic device 200.
  • the electronic device 100 can also receive the user's input operation (such as click) on the confirmation option in the prompt bar 609. In response to the user's input operation, the electronic device 100 will eliminate all security risks existing on the electronic device 200.
  • the electronic device 100 receives the user's input operation (such as click) for the confirmation option in the prompt bar 609 , and in response to the user's input operation, the electronic device 100 sends a control to the electronic device 200 through the communication connection.
  • the control instruction is used to instruct the electronic device 200 to uninstall the Perfecto pinball application, the Baofeng Video application, the Quick Loan application, and the Rose Pinball application on the electronic device 200, and to enable the USB debugging function on the electronic device 200.
  • the electronic device 200 After receiving the control command sent by the electronic device 100, the electronic device 200 uninstalls the Perfecto pinball application, Baofengyingyin application, Quick Loans application, and Rose Pinball application on the electronic device 200, and turns on USB debugging on the electronic device 200 Function. After performing the operation, the electronic device 200 sends an execution success message to the electronic device 100. After the electronic device 100 receives the execution success message, the electronic device 100 may display the user interface 610 as shown in FIG. 6M. The security protection suggestion for the electronic device 200 shown in the user interface 610 is "no suggestion yet".
  • the electronic device 100 may receive a user's input operation (eg, click) for the "one-click elimination" option 608, and in response to the user's input operation, the electronic device 100 sends a control to the electronic device 200 through the communication connection.
  • the control instruction is used to instruct the electronic device 200 to uninstall the Perfecto pinball application, the Baofeng Video application, the Quick Loan application, and the Rose Pinball application on the electronic device 200, and to enable the USB debugging function on the electronic device 200.
  • the electronic device 200 After receiving the control command sent by the electronic device 100, the electronic device 200 uninstalls the Perfecto pinball application, the Baofengyingyin application, the Quick Loan Application, and the Rose Pinball application on the electronic device 200, and turns on the USB debugging on the electronic device 200. Function. After performing this operation, the electronic device 200 sends an execution success message to the electronic device 100. After the electronic device 100 receives the execution success message, the electronic device 100 can display a prompt bar 611 as shown in FIG. 6N.
  • the prompt bar 611 includes the prompt message "The Perfecto pinball application, Baofengyingyin application, Sudaitong application, and Rose Pinball application have been uninstalled on the electronic device 200, and the USB debugging function has been enabled. Do you need to restore the previous settings?", prompts Also included in column 611 are a cancel option and a confirm option. so, It can prevent users from misoperation.
  • the electronic device 100 may receive the user's input operation (eg, click) on the cancel option in the prompt bar 611 , and in response to the user's input operation, the electronic device 100 confirms that the security risks existing on the electronic device 200 are eliminated.
  • the electronic device 100 may also receive a user's input operation (such as a click) on the confirmation option in the prompt bar 611. In response to the user's input operation, the electronic device 100 cancels the execution of eliminating all security risks existing on the electronic device 200.
  • the electronic device 100 receives the user's input operation (for example, click) for the cancel option in the prompt bar 611 .
  • the electronic device 100 confirms the execution of canceling the option existing on the electronic device 200 . Security risks.
  • the electronic device 200 may display the user interface 610 shown in FIG. 6M.
  • the electronic device 100 can also receive user operations to view security events generated on the electronic device 200 within a certain period of time.
  • FIG. 7A to 7G exemplarily illustrate schematic diagrams of viewing security events generated on the electronic device 200 within a certain period of time on the electronic device 100 .
  • the electronic device 100 may receive a user's sliding operation (such as an upward sliding operation) on the user interface 602 , and in response to the user's sliding operation, the electronic device 100 may display User interface 701 as shown in Figure 7B.
  • a user's sliding operation such as an upward sliding operation
  • the user interface 701 shows security records generated by the electronic device 200 within a certain period of time (eg, 7 days).
  • Security event records include but are not limited to: security event type, time when the security event occurred, content of the security event, etc.
  • the security event record can be: 4:48 pm today, the security event type is harassment interception, and the content of the security event is 123123321232 intercepted 3 times.
  • the security event type was the system ROOT status, and the content of the security event was that the device was rooted.
  • the security event type was virus scanning, and the content of the security event was the discovery of 2 virus applications.
  • the security event type was virus scanning, and the content of the security event was the discovery of a risky application.
  • the security event type was lock screen password, and the content of the security event was that the lock screen password has been set.
  • the security event type was USB debugging, and the content of the security event was USB debugging turned on.
  • the electronic device 100 can receive the user's up and down sliding operation on the user interface 701 to view more security event records, which will not be described again in the embodiments of this application.
  • the electronic device 100 may also receive a user's operation to view detailed records of a certain security event record.
  • the electronic device 100 receives a user's input operation (such as a click) on the view control 702 , and in response to the user's input operation, the electronic device 100 may display a processing interface corresponding to the security event record.
  • a user's input operation such as a click
  • electronic device 100 may display user interface 703 as shown in Figure 7C.
  • the user interface 703 shows risky applications detected on the electronic device 200 within a certain period of time (eg, 7 days).
  • the user interface 703 may also display two virus applications detected by the electronic device 100 at 9:17 pm yesterday. The embodiments of the present application do not limit this.
  • the electronic device 100 can receive the user's operation in the user interface 703, uninstall one or more risky applications, and uninstall the security risks caused by the risky applications existing on the electronic device 200.
  • the electronic device 100 receives a user's input operation (eg, click) on the uninstall control 704 , and in response to the user's input operation, the electronic device 100 may display the user interface 706 shown in FIG. 7D .
  • the electronic device 200 uninstalls the "Z4root” application, the risk applications shown in the user interface 706 do not include the "Z4root” application.
  • the electronic device 100 can display prompt information as shown in FIG. 6L to prompt the user whether to perform the operation. After the user confirms the execution, the electronic device 100 may send an instruction to the second electronic device to instruct the second electronic device to perform the corresponding operation. In other possible implementations, after the electronic device 100 receives the user's input operation on the uninstall control 704, the electronic device 100 may first send an instruction to the second electronic device to instruct the second electronic device to perform the corresponding operation. After the second electronic device performs the corresponding operation, the second electronic device sends a successful execution message to the first electronic device.
  • the prompt information shown in FIG. 6L is used to prompt the user about the operation performed by the second electronic device, and to ask the user whether to cancel the operation performed by the second electronic device. The user can again choose to accept the operation performed by the second electronic device or cancel the operation performed by the second electronic device.
  • the electronic device 100 can also receive the user's input operation on the "one-click optimization" control 705 and uninstall the bad applications existing on the electronic device 200 with "one click" to save the user's operations.
  • the electronic device 100 may display the user interface 707 shown in FIG. 7F.
  • the electronic device 100 may display prompt information to remind the user that there are currently no bad applications.
  • the electronic device 100 can display prompt information as shown in Figure 6L to prompt the user whether to After the user confirms the execution of this operation, the electronic The device 100 may send instructions to the second electronic device to instruct the second electronic device to perform corresponding operations.
  • the electronic device 100 may first send an instruction to the second electronic device to instruct the second electronic device to perform the corresponding operation. .
  • the second electronic device sends a successful execution message to the first electronic device.
  • the prompt information shown in FIG. 6L is used to prompt the user about the operation performed by the second electronic device, and to ask the user whether to cancel the operation performed by the second electronic device. The user can again choose to accept the operation performed by the second electronic device or cancel the operation performed by the second electronic device.
  • the security events displayed on the electronic device 100 within a certain period of time by the electronic device 200 do not include the virus killing security event type.
  • the electronic device 200 may display the user interface 708 as shown in FIG. 7G , and the user interface 708 does not include the virus killing security event type.
  • user interface 708 has more than one security event, specifically yesterday morning at 05:18, the security event type is USB debugging, and the content of the security event is USB debugging has been turned off.
  • a security event of "uninstalling the bad application” may be added to the security events displayed on the electronic device 100 that the electronic device 200 displays within a certain period of time. That is, the processing record can be displayed in the security protection record.
  • the electronic device 100 may display the user interface 709 as shown in Figure 7H.
  • a new security protection record was added to user interface 709. The details of the security protection record are: at 5:18 pm today, the security event type is uninstalling a virus application, and the content of the security event is ""Z4root" application has been uninstalled".
  • the electronic device 100 can also display the user's operation record in the security protection record.
  • Figure 8 is a schematic flowchart of a device security processing method provided by an embodiment of the present application.
  • the first electronic device displays a first user interface or first prompt information.
  • the first user interface displays security risk matters for the second electronic device.
  • the first prompt information is used to prompt that there are security risks on the second electronic device. Risk matters, there are security risk matters on the second electronic device related to user privacy.
  • the first electronic device may be the electronic device 100
  • the second electronic device may be the electronic device 200.
  • the first user interface may be user interface 602 shown in Figure 6C.
  • the first user interface may also be user interface 604 shown in Figure 6H.
  • the first user interface may also be user interface 607 shown in Figure 6K.
  • the first user interface may also be the user interface 703 shown in Figure 7C.
  • the first prompt information may be the prompt information 450 shown in FIG. 4B, and the first prompt information may be the service card 480 shown in FIG. 4C.
  • the first electronic device receives the user's first operation on the first user interface or on the first prompt information.
  • the first operation may be an input operation for the “screen lock password function” option in the user interface 602 .
  • the first operation may also be an input operation for the option of uninstalling the "Z4root" application in the user interface 604.
  • the first operation may also be an input operation for the "one-click elimination" option 608 in the user interface 607 .
  • the first operation may also be an input operation directed to the uninstall control 704 in the user interface 703 .
  • the first electronic device After receiving the first operation, the first electronic device sends the first instruction to the second electronic device.
  • the first electronic device may directly send the first instruction to the second electronic device, or the first electronic device may send the first instruction to the second electronic device through the server, which is not limited in the embodiments of the present application.
  • the first electronic device is further configured to, after sending the first instruction to the second electronic device, stop displaying the security risk items existing on the second electronic device in the first user interface, or stop Display the first prompt information.
  • the first electronic device can stop displaying the security risk events existing on the second electronic device.
  • the second electronic device is also configured to send a second instruction to the first electronic device after eliminating security risks on the second electronic device; the first electronic device is also configured to After receiving the second instruction, stop displaying the security risk items existing on the second electronic device in the first user interface, or stop displaying the first prompt information.
  • the first electronic device can stop displaying the security risk event existing on the second electronic device.
  • FIG. 6M user interface 610.
  • the security protection suggestion for the electronic device 200 shown in the user interface 610 is “No suggestion”.
  • the security protection suggestions for the electronic device 200 displayed in the user interface 606 do not include "Z4root has been detected as a risky application. It is recommended that you uninstall it immediately or move it to the application control center.”
  • prompt information may be displayed in the user interface 707 to remind the user that there are currently no bad applications.
  • the user interface 708 does not include the virus killing security event type.
  • the second electronic device After receiving the first instruction, the second electronic device eliminates security risks existing on the second electronic device.
  • the security risk items existing on the second electronic device include one or more items
  • the first operation is an operation of eliminating the first item among the security risk items existing on the second electronic device
  • the electronic device is specifically configured to eliminate the first item existing on the second electronic device after receiving the first instruction.
  • the first electronic device can accept the user's elimination of security risk items existing on the second electronic device one by one.
  • the purpose of selectively eliminating one or more security risk matters existing on the second electronic device In order to achieve the purpose of selectively eliminating one or more security risk matters existing on the second electronic device.
  • the first electronic device can receive the user's elimination of security risk items existing on the second electronic device one by one.
  • the security risk items existing on the second electronic device include one or more items
  • the first operation is an operation of eliminating all the security risk items existing on the second electronic device
  • the device is specifically configured to eliminate all matters existing on the second electronic device after receiving the first instruction.
  • the first electronic device can receive the user's "one-click elimination" of all security risk items existing on the second electronic device, saving the user's operations and making it convenient and fast.
  • the electronic device 100 can receive the user's input operation for the "one-click elimination" option 608 to "one-click elimination" of security risk items existing on the electronic device 200 .
  • the first electronic device is also configured to display a second user interface before displaying the first user interface.
  • the second user interface includes device options of the first electronic device and the second electronic device.
  • the device options of the first electronic device include the security level indicator of the first electronic device, and the device options of the second electronic device include the security level indicator of the second electronic device; the security level indicator is used to Indicates the security status of the electronic device.
  • the security status includes any one of high risk, medium risk, low risk and no risk; the first electronic device is specifically used to receive and respond to the user's request for the second electronic device in the second user interface.
  • the second operation of the device option displays the first user interface.
  • the security level indicator of the first electronic device is different from the security level indicator of the second electronic device.
  • the first electronic device can display the safety status of the first electronic device and/or other devices, so that the user can monitor the safety status of the first electronic device and the second electronic device, and manage and control electronic devices with poor safety status.
  • the second user interface may be the user interface 502 shown in Figure 5C.
  • the logo of the first electronic device may be "Li's communication tool", and the logo of the second electronic device may be "MatePadPro”.
  • the second operation may be directed to an input operation (eg, click) of the icon of the electronic device 200 in the user interface 502 .
  • the first electronic device is also configured to receive and respond to the user's third operation in the second user interface, and display a third user interface, and the third user interface displays a message for the first electronic device.
  • Security risk matters and security risk matters existing on the second electronic device; the first electronic device is also configured to eliminate the security risk matters existing on the first electronic device in response to the fourth operation, and send a third electronic device to the second electronic device.
  • Third command; the second electronic device is also used to eliminate security risks existing on the second electronic device after receiving the third command.
  • the user can operate on the first electronic device to eliminate security risks common to the first electronic device and the second electronic device one by one. For example, if application one and application two coexist on the first electronic device and the second electronic device, and application one and application two are bad applications, the user can operate on the first electronic device to "uninstall" the first electronic device and the second electronic device with one click. Application of coexistence of two electronic devices 1.
  • the first electronic device can also receive a user operation to "one-click uninstall" the second application that coexists with the first electronic device and the second electronic device.
  • the user can operate "one click" on the first electronic device to eliminate all security risks common to the first electronic device and the second electronic device. Risk matters. For example, if application one and application two coexist on the first electronic device and the second electronic device, and application one and application two are bad applications, the user can operate on the first electronic device to "uninstall" the first electronic device and the second electronic device with one click. Two electronic devices coexist Application One and Application Two, and the operation is simple.
  • the third operation may be a sliding operation on the user interface shown in Figure 5D.
  • the third user interface may be user interface 503 shown in Figure 5G.
  • the fourth operation may be an input operation for the “one-key elimination” control 512 in the user interface 503 shown in FIG. 5G.
  • the first electronic device is specifically configured to: after receiving the first operation, display second prompt information, the second prompt information includes the first control, and the second prompt information is used to prompt whether Eliminate security risk matters existing on the second electronic device; receive and respond to the fifth operation for the first control, and send the first instruction to the second electronic device.
  • the first electronic device can display prompt information to avoid misoperation by the user.
  • the prompt information can also be displayed on the second electronic device.
  • the second prompt information may be the prompt column 605 shown in Figure 6I.
  • the first control may be the uninstall control in the prompt bar 605, and the fifth operation may be an input operation for the uninstall control in the prompt bar 605.
  • the second prompt information may be the prompt bar 609 shown in Figure 6L.
  • the first control may be a confirmation option in the prompt bar 609, and the fifth operation may be an input operation for the confirmation option in the prompt bar 609.
  • the second electronic device is also configured to send a second instruction to the first electronic device after eliminating security risks on the second electronic device; the first electronic device is also configured to After receiving the second instruction, the third prompt information is displayed, the third prompt information includes the second control, and the third prompt information is used to prompt whether to cancel and eliminate the security risks existing on the second electronic device; the first electronic device, specifically Used for: confirming the elimination of security risks existing on the second electronic device after receiving and responding to the sixth operation for the second control.
  • the first electronic device can display prompt information to inform the user of the operations performed by the second electronic device, and can provide the user with the option to cancel the operation performed by the second electronic device. Options for the action to be performed.
  • the prompt information can also be displayed on the second electronic device.
  • the third prompt information is the prompt column 611 shown in FIG. 6N.
  • the second control may be the cancel option in the prompt bar 611, and the sixth operation may be an input operation for the cancel option in the prompt bar 611.
  • eliminating security risk events existing on the second electronic device includes enabling the security function supported by the second electronic device, eliminating security risk events generated by the second electronic device within the first period of time, and executing the security risk event for the second electronic device. 2. Safety protection recommendations for electronic equipment.
  • enabling the security function supported by the second electronic device may be enabling the "screen lock password" function on the electronic device 200 as shown in FIGS. 6B to 6E .
  • the security risk event may be the security protection record shown in the previous embodiment. Eliminating the security risk event generated by the second electronic device within the first period of time may be the uninstallation of the Z4root application on the electronic device 200 as shown in FIGS. 6G-6I.
  • Executing the security protection suggestion for the second electronic device may be uninstalling the Z4root application on the electronic device 200 as shown in FIGS. 7B-7D.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another, e.g., the computer instructions may be transferred from a website, computer, server, or data center Transmission to another website, computer, server or data center through wired (such as coaxial cable, optical fiber, digital subscriber line) or wireless (such as infrared, wireless, microwave, etc.) means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated.
  • the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state disk (SSD)), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

本申请提供了一种设备安全处理方法及电子设备。第一电子设备显示第一用户界面或者第一提示信息;第一电子设备接收用户针对第一用户界面或者针对第一提示信息的第一操作;第一操作用于消除第二电子设备上存在的安全风险事项;在接收到第一操作后,第一电子设备向第二电子设备发送第一指令,第一指令用于指示第二电子设备消除第二电子设备上存在的安全风险事项。这样,用户可以在第一电子设备上查看第二电子设备上存在的安全风险事项。在用户不方便在第二电子设备上操作的情况下,第一电子设备可以接收用户操作消除第二电子设备上存在的安全风险事项,保证第二电子设备的设备安全,避免第二电子设备上的用户数据泄露。

Description

一种设备安全处理方法及电子设备
本申请要求于于2022年07月26日提交中国专利局、申请号为202210881648.9、申请名称为“一种设备安全信息展示及处理方法”的中国专利申请的优先权,以及2022年08月19日提交中国专利局、申请号为202210999711.9、申请名称为“一种设备安全处理方法及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及技术领域安全技术领域,尤其涉及一种设备安全处理方法及电子设备。
背景技术
随着终端设备技术的发展,智能家居、智慧出行、智慧办公等变革,消费者使用终端设备的频率逐渐增大。随着终端设备互连增多,终端设备间连接的安全风险也随之增大。如何确保互连设备功能的正常使用,防止设备被恶意攻击,有待进一步研究。
发明内容
本申请提供了一种设备安全处理方法及电子设备,实现了本地设备还可以接收用户操作解除本地设备或者互连的其它设备上的安全风险,以提高本地设备或者互连的其它设备的安全,保证设备的正常使用,防止用户的隐私泄露。
第一方面,本申请提供了一种设备安全处理系统,系统包括第一电子设备和第二电子设备,其中,第一电子设备,用于显示第一用户界面或者第一提示信息,第一用户界面中显示有针对第二电子设备上存在的安全风险事项,第一提示信息用于提示第二电子设备上存在安全风险事项,第二电子设备上存在安全风险事项与用户隐私相关;第一电子设备,还用于接收用户针对第一用户界面或者针对第一提示信息的第一操作;第一操作用于消除第二电子设备上存在的安全风险事项;第一电子设备,还用于在接收到第一操作后,向第二电子设备发送第一指令;第二电子设备,用于在接收到第一指令后,消除第二电子设备上存在的安全风险事项。
这样,用户可以在第一电子设备上查看第二电子设备上存在的安全风险事项。在用户不方便在第二电子设备上操作的情况下,第一电子设备可以接收用户操作消除第二电子设备上存在的安全风险事项,保证第二电子设备的设备安全,避免第二电子设备上的用户数据泄露。
结合第一方面,在一种可能的实现方式中,第一电子设备,还用于在向第二电子设备发送第一指令后,在第一用户界面中停止显示第二电子设备上存在的安全风险事项,或者停止显示第一提示信息。
这样,在第一电子设备第二电子设备发送第一指令后,第一电子设备上可以停止显示第二电子设备上存在的安全风险事件。
结合第一方面,在一种可能的实现方式中,第二电子设备,还用于在消除第二电子设备上存在的安全风险事项后,向第一电子设备发送第二指令;第一电子设备,还用于在接收到第二指令后,在第一用户界面中停止显示第二电子设备上存在的安全风险事项,或者停止显示第一提示信息。
这样,在第一电子设备确定出第二电子设备已消除第二电子设备上存在的安全风险事件后,第一电子设备上可以停止显示第二电子设备上存在的安全风险事件。
结合第一方面,在一种可能的实现方式中,第二电子设备上存在的安全风险事项包括一个或多个事项,第一操作为消除第二电子设备上存在的安全风险事项中第一事项的操作;第二电子设备,具体用于在接收到第一指令后,消除第二电子设备上存在的第一事项。
这样,第一电子设备可以接收用户一个一个的消除第二电子设备上存在的安全风险事项。以实现游湖有选择性地消除第二电子设备上存在的一个或多个安全风险事项。
结合第一方面,在一种可能的实现方式中,第二电子设备上存在的安全风险事项包括一个或多个事项,第一操作为消除第二电子设备上存在的安全风险事项中全部事项的操作;第二电子设备,具体用于在接收到第一指令后,消除第二电子设备上存在的全部事项。
这样,第一电子设备可以接收用户“一键消除”第二电子设备上存在的全部安全风险事项,节省用户的操作,方便快捷。
结合第一方面,在一种可能的实现方式中,第一电子设备,还用于在显示第一用户界面之前,显示第二用户界面,第二用户界面中包括有第一电子设备的设备选项和第二电子设备的设备选项,述第一电子设备的设备选项中包括第一电子设备的安全等级指示符、述第二电子设备的设备选项中包括第二电子设备的安全等级指示符;安全等级指示符用于指示电子设备的安全状态,安全状态包括高风险、中风险、低风险和无风险中的任意一项;第一电子设备,具体用于接收并响应用户针对第二用户界面中第二电子设备的设备选项的第二操作,显示第一用户界面。
可选的,若第一电子设备的安全状态和第二电子设备的安全状态不同,那么第一电子设备的安全等级指示符与第二电子设备的安全等级指示符不同。
这样,第一电子设备可以显示第一电子设备和/或其他设备的安全状态,以便用户可以对第一电子和第二电子设备的安全状态进行监测,并对安全状态差的电子设备进行管控。
结合第一方面,在一种可能的实现方式中,第一电子设备,还用于接收并响应用户针对第二用户界面中的第三操作,显示第三用户界面,第三用户界面中显示有针对第一电子设备上存在的安全风险事项和第二电子设备上存在的安全风险事项;第一电子设备,还用于接收用户针对第三用户界面的第四操作;第四操作用于消除第一电子设备上的安全风险事项和第二电子设备上存在的安全风险事项;第一电子设备,还用于在响应于第四操作,消除第一电子设备上存在的安全风险事项,并向第二电子设备发送第三指令;第二电子设备,还用于在接收到第三指令后,消除第二电子设备上存在的安全风险事项。
可选的,用户可以在第一电子设备上操作一个一个的消除第一电子设备和第二电子设备共有的安全风险事项。例如,第一电子设备和第二电子设备上共存应用一和应用二,且应用一和应用二为不良应用,用户可以在第一电子设备上操作,“一键卸载”第一电子设备和第二电子设备共存的应用一。第一电子设备还可以接收用户操作,“一键卸载”第一电子设备和第二电子设备共存的应用二。
可选的,用户可以在第一电子设备上操作“一键”消除第一电子设备和第二电子设备共有的全部安全风险事项。例如,第一电子设备和第二电子设备上共存应用一和应用二,且应用一和应用二为不良应用,用户可以在第一电子设备上操作,“一键卸载”第一电子设备和第二电子设备共存的应用一和应用二,操作简单。
结合第一方面,在一种可能的实现方式中,第一电子设备,具体用于:在接收到第一操作后,显示第二提示信息,第二提示信息中包括第一控件,第二提示信息用于提示是否消除第二电子设备上存在的安全风险事项;接收并响应于针对第一控件的第五操作,向第二电子设备发送第一指令。
这样,在第二电子设备消除第二电子设备上存在的安全风险事项之前,第一电子设备可以显示提示信息,避免用户误操作。
可选的,该提示信息也可以显示在第二电子设备上。
结合第一方面,在一种可能的实现方式中,第二电子设备,还用于在消除第二电子设备上存在的安全风险事项后,向第一电子设备发送第二指令;第一电子设备,还用于在接收到第二指令后,显示第三提示信息,第三提示信息中包括第二控件,第三提示信息用于提示是否取消消除第二电子设备上存在的安全风险事项;第一电子设备,具体用于:接收并响应于针对第二控件的第六操作后,确认消除第二电子设备上存在的安全风险事项。
这样,在第二电子设备消除第二电子设备上存在的安全风险事项之后,第一电子设备可以显示提示信息,告知用户第二电子设备已执行的操作,并可提供用户取消第二电子设备已执行的操作的选项。
可选的,该提示信息也可以显示在第二电子设备上。
结合第一方面,在一种可能的实现方式中,消除第二电子设备上存在的安全风险事项包括开启第二电子设备支持的安全功能、消除第二电子设备在第一时长内产生的安全风险事件、执行针对第二电子设备的安全保护建议。
第二方面,本申请提供了一种设备安全处理方法,方法包括:第一电子设备显示第一用户界面或者第一提示信息,第一用户界面中显示有针对第二电子设备上存在的安全风险事项,第一提示信息用于提示第二电子设备上存在安全风险事项,第二电子设备上存在安全风险事项与用户隐私相关;第一电子设备接收用户针对第一用户界面或者针对第一提示信息的第一操作;第一操作用于消除第二电子设备上存在的安全风险事项;在接收到第一操作后,第一电子设备向第二电子设备发送第一指令,第一指令用于指示第二电子设备消除第二电子设备上存在的安全风险事项。
这样,用户可以在第一电子设备上查看第二电子设备上存在的安全风险事项。在用户不方便在第二电子设备上操作的情况下,第一电子设备可以接收用户操作消除第二电子设备上存在的安全风险事项,保证 第二电子设备的设备安全,避免第二电子设备上的用户数据泄露。
结合第二方面,在一种可能的实现方式中,在第一电子设备向第二电子设备发送第一指令之后,方法还包括:第一电子设备在第一用户界面中停止显示第二电子设备上存在的安全风险事项,或者停止显示第一提示信息。
这样,在第一电子设备第二电子设备发送第一指令后,第一电子设备上可以停止显示第二电子设备上存在的安全风险事件。
结合第二方面,在一种可能的实现方式中,在第一电子设备向第二电子设备发送第一指令之后,方法还包括:第一电子设备接收第二电子设备发送的第二指令,第二指令用于指示第二电子设备已将第二电子设备上存在的安全风险事项消除掉;响应于第二指令,第一电子设备在第一用户界面中停止显示第二电子设备上存在的安全风险事项,或者停止显示第一提示信息。
这样,在第一电子设备确定出第二电子设备已消除第二电子设备上存在的安全风险事件后,第一电子设备上可以停止显示第二电子设备上存在的安全风险事件。
结合第二方面,在一种可能的实现方式中,第二电子设备上存在的安全风险事项包括一个或多个事项,第一操作为消除第二电子设备上存在的安全风险事项中第一事项的操作。
这样,第一电子设备可以接收用户一个一个的消除第二电子设备上存在的安全风险事项。以实现游湖有选择性地消除第二电子设备上存在的一个或多个安全风险事项。
结合第二方面,在一种可能的实现方式中,第二电子设备上存在的安全风险事项包括一个或多个事项,第一操作为消除第二电子设备上存在的安全风险事项中全部事项的操作。
这样,第一电子设备可以接收用户“一键消除”第二电子设备上存在的全部安全风险事项,节省用户的操作,方便快捷。
结合第二方面,在一种可能的实现方式中,在第一电子设备显示第一用户界面之前,方法还包括:第一电子设备显示第二用户界面,第二用户界面中包括有第一电子设备的设备选项和第二电子设备的设备选项,述第一电子设备的设备选项中包括第一电子设备的安全等级指示符、述第二电子设备的设备选项中包括第二电子设备的安全等级指示符;安全等级指示符用于指示电子设备的安全状态,安全状态包括高风险、中风险、低风险和无风险中的任意一项;第一电子设备显示第一用户界面,具体包括:第一电子设备接收并响应用户针对第二用户界面中第二电子设备的设备选项的第二操作,显示第一用户界面。
可选的,若第一电子设备的安全状态和第二电子设备的安全状态不同,那么第一电子设备的安全等级指示符与第二电子设备的安全等级指示符不同。
这样,第一电子设备可以显示第一电子设备和/或其他设备的安全状态,以便用户可以对第一电子和第二电子设备的安全状态进行监测,并对安全状态差的电子设备进行管控。
结合第二方面,在一种可能的实现方式中,在第一电子设备显示第二用户界面之后,在第一电子设备显示第一用户界面之前,方法还包括:第一电子设备接收并响应用户针对第二用户界面中的第三操作,显示第三用户界面,第三用户界面中显示有针对第一电子设备上存在的安全风险事项和第二电子设备上存在的安全风险事项;第一电子设备,接收用户针对第三用户界面的第四操作;第四操作用于消除第一电子设备上的安全风险事项和第二电子设备上存在的安全风险事项;响应于第四操作,第一电子设备消除第一电子设备上存在的安全风险事项,并向第二电子设备发送第三指令;第三指令用于指示第二电子设备消除第二电子设备上存在的安全风险事项。
可选的,用户可以在第一电子设备上操作一个一个的消除第一电子设备和第二电子设备共有的安全风险事项。例如,第一电子设备和第二电子设备上共存应用一和应用二,且应用一和应用二为不良应用,用户可以在第一电子设备上操作,“一键卸载”第一电子设备和第二电子设备共存的应用一。第一电子设备还可以接收用户操作,“一键卸载”第一电子设备和第二电子设备共存的应用二。
可选的,用户可以在第一电子设备上操作“一键”消除第一电子设备和第二电子设备共有的全部安全风险事项。例如,第一电子设备和第二电子设备上共存应用一和应用二,且应用一和应用二为不良应用,用户可以在第一电子设备上操作,“一键卸载”第一电子设备和第二电子设备共存的应用一和应用二,操作简单。
结合第二方面,在一种可能的实现方式中,在接收到第一操作后,第一电子设备向第二电子设备发送第一指令,具体包括:在接收到第一操作后,第一电子设备显示第二提示信息,第二提示信息中包括第一控件,第二提示信息用于提示是否消除第二电子设备上存在的安全风险事项;第一电子设备接收并响应于针对第一控件的第五操作,向第二电子设备发送第一指令。
这样,在第二电子设备消除第二电子设备上存在的安全风险事项之前,第一电子设备可以显示提示信息,避免用户误操作。
可选的,该提示信息也可以显示在第二电子设备上。
结合第二方面,在一种可能的实现方式中,在第一电子设备向第二电子设备发送第一指令之后,方法还包括:第一电子设备接收第二电子设备发送的第二指令,第二指令用于指示第二电子设备已消除第二电子设备上存在的安全风险事项;在接收到第二指令后,第一电子设备显示第三提示信息,第三提示信息中包括第二控件,第三提示信息用于提示是否取消消除第二电子设备上存在的安全风险事项;第一电子设备接收并响应于针对第二控件的第六操作后,确认消除第二电子设备上存在的安全风险事项。
这样,在第二电子设备消除第二电子设备上存在的安全风险事项之后,第一电子设备可以显示提示信息,告知用户第二电子设备已执行的操作,并可提供用户取消第二电子设备已执行的操作的选项。
可选的,该提示信息也可以显示在第二电子设备上。
结合第二方面,在一种可能的实现方式中,消除第二电子设备上存在的安全风险事项包括开启第二电子设备支持的安全功能、消除第二电子设备在第一时长内产生的安全风险事件、执行针对第二电子设备的安全保护建议。
第三方面,本申请提供了一种电子设备,为第一电子设备,第一电子设备包括:一个或多个处理器、一个或多个存储器;一个或多个存储器与一个或多个处理器耦合,一个或多个存储器用于存储计算机程序代码,计算机程序代码包括计算机指令,一个或多个处理器调用计算机指令以使得第一电子设备执行上述任一方面任一可能的实现方式中提供的一种设备安全处理方法。
第四方面,本申请提供了一种计算机可读存储介质,用于存储计算机指令,当计算机指令在第一电子设备上运行时,使得第一电子设备执行上述任一方面任一可能的实现方式中提供的一种设备安全处理方法。
第五方面,本申请提供了一种计算机程序产品,当计算机程序产品在第一电子设备上运行时,使得第一电子设备执行上述任一方面任一可能的实现方式中提供的一种设备安全处理方法。
对于第二方面至第五方面的有益效果,可以参考第一方面中有益效果的描述,本申请实施例在此不再赘述。
附图说明
图1为本申请实施例提供的一种系统架构示意图;
图2为本申请实施例提供的一种系统架构示意图;
图3为本申请实施例提供的一种电子设备100的软件结构框图;
图4A为本申请实施例提供的一种电子设备100上的多个功能模块的交互示意图;
图4B为本申请实施例提供的一种电子设备100显示提示信息的示意图;
图4C为本申请实施例提供的一种电子设备100显示服务卡片的示意图;
图5A-图5J为本申请实施例提供的一组电子设备100可以显示一个或多个设备的设备安全状态的示意图;
图6A-图6E为本申请实施例提供的一组电子设备100显示某一个设备的安全状态的示意图;
图6F-图6J为本申请实施例提供的一组针对电子设备200给出的多个安全保护建议的示意图;
图6K-图6N为本申请实施例提供的一组电子设备100接收用户操作“一键消除”电子设备200上存在的全部安全隐患的示意图;
图7A-图7H为本申请实施例提供的一组在电子设备100上查看电子设备200上在一定时间内产生的安全事件的示意图;
图8为本申请实施例提供的一种设备安全处理方法的方法流程示意图。
具体实施方式
下面将结合附图对本申请实施例中的技术方案进行清楚、详尽地描述。其中,在本申请实施例的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;文本中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,另外,在本申请实施例的描述中,“多个”是指两个或多于两个。
以下,术语“第一”、“第二”仅用于描述目的,而不能理解为暗示或暗示相对重要性或者隐含指明所指 示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征,在本申请实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。
本申请以下实施例中的术语“用户界面(user interface,UI)”,是应用程序或操作系统与用户之间进行交互和信息交换的介质接口,它实现信息的内部形式与用户可以接受形式之间的转换。用户界面常用的表现形式是图形用户界面(graphic user interface,GUI),是指采用图形方式显示的与计算机操作相关的用户界面。它可以是在电子设备的显示屏中显示的文本、图标、按钮、菜单、选项卡、文本框、对话框、状态栏、导航栏、Widget等可视的界面元素。
在介绍本申请实施例之前,首先对本申请实施例涉及的技术属于进行解释。
1、安全风险
电子设备上的安全风险指的是电子设备上安装的应用存在风险,或者电子设备上接收的某些信息存在风险,该某些应用或者某些信息可能会盗取用户的个人数据。
例如某些应用可以获取到电子设备上存储的通话记录、联系人信息、应用的使用数据、账号和账号密码、财产等信息,导致个人信息泄露。再例如电子设备上接收的某些信息也可能会盗取用户的个人数据,导致个人信息泄露。
例如短信应用接收到垃圾短信,在用户点击该垃圾短信后,发送该垃圾短信的服务器可能会盗取电子设备上用户的个人数据,导致用户的个人信息泄露。
2、设备的安全状态
电子设备可以基于电子设备上存在的该某些应用或者某些信息的种类、数量、获取的信息数量等因素可以对电子设备的安全系数进行评分,作为电子设备的安全状态。电子设备的安全状态可以划分为高风险、中风险、低风险、无风险等多个不同的等级。
可选的,电子设备也可以对电子设备的安全系数进行打分,得到不同的分数,例如100分,例如80分,例如60分等等。该分数可以和上述电子设备的安全状态等级相对应。例如当设备的安全系数打分为100分时,对应的设备的安全状态等级为无风险。当设备的安全系数打分为70-100分时,对应的设备的安全状态等级为低风险。当设备的安全系数打分为50-70分时,对应的设备的安全状态等级为中风险。当设备的安全系数打分低于50分时,对应的设备的安全状态等级为高风险。
需要说明的是,上述设备的安全系数打分和设备的安全状态等级的对应关系仅用于解释本申请,本申请实施例对此不做限定。
其中,电子设备的安全状态为高风险时的安全系数评分低于电子设备的安全状态为中风险时的安全系数评分。电子设备的安全状态为中风险时的安全系数评分低于安全状态的安全状态为低风险时的安全系数评分。电子设备的安全状态为低风险时的安全系数评分低于电子设备的安全状态为无风险时的安全系数评分。
不仅限于上述几个等级的安全状态,在其他实施例中,还可以将电子设备的安全状态划分为更多的等级,或者也可以将电子设备的安全状态划分为与上述不同的等级,本申请实施例对此不做限定。
可选的,基于电子设备的不同等级的安全状态,电子设备可以显示不同的提示信息,提示用户改善电子设备的安全状态,避免用户的个人信息泄露。
具体的,当电子设备的安全状态为高风险时,电子设备可以显示“请立即优化”的提示信息。当电子设备的安全状态为中风险时,电子设备可以显示“请及时优化”的提示信息。当电子设备的安全状态为低风险时,电子设备可以显示“建议优化”的提示信息。当电子设备的安全状态为无风险时,电子设备可以显示“状态良好”的提示信息。
3、安全功能
安全功能开启后,可用于保护电子设备上的个人数据的安全,可以防止个人数据泄露。安全功能包括但不仅限于:病毒查杀功能、骚扰电话拦截功能、WLAN安全检测功能、防伪基站检测功能、纯净模式开启功能、安全输入法开启功能、验证码保护功能、支付保护功能、查找设备功能、锁屏密码开启功能等。
其中,病毒查杀功能用于检测电子设备上安装的应用是否为病毒应用或者是否为不良应用。
骚扰电话拦截功能用于检测来电号码是否为推销电话或者诈骗等骚扰,如果是,则拒绝接听。
WLAN安全检测功能用于检测附近的WLAN是否为安全的WLAN。
防伪基站检测功能用于检测附近的基站是否为安全的基站。
纯净模式开启功能用于在电子设备开启纯净模式功能之后,电子设备可以拦截自动安装的应用,避免在用户不知情的情况下安装了垃圾应用。
安全输入法开启功能用于在电子设备开启安全输入法功能之后,在用户在电子设备上输入密码时,电子设备会自动切换至安全键盘,避免密码泄露。
验证码保护功能用于在电子设备开启验证码保护功能之后,使得部分应用无法获取到验证码。
支付保护功能用于在电子设备开启支付保护功能之后,保护支付安全,例如在有风险时提示用户要不要继续支付。
查找设备功能用于在电子设备开启查找设备功能之后,在设备丢失的情况下,可以快速定位和追踪丢失的设备,并可以接收用户操作远程擦除丢失的设备上的数据,防止丢失的设备上的数据泄露。
锁屏密码开启功能用于在电子设备开启锁屏密码开启功能之后,在电子设备息屏之后,在电子设备再次亮屏之后,需用户输入锁屏密码后再进入电子设备的在锁屏之前的用户界面。
需要说明的是,电子设备上的安全功能还可以包括其他的功能,本申请实施例对此不做限定。
本申请实施例提供了一种对本地设备和互连的其它设备的安全功能、设备的安全状态、设备存在的安全风险以及解除设备风险建议的一系列功能进行展示。使得用户可以查看本地设备和互连的其它设备的安全状态、本地设备和互连的其它设备上的安全功能以及本地设备和互连的其它设备上存在的安全风险以及解除设备风险建议。本地设备还可以接收用户操作解除本地设备或者互连的其它设备上的安全风险,以提高本地设备或者互连的其它设备的安全,保证设备的正常使用,防止用户的隐私泄露。
图1为本申请实施例提供的一种系统架构示意图。
该系统中可以包括有多个电子设备。多个电子设备的设备类型可以为各种类型,本申请实施例对该多个电子设备的具体类型不作特殊限制。例如,该多个电子设备包括手机,还可以包括平板电脑、桌面型计算机、膝上型计算机、手持计算机、笔记本电脑、智慧屏、可穿戴式设备、增强现实(augmented reality,AR)设备、虚拟现实(virtual reality,VR)设备、人工智能(artificial intelligence,AI)设备、车机、智能耳机,游戏机,还可以包括物联网(internet of things,IOT)设备或智能家居设备如智能热水器、智能灯具、智能空调等等。不限于此,系统10中的多个设备还可以包括具有触敏表面或触控面板的膝上型计算机(laptop)、具有触敏表面或触控面板的台式计算机等非便携式终端设备等等。
在系统包括多个电子设备(例如电子设备100、电子设备200、电子设备300)的情况下,电子设备100分别与电子设备200、电子设备300建立了通信连接,电子设备100不仅可以展示电子设备100的设备安全状态、电子设备100上的安全能力以及存在的安全风险,电子设备100还可以分别展示电子设备200、电子设备300的、设备安全状态、安全能力以及存在的安全风险。
可选的,该系统中也可以仅包括一个电子设备(例如电子设备100)。在这种情况下,电子设备100可以展示电子设备100上的安全能力以及存在的安全风险。
该多个电子设备可以配置不同的软件操作系统(operating system,OS),包括但不限于 等等。其中,为华为的鸿蒙系统。
该多个电子设备也可以都配置相同的软件操作系统,例如可以均配置
该多个电子设备可以通过以下任意一种方式建立通信连接。
方式一:该多个电子设备可以是连入同一个网络,例如,该多个电子设备可以连入同一个局域网,建立通信连接。
方式二:该多个电子设备还可以登录同一个系统账号,建立通信连接。例如,该多个电子设备登录的系统账号都可以为“HW1234”。
方式三:该多个电子设备上登录的系统账号可以都属于同一个账户组。例如,该多个电子设备上登录的系统账号包括有“HW001”,“HW002”,“HW003”。系统账户“HW001”,“HW002”,“HW003”同属于账户组“华为之家”。
方式四:多个电子设备可以通过近场通信(Near Field Communication,NFC)、蓝牙(bluetooth,BT)、无线局域网(wireless local area networks,WLAN)例如无线保真点对点(wireless fidelity point to point,Wi-Fi  P2P)、红外技术(infrared,IR)等方式建立通信连接。
方式五:多个电子设备可以通过扫描同一个二维码建立一个临时账户组,建立组网连接实现通信。
不限于上述五种方式,电子设备100还可以通过其他的方式建立通信连接,本申请实施例对此不做限定。
此外,多个电子设备也可以结合上述任意几种方式来连接并通信,本申请实施例对此也不做限制。
图2示出了一种系统架构示意图。
电子设备100可以是手机、平板电脑、桌面型计算机、膝上型计算机、手持计算机、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本,以及蜂窝电话、个人数字助理(personal digital assistant,PDA)、增强现实(augmented reality,AR)设备、虚拟现实(virtual reality,VR)设备、人工智能(artificial intelligence,AI)设备、可穿戴式设备、车载设备、智能家居设备和/或智慧城市设备,本申请实施例对该电子设备的具体类型不作特殊限制。
电子设备100可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。
可以理解的是,本发明实施例示意的结构并不构成对电子设备100的具体限定。在本申请另一些实施例中,电子设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。
I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根串行时钟线(derail clock line,SCL)。在一些实施例中,处理器110可以包含多组I2C总线。处理器110可以通过不同的I2C总线接口分别耦合触摸传感器180K,充电器,闪光灯,摄像头193等。例如:处理器110可以通过I2C接口耦合触摸传感器180K,使处理器110与触摸传感器180K通过I2C总线接口通信,实现电子设备100的触摸功能。
I2S接口可以用于音频通信。在一些实施例中,处理器110可以包含多组I2S总线。处理器110可以通过I2S总线与音频模块170耦合,实现处理器110与音频模块170之间的通信。在一些实施例中,音频模块170可以通过I2S接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。
PCM接口也可以用于音频通信,将模拟信号抽样,量化和编码。在一些实施例中,音频模块170与无线通信模块160可以通过PCM总线接口耦合。在一些实施例中,音频模块170也可以通过PCM接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。所述I2S接口和所述PCM接口都可以用于音频通信。
UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在串行通信与并行通信之间转换。在一些实施例中,UART接口通常被用于连接处理器110与无线通信模块160。例如:处理器110通过UART接口与无线通信模块160中的蓝牙模块通信,实现蓝牙功能。在一些实施例中,音频模块170可以通过UART接口向无线通信模块160传递音频信号,实现通过蓝牙耳机播放音乐的功能。
MIPI接口可以被用于连接处理器110与显示屏194,摄像头193等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI),显示屏串行接口(display serial interface,DSI)等。在一些实施例中,处理器110和摄像头193通过CSI接口通信,实现电子设备100的拍摄功能。处理器110和显示屏194通过DSI接口通信,实现电子设备100的显示功能。
GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据信号。在一些实施例中,GPIO接口可以用于连接处理器110与摄像头193,显示屏194,无线通信模块160,音频模块170,传感器模块180等。GPIO接口还可以被配置为I2C接口,I2S接口,UART接口,MIPI接口等。
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为电子设备100充电,也可以用于电子设备100与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他电子设备,例如AR设备等。
可以理解的是,本发明实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对电子设备100的结构限定。在本申请另一些实施例中,电子设备100也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块140可以通过电子设备100的无线充电线圈接收无线充电输入。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为电子设备供电。
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,显示屏194,摄像头193,和无线通信模块160等供电。电源管理模块141还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。
电子设备100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。
天线1和天线2用于发射和接收电磁波信号。电子设备100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在电子设备100上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件 中。
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A,受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。
无线通信模块160可以提供应用在电子设备100上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,电子设备100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备100可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
电子设备100通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备100可以包括1个或N个显示屏194,N为大于1的正整数。
电子设备100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备100可以包括1个或N个摄像头193,N为大于1的正整数。
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如, 当电子设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。
视频编解码器用于对数字视频压缩或解压缩。电子设备100可以支持一种或多种视频编解码器。这样,电子设备100可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备100的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。
内部存储器121可以包括一个或多个随机存取存储器(random access memory,RAM)和一个或多个非易失性存储器(non-volatile memory,NVM)。
随机存取存储器可以包括静态随机存储器(static random-access memory,SRAM)、动态随机存储器(dynamic random access memory,DRAM)、同步动态随机存储器(synchronous dynamic random access memory,SDRAM)、双倍资料率同步动态随机存取存储器(double data rate synchronous dynamic random access memory,DDR SDRAM,例如第五代DDR SDRAM一般称为DDR5SDRAM)等;
非易失性存储器可以包括磁盘存储器件、快闪存储器(flash memory)。
快闪存储器按照运作原理划分可以包括NOR FLASH、NAND FLASH、3D NAND FLASH等,按照存储单元电位阶数划分可以包括单阶存储单元(single-level cell,SLC)、多阶存储单元(multi-level cell,MLC)、三阶储存单元(triple-level cell,TLC)、四阶储存单元(quad-level cell,QLC)等,按照存储规范划分可以包括通用闪存存储(英文:universal flash storage,UFS)、嵌入式多媒体存储卡(embedded multi media Card,eMMC)等。
随机存取存储器可以由处理器110直接进行读写,可以用于存储操作系统或其他正在运行中的程序的可执行程序(例如机器指令),还可以用于存储用户及应用程序的数据等。
非易失性存储器也可以存储可执行程序和存储用户及应用程序的数据等,可以提前加载到随机存取存储器中,用于处理器110直接进行读写。
外部存储器接口120可以用于连接外部的非易失性存储器,实现扩展电子设备100的存储能力。外部的非易失性存储器通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部的非易失性存储器中。
电子设备100可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。电子设备100可以通过扬声器170A收听音乐,或收听免提通话。
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当电子设备100接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。电子设备100可以设置至少一个麦克风170C。在另一些实施例中,电子设备100可以设置两个麦克风170C,除了采集声音信号,还可以实现降噪功能。在另一些实施例中,电子设备100还可以设置三个,四个或更多麦克风170C,实现采集声音信号,降噪,还可以识别声音来源,实现定向录音功能等。
耳机接口170D用于连接有线耳机。耳机接口170D可以是USB接口130,也可以是3.5mm的开放移动电子设备平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中,压力传感器180A可以设置于显示屏194。压力传感器180A的种类很多,如电阻式压力传感器,电感式压力传感器,电容式压力传感器等。电容式压力传感器可以是包括至少两个具有导电材料的平行板。当有力作用于压力 传感器180A,电极之间的电容改变。电子设备100根据电容的变化确定压力的强度。当有触摸操作作用于显示屏194,电子设备100根据压力传感器180A检测所述触摸操作强度。电子设备100也可以根据压力传感器180A的检测信号计算触摸的位置。在一些实施例中,作用于相同触摸位置,但不同触摸操作强度的触摸操作,可以对应不同的操作指令。例如:当有触摸操作强度小于第一压力阈值的触摸操作作用于短消息应用图标时,执行查看短消息的指令。当有触摸操作强度大于或等于第一压力阈值的触摸操作作用于短消息应用图标时,执行新建短消息的指令。
陀螺仪传感器180B可以用于确定电子设备100的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定电子设备100围绕三个轴(即,x,y和z轴)的角速度。陀螺仪传感器180B可以用于拍摄防抖。示例性的,当按下快门,陀螺仪传感器180B检测电子设备100抖动的角度,根据角度计算出镜头模组需要补偿的距离,让镜头通过反向运动抵消电子设备100的抖动,实现防抖。陀螺仪传感器180B还可以用于导航,体感游戏场景。
气压传感器180C用于测量气压。在一些实施例中,电子设备100通过气压传感器180C测得的气压值计算海拔高度,辅助定位和导航。
磁传感器180D包括霍尔传感器。电子设备100可以利用磁传感器180D检测翻盖皮套的开合。在一些实施例中,当电子设备100是翻盖机时,电子设备100可以根据磁传感器180D检测翻盖的开合。进而根据检测到的皮套的开合状态或翻盖的开合状态,设置翻盖自动解锁等特性。
加速度传感器180E可检测电子设备100在各个方向上(一般为三轴)加速度的大小。当电子设备100静止时可检测出重力的大小及方向。还可以用于识别电子设备姿态,应用于横竖屏切换,计步器等应用。
距离传感器180F,用于测量距离。电子设备100可以通过红外或激光测量距离。在一些实施例中,拍摄场景,电子设备100可以利用距离传感器180F测距以实现快速对焦。
接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。电子设备100通过发光二极管向外发射红外光。电子设备100使用光电二极管检测来自附近物体的红外反射光。当检测到充分的反射光时,可以确定电子设备100附近有物体。当检测到不充分的反射光时,电子设备100可以确定电子设备100附近没有物体。电子设备100可以利用接近光传感器180G检测用户手持电子设备100贴近耳朵通话,以便自动熄灭屏幕达到省电的目的。接近光传感器180G也可用于皮套模式,口袋模式自动解锁与锁屏。
环境光传感器180L用于感知环境光亮度。电子设备100可以根据感知的环境光亮度自适应调节显示屏194亮度。环境光传感器180L也可用于拍照时自动调节白平衡。环境光传感器180L还可以与接近光传感器180G配合,检测电子设备100是否在口袋里,以防误触。
指纹传感器180H用于采集指纹。电子设备100可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。
温度传感器180J用于检测温度。在一些实施例中,电子设备100利用温度传感器180J检测的温度,执行温度处理策略。例如,当温度传感器180J上报的温度超过阈值,电子设备100执行降低位于温度传感器180J附近的处理器的性能,以便降低功耗实施热保护。在另一些实施例中,当温度低于另一阈值时,电子设备100对电池142加热,以避免低温导致电子设备100异常关机。在其他一些实施例中,当温度低于又一阈值时,电子设备100对电池142的输出电压执行升压,以避免低温导致的异常关机。
触摸传感器180K,也称“触控器件”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于电子设备100的表面,与显示屏194所处的位置不同。
骨传导传感器180M可以获取振动信号。在一些实施例中,骨传导传感器180M可以获取人体声部振 动骨块的振动信号。骨传导传感器180M也可以接触人体脉搏,接收血压跳动信号。在一些实施例中,骨传导传感器180M也可以设置于耳机中,结合成骨传导耳机。音频模块170可以基于所述骨传导传感器180M获取的声部振动骨块的振动信号,解析出语音信号,实现语音功能。应用处理器可以基于所述骨传导传感器180M获取的血压跳动信号解析心率信息,实现心率检测功能。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。电子设备100可以接收按键输入,产生与电子设备100的用户设置以及功能控制有关的键信号输入。
马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏194不同区域的触摸操作,马达191也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。
指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。
SIM卡接口195用于连接SIM卡。
电子设备100的软件系统可以采用分层架构,事件驱动架构,微核架构,微服务架构,或云架构。本发明实施例以分层架构的Android系统为例,示例性说明电子设备100的软件结构。
图3是本发明实施例的电子设备100的软件结构框图。
分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,以及内核层。
应用程序层可以包括一系列应用程序包。应用程序包可以包括相机,图库,日历,通话,地图,导航,WLAN,蓝牙,音乐,视频,短信息等应用程序。
如图3所示,应用程序层还包括设备安全状态展示模块、设备安全风险及解除安全风险建议展示模块、设备安全功能展示模块、设备安全事件记录模块。
其中,设备安全状态展示模块用于电子设备备展示本地设备或者互连的其他设备的安全状态。
电子设备的安全状态可以划分为高风险、中风险、低风险、无风险等多个不同的等级。
电子设备也可以对电子设备的安全系数进行打分,得到不同的分数,例如100分,例如80分,例如60分等等。该分数可以和上述电子设备的安全状态等级相对应。例如当设备的安全系数打分为100分时,对应的设备的安全状态等级为无风险。当设备的安全系数打分为70-100分时,对应的设备的安全状态等级为低风险。当设备的安全系数打分为50-70分时,对应的设备的安全状态等级为中风险。当设备的安全系数打分低于50分时,对应的设备的安全状态等级为高风险。
具体的,可以参考图5C所示的实施例。
设备安全风险及解除安全风险建议展示模块用于电子设备展示本地设备或者互连的其他设备的上存在的安全风险,以及如何解除该安全风险的建议。
具体的,可以参考图6G-图6N所示的实施例。
设备安全功能展示模块用于电子设备展示本地设备或者互连的其他设备的支持的安全功能。
设备安全事件记录模块用于电子设备展示本地设备或者互连的其他设备的在一定时间内产生的安全事件。
具体的,可以参考图7B-图7F所示的实施例。
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。
如图3所示,应用程序框架层可以包括窗口管理器,内容提供器,视图系统,电话管理器,资源管理器,通知管理器和安全数据平台等。
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。
内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。
电话管理器用于提供电子设备100的通信功能。例如通话状态的管理(包括接通,挂断等)。
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。
安全数据平台提供了以下多种能力:设备发现能力、设备安全事件存储能力、设备安全风险计算能力、设备安全功能管理能力等。
其中,设备发现能力用于电子设备100发现互连的设备。
设备安全事件存储能力用于存储电子设备100上的或者互连的其它设备发送的在一定时间内产生的设备安全事件以及设备支持的安全能力。
设备安全风险计算能力用于电子设备100基于电子设备100上的设备安全事件计算得到电子设备100的设备安全风险等级,或者电子设备100也可以基于互连的其它设备发送的设备安全事件计算得到互连的其它设备的设备安全风险等级。设备安全风险计算能力还用于基于电子设备100上存在的安全风险和/或电子设备200上存在的安全风险呈现相关的解除该安全风险的建议。
设备安全功能管理能力用于电子设备100展示电子设备100支持的安全功能,或者基于展示互连的其它设备发送的设备安全能力展示互连的其它设备支持的安全功能。电子设备100也可以接收用户的操作,对电子设备100的安全功能进行控制或者对互连的其它设备的安全功能进行控制。例如控制安全功能开启或者关闭等。
Android Runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。
核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。
应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(Media Libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。
2D图形引擎是2D绘图的绘图引擎。
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。
下面结合捕获拍照场景,示例性说明电子设备100软件以及硬件的工作流程。
当触摸传感器180K接收到触摸操作,相应的硬件中断被发给内核层。内核层将触摸操作加工成原始输入事件(包括触摸坐标,触摸操作的时间戳等信息)。原始输入事件被存储在内核层。应用程序框架层从内核层获取原始输入事件,识别该输入事件所对应的控件。以该触摸操作是触摸单击操作,该单击操作所对应的控件为相机应用图标的控件为例,相机应用调用应用框架层的接口,启动相机应用,进而通过调用内核层启动摄像头驱动,通过摄像头193捕获静态图像或视频。
图4A示例性示出了电子设备100上的多个功能模块的交互示意图。
如图4A所示,设备发现模块用于电子设备100发现当前与电子设备100建立通信连接的电子设备。
若当前无电子设备100建立通信连接,则电子设备100可以仅展示电子设备100的设备安全状态、电子设备100上存在的安全风险、电子设备100支持的安全功能、电子设备100上的安全事件等。
若当前有与电子设备100建立通信连接的其他设备,则电子设备100可以在展示电子设备100的设备安全状态、电子设备100上存在的安全风险、电子设备100支持的安全功能、电子设备100上的安全事件 之外,还可以展示与电子设备100建立通信连接的其他设备的设备安全状态、电子设备100上存在的安全风险、电子设备100支持的安全功能、电子设备100上的安全事件等。
具体的,其他电子设备(例如电子设备200)与电子设备100建立了通信连接,在一种可能的实现方式中,电子设备200可以将电子设备200支持的安全功能、电子设备200在一定时间内产生的安全事件等信息发送至电子设备100,电子设备100在接收到电子设备200发送的电子设备200支持的安全功能和电子设备200在一定时间内产生的安全事件等信息,通过设备安全风险计算能力模块基于电子设备200在一定时间内产生的安全事件等信息确定出电子设备200的设备安全状态、电子设备200上存在的安全风险。在其他可能的实现方式中,电子设备200可以在本地基于电子设备200在一定时间内产生的安全事件等信息确定出电子设备200的设备安全状态、电子设备200上存在的安全风险,电子设备200再将电子设备200支持的安全功能、电子设备200的设备安全状态、电子设备200上存在的安全风险发送至电子设备100。
设备安全风险计算模块也可以基于电子设备100在一定时间内产生的安全事件等信息确定出电子设备100的设备安全状态、电子设备100上存在的安全风险。
设备安全风险计算模块在确定出电子设备100的设备安全状态、电子设备100上存在的安全风险,和/或,电子设备200的设备安全状态、电子设备200上存在的安全风险后,设备安全风险计算模块可以通过设备安全状态展示模块展示电子设备100的设备安全状态设备安全风险计算模块电子设备200的设备安全状态,也可以通过设备安全风险及解除安全风险建议展示模块展示电子设备100上存在的安全风险设备安全风险计算模块电子设备200上存在的安全风险。设备安全风险计算模块也可以基于电子设备100上存在的安全风险和/或电子设备200上存在的安全风险通过设备安全风险及解除安全风险建议展示模块展示相应的解除安全风险的建议。
设备安全事件存储模块在获取到电子设备100在一定时间内产生的安全事件和电子设备200在一定时间内产生的安全事件后,将电子设备100在一定时间内产生的安全事件和电子设备200在一定时间内产生的安全事件存储在电子设备100上。同时,设备安全事件存储模块可以通过设备安全事件记录模块分别展示电子设备100和电子设备200在一定时间内产生的安全事件。
设备安全功能管理模块在获取到电子设备100支持的安全能力和电子设备200支持的安全能力后,可以通过设备安全展示模块分别展示电子设备100支持的安全能力和电子设备200支持的安全能力。
可选,电子设备100也可以接收用户的操作,控制电子设备100和电子设备200上的一种或多种安全功能开启或者关闭,提高电子设备100和电子设备200上的个人信息的安全性。
可选的,若电子设备200与电子设备100断开连接之后,电子设备100不在显示电子设备200的安全状态以及电子设备200上存在的安全风险。
接下来结合UI图对本申请实施例提供的一种设备安全处理方法进行详细的介绍。
需要说明的是,以下UI图仅用于解释本申请,在实际应用中用户界面的显示形式可能会不同,本申请实施例对此不做限定。
在一些实施例中,在电子设备100与其他电子设备(例如电子设备200)建立通信连接之后,电子设备100在监测到电子设备200上存在安全风险后,电子设备200可以弹窗提示用户是否需清理电子设备100上存在的安全风险。示例性的,如图4B所示,电子设备100可以显示提示信息450,提示信息450用于提示用户是否需清除电子设备200上存在的安全风险。其中,电子设备100可以接收用户针对提示信息450中控件460的输入操作(例如单击),响应于用户的输入操作,在一种可能的实现方式中,电子设备100可以先显示并供用户查看电子设备200上存在的安全风险,之后电子设备100再接收用户操作清除电子设备200上存在的安全风险。在其他可能的实现方式中,电子设备100可以先清除电子设备200上存在的安全风险,在显示提示信息提示用户查看已清除的安全风险包括哪些,电子设备100也可以接收用户操作取消已清除的电子设备200上存在的安全风险。具体的,可以参考图6A-图6N、图7A-图7G所示的实施例,本申请实施例在此不再赘述。
电子设备100也可以接收用户针对提示信息450中控件470的输入操作(例如单击),响应于用户的输入操作,电子设备100忽略此次提示,即不查看电子设备200上存在的安全风险也不清除电子设备200上存在的安全风险。
在其他实施例中,在电子设备100与其他电子设备(例如电子设备200)建立通信连接之后,电子设备100在监测到电子设备200上存在安全风险后,电子设备200可以服务建议显示区域提示用户是否需清 理电子设备100上存在的安全风险。示例性的,如图4C所示,电子设备200可以服务建议显示区域上显示服务卡片480。服务卡片480用于提示用户电子设备200上存在的安全风险,是否需要清除。其中,电子设备100可以接收用户针对服务卡片480中控件490的输入操作(例如单击),响应于用户的输入操作,在一种可能的实现方式中,电子设备100可以先显示并供用户查看电子设备200上存在的安全风险,之后电子设备100再接收用户操作清除电子设备200上存在的安全风险。在其他可能的实现方式中,电子设备100可以先清除电子设备200上存在的安全风险,在显示提示信息提示用户查看已清除的安全风险包括哪些,电子设备100也可以接收用户操作取消已清除的电子设备200上存在的安全风险。具体的,可以参考图6A-图6N、图7A-图7G所示的实施例,本申请实施例在此不再赘述。
电子设备100也可以接收用户针对服务卡片480中控件4110的输入操作(例如单击),响应于用户的输入操作,电子设备100忽略此次提示,即不查看电子设备200上存在的安全风险也不清除电子设备200上存在的安全风险。
不仅限于图4B和图4C所示的显示的提示信息450和服务卡片480,电子设备100也可以在下拉通知栏中显示提示信息,以提示用户是否需查看并清除电子设备200上存在的安全风险。
可选的,当电子设备100上存在安全风险时,电子设备100也可以基于图4A和图4B所示的实施例提示用户电子设备100上存在的安全风险。本申请实施例在此不再赘述。
在其他实施例中,电子设备100也可以在设置应用中查看电子设备100上和与电子设备200建立连接的电子设备上存在的安全风险。
图5A-图5J示例性示出了电子设备100可以显示一个或多个设备的设备安全状态的示意图。
图5A示例性示出了电子设备100的主界面。图5A中示出了多个应用的图标,例如文件管理应用的图标、电子邮件应用的图标、音乐应用的图标、智慧生活应用的图标、运动健康应用的图标、设置应用的图标、相机应用的图标、通讯录应用的图标、电话应用的图标、信息应用的图标等等。图5A还示出了页面指示符、天气指示符、日历指示符、电量指示符、时间指示符、信号指示符等等。
如图5A所示,电子设备100接收用户针对设置应用的图标的输入操作(例如单击),响应于用户的输入操作,电子设备100显示如图5B所示的用户界面501。用户界面501中示出了多个设置项,例如飞行模式设置项(当前飞行模式已关闭)、Wi-Fi设置项(当前Wi-Fi已关闭)、蓝牙设置项(当前蓝牙功能关闭)、个人热点设置项、移动网络设置项、勿扰模式设置项、显示与亮度设置项、华为账号设置项、安全设置项等等。
如图5B所示,电子设备100接收用户针对安全设置项的输入操作(例如单击),响应于用户的输入操作,电子设备100显示如图5C所示的用户界面502。
用户界面502中出示出了三部分内容,一个是本地设备的设备安全状态和/或互连的其它设备的设备安全状态。另一个是电子设备100的安全功能。最后一个是本地设备和互连的其它设备在一定时间内的安全事件。
首先介绍用户界面502中显示的设备的安全状态。
当电子设备100连接有其他设备时,用户界面502中显示有电子设备100的设备的安全状态,以及与电子设备100建立通信连接的其他设备的安全状态。
设备的安全状态包括但不仅限于设备名称、设备的安全状态指示符、设备的安全建议等等。设备的安全状态等级不同,对应的设备的安全建议也不同。
如图5C所示,用户界面502中示出了四种设备的安全状态。
其中,“Li的通讯工具”为电子设备100的设备名称,电子设备100的设备的安全状态指示符为5021,安全状态指示符为5021用于指示电子设备100的安全状态为“低风险”,电子设备100的安全建议为“建议优化”。
“MatePad Pro”为与电子设备100建立通信连接的其中一个设备的设备名称。“MatePad Pro”设备的安全状态指示符为5022,安全状态指示符为5022用于指示“MatePad Pro”的安全状态为“高风险”,“MatePad Pro”的安全建议为“请立即优化”。
“MatePad Pro2”为与电子设备100建立通信连接的其中一个设备的设备名称。“MatePad Pro2”设备的安全状态指示符为5023,安全状态指示符为5023用于指示“MatePad Pro2”的安全状态为“无风险”,“MatePad  Pro2”的安全建议为“状态良好”。
“Lisa的大屏”为与电子设备100建立通信连接的其中一个设备的设备名称。在电子设备100确定出“Lisa的大屏”的安全状态之前,电子设备100可以显示“同步中……”的字样,以提示用户正在同步显示“Lisa的大屏”的安全状态。
可选的,若当前没有与电子设备100建立通信连接的设备,如图5D所示,电子设备100可以仅在用户界面502显示电子设备100的安全状态。
用户界面502中还示出了电子设备100支持的几项比较重要的安全功能。例如,应用锁功能、密码保护箱功能、文件保护柜功能、查找设备功能等。
如图5D所示,电子设备100可以接收用户作用在用户界面502上的滑动操作(例如向上滑动操作),响应于用户的滑动操作,电子设备100可以显示其他未显示的内容。
如图5E所示,响应于用户的滑动操作,电子设备100显示用户界面503。用户界面503中还示出了电子设备100支持的安全功能,例如支付保护中心和防诈骗功能等等。电子设备100可以接收用户操作开启该一个或多个安全功能,以提高电子设备100的安全能力。
如图5E所示,用户界面503还示出了安全保护建议。该安全保护建议是针对电子设备100上的安全保护建议。例如安全保护建议可以包括:电子设备100上安装的“Perfecto pinball”应用被检测为病毒应用,建议您立即卸载或移入应用管控中心。电子设备100上安装的“暴风影音”应用被检测为病毒应用,建议您立即卸载或移入应用管控中心。电子设备100上安装的“速贷通”应用被检测为诈骗应用,建议卸载。该安全保护建议用于提示用户电子设备100上存在的安全风险,并提示用户通过具体的方法消除掉电子设备100上存在的安全风险。
如图5E所示,电子设备100可以继续接收用户作用在用户界面502上的滑动操作(例如向上滑动操作),响应于用户的滑动操作,电子设备100可以显示其他未显示的内容。
响应于用户的滑动操作,电子设备100可以显示电子设备100和/或与电子设备100互连的其它设备在一定时间内产生的安全事件记录。安全事件记录包括但不仅限于:安全事件类型、安全事件发生的时间、安全事件的内容等等。
当有与电子设备100建立通信连接的其它设备时,电子设备100可以显示电子设备100和与电子设备100互连的其它设备在一定时间内产生的安全事件记录。
当没有与电子设备100建立通信连接的其它设备时,电子设备100可以仅显示电子设备100在一定时间内产生的安全事件记录。
示例性的,如图5F所示,响应于用户的滑动操作,电子设备100显示用户界面504。用户界面504中显示的是电子设备100和与电子设备200互连的其它设备在一定时间内产生的安全事件记录。例如,安全事件记录可以是:今天下午4:48,安全事件类型为“骚扰拦截”,具体内容为“123123321232被拦截3次”。今天上午08:48,安全事件类型为“系统ROOT状态”,具体内容为“设备被root”。昨天下午9:17,安全事件类型为“病毒查杀”,具体内容为“发现2个病毒应用”。昨天下午09:00,安全事件类型为“病毒查杀”,具体内容为“发现2个不良应用”。昨天下午8:17,安全事件类型为“病毒查杀”,具体内容为“发现1个风险应用”。昨天上午9:48,安全事件类型为“锁屏密码”,具体内容为“已设置锁屏密码”。
可选的,用户界面503中也可以显示的是针对电子设备100和/或与电子设备100互连的其它设备的安全保护建议。
当有与电子设备100建立通信连接的其它设备时,电子设备100可以显示针对电子设备100和与电子设备100互连的其它设备的安全保护建议。
当没有与电子设备100建立通信连接的其它设备时,电子设备100可以仅显示针对电子设备100的安全保护建议。
如图5G所示,用户界面503中还包括”一键消除”控件512。电子设备100可以接收用户针对”一键消除”控件512的输入操作(例如单击),响应于用户的输入操作,电子设备100可以将电子设备100上和/或电子设备200上存在的安全隐患“一键”消除掉,节省用户操作。
响应于用户针对”一键消除”控件512的输入操作,电子设备100可以显示如图5H所示的提示栏513。
提示栏513中包括提示信息“确认是否卸载电子设备200上的Perfecto pinball应用、暴风影音应用、以 及开启电子设备200上的USB调试功能,卸载电子设备100上的速贷通应用吗?”,提示栏513中还包括取消选项和确认选项。这样,可以防止用户的误操作。
电子设备100可以接收用户针对提示栏513中取消选项的输入操作(例如单击),响应于用户的输入操作,电子设备100暂停消除电子设备100上和电子设备200上存在的安全隐患。电子设备100也可以接收用户针对提示栏513中确认选项的输入操作(例如单击),响应于用户的输入操作,电子设备100将消除电子设备100上和电子设备200上存在的全部安全隐患。
示例性的,如图5H所示,电子设备100接收用户针对提示栏513中确认选项的输入操作(例如单击),响应于用户的输入操作,电子设备100通过通信连接向电子设备200发送控制指令,该控制指令用于指示电子设备200卸载电子设备200上的Perfecto pinball应用、暴风影音应用,以及开启电子设备200上的USB调试功能。电子设备200在接收到电子设备100发送的控制指令后,将电子设备200上的Perfecto pinball应用、暴风影音应用卸载掉,并开启电子设备200上的USB调试功能。在执行该操作后,电子设备200向电子设备100发送执行成功消息。同时,电子设备100可以将电子设备100上安装的速贷通应用卸载掉。在电子设备100将电子设备100上安装的速贷通应用卸载掉后,以及在电子设备100接收到电子设备200发送的执行成功消息后,电子设备100可以显示如图5I所示的用户界面520。用户界面520中示出的针对电子设备100和电子设备200的安全保护建议为“暂时无建议”。
需要说明的是,提示栏513也可以显示在电子设备200上,本申请实施例对此不做限定。
本申请以下实施例描述的在电子设备100上显示的提示栏或者提示信息均可以显示在电子设备200上,或者同时显示在电子设备100上和电子设备200上,本申请实施例对此不做限定。
或者,如图5G所示,电子设备100可以接收用户针对“一键消除”控件512的输入操作(例如单击),响应于用户的输入操作,电子设备100通过通信连接向电子设备200发送控制指令,该控制指令用于指示电子设备200卸载电子设备200上的Perfecto pinball应用、暴风影音应用、速贷通应用、玫瑰拼拼应用,以及开启电子设备200上的USB调试功能。电子设备200在接收到电子设备100发送的控制指令后,将电子设备200上的Perfecto pinball应用、暴风影音应用,以及开启电子设备200上的USB调试功能。在执行该操作后,电子设备200向电子设备100发送执行成功消息.同时,电子设备100可以将电子设备100上安装的速贷通应用卸载掉。在电子设备100将电子设备100上安装的速贷通应用卸载掉后,以及在电子设备100接收到电子设备200发送的执行成功消息后,电子设备100可以显示如图5J所示的提示栏514。提示栏514中包括提示信息“已将电子设备200上的Perfecto pinball应用、暴风影音应用卸载,以及开启电子设备200上的USB调试功能,已将电子设备100上的速贷通应用卸载,是否需恢复之前的设置?”,提示栏514中还包括取消选项和确认选项。这样,可以防止用户的误操作。
电子设备100可以接收用户针对提示栏514中取消选项的输入操作(例如单击),响应于用户的输入操作,电子设备100确认执行消除电子设备100和电子设备200上存在的安全隐患。电子设备100也可以接收用户针对提示栏514中确认选项的输入操作(例如单击),响应于用户的输入操作,电子设备100取消执行消除电子设备100和电子设备200上存在的全部安全隐患。
示例性的,如图5J所示,电子设备100接收用户针对提示栏514中取消选项的输入操作(例如单击),响应于用户的输入操作,电子设备100确认执行消除电子设备100和电子设备200上存在的安全隐患。之后,电子设备200可以显示图5I所示的用户界面520。
需要说明的是,提示栏514也可以显示在电子设备200上,本申请实施例对此不做限定。
可选的,若用户界面503上仅显示的是针对电子设备100的安全保护建议。可以参考图5G-图5J所示的操作方法,“一键消除”电子设备100上存在的全部安全隐患,节省用户的操作,方便快捷。
在一些实施例中,电子设备100可以接收用户的操作,显示某一个设备的安全状态、该某一个设备的安全保护建议、该某一个设备支持的安全功能、该某一个设备在一定时间内产生的安全事件等。
其中,该某一个设备可以是电子设备100,也可以是与电子设备100建立通信连接的一个设备,本申请实施例对此不做限定。
图6A-图6E示例性示出了电子设备100显示某一个设备的安全状态的示意图。
示例性的,该某一个设备可以是与电子设备100建立通信连接的一个设备,例如可以为MatePad Pro,该MatePad Pro对应的电子设备可以被称为电子设备200。
如图6A所示,电子设备100接收用户针对用户界面502中电子设备200的图标的输入操作(例如单 击),响应于用户的输入操作,电子设备100可以显示如图6B所示的用户界面601。
用户界面601中示出了电子设备200支持的保护功能。如图6B所示,电子设备200支持的保护功能包括但不仅限于:病毒查杀功能、骚扰电话拦截功能、WLAN安全检测功能、防伪基站功能、纯净模式功能、安全输入法功能、验证码保护功能、支付保护功能、查找设备功能、锁屏密码功能等等。
电子设备200支持的保护功能可以与电子设备100支持的保护功能不同,本申请实施例对此不做限定。
需要说明的是,不同的设备支持的安全功能可能会不同。因此在电子设备200与电子设备100建立通信连接后,电子设备200需将支持的安全功能发送至电子设备100,以使得电子设备100可以在界面上显示电子设备200支持的安全功能。
电子设备100可以接收用户在用户界面601中的操作,开启/关闭电子设备200支持的一个或多个保护功能。
本申请实施例以如何在电子设备100上开启电子设备200上的“锁屏密码功能”为例进行说明。
如图6B所示,电子设备100接收用户针对用户界面601中“锁屏密码功能”选项的输入操作(例如单击),响应于用户的输入操作,电子设备100可以显示如图6C所示的用户界面602。用户界面602中示出的“锁屏密码功能”选项的显示状态为关闭状态。如图6C所示,电子设备100接收用户针对用户界面602中“锁屏密码功能”选项的输入操作(例如单击),响应于用户的输入操作,如图6D所示“锁屏密码功能”选项的显示状态由关闭状态切换显示为“开启状态”。具体的,在电子设备100接收用户针对用户界面602中“锁屏密码功能”选项的输入操作(例如单击)后,电子设备100通过通信连接向电子设备200发送开启指令,电子设备200在接收到开启指令之后,响应于开启指令,开启电子设备200上的锁屏密码功能。在电子设备200开启电子设备200上的锁屏密码功能后,电子设备200向电子设备100发送开启成功消息。在电子设备100接收到开启成功消息后,确定电子设备100开启了“锁屏密码功能”,则电子设备100可以将图6D所示“锁屏密码功能”选项的显示状态由关闭状态切换显示为“开启状态”。
可选的,如图6E所示,电子设备100也可以将用户界面601中“锁屏密码功能”选项的显示状态由关闭状态切换显示为“开启状态”。
图6F-图6J示例性示出了针对电子设备200给出的多个安全保护建议的示意图。
如图6F所示,电子设备100可以接收用户作用在用户界面601上的滑动操作(例如向上滑动操作),响应于用户的滑动操作,电子设备100可以显示电子设备200上其他的安全风险事项,例如安全保护建议。
如图6G所示,响应于用户的滑动操组,电子设备100可以显示用户界面602,用户界面602上示出了部分安全保护建议,该安全保护建议是针对电子设备200上的安全保护建议。例如安全保护建议可以包括:Perfecto pinball被检测为病毒应用,建议您立即卸载或移入应用管控中心。速贷通被检测为诈骗应用,建议卸载。玫瑰拼拼被检测为诈骗应用,建议卸载。Z4root被检测为风险应用,建议您立即卸载或者移入应用管控中心。建议关闭USB调试功能,防止恶意应用通过USB接口窃取数据。
可选的,电子设备100可以接收用户操作查看某一个安全保护建议的详情内容。例如,如图6G所示,电子设备100可以接收用户针对选项603的输入操作(例如单击),响应于用户的输入操作,电子设备100可以显示如图6H所示的用户界面604。
如图6H所,用户界面604为针对“Z4root”应用的管控界面。用户界面604中示出了针对“Z4root”应用的安全建议。例如“Z4root”应用为存在风险的应用,“Z4root”应用的风险等级为中风险,风险详情为“Z4root”应用中存在风险代码,该风险代码可能会盗取用户的个人信息,请在使用时注意。用户界面604中还示出了管控“Z4root”应用的选项和卸载“Z4root”应用的选项。其中,用户可以通过针对管控“Z4root”应用的选项的操作,关闭电子设备200上“Z4root”应用的部分权限,例如关闭访问相册的权限、关闭访问短信的权限等等。用户也可以通过针对卸载“Z4root”应用的选项的操作,将电子设备200上安装的“Z4root”应用卸载掉。
如图6H所示,电子设备100接收用户针对用户界面604中卸载“Z4root”应用的选项的输入操作(例如单击),响应于用户的输入操作,电子设备100可以显示如图6I所示的提示栏605,该提示栏605用于提示用户是否继续卸载“Z4root”应用。电子设备100可以接收用户针对提示栏605中取消控件的输入操作(例如单击),响应于用户的输入操作,电子设备100将暂停卸载电子设备200上安装的“Z4root”应用。电子设备100也可以接收用户针对提示栏605中卸载控件的输入操作(例如单击),响应于用户的输入操作,电子设备100将电子设备200上安装的“Z4root”应用卸载掉。具体的,在电子设备100接收用户针对提示栏 605中卸载控件的输入操作后,电子设备100可以通过通信连接向电子设备200发送卸载指令,电子设备200在接收到卸载指令之后,响应于卸载指令,将电子设备200上安装的“Z4root”应用卸载掉。
可选的,在一种可能的实现方式中,在电子设备100接收用户针对用户界面604中卸载“Z4root”应用的选项的输入操作后,电子设备100可以先向第二电子设备发送指令,以指示第二电子设备执行对应的操作。在第二电子设备执行完对应的操作后,第二电子设备向第一电子设备发送执行成功的消息,在第一电子设备接收到第二电子设备发送的执行成功的消息后,可以再显示如图6L所示的提示信息,以提示用户第二电子设备已执行的操作,并询问用户是否需取消第二电子设备已执行的操作。用户可以再次选择接受第二电子设备已执行的操作或者取消第二电子设备已执行的操作。
可选的,在电子设备200将电子设备200上安装的“Z4root”应用卸载掉后,电子设备200可以向电子设备100发送卸载成功消息。在电子设备100接收到电子设备200发送的卸载成功消息后,如图6J所示,电子设备100可以显示用户界面606。用户界面606与用户界面602的区别在于,用户界面606中显示的电子设备200的安全保护建议不包括“Z4root被检测为风险应用,建议您立即卸载或者移入应用管控中心”,即表示将“Z4root”应用从电子设备200上删除掉之后,消除了电子设备200上由于安装的“Z4root”应用带来的安全威胁。
在一些示例中,电子设备100可以接收用户针对用户界面606中“查看全部建议”选项的输入操作,这样,电子设备100可以显示针对电子设备200的全部安全保护建议,本申请实施例在此不再赘述。前述实施例中用户界面602和用户界面606中仅示例性示出了部分安全保护建议,该部分安全保护建议相比于未显示出来的安全保护建议,该部分安全保护建议可以理解为对电子设备200的安全保护作用更大。
前述图6G-图6J示例性示出了电子设备100可以接收用户的操作依次(一个一个地)消除电子设备200上存在的安全隐患。在一些示例中,电子设备100也可以接收用户的操作,“一键消除”电子设备200上存在的全部安全隐患,减少用户的操作。
图6K-图6N示例性示出了电子设备100接收用户操作“一键消除”电子设备200上存在的全部安全隐患的示意图。
如图6K所示,用户界面607中示出了“一键消除”选项608。电子设备100可以接收用户针对“一键消除”选项608的输入操作(例如单击),响应于用户的输入操作,电子设备100可以显示如图6L所示的提示栏609。提示栏609中包括提示信息“确认是否卸载电子设备200上的Perfecto pinball应用、暴风影音应用、速贷通应用、玫瑰拼拼应用,以及开启USB调试功能吗”,提示栏609中还包括取消选项和确认选项。这样,可以防止用户的误操作。
电子设备100可以接收用户针对提示栏609中取消选项的输入操作(例如单击),响应于用户的输入操作,电子设备100暂停消除电子设备200上存在的安全隐患。电子设备100也可以接收用户针对提示栏609中确认选项的输入操作(例如单击),响应于用户的输入操作,电子设备100将消除电子设备200上存在的全部安全隐患。
示例性的,如图6L所示,电子设备100接收用户针对提示栏609中确认选项的输入操作(例如单击),响应于用户的输入操作,电子设备100通过通信连接向电子设备200发送控制指令,该控制指令用于指示电子设备200卸载电子设备200上的Perfecto pinball应用、暴风影音应用、速贷通应用、玫瑰拼拼应用,以及开启电子设备200上的USB调试功能。电子设备200在接收到电子设备100发送的控制指令后,将电子设备200上的Perfecto pinball应用、暴风影音应用、速贷通应用、玫瑰拼拼应用卸载掉,并开启电子设备200上的USB调试功能。在执行该操作后,电子设备200向电子设备100发送执行成功消息,在电子设备100接收到执行成功消息后,电子设备100可以显示如图6M所示的用户界面610。用户界面610中示出的针对电子设备200的安全保护建议为“暂时无建议”。
或者,如图6K所示,电子设备100可以接收用户针对“一键消除”选项608的输入操作(例如单击),响应于用户的输入操作,电子设备100通过通信连接向电子设备200发送控制指令,该控制指令用于指示电子设备200卸载电子设备200上的Perfecto pinball应用、暴风影音应用、速贷通应用、玫瑰拼拼应用,以及开启电子设备200上的USB调试功能。电子设备200在接收到电子设备100发送的控制指令后,将电子设备200上的Perfecto pinball应用、暴风影音应用、速贷通应用、玫瑰拼拼应用卸载掉,并开启电子设备200上的USB调试功能。在执行该操作后,电子设备200向电子设备100发送执行成功消息,在电子设备100接收到执行成功消息后,电子设备100可以显示如图6N所示的提示栏611。提示栏611中包括提示信息“已将电子设备200上的Perfecto pinball应用、暴风影音应用、速贷通应用、玫瑰拼拼应用卸载,以及开启USB调试功能,是否需恢复之前的设置?”,提示栏611中还包括取消选项和确认选项。这样, 可以防止用户的误操作。
电子设备100可以接收用户针对提示栏611中取消选项的输入操作(例如单击),响应于用户的输入操作,电子设备100确认执行消除电子设备200上存在的安全隐患。电子设备100也可以接收用户针对提示栏611中确认选项的输入操作(例如单击),响应于用户的输入操作,电子设备100取消执行消除电子设备200上存在的全部安全隐患。
示例性的,如图6N所示,电子设备100接收用户针对提示栏611中取消选项的输入操作(例如单击),响应于用户的输入操作,电子设备100确认执行消除电子设备200上存在的安全隐患。之后,电子设备200可以显示图6M所示的用户界面610。
可选的,电子设备100也可以接收用户操作查看电子设备200上在一定时间内产生的安全事件。
图7A-图7G示例性示出了在电子设备100上查看电子设备200上在一定时间内产生的安全事件的示意图。
如图7A所示,电子设备100在显示用户界面602之后,电子设备100可以接收用户作用在用户界面602上的滑动操作(例如向上滑动操作),响应于用户的滑动操作,电子设备100可以显示如图7B所示的用户界面701。
如图7B所示,用户界面701中示出了电子设备200在一定时间(例如7天)内产生的安全记录。安全事件记录包括但不仅限于:安全事件类型、安全事件发生的时间、安全事件的内容等等。例如,安全事件记录可以是:今天下午4:48,安全事件类型为骚扰拦截,安全事件的内容为123123321232被拦截3次。今天下午08:48,安全事件类型为系统ROOT状态,安全事件的内容为设备被root。昨天下午09:17,安全事件类型为病毒查杀,安全事件的内容为发现2个病毒应用。昨天下午08:17,安全事件类型为病毒查杀,安全事件的内容为发现1个风险应用。昨天上午09:48,安全事件类型为锁屏密码,安全事件的内容为锁屏密码已设置。昨天上午06:18,安全事件类型为USB调试,安全事件的内容为USB调试已开启。
在一些示例中,电子设备100可以接收用户针对用户界面701的上下滑动操作,查看更多安全事件记录,本申请实施例在此不再赘述。
在一些示例中,电子设备100也可以接收用户操作查看某一个安全事件记录的详情记录。
如图7B所示,电子设备100接收用户针对查看控件702的输入操作(例如单击),响应于用户的输入操作,电子设备100可以显示该安全事件记录对应的处置界面。
例如,电子设备100可以显示如图7C所示的用户界面703。
用户界面703中示出了电子设备200上在一定时间(例如7天)内检测的风险应用。可选的,用户界面703上也可以显示电子设备100在昨天下午9:17检测到的2个病毒应用。本申请实施例对此不做限定。
电子设备100可以接收用户在用户界面703中的操作,卸载一个或多个风险应用,卸载电子设备200上存在的风险应用而带来的安全隐患。
如图7C所示,电子设备100接收用户针对卸载控件704的输入操作(例如单击),响应于用户的输入操作,电子设备100可以显示图7D所示的用户界面706。在电子设备200将“Z4root”应用卸载之后,用户界面706中示出的风险应用不包括“Z4root”应用。
可选的,在一种可能的实现方式中,在电子设备100接收用户针对卸载控件704的输入操作后,电子设备100可以显示如图6L所示的提示信息,提示用户是否需执行该操作,在用户确认执行后,电子设备100可以向第二电子设备发送指令,以指示第二电子设备执行对应的操作。在其他可能的实现方式中,在电子设备100接收用户针对卸载控件704的输入操作后,电子设备100可以先向第二电子设备发送指令,以指示第二电子设备执行对应的操作。在第二电子设备执行完对应的操作后,第二电子设备向第一电子设备发送执行成功的消息,在第一电子设备接收到第二电子设备发送的执行成功的消息后,可以再显示如图6L所示的提示信息,以提示用户第二电子设备已执行的操作,并询问用户是否需取消第二电子设备已执行的操作。用户可以再次选择接受第二电子设备已执行的操作或者取消第二电子设备已执行的操作。
再例如,如图7E所示,电子设备100也可以接收用户针对“一键优化”控件705的输入操作,将电子设备200上存在的不良应用“一键”卸载掉,节省用户的操作。响应于用户的输入操作,电子设备100可以显示图7F所示的用户界面707。在电子设备200将电子设备200上存在的不良应用全部卸载之后,电子设备100可以显示提示信息,以提示用户当前无不良应用。
可选的,在一种可能的实现方式中,在电子设备100接收用户针对“一键优化”控件705的输入操作后,电子设备100可以显示如图6L所示的提示信息,提示用户是否需执行该操作,在用户确认执行后,电子 设备100可以向第二电子设备发送指令,以指示第二电子设备执行对应的操作。在其他可能的实现方式中,在电子设备100接收用户针对“一键优化”控件705的输入操作后,电子设备100可以先向第二电子设备发送指令,以指示第二电子设备执行对应的操作。在第二电子设备执行完对应的操作后,第二电子设备向第一电子设备发送执行成功的消息,在第一电子设备接收到第二电子设备发送的执行成功的消息后,可以再显示如图6L所示的提示信息,以提示用户第二电子设备已执行的操作,并询问用户是否需取消第二电子设备已执行的操作。用户可以再次选择接受第二电子设备已执行的操作或者取消第二电子设备已执行的操作。
可选的,在电子设备200将不良应用卸载之后,那么在电子设备100上显示的电子设备200在一定时间内显示的安全事件中不包括病毒查杀安全事件类型。例如,电子设备200可以显示如图7G所示的用户界面708,用户界面708中不包括病毒查杀安全事件类型。用户界面708与用户界面701相比,多个一个安全事件,具体为昨天上午05:18,安全事件类型为USB调试,安全事件的内容为USB调试已关闭。
可选的,在电子设备200将不良应用卸载之后,那么在电子设备100上显示的电子设备200在一定时间内显示的安全事件中可以新增“卸载不良应用”的安全事件。即处理记录可以显示在安全保护记录中。
在用户将电子设备200上的“Z4root”应用卸载掉之后,电子设备100可以显示如图7H所示的用户界面709。用户界面709中新增了一条安全保护记录,该安全保护记录详情为:今天下午5:18,安全事件类型为卸载病毒应用,安全事件的内容为““Z4root”应用已卸载”。
可选的,在用户开启安全功能或者执行安全保护建议后,电子设备100也可以在安全保护记录中显示用户的操作记录。
图8为本申请实施例提供的一种设备安全处理方法的方法流程示意图。
S801、第一电子设备显示第一用户界面或者第一提示信息,第一用户界面中显示有针对第二电子设备上存在的安全风险事项,第一提示信息用于提示第二电子设备上存在安全风险事项,第二电子设备上存在安全风险事项与用户隐私相关。
第一电子设备可以是电子设备100,第二电子设备可以是电子设备200。
第一用户界面可以是图6C所示的用户界面602。第一用户界面也可以是图6H所示的用户界面604。第一用户界面也可以是图6K所示的用户界面607。第一用户界面也可以是图7C所示的用户界面703。
第一提示信息可以是图4B所示的提示信息450,第一提示信息可以是图4C所示的服务卡片480。
S802、第一电子设备接收用户针对第一用户界面或者针对第一提示信息的第一操作。
第一操作可以是针对用户界面602中“锁屏密码功能”选项的输入操作。
第一操作也可以是针对用户界面604中卸载“Z4root”应用的选项的输入操作。
第一操作也可以是针对用户界面607中“一键消除”选项608的输入操作。
第一操作也可以是针对用户界面703中卸载控件704的输入操作。
S803、在接收到第一操作后,第一电子设备向第二电子设备发送第一指令。
第一电子设备可以直接向第二电子设备发送第一指令,第一电子设备也可以通过服务器向第二电子设备发送第一指令,本申请实施例对此不做限定。
在一种可能的实现方式中,第一电子设备,还用于在向第二电子设备发送第一指令后,在第一用户界面中停止显示第二电子设备上存在的安全风险事项,或者停止显示第一提示信息。
这样,在第一电子设备第二电子设备发送第一指令后,第一电子设备上可以停止显示第二电子设备上存在的安全风险事件。
在一种可能的实现方式中,第二电子设备,还用于在消除第二电子设备上存在的安全风险事项后,向第一电子设备发送第二指令;第一电子设备,还用于在接收到第二指令后,在第一用户界面中停止显示第二电子设备上存在的安全风险事项,或者停止显示第一提示信息。
这样,在第一电子设备确定出第二电子设备已消除第二电子设备上存在的安全风险事件后,第一电子设备上可以停止显示第二电子设备上存在的安全风险事件。
例如图6M所示,用户界面610。用户界面610中示出的针对电子设备200的安全保护建议为“暂时无 建议”。
再例如图6J所示,用户界面606中显示的电子设备200的安全保护建议不包括“Z4root被检测为风险应用,建议您立即卸载或者移入应用管控中心”。
再例如图7F所示,在电子设备200将电子设备200上存在的不良应用全部卸载之后,用户界面707中可以显示提示信息,以提示用户当前无不良应用。
再例如图7G所示,用户界面708中不包括病毒查杀安全事件类型。
S804、在接收到第一指令后,第二电子设备消除第二电子设备上存在的安全风险事项。
在一种可能的实现方式中,第二电子设备上存在的安全风险事项包括一个或多个事项,第一操作为消除第二电子设备上存在的安全风险事项中第一事项的操作;第二电子设备,具体用于在接收到第一指令后,消除第二电子设备上存在的第一事项。
这样,第一电子设备可以接收用户一个一个的消除第二电子设备上存在的安全风险事项。以实现游湖有选择性地消除第二电子设备上存在的一个或多个安全风险事项。
例如图6G-图6I所示,第一电子设备可以接收用户一个一个的消除第二电子设备上存在的安全风险事项。
在一种可能的实现方式中,第二电子设备上存在的安全风险事项包括一个或多个事项,第一操作为消除第二电子设备上存在的安全风险事项中全部事项的操作;第二电子设备,具体用于在接收到第一指令后,消除第二电子设备上存在的全部事项。
这样,第一电子设备可以接收用户“一键消除”第二电子设备上存在的全部安全风险事项,节省用户的操作,方便快捷。
例如图6K-图6N所示,电子设备100可以接收用户针对“一键消除”选项608的输入操作,“一键消除”电子设备200上存在的安全风险事项。
在一种可能的实现方式中,第一电子设备,还用于在显示第一用户界面之前,显示第二用户界面,第二用户界面中包括有第一电子设备的设备选项和第二电子设备的设备选项,述第一电子设备的设备选项中包括第一电子设备的安全等级指示符、述第二电子设备的设备选项中包括第二电子设备的安全等级指示符;安全等级指示符用于指示电子设备的安全状态,安全状态包括高风险、中风险、低风险和无风险中的任意一项;第一电子设备,具体用于接收并响应用户针对第二用户界面中第二电子设备的设备选项的第二操作,显示第一用户界面。
可选的,若第一电子设备的安全状态和第二电子设备的安全状态不同,那么第一电子设备的安全等级指示符与第二电子设备的安全等级指示符不同。
这样,第一电子设备可以显示第一电子设备和/或其他设备的安全状态,以便用户可以对第一电子和第二电子设备的安全状态进行监测,并对安全状态差的电子设备进行管控。
其中,第二用户界面可以是图5C所示的用户界面502。
第一电子设备的标识可以是“Li的通讯工具”,第二电子设备的标识可以是“MatePadPro”。
第二操作可以针对用户界面502中电子设备200的图标的输入操作(例如单击)。
在一种可能的实现方式中,第一电子设备,还用于接收并响应用户针对第二用户界面中的第三操作,显示第三用户界面,第三用户界面中显示有针对第一电子设备上存在的安全风险事项和第二电子设备上存在的安全风险事项;第一电子设备,还用于接收用户针对第三用户界面的第四操作;第四操作用于消除第一电子设备上的安全风险事项和第二电子设备上存在的安全风险事项;第一电子设备,还用于在响应于第四操作,消除第一电子设备上存在的安全风险事项,并向第二电子设备发送第三指令;第二电子设备,还用于在接收到第三指令后,消除第二电子设备上存在的安全风险事项。
可选的,用户可以在第一电子设备上操作一个一个的消除第一电子设备和第二电子设备共有的安全风险事项。例如,第一电子设备和第二电子设备上共存应用一和应用二,且应用一和应用二为不良应用,用户可以在第一电子设备上操作,“一键卸载”第一电子设备和第二电子设备共存的应用一。第一电子设备还可以接收用户操作,“一键卸载”第一电子设备和第二电子设备共存的应用二。
可选的,用户可以在第一电子设备上操作“一键”消除第一电子设备和第二电子设备共有的全部安全风 险事项。例如,第一电子设备和第二电子设备上共存应用一和应用二,且应用一和应用二为不良应用,用户可以在第一电子设备上操作,“一键卸载”第一电子设备和第二电子设备共存的应用一和应用二,操作简单。
其中,第三操作可以是针对图5D所示的用户界面的滑动操作。
第三用户界面可以是图5G所示的用户界面503。
第四操作可以是针对图5G所示的用户界面503中”一键消除”控件512的输入操作。
在一种可能的实现方式中,第一电子设备,具体用于:在接收到第一操作后,显示第二提示信息,第二提示信息中包括第一控件,第二提示信息用于提示是否消除第二电子设备上存在的安全风险事项;接收并响应于针对第一控件的第五操作,向第二电子设备发送第一指令。这样,在第二电子设备消除第二电子设备上存在的安全风险事项之前,第一电子设备可以显示提示信息,避免用户误操作。可选的,该提示信息也可以显示在第二电子设备上。
其中,第二提示信息可以是图6I所示的提示栏605。第一控件可以是提示栏605中的卸载控件,第五操作可以是针对提示栏605中卸载控件的输入操作。
第二提示信息可以是图6L所示的提示栏609。第一控件可以是提示栏609中的确认选项,第五操作可以是针对提示栏609中确认选项的输入操作。
在一种可能的实现方式中,第二电子设备,还用于在消除第二电子设备上存在的安全风险事项后,向第一电子设备发送第二指令;第一电子设备,还用于在接收到第二指令后,显示第三提示信息,第三提示信息中包括第二控件,第三提示信息用于提示是否取消消除第二电子设备上存在的安全风险事项;第一电子设备,具体用于:接收并响应于针对第二控件的第六操作后,确认消除第二电子设备上存在的安全风险事项。这样,在第二电子设备消除第二电子设备上存在的安全风险事项之后,第一电子设备可以显示提示信息,告知用户第二电子设备已执行的操作,并可提供用户取消第二电子设备已执行的操作的选项。
可选的,该提示信息也可以显示在第二电子设备上。
其中,第三提示信息以是图6N所示的提示栏611。第二控件可以是提示栏611中的取消选项,第六操作可以是针对提示栏611中的取消选项的输入操作。
在一种可能的实现方式中,消除第二电子设备上存在的安全风险事项包括开启第二电子设备支持的安全功能、消除第二电子设备在第一时长内产生的安全风险事件、执行针对第二电子设备的安全保护建议。
其中,开启第二电子设备支持的安全功能可以是图6B-图6E所示的开启电子设备200上的“锁屏密码”功能。
安全风险事件可以是前述实施例中所示的安全保护记录,消除第二电子设备在第一时长内产生的安全风险事件可以是图6G-图6I所示的卸载电子设备200上的Z4root应用。
执行针对第二电子设备的安全保护建议可以是图7B-图7D所示的卸载电子设备200上的Z4root应用。
本申请的各实施方式可以任意进行组合,以实现不同的技术效果。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:ROM或随机存储记忆体RAM、磁碟或者光盘等各种可存储程序 代码的介质。
总之,以上所述仅为本发明技术方案的实施例而已,并非用于限定本发明的保护范围。凡根据本发明的揭露,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (23)

  1. 一种设备安全处理系统,其特征在于,所述系统包括第一电子设备和第二电子设备,其中,
    所述第一电子设备,用于显示第一用户界面或者第一提示信息,所述第一用户界面中显示有针对所述第二电子设备上存在的安全风险事项,所述第一提示信息用于提示所述第二电子设备上存在安全风险事项,所述第二电子设备上存在安全风险事项与用户隐私相关;
    所述第一电子设备,还用于接收用户针对所述第一用户界面或者针对所述第一提示信息的第一操作;所述第一操作用于消除所述第二电子设备上存在的安全风险事项;
    所述第一电子设备,还用于在接收到所述第一操作后,向所述第二电子设备发送第一指令;
    所述第二电子设备,用于在接收到所述第一指令后,消除所述第二电子设备上存在的安全风险事项。
  2. 根据权利要求1所述的系统,其特征在于,所述第一电子设备,还用于在向所述第二电子设备发送所述第一指令后,在所述第一用户界面中停止显示所述第二电子设备上存在的安全风险事项,或者停止显示所述第一提示信息。
  3. 根据权利要求2所述的系统,其特征在于,所述第二电子设备,还用于在消除所述第二电子设备上存在的安全风险事项后,向所述第一电子设备发送第二指令;
    所述第一电子设备,还用于在接收到所述第二指令后,在所述第一用户界面中停止显示所述第二电子设备上存在的安全风险事项,或者停止显示所述第一提示信息。
  4. 根据权利要求1-3任一项所述的系统,其特征在于,所述第二电子设备上存在的安全风险事项包括一个或多个事项,所述第一操作为消除所述第二电子设备上存在的安全风险事项中第一事项的操作;
    所述第二电子设备,具体用于在接收到所述第一指令后,消除所述第二电子设备上存在的所述第一事项。
  5. 根据权利要求1-3任一项所述的系统,其特征在于,所述第二电子设备上存在的安全风险事项包括一个或多个事项,所述第一操作为消除所述第二电子设备上存在的安全风险事项中全部事项的操作;
    所述第二电子设备,具体用于在接收到所述第一指令后,消除所述第二电子设备上存在的全部事项。
  6. 根据权利要求1-5任一项所述的系统,其特征在于,所述第一电子设备,还用于在显示所述第一用户界面之前,显示第二用户界面,所述第二用户界面中包括有所述第一电子设备的设备选项和所述第二电子设备的设备选项,所述述第一电子设备的设备选项中包括所述第一电子设备的安全等级指示符、所述述第二电子设备的设备选项中包括所述第二电子设备的安全等级指示符;所述安全等级指示符用于指示电子设备的安全状态,所述安全状态包括高风险、中风险、低风险和无风险中的任意一项;
    所述第一电子设备,具体用于接收并响应用户针对所述第二用户界面中所述第二电子设备的设备选项的第二操作,显示所述第一用户界面。
  7. 根据权利要求6所述的系统,其特征在于,所述第一电子设备,还用于接收并响应用户针对所述第二用户界面中的第三操作,显示第三用户界面,所述第三用户界面中显示有针对所述第一电子设备上存在的安全风险事项和所述第二电子设备上存在的安全风险事项;
    所述第一电子设备,还用于接收用户针对所述第三用户界面的第四操作;所述第四操作用于消除所述第一电子设备上的安全风险事项和所述第二电子设备上存在的安全风险事项;
    所述第一电子设备,还用于在响应于所述第四操作,消除所述第一电子设备上存在的安全风险事项,并向所述第二电子设备发送所述第三指令;
    所述第二电子设备,还用于在接收到所述第三指令后,消除所述第二电子设备上存在的安全风险事项。
  8. 根据权利要求1-7任一项所述的系统,其特征在于,所述第一电子设备,具体用于:
    在接收到所述第一操作后,显示第二提示信息,所述第二提示信息中包括第一控件,所述第二提示信息用于提示是否消除所述第二电子设备上存在的安全风险事项;
    接收并响应于针对所述第一控件的第五操作,向所述第二电子设备发送所述第一指令。
  9. 根据权利要求1-7任一项所述的系统,其特征在于,所述第二电子设备,还用于在消除所述第二电子设备上存在的安全风险事项后,向所述第一电子设备发送第二指令;
    所述第一电子设备,还用于在接收到所述第二指令后,显示第三提示信息,所述第三提示信息中包括第二控件,所述第三提示信息用于提示是否取消消除所述第二电子设备上存在的安全风险事项;
    所述第一电子设备,具体用于:接收并响应于针对所述第二控件的第六操作后,确认消除所述第二电子设备上存在的安全风险事项。
  10. 根据权利要求1-9任一项所述的系统,其特征在于,消除所述第二电子设备上存在的安全风险事项包括开启所述第二电子设备支持的安全功能、消除所述第二电子设备在第一时长内产生的安全风险事件、执行针对所述第二电子设备的安全保护建议。
  11. 一种设备安全处理方法,其特征在于,所述方法包括:
    第一电子设备显示第一用户界面或者第一提示信息,所述第一用户界面中显示有针对所述第二电子设备上存在的安全风险事项,所述第一提示信息用于提示所述第二电子设备上存在安全风险事项,所述第二电子设备上存在安全风险事项与用户隐私相关;
    所述第一电子设备接收用户针对所述第一用户界面或者针对所述第一提示信息的第一操作;所述第一操作用于消除所述第二电子设备上存在的安全风险事项;
    在接收到所述第一操作后,所述第一电子设备向所述第二电子设备发送第一指令,所述第一指令用于指示所述第二电子设备消除所述第二电子设备上存在的安全风险事项。
  12. 根据权利要求11所述的方法,其特征在于,在所述第一电子设备向所述第二电子设备发送第一指令之后,所述方法还包括:
    所述第一电子设备在所述第一用户界面中停止显示所述第二电子设备上存在的安全风险事项,或者停止显示所述第一提示信息。
  13. 根据权利要求12所述的方法,其特征在于,在所述第一电子设备向所述第二电子设备发送第一指令之后,所述方法还包括:
    所述第一电子设备接收所述第二电子设备发送的第二指令,所述第二指令用于指示所述第二电子设备已将所述第二电子设备上存在的安全风险事项消除掉;
    响应于所述第二指令,所述第一电子设备在所述第一用户界面中停止显示所述第二电子设备上存在的安全风险事项,或者停止显示所述第一提示信息。
  14. 根据权利要求11-13任一项所述的方法,其特征在于,所述第二电子设备上存在的安全风险事项包括一个或多个事项,所述第一操作为消除所述第二电子设备上存在的安全风险事项中第一事项的操作。
  15. 根据权利要求11-13任一项所述的方法,其特征在于,所述第二电子设备上存在的安全风险事项包括一个或多个事项,所述第一操作为消除所述第二电子设备上存在的安全风险事项中全部事项的操作。
  16. 根据权利要求11-15任一项所述的方法,其特征在于,在所述第一电子设备显示第一用户界面之前,所述方法还包括:
    所述第一电子设备显示第二用户界面,所述第二用户界面中包括有所述第一电子设备的设备选项和所述第二电子设备的设备选项,所述述第一电子设备的设备选项中包括所述第一电子设备的安全等级指示符、所述述第二电子设备的设备选项中包括所述第二电子设备的安全等级指示符;所述安全等级指示符用于指示电子设备的安全状态,所述安全状态包括高风险、中风险、低风险和无风险中的任意一项;
    所述第一电子设备显示第一用户界面,具体包括:
    所述第一电子设备接收并响应用户针对所述第二用户界面中所述第二电子设备的设备选项的第二操作,显示所述第一用户界面。
  17. 根据权利要求16所述的方法,在所述第一电子设备显示第二用户界面之后,在所述第一电子设备显示第一用户界面之前,所述方法还包括:
    所述第一电子设备接收并响应用户针对所述第二用户界面中的第三操作,显示第三用户界面,所述第三用户界面中显示有针对所述第一电子设备上存在的安全风险事项和所述第二电子设备上存在的安全风险事项;
    所述第一电子设备,接收用户针对所述第三用户界面的第四操作;所述第四操作用于消除所述第一电子设备上的安全风险事项和所述第二电子设备上存在的安全风险事项;
    响应于所述第四操作,所述第一电子设备消除所述第一电子设备上存在的安全风险事项,并向所述第二电子设备发送所述第三指令;所述第三指令用于指示所述第二电子设备消除所述第二电子设备上存在的安全风险事项。
  18. 根据权利要求11-17任一项所述的方法,所述在接收到所述第一操作后,所述第一电子设备向所述第二电子设备发送第一指令,具体包括:
    在接收到所述第一操作后,所述第一电子设备显示第二提示信息,所述第二提示信息中包括第一控件,所述第二提示信息用于提示是否消除所述第二电子设备上存在的安全风险事项;
    所述第一电子设备接收并响应于针对所述第一控件的第五操作,向所述第二电子设备发送所述第一指令。
  19. 根据权利要求11-17任一项所述的方法,在所述第一电子设备向所述第二电子设备发送第一指令之后,所述方法还包括:
    所述第一电子设备接收所述第二电子设备发送的第二指令,所述第二指令用于指示所述第二电子设备已消除第二电子设备上存在的安全风险事项;
    在接收到所述第二指令后,所述第一电子设备显示第三提示信息,所述第三提示信息中包括第二控件,所述第三提示信息用于提示是否取消消除所述第二电子设备上存在的安全风险事项;
    所述第一电子设备接收并响应于针对所述第二控件的第六操作后,确认消除所述第二电子设备上存在的安全风险事项。
  20. 根据权利要求11-19任一项所述的方法,消除所述第二电子设备上存在的安全风险事项包括开启所述第二电子设备支持的安全功能、消除所述第二电子设备在第一时长内产生的安全风险事件、执行针对所述第二电子设备的安全保护建议。
  21. 一种电子设备,为第一电子设备,其特征在于,所述第一电子设备包括:一个或多个处理器、一个或多个存储器;所述一个或多个存储器与所述一个或多个处理器耦合,所述一个或多个存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,所述一个或多个处理器调用所述计算机指令以使得所述第一电子设备执行上述权利要求11-20中的任一项所述的方法。
  22. 一种计算机可读存储介质,其特征在于,用于存储计算机指令,当所述计算机指令在第一电子设备上运行时,使得所述第一电子设备执行上述权利要求11-20中的任一项所述的方法。
  23. 一种计算机程序产品,其特征在于,当所述计算机程序产品在第一电子设备上运行时,使得所述第一电子设备执行上述权利要求11-20中的任一项所述的方法。
PCT/CN2023/109017 2022-07-26 2023-07-25 一种设备安全处理方法及电子设备 WO2024022310A1 (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202210881648 2022-07-26
CN202210881648.9 2022-07-26
CN202210999711.9A CN117499928A (zh) 2022-07-26 2022-08-19 一种设备安全处理方法及电子设备
CN202210999711.9 2022-08-19

Publications (1)

Publication Number Publication Date
WO2024022310A1 true WO2024022310A1 (zh) 2024-02-01

Family

ID=89666520

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/109017 WO2024022310A1 (zh) 2022-07-26 2023-07-25 一种设备安全处理方法及电子设备

Country Status (2)

Country Link
CN (1) CN117499928A (zh)
WO (1) WO2024022310A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160313764A1 (en) * 2015-04-21 2016-10-27 Samsung Electronics Co., Ltd. Method for extending function by docking and electronic device thereof
CN111597533A (zh) * 2020-04-27 2020-08-28 维沃移动通信有限公司 信息显示方法、装置及电子设备
CN112270015A (zh) * 2020-10-27 2021-01-26 维沃移动通信有限公司 数据保护方法、装置、电子设备及可读存储介质
CN113282364A (zh) * 2021-06-07 2021-08-20 维沃移动通信(杭州)有限公司 显示方法、显示装置和电子设备
EP3907741A1 (en) * 2020-05-08 2021-11-10 Universität Wien Weighted infection alert system between portable devices
CN114205454A (zh) * 2020-09-03 2022-03-18 华为技术有限公司 一种基于便携式设备提醒用户的方法、电子设备及服务器

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160313764A1 (en) * 2015-04-21 2016-10-27 Samsung Electronics Co., Ltd. Method for extending function by docking and electronic device thereof
CN111597533A (zh) * 2020-04-27 2020-08-28 维沃移动通信有限公司 信息显示方法、装置及电子设备
EP3907741A1 (en) * 2020-05-08 2021-11-10 Universität Wien Weighted infection alert system between portable devices
CN114205454A (zh) * 2020-09-03 2022-03-18 华为技术有限公司 一种基于便携式设备提醒用户的方法、电子设备及服务器
CN112270015A (zh) * 2020-10-27 2021-01-26 维沃移动通信有限公司 数据保护方法、装置、电子设备及可读存储介质
CN113282364A (zh) * 2021-06-07 2021-08-20 维沃移动通信(杭州)有限公司 显示方法、显示装置和电子设备

Also Published As

Publication number Publication date
CN117499928A (zh) 2024-02-02

Similar Documents

Publication Publication Date Title
KR102470275B1 (ko) 음성 제어 방법 및 전자 장치
WO2021129326A1 (zh) 一种屏幕显示方法及电子设备
WO2021017901A1 (zh) 一种屏幕显示方法及电子设备
CN115629730A (zh) 显示方法及相关装置
KR102503341B1 (ko) 보안 서비스 삭제 방법 및 전자 장치
WO2021036770A1 (zh) 一种分屏处理方法及终端设备
WO2020010584A1 (zh) 一种终端恢复出厂设置时的数据恢复方法及终端
CN113704014A (zh) 日志获取系统、方法、电子设备及存储介质
WO2020238728A1 (zh) 智能终端的登录方法及电子设备
WO2020150917A1 (zh) 一种应用权限的管理方法及电子设备
WO2020015259A1 (zh) 一种数据备份方法及终端
WO2020107463A1 (zh) 一种电子设备的控制方法及电子设备
EP4270230A1 (en) Access control method, electronic device and system
CN113452945A (zh) 分享应用界面的方法、装置、电子设备及可读存储介质
EP4228233A1 (en) Method for adding operation sequence, electronic device, and system
WO2022001279A1 (zh) 跨设备桌面管理方法、第一电子设备及第二电子设备
CN114546969A (zh) 一种文件共享方法、装置及电子设备
WO2023088459A1 (zh) 设备协同方法及相关装置
WO2023051094A1 (zh) 内存回收方法、装置、电子设备及可读存储介质
EP4280090A1 (en) Access control method, electronic device, and system
CN115017498B (zh) 小应用程序的操作方法和电子设备
WO2024022310A1 (zh) 一种设备安全处理方法及电子设备
WO2024017332A1 (zh) 控制部件的方法及相关装置
WO2023179682A1 (zh) 一种设备协同方法
WO2024041456A1 (zh) 一种应用数据保存方法及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23845520

Country of ref document: EP

Kind code of ref document: A1