CN103530549A - Method and device for processing document/application program on mobile communication terminal - Google Patents

Method and device for processing document/application program on mobile communication terminal Download PDF

Info

Publication number
CN103530549A
CN103530549A CN201310436168.2A CN201310436168A CN103530549A CN 103530549 A CN103530549 A CN 103530549A CN 201310436168 A CN201310436168 A CN 201310436168A CN 103530549 A CN103530549 A CN 103530549A
Authority
CN
China
Prior art keywords
file
application program
input signal
audio input
communication terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310436168.2A
Other languages
Chinese (zh)
Other versions
CN103530549B (en
Inventor
马章栋
冯立夫
黄媛媛
赵新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310436168.2A priority Critical patent/CN103530549B/en
Publication of CN103530549A publication Critical patent/CN103530549A/en
Application granted granted Critical
Publication of CN103530549B publication Critical patent/CN103530549B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and device for processing a document/application program on a mobile communication terminal. The method comprises the steps of monitoring an audio input signal of the mobile communication terminal and an operated event of the document/application program, determining the operated document/application program as an object needing to be protected as privacy information if the operated event of the document/application program is monitored and the audio input signal meeting a preset condition is monitored within a preset time range, and carrying out corresponding protection operation on the operated document/application program according to a preset privacy protection operation method to prevent the operated document/application program from being revealed. According to the method and device for processing the document/application program on the mobile communication terminal, privacy information of a user can be protected more effectively during protection of information needing to be protected as privacy information on terminal equipment.

Description

File/applied program processing method on communication terminal and device
Technical field
The present invention relates to file/application program conservation treatment technical field, be specifically related to file/applied program processing method and device on communication terminal.
Background technology
The functions such as at present Intelligent mobile communication terminal (comprising mobile phone, panel computer etc.) provides takes pictures, record a video, recording are really for user has brought happiness adventure in daily life easily, yet a problem can not be ignored is exactly privacy.The storage space of communication terminal is in continuous increase, in a communication terminal, can store the files such as a lot of pictures, video and recording, these multimedia files are generally individual privacies for user, if communication terminal is obtained by others, these information will face the risk of being revealed.
Therefore the technical matters, solving in the urgent need to those skilled in the art is just: how the information realization that needs to protect as privacy information in terminal called terminal is effectively protected.
Summary of the invention
In view of the above problems; the present invention has been proposed so as file/applied program processing method on a kind of communication terminal that overcomes the problems referred to above or address the above problem to be at least in part provided and corresponding mobile communication terminal device on file/application processing apparatus; in the process that can need to protect as privacy information on to terminal device, more effective protection user's privacy information.
According to one aspect of the present invention, the file/applied program processing method on a kind of communication terminal is provided, comprising:
The audio input signal of communication terminal and the operated event of file/application program are monitored;
If monitor the operated event of file/application program, and in preset time range, monitor the audio input signal that meets prerequisite, operated file/application program is defined as to the object that need to protect as privacy information;
According to preset secret protection mode of operation, operated file/application program is carried out to corresponding protection operation, to avoid operated file/application program to be revealed.
Alternatively, the described audio input signal to communication terminal is monitored and is comprised:
The interface of the audio detection device by communication terminal, obtains the audio input signal that described audio detection device collects.
Alternatively, preserve in advance reference note audio data, judge whether in the following manner to monitor the audio input signal that meets prerequisite:
The waveform of collected audio input signal and described reference note audio data is carried out to similarity comparison;
If similarity reaches preset threshold value, judge and monitor the audio input signal that meets prerequisite.
Alternatively, preserve in advance text message corresponding to reference speech signals or directly as the text message of reference information, judge whether in the following manner to monitor the audio input signal that meets prerequisite:
Described audio input signal is carried out to speech recognition, therefrom extract text message;
The text message extracting and the text message of preserving are in advance compared;
If identical, judge and monitor the audio input signal that meets prerequisite.
Alternatively, describedly before being monitored, the audio input signal of communication terminal and the operated event of file/application program also comprise:
The application program of moving in communication terminal is monitored;
If the application program of moving belongs to preset critical applications, start the audio input signal of communication terminal and the operated event of file/application program are monitored.
Alternatively, described the audio input signal of communication terminal and the operated event of file/application program monitored and comprised:
The event that the audio input signal of communication terminal and new file are created is monitored.
Alternatively, described the event that in communication terminal, new file is created is monitored, being comprised:
New document creation event in assigned catalogue in communication terminal is monitored.
Alternatively, also comprise:
While monitoring the event that creates new file, obtain the file type information of new file;
If described, monitor the operated event of file/application program; and in preset time range, monitor the audio input signal that meets prerequisite; operated file/application program is defined as to the object that need to protect as privacy information, comprises:
If monitoring creates the event of new file; and the file type of described new file belongs to preset type; and in preset time range, monitor the audio input signal that meets prerequisite, described new file is defined as to the object that need to protect as privacy information.
Alternatively, described the operated event of file/application program in communication terminal is monitored, being comprised:
The Action Events that file in communication terminal is edited, application program is mounted or application program is used is monitored.
Alternatively, also comprise:
When monitoring the operated event of file/application program, record the very first time;
While monitoring the audio input signal that meets prerequisite, recorded for the second time;
If described, monitor the operated event of file/application program; and in preset time range, monitor the audio input signal that meets prerequisite; operated file/application program is defined as to the object that need to protect as privacy information, comprises:
If monitor the operated event of file/application program; and the audio input signal of communication terminal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to protect as privacy information.
According to a further aspect in the invention, provide the file/application processing apparatus on a kind of communication terminal, having comprised:
Monitoring unit, for monitoring the audio input signal of communication terminal and the operated event of file/application program;
Determining unit, if for monitoring the operated event of file/application program, and in preset time range, monitor the audio input signal that meets prerequisite, operated file/application program is defined as to the object that need to protect as privacy information;
Operating unit, carries out corresponding protection operation for the secret protection mode of operation according to preset to operated file/application program, to avoid operated file/application program to be revealed.
Alternatively,
Described monitoring unit, specifically for the interface of the audio detection device by communication terminal, obtains the audio input signal that described audio detection device collects.
Alternatively, preserve in advance reference note audio data, judge whether in the following manner to monitor the audio input signal that meets prerequisite:
Waveform comparing unit, for carrying out similarity comparison by the waveform of monitored audio input signal and described reference note audio data;
The first identifying unit, if reach preset threshold value for similarity, judges and monitors the audio input signal that meets prerequisite.
Alternatively, preserve in advance text message corresponding to reference speech signals or directly as the text message of reference information, judge whether in the following manner to monitor the audio input signal that meets prerequisite:
Voice recognition unit, carries out speech recognition for the audio input signal to monitored, and therefrom extracts text message;
Text comparing unit, for comparing the text message extracting and the text message of preserving in advance;
The first identifying unit, if be identical for the comparison result of text comparing unit, judge and monitors the audio input signal that meets prerequisite.
Alternatively, also comprise:
Working procedure monitoring unit, before the audio input signal of communication terminal and the operated event of file/application program are monitored, monitors the application program of moving in communication terminal;
Start unit, if belong to preset critical applications for the application program of moving, starts the audio input signal of communication terminal and the operated event of file/application program is monitored.
Alternatively, described monitoring unit comprises:
The first monitoring subelement, monitors for the event that the audio input signal of communication terminal and new file are created.
Alternatively, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
Alternatively, also comprise:
Type information acquiring unit, when monitoring the event that creates new file, obtains the file type information of new file;
Described determining unit specifically for:
If monitoring creates the event of new file; and the file type of described new file belongs to preset type; and the audio input signal that monitors communication terminal in preset time range meets preset condition, described new file is defined as to the object that need to protect as privacy information.
Alternatively, described monitoring unit comprises:
The second monitoring subelement, for monitoring the Action Events that the file of communication terminal is edited, application program is mounted or application program is used.
Alternatively, also comprise:
Very first time record cell, for when monitoring the operated event of file/application program, records the very first time;
The second time record cell, when monitoring the audio input signal that meets prerequisite, recorded for the second time;
Described determining unit specifically for:
If monitor the operated event of file/application program; and audio input signal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to protect as privacy information.
According to the file/applied program processing method on communication terminal of the present invention and device; can monitor the audio input signal of communication terminal and the operated event of file/application program; if find that file/application program is operated; and in preset time range, monitor the audio input signal that meets prerequisite; can, using it as user to carrying out the confirmation of secret protection operation, therefore can directly according to preset secret protection mode of operation, to new file, carry out protection operation.Visible; in this process; can directly by detecting the mode of audio user input operation, confirm whether user needs file/application program to carry out secret protection; user-friendly; and after user confirms to carry out secret protection; can directly according to pre-set protection mode of operation backstage, carry out concrete protection operation; and do not need user in interface, to select again the operations such as concrete transfer path, setting code; therefore, can further reduce the risk that user's privacy file is revealed.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of instructions, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
Accompanying drawing explanation
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, by identical reference symbol, represent identical parts.In the accompanying drawings:
Fig. 1 shows the process flow diagram of method according to an embodiment of the invention; And
Fig. 2 shows the schematic diagram of an apparatus in accordance with one embodiment of the invention.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, yet should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can by the scope of the present disclosure complete convey to those skilled in the art.
In embodiments of the present invention; can provide a application program that runs on communication terminal (for ease of describing; in the embodiment of the present invention, this application program is called to " defence program "); this defence program can be monitored the audio input signal of communication terminal and the operated event of file/application program; then according to monitored results, come file/application program to carry out secret protection operation.For example; can monitor creating the event of new file; if finding that there is new file is created; also judge the privacy file that its possibility is user; if; can monitor audio input signal, if monitor the audio input signal that meets prerequisite, can to the file of new establishment, carry out protection operation according to preset mode.That is to say, from user perspective, say, can be that the new file that creates is specified protection mode of operation in advance, for example can directly delete, or file is shifted and specifies in advance the target directory position of shifting, or, the password using in the time of can also being encrypted and specifying encryption in advance file, etc., by modes such as recording, to defence program, provide a section audio (say in short and wait and generate one section of voice such as user) in advance in addition, defence program just can be usingd this section audio as judgment standard (certainly, defence program also can be used the audio frequency benchmark of acquiescence, as long as make user know the information of this audio frequency benchmark by certain mode).Like this; at a newly-generated file; or file is operated; or after application program is mounted or is used; user just can input one section of voice; then defence program just can be compared the voice signal of user's input and the audio frequency of preserving before, if similarity between the two meets some requirements, can come trigger protection program to carry out corresponding secret protection operation to operated file/application program with this.Below this is at length introduced.
Referring to Fig. 1; first the embodiment of the present invention provides the file/applied program processing method on a kind of communication terminal; in the method, the executive agent of each step can be just previously described defence program, certainly also may realize by the mode of hardware in actual applications.The method can comprise the following steps:
S101: the audio input signal of communication terminal and the operated event of file/application program are monitored;
During specific implementation, the operated event of file/application program just can comprise the event that new file is created, the event that existing file is edited, the event that application program is mounted, event that application program is used etc.Except the operated event of file/application program is monitored, can also monitor the audio input signal of communication terminal.During specific implementation, can be by the audio detection device of communication terminal (such as the MIC etc.) state of default setting for opening, so just can arrive extraneous sound signal by Real-time Collection, follow-up when judging whether audio input signal meets preset condition, the audio input signal collecting and the reference information setting in advance can be compared, judge whether same or similar.Wherein, specifically when the audio input signal collecting is compared with the reference information setting in advance, if reference information is also a section audio information, the waveform of two sound signals can be compared, the information such as position that occur according to waveform medium wave peak, trough judge similarity between the two, if similarity reaches certain threshold value, reach prerequisite.Or, if the voice (or one section of word) that benchmark audio frequency is recorded before being, can also preserve in advance the Word message comprising in this elementary audio, or only preserve passage, when collecting current audio input signal, can carry out speech recognition to it, therefrom extract Word message, the Word message corresponding with the reference information of preserving in advance compares, and judges that whether both are identical, if identical, meet prerequisite.
It should be noted that in addition; generally; only in some specific application programs in when operation, just may produce and may need the file protected as privacy information, or this specific application program itself may belong to the application program that need to carry out secret protection.Therefore; defence program in the embodiment of the present invention can also be monitored the application program of current operation in communication terminal; if finding critical applications moves; restart the audio input signal of communication terminal and the operated event of file/application program are monitored; if the application program of current operation does not comprise the critical applications that may produce privacy file, can start the audio input signal of communication terminal and the operated event of file/application program are monitored.Like this, just can not will the audio detection device of communication terminal be set to the state of a direct-open, when being only found crucial application program and moving, then open audio detection device.Wherein, so-called critical applications can comprise camera, video recorder, recorder program, JICQ etc.Wherein, the API that detecting the current program information moving can provide by system completes, and the program of for example obtaining working procedure information under Android system is as follows:
// obtain system service ActivityManager
ActivityManager?manager=(ActivityManager)getSystemService(ACTIVITY_SERVICE);
// obtain the current task stack list moving,
List<RunningTaskInfo>runningTasks=manager.getRunningTasks(1);
// obtain the task stack of current top, i.e. foreground task stack
RunningTaskInforunningTaskInfo=runningTasks.get(0);
// obtain the top Activity of foreground task stack
ComponentNametopActivity=runningTaskInfo.topActivity;
// obtain the bag name of application
String?packageName=topActivity.getPackageName();。
Method getSystemService () wherein, getRunningTasks (), getPackageName () is the api function that Android system provides.
In addition, in order to protect timely belonging to the file/application program of privacy of user, in embodiments of the present invention, first defence program can be monitored the operated event of file/application program by a background process.Concrete, in order to realize this monitoring, can there is various ways.For example, under a kind of mode, can utilize the event sniffer of communication terminal operating system therein, the broadcast that snoop-operations system is sent, by the filtration to system broadcast message, knows the operated event of file/application program.That is to say, background program can pass through the event sniffer of communication terminal operating system, system message to each generation judges, if type of message is the operated event of file/application program, can therefrom extract filename, the suffix name of operated file, the information such as title of operated application program.For example, under Android system, when creating new file, system can be sent the broadcast that creates file, background program can arrange a BroadCastReceiver broadcast is monitored and filtered, and judges whether to occur to create the event of new file according to the type of message of broadcast.
Or, under another kind of implementation, also can utilize the Hook Function of communication terminal operating system, the operated event of user file/application program is monitored.That is to say, in the operated process of file/application program, need to call relevant program and realize the operation to file/application program, in embodiments of the present invention, can use API Hook Function, background program can provide Hook Function also by original deflector guide subfunction (conventionally realizing by Modification growth function entry address) of calling, Hook Function just can obtain the information such as filename, suffix name of operated file like this, complete the monitoring to the operated event of file/application program, and obtain the information such as filename in event, application name.
It should be noted that, in actual applications, in communication terminal, for preserving the catalogue of file, generally have a lot, but the privacy file that may comprise user in general only some catalogue, and other catalogue, such as generally not depositing user's privacy file for storage system file etc. to the sightless catalogue of user.Therefore, to creating in the process that the event of new file monitors, can only to some specific catalogues, monitor, monitor the variation of file in this specific catalogue, whether judgement wherein has new file to be created.For example, this specific catalogue can be the catalogue of the files such as photo for preserving user, video.
S102: if monitor the operated event of file/application program, and in preset time range, monitor the audio input signal that meets prerequisite, operated file/application program is defined as to the object that need to protect as privacy information;
If monitored the operated event of file/application program; and the audio input signal that meets prerequisite also detected in certain hour section before this event or afterwards; the audio input signal of communication terminal can be met to this event of prerequisite is defined as the needs that user sends and file/application program is carried out to the trigger event of secret protection; therefore, just this document/application program can be defined as to the object that need to protect as privacy information.
During specific implementation, when monitoring the operated event of file/application program, record the very first time, while monitoring the audio input signal that meets prerequisite, recorded for the second time; Like this; if monitor the operated event of file/application program; and the audio input signal of communication terminal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to protect as privacy information.Wherein, sequencing relation between the very first time and the second time can not limit; that is to say; for user; needs using certain file/application program when privacy information is protected; can be before this document/application program be operated or afterwards, carry out the operations such as one section of specific sound signal of input, so just can automatically trigger file/application program is carried out to secret protection.
Wherein, for creating the event of new file, being defined as, operated file/application program need to, before the object of privacy information protection, can also further judge.Specifically when judging, if be before the monitoring of carrying out creating the event of new file in specific catalogue, can be directly according to the catalogue at new file place, judging that it belongs to need to be as the object of privacy information protection.That is to say, because the catalogue that only may produce privacy file to some is in advance monitored, therefore, the new file monitoring is all just the file in these specific catalogues, can be defined as the file that need to protect as privacy information.Otherwise, even if monitor, created new file, and also within the regular hour, monitored qualified audio input signal, also can not will its be defined as the file that need to protect as privacy information.
Or; when monitoring new document creation event; can also get the information such as suffix name of new file; therefore; can analyze accordingly the file type information of the file that makes new advances; and then, can judge whether new file is the object that user need to protect as privacy information according to file type information.For example, generally, if find that file type belongs to the types such as picture, video, audio frequency, can be judged to be the object that need to protect as privacy information.
Certainly, in order further to improve the accuracy of judgement, also above-mentioned two kinds of modes can be combined.Also be; can monitor the establishment event of new file in some specific catalogues; if find to have created in specific catalogue new file; according to the suffix name of new file, determine again the file type of the file that makes new advances; if file type belongs to again preset particular type, can may be the object that need to protect as privacy information using the file of this new establishment.
For example, example in a practical application can be: first start application monitor service program (running background), when application watchdog routine detects the application program (camera relevant to privacy, while sound-track engraving apparatus etc.) starting, startup file monitor service program (running background) and and start audio detection device (running background), the establishment event of file under the relevant path of file monitor program monitoring, when having privacy document creation, record the very first time, when qualified audio input signal being detected, recorded for the second time, poor between two times relatively, when the second time is at document creation in the special time threshold value after the time (as 10 seconds) time, the conservation treatment operation of execution to privacy file.
S103: according to preset secret protection mode of operation, operated file/application program is carried out to corresponding protection operation, to avoid operated file/application program to be revealed.
Determining after an operated file/application program belongs to the object that need to protect as privacy information, just can carry out protection operation by the new file creating according to preset secret protection mode of operation.
Wherein, to the secret protection operation of operated file/application program, can be directly operated file/application program to be deleted; Or can also be that operated file/application program is shifted, now, can when setting in advance, be specified by user the target directory position of shifting; Again or, can also be encrypted operated file/application program, and, can when setting in advance, be specified by user the password using while encrypting, etc.It should be noted that; because the operated file/application program under dissimilar or different directories may have different severity levels; operated file/the application program that therefore, can be respectively under dissimilar or different directories arranges different protection modes of operation.For example, the file of picture category is set to shift and preserves, and the privacy file of video class is set to encrypt etc.
In a word; in embodiments of the present invention; can monitor the audio input signal of communication terminal and the operated event of file/application program; if find that file/application program is operated; and in preset time range, monitor the audio input signal that meets prerequisite; can, using it as user to carrying out the confirmation of secret protection operation, therefore can directly according to preset secret protection mode of operation, to new file, carry out protection operation.Visible; in this process; can directly by detecting the mode of audio user input operation, confirm whether user needs file/application program to carry out secret protection; user-friendly; and after user confirms to carry out secret protection; can directly according to pre-set protection mode of operation backstage, carry out concrete protection operation; and do not need user in interface, to select again the operations such as concrete transfer path, setting code; therefore, can further reduce the risk that user's privacy file is revealed.
File/applied program processing method on the communication terminal providing with the embodiment of the present invention is corresponding, and the embodiment of the present invention also provides the file/application processing apparatus on a kind of communication terminal, and referring to Fig. 2, this device can comprise:
Monitoring unit 201, for monitoring the audio input signal of communication terminal and the operated event of file/application program;
Determining unit 202, if for monitoring the operated event of file/application program, and in preset time range, monitor the audio input signal that meets prerequisite, operated file/application program is defined as to the object that need to protect as privacy information;
Operating unit 203, carries out corresponding protection operation for the secret protection mode of operation according to preset to operated file/application program, to avoid operated file/application program to be revealed.
During specific implementation, monitoring unit 201 specifically can, for the interface of the audio detection device by communication terminal, obtain the audio input signal that described audio detection device collects.
For the audio input data monitoring is analyzed; can preserve in advance reference note audio data; this benchmark audio-frequency information can be (need to inform in advance user in modes such as help informations) that defence program acquiescence provides, or can be that user records voluntarily.Now, can judge whether in the following manner to monitor the audio input signal that meets prerequisite:
Waveform comparing unit, for carrying out similarity comparison by the waveform of monitored audio input signal and described reference note audio data;
The first identifying unit, if reach preset threshold value for similarity, judges and monitors the audio input signal that meets prerequisite.
Or, under another kind of implementation, can preserve in advance text message corresponding to reference speech signals or directly as the text message of reference information, judge whether in the following manner to monitor the audio input signal that meets prerequisite:
Voice recognition unit, carries out speech recognition for the audio input signal to monitored, and therefrom extracts text message;
Text comparing unit, for comparing the text message extracting and the text message of preserving in advance;
The first identifying unit, if be identical for the comparison result of text comparing unit, judge and monitors the audio input signal that meets prerequisite.
During specific implementation, this device can also comprise:
Working procedure monitoring unit, before the audio input signal of communication terminal and the operated event of file/application program are monitored, monitors the application program of moving in communication terminal;
Start unit, if belong to preset critical applications for the application program of moving, starts the audio input signal of communication terminal and the operated event of file/application program is monitored.
Wherein, described monitoring unit comprises:
The first monitoring subelement, monitors for the event that the audio input signal of communication terminal and new file are created.
Wherein said first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
This device can also comprise:
Type information acquiring unit, when monitoring the event that creates new file, obtains the file type information of new file;
Described determining unit specifically for:
If monitoring creates the event of new file; and the file type of described new file belongs to preset type; and the audio input signal that monitors communication terminal in preset time range meets preset condition, described new file is defined as to the object that need to protect as privacy information.
In addition, described monitoring unit can also comprise:
The second monitoring subelement, for monitoring the Action Events that the file of communication terminal is edited, application program is mounted or application program is used.
This device can also comprise:
Very first time record cell, for when monitoring the operated event of file/application program, records the very first time;
The second time record cell, when monitoring the audio input signal that meets prerequisite, recorded for the second time;
Described determining unit specifically for:
If monitor the operated event of file/application program; and audio input signal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to protect as privacy information.
Described operating unit comprises:
Deletion action subelement, for carrying out deletion action to operated file/application program;
Or,
Shift subelement, for the catalogue according to preset, operated file/application program is transferred under preassigned catalogue;
Or,
Encrypt subelement, for the password according to preset, operated file/application program is encrypted.
During specific implementation, the protection mode of operation that dissimilar file/application program can be corresponding different.
Visible; in embodiments of the present invention; can monitor the audio input signal of communication terminal and the operated event of file/application program; if find that file/application program is operated; and in preset time range, monitor the audio input signal that meets prerequisite; can, using it as user to carrying out the confirmation of secret protection operation, therefore can directly according to preset secret protection mode of operation, to new file, carry out protection operation.Visible; in this process; can directly by detecting the mode of audio user input operation, confirm whether user needs file/application program to carry out secret protection; user-friendly; and after user confirms to carry out secret protection; can directly according to pre-set protection mode of operation backstage, carry out concrete protection operation; and do not need user in interface, to select again the operations such as concrete transfer path, setting code; therefore, can further reduce the risk that user's privacy file is revealed.
The algorithm providing at this is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to description above, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the description of above language-specific being done is in order to disclose preferred forms of the present invention.
In the instructions that provided herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can not put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.Yet, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them into a plurality of submodules or subelement or sub-component in addition.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this instructions (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this instructions (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module moved on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize according to the some or all functions of the some or all parts in the file/application program treatment facility on the communication terminal of the embodiment of the present invention.The present invention for example can also be embodied as, for carrying out part or all equipment or device program (, computer program and computer program) of method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation that do not depart from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has a plurality of such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.
The application can be applied to computer system/server, and it can operation together with numerous other universal or special computingasystem environment or configuration.The example of well-known computing system, environment and/or the configuration that is suitable for using together with computer system/server includes but not limited to: personal computer system, server computer system, thin client, thick client computer, hand-held or laptop devices, the system based on microprocessor, Set Top Box, programmable consumer electronics, NetPC Network PC, little type Ji calculate machine Xi Tong ﹑ large computer system and comprise the distributed cloud computing technology environment of above-mentioned any system, etc.
Computer system/server can be described under the general linguistic context of the computer system executable instruction (such as program module) of being carried out by computer system.Conventionally, program module can comprise routine, program, target program, assembly, logic, data structure etc., and they are carried out specific task or realize specific abstract data type.Computer system/server can be implemented in distributed cloud computing environment, and in distributed cloud computing environment, task is to be carried out by the teleprocessing equipment linking by communication network.In distributed cloud computing environment, program module can be positioned on the Local or Remote computing system storage medium that comprises memory device.
The invention also discloses the file/applied program processing method on A1, a kind of communication terminal, comprising:
The audio input signal of communication terminal and the operated event of file/application program are monitored;
If monitor the operated event of file/application program, and in preset time range, monitor the audio input signal that meets prerequisite, operated file/application program is defined as to the object that need to protect as privacy information;
According to preset secret protection mode of operation, operated file/application program is carried out to corresponding protection operation, to avoid operated file/application program to be revealed.
A2, the method as described in A1, the described audio input signal to communication terminal is monitored and is comprised:
The interface of the audio detection device by communication terminal, obtains the audio input signal that described audio detection device collects.
A3, the method as described in A1, preserve reference note audio data in advance, judges whether in the following manner to monitor the audio input signal that meets prerequisite:
The waveform of collected audio input signal and described reference note audio data is carried out to similarity comparison;
If similarity reaches preset threshold value, judge and monitor the audio input signal that meets prerequisite.
A4, the method as described in A1, preserve in advance text message corresponding to reference speech signals or directly as the text message of reference information, judge whether in the following manner to monitor the audio input signal that meets prerequisite:
Described audio input signal is carried out to speech recognition, therefrom extract text message;
The text message extracting and the text message of preserving are in advance compared;
If identical, judge and monitor the audio input signal that meets prerequisite.
A5, the method as described in A1, describedly also comprise before the audio input signal of communication terminal and the operated event of file/application program are monitored:
The application program of moving in communication terminal is monitored;
If the application program of moving belongs to preset critical applications, start the audio input signal of communication terminal and the operated event of file/application program are monitored.
A6, the method as described in A1, described the audio input signal of communication terminal and the operated event of file/application program are monitored and comprised:
The event that the audio input signal of communication terminal and new file are created is monitored.
A7, the method as described in A6, describedly monitor the event that in communication terminal, new file is created, and comprising:
New document creation event in assigned catalogue in communication terminal is monitored.
A8, the method as described in A6, also comprise:
While monitoring the event that creates new file, obtain the file type information of new file;
If described, monitor the operated event of file/application program; and in preset time range, monitor the audio input signal that meets prerequisite; operated file/application program is defined as to the object that need to protect as privacy information, comprises:
If monitoring creates the event of new file; and the file type of described new file belongs to preset type; and in preset time range, monitor the audio input signal that meets prerequisite, described new file is defined as to the object that need to protect as privacy information.
A9, the method as described in A1, describedly monitor the operated event of the file/application program in communication terminal, comprising:
The Action Events that file in communication terminal is edited, application program is mounted or application program is used is monitored.
A10, the method as described in A1 to A9 any one, also comprise:
When monitoring the operated event of file/application program, record the very first time;
While monitoring the audio input signal that meets prerequisite, recorded for the second time;
If described, monitor the operated event of file/application program; and in preset time range, monitor the audio input signal that meets prerequisite; operated file/application program is defined as to the object that need to protect as privacy information, comprises:
If monitor the operated event of file/application program; and the audio input signal of communication terminal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to protect as privacy information.
The invention also discloses the file/application processing apparatus on B1, a kind of communication terminal, comprising:
Monitoring unit, for monitoring the audio input signal of communication terminal and the operated event of file/application program;
Determining unit, if for monitoring the operated event of file/application program, and in preset time range, monitor the audio input signal that meets prerequisite, operated file/application program is defined as to the object that need to protect as privacy information;
Operating unit, carries out corresponding protection operation for the secret protection mode of operation according to preset to operated file/application program, to avoid operated file/application program to be revealed.
B2, the device as described in B1,
Described monitoring unit, specifically for the interface of the audio detection device by communication terminal, obtains the audio input signal that described audio detection device collects.
B3, the device as described in B1, preserve reference note audio data in advance, judges whether in the following manner to monitor the audio input signal that meets prerequisite:
Waveform comparing unit, for carrying out similarity comparison by the waveform of monitored audio input signal and described reference note audio data;
The first identifying unit, if reach preset threshold value for similarity, judges and monitors the audio input signal that meets prerequisite.
B4, the device as described in B1, preserve in advance text message corresponding to reference speech signals or directly as the text message of reference information, judge whether in the following manner to monitor the audio input signal that meets prerequisite:
Voice recognition unit, carries out speech recognition for the audio input signal to monitored, and therefrom extracts text message;
Text comparing unit, for comparing the text message extracting and the text message of preserving in advance;
The first identifying unit, if be identical for the comparison result of text comparing unit, judge and monitors the audio input signal that meets prerequisite.
B5, the device as described in B1, also comprise:
Working procedure monitoring unit, before the audio input signal of communication terminal and the operated event of file/application program are monitored, monitors the application program of moving in communication terminal;
Start unit, if belong to preset critical applications for the application program of moving, starts the audio input signal of communication terminal and the operated event of file/application program is monitored.
B6, the device as described in B1, described monitoring unit comprises:
The first monitoring subelement, monitors for the event that the audio input signal of communication terminal and new file are created.
B7, the device as described in B6, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
B8, the device as described in B6, also comprise:
Type information acquiring unit, when monitoring the event that creates new file, obtains the file type information of new file;
Described determining unit specifically for:
If monitoring creates the event of new file; and the file type of described new file belongs to preset type; and the audio input signal that monitors communication terminal in preset time range meets preset condition, described new file is defined as to the object that need to protect as privacy information.
B9, the device as described in B1, described monitoring unit comprises:
The second monitoring subelement, for monitoring the Action Events that the file of communication terminal is edited, application program is mounted or application program is used.
B10, the device as described in B1 to B9 any one, also comprise:
Very first time record cell, for when monitoring the operated event of file/application program, records the very first time;
The second time record cell, when monitoring the audio input signal that meets prerequisite, recorded for the second time;
Described determining unit specifically for:
If monitor the operated event of file/application program; and audio input signal meets preset condition; and the mistiming between the described very first time and the second time is less than preset time threshold, operated file/application program is defined as to the object that need to protect as privacy information.

Claims (10)

1. file/the applied program processing method on communication terminal, comprising:
The audio input signal of communication terminal and the operated event of file/application program are monitored;
If monitor the operated event of file/application program, and in preset time range, monitor the audio input signal that meets prerequisite, operated file/application program is defined as to the object that need to protect as privacy information;
According to preset secret protection mode of operation, operated file/application program is carried out to corresponding protection operation, to avoid operated file/application program to be revealed.
2. the method for claim 1, the described audio input signal to communication terminal is monitored and is comprised:
The interface of the audio detection device by communication terminal, obtains the audio input signal that described audio detection device collects.
3. the method for claim 1, preserves reference note audio data in advance, judges whether in the following manner to monitor the audio input signal that meets prerequisite:
The waveform of collected audio input signal and described reference note audio data is carried out to similarity comparison;
If similarity reaches preset threshold value, judge and monitor the audio input signal that meets prerequisite.
4. the method for claim 1, preserves text message corresponding to reference speech signals or the direct text message as reference information in advance, judges whether in the following manner to monitor the audio input signal that meets prerequisite:
Described audio input signal is carried out to speech recognition, therefrom extract text message;
The text message extracting and the text message of preserving are in advance compared;
If identical, judge and monitor the audio input signal that meets prerequisite.
5. the method for claim 1, describedly also comprises before the audio input signal of communication terminal and the operated event of file/application program are monitored:
The application program of moving in communication terminal is monitored;
If the application program of moving belongs to preset critical applications, start the audio input signal of communication terminal and the operated event of file/application program are monitored.
6. file/the application processing apparatus on communication terminal, comprising:
Monitoring unit, for monitoring the audio input signal of communication terminal and the operated event of file/application program;
Determining unit, if for monitoring the operated event of file/application program, and in preset time range, monitor the audio input signal that meets prerequisite, operated file/application program is defined as to the object that need to protect as privacy information;
Operating unit, carries out corresponding protection operation for the secret protection mode of operation according to preset to operated file/application program, to avoid operated file/application program to be revealed.
7. device as claimed in claim 6,
Described monitoring unit, specifically for the interface of the audio detection device by communication terminal, obtains the audio input signal that described audio detection device collects.
8. device as claimed in claim 6, preserves reference note audio data in advance, judges whether in the following manner to monitor the audio input signal that meets prerequisite:
Waveform comparing unit, for carrying out similarity comparison by the waveform of monitored audio input signal and described reference note audio data;
The first identifying unit, if reach preset threshold value for similarity, judges and monitors the audio input signal that meets prerequisite.
9. device as claimed in claim 6, preserves text message corresponding to reference speech signals or the direct text message as reference information in advance, judges whether in the following manner to monitor the audio input signal that meets prerequisite:
Voice recognition unit, carries out speech recognition for the audio input signal to monitored, and therefrom extracts text message;
Text comparing unit, for comparing the text message extracting and the text message of preserving in advance;
The first identifying unit, if be identical for the comparison result of text comparing unit, judge and monitors the audio input signal that meets prerequisite.
10. device as claimed in claim 6, also comprises:
Working procedure monitoring unit, before the audio input signal of communication terminal and the operated event of file/application program are monitored, monitors the application program of moving in communication terminal;
Start unit, if belong to preset critical applications for the application program of moving, starts the audio input signal of communication terminal and the operated event of file/application program is monitored.
CN201310436168.2A 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device Active CN103530549B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310436168.2A CN103530549B (en) 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310436168.2A CN103530549B (en) 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device

Publications (2)

Publication Number Publication Date
CN103530549A true CN103530549A (en) 2014-01-22
CN103530549B CN103530549B (en) 2016-08-24

Family

ID=49932553

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310436168.2A Active CN103530549B (en) 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device

Country Status (1)

Country Link
CN (1) CN103530549B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104200170A (en) * 2014-04-15 2014-12-10 中兴通讯股份有限公司 Privacy protection method of electronic equipment and electronic equipment
CN105471585A (en) * 2015-12-09 2016-04-06 广州华多网络科技有限公司 Cancelling method and device of user information
CN106980797A (en) * 2017-03-24 2017-07-25 北京奇虎科技有限公司 A kind of method, device and computing device for realizing file protection
CN106997761A (en) * 2017-04-20 2017-08-01 滁州职业技术学院 The method and mobile terminal of a kind of secret protection

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101308654A (en) * 2007-05-14 2008-11-19 华为技术有限公司 Speech analysis and recognition method, system and apparatus
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN102917106A (en) * 2012-10-26 2013-02-06 上海吟隆信息科技有限公司 Melody identification based cellphone unlocking method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101308654A (en) * 2007-05-14 2008-11-19 华为技术有限公司 Speech analysis and recognition method, system and apparatus
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN102917106A (en) * 2012-10-26 2013-02-06 上海吟隆信息科技有限公司 Melody identification based cellphone unlocking method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104200170A (en) * 2014-04-15 2014-12-10 中兴通讯股份有限公司 Privacy protection method of electronic equipment and electronic equipment
WO2015158045A1 (en) * 2014-04-15 2015-10-22 中兴通讯股份有限公司 Privacy protection method for electronic device and electronic device
CN105471585A (en) * 2015-12-09 2016-04-06 广州华多网络科技有限公司 Cancelling method and device of user information
CN106980797A (en) * 2017-03-24 2017-07-25 北京奇虎科技有限公司 A kind of method, device and computing device for realizing file protection
CN106997761A (en) * 2017-04-20 2017-08-01 滁州职业技术学院 The method and mobile terminal of a kind of secret protection

Also Published As

Publication number Publication date
CN103530549B (en) 2016-08-24

Similar Documents

Publication Publication Date Title
US11182478B2 (en) Systems and methods for tracking and recording events in a network of computing systems
CN103970533B (en) The information recording method and device of screen recording
CN103678487A (en) Method and device for generating web page snapshot
CN103763124A (en) Internet user behavior analyzing and early-warning system and method
CN103118290A (en) Detection method, device and system of suitability of program installation
CN111259275B (en) Data tracking method, device and storage medium
CN108234400B (en) Attack behavior determination method and device and situation awareness system
CN109063011B (en) Log processing method, electronic device and computer readable storage medium
US20210019408A1 (en) Malware family tracking and visualization across time
CN103514396A (en) Processing method and device for file / application program on mobile communication terminal
CN103530549A (en) Method and device for processing document/application program on mobile communication terminal
CN103631628A (en) Software cleaning method and system
CN104965731A (en) Data processing method and electronic terminal
Azhar et al. Forensic analysis of secure ephemeral messaging applications on android platforms
CN111314063A (en) Big data information management method, system and device based on Internet of things
CN103500106A (en) Method and device for starting application programs in mobile communication terminal
CN109213824B (en) Data capture system, method and device
CN111259382A (en) Malicious behavior identification method, device and system and storage medium
CN103530550A (en) Method and device for processing document/application program on mobile communication terminal
CN111090623B (en) Data auditing method and device, electronic equipment and storage medium
CN112905971A (en) Method and device for processing information
CN103488930A (en) Method and device for processing file/application program on mobile communication terminal
CN117235400A (en) Unified multi-platform portal system based on Kafka technology
CN111711656A (en) Network edge storage device with safety function
CN103488942A (en) Method and device for processing file/application program on mobile communication terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220712

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co., Ltd

TR01 Transfer of patent right