CN109739748A - Close rule detection method and device - Google Patents

Close rule detection method and device Download PDF

Info

Publication number
CN109739748A
CN109739748A CN201811526442.4A CN201811526442A CN109739748A CN 109739748 A CN109739748 A CN 109739748A CN 201811526442 A CN201811526442 A CN 201811526442A CN 109739748 A CN109739748 A CN 109739748A
Authority
CN
China
Prior art keywords
data
label
rule
violation
private
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811526442.4A
Other languages
Chinese (zh)
Other versions
CN109739748B (en
Inventor
任天赋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201811526442.4A priority Critical patent/CN109739748B/en
Publication of CN109739748A publication Critical patent/CN109739748A/en
Application granted granted Critical
Publication of CN109739748B publication Critical patent/CN109739748B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure is directed to a kind of conjunctions to advise detection method and device.This method comprises: operation Monkey test program;The Monkey test program is for testing the application program of the first terminal;The communication data of the application program is obtained from the Monkey test program;The communication data is sent to server, so that when the server contains private data in determining the communication data, the private data is marked according to whether the private data is used, and the private data after label is sent to second terminal, so that generating the examining report of application program according to the violation data when second terminal has the violation data for not meeting GDPR conjunction rule rule in determining the private data after the label.The technical solution realizes automatically generating for the examining report of application program, and detection efficiency is high.

Description

Close rule detection method and device
Technical field
This disclosure relates to which detection method and device are advised in field of terminal technology more particularly to a kind of conjunction.
Background technique
GDPR (general data conservation regulation, General Data Protection Regulation) is European Union Regulations need the application of terminal carrying out GDPR to close rule detection to guarantee the stable development of overseas business.
In the related technology, usually terminal shows the data for uploading or reading, and user is true according to GDPR rule Surely whether there is private data in the data shown, if having private data in the data of display, will upload or read this privacy The corresponding application of data carries out hand labeled.
Summary of the invention
To overcome the problems in correlation technique, the embodiment of the present disclosure provides a kind of conjunction rule detection method and device.Institute It is as follows to state technical solution:
According to the first aspect of the embodiments of the present disclosure, a kind of conjunction rule detection method is provided, first terminal is applied to, comprising:
Run Monkey test program;The Monkey test program is used to carry out the application program of the first terminal Test;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains privacy in determining the communication data When data, the private data is marked according to whether the private data is used, and by the private data after label It is sent to second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule When the violation data of rule, the examining report of application program is generated according to the violation data.
The technical scheme provided by this disclosed embodiment can include the following benefits: first terminal is surveyed from Monkey The communication data of application program is got in examination program, and communication data is sent to server, so that server is determining logical When containing private data in letter data, and it is sent to second terminal after private data is marked, so that second terminal is true When having the violation data for not meeting GDPR conjunction rule rule in the private data after calibration note, is generated according to violation data and apply journey The examining report of sequence, user can check the testing result of application program by examining report, realize the inspection of application program Automatically generating for announcement is observed and predicted, detection efficiency is high.
In one embodiment, the communication data includes at least http request message, memory stacked data, daily record data One of.
According to the second aspect of an embodiment of the present disclosure, a kind of conjunction rule detection method is provided, server is applied to, comprising:
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy Sample data is the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to institute Private data is stated to be marked;The data type of the private data includes http request message, memory stacked data and log Data;
Private data after label is sent to second terminal, so that the second terminal is after determining the label When having the violation data for not meeting GDPR conjunction rule rule in private data, the detection of application program is generated according to the violation data Report.
The technical scheme provided by this disclosed embodiment can include the following benefits: server is receiving first eventually When holding the communication data of the application program sent, when containing private data in determining communication data, private data is marked Second terminal is sent to after note, so that second terminal has in determining the private data after label does not meet GDPR conjunction rule rule When violation data, the examining report of application program is generated according to violation data, user can check application by examining report The testing result of program, realizes automatically generating for the examining report of application program, and detection efficiency is high.
In one embodiment, further includes:
It whether determines in the privacy sample data comprising the sample data different from the communication data;
When including the sample data different from the communication data in determining the privacy sample data, to the sample Data are marked;
The private data by after label is sent to second terminal, so that the second terminal is determining the label When having the violation data for not meeting GDPR conjunction rule rule in private data afterwards, application program is generated according to the violation data Examining report includes:
Sample data after private data and label after label is sent to second terminal, so that the second terminal Have in determining the private data after the label and the sample data after the label and does not meet the violation that GDPR closes rule rule When data, the examining report of application program is generated according to the violation data.
In one embodiment, the sample data after the private data and label by after label is sent to second terminal Include:
Receive the private data request that the second terminal is sent;
It requests the sample data after the private data and label after label being sent to second in response to the private data Terminal.
In one embodiment, the privacy sample data according to the pre-stored data determines in the communication data whether contain There is the private data to include:
The data in the communication data are searched whether in the privacy sample data;
When there are the data in the communication data in determining the privacy sample data, the data are determined as described Private data.
According to the third aspect of an embodiment of the present disclosure, a kind of conjunction rule detection method is provided, second terminal is applied to, comprising:
Private data after receiving the label that server is sent;
Whether have described in not meeting in private data after the determining label of GDPR conjunction rule rule according to the pre-stored data GDPR closes the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to The violation data generates the examining report of application program.
The technical scheme provided by this disclosed embodiment can include the following benefits: first terminal is surveyed from Monkey The communication data of application program is got in examination program, and communication data is sent to server, so that server is determining logical When containing private data in letter data, and it is sent to second terminal after private data is marked, so that second terminal is true When having the violation data for not meeting GDPR conjunction rule rule in the private data after calibration note, according to violation data and routine data The examining report of application program is generated, user can check the testing result of application program by examining report, realize and answer With automatically generating for the examining report of program, detection efficiency is high.
In one embodiment, it is described have in determining the private data after the label do not meet the GDPR and close rule When the violation data of rule, include: according to the examining report that the violation data generates application program
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to Routine data and the violation data generate the examining report of the application program;The routine data is hidden after the label Meet the data that the GDPR closes rule rule in private data.
In one embodiment, the GDPR according to the pre-stored data closes rule rule and determines the private data after the label In whether have not meeting the GDPR and close the violation data of rule rule and include:
Rule rule is closed to the pre-stored GDPR to modify;
It is closed whether to have not meet in the private data after rule rule determines the label according to the modified GDPR and be repaired The GDPR after changing closes the violation data of rule rule.
In one embodiment, the private data after the label for receiving server transmission includes:
The sample data after private data and label after receiving the label that server is sent;
Whether the GDPR according to the pre-stored data, which closes to have in the private data after rule rule determines the label, does not meet The GDPR closes the regular violation data of rule
GDPR according to the pre-stored data closes the sample after private data and the label after rule rule determines the label Whether have in data and does not meet the violation data that the GDPR closes rule rule;
It is described to have when not meeting the GDPR and closing the violation data of rule rule in determining the private data after the label, Include: according to the examining report that the violation data generates application program
Have in determining the private data after the label and the sample data after the label and does not meet the GDPR conjunction When the violation data of rule, the examining report of application program is generated according to the violation data.
In one embodiment, the sample data after the private data and label after the label for receiving server transmission Include:
Private data request is sent to the server;
The sample data after private data and label after receiving the label that server is sent.
In one embodiment, described in determining the private data after the label and the sample data after the label When having the violation data for not meeting the GDPR conjunction rule rule, the examining report packet of application program is generated according to the violation data It includes:
Determine the classification of the violation data;
The examining report of the application program is generated according to the label of the classification of the violation data and the violation data.
According to a fourth aspect of embodiments of the present disclosure, a kind of conjunction rule detection device is provided, comprising: operation module, for transporting Row Monkey test program;The Monkey test program is for testing the application program of the first terminal;
Module is obtained, for obtaining the communication data of the application program from the Monkey test program;
First sending module, for sending the communication data to server, so that the server is described in the determination When containing private data in communication data, the private data is marked according to whether the private data is used, and Private data after label is sent to second terminal, so that private data of the second terminal after determining the label In have do not meet GDPR close rule rule violation data when, according to the violation data generate application program examining report.
In one embodiment, the communication data includes at least http request message, memory stacked data, daily record data One of.
According to a fifth aspect of the embodiments of the present disclosure, a kind of conjunction rule detection device is provided, comprising:
First receiving module, for receiving the communication data of first terminal transmission;
First determining module determines in the communication data whether contain for privacy sample data according to the pre-stored data Private data;The privacy sample data is the private data of the first terminal of server storage;
First mark module, when for containing the private data in determining the communication data, according to the privacy The private data is marked in the data type of data;The data type of the private data include http request message, Memory stacked data and daily record data;
Second sending module, for the private data after label to be sent to second terminal, so that the second terminal When having the violation data for not meeting GDPR conjunction rule rule in determining the private data after the label, according to the violation data Generate the examining report of application program.
It in one embodiment, further include the second determining module and the second mark module, second sending module includes First sending submodule;
Second determining module, for whether determining in the privacy sample data comprising different from the communication data Sample data;
Second mark module, for including different from the communication data in determining the privacy sample data When sample data, the sample data is marked;
First sending submodule, for the sample data after the private data and label after label to be sent to second Terminal, so that the second terminal has not in determining the private data after the label and the sample data after the label When meeting the violation data of GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
In one embodiment, first sending submodule includes the first receiving unit and the first transmission unit;
First receiving unit, the private data request sent for receiving the second terminal;
First transmission unit, in response to the private data request by after the label private data and institute Sample data after stating label is sent to the second terminal.
In one embodiment, first determining module includes searching submodule and first to determine submodule;
The lookup submodule, for searching whether the number in the communication data in the privacy sample data According to;
Described first determines submodule, for there is the data in the communication data in determining the privacy sample data When, the data are determined as the private data.
According to a sixth aspect of an embodiment of the present disclosure, a kind of conjunction rule detection device is provided, comprising:
Second receiving module, the private data after label for receiving server transmission;
Third determining module is closed in the private data after rule rule determines the label for GDPR according to the pre-stored data Whether have and does not meet the violation data that the GDPR closes rule rule;
Generation module does not meet disobeying for the GDPR conjunction rule rule for having in determining the private data after the label When advising data, the examining report of application program is generated according to the violation data.
In one embodiment, the generation module includes the first generation submodule;
Described first generates submodule, does not meet the GDPR conjunction for having in determining the private data after the label When the violation data of rule, the examining report of the application program is generated according to routine data and the violation data;It is described Routine data closes the regular data of rule to meet the GDPR in the private data after the label.
In one embodiment, the third determining module includes that modification submodule and second determine submodule;
The modification submodule is modified for closing rule rule to the pre-stored GDPR;
Described second determines submodule, for according to hidden after the determining label of the modified GDPR conjunction rule rule Whether have in private data and does not meet the violation data that the modified GDPR closes rule rule.
In one embodiment, second receiving module includes the second receiving submodule, the third determining module packet It includes third and determines that submodule, the generation module include the second generation submodule;
Second receiving submodule, the sample after the private data and label after label for receiving server transmission Data;
The third determines submodule, closes the privacy after rule rule determines the label for GDPR according to the pre-stored data Whether have in sample data after data and the label and does not meet the violation data that the GDPR closes rule rule;
Described second generates submodule, for determining the private data after the label and the sample number after the label When having the violation data for not meeting the GDPR conjunction rule rule in, the detection report of application program is generated according to the violation data It accuses.
In one embodiment, second receiving module includes the second transmission unit and the second receiving unit;
Second transmission unit, for sending private data request to the server;
Second receiving unit, after receiving private data and label after the label that the server is sent Sample data.
In one embodiment, the second generation submodule includes determination unit and generation unit;
The determination unit, for determining the classification of the violation data;
The generation unit, for being answered according to the generation of the label of the classification of the violation data and the violation data With the examining report of program.
According to the 7th of the embodiment of the present disclosure the aspect, a kind of conjunction rule detection device is provided, comprising: first processor;
For storing the first memory of first processor executable instruction;
Wherein, the first processor is configured as:
Run Monkey test program;The Monkey test program is used to carry out the application program of the first terminal Test;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains privacy in determining the communication data When data, the private data is marked according to whether the private data is used, and by the private data after label It is sent to second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule When the violation data of rule, the examining report of application program is generated according to the violation data.
According to the eighth aspect of the embodiment of the present disclosure, a kind of conjunction rule detection device is provided, comprising: second processor;
For storing the second memory of second processor executable instruction;
Wherein, the second processor is configured as:
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy Sample data is the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to institute Private data is stated to be marked;The data type of the private data includes http request message, memory stacked data and log Data;
Private data after label is sent to second terminal, so that the second terminal is after determining the label When having the violation data for not meeting GDPR conjunction rule rule in private data, the detection of application program is generated according to the violation data Report.
According to the 9th of the embodiment of the present disclosure the aspect, a kind of conjunction rule detection device is provided, comprising: third processor;
For storing the third memory of third processor-executable instruction;
Wherein, the third processor is configured as:
Private data after receiving the label that server is sent;
Whether have described in not meeting in private data after the determining label of GDPR conjunction rule rule according to the pre-stored data GDPR closes the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to The violation data generates the examining report of application program.
According to the tenth of the embodiment of the present disclosure the aspect, a kind of computer readable storage medium is provided, calculating is stored thereon with The step of machine instruction, which realizes above-described embodiment the method when being executed by processor.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 a is the flow chart shown according to an exemplary embodiment for closing rule detection method.
Fig. 1 b is the flow chart shown according to an exemplary embodiment for closing rule detection method.
Fig. 2 is the flow chart shown according to an exemplary embodiment for closing rule detection method.
Fig. 3 a is the flow chart shown according to an exemplary embodiment for closing rule detection method.
Fig. 3 b is the flow chart shown according to an exemplary embodiment for closing rule detection method.
Fig. 4 a is the interaction figure shown according to an exemplary embodiment for closing rule detection method.
Fig. 4 b is the interaction figure shown according to an exemplary embodiment for closing rule detection method.
Fig. 5 is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 6 a is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 6 b is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 6 c is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 6 d is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 a is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 b is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 c is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 d is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 e is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 f is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 8 is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 9 is the structural block diagram shown according to an exemplary embodiment for closing rule detection device.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
The technical solution that the embodiment of the present disclosure provides is related to first terminal, second terminal and server, which can Think the mobile terminals such as smart phone and the tablet computer that user uses, second terminal can be mobile phone, tablet computer, computer Equipment Deng having processing and display function, the embodiment of the present disclosure are not construed as limiting this.In the related technology, usually terminal will be upper The data for passing or reading are shown that user determines in the data shown whether there is private data according to GDPR rule, if aobvious There is private data in the data shown, then will upload or read the corresponding application of this private data and carry out hand labeled.But it is above-mentioned It closes rule to be detected as detecting manually, detection efficiency is low.In the technical scheme provided by this disclosed embodiment, first terminal is from Monkey The communication data of application program is got in test program, and communication data is sent to server, so that server is in determination When containing private data in communication data, and it is sent to second terminal after private data is marked, so that second terminal exists When having the violation data for not meeting GDPR conjunction rule rule in the private data after determining label, is generated and applied according to violation data The examining report of program, user can check the testing result of application program by examining report, realize application program Examining report automatically generates, and detection efficiency is high.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and the executing subject for implementing this method has first terminal, second Terminal and server.The embodiment of the present disclosure arranges three sets of embodiments according to the difference of method subject of implementation, as described below:
Server side:
Fig. 1 a is a kind of flow chart for closing rule detection method shown according to an exemplary embodiment, and this method is applied to clothes It is engaged in device, as shown in Figure 1a, detection method includes the following steps for conjunction rule 101 to step 104:
In step 101a, the communication data that first terminal is sent is received.
Wherein, communication data includes at least one of http request message, memory stacked data, daily record data.
In step 102a, privacy sample data according to the pre-stored data determines in the communication data whether contain privacy Data.
Wherein, the privacy sample data is the private data of the first terminal of server storage, privacy sample number According to sequence number, user's bank card account number information, the short message etc. that can be user's phone number, first terminal.
Optionally, the data in communication data are searched whether in privacy sample data, are determining privacy sample data In when having the data in communication data, data are determined as private data.
It is exemplary, the communication data that server receives include multiple http request messages, multiple memory stacked datas and Multiple daily record datas, server parse each http request message, obtain the number of request in each http request message According to, such as request data has telephone number 137****8257, handset serial F78P****G5MP, 66666, * * * etc., memory Stacked data includes telephone number 1870****894 and account information 6226****1754, and daily record data includes handset serial F78P****G5MP, 11111, * * * etc. include telephone number 137****8257, telephone number in privacy sample data 187****7894, account information 6226****1754 and handset serial F78P****G5MP are then known in privacy sample data Include telephone number 137****8257, telephone number 187****7894, the account information 6226****1754 in communication data With handset serial F78P****G5MP, it is determined that telephone number 137****8257, telephone number 187****7894, account Information 6226****1754 and handset serial F78P****G5MP is private data, determines that 66666,11111 and * * * is not Private data.
In step 103a, when containing the private data in determining the communication data, according to the private data Data type the private data is marked.
Optionally, server determines the usage mode of the private data, institute according to the data type of the private data The data type for stating private data includes http request message, memory stacked data and daily record data.
It is exemplary, if the data type of private data be http request message, can determine private data be uploaded and It reads;If the data type of private data is memory stacked data, it can determine that private data is read;If private data When data type is daily record data, then it can determine that private data is printed.
Exemplary, private data includes telephone number 137****8257, telephone number 187****7894, account information 6226****1754 and handset serial F78P****G5MP, wherein the data type of telephone number 137****8257 is http The data type of request message and memory stacked data, telephone number 187****7894 and account information 6226****1754 is Memory stacked data, the data type of handset serial F78P****G5MP are http request message, memory stacked data and day Will data can then determine that telephone number 137****8257 is uploaded and reads, and telephone number 137****8257 is not printed, So as to telephone number 137****8257 addition red-label, brown mark and yellow flag, wherein red-label generation Table is uploaded, and brown mark representative is read, and yellow flag representative is not printed;Telephone number 187****7894 is read, electricity Words number 187****7894 is not uploaded and is not printed, so as to add brown mark to telephone number 187****7894 Note, Green Marker and yellow flag, wherein Green Marker representative is not uploaded;Account information 6226****1754 is read, account Number information 6226****1754 is not uploaded and is not printed, so as to add brown to account information 6226****1754 Label, Green Marker and yellow flag;Handset serial F78P****G5MP is uploaded, reads and prints, so as to give hand Machine sequence number F78P****G5MP adds grey label, red-label and brown mark, wherein grey label, which represents, to be printed.
It should be noted that label after private data can in the form of a list or the form of table carry out storage and It sends, the embodiment of the present disclosure does not limit this.
In step 104a, the private data after label is sent to second terminal, so that the second terminal is true When having the violation data for not meeting GDPR conjunction rule rule in the private data after the fixed label, generated according to the violation data The examining report of application program.
Optionally, the private data after label directly can be sent to second terminal by server, can also received When the private data request that second terminal is sent, then the private data after label is sent to second terminal, so that second terminal When receiving the private data after label, GDPR according to the pre-stored data is closed in the private data after rule rule determines label Whether there is the violation data for not meeting GDPR conjunction rule rule, has in determining the private data after label and do not meet GDPR conjunction rule rule When violation data then, the examining report of application program is generated according to violation data.
Exemplary, it includes that telephone number forbids upload, telephone number to allow to read and print, account that GDPR, which is closed in rule rule, Information forbids uploading, non-print and allows to read, and handset serial forbids uploading, forbid reading and non-print etc. is regular, Private data after label includes the telephone number 137****8257 for adding red-label, brown mark and yellow flag, addition The telephone number 187****7894 of brown mark, Green Marker and yellow flag, addition brown mark, Green Marker and yellow The account information 6226****1754 of label, the handset serial of addition grey label, red-label and brown mark F78P****G5MP, then can determine addition red-label, brown mark and yellow flag telephone number 137****8257, Add the telephone number 187****7894 and addition grey label, red-label of brown mark, Green Marker and yellow flag Handset serial F78P****G5MP with brown mark is violation data, addition brown mark, Green Marker and yellow flag Account information 6226****1754 be routine data, that is, determine that the application program disobeys telephone number and handset serial Rule enable developer to find out by examining report to generate examining report according to telephone number and handset serial Which specific communication data in violation of rules and regulations, is handled in the application program convenient for developer is further to the application program;In addition, If detected to multiple application programs, the violation item of each application program can be carried out with application program it is corresponding, most throughout one's life At the examining report about multiple application programs.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and server is in the application program for receiving first terminal transmission Communication data when, in determining communication data contain private data when, be sent to after private data is marked second eventually End, when so that second terminal having the violation data for not meeting GDPR conjunction rule rule in determining the private data after label, according to Violation data generates the examining report of application program, and user can check the testing result of application program by examining report, Automatically generating for the examining report of application program is realized, detection efficiency is high.
Fig. 1 b is a kind of flow chart for closing rule detection method shown according to an exemplary embodiment, and this method is applied to clothes It is engaged in device, as shown in Figure 1 b, conjunction rule detection method includes the following steps 101b to step 106b:
In step 101b, the communication data that first terminal is sent is received.
It should be noted that the sequencing that the embodiment of the present disclosure executes step 102b and step 104b is without limitation, Step 102b and step 103b can be first carried out, then executes step 104b and step 105b;Can also first carry out step 104b and Step 105b, then execute step 102b and step 103b.
In step 102b, privacy sample data according to the pre-stored data determines in the communication data whether contain privacy Data;The privacy sample data is the private data of the first terminal of server storage.
In step 103b, when containing the private data in determining the communication data, according to the private data Data type the private data is marked;The data type of the private data includes http request message, memory Stacked data and daily record data.
In step 104b, whether determine in the privacy sample data comprising the sample number different from the communication data According to.
It include the sample data different from the communication data in determining the privacy sample data in step 105b When, the sample data is marked.
It is exemplary, communication data and privacy sample data are compared, when in privacy sample data include and communicate number It when according to different sample datas, is marked sample data as not used private data, such as sample data is added Purple label, wherein purple label represents not used private data.
In step 106b, the sample data after the private data and label after label is sent to second terminal, so that The second terminal have in determining the violation data after the private data and label after the label do not meet GDPR close rule When the violation data of rule, the examining report of application program is generated according to the violation data.
First terminal side:
Fig. 2 is a kind of flow chart for closing rule detection method shown according to an exemplary embodiment, and this method is applied to the One terminal, as shown in Fig. 2, detection method includes the following steps 201 to step 203 for conjunction rule:
In step 201, Monkey test program is run.
Wherein, the Monkey test program is for testing the application program of the first terminal.
Specifically, the Monkey test program is exactly with the random instruction of milli or to operate with application program, come The stability and error resilience performance of application program are observed, concrete operations are exactly the key-press input of analog subscriber, touch screen input, gesture Then input etc. observes how long application program will appear exception, when Monkey test program is when operation, if user When triggering the event such as clicking, touch, Monkey test program can generate random pulses, it is possible to use Monkey Test program carrys out random duplicate test application program.
It is exemplary, by Monkey test program burning on first terminal, when needing to test application program, then For application program to be tested is needed, Monkey test program is run.
In step 202, the communication data of the application program is obtained from the Monkey test program.
Wherein, the communication data includes at least one of http request message, memory stacked data, daily record data.
In step 203, the communication data is sent to server, so that the server is determining the communication number When containing private data in, the private data is marked according to whether the private data is used, and will label Private data afterwards is sent to second terminal, so that the second terminal has not in determining the private data after the label When meeting the violation data of GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
Exemplary, first terminal can use response simulation in application program during running Monkey test program The corresponding communication datas such as the instruction of family input are recorded, after Monkey test program end of run, by the application of record All communication datas of program are transmitted to server, so that server is in the communication data Shi Zuojin for receiving application program The processing of one step, specific service device are further processed process referring to above-mentioned steps 102 and step 103, this public affairs to communication data Opening embodiment, details are not described herein.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and first terminal gets application from Monkey test program The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label In have do not meet GDPR close rule rule violation data when, according to violation data generate application program examining report, Yong Hutong The testing result of application program can be checked by crossing examining report, realize automatically generating for the examining report of application program, inspection It surveys high-efficient.
Second terminal side:
Fig. 3 a is a kind of flow chart for closing rule detection method shown according to an exemplary embodiment, and this method is applied to the Two terminals, as shown in Figure 3a, conjunction rule detection method includes the following steps 301a to step 303a:
Private data in step 301a, after receiving the label that server is sent.
Optionally, second terminal can directly receive the private data after the label of server transmission, can also be first to clothes Business device sends private data request, so that server is sent out when receiving private data request, then by the private data after label It send to second terminal, so that second terminal receives the private data after label.
In step 302a, GDPR according to the pre-stored data close in the private data after rule rule determines the label whether Have and does not meet the violation data that the GDPR closes rule rule.
Exemplary, it includes that telephone number forbids upload, telephone number to allow to read and print, account that GDPR, which is closed in rule rule, Information forbids uploading, non-print and allows to read, and handset serial forbids uploading, forbid reading and non-print etc. is regular, Private data after label includes the telephone number 137****8257 for adding red-label, brown mark and yellow flag, addition The telephone number 187****7894 of brown mark, Green Marker and yellow flag, addition brown mark, Green Marker and yellow The account information 6226****1754 of label, the handset serial of addition grey label, red-label and brown mark F78P****G5MP, then can determine addition red-label, brown mark and yellow flag telephone number 137****8257, Add the telephone number 187****7894 and addition grey label, red-label of brown mark, Green Marker and yellow flag Handset serial F78P****G5MP with brown mark is violation data, addition brown mark, Green Marker and yellow flag Account information 6226****1754 be routine data.
Further, second terminal can also close rule rule to the pre-stored GDPR and modify;And according to repairing Whether the GDPR after changing, which closes to have in the private data after rule rule determines the label, does not meet the modified GDPR Close the violation data of rule rule.
Exemplary, user can close rule rule to pre-stored GDPR according to demand and modify, after to be modified, then will Modified GDPR closes rule rule and is stored, and when receiving the private data after label, is then closed according to modified GDPR Rule rule determines whether the private data after label has the violation data for meeting modified GDPR conjunction rule rule.
Exemplary, in examples detailed above, if modified GDPR is closed, rule are regular to be allowed to upload, allow including telephone number It reads and non-print, account information forbids upload, non-print and forbid reading, handset serial is forbidden uploading, forbids reading It takes and non-print, the private data after label includes the telephone number for adding red-label, brown mark and yellow flag 137****8257, the account information 6226****1754 for adding brown mark, Green Marker and yellow flag add gray scales The handset serial F78P****G5MP of note, red-label and brown mark can then determine addition brown mark, Green Marker With the account information 6226****1754 of yellow flag and the handset serial of addition grey label, red-label and brown mark F78P****G5MP is violation data, and the telephone number 137****8257 of addition red-label, brown mark and yellow flag is Routine data.
In step 303a, has in determining the private data after the label and do not meet the GDPR conjunction rule rule When violation data, the examining report of application program is generated according to the violation data.
It is exemplary, if violation data includes the telephone number 137**** for adding red-label, brown mark and yellow flag 8257, the telephone number 187****7894 and addition grey label, red of brown mark, Green Marker and yellow flag are added The handset serial F78P****G5MP of label and brown mark, then according to addition red-label, brown mark and yellow flag Telephone number 137****8257, addition brown mark, Green Marker and yellow flag telephone number 187****7894 and The handset serial F78P****G5MP for adding grey label, red-label and brown mark generates examining report, so that exploitation Personnel can find out which specific communication data is in violation of rules and regulations in the application program by examining report, convenient for developer to the application Program is further to be handled;In addition, if when being detected to multiple application programs, can by the violation item of each application program with Application program is corresponded to, and the examining report about multiple application programs is ultimately generated.
Further, have in determining the private data after the label and do not meet the violation number that the GDPR closes rule rule According to when, the examining report of the application program is generated according to routine data and the violation data;The routine data is described Meet the data that the GDPR closes rule rule in private data after label.
It is exemplary, if addition red-label, the telephone number 137****8257 of brown mark and yellow flag, addition palm fibre The telephone number 187****7894 and addition grey label, red-label and brown of color marker, Green Marker and yellow flag The handset serial F78P****G5MP of label, routine data include the account for adding brown mark, Green Marker and yellow flag Number information 6226****1754, then according to addition red-label, the telephone number 137**** of brown mark and yellow flag 8257, the telephone number 187****7894 of brown mark, Green Marker and yellow flag, addition grey label, red mark are added The account letter of the handset serial F78P****G5MP and addition brown mark, Green Marker and yellow flag of note and brown mark It ceases 6226****1754 and generates examining report, enable developer to pass through examining report while seeing violation data and routine Data.
It should be noted that in practical application, second terminal can be first terminal, or except first terminal it Outer mobile phone, tablet computer or computer etc., the embodiment of the present disclosure does not limit this.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and first terminal gets application from Monkey test program The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label In have when not meeting GDPR and closing the violation data of rule rule, the detection report of application program is generated according to violation data and routine data It accuses, user can check the testing result of application program by examining report, realize the examining report of application program oneself Dynamic to generate, detection efficiency is high.
Fig. 3 b is a kind of flow chart for closing rule detection method shown according to an exemplary embodiment, and this method is applied to the Two terminals, as shown in Figure 3b, conjunction rule detection method includes the following steps 301b to step 303b:
The sample data after private data and label in step 301b, after receiving the label that server is sent.
Optionally, second terminal can directly receive server transmission label after private data and label after sample Data, can also first to server send private data request so that server receive private data request when, then will mark The sample data after private data and label after note is sent to second terminal, so that second terminal receives the privacy after label Sample data after data and label.
In step 302b, GDPR according to the pre-stored data closes rule rule and determines the private data after the label and described Whether have in sample data after label and does not meet the violation data that the GDPR closes rule rule.
Exemplary, it includes that telephone number forbids upload, telephone number to allow to read and print, account that GDPR, which is closed in rule rule, Information forbids upload, non-print and allows to read, and handset serial is forbidden uploading, forbids reading and non-print, this electromechanics Words number allows to upload, allows to read, allowing the rules such as printing, and the private data after label includes addition red-label, brown The account letter of the telephone number 137****8257 and addition brown mark, Green Marker and yellow flag of label and yellow flag 6226****1754 is ceased, the sample data after label includes adding the telephone number of first terminal the machine of purple label, explanation The telephone number of first terminal the machine allows to upload, but first terminal does not upload, in order to avoid GDPR is closed rule rule It is middle that the data uploaded is allowed encrypt etc. processing in violation of rules and regulations, then it will allow to upload but the data not uploaded are also used as violation data, It can be determined that addition red-label, the telephone number 137****8257 of brown mark and yellow flag and addition purple mark The telephone number of first terminal the machine of note is violation data, the account letter of addition brown mark, Green Marker and yellow flag Breath 6226****1754 is routine data.
Further, when pre-stored GDPR closes rule rule and modified, then rule rule is closed according to modified GDPR Whether have in the sample data after private data and label after determining label and does not meet disobeying for modified GDPR conjunction rule rule Advise data.
In step 303b, has in determining the private data after the label and the sample data after the label and do not accord with When closing the violation data of the GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
Optionally, the classification of the violation data is determined;
The examining report of the application program is generated according to the label of the classification of the violation data and the violation data.
It is exemplary, if violation data includes the telephone number 137**** for adding red-label, brown mark and yellow flag The telephone number of 8257 first terminal the machine marked with addition purple can then determine that the classification of violation data is routine call The telephone number of number and first terminal the machine, thus according to Conventional telephone numbers and corresponding label, first terminal the machine Telephone number generates the examining report of application program with corresponding label.
Further, have in determining the sample data after the private data and label after the label described in not meeting When GDPR closes the violation data of rule rule, the detection report of the application program is generated according to routine data and the violation data It accuses, specific method is referring to the description of above-mentioned steps 303a, and details are not described herein for the embodiment of the present disclosure.
Fig. 4 a is a kind of interaction figure for closing rule detection method shown according to an exemplary embodiment, executing subject first Terminal, second terminal and server include the following steps 401a to step 408a as shown in fig. 4 a:
In step 401a, first terminal runs Monkey test program.
Wherein, the Monkey test program is for testing the application program of the first terminal.
In step 402a, first terminal obtains the communication number of the application program from the Monkey test program According to.
Wherein, the communication data includes at least one of http request message, memory stacked data, daily record data.
In step 403a, first terminal sends the communication data to server, and server receives first terminal and sends Communication data.
In step 404a, server privacy sample data according to the pre-stored data determines in the communication data whether contain There is private data.
Wherein, the privacy sample data is the data stored in the first terminal.
In step 405a, when server contains the private data in determining the communication data, according to described hidden The private data is marked in the data type of private data.
Wherein, the data type of the private data includes http request message, memory stacked data or daily record data.
In step 406a, the private data after the label is sent to the second terminal, second terminal by server Private data after receiving the label that server is sent.
In step 407a, second terminal GDPR according to the pre-stored data closes rule rule and determines the privacy number after the label Whether have in and does not meet the violation data that the GDPR closes rule rule.
In step 408a, second terminal has in determining the private data after the label does not meet the GDPR conjunction When the violation data of rule, the examining report of application program is generated according to the violation data.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and first terminal gets application from Monkey test program The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label In have do not meet GDPR close rule rule violation data when, according to violation data generate application program examining report, Yong Hutong The testing result of application program can be checked by crossing examining report, realize automatically generating for the examining report of application program, inspection It surveys high-efficient.
Fig. 4 b is a kind of interaction figure for closing rule detection method shown according to an exemplary embodiment, executing subject first Terminal, second terminal and server include the following steps 401b to step 410b as shown in Figure 4 b:
In step 401b, first terminal runs Monkey test program.
Wherein, the Monkey test program is for testing the application program of the first terminal.
In step 402b, first terminal obtains the communication number of the application program from the Monkey test program According to.
Wherein, the communication data includes at least one of http request message, memory stacked data, daily record data.
In step 403b, first terminal sends the communication data to server, and server receives first terminal and sends Communication data.
In step 404b, server privacy sample data according to the pre-stored data determines in the communication data whether contain There is private data.
Wherein, the privacy sample data is the data stored in the first terminal.
In step 405b, when server contains the private data in determining the communication data, according to described hidden The private data is marked in the data type of private data.
Wherein, the data type of the private data includes http request message, memory stacked data or daily record data.
In step 406b, whether determine in the privacy sample data comprising the sample number different from the communication data According to.
It include the sample data different from the communication data in determining the privacy sample data in step 407b When, the sample data is marked.
In step 408b, second terminal sends private data request to server, and server receives second terminal and sends Private data request.
In step 409b, server will be after the private data and label after the label in response to private data request Sample data is sent to the second terminal, after second terminal receives private data and label after the label that server is sent Sample data.
In step 410b, second terminal closes rule rule to the pre-stored GDPR and modifies.
In step 411b, second terminal closes the privacy after rule rule determines the label according to the modified GDPR Whether have in sample data after data and label and does not meet the violation data that the GDPR closes rule rule.
In step 412b, second terminal has in determining the sample data after the private data and label after the label When not meeting the violation data of the GDPR conjunction rule rule, the inspection of the application program is generated according to routine data and violation data Observe and predict announcement.
Wherein, the routine data closes the regular data of rule to meet the GDPR in the private data after the label.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and first terminal gets application from Monkey test program The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data According to when, and private data is marked and is stored, will when device to be serviced receives the private data request of second terminal transmission Private data after label is sent to second terminal, does not meet so that second terminal has in determining the private data after label When GDPR closes the violation data of rule rule, application program is generated according to the violation data after routine data and addition violation label Examining report, user can check the testing result of application program by examining report, realize the detection report of application program That accuses automatically generates, and detection efficiency is high.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.
Fig. 5 is a kind of structural schematic diagram for closing rule detection device 50 shown according to an exemplary embodiment, conjunction rule inspection Surveying device 50 being implemented in combination with as some or all of of electronic equipment by software, hardware or both.Such as Fig. 5 institute Show, which advises detection device 50 and include operation module 501, obtain module 502 and the first sending module 503.
Wherein, module 501 is run, for running Monkey test program;The Monkey test program is used for described The application program of first terminal is tested.
Module 502 is obtained, for obtaining the communication data of the application program from the Monkey test program.
First sending module 503, for sending the communication data to server, so that the server is determining When stating in communication data containing private data, the private data is marked according to whether the private data is used, And the private data after label is sent to second terminal, so that privacy number of the second terminal after determining the label When having the violation data for not meeting GDPR conjunction rule rule in, the examining report of application program is generated according to the violation data.
In one embodiment, the communication data includes at least http request message, memory stacked data, daily record data One of.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and first terminal gets application from Monkey test program The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label In have do not meet GDPR close rule rule violation data when, according to violation data generate application program examining report, Yong Hutong The testing result of application program can be checked by crossing examining report, realize automatically generating for the examining report of application program, inspection It surveys high-efficient.
Fig. 6 a is a kind of structural schematic diagram for closing rule detection device 60 shown according to an exemplary embodiment, conjunction rule inspection Surveying device 60 being implemented in combination with as some or all of of electronic equipment by software, hardware or both.Such as Fig. 6 a Shown, it includes the first receiving module 601, the first determining module 602, the first mark module 603 and the which, which advises detection device 60, Two sending modules 604.
Wherein, the first receiving module 601, for receiving the communication data of first terminal transmission.
First determining module 602, for privacy sample data according to the pre-stored data determine in the communication data whether Contain private data;The privacy sample data is the private data of the first terminal of server storage.
First mark module 603, when for containing the private data in determining the communication data, according to described hidden The private data is marked in the data type of private data;The data type of the private data includes http request report Text, memory stacked data and daily record data.
Second sending module 604, for the private data after label to be sent to second terminal, so that described second is whole When there is the violation data for not meeting GDPR conjunction rule rule at end in determining the private data after the label, according to the violation number According to the examining report for generating application program.
In one embodiment, as shown in Figure 6 b, described device 60 further includes the second determining module 605 and the second label Module 606, second sending module 604 include the first sending submodule 6041.
Second determining module 605, for determine in the privacy sample data whether include and the communication data Different sample datas.
Second mark module 606, in determining the privacy sample data comprising with the communication data not With sample data when, the sample data is marked.
First sending submodule 6041, for the sample data after the private data and label after label to be sent to Second terminal, so that the second terminal is in determining the private data after the label and the sample data after the label When having the violation data for not meeting GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
In one embodiment, as fig. 6 c, first sending submodule 6041 includes receiving unit 60411 and hair Send unit 60412.
The receiving unit 60411, the private data request sent for receiving the second terminal.
The transmission unit 60412, in response to the private data request by after the label private data and Sample data after the label is sent to the second terminal.
In one embodiment, as shown in fig 6d, first determining module 602 includes searching submodule 6021 and the One determines submodule 6022.
The lookup submodule 6021, for being searched whether in the communication data in the privacy sample data Data.
Described first determines submodule 6022, for having in the communication data in determining the privacy sample data When data, the data are determined as the private data.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and server is in the application program for receiving first terminal transmission Communication data when, in determining communication data contain private data when, be sent to after private data is marked second eventually End, when so that second terminal having the violation data for not meeting GDPR conjunction rule rule in determining the private data after label, according to Violation data generates the examining report of application program, and user can check the testing result of application program by examining report, Automatically generating for the examining report of application program is realized, detection efficiency is high.
Fig. 7 a is a kind of structural schematic diagram for closing rule detection device 70 shown according to an exemplary embodiment, conjunction rule inspection Surveying device 70 being implemented in combination with as some or all of of electronic equipment by software, hardware or both.Such as Fig. 7 a Shown, it includes the second receiving module 701, third determining module 702 and generation module 703 which, which advises detection device 70,.
Wherein, the second receiving module 701, the private data after label for receiving server transmission.
Third determining module 702 closes the privacy number after rule rule determines the label for GDPR according to the pre-stored data Whether have in and does not meet the violation data that the GDPR closes rule rule.
Generation module 703 does not meet the GDPR conjunction rule rule for having in determining the private data after the label Violation data when, according to the violation data generate application program examining report.
In one embodiment, as shown in Figure 7b, the generation module 703 includes the first generation submodule 7031.
Described first generates submodule 7031, for have in determining the private data after the label do not meet it is described When GDPR closes the violation data of rule rule, the detection report of the application program is generated according to routine data and the violation data It accuses;The routine data closes the regular data of rule to meet the GDPR in the private data after the label.
In one embodiment, as shown in Figure 7 c, the third determining module 702 includes modification submodule 7021 and the Two determine submodule 7022.
The modification submodule 7021 is modified for closing rule rule to the pre-stored GDPR.
Described second determines submodule 7022, after determining the label according to the modified GDPR conjunction rule rule Private data in whether have and do not meet the violation data that the modified GDPR closes rule rule.
In one embodiment, as shown in figure 7d, second receiving module 701 includes the second receiving submodule 7011, The third determining module 702 includes that third determines that submodule 7023, the generation module 703 include the second generation submodule 7032。
Second receiving submodule 7011, for receive server transmission label after private data and label after Sample data.
The third determines submodule 7023, after closing the determining label of rule rule for GDPR according to the pre-stored data Whether have in sample data after private data and the label and does not meet the violation data that the GDPR closes rule rule.
Described second generates submodule 7032, for determining the private data after the label and the sample after the label When having the violation data for not meeting the GDPR conjunction rule rule in notebook data, the inspection of application program is generated according to the violation data Observe and predict announcement.
In one embodiment, as shown in figure 7e, second receiving submodule 7011 includes the second transmission unit 70111 With the second receiving unit 70112.
Second transmission unit 70111, for sending private data request to the server.
Second receiving unit 70112, for receive the private data after the label that the server is sent and Sample data after label.
In one embodiment, as depicted in fig. 7f, the second generation submodule 7032 includes determination unit 70321 and life At unit 70322.
The determination unit 70321, for determining the classification of the violation data.
The generation unit 70322, for being generated according to the classification of the violation data and the label of the violation data The examining report of the application program.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and first terminal gets application from Monkey test program The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label In have when not meeting GDPR and closing the violation data of rule rule, the detection report of application program is generated according to violation data and routine data It accuses, user can check the testing result of application program by examining report, realize the examining report of application program oneself Dynamic to generate, detection efficiency is high.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and conjunction rule detection device includes:
First processor;
For storing the first memory of first processor executable instruction;
Wherein, the first processor is configured as:
Run Monkey test program;The Monkey test program is used to carry out the application program of the first terminal Test;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains privacy in determining the communication data When data, the private data is marked according to whether the private data is used, and by the private data after label It is sent to second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule When the violation data of rule, the examining report of application program is generated according to the violation data.
In one embodiment, above-mentioned first processor is also configured to: the communication data is asked including at least http Ask one of message, memory stacked data, daily record data.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and first terminal gets application from Monkey test program The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label In have do not meet GDPR close rule rule violation data when, according to violation data generate application program examining report, Yong Hutong The testing result of application program can be checked by crossing examining report, realize automatically generating for the examining report of application program, inspection It surveys high-efficient.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and conjunction rule detection device includes:
Second processor;
For storing the second memory of second processor executable instruction;
Wherein, the second processor is configured as:
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy Sample data is the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to institute Private data is stated to be marked;The data type of the private data includes http request message, memory stacked data and log Data;
Private data after label is sent to second terminal, so that the second terminal is after determining the label When having the violation data for not meeting GDPR conjunction rule rule in private data, the detection of application program is generated according to the violation data Report.
In one embodiment, above-mentioned second processor is also configured to: determine in the privacy sample data whether Include the sample data different from the communication data;
When including the sample data different from the communication data in determining the privacy sample data, to the sample Data are marked;
The private data by after label is sent to second terminal, so that the second terminal is determining the label When having the violation data for not meeting GDPR conjunction rule rule in private data afterwards, application program is generated according to the violation data Examining report includes:
Sample data after private data and label after label is sent to second terminal, so that the second terminal Have in determining the private data after the label and the sample data after the label and does not meet the violation that GDPR closes rule rule When data, the examining report of application program is generated according to the violation data.
In one embodiment, above-mentioned second processor is also configured to: receiving the privacy that the second terminal is sent Request of data;
It requests the sample data after the private data and label after label being sent to second in response to the private data Terminal.
In one embodiment, above-mentioned second processor is also configured to: searching in the privacy sample data is The no data having in the communication data;
When there are the data in the communication data in determining the privacy sample data, the data are determined as described Private data.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and server is in the application program for receiving first terminal transmission Communication data when, in determining communication data contain private data when, be sent to after private data is marked second eventually End, when so that second terminal having the violation data for not meeting GDPR conjunction rule rule in determining the private data after label, according to Violation data generates the examining report of application program, and user can check the testing result of application program by examining report, Automatically generating for the examining report of application program is realized, detection efficiency is high.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and conjunction rule detection device includes:
Third processor;
For storing the third memory of third processor-executable instruction;
Wherein, the third processor is configured as:
Private data after receiving the label that server is sent;
Whether have described in not meeting in private data after the determining label of GDPR conjunction rule rule according to the pre-stored data GDPR closes the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to The violation data generates the examining report of application program.
In one embodiment, above-mentioned third processor is also configured to: the private data after determining the label In have when not meeting the GDPR and closing the violation data of rule rule, the application is generated according to routine data and the violation data The examining report of program;The routine data closes the regular number of rule to meet the GDPR in the private data after the label According to.
In one embodiment, above-mentioned third processor is also configured to: closing rule rule to the pre-stored GDPR Then modify;
It is closed whether to have not meet in the private data after rule rule determines the label according to the modified GDPR and be repaired The GDPR after changing closes the violation data of rule rule.
In one embodiment, above-mentioned third processor is also configured to: hidden after receiving the label that server is sent Sample data after private data and label;
GDPR according to the pre-stored data closes the sample after private data and the label after rule rule determines the label Whether have in data and does not meet the violation data that the GDPR closes rule rule;
Have in determining the private data after the label and the sample data after the label and does not meet the GDPR conjunction When the violation data of rule, the examining report of application program is generated according to the violation data.
In one embodiment, above-mentioned third processor is also configured to: Xiang Suoshu server sends private data and asks It asks;
The sample data after private data and label after receiving the label that server is sent.
In one embodiment, above-mentioned third processor is also configured to: determining the classification of the violation data;
The examining report of the application program is generated according to the label of the classification of the violation data and the violation data.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and first terminal gets application from Monkey test program The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label In have when not meeting GDPR and closing the violation data of rule rule, the detection report of application program is generated according to violation data and routine data It accuses, user can check the testing result of application program by examining report, realize the examining report of application program oneself Dynamic to generate, detection efficiency is high.
About the device in above-described embodiment, wherein modules execute the specific method of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 8 is a kind of structural block diagram for closing rule detection device 90 shown according to an exemplary embodiment, and the device 80 is suitable For first terminal and second terminal.For example, device 80 can be mobile phone, computer, digital broadcast terminal, information receiving and transmitting Equipment, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Device 80 may include following one or more components: processing component 802, memory 804, and power supply module 806 is more Media component 808, audio component 810, the interface 812 of input/output (I/O), sensor module 814 and communication component 816。
The integrated operation of the usual control device 80 of processing component 802, such as with display, telephone call, data communication, camera Operation and record operate associated operation.Processing element 802 may include one or more processors 820 to execute instruction, To perform all or part of the steps of the methods described above.In addition, processing component 802 may include one or more modules, it is convenient for Interaction between processing component 802 and other assemblies.For example, processing component 802 may include multi-media module, to facilitate more matchmakers Interaction between body component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in device 80.These data are shown Example includes the instruction of any application or method for operating on device 80, contact data, and telephone book data disappears Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Electric power assembly 806 provides electric power for the various assemblies of device 80.Electric power assembly 806 may include power management system System, one or more power supplys and other with for device 80 generate, manage, and distribute the associated component of electric power.
Multimedia component 808 includes the screen of one output interface of offer between described device 80 and user.One In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers Body component 808 includes a front camera and/or rear camera.When device 80 is in operation mode, such as screening-mode or When video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 810 is configured as output and/or input audio signal.For example, audio component 810 includes a Mike Wind (MIC), when device 80 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is configured To receive external audio signal.The received audio signal can be further stored in memory 804 or via communication component 816 send.In some embodiments, audio component 810 further includes a loudspeaker, is used for output audio signal.
I/O interface 812 provides interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 814 includes one or more sensors, for providing the status assessment of various aspects for device 80. For example, sensor module 814 can detecte the state that opens/closes of device 80, the relative positioning of component, such as the component For the display and keypad of device 80, sensor module 814 can be with the position of 80 1 components of detection device 80 or device Change, the existence or non-existence that user contacts with device 80, the temperature change in 80 orientation of device or acceleration/deceleration and device 80. Sensor module 814 may include proximity sensor, be configured to detect object nearby without any physical contact Presence.Sensor module 814 can also include that optical sensor is used in imaging applications such as CMOS or ccd image sensor It uses.In some embodiments, which can also include acceleration transducer, gyro sensor, magnetic sensing Device, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 80 and other equipment.Device 80 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 816 further includes near-field communication (NFC) module, to promote short range communication.Example Such as, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) skill can be based in NFC module Art, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 80 can be believed by one or more application specific integrated circuit (ASIC), number Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 804 of instruction, above-metioned instruction can be executed by the processor 820 of device 80 to complete the above method.For example, institute State non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and Optical data storage devices etc..
Fig. 9 is a kind of block diagram for closing rule detection device shown according to an exemplary embodiment.For example, device 900 can be with It is provided as a server.Device 900 includes processing component 922, further comprises one or more processors, and by depositing Memory resource representated by reservoir 932, can be by the instruction of the execution of processing component 922, such as application program for storing.It deposits The application program stored in reservoir 932 may include it is one or more each correspond to one group of instruction module.This Outside, processing component 922 is configured as executing instruction, to execute the above method.
Device 900 can also include the power management that a power supply module 926 is configured as executive device 900, and one has Line or radio network interface 950 are configured as device 900 being connected to network and input and output (I/O) interface 958.Dress Setting 900 can operate based on the operating system for being stored in memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
The embodiment of the present disclosure provides a kind of non-transitorycomputer readable storage medium, the instruction in the storage medium When being executed by the processor of first terminal, so that first terminal is able to carry out above-mentioned conjunction rule detection method, which comprises
Run Monkey test program;The Monkey test program is used to carry out the application program of the first terminal Test;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains privacy in determining the communication data When data, the private data is marked according to whether the private data is used, and by the private data after label It is sent to second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule When the violation data of rule, the examining report of application program is generated according to the violation data.
In one embodiment, the communication data includes at least http request message, memory stacked data, daily record data One of.
The embodiment of the present disclosure provides a kind of non-transitorycomputer readable storage medium, the instruction in the storage medium When being executed by the processor of server, enable the server to execute above-mentioned conjunction rule detection method, which comprises
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy Sample data is the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to institute Private data is stated to be marked;The data type of the private data includes http request message, memory stacked data and log Data;
Private data after label is sent to second terminal, so that the second terminal is after determining the label When having the violation data for not meeting GDPR conjunction rule rule in private data, the detection of application program is generated according to the violation data Report.
In one embodiment, further includes:
It whether determines in the privacy sample data comprising the sample data different from the communication data;
When including the sample data different from the communication data in determining the privacy sample data, to the sample Data are marked;
The private data by after label is sent to second terminal, so that the second terminal is determining the label When having the violation data for not meeting GDPR conjunction rule rule in private data afterwards, application program is generated according to the violation data Examining report includes:
Sample data after private data and label after label is sent to second terminal, so that the second terminal Have in determining the private data after the label and the sample data after the label and does not meet the violation that GDPR closes rule rule When data, the examining report of application program is generated according to the violation data.
In one embodiment, the sample data after the private data and label by after label is sent to second terminal Include:
Receive the private data request that the second terminal is sent;
It requests the sample data after the private data and label after label being sent to second in response to the private data Terminal.
In one embodiment, the privacy sample data according to the pre-stored data determines in the communication data whether contain There is the private data to include:
The data in the communication data are searched whether in the privacy sample data;
When there are the data in the communication data in determining the privacy sample data, the data are determined as described Private data.
The embodiment of the present disclosure provides a kind of non-transitorycomputer readable storage medium, the instruction in the storage medium When being executed by the processor of second terminal, so that second terminal is able to carry out above-mentioned conjunction rule detection method, which comprises
Private data after receiving the label that server is sent;
Whether have described in not meeting in private data after the determining label of GDPR conjunction rule rule according to the pre-stored data GDPR closes the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to The violation data generates the examining report of application program.
In one embodiment, it is described have in determining the private data after the label do not meet the GDPR and close rule When the violation data of rule, include: according to the examining report that the violation data generates application program
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to Routine data and the violation data generate the examining report of the application program;The routine data is hidden after the label Meet the data that the GDPR closes rule rule in private data.
In one embodiment, the GDPR according to the pre-stored data closes rule rule and determines the private data after the label In whether have not meeting the GDPR and close the violation data of rule rule and include:
Rule rule is closed to the pre-stored GDPR to modify;
It is closed whether to have not meet in the private data after rule rule determines the label according to the modified GDPR and be repaired The GDPR after changing closes the violation data of rule rule.
In one embodiment, the private data after the label for receiving server transmission includes:
The sample data after private data and label after receiving the label that server is sent;
Whether the GDPR according to the pre-stored data, which closes to have in the private data after rule rule determines the label, does not meet The GDPR closes the regular violation data of rule
GDPR according to the pre-stored data closes the sample after private data and the label after rule rule determines the label Whether have in data and does not meet the violation data that the GDPR closes rule rule;
It is described to have when not meeting the GDPR and closing the violation data of rule rule in determining the private data after the label, Include: according to the examining report that the violation data generates application program
Have in determining the private data after the label and the sample data after the label and does not meet the GDPR conjunction When the violation data of rule, the examining report of application program is generated according to the violation data.
In one embodiment, the sample data after the private data and label after the label for receiving server transmission Include:
Private data request is sent to the server;
The sample data after private data and label after receiving the label that server is sent.
In one embodiment, described in determining the private data after the label and the sample data after the label When having the violation data for not meeting the GDPR conjunction rule rule, the examining report packet of application program is generated according to the violation data It includes:
Determine the classification of the violation data;
The examining report of the application program is generated according to the label of the classification of the violation data and the violation data.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing disclosure disclosed herein Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (28)

1. detection method is advised in a kind of conjunction, which is characterized in that be applied to first terminal, comprising:
Run Monkey test program;The Monkey test program is for surveying the application program of the first terminal Examination;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains private data in determining the communication data When, the private data is marked according to whether the private data is used, and the private data after label is sent To second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule rule Violation data when, according to the violation data generate application program examining report.
2. the method according to claim 1, wherein the communication data includes at least http request message, interior Deposit one of stacked data, daily record data.
3. detection method is advised in a kind of conjunction, which is characterized in that be applied to server, comprising:
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy sample Data are the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to described hidden Private data are marked;The data type of the private data includes http request message, memory stacked data and daily record data;
Private data after label is sent to second terminal, so that privacy of the second terminal after determining the label When having the violation data for not meeting GDPR conjunction rule rule in data, the detection report of application program is generated according to the violation data It accuses.
4. according to the method described in claim 3, it is characterized by further comprising:
It whether determines in the privacy sample data comprising the sample data different from the communication data;
When including the sample data different from the communication data in determining the privacy sample data, to the sample data It is marked;
The private data by after label is sent to second terminal, so that the second terminal is after determining the label When having the violation data for not meeting GDPR conjunction rule rule in private data, the detection of application program is generated according to the violation data Report includes:
Sample data after private data and label after label is sent to second terminal, so that the second terminal is true Have in the sample data after private data and the label after the fixed label and does not meet the violation data that GDPR closes rule rule When, the examining report of application program is generated according to the violation data.
5. according to the method described in claim 4, it is characterized in that, sample after the private data and label by after label Data are sent to second terminal
Receive the private data request that the second terminal is sent;
It requests the sample data after the private data and label after label being sent to second terminal in response to the private data.
6. according to the method described in claim 3, it is characterized in that, the privacy sample data according to the pre-stored data determines institute State in communication data whether containing private data include:
The data in the communication data are searched whether in the privacy sample data;
When there are the data in the communication data in determining the privacy sample data, the data are determined as the privacy Data.
7. detection method is advised in a kind of conjunction, which is characterized in that be applied to second terminal, comprising:
Private data after receiving the label that server is sent;
Whether GDPR according to the pre-stored data, which closes to have in the private data after rule rule determines the label, does not meet the GDPR Close the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to described The examining report of violation data generation application program.
8. the method according to the description of claim 7 is characterized in that described have not in determining the private data after the label When meeting the violation data of the GDPR conjunction rule rule, include: according to the examining report that the violation data generates application program
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to routine Data and the violation data generate the examining report of the application program;The routine data is the privacy number after the label Meet the data that the GDPR closes rule rule in.
9. the method according to the description of claim 7 is characterized in that the GDPR according to the pre-stored data, which closes rule rule, determines institute Whether have not meeting the GDPR and close the violation data of rule rule in private data after stating label and includes:
Rule rule is closed to the pre-stored GDPR to modify;
Whether have after not meeting modification in private data after closing the determining label of rule rule according to the modified GDPR The GDPR close rule rule violation data.
10. the method according to the description of claim 7 is characterized in that the privacy number received after the label that server is sent According to including:
The sample data after private data and label after receiving the label that server is sent;
Whether have described in not meeting in private data after the determining label of the GDPR conjunction rule rule according to the pre-stored data GDPR closes the regular violation data of rule
GDPR according to the pre-stored data closes the sample data after private data and the label after rule rule determines the label In whether have and do not meet the violation data that the GDPR closes rule rule;
It is described to have when not meeting the GDPR and closing the violation data of rule rule in determining the private data after the label, according to The examining report that the violation data generates application program includes:
Have in determining the private data after the label and the sample data after the label and does not meet the GDPR conjunction rule rule When violation data then, the examining report of application program is generated according to the violation data.
11. according to the method described in claim 10, it is characterized in that, the privacy number received after the label that server is sent Include: according to the sample data after label
Private data request is sent to the server;
The sample data after private data and label after receiving the label that server is sent.
12. according to the method described in claim 10, it is characterized in that, the private data and institute after determining the label When having the violation data for not meeting the GDPR conjunction rule rule in the sample data after stating label, generated according to the violation data The examining report of application program includes:
Determine the classification of the violation data;
The examining report of the application program is generated according to the label of the classification of the violation data and the violation data.
13. detection device is advised in a kind of conjunction characterized by comprising
Module is run, for running Monkey test program;The Monkey test program is for answering the first terminal It is tested with program;
Module is obtained, for obtaining the communication data of the application program from the Monkey test program;
First sending module, for sending the communication data to server, so that the server is determining the communication When containing private data in data, the private data is marked according to whether the private data is used, and will mark Private data after note is sent to second terminal, so that the second terminal has in determining the private data after the label When not meeting the violation data of GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
14. device according to claim 13, which is characterized in that the communication data include at least http request message, One of memory stacked data, daily record data.
15. detection device is advised in a kind of conjunction characterized by comprising
First receiving module, for receiving the communication data of first terminal transmission;
First determining module determines in the communication data whether contain privacy for privacy sample data according to the pre-stored data Data;The privacy sample data is the private data of the first terminal of server storage;
First mark module, when for containing the private data in determining the communication data, according to the private data Data type the private data is marked;The data type of the private data includes http request message, memory Stacked data and daily record data;
Second sending module, for the private data after label to be sent to second terminal, so that the second terminal is true When having the violation data for not meeting GDPR conjunction rule rule in the private data after the fixed label, generated according to the violation data The examining report of application program.
16. device according to claim 15, which is characterized in that it further include the second determining module and the second mark module, Second sending module includes the first sending submodule;
Second determining module, for whether determining in the privacy sample data comprising the sample different from the communication data Notebook data;
Second mark module, for including the sample different from the communication data in determining the privacy sample data When data, the sample data is marked;
First sending submodule, for the sample data after the private data and label after label to be sent to second eventually End, does not accord with so that the second terminal has in determining the private data after the label and the sample data after the label When closing the violation data of GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
17. device according to claim 16, which is characterized in that first sending submodule includes the first receiving unit With the first transmission unit;
First receiving unit, the private data request sent for receiving the second terminal;
First transmission unit, for requesting in response to the private data by the private data and the mark after the label Sample data after note is sent to the second terminal.
18. device according to claim 15, which is characterized in that first determining module includes searching submodule and the One determines submodule;
The lookup submodule, for searching whether the data in the communication data in the privacy sample data;
Described first determines submodule, when for having the data in the communication data in determining the privacy sample data, The data are determined as the private data.
19. detection device is advised in a kind of conjunction characterized by comprising
Second receiving module, the private data after label for receiving server transmission;
Third determining module, for GDPR according to the pre-stored data close in the private data after rule rule determines the label whether Have and does not meet the violation data that the GDPR closes rule rule;
Generation module, for there is the violation number for not meeting the GDPR and closing rule rule in determining the private data after the label According to when, according to the violation data generate application program examining report.
20. device according to claim 19, which is characterized in that the generation module includes the first generation submodule;
Described first generates submodule, does not meet the GDPR conjunction rule rule for having in determining the private data after the label When violation data then, the examining report of the application program is generated according to routine data and the violation data;The routine Data close the regular data of rule to meet the GDPR in the private data after the label.
21. device according to claim 19, which is characterized in that the third determining module includes modification submodule and the Two determine submodule;
The modification submodule is modified for closing rule rule to the pre-stored GDPR;
Described second determines submodule, for closing the privacy number after rule rule determines the label according to the modified GDPR Whether have in and does not meet the violation data that the modified GDPR closes rule rule.
22. device according to claim 19, which is characterized in that second receiving module includes the second reception submodule Block, the third determining module include that third determines that submodule, the generation module include the second generation submodule;
Second receiving submodule, the sample number after the private data and label after label for receiving server transmission According to;
The third determines submodule, closes the private data after rule rule determines the label for GDPR according to the pre-stored data The regular violation data of the GDPR conjunction rule is not met with whether having in the sample data after the label;
Described second generates submodule, in determining the private data after the label and the sample data after the label When having the violation data for not meeting the GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
23. device according to claim 22, which is characterized in that second receiving submodule includes the second transmission unit With the second receiving unit;
Second transmission unit, for sending private data request to the server;
Second receiving unit, the sample after the private data and label after the label for receiving the server transmission Notebook data.
24. device according to claim 22, which is characterized in that the second generation submodule includes determination unit and life At unit;
The determination unit, for determining the classification of the violation data;
The generation unit, it is described using journey for being generated according to the classification of the violation data and the label of the violation data The examining report of sequence.
25. detection device is advised in a kind of conjunction characterized by comprising
First processor;
For storing the first memory of first processor executable instruction;
Wherein, the first processor is configured as:
Run Monkey test program;The Monkey test program is for surveying the application program of the first terminal Examination;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains private data in determining the communication data When, the private data is marked according to whether the private data is used, and the private data after label is sent To second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule rule Violation data when, according to the violation data generate application program examining report.
26. detection device is advised in a kind of conjunction characterized by comprising
Second processor;
For storing the second memory of second processor executable instruction;
Wherein, the second processor is configured as:
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy sample Data are the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to described hidden Private data are marked;The data type of the private data includes http request message, memory stacked data and daily record data;
Private data after label is sent to second terminal, so that privacy of the second terminal after determining the label When having the violation data for not meeting GDPR conjunction rule rule in data, the detection report of application program is generated according to the violation data It accuses.
27. detection device is advised in a kind of conjunction characterized by comprising
Third processor;
For storing the third memory of third processor-executable instruction;
Wherein, the third processor is configured as:
Private data after receiving the label that server is sent;
Whether GDPR according to the pre-stored data, which closes to have in the private data after rule rule determines the label, does not meet the GDPR Close the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to described The examining report of violation data generation application program.
28. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that the instruction is by processor The step of claim 1 to 12 any one claim the method is realized when execution.
CN201811526442.4A 2018-12-13 2018-12-13 Compliance detection method and device Active CN109739748B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811526442.4A CN109739748B (en) 2018-12-13 2018-12-13 Compliance detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811526442.4A CN109739748B (en) 2018-12-13 2018-12-13 Compliance detection method and device

Publications (2)

Publication Number Publication Date
CN109739748A true CN109739748A (en) 2019-05-10
CN109739748B CN109739748B (en) 2022-06-10

Family

ID=66359333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811526442.4A Active CN109739748B (en) 2018-12-13 2018-12-13 Compliance detection method and device

Country Status (1)

Country Link
CN (1) CN109739748B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502926A (en) * 2019-08-26 2019-11-26 北京小米移动软件有限公司 Privacy closes rule detection method and device
CN110990873A (en) * 2019-12-03 2020-04-10 浙江大华技术股份有限公司 Illegal operation monitoring method, computer equipment and storage medium
CN111158748A (en) * 2019-12-16 2020-05-15 北京小米移动软件有限公司 Information acquisition method and device and storage medium
CN111245804A (en) * 2020-01-06 2020-06-05 北京松果电子有限公司 Communication security testing method and device for terminal equipment and storage medium
CN111835756A (en) * 2020-07-10 2020-10-27 深圳市网安计算机安全检测技术有限公司 APP privacy compliance detection method and device, computer equipment and storage medium
EP3786824A1 (en) * 2019-08-30 2021-03-03 Beijing Xiaomi Mobile Software Co., Ltd. Methods and devices for testing an application on a terminal
CN113139186A (en) * 2021-04-14 2021-07-20 北京开元华创信息技术有限公司 Personal information security audit evaluation system
CN113872819A (en) * 2020-06-30 2021-12-31 深圳Tcl数字技术有限公司 Equipment testing method and computer equipment
CN114676432A (en) * 2022-05-26 2022-06-28 河北兰科网络工程集团有限公司 APP privacy compliance checking method, terminal and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102419727A (en) * 2011-09-30 2012-04-18 宇龙计算机通信科技(深圳)有限公司 Automatic test method and device
CN102938040A (en) * 2012-09-29 2013-02-20 中兴通讯股份有限公司 Malicious Android application program detection method, system and device
CN104462961A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Mobile terminal and privacy permission optimizing method thereof
US20150261960A1 (en) * 2012-01-30 2015-09-17 Nokia Technologies Oy Method and apparatus providing privacy benchmarking for mobile application development
CN107133519A (en) * 2017-05-15 2017-09-05 华中科技大学 Privacy compromise detection method and system in a kind of Android application network communication
CN108900473A (en) * 2018-06-04 2018-11-27 麒麟合盛网络技术股份有限公司 A kind of data monitoring method, device and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102419727A (en) * 2011-09-30 2012-04-18 宇龙计算机通信科技(深圳)有限公司 Automatic test method and device
US20150261960A1 (en) * 2012-01-30 2015-09-17 Nokia Technologies Oy Method and apparatus providing privacy benchmarking for mobile application development
CN102938040A (en) * 2012-09-29 2013-02-20 中兴通讯股份有限公司 Malicious Android application program detection method, system and device
CN104462961A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Mobile terminal and privacy permission optimizing method thereof
CN107133519A (en) * 2017-05-15 2017-09-05 华中科技大学 Privacy compromise detection method and system in a kind of Android application network communication
CN108900473A (en) * 2018-06-04 2018-11-27 麒麟合盛网络技术股份有限公司 A kind of data monitoring method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郑斌: "企业数据安全能力框架——数据安全能力成熟度模型的构建及应用", 《信息安全与通信保密》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502926A (en) * 2019-08-26 2019-11-26 北京小米移动软件有限公司 Privacy closes rule detection method and device
EP3786824A1 (en) * 2019-08-30 2021-03-03 Beijing Xiaomi Mobile Software Co., Ltd. Methods and devices for testing an application on a terminal
US11363066B2 (en) 2019-08-30 2022-06-14 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for information processing, test terminal, test platform and storage medium
CN110990873A (en) * 2019-12-03 2020-04-10 浙江大华技术股份有限公司 Illegal operation monitoring method, computer equipment and storage medium
EP3839786A1 (en) * 2019-12-16 2021-06-23 Beijing Xiaomi Mobile Software Co., Ltd. Information acquisition method and device, and storage medium
CN111158748A (en) * 2019-12-16 2020-05-15 北京小米移动软件有限公司 Information acquisition method and device and storage medium
US11763023B2 (en) 2019-12-16 2023-09-19 Beijing Xiaomi Mobile Software Co., Ltd. Information acquisition method and device, and storage medium
CN111158748B (en) * 2019-12-16 2024-01-30 北京小米移动软件有限公司 Information acquisition method and device and storage medium
CN111245804A (en) * 2020-01-06 2020-06-05 北京松果电子有限公司 Communication security testing method and device for terminal equipment and storage medium
CN113872819A (en) * 2020-06-30 2021-12-31 深圳Tcl数字技术有限公司 Equipment testing method and computer equipment
CN111835756A (en) * 2020-07-10 2020-10-27 深圳市网安计算机安全检测技术有限公司 APP privacy compliance detection method and device, computer equipment and storage medium
CN111835756B (en) * 2020-07-10 2023-02-03 深圳市网安计算机安全检测技术有限公司 APP privacy compliance detection method and device, computer equipment and storage medium
CN113139186A (en) * 2021-04-14 2021-07-20 北京开元华创信息技术有限公司 Personal information security audit evaluation system
CN114676432A (en) * 2022-05-26 2022-06-28 河北兰科网络工程集团有限公司 APP privacy compliance checking method, terminal and system

Also Published As

Publication number Publication date
CN109739748B (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN109739748A (en) Close rule detection method and device
CN105162937B (en) Method for processing message of incoming call and device
CN106529339A (en) Picture display method, device and terminal
CN106487622A (en) Equipment control sharing method and device
CN106557402B (en) Mobile terminal and exception information processing method
CN111371938B (en) Fault detection method and electronic equipment
US20190370092A1 (en) Direct input from a remote device
CN108038827A (en) Image processing method, mobile terminal and computer-readable recording medium
CN108833991A (en) Video caption display methods and device
CN107426088A (en) Pictorial information processing method and processing device
CN105956486A (en) Remote control method and apparatus
CN107577513A (en) A kind of method, apparatus and storage medium for showing painted eggshell
CN107323111A (en) Predict method, device and the storage medium of printer ink head clearance time
CN106919629A (en) The method and device of information sifting is realized in group chat
CN106293961A (en) Text message processing method and device
CN108012029A (en) A kind of information processing method, equipment and computer-readable recording medium
CN108540458A (en) A kind of method of client checks, equipment, server and storage medium
US8272738B2 (en) Apparatus and method for recognizing a person's gaze
CN105573747B (en) The test method and device of user interface
CN107770356A (en) A kind of communication establishing method, equipment and computer-readable recording medium
CN105893249A (en) Software testing method and device
CN107463809A (en) The display methods and device of application icon
CN104219360A (en) Information processing method and device
CN107360322A (en) Information cuing method and device
CN107484144A (en) A kind of information acquisition method, terminal, server and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant