CN109739748A - Close rule detection method and device - Google Patents
Close rule detection method and device Download PDFInfo
- Publication number
- CN109739748A CN109739748A CN201811526442.4A CN201811526442A CN109739748A CN 109739748 A CN109739748 A CN 109739748A CN 201811526442 A CN201811526442 A CN 201811526442A CN 109739748 A CN109739748 A CN 109739748A
- Authority
- CN
- China
- Prior art keywords
- data
- label
- rule
- violation
- private
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Telephonic Communication Services (AREA)
Abstract
The disclosure is directed to a kind of conjunctions to advise detection method and device.This method comprises: operation Monkey test program;The Monkey test program is for testing the application program of the first terminal;The communication data of the application program is obtained from the Monkey test program;The communication data is sent to server, so that when the server contains private data in determining the communication data, the private data is marked according to whether the private data is used, and the private data after label is sent to second terminal, so that generating the examining report of application program according to the violation data when second terminal has the violation data for not meeting GDPR conjunction rule rule in determining the private data after the label.The technical solution realizes automatically generating for the examining report of application program, and detection efficiency is high.
Description
Technical field
This disclosure relates to which detection method and device are advised in field of terminal technology more particularly to a kind of conjunction.
Background technique
GDPR (general data conservation regulation, General Data Protection Regulation) is European Union
Regulations need the application of terminal carrying out GDPR to close rule detection to guarantee the stable development of overseas business.
In the related technology, usually terminal shows the data for uploading or reading, and user is true according to GDPR rule
Surely whether there is private data in the data shown, if having private data in the data of display, will upload or read this privacy
The corresponding application of data carries out hand labeled.
Summary of the invention
To overcome the problems in correlation technique, the embodiment of the present disclosure provides a kind of conjunction rule detection method and device.Institute
It is as follows to state technical solution:
According to the first aspect of the embodiments of the present disclosure, a kind of conjunction rule detection method is provided, first terminal is applied to, comprising:
Run Monkey test program;The Monkey test program is used to carry out the application program of the first terminal
Test;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains privacy in determining the communication data
When data, the private data is marked according to whether the private data is used, and by the private data after label
It is sent to second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule
When the violation data of rule, the examining report of application program is generated according to the violation data.
The technical scheme provided by this disclosed embodiment can include the following benefits: first terminal is surveyed from Monkey
The communication data of application program is got in examination program, and communication data is sent to server, so that server is determining logical
When containing private data in letter data, and it is sent to second terminal after private data is marked, so that second terminal is true
When having the violation data for not meeting GDPR conjunction rule rule in the private data after calibration note, is generated according to violation data and apply journey
The examining report of sequence, user can check the testing result of application program by examining report, realize the inspection of application program
Automatically generating for announcement is observed and predicted, detection efficiency is high.
In one embodiment, the communication data includes at least http request message, memory stacked data, daily record data
One of.
According to the second aspect of an embodiment of the present disclosure, a kind of conjunction rule detection method is provided, server is applied to, comprising:
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy
Sample data is the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to institute
Private data is stated to be marked;The data type of the private data includes http request message, memory stacked data and log
Data;
Private data after label is sent to second terminal, so that the second terminal is after determining the label
When having the violation data for not meeting GDPR conjunction rule rule in private data, the detection of application program is generated according to the violation data
Report.
The technical scheme provided by this disclosed embodiment can include the following benefits: server is receiving first eventually
When holding the communication data of the application program sent, when containing private data in determining communication data, private data is marked
Second terminal is sent to after note, so that second terminal has in determining the private data after label does not meet GDPR conjunction rule rule
When violation data, the examining report of application program is generated according to violation data, user can check application by examining report
The testing result of program, realizes automatically generating for the examining report of application program, and detection efficiency is high.
In one embodiment, further includes:
It whether determines in the privacy sample data comprising the sample data different from the communication data;
When including the sample data different from the communication data in determining the privacy sample data, to the sample
Data are marked;
The private data by after label is sent to second terminal, so that the second terminal is determining the label
When having the violation data for not meeting GDPR conjunction rule rule in private data afterwards, application program is generated according to the violation data
Examining report includes:
Sample data after private data and label after label is sent to second terminal, so that the second terminal
Have in determining the private data after the label and the sample data after the label and does not meet the violation that GDPR closes rule rule
When data, the examining report of application program is generated according to the violation data.
In one embodiment, the sample data after the private data and label by after label is sent to second terminal
Include:
Receive the private data request that the second terminal is sent;
It requests the sample data after the private data and label after label being sent to second in response to the private data
Terminal.
In one embodiment, the privacy sample data according to the pre-stored data determines in the communication data whether contain
There is the private data to include:
The data in the communication data are searched whether in the privacy sample data;
When there are the data in the communication data in determining the privacy sample data, the data are determined as described
Private data.
According to the third aspect of an embodiment of the present disclosure, a kind of conjunction rule detection method is provided, second terminal is applied to, comprising:
Private data after receiving the label that server is sent;
Whether have described in not meeting in private data after the determining label of GDPR conjunction rule rule according to the pre-stored data
GDPR closes the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to
The violation data generates the examining report of application program.
The technical scheme provided by this disclosed embodiment can include the following benefits: first terminal is surveyed from Monkey
The communication data of application program is got in examination program, and communication data is sent to server, so that server is determining logical
When containing private data in letter data, and it is sent to second terminal after private data is marked, so that second terminal is true
When having the violation data for not meeting GDPR conjunction rule rule in the private data after calibration note, according to violation data and routine data
The examining report of application program is generated, user can check the testing result of application program by examining report, realize and answer
With automatically generating for the examining report of program, detection efficiency is high.
In one embodiment, it is described have in determining the private data after the label do not meet the GDPR and close rule
When the violation data of rule, include: according to the examining report that the violation data generates application program
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to
Routine data and the violation data generate the examining report of the application program;The routine data is hidden after the label
Meet the data that the GDPR closes rule rule in private data.
In one embodiment, the GDPR according to the pre-stored data closes rule rule and determines the private data after the label
In whether have not meeting the GDPR and close the violation data of rule rule and include:
Rule rule is closed to the pre-stored GDPR to modify;
It is closed whether to have not meet in the private data after rule rule determines the label according to the modified GDPR and be repaired
The GDPR after changing closes the violation data of rule rule.
In one embodiment, the private data after the label for receiving server transmission includes:
The sample data after private data and label after receiving the label that server is sent;
Whether the GDPR according to the pre-stored data, which closes to have in the private data after rule rule determines the label, does not meet
The GDPR closes the regular violation data of rule
GDPR according to the pre-stored data closes the sample after private data and the label after rule rule determines the label
Whether have in data and does not meet the violation data that the GDPR closes rule rule;
It is described to have when not meeting the GDPR and closing the violation data of rule rule in determining the private data after the label,
Include: according to the examining report that the violation data generates application program
Have in determining the private data after the label and the sample data after the label and does not meet the GDPR conjunction
When the violation data of rule, the examining report of application program is generated according to the violation data.
In one embodiment, the sample data after the private data and label after the label for receiving server transmission
Include:
Private data request is sent to the server;
The sample data after private data and label after receiving the label that server is sent.
In one embodiment, described in determining the private data after the label and the sample data after the label
When having the violation data for not meeting the GDPR conjunction rule rule, the examining report packet of application program is generated according to the violation data
It includes:
Determine the classification of the violation data;
The examining report of the application program is generated according to the label of the classification of the violation data and the violation data.
According to a fourth aspect of embodiments of the present disclosure, a kind of conjunction rule detection device is provided, comprising: operation module, for transporting
Row Monkey test program;The Monkey test program is for testing the application program of the first terminal;
Module is obtained, for obtaining the communication data of the application program from the Monkey test program;
First sending module, for sending the communication data to server, so that the server is described in the determination
When containing private data in communication data, the private data is marked according to whether the private data is used, and
Private data after label is sent to second terminal, so that private data of the second terminal after determining the label
In have do not meet GDPR close rule rule violation data when, according to the violation data generate application program examining report.
In one embodiment, the communication data includes at least http request message, memory stacked data, daily record data
One of.
According to a fifth aspect of the embodiments of the present disclosure, a kind of conjunction rule detection device is provided, comprising:
First receiving module, for receiving the communication data of first terminal transmission;
First determining module determines in the communication data whether contain for privacy sample data according to the pre-stored data
Private data;The privacy sample data is the private data of the first terminal of server storage;
First mark module, when for containing the private data in determining the communication data, according to the privacy
The private data is marked in the data type of data;The data type of the private data include http request message,
Memory stacked data and daily record data;
Second sending module, for the private data after label to be sent to second terminal, so that the second terminal
When having the violation data for not meeting GDPR conjunction rule rule in determining the private data after the label, according to the violation data
Generate the examining report of application program.
It in one embodiment, further include the second determining module and the second mark module, second sending module includes
First sending submodule;
Second determining module, for whether determining in the privacy sample data comprising different from the communication data
Sample data;
Second mark module, for including different from the communication data in determining the privacy sample data
When sample data, the sample data is marked;
First sending submodule, for the sample data after the private data and label after label to be sent to second
Terminal, so that the second terminal has not in determining the private data after the label and the sample data after the label
When meeting the violation data of GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
In one embodiment, first sending submodule includes the first receiving unit and the first transmission unit;
First receiving unit, the private data request sent for receiving the second terminal;
First transmission unit, in response to the private data request by after the label private data and institute
Sample data after stating label is sent to the second terminal.
In one embodiment, first determining module includes searching submodule and first to determine submodule;
The lookup submodule, for searching whether the number in the communication data in the privacy sample data
According to;
Described first determines submodule, for there is the data in the communication data in determining the privacy sample data
When, the data are determined as the private data.
According to a sixth aspect of an embodiment of the present disclosure, a kind of conjunction rule detection device is provided, comprising:
Second receiving module, the private data after label for receiving server transmission;
Third determining module is closed in the private data after rule rule determines the label for GDPR according to the pre-stored data
Whether have and does not meet the violation data that the GDPR closes rule rule;
Generation module does not meet disobeying for the GDPR conjunction rule rule for having in determining the private data after the label
When advising data, the examining report of application program is generated according to the violation data.
In one embodiment, the generation module includes the first generation submodule;
Described first generates submodule, does not meet the GDPR conjunction for having in determining the private data after the label
When the violation data of rule, the examining report of the application program is generated according to routine data and the violation data;It is described
Routine data closes the regular data of rule to meet the GDPR in the private data after the label.
In one embodiment, the third determining module includes that modification submodule and second determine submodule;
The modification submodule is modified for closing rule rule to the pre-stored GDPR;
Described second determines submodule, for according to hidden after the determining label of the modified GDPR conjunction rule rule
Whether have in private data and does not meet the violation data that the modified GDPR closes rule rule.
In one embodiment, second receiving module includes the second receiving submodule, the third determining module packet
It includes third and determines that submodule, the generation module include the second generation submodule;
Second receiving submodule, the sample after the private data and label after label for receiving server transmission
Data;
The third determines submodule, closes the privacy after rule rule determines the label for GDPR according to the pre-stored data
Whether have in sample data after data and the label and does not meet the violation data that the GDPR closes rule rule;
Described second generates submodule, for determining the private data after the label and the sample number after the label
When having the violation data for not meeting the GDPR conjunction rule rule in, the detection report of application program is generated according to the violation data
It accuses.
In one embodiment, second receiving module includes the second transmission unit and the second receiving unit;
Second transmission unit, for sending private data request to the server;
Second receiving unit, after receiving private data and label after the label that the server is sent
Sample data.
In one embodiment, the second generation submodule includes determination unit and generation unit;
The determination unit, for determining the classification of the violation data;
The generation unit, for being answered according to the generation of the label of the classification of the violation data and the violation data
With the examining report of program.
According to the 7th of the embodiment of the present disclosure the aspect, a kind of conjunction rule detection device is provided, comprising: first processor;
For storing the first memory of first processor executable instruction;
Wherein, the first processor is configured as:
Run Monkey test program;The Monkey test program is used to carry out the application program of the first terminal
Test;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains privacy in determining the communication data
When data, the private data is marked according to whether the private data is used, and by the private data after label
It is sent to second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule
When the violation data of rule, the examining report of application program is generated according to the violation data.
According to the eighth aspect of the embodiment of the present disclosure, a kind of conjunction rule detection device is provided, comprising: second processor;
For storing the second memory of second processor executable instruction;
Wherein, the second processor is configured as:
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy
Sample data is the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to institute
Private data is stated to be marked;The data type of the private data includes http request message, memory stacked data and log
Data;
Private data after label is sent to second terminal, so that the second terminal is after determining the label
When having the violation data for not meeting GDPR conjunction rule rule in private data, the detection of application program is generated according to the violation data
Report.
According to the 9th of the embodiment of the present disclosure the aspect, a kind of conjunction rule detection device is provided, comprising: third processor;
For storing the third memory of third processor-executable instruction;
Wherein, the third processor is configured as:
Private data after receiving the label that server is sent;
Whether have described in not meeting in private data after the determining label of GDPR conjunction rule rule according to the pre-stored data
GDPR closes the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to
The violation data generates the examining report of application program.
According to the tenth of the embodiment of the present disclosure the aspect, a kind of computer readable storage medium is provided, calculating is stored thereon with
The step of machine instruction, which realizes above-described embodiment the method when being executed by processor.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 a is the flow chart shown according to an exemplary embodiment for closing rule detection method.
Fig. 1 b is the flow chart shown according to an exemplary embodiment for closing rule detection method.
Fig. 2 is the flow chart shown according to an exemplary embodiment for closing rule detection method.
Fig. 3 a is the flow chart shown according to an exemplary embodiment for closing rule detection method.
Fig. 3 b is the flow chart shown according to an exemplary embodiment for closing rule detection method.
Fig. 4 a is the interaction figure shown according to an exemplary embodiment for closing rule detection method.
Fig. 4 b is the interaction figure shown according to an exemplary embodiment for closing rule detection method.
Fig. 5 is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 6 a is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 6 b is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 6 c is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 6 d is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 a is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 b is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 c is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 d is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 e is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 7 f is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 8 is the structural schematic diagram shown according to an exemplary embodiment for closing rule detection device.
Fig. 9 is the structural block diagram shown according to an exemplary embodiment for closing rule detection device.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
The technical solution that the embodiment of the present disclosure provides is related to first terminal, second terminal and server, which can
Think the mobile terminals such as smart phone and the tablet computer that user uses, second terminal can be mobile phone, tablet computer, computer
Equipment Deng having processing and display function, the embodiment of the present disclosure are not construed as limiting this.In the related technology, usually terminal will be upper
The data for passing or reading are shown that user determines in the data shown whether there is private data according to GDPR rule, if aobvious
There is private data in the data shown, then will upload or read the corresponding application of this private data and carry out hand labeled.But it is above-mentioned
It closes rule to be detected as detecting manually, detection efficiency is low.In the technical scheme provided by this disclosed embodiment, first terminal is from Monkey
The communication data of application program is got in test program, and communication data is sent to server, so that server is in determination
When containing private data in communication data, and it is sent to second terminal after private data is marked, so that second terminal exists
When having the violation data for not meeting GDPR conjunction rule rule in the private data after determining label, is generated and applied according to violation data
The examining report of program, user can check the testing result of application program by examining report, realize application program
Examining report automatically generates, and detection efficiency is high.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and the executing subject for implementing this method has first terminal, second
Terminal and server.The embodiment of the present disclosure arranges three sets of embodiments according to the difference of method subject of implementation, as described below:
Server side:
Fig. 1 a is a kind of flow chart for closing rule detection method shown according to an exemplary embodiment, and this method is applied to clothes
It is engaged in device, as shown in Figure 1a, detection method includes the following steps for conjunction rule 101 to step 104:
In step 101a, the communication data that first terminal is sent is received.
Wherein, communication data includes at least one of http request message, memory stacked data, daily record data.
In step 102a, privacy sample data according to the pre-stored data determines in the communication data whether contain privacy
Data.
Wherein, the privacy sample data is the private data of the first terminal of server storage, privacy sample number
According to sequence number, user's bank card account number information, the short message etc. that can be user's phone number, first terminal.
Optionally, the data in communication data are searched whether in privacy sample data, are determining privacy sample data
In when having the data in communication data, data are determined as private data.
It is exemplary, the communication data that server receives include multiple http request messages, multiple memory stacked datas and
Multiple daily record datas, server parse each http request message, obtain the number of request in each http request message
According to, such as request data has telephone number 137****8257, handset serial F78P****G5MP, 66666, * * * etc., memory
Stacked data includes telephone number 1870****894 and account information 6226****1754, and daily record data includes handset serial
F78P****G5MP, 11111, * * * etc. include telephone number 137****8257, telephone number in privacy sample data
187****7894, account information 6226****1754 and handset serial F78P****G5MP are then known in privacy sample data
Include telephone number 137****8257, telephone number 187****7894, the account information 6226****1754 in communication data
With handset serial F78P****G5MP, it is determined that telephone number 137****8257, telephone number 187****7894, account
Information 6226****1754 and handset serial F78P****G5MP is private data, determines that 66666,11111 and * * * is not
Private data.
In step 103a, when containing the private data in determining the communication data, according to the private data
Data type the private data is marked.
Optionally, server determines the usage mode of the private data, institute according to the data type of the private data
The data type for stating private data includes http request message, memory stacked data and daily record data.
It is exemplary, if the data type of private data be http request message, can determine private data be uploaded and
It reads;If the data type of private data is memory stacked data, it can determine that private data is read;If private data
When data type is daily record data, then it can determine that private data is printed.
Exemplary, private data includes telephone number 137****8257, telephone number 187****7894, account information
6226****1754 and handset serial F78P****G5MP, wherein the data type of telephone number 137****8257 is http
The data type of request message and memory stacked data, telephone number 187****7894 and account information 6226****1754 is
Memory stacked data, the data type of handset serial F78P****G5MP are http request message, memory stacked data and day
Will data can then determine that telephone number 137****8257 is uploaded and reads, and telephone number 137****8257 is not printed,
So as to telephone number 137****8257 addition red-label, brown mark and yellow flag, wherein red-label generation
Table is uploaded, and brown mark representative is read, and yellow flag representative is not printed;Telephone number 187****7894 is read, electricity
Words number 187****7894 is not uploaded and is not printed, so as to add brown mark to telephone number 187****7894
Note, Green Marker and yellow flag, wherein Green Marker representative is not uploaded;Account information 6226****1754 is read, account
Number information 6226****1754 is not uploaded and is not printed, so as to add brown to account information 6226****1754
Label, Green Marker and yellow flag;Handset serial F78P****G5MP is uploaded, reads and prints, so as to give hand
Machine sequence number F78P****G5MP adds grey label, red-label and brown mark, wherein grey label, which represents, to be printed.
It should be noted that label after private data can in the form of a list or the form of table carry out storage and
It sends, the embodiment of the present disclosure does not limit this.
In step 104a, the private data after label is sent to second terminal, so that the second terminal is true
When having the violation data for not meeting GDPR conjunction rule rule in the private data after the fixed label, generated according to the violation data
The examining report of application program.
Optionally, the private data after label directly can be sent to second terminal by server, can also received
When the private data request that second terminal is sent, then the private data after label is sent to second terminal, so that second terminal
When receiving the private data after label, GDPR according to the pre-stored data is closed in the private data after rule rule determines label
Whether there is the violation data for not meeting GDPR conjunction rule rule, has in determining the private data after label and do not meet GDPR conjunction rule rule
When violation data then, the examining report of application program is generated according to violation data.
Exemplary, it includes that telephone number forbids upload, telephone number to allow to read and print, account that GDPR, which is closed in rule rule,
Information forbids uploading, non-print and allows to read, and handset serial forbids uploading, forbid reading and non-print etc. is regular,
Private data after label includes the telephone number 137****8257 for adding red-label, brown mark and yellow flag, addition
The telephone number 187****7894 of brown mark, Green Marker and yellow flag, addition brown mark, Green Marker and yellow
The account information 6226****1754 of label, the handset serial of addition grey label, red-label and brown mark
F78P****G5MP, then can determine addition red-label, brown mark and yellow flag telephone number 137****8257,
Add the telephone number 187****7894 and addition grey label, red-label of brown mark, Green Marker and yellow flag
Handset serial F78P****G5MP with brown mark is violation data, addition brown mark, Green Marker and yellow flag
Account information 6226****1754 be routine data, that is, determine that the application program disobeys telephone number and handset serial
Rule enable developer to find out by examining report to generate examining report according to telephone number and handset serial
Which specific communication data in violation of rules and regulations, is handled in the application program convenient for developer is further to the application program;In addition,
If detected to multiple application programs, the violation item of each application program can be carried out with application program it is corresponding, most throughout one's life
At the examining report about multiple application programs.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and server is in the application program for receiving first terminal transmission
Communication data when, in determining communication data contain private data when, be sent to after private data is marked second eventually
End, when so that second terminal having the violation data for not meeting GDPR conjunction rule rule in determining the private data after label, according to
Violation data generates the examining report of application program, and user can check the testing result of application program by examining report,
Automatically generating for the examining report of application program is realized, detection efficiency is high.
Fig. 1 b is a kind of flow chart for closing rule detection method shown according to an exemplary embodiment, and this method is applied to clothes
It is engaged in device, as shown in Figure 1 b, conjunction rule detection method includes the following steps 101b to step 106b:
In step 101b, the communication data that first terminal is sent is received.
It should be noted that the sequencing that the embodiment of the present disclosure executes step 102b and step 104b is without limitation,
Step 102b and step 103b can be first carried out, then executes step 104b and step 105b;Can also first carry out step 104b and
Step 105b, then execute step 102b and step 103b.
In step 102b, privacy sample data according to the pre-stored data determines in the communication data whether contain privacy
Data;The privacy sample data is the private data of the first terminal of server storage.
In step 103b, when containing the private data in determining the communication data, according to the private data
Data type the private data is marked;The data type of the private data includes http request message, memory
Stacked data and daily record data.
In step 104b, whether determine in the privacy sample data comprising the sample number different from the communication data
According to.
It include the sample data different from the communication data in determining the privacy sample data in step 105b
When, the sample data is marked.
It is exemplary, communication data and privacy sample data are compared, when in privacy sample data include and communicate number
It when according to different sample datas, is marked sample data as not used private data, such as sample data is added
Purple label, wherein purple label represents not used private data.
In step 106b, the sample data after the private data and label after label is sent to second terminal, so that
The second terminal have in determining the violation data after the private data and label after the label do not meet GDPR close rule
When the violation data of rule, the examining report of application program is generated according to the violation data.
First terminal side:
Fig. 2 is a kind of flow chart for closing rule detection method shown according to an exemplary embodiment, and this method is applied to the
One terminal, as shown in Fig. 2, detection method includes the following steps 201 to step 203 for conjunction rule:
In step 201, Monkey test program is run.
Wherein, the Monkey test program is for testing the application program of the first terminal.
Specifically, the Monkey test program is exactly with the random instruction of milli or to operate with application program, come
The stability and error resilience performance of application program are observed, concrete operations are exactly the key-press input of analog subscriber, touch screen input, gesture
Then input etc. observes how long application program will appear exception, when Monkey test program is when operation, if user
When triggering the event such as clicking, touch, Monkey test program can generate random pulses, it is possible to use Monkey
Test program carrys out random duplicate test application program.
It is exemplary, by Monkey test program burning on first terminal, when needing to test application program, then
For application program to be tested is needed, Monkey test program is run.
In step 202, the communication data of the application program is obtained from the Monkey test program.
Wherein, the communication data includes at least one of http request message, memory stacked data, daily record data.
In step 203, the communication data is sent to server, so that the server is determining the communication number
When containing private data in, the private data is marked according to whether the private data is used, and will label
Private data afterwards is sent to second terminal, so that the second terminal has not in determining the private data after the label
When meeting the violation data of GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
Exemplary, first terminal can use response simulation in application program during running Monkey test program
The corresponding communication datas such as the instruction of family input are recorded, after Monkey test program end of run, by the application of record
All communication datas of program are transmitted to server, so that server is in the communication data Shi Zuojin for receiving application program
The processing of one step, specific service device are further processed process referring to above-mentioned steps 102 and step 103, this public affairs to communication data
Opening embodiment, details are not described herein.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and first terminal gets application from Monkey test program
The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data
According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label
In have do not meet GDPR close rule rule violation data when, according to violation data generate application program examining report, Yong Hutong
The testing result of application program can be checked by crossing examining report, realize automatically generating for the examining report of application program, inspection
It surveys high-efficient.
Second terminal side:
Fig. 3 a is a kind of flow chart for closing rule detection method shown according to an exemplary embodiment, and this method is applied to the
Two terminals, as shown in Figure 3a, conjunction rule detection method includes the following steps 301a to step 303a:
Private data in step 301a, after receiving the label that server is sent.
Optionally, second terminal can directly receive the private data after the label of server transmission, can also be first to clothes
Business device sends private data request, so that server is sent out when receiving private data request, then by the private data after label
It send to second terminal, so that second terminal receives the private data after label.
In step 302a, GDPR according to the pre-stored data close in the private data after rule rule determines the label whether
Have and does not meet the violation data that the GDPR closes rule rule.
Exemplary, it includes that telephone number forbids upload, telephone number to allow to read and print, account that GDPR, which is closed in rule rule,
Information forbids uploading, non-print and allows to read, and handset serial forbids uploading, forbid reading and non-print etc. is regular,
Private data after label includes the telephone number 137****8257 for adding red-label, brown mark and yellow flag, addition
The telephone number 187****7894 of brown mark, Green Marker and yellow flag, addition brown mark, Green Marker and yellow
The account information 6226****1754 of label, the handset serial of addition grey label, red-label and brown mark
F78P****G5MP, then can determine addition red-label, brown mark and yellow flag telephone number 137****8257,
Add the telephone number 187****7894 and addition grey label, red-label of brown mark, Green Marker and yellow flag
Handset serial F78P****G5MP with brown mark is violation data, addition brown mark, Green Marker and yellow flag
Account information 6226****1754 be routine data.
Further, second terminal can also close rule rule to the pre-stored GDPR and modify;And according to repairing
Whether the GDPR after changing, which closes to have in the private data after rule rule determines the label, does not meet the modified GDPR
Close the violation data of rule rule.
Exemplary, user can close rule rule to pre-stored GDPR according to demand and modify, after to be modified, then will
Modified GDPR closes rule rule and is stored, and when receiving the private data after label, is then closed according to modified GDPR
Rule rule determines whether the private data after label has the violation data for meeting modified GDPR conjunction rule rule.
Exemplary, in examples detailed above, if modified GDPR is closed, rule are regular to be allowed to upload, allow including telephone number
It reads and non-print, account information forbids upload, non-print and forbid reading, handset serial is forbidden uploading, forbids reading
It takes and non-print, the private data after label includes the telephone number for adding red-label, brown mark and yellow flag
137****8257, the account information 6226****1754 for adding brown mark, Green Marker and yellow flag add gray scales
The handset serial F78P****G5MP of note, red-label and brown mark can then determine addition brown mark, Green Marker
With the account information 6226****1754 of yellow flag and the handset serial of addition grey label, red-label and brown mark
F78P****G5MP is violation data, and the telephone number 137****8257 of addition red-label, brown mark and yellow flag is
Routine data.
In step 303a, has in determining the private data after the label and do not meet the GDPR conjunction rule rule
When violation data, the examining report of application program is generated according to the violation data.
It is exemplary, if violation data includes the telephone number 137**** for adding red-label, brown mark and yellow flag
8257, the telephone number 187****7894 and addition grey label, red of brown mark, Green Marker and yellow flag are added
The handset serial F78P****G5MP of label and brown mark, then according to addition red-label, brown mark and yellow flag
Telephone number 137****8257, addition brown mark, Green Marker and yellow flag telephone number 187****7894 and
The handset serial F78P****G5MP for adding grey label, red-label and brown mark generates examining report, so that exploitation
Personnel can find out which specific communication data is in violation of rules and regulations in the application program by examining report, convenient for developer to the application
Program is further to be handled;In addition, if when being detected to multiple application programs, can by the violation item of each application program with
Application program is corresponded to, and the examining report about multiple application programs is ultimately generated.
Further, have in determining the private data after the label and do not meet the violation number that the GDPR closes rule rule
According to when, the examining report of the application program is generated according to routine data and the violation data;The routine data is described
Meet the data that the GDPR closes rule rule in private data after label.
It is exemplary, if addition red-label, the telephone number 137****8257 of brown mark and yellow flag, addition palm fibre
The telephone number 187****7894 and addition grey label, red-label and brown of color marker, Green Marker and yellow flag
The handset serial F78P****G5MP of label, routine data include the account for adding brown mark, Green Marker and yellow flag
Number information 6226****1754, then according to addition red-label, the telephone number 137**** of brown mark and yellow flag
8257, the telephone number 187****7894 of brown mark, Green Marker and yellow flag, addition grey label, red mark are added
The account letter of the handset serial F78P****G5MP and addition brown mark, Green Marker and yellow flag of note and brown mark
It ceases 6226****1754 and generates examining report, enable developer to pass through examining report while seeing violation data and routine
Data.
It should be noted that in practical application, second terminal can be first terminal, or except first terminal it
Outer mobile phone, tablet computer or computer etc., the embodiment of the present disclosure does not limit this.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and first terminal gets application from Monkey test program
The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data
According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label
In have when not meeting GDPR and closing the violation data of rule rule, the detection report of application program is generated according to violation data and routine data
It accuses, user can check the testing result of application program by examining report, realize the examining report of application program oneself
Dynamic to generate, detection efficiency is high.
Fig. 3 b is a kind of flow chart for closing rule detection method shown according to an exemplary embodiment, and this method is applied to the
Two terminals, as shown in Figure 3b, conjunction rule detection method includes the following steps 301b to step 303b:
The sample data after private data and label in step 301b, after receiving the label that server is sent.
Optionally, second terminal can directly receive server transmission label after private data and label after sample
Data, can also first to server send private data request so that server receive private data request when, then will mark
The sample data after private data and label after note is sent to second terminal, so that second terminal receives the privacy after label
Sample data after data and label.
In step 302b, GDPR according to the pre-stored data closes rule rule and determines the private data after the label and described
Whether have in sample data after label and does not meet the violation data that the GDPR closes rule rule.
Exemplary, it includes that telephone number forbids upload, telephone number to allow to read and print, account that GDPR, which is closed in rule rule,
Information forbids upload, non-print and allows to read, and handset serial is forbidden uploading, forbids reading and non-print, this electromechanics
Words number allows to upload, allows to read, allowing the rules such as printing, and the private data after label includes addition red-label, brown
The account letter of the telephone number 137****8257 and addition brown mark, Green Marker and yellow flag of label and yellow flag
6226****1754 is ceased, the sample data after label includes adding the telephone number of first terminal the machine of purple label, explanation
The telephone number of first terminal the machine allows to upload, but first terminal does not upload, in order to avoid GDPR is closed rule rule
It is middle that the data uploaded is allowed encrypt etc. processing in violation of rules and regulations, then it will allow to upload but the data not uploaded are also used as violation data,
It can be determined that addition red-label, the telephone number 137****8257 of brown mark and yellow flag and addition purple mark
The telephone number of first terminal the machine of note is violation data, the account letter of addition brown mark, Green Marker and yellow flag
Breath 6226****1754 is routine data.
Further, when pre-stored GDPR closes rule rule and modified, then rule rule is closed according to modified GDPR
Whether have in the sample data after private data and label after determining label and does not meet disobeying for modified GDPR conjunction rule rule
Advise data.
In step 303b, has in determining the private data after the label and the sample data after the label and do not accord with
When closing the violation data of the GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
Optionally, the classification of the violation data is determined;
The examining report of the application program is generated according to the label of the classification of the violation data and the violation data.
It is exemplary, if violation data includes the telephone number 137**** for adding red-label, brown mark and yellow flag
The telephone number of 8257 first terminal the machine marked with addition purple can then determine that the classification of violation data is routine call
The telephone number of number and first terminal the machine, thus according to Conventional telephone numbers and corresponding label, first terminal the machine
Telephone number generates the examining report of application program with corresponding label.
Further, have in determining the sample data after the private data and label after the label described in not meeting
When GDPR closes the violation data of rule rule, the detection report of the application program is generated according to routine data and the violation data
It accuses, specific method is referring to the description of above-mentioned steps 303a, and details are not described herein for the embodiment of the present disclosure.
Fig. 4 a is a kind of interaction figure for closing rule detection method shown according to an exemplary embodiment, executing subject first
Terminal, second terminal and server include the following steps 401a to step 408a as shown in fig. 4 a:
In step 401a, first terminal runs Monkey test program.
Wherein, the Monkey test program is for testing the application program of the first terminal.
In step 402a, first terminal obtains the communication number of the application program from the Monkey test program
According to.
Wherein, the communication data includes at least one of http request message, memory stacked data, daily record data.
In step 403a, first terminal sends the communication data to server, and server receives first terminal and sends
Communication data.
In step 404a, server privacy sample data according to the pre-stored data determines in the communication data whether contain
There is private data.
Wherein, the privacy sample data is the data stored in the first terminal.
In step 405a, when server contains the private data in determining the communication data, according to described hidden
The private data is marked in the data type of private data.
Wherein, the data type of the private data includes http request message, memory stacked data or daily record data.
In step 406a, the private data after the label is sent to the second terminal, second terminal by server
Private data after receiving the label that server is sent.
In step 407a, second terminal GDPR according to the pre-stored data closes rule rule and determines the privacy number after the label
Whether have in and does not meet the violation data that the GDPR closes rule rule.
In step 408a, second terminal has in determining the private data after the label does not meet the GDPR conjunction
When the violation data of rule, the examining report of application program is generated according to the violation data.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and first terminal gets application from Monkey test program
The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data
According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label
In have do not meet GDPR close rule rule violation data when, according to violation data generate application program examining report, Yong Hutong
The testing result of application program can be checked by crossing examining report, realize automatically generating for the examining report of application program, inspection
It surveys high-efficient.
Fig. 4 b is a kind of interaction figure for closing rule detection method shown according to an exemplary embodiment, executing subject first
Terminal, second terminal and server include the following steps 401b to step 410b as shown in Figure 4 b:
In step 401b, first terminal runs Monkey test program.
Wherein, the Monkey test program is for testing the application program of the first terminal.
In step 402b, first terminal obtains the communication number of the application program from the Monkey test program
According to.
Wherein, the communication data includes at least one of http request message, memory stacked data, daily record data.
In step 403b, first terminal sends the communication data to server, and server receives first terminal and sends
Communication data.
In step 404b, server privacy sample data according to the pre-stored data determines in the communication data whether contain
There is private data.
Wherein, the privacy sample data is the data stored in the first terminal.
In step 405b, when server contains the private data in determining the communication data, according to described hidden
The private data is marked in the data type of private data.
Wherein, the data type of the private data includes http request message, memory stacked data or daily record data.
In step 406b, whether determine in the privacy sample data comprising the sample number different from the communication data
According to.
It include the sample data different from the communication data in determining the privacy sample data in step 407b
When, the sample data is marked.
In step 408b, second terminal sends private data request to server, and server receives second terminal and sends
Private data request.
In step 409b, server will be after the private data and label after the label in response to private data request
Sample data is sent to the second terminal, after second terminal receives private data and label after the label that server is sent
Sample data.
In step 410b, second terminal closes rule rule to the pre-stored GDPR and modifies.
In step 411b, second terminal closes the privacy after rule rule determines the label according to the modified GDPR
Whether have in sample data after data and label and does not meet the violation data that the GDPR closes rule rule.
In step 412b, second terminal has in determining the sample data after the private data and label after the label
When not meeting the violation data of the GDPR conjunction rule rule, the inspection of the application program is generated according to routine data and violation data
Observe and predict announcement.
Wherein, the routine data closes the regular data of rule to meet the GDPR in the private data after the label.
The embodiment of the present disclosure provides a kind of conjunction rule detection method, and first terminal gets application from Monkey test program
The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data
According to when, and private data is marked and is stored, will when device to be serviced receives the private data request of second terminal transmission
Private data after label is sent to second terminal, does not meet so that second terminal has in determining the private data after label
When GDPR closes the violation data of rule rule, application program is generated according to the violation data after routine data and addition violation label
Examining report, user can check the testing result of application program by examining report, realize the detection report of application program
That accuses automatically generates, and detection efficiency is high.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.
Fig. 5 is a kind of structural schematic diagram for closing rule detection device 50 shown according to an exemplary embodiment, conjunction rule inspection
Surveying device 50 being implemented in combination with as some or all of of electronic equipment by software, hardware or both.Such as Fig. 5 institute
Show, which advises detection device 50 and include operation module 501, obtain module 502 and the first sending module 503.
Wherein, module 501 is run, for running Monkey test program;The Monkey test program is used for described
The application program of first terminal is tested.
Module 502 is obtained, for obtaining the communication data of the application program from the Monkey test program.
First sending module 503, for sending the communication data to server, so that the server is determining
When stating in communication data containing private data, the private data is marked according to whether the private data is used,
And the private data after label is sent to second terminal, so that privacy number of the second terminal after determining the label
When having the violation data for not meeting GDPR conjunction rule rule in, the examining report of application program is generated according to the violation data.
In one embodiment, the communication data includes at least http request message, memory stacked data, daily record data
One of.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and first terminal gets application from Monkey test program
The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data
According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label
In have do not meet GDPR close rule rule violation data when, according to violation data generate application program examining report, Yong Hutong
The testing result of application program can be checked by crossing examining report, realize automatically generating for the examining report of application program, inspection
It surveys high-efficient.
Fig. 6 a is a kind of structural schematic diagram for closing rule detection device 60 shown according to an exemplary embodiment, conjunction rule inspection
Surveying device 60 being implemented in combination with as some or all of of electronic equipment by software, hardware or both.Such as Fig. 6 a
Shown, it includes the first receiving module 601, the first determining module 602, the first mark module 603 and the which, which advises detection device 60,
Two sending modules 604.
Wherein, the first receiving module 601, for receiving the communication data of first terminal transmission.
First determining module 602, for privacy sample data according to the pre-stored data determine in the communication data whether
Contain private data;The privacy sample data is the private data of the first terminal of server storage.
First mark module 603, when for containing the private data in determining the communication data, according to described hidden
The private data is marked in the data type of private data;The data type of the private data includes http request report
Text, memory stacked data and daily record data.
Second sending module 604, for the private data after label to be sent to second terminal, so that described second is whole
When there is the violation data for not meeting GDPR conjunction rule rule at end in determining the private data after the label, according to the violation number
According to the examining report for generating application program.
In one embodiment, as shown in Figure 6 b, described device 60 further includes the second determining module 605 and the second label
Module 606, second sending module 604 include the first sending submodule 6041.
Second determining module 605, for determine in the privacy sample data whether include and the communication data
Different sample datas.
Second mark module 606, in determining the privacy sample data comprising with the communication data not
With sample data when, the sample data is marked.
First sending submodule 6041, for the sample data after the private data and label after label to be sent to
Second terminal, so that the second terminal is in determining the private data after the label and the sample data after the label
When having the violation data for not meeting GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
In one embodiment, as fig. 6 c, first sending submodule 6041 includes receiving unit 60411 and hair
Send unit 60412.
The receiving unit 60411, the private data request sent for receiving the second terminal.
The transmission unit 60412, in response to the private data request by after the label private data and
Sample data after the label is sent to the second terminal.
In one embodiment, as shown in fig 6d, first determining module 602 includes searching submodule 6021 and the
One determines submodule 6022.
The lookup submodule 6021, for being searched whether in the communication data in the privacy sample data
Data.
Described first determines submodule 6022, for having in the communication data in determining the privacy sample data
When data, the data are determined as the private data.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and server is in the application program for receiving first terminal transmission
Communication data when, in determining communication data contain private data when, be sent to after private data is marked second eventually
End, when so that second terminal having the violation data for not meeting GDPR conjunction rule rule in determining the private data after label, according to
Violation data generates the examining report of application program, and user can check the testing result of application program by examining report,
Automatically generating for the examining report of application program is realized, detection efficiency is high.
Fig. 7 a is a kind of structural schematic diagram for closing rule detection device 70 shown according to an exemplary embodiment, conjunction rule inspection
Surveying device 70 being implemented in combination with as some or all of of electronic equipment by software, hardware or both.Such as Fig. 7 a
Shown, it includes the second receiving module 701, third determining module 702 and generation module 703 which, which advises detection device 70,.
Wherein, the second receiving module 701, the private data after label for receiving server transmission.
Third determining module 702 closes the privacy number after rule rule determines the label for GDPR according to the pre-stored data
Whether have in and does not meet the violation data that the GDPR closes rule rule.
Generation module 703 does not meet the GDPR conjunction rule rule for having in determining the private data after the label
Violation data when, according to the violation data generate application program examining report.
In one embodiment, as shown in Figure 7b, the generation module 703 includes the first generation submodule 7031.
Described first generates submodule 7031, for have in determining the private data after the label do not meet it is described
When GDPR closes the violation data of rule rule, the detection report of the application program is generated according to routine data and the violation data
It accuses;The routine data closes the regular data of rule to meet the GDPR in the private data after the label.
In one embodiment, as shown in Figure 7 c, the third determining module 702 includes modification submodule 7021 and the
Two determine submodule 7022.
The modification submodule 7021 is modified for closing rule rule to the pre-stored GDPR.
Described second determines submodule 7022, after determining the label according to the modified GDPR conjunction rule rule
Private data in whether have and do not meet the violation data that the modified GDPR closes rule rule.
In one embodiment, as shown in figure 7d, second receiving module 701 includes the second receiving submodule 7011,
The third determining module 702 includes that third determines that submodule 7023, the generation module 703 include the second generation submodule
7032。
Second receiving submodule 7011, for receive server transmission label after private data and label after
Sample data.
The third determines submodule 7023, after closing the determining label of rule rule for GDPR according to the pre-stored data
Whether have in sample data after private data and the label and does not meet the violation data that the GDPR closes rule rule.
Described second generates submodule 7032, for determining the private data after the label and the sample after the label
When having the violation data for not meeting the GDPR conjunction rule rule in notebook data, the inspection of application program is generated according to the violation data
Observe and predict announcement.
In one embodiment, as shown in figure 7e, second receiving submodule 7011 includes the second transmission unit 70111
With the second receiving unit 70112.
Second transmission unit 70111, for sending private data request to the server.
Second receiving unit 70112, for receive the private data after the label that the server is sent and
Sample data after label.
In one embodiment, as depicted in fig. 7f, the second generation submodule 7032 includes determination unit 70321 and life
At unit 70322.
The determination unit 70321, for determining the classification of the violation data.
The generation unit 70322, for being generated according to the classification of the violation data and the label of the violation data
The examining report of the application program.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and first terminal gets application from Monkey test program
The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data
According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label
In have when not meeting GDPR and closing the violation data of rule rule, the detection report of application program is generated according to violation data and routine data
It accuses, user can check the testing result of application program by examining report, realize the examining report of application program oneself
Dynamic to generate, detection efficiency is high.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and conjunction rule detection device includes:
First processor;
For storing the first memory of first processor executable instruction;
Wherein, the first processor is configured as:
Run Monkey test program;The Monkey test program is used to carry out the application program of the first terminal
Test;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains privacy in determining the communication data
When data, the private data is marked according to whether the private data is used, and by the private data after label
It is sent to second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule
When the violation data of rule, the examining report of application program is generated according to the violation data.
In one embodiment, above-mentioned first processor is also configured to: the communication data is asked including at least http
Ask one of message, memory stacked data, daily record data.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and first terminal gets application from Monkey test program
The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data
According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label
In have do not meet GDPR close rule rule violation data when, according to violation data generate application program examining report, Yong Hutong
The testing result of application program can be checked by crossing examining report, realize automatically generating for the examining report of application program, inspection
It surveys high-efficient.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and conjunction rule detection device includes:
Second processor;
For storing the second memory of second processor executable instruction;
Wherein, the second processor is configured as:
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy
Sample data is the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to institute
Private data is stated to be marked;The data type of the private data includes http request message, memory stacked data and log
Data;
Private data after label is sent to second terminal, so that the second terminal is after determining the label
When having the violation data for not meeting GDPR conjunction rule rule in private data, the detection of application program is generated according to the violation data
Report.
In one embodiment, above-mentioned second processor is also configured to: determine in the privacy sample data whether
Include the sample data different from the communication data;
When including the sample data different from the communication data in determining the privacy sample data, to the sample
Data are marked;
The private data by after label is sent to second terminal, so that the second terminal is determining the label
When having the violation data for not meeting GDPR conjunction rule rule in private data afterwards, application program is generated according to the violation data
Examining report includes:
Sample data after private data and label after label is sent to second terminal, so that the second terminal
Have in determining the private data after the label and the sample data after the label and does not meet the violation that GDPR closes rule rule
When data, the examining report of application program is generated according to the violation data.
In one embodiment, above-mentioned second processor is also configured to: receiving the privacy that the second terminal is sent
Request of data;
It requests the sample data after the private data and label after label being sent to second in response to the private data
Terminal.
In one embodiment, above-mentioned second processor is also configured to: searching in the privacy sample data is
The no data having in the communication data;
When there are the data in the communication data in determining the privacy sample data, the data are determined as described
Private data.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and server is in the application program for receiving first terminal transmission
Communication data when, in determining communication data contain private data when, be sent to after private data is marked second eventually
End, when so that second terminal having the violation data for not meeting GDPR conjunction rule rule in determining the private data after label, according to
Violation data generates the examining report of application program, and user can check the testing result of application program by examining report,
Automatically generating for the examining report of application program is realized, detection efficiency is high.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and conjunction rule detection device includes:
Third processor;
For storing the third memory of third processor-executable instruction;
Wherein, the third processor is configured as:
Private data after receiving the label that server is sent;
Whether have described in not meeting in private data after the determining label of GDPR conjunction rule rule according to the pre-stored data
GDPR closes the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to
The violation data generates the examining report of application program.
In one embodiment, above-mentioned third processor is also configured to: the private data after determining the label
In have when not meeting the GDPR and closing the violation data of rule rule, the application is generated according to routine data and the violation data
The examining report of program;The routine data closes the regular number of rule to meet the GDPR in the private data after the label
According to.
In one embodiment, above-mentioned third processor is also configured to: closing rule rule to the pre-stored GDPR
Then modify;
It is closed whether to have not meet in the private data after rule rule determines the label according to the modified GDPR and be repaired
The GDPR after changing closes the violation data of rule rule.
In one embodiment, above-mentioned third processor is also configured to: hidden after receiving the label that server is sent
Sample data after private data and label;
GDPR according to the pre-stored data closes the sample after private data and the label after rule rule determines the label
Whether have in data and does not meet the violation data that the GDPR closes rule rule;
Have in determining the private data after the label and the sample data after the label and does not meet the GDPR conjunction
When the violation data of rule, the examining report of application program is generated according to the violation data.
In one embodiment, above-mentioned third processor is also configured to: Xiang Suoshu server sends private data and asks
It asks;
The sample data after private data and label after receiving the label that server is sent.
In one embodiment, above-mentioned third processor is also configured to: determining the classification of the violation data;
The examining report of the application program is generated according to the label of the classification of the violation data and the violation data.
The embodiment of the present disclosure provides a kind of conjunction rule detection device, and first terminal gets application from Monkey test program
The communication data of program, and communication data is sent to server, so that server contains privacy number in determining communication data
According to when, and second terminal is sent to after private data is marked, so that private data of the second terminal after determining label
In have when not meeting GDPR and closing the violation data of rule rule, the detection report of application program is generated according to violation data and routine data
It accuses, user can check the testing result of application program by examining report, realize the examining report of application program oneself
Dynamic to generate, detection efficiency is high.
About the device in above-described embodiment, wherein modules execute the specific method of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 8 is a kind of structural block diagram for closing rule detection device 90 shown according to an exemplary embodiment, and the device 80 is suitable
For first terminal and second terminal.For example, device 80 can be mobile phone, computer, digital broadcast terminal, information receiving and transmitting
Equipment, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Device 80 may include following one or more components: processing component 802, memory 804, and power supply module 806 is more
Media component 808, audio component 810, the interface 812 of input/output (I/O), sensor module 814 and communication component
816。
The integrated operation of the usual control device 80 of processing component 802, such as with display, telephone call, data communication, camera
Operation and record operate associated operation.Processing element 802 may include one or more processors 820 to execute instruction,
To perform all or part of the steps of the methods described above.In addition, processing component 802 may include one or more modules, it is convenient for
Interaction between processing component 802 and other assemblies.For example, processing component 802 may include multi-media module, to facilitate more matchmakers
Interaction between body component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in device 80.These data are shown
Example includes the instruction of any application or method for operating on device 80, contact data, and telephone book data disappears
Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Electric power assembly 806 provides electric power for the various assemblies of device 80.Electric power assembly 806 may include power management system
System, one or more power supplys and other with for device 80 generate, manage, and distribute the associated component of electric power.
Multimedia component 808 includes the screen of one output interface of offer between described device 80 and user.One
In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings
Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action
Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers
Body component 808 includes a front camera and/or rear camera.When device 80 is in operation mode, such as screening-mode or
When video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 810 is configured as output and/or input audio signal.For example, audio component 810 includes a Mike
Wind (MIC), when device 80 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is configured
To receive external audio signal.The received audio signal can be further stored in memory 804 or via communication component
816 send.In some embodiments, audio component 810 further includes a loudspeaker, is used for output audio signal.
I/O interface 812 provides interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock
Determine button.
Sensor module 814 includes one or more sensors, for providing the status assessment of various aspects for device 80.
For example, sensor module 814 can detecte the state that opens/closes of device 80, the relative positioning of component, such as the component
For the display and keypad of device 80, sensor module 814 can be with the position of 80 1 components of detection device 80 or device
Change, the existence or non-existence that user contacts with device 80, the temperature change in 80 orientation of device or acceleration/deceleration and device 80.
Sensor module 814 may include proximity sensor, be configured to detect object nearby without any physical contact
Presence.Sensor module 814 can also include that optical sensor is used in imaging applications such as CMOS or ccd image sensor
It uses.In some embodiments, which can also include acceleration transducer, gyro sensor, magnetic sensing
Device, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 80 and other equipment.Device
80 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation
In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 816 further includes near-field communication (NFC) module, to promote short range communication.Example
Such as, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) skill can be based in NFC module
Art, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 80 can be believed by one or more application specific integrated circuit (ASIC), number
Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 804 of instruction, above-metioned instruction can be executed by the processor 820 of device 80 to complete the above method.For example, institute
State non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and
Optical data storage devices etc..
Fig. 9 is a kind of block diagram for closing rule detection device shown according to an exemplary embodiment.For example, device 900 can be with
It is provided as a server.Device 900 includes processing component 922, further comprises one or more processors, and by depositing
Memory resource representated by reservoir 932, can be by the instruction of the execution of processing component 922, such as application program for storing.It deposits
The application program stored in reservoir 932 may include it is one or more each correspond to one group of instruction module.This
Outside, processing component 922 is configured as executing instruction, to execute the above method.
Device 900 can also include the power management that a power supply module 926 is configured as executive device 900, and one has
Line or radio network interface 950 are configured as device 900 being connected to network and input and output (I/O) interface 958.Dress
Setting 900 can operate based on the operating system for being stored in memory 932, such as Windows ServerTM, Mac OS XTM,
UnixTM, LinuxTM, FreeBSDTM or similar.
The embodiment of the present disclosure provides a kind of non-transitorycomputer readable storage medium, the instruction in the storage medium
When being executed by the processor of first terminal, so that first terminal is able to carry out above-mentioned conjunction rule detection method, which comprises
Run Monkey test program;The Monkey test program is used to carry out the application program of the first terminal
Test;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains privacy in determining the communication data
When data, the private data is marked according to whether the private data is used, and by the private data after label
It is sent to second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule
When the violation data of rule, the examining report of application program is generated according to the violation data.
In one embodiment, the communication data includes at least http request message, memory stacked data, daily record data
One of.
The embodiment of the present disclosure provides a kind of non-transitorycomputer readable storage medium, the instruction in the storage medium
When being executed by the processor of server, enable the server to execute above-mentioned conjunction rule detection method, which comprises
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy
Sample data is the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to institute
Private data is stated to be marked;The data type of the private data includes http request message, memory stacked data and log
Data;
Private data after label is sent to second terminal, so that the second terminal is after determining the label
When having the violation data for not meeting GDPR conjunction rule rule in private data, the detection of application program is generated according to the violation data
Report.
In one embodiment, further includes:
It whether determines in the privacy sample data comprising the sample data different from the communication data;
When including the sample data different from the communication data in determining the privacy sample data, to the sample
Data are marked;
The private data by after label is sent to second terminal, so that the second terminal is determining the label
When having the violation data for not meeting GDPR conjunction rule rule in private data afterwards, application program is generated according to the violation data
Examining report includes:
Sample data after private data and label after label is sent to second terminal, so that the second terminal
Have in determining the private data after the label and the sample data after the label and does not meet the violation that GDPR closes rule rule
When data, the examining report of application program is generated according to the violation data.
In one embodiment, the sample data after the private data and label by after label is sent to second terminal
Include:
Receive the private data request that the second terminal is sent;
It requests the sample data after the private data and label after label being sent to second in response to the private data
Terminal.
In one embodiment, the privacy sample data according to the pre-stored data determines in the communication data whether contain
There is the private data to include:
The data in the communication data are searched whether in the privacy sample data;
When there are the data in the communication data in determining the privacy sample data, the data are determined as described
Private data.
The embodiment of the present disclosure provides a kind of non-transitorycomputer readable storage medium, the instruction in the storage medium
When being executed by the processor of second terminal, so that second terminal is able to carry out above-mentioned conjunction rule detection method, which comprises
Private data after receiving the label that server is sent;
Whether have described in not meeting in private data after the determining label of GDPR conjunction rule rule according to the pre-stored data
GDPR closes the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to
The violation data generates the examining report of application program.
In one embodiment, it is described have in determining the private data after the label do not meet the GDPR and close rule
When the violation data of rule, include: according to the examining report that the violation data generates application program
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to
Routine data and the violation data generate the examining report of the application program;The routine data is hidden after the label
Meet the data that the GDPR closes rule rule in private data.
In one embodiment, the GDPR according to the pre-stored data closes rule rule and determines the private data after the label
In whether have not meeting the GDPR and close the violation data of rule rule and include:
Rule rule is closed to the pre-stored GDPR to modify;
It is closed whether to have not meet in the private data after rule rule determines the label according to the modified GDPR and be repaired
The GDPR after changing closes the violation data of rule rule.
In one embodiment, the private data after the label for receiving server transmission includes:
The sample data after private data and label after receiving the label that server is sent;
Whether the GDPR according to the pre-stored data, which closes to have in the private data after rule rule determines the label, does not meet
The GDPR closes the regular violation data of rule
GDPR according to the pre-stored data closes the sample after private data and the label after rule rule determines the label
Whether have in data and does not meet the violation data that the GDPR closes rule rule;
It is described to have when not meeting the GDPR and closing the violation data of rule rule in determining the private data after the label,
Include: according to the examining report that the violation data generates application program
Have in determining the private data after the label and the sample data after the label and does not meet the GDPR conjunction
When the violation data of rule, the examining report of application program is generated according to the violation data.
In one embodiment, the sample data after the private data and label after the label for receiving server transmission
Include:
Private data request is sent to the server;
The sample data after private data and label after receiving the label that server is sent.
In one embodiment, described in determining the private data after the label and the sample data after the label
When having the violation data for not meeting the GDPR conjunction rule rule, the examining report packet of application program is generated according to the violation data
It includes:
Determine the classification of the violation data;
The examining report of the application program is generated according to the label of the classification of the violation data and the violation data.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing disclosure disclosed herein
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following
Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
Claims (28)
1. detection method is advised in a kind of conjunction, which is characterized in that be applied to first terminal, comprising:
Run Monkey test program;The Monkey test program is for surveying the application program of the first terminal
Examination;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains private data in determining the communication data
When, the private data is marked according to whether the private data is used, and the private data after label is sent
To second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule rule
Violation data when, according to the violation data generate application program examining report.
2. the method according to claim 1, wherein the communication data includes at least http request message, interior
Deposit one of stacked data, daily record data.
3. detection method is advised in a kind of conjunction, which is characterized in that be applied to server, comprising:
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy sample
Data are the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to described hidden
Private data are marked;The data type of the private data includes http request message, memory stacked data and daily record data;
Private data after label is sent to second terminal, so that privacy of the second terminal after determining the label
When having the violation data for not meeting GDPR conjunction rule rule in data, the detection report of application program is generated according to the violation data
It accuses.
4. according to the method described in claim 3, it is characterized by further comprising:
It whether determines in the privacy sample data comprising the sample data different from the communication data;
When including the sample data different from the communication data in determining the privacy sample data, to the sample data
It is marked;
The private data by after label is sent to second terminal, so that the second terminal is after determining the label
When having the violation data for not meeting GDPR conjunction rule rule in private data, the detection of application program is generated according to the violation data
Report includes:
Sample data after private data and label after label is sent to second terminal, so that the second terminal is true
Have in the sample data after private data and the label after the fixed label and does not meet the violation data that GDPR closes rule rule
When, the examining report of application program is generated according to the violation data.
5. according to the method described in claim 4, it is characterized in that, sample after the private data and label by after label
Data are sent to second terminal
Receive the private data request that the second terminal is sent;
It requests the sample data after the private data and label after label being sent to second terminal in response to the private data.
6. according to the method described in claim 3, it is characterized in that, the privacy sample data according to the pre-stored data determines institute
State in communication data whether containing private data include:
The data in the communication data are searched whether in the privacy sample data;
When there are the data in the communication data in determining the privacy sample data, the data are determined as the privacy
Data.
7. detection method is advised in a kind of conjunction, which is characterized in that be applied to second terminal, comprising:
Private data after receiving the label that server is sent;
Whether GDPR according to the pre-stored data, which closes to have in the private data after rule rule determines the label, does not meet the GDPR
Close the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to described
The examining report of violation data generation application program.
8. the method according to the description of claim 7 is characterized in that described have not in determining the private data after the label
When meeting the violation data of the GDPR conjunction rule rule, include: according to the examining report that the violation data generates application program
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to routine
Data and the violation data generate the examining report of the application program;The routine data is the privacy number after the label
Meet the data that the GDPR closes rule rule in.
9. the method according to the description of claim 7 is characterized in that the GDPR according to the pre-stored data, which closes rule rule, determines institute
Whether have not meeting the GDPR and close the violation data of rule rule in private data after stating label and includes:
Rule rule is closed to the pre-stored GDPR to modify;
Whether have after not meeting modification in private data after closing the determining label of rule rule according to the modified GDPR
The GDPR close rule rule violation data.
10. the method according to the description of claim 7 is characterized in that the privacy number received after the label that server is sent
According to including:
The sample data after private data and label after receiving the label that server is sent;
Whether have described in not meeting in private data after the determining label of the GDPR conjunction rule rule according to the pre-stored data
GDPR closes the regular violation data of rule
GDPR according to the pre-stored data closes the sample data after private data and the label after rule rule determines the label
In whether have and do not meet the violation data that the GDPR closes rule rule;
It is described to have when not meeting the GDPR and closing the violation data of rule rule in determining the private data after the label, according to
The examining report that the violation data generates application program includes:
Have in determining the private data after the label and the sample data after the label and does not meet the GDPR conjunction rule rule
When violation data then, the examining report of application program is generated according to the violation data.
11. according to the method described in claim 10, it is characterized in that, the privacy number received after the label that server is sent
Include: according to the sample data after label
Private data request is sent to the server;
The sample data after private data and label after receiving the label that server is sent.
12. according to the method described in claim 10, it is characterized in that, the private data and institute after determining the label
When having the violation data for not meeting the GDPR conjunction rule rule in the sample data after stating label, generated according to the violation data
The examining report of application program includes:
Determine the classification of the violation data;
The examining report of the application program is generated according to the label of the classification of the violation data and the violation data.
13. detection device is advised in a kind of conjunction characterized by comprising
Module is run, for running Monkey test program;The Monkey test program is for answering the first terminal
It is tested with program;
Module is obtained, for obtaining the communication data of the application program from the Monkey test program;
First sending module, for sending the communication data to server, so that the server is determining the communication
When containing private data in data, the private data is marked according to whether the private data is used, and will mark
Private data after note is sent to second terminal, so that the second terminal has in determining the private data after the label
When not meeting the violation data of GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
14. device according to claim 13, which is characterized in that the communication data include at least http request message,
One of memory stacked data, daily record data.
15. detection device is advised in a kind of conjunction characterized by comprising
First receiving module, for receiving the communication data of first terminal transmission;
First determining module determines in the communication data whether contain privacy for privacy sample data according to the pre-stored data
Data;The privacy sample data is the private data of the first terminal of server storage;
First mark module, when for containing the private data in determining the communication data, according to the private data
Data type the private data is marked;The data type of the private data includes http request message, memory
Stacked data and daily record data;
Second sending module, for the private data after label to be sent to second terminal, so that the second terminal is true
When having the violation data for not meeting GDPR conjunction rule rule in the private data after the fixed label, generated according to the violation data
The examining report of application program.
16. device according to claim 15, which is characterized in that it further include the second determining module and the second mark module,
Second sending module includes the first sending submodule;
Second determining module, for whether determining in the privacy sample data comprising the sample different from the communication data
Notebook data;
Second mark module, for including the sample different from the communication data in determining the privacy sample data
When data, the sample data is marked;
First sending submodule, for the sample data after the private data and label after label to be sent to second eventually
End, does not accord with so that the second terminal has in determining the private data after the label and the sample data after the label
When closing the violation data of GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
17. device according to claim 16, which is characterized in that first sending submodule includes the first receiving unit
With the first transmission unit;
First receiving unit, the private data request sent for receiving the second terminal;
First transmission unit, for requesting in response to the private data by the private data and the mark after the label
Sample data after note is sent to the second terminal.
18. device according to claim 15, which is characterized in that first determining module includes searching submodule and the
One determines submodule;
The lookup submodule, for searching whether the data in the communication data in the privacy sample data;
Described first determines submodule, when for having the data in the communication data in determining the privacy sample data,
The data are determined as the private data.
19. detection device is advised in a kind of conjunction characterized by comprising
Second receiving module, the private data after label for receiving server transmission;
Third determining module, for GDPR according to the pre-stored data close in the private data after rule rule determines the label whether
Have and does not meet the violation data that the GDPR closes rule rule;
Generation module, for there is the violation number for not meeting the GDPR and closing rule rule in determining the private data after the label
According to when, according to the violation data generate application program examining report.
20. device according to claim 19, which is characterized in that the generation module includes the first generation submodule;
Described first generates submodule, does not meet the GDPR conjunction rule rule for having in determining the private data after the label
When violation data then, the examining report of the application program is generated according to routine data and the violation data;The routine
Data close the regular data of rule to meet the GDPR in the private data after the label.
21. device according to claim 19, which is characterized in that the third determining module includes modification submodule and the
Two determine submodule;
The modification submodule is modified for closing rule rule to the pre-stored GDPR;
Described second determines submodule, for closing the privacy number after rule rule determines the label according to the modified GDPR
Whether have in and does not meet the violation data that the modified GDPR closes rule rule.
22. device according to claim 19, which is characterized in that second receiving module includes the second reception submodule
Block, the third determining module include that third determines that submodule, the generation module include the second generation submodule;
Second receiving submodule, the sample number after the private data and label after label for receiving server transmission
According to;
The third determines submodule, closes the private data after rule rule determines the label for GDPR according to the pre-stored data
The regular violation data of the GDPR conjunction rule is not met with whether having in the sample data after the label;
Described second generates submodule, in determining the private data after the label and the sample data after the label
When having the violation data for not meeting the GDPR conjunction rule rule, the examining report of application program is generated according to the violation data.
23. device according to claim 22, which is characterized in that second receiving submodule includes the second transmission unit
With the second receiving unit;
Second transmission unit, for sending private data request to the server;
Second receiving unit, the sample after the private data and label after the label for receiving the server transmission
Notebook data.
24. device according to claim 22, which is characterized in that the second generation submodule includes determination unit and life
At unit;
The determination unit, for determining the classification of the violation data;
The generation unit, it is described using journey for being generated according to the classification of the violation data and the label of the violation data
The examining report of sequence.
25. detection device is advised in a kind of conjunction characterized by comprising
First processor;
For storing the first memory of first processor executable instruction;
Wherein, the first processor is configured as:
Run Monkey test program;The Monkey test program is for surveying the application program of the first terminal
Examination;
The communication data of the application program is obtained from the Monkey test program;
The communication data is sent to server, so that the server contains private data in determining the communication data
When, the private data is marked according to whether the private data is used, and the private data after label is sent
To second terminal, so that the second terminal has in determining the private data after the label does not meet GDPR conjunction rule rule
Violation data when, according to the violation data generate application program examining report.
26. detection device is advised in a kind of conjunction characterized by comprising
Second processor;
For storing the second memory of second processor executable instruction;
Wherein, the second processor is configured as:
Receive the communication data that first terminal is sent;
Privacy sample data according to the pre-stored data determines in the communication data whether contain private data;The privacy sample
Data are the private data of the first terminal of server storage;
When containing the private data in determining the communication data, according to the data type of the private data to described hidden
Private data are marked;The data type of the private data includes http request message, memory stacked data and daily record data;
Private data after label is sent to second terminal, so that privacy of the second terminal after determining the label
When having the violation data for not meeting GDPR conjunction rule rule in data, the detection report of application program is generated according to the violation data
It accuses.
27. detection device is advised in a kind of conjunction characterized by comprising
Third processor;
For storing the third memory of third processor-executable instruction;
Wherein, the third processor is configured as:
Private data after receiving the label that server is sent;
Whether GDPR according to the pre-stored data, which closes to have in the private data after rule rule determines the label, does not meet the GDPR
Close the violation data of rule rule;
When having the violation data for not meeting the GDPR conjunction rule rule in determining the private data after the label, according to described
The examining report of violation data generation application program.
28. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that the instruction is by processor
The step of claim 1 to 12 any one claim the method is realized when execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811526442.4A CN109739748B (en) | 2018-12-13 | 2018-12-13 | Compliance detection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811526442.4A CN109739748B (en) | 2018-12-13 | 2018-12-13 | Compliance detection method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109739748A true CN109739748A (en) | 2019-05-10 |
CN109739748B CN109739748B (en) | 2022-06-10 |
Family
ID=66359333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811526442.4A Active CN109739748B (en) | 2018-12-13 | 2018-12-13 | Compliance detection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109739748B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110502926A (en) * | 2019-08-26 | 2019-11-26 | 北京小米移动软件有限公司 | Privacy closes rule detection method and device |
CN110990873A (en) * | 2019-12-03 | 2020-04-10 | 浙江大华技术股份有限公司 | Illegal operation monitoring method, computer equipment and storage medium |
CN111158748A (en) * | 2019-12-16 | 2020-05-15 | 北京小米移动软件有限公司 | Information acquisition method and device and storage medium |
CN111245804A (en) * | 2020-01-06 | 2020-06-05 | 北京松果电子有限公司 | Communication security testing method and device for terminal equipment and storage medium |
CN111835756A (en) * | 2020-07-10 | 2020-10-27 | 深圳市网安计算机安全检测技术有限公司 | APP privacy compliance detection method and device, computer equipment and storage medium |
EP3786824A1 (en) * | 2019-08-30 | 2021-03-03 | Beijing Xiaomi Mobile Software Co., Ltd. | Methods and devices for testing an application on a terminal |
CN113139186A (en) * | 2021-04-14 | 2021-07-20 | 北京开元华创信息技术有限公司 | Personal information security audit evaluation system |
CN113872819A (en) * | 2020-06-30 | 2021-12-31 | 深圳Tcl数字技术有限公司 | Equipment testing method and computer equipment |
CN114676432A (en) * | 2022-05-26 | 2022-06-28 | 河北兰科网络工程集团有限公司 | APP privacy compliance checking method, terminal and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102419727A (en) * | 2011-09-30 | 2012-04-18 | 宇龙计算机通信科技(深圳)有限公司 | Automatic test method and device |
CN102938040A (en) * | 2012-09-29 | 2013-02-20 | 中兴通讯股份有限公司 | Malicious Android application program detection method, system and device |
CN104462961A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | Mobile terminal and privacy permission optimizing method thereof |
US20150261960A1 (en) * | 2012-01-30 | 2015-09-17 | Nokia Technologies Oy | Method and apparatus providing privacy benchmarking for mobile application development |
CN107133519A (en) * | 2017-05-15 | 2017-09-05 | 华中科技大学 | Privacy compromise detection method and system in a kind of Android application network communication |
CN108900473A (en) * | 2018-06-04 | 2018-11-27 | 麒麟合盛网络技术股份有限公司 | A kind of data monitoring method, device and system |
-
2018
- 2018-12-13 CN CN201811526442.4A patent/CN109739748B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102419727A (en) * | 2011-09-30 | 2012-04-18 | 宇龙计算机通信科技(深圳)有限公司 | Automatic test method and device |
US20150261960A1 (en) * | 2012-01-30 | 2015-09-17 | Nokia Technologies Oy | Method and apparatus providing privacy benchmarking for mobile application development |
CN102938040A (en) * | 2012-09-29 | 2013-02-20 | 中兴通讯股份有限公司 | Malicious Android application program detection method, system and device |
CN104462961A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | Mobile terminal and privacy permission optimizing method thereof |
CN107133519A (en) * | 2017-05-15 | 2017-09-05 | 华中科技大学 | Privacy compromise detection method and system in a kind of Android application network communication |
CN108900473A (en) * | 2018-06-04 | 2018-11-27 | 麒麟合盛网络技术股份有限公司 | A kind of data monitoring method, device and system |
Non-Patent Citations (1)
Title |
---|
郑斌: "企业数据安全能力框架——数据安全能力成熟度模型的构建及应用", 《信息安全与通信保密》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110502926A (en) * | 2019-08-26 | 2019-11-26 | 北京小米移动软件有限公司 | Privacy closes rule detection method and device |
EP3786824A1 (en) * | 2019-08-30 | 2021-03-03 | Beijing Xiaomi Mobile Software Co., Ltd. | Methods and devices for testing an application on a terminal |
US11363066B2 (en) | 2019-08-30 | 2022-06-14 | Beijing Xiaomi Mobile Software Co., Ltd. | Method and device for information processing, test terminal, test platform and storage medium |
CN110990873A (en) * | 2019-12-03 | 2020-04-10 | 浙江大华技术股份有限公司 | Illegal operation monitoring method, computer equipment and storage medium |
EP3839786A1 (en) * | 2019-12-16 | 2021-06-23 | Beijing Xiaomi Mobile Software Co., Ltd. | Information acquisition method and device, and storage medium |
CN111158748A (en) * | 2019-12-16 | 2020-05-15 | 北京小米移动软件有限公司 | Information acquisition method and device and storage medium |
US11763023B2 (en) | 2019-12-16 | 2023-09-19 | Beijing Xiaomi Mobile Software Co., Ltd. | Information acquisition method and device, and storage medium |
CN111158748B (en) * | 2019-12-16 | 2024-01-30 | 北京小米移动软件有限公司 | Information acquisition method and device and storage medium |
CN111245804A (en) * | 2020-01-06 | 2020-06-05 | 北京松果电子有限公司 | Communication security testing method and device for terminal equipment and storage medium |
CN113872819A (en) * | 2020-06-30 | 2021-12-31 | 深圳Tcl数字技术有限公司 | Equipment testing method and computer equipment |
CN111835756A (en) * | 2020-07-10 | 2020-10-27 | 深圳市网安计算机安全检测技术有限公司 | APP privacy compliance detection method and device, computer equipment and storage medium |
CN111835756B (en) * | 2020-07-10 | 2023-02-03 | 深圳市网安计算机安全检测技术有限公司 | APP privacy compliance detection method and device, computer equipment and storage medium |
CN113139186A (en) * | 2021-04-14 | 2021-07-20 | 北京开元华创信息技术有限公司 | Personal information security audit evaluation system |
CN114676432A (en) * | 2022-05-26 | 2022-06-28 | 河北兰科网络工程集团有限公司 | APP privacy compliance checking method, terminal and system |
Also Published As
Publication number | Publication date |
---|---|
CN109739748B (en) | 2022-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109739748A (en) | Close rule detection method and device | |
CN105162937B (en) | Method for processing message of incoming call and device | |
CN106529339A (en) | Picture display method, device and terminal | |
CN106487622A (en) | Equipment control sharing method and device | |
CN106557402B (en) | Mobile terminal and exception information processing method | |
CN111371938B (en) | Fault detection method and electronic equipment | |
US20190370092A1 (en) | Direct input from a remote device | |
CN108038827A (en) | Image processing method, mobile terminal and computer-readable recording medium | |
CN108833991A (en) | Video caption display methods and device | |
CN107426088A (en) | Pictorial information processing method and processing device | |
CN105956486A (en) | Remote control method and apparatus | |
CN107577513A (en) | A kind of method, apparatus and storage medium for showing painted eggshell | |
CN107323111A (en) | Predict method, device and the storage medium of printer ink head clearance time | |
CN106919629A (en) | The method and device of information sifting is realized in group chat | |
CN106293961A (en) | Text message processing method and device | |
CN108012029A (en) | A kind of information processing method, equipment and computer-readable recording medium | |
CN108540458A (en) | A kind of method of client checks, equipment, server and storage medium | |
US8272738B2 (en) | Apparatus and method for recognizing a person's gaze | |
CN105573747B (en) | The test method and device of user interface | |
CN107770356A (en) | A kind of communication establishing method, equipment and computer-readable recording medium | |
CN105893249A (en) | Software testing method and device | |
CN107463809A (en) | The display methods and device of application icon | |
CN104219360A (en) | Information processing method and device | |
CN107360322A (en) | Information cuing method and device | |
CN107484144A (en) | A kind of information acquisition method, terminal, server and computer-readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |