CN114547631B - Terminal control method and device and terminal - Google Patents

Terminal control method and device and terminal Download PDF

Info

Publication number
CN114547631B
CN114547631B CN202011295300.9A CN202011295300A CN114547631B CN 114547631 B CN114547631 B CN 114547631B CN 202011295300 A CN202011295300 A CN 202011295300A CN 114547631 B CN114547631 B CN 114547631B
Authority
CN
China
Prior art keywords
application program
image acquisition
acquisition equipment
terminal
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011295300.9A
Other languages
Chinese (zh)
Other versions
CN114547631A (en
Inventor
杨智宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu TD Tech Ltd
Original Assignee
Chengdu TD Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu TD Tech Ltd filed Critical Chengdu TD Tech Ltd
Priority to CN202011295300.9A priority Critical patent/CN114547631B/en
Publication of CN114547631A publication Critical patent/CN114547631A/en
Application granted granted Critical
Publication of CN114547631B publication Critical patent/CN114547631B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Automation & Control Theory (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides a terminal control method, a device and a terminal, wherein the method comprises the following steps: the method comprises the steps of monitoring the state of image acquisition equipment on a terminal in real time, acquiring running application programs when the image acquisition equipment is monitored to be in an opening state, obtaining an application program set, judging whether each application program in the application program set has the authority of opening the image acquisition equipment, and emptying multimedia data acquired by the image acquisition equipment on the terminal if at least one target application program does not have the authority of opening the image acquisition equipment. The embodiment simplifies the implementation mode of protecting the user privacy data, and further improves the reliability of protecting the privacy data.

Description

Terminal control method and device and terminal
Technical Field
The embodiment of the invention relates to the technical field of terminals, in particular to a terminal control method, a terminal control device and a terminal.
Background
Along with the development of terminal intellectuality, the terminal provides very big convenience for people's life and study, has become the indispensable instrument in people's daily life.
The operating system of the terminal is generally an open platform, and an open interface of the operating system allows various applications to be implanted and run, and also allows a user to actively download various applications. However, various application programs written based on the operating system of the terminal need to apply for acquiring application functions and have numerous hardware rights, so that malicious application programs can take advantage of the application functions. Generally, a malicious application program runs in a background, and steals privacy information of a user by controlling software and hardware of the terminal, for example, a camera is started to steal multimedia data such as scene videos or pictures around the terminal under the condition that the user does not know or is not authorized by the user, so that the leakage of the privacy data is caused.
In the prior art, the working logic of the camera can be controlled in a mode of adding hardware equipment, the condition that the camera is opened for candid shooting or previewing under the condition that a user is unaware is reduced, however, the mode needs adding the hardware equipment, the original implementation logic is changed according to the added hardware equipment, time and labor are wasted in implementation, the hardware cost is increased, and the reliability of protecting the private data is reduced.
Disclosure of Invention
The embodiment of the invention provides a terminal control method, a device and a terminal, which are used for improving the reliability of privacy data protection.
In a first aspect, an embodiment of the present invention provides a terminal control method, including:
monitoring the state of image acquisition equipment on a terminal in real time;
when the image acquisition equipment is monitored to be in an open state, acquiring an operating application program to obtain an application program set;
judging whether each application program in the application program set has the authority to start the image acquisition equipment;
and if at least one target application program does not have the authority of starting the image acquisition equipment, emptying the multimedia data acquired by the image acquisition equipment.
Optionally, the multimedia data includes photo stream data and/or preview stream data,
if at least one target application program does not have the authority of starting the image acquisition equipment, emptying the multimedia data acquired by the image acquisition equipment, wherein the emptying process comprises the following steps:
and if at least one target application program does not have the authority of starting the image acquisition equipment, performing zero setting operation on the photographing stream data and/or the preview stream data to be written into the buffer space.
Optionally, if there is at least one target application that does not have the authority to start the image capturing device, performing emptying processing on the multimedia data captured by the image capturing device, including:
and if at least one target application program does not have the authority of starting the image acquisition equipment, clearing the multimedia data to be sent to the target application program.
Optionally, before the determining whether each application in the application set has the authority to start the image capturing device, the method further includes:
receiving setting information of each application program, wherein the setting information carries authority information of image acquisition equipment;
and setting each application program based on the authority information of the image acquisition equipment corresponding to each application program.
Optionally, before the monitoring the state of the image capturing device on the terminal in real time, the method further includes:
receiving a monitoring starting instruction;
and starting a monitoring function according to the monitoring starting instruction.
Optionally, after performing emptying processing on the multimedia data acquired by the image acquisition device if there is at least one target application program that does not have the authority to start the image acquisition device, the method further includes:
generating an emptying processing prompt;
and displaying the emptying processing prompt on a terminal interface.
Optionally, the receiving a listening start instruction includes:
receiving a monitoring starting instruction sent by a server;
or the like, or, alternatively,
and receiving a monitoring starting instruction sent by a local three-party application program.
In a second aspect, an embodiment of the present invention provides a terminal control apparatus, including:
the monitoring module is used for monitoring the state of the image acquisition equipment on the terminal in real time;
the processing module is used for acquiring the running application program to obtain an application program set when the image acquisition equipment is monitored to be in the starting state;
the processing module is further configured to determine whether each application in the application set has an authority to start the image capturing device;
the processing module is further configured to perform emptying processing on the multimedia data acquired by the image acquisition device if at least one target application program does not have the authority to start the image acquisition device.
In a third aspect, an embodiment of the present invention provides a terminal, including: at least one processor and a memory;
the image acquisition equipment is used for acquiring multimedia data and sending the acquired multimedia data to the processor;
the memory stores computer execution instructions;
the at least one processor executes computer-executable instructions stored by the memory, causing the at least one processor to perform the terminal control method according to any one of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer executing instruction is stored, and when a processor executes the computer executing instruction, the terminal control method according to any one of the first aspect is implemented.
The embodiment of the invention provides a terminal control method, a device and equipment, after the scheme is adopted, the state of image acquisition equipment on a terminal can be monitored in real time, then when the image acquisition equipment is monitored to be in an open state, an application program in operation is acquired to obtain an application program set, whether each application program in the application program set has the authority of opening the image acquisition equipment or not is judged, if at least one target application program does not have the authority of opening the image acquisition equipment, the multimedia data acquired by the image acquisition equipment on the terminal is emptied, no additional hardware equipment is needed, and further, the original implementation logic does not need to be changed according to newly added hardware equipment, the implementation mode of user privacy data protection is simplified, and the reliability of privacy data protection is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an application system of a terminal control method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a terminal control method according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a terminal control method according to another embodiment of the present invention;
fig. 4 is a schematic diagram illustrating an application of a clearing processing prompt according to an embodiment of the present invention;
fig. 5 is an application schematic diagram of a terminal control method according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal control device according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a hardware structure of a terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of other sequential examples than those illustrated or described. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
At present, the operating system of the terminal is generally an open platform, and its open interface allows various applications to be implanted and run, and also allows the user to actively download various applications. However, various application programs written based on the operating system of the terminal need to apply for acquiring application functions and have numerous hardware rights, so that malicious application programs can take advantage of the application functions. Generally, a malicious application program runs in a background, and steals privacy information of a user by controlling software and hardware of the terminal, for example, a camera is started to steal multimedia data such as scene videos or pictures around the terminal under the condition that the user does not know or is not authorized by the user, so that the leakage of the privacy data is caused. The privacy data may be video data, picture data, text data, communication mode data, and other data related to the user.
In the prior art, the working logic of the camera can be controlled in a mode of adding a hardware device, so that the condition that a user opens the camera to perform candid shooting or preview under the condition of unconsciousness is reduced. For example, the operating condition of the camera can be monitored by adding an infrared sensor, and when the camera is monitored and is not opened by user authorization, the imaging effect of the camera is influenced, the user is reminded, and further the leakage of the private data is reduced.
Based on the technical problem, the implementation mode of protecting the privacy data of the user is simplified by improving the processing logic of the software layer and by correspondingly processing the collected multimedia data based on the authority of the application program, and additional hardware equipment is not needed, so that the technical effect of improving the reliability of protecting the privacy data is achieved.
Fig. 1 is a schematic structural diagram of an application system of a terminal control method according to an embodiment of the present invention, and as shown in fig. 1, the embodiment may include a terminal 101 and an image capture device 102 disposed in the terminal 101, where the image capture device 102 may be a camera for capturing a video, an image, or previewing, for example. In addition, a plurality of applications 103 related to the image capturing device may be deployed in the terminal 101, and data related to the applications 103 may be stored in the database 104. When a certain application 103 needs related data, the corresponding data may be acquired from the database 104, and the acquired data may be subjected to related processing. The terminal 101 may be a smart phone, a smart watch, a smart band, a tablet, or a personal computer, which can implement the above functions.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 2 is a flowchart illustrating a terminal control method according to an embodiment of the present invention, where the method according to this embodiment may be executed by the terminal 101. As shown in fig. 2, the method of this embodiment may include:
s201: and monitoring the state of the image acquisition equipment on the terminal in real time.
In this embodiment, two application scenarios may be involved, where one application scenario is to prevent the local multimedia data of the terminal from being stolen, and the other application scenario is to prevent the terminal from stealing the scene data corresponding to the external environment due to the security requirements of the current environment and the field situation. For example, scenes with security requirements such as public security, law, prison and the like can all generate the requirement of anti-candid shooting. Since the two scenes involve shooting or previewing of images, videos and the like, the image acquisition equipment for shooting or previewing the images needs to be monitored to monitor the state of the image acquisition equipment.
Further, the image capturing device may include two states, one being an on state and the other being an off state. If the image acquisition equipment is in an open state, the shooting or previewing of images, videos and the like can be realized. If the image acquisition equipment is in the closed state, it indicates that shooting or previewing of images, videos and the like cannot be realized in the current state.
S202: and when the image acquisition equipment is monitored to be in an open state, acquiring the running application program to obtain an application program set.
In this embodiment, when it is monitored that the image capture device is in the on state, it is indicated that there may be a risk of data leakage, and therefore, the operating state of each application program may be further determined, and it may be further determined whether there is a risk of data leakage.
The running state of the application program may include a running state and a non-running state, and when it is determined whether the application program is at risk of data leakage, the application program in the running state is determined, so as to obtain the application program set. For example, the terminal is deployed with an application a, an application B, an application C, an application D, an application E, and an application F, where the application a, the application B, and the application E are in an operating state, and the application C, the application D, and the application F are in a non-operating state, the application set may include three applications, namely, the application a, the application B, and the application E.
S203: and judging whether each application program in the application program set has the authority of starting the image acquisition equipment.
In this embodiment, each application has specific setting information, and the setting information may include information notification permission, permission to turn on the image capture device, permission to turn on the microphone, and the like.
Before determining whether each application in the application set has the authority to start the image acquisition device, setting information of each application may also be set, which may specifically include:
and receiving the setting information of each application program, wherein the setting information carries the authority information of the image acquisition equipment. And setting each application program based on the authority information of the image acquisition equipment corresponding to each application program.
Specifically, the permission information of the image acquisition device corresponding to the application program may include two conditions of permission and no permission, and the specific setting condition may be set for each application program in a user-defined manner according to requirements in an actual application scene, which is not limited in detail again.
S204: and if at least one target application program does not have the authority of starting the image acquisition equipment, emptying the multimedia data acquired by the image acquisition equipment.
In this embodiment, after determining the authority information of the image capturing device corresponding to each application program, if an application program without the authority to start the image capturing device is running, in order to avoid a situation of multimedia data leakage, the multimedia data captured by the image capturing device may be directly emptied.
In addition, if the multimedia data acquired by the image acquisition device are all subjected to emptying processing, the application program which needs the multimedia data may not receive the corresponding application program, and in order to further improve the use experience of a user, when at least one target application program does not have the right to start the image acquisition device, only the multimedia data to be sent to the target application program is subjected to emptying processing.
Specifically, the foregoing example is continuously used, the application set includes three application programs, namely, the application program a, the application program B, and the application program E, which are in a running state, and only the application program E does not have the authority to start the image capture device, so that only the multimedia data to be sent to the application program E can be emptied.
Further, if there is at least one target application program that does not have the authority to start the image capturing device, performing emptying processing on the multimedia data captured by the image capturing device, which may specifically include:
and if at least one target application program does not have the authority of starting the image acquisition equipment, performing zero setting operation on the photographing stream data and/or the preview stream data to be written into the buffer space.
Specifically, the multimedia data may be different in kind, and may include only photograph-stream data, or only preview-stream data, or may include both photograph-stream data and preview-stream data. For different application scenarios, different kinds of multimedia data may be employed.
For example, for a scene involving only a photograph or a video recording, multimedia data including only photograph stream data may be applied. For scenes that involve only previews, multimedia data that include only preview stream data may be applied. And for scenes involving both photographing or video recording and previewing, multimedia data including both photographing stream data and preview stream data may be applied.
In addition, for the specific situation that the application scene is not clear or the application scene itself may change at any time, the multimedia data including the photo stream data and the preview stream data can be used for emptying, so that the possibility that the privacy data is stolen is reduced, and the reliability of privacy data protection is improved.
In addition, in a general case, the terminal may store the photo stream data and/or the video stream data into the buffer space after acquiring the photo stream data and/or the video stream data, and may directly call the photo stream data and/or the video stream data from the buffer space when calling the photo stream data and/or the video stream data. In this embodiment, when it is monitored that at least one running application program does not have the right to open the image capturing device, the photo stream data and/or the video stream data to be written into the cache space may be set to zero, thereby reducing the possibility of data theft.
After the scheme is adopted, the state of the image acquisition equipment on the terminal can be monitored in real time, then when the image acquisition equipment is monitored to be in the opening state, the running application program is obtained, the application program set is obtained, whether each application program in the application program set has the authority to open the image acquisition equipment or not is judged, if at least one target application program does not have the authority to open the image acquisition equipment, the multimedia data acquired by the image acquisition equipment is emptied, additional hardware equipment does not need to be added, and further the native implementation logic does not need to be changed according to newly added hardware equipment, so that the implementation mode of user privacy data protection is simplified, and further the reliability of privacy data protection is improved.
Based on the method of fig. 2, the present specification also provides some specific embodiments of the method, which are described below.
Fig. 3 is a schematic flowchart of a terminal control method according to another embodiment of the present invention, as shown in fig. 3, before S201, the method may further include:
s301: and receiving a monitoring starting instruction.
S302: and starting the monitoring function according to the monitoring starting instruction.
In this embodiment, before monitoring the state of the image capturing device, the monitoring function may be started first, and then the state of the image capturing device on the terminal may be monitored in real time. The monitoring function can be started by receiving the monitoring starting instruction and then according to the monitoring starting instruction.
Further, receiving the monitoring start instruction may include two ways, one of which is receiving the monitoring start instruction sent by the server. And the other is to receive a monitoring starting instruction sent by a local three-party application program.
Specifically, for scenes in which the current environment and field conditions need to be kept secret, for example, scenes in which security needs exist such as polices, judicial officers, prisons and the like, the monitoring starting instruction sent by the server can be received. Correspondingly, the server can simultaneously send a monitoring start instruction to one or more terminals. For scenes with security requirements such as public security, judicial law, prisons and the like, the server can send monitoring starting instructions to terminals within a preset range with the scenes as centers, and the terminals need to actively start a monitoring function after receiving the monitoring starting instructions, so that the current environment and field conditions are prevented from being leaked. Whether the terminal is in the preset range can be determined through a locator carried by the terminal, and correspondingly, the terminal can communicate in a wireless communication mode, a Bluetooth communication mode or communication modes such as 3G, 4G and 5G.
For a scene for preventing the local multimedia data of the terminal from being stolen, a monitoring starting instruction sent by a local three-party application program can be received. Correspondingly, an application program or a script and the like for stealing data may exist locally on the terminal, the state of the image acquisition equipment can be monitored through the three-party application program locally deployed on the terminal, and then the processing is correspondingly carried out according to the state of the image acquisition equipment, so that the situation that the local data is stolen is reduced.
In addition, fig. 4 is an application schematic diagram of the clearing processing prompt provided by the embodiment of the present invention, and the terminal may further include a display interface, as shown in fig. 4, after S204, the terminal may further include:
and generating a clearing processing prompt.
And displaying a clearing processing prompt on a terminal interface.
Specifically, after the multimedia data collected by the image collecting device is emptied, an emptying processing prompt may be displayed on a display interface of the terminal to remind a user that the collected multimedia data has been emptied to avoid data leakage. Illustratively, the flush processing prompt may be "multimedia data has been flushed! ! | A "is indicated by a text typeface.
In addition, the emptying process prompt may also be a voice prompt.
In addition, fig. 5 is an application schematic diagram of the terminal control method according to an embodiment of the present invention, as shown in fig. 5, in this embodiment, the method is applied to an Android system, and multimedia data includes Image data such as photograph stream data and preview stream data, and with the development of the Android system, functions such as photograph and video recording can be implemented without a preview, an ISP (Image Signal Processor) can send the multimedia data acquired by an Image acquisition device to a HAL Layer (Hardware Abstraction Layer), after receiving the multimedia data, a HAL Layer can directly perform zeroing processing on the preview stream data and the photograph stream data that flow into a cache space, that is, when a monitoring function is turned on, the monitoring function starts to monitor a current camera state, finds that the data stream is created to enable a function to take effect, directly writes 0 to a buffer of the photograph data, and exits from the monitoring after the monitoring is turned off, and a normal flow is recovered, and after the monitoring function is turned on, scenes related to the Image data can be included, so as to avoid omission, and further achieve reliability of protecting the privacy data.
Based on the same idea, an embodiment of this specification further provides a device corresponding to the foregoing method, and fig. 6 is a schematic structural diagram of a terminal control device provided in the embodiment of the present invention, as shown in fig. 6, that may include:
the monitoring module 601 is configured to monitor a state of an image capturing device on the terminal in real time.
In this embodiment, the monitoring module 601 is further configured to:
and receiving a monitoring starting instruction.
And starting a monitoring function according to the monitoring starting instruction.
The monitoring module 601 may be further configured to:
receiving a monitoring starting instruction sent by a server;
or the like, or, alternatively,
and receiving a monitoring starting instruction sent by a local three-party application program.
The processing module 602 is configured to obtain an operating application program to obtain an application program set when it is monitored that the image acquisition device is in an on state.
The processing module 602 is further configured to determine whether each application in the application set has a right to start the image capturing apparatus.
In this embodiment, the processing module 602 is further configured to:
and receiving the setting information of each application program, wherein the setting information carries the authority information of the image acquisition equipment.
And setting each application program based on the authority information of the image acquisition equipment corresponding to each application program.
The processing module 602 is further configured to perform emptying processing on the multimedia data acquired by the image acquisition device if at least one target application program does not have a permission to start the image acquisition device.
In this embodiment, the multimedia data may include photo stream data and/or preview stream data,
the processing module 602 is further configured to:
and if at least one target application program does not have the authority of starting the image acquisition equipment, performing zero setting operation on the photographing stream data and/or the preview stream data to be written into the buffer space.
The processing module 602 is further configured to:
and if at least one target application program does not have the authority of starting the image acquisition equipment, clearing the multimedia data to be sent to the target application program.
Furthermore, in another embodiment, the processing module 602 is further configured to:
and generating a clearing processing prompt.
And displaying the emptying processing prompt on a terminal interface.
The apparatus provided in the embodiment of the present invention may implement the method in the embodiment shown in fig. 2, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 7 is a schematic diagram of a hardware structure of a terminal according to an embodiment of the present invention. As shown in fig. 7, the terminal 700 provided in the present embodiment includes: at least one processor 701 and a memory 702. The processor 701 and the memory 702 are connected by a bus 703.
The image capturing device 704 is configured to capture multimedia data and send the captured multimedia data to the processor 701.
In a specific implementation process, the at least one processor 701 executes the computer-executable instructions stored in the memory 702, so that the at least one processor 701 executes the method in the above-described method embodiment.
For a specific implementation process of the processor 701, reference may be made to the above method embodiments, which implement principles and technical effects similar to each other, and details of this embodiment are not described herein again.
In the embodiment shown in fig. 7, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The memory may comprise high speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.
The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.
The embodiment of the invention also provides a computer-readable storage medium, wherein a computer execution instruction is stored in the computer-readable storage medium, and when a processor executes the computer execution instruction, the terminal control method of the embodiment of the method is realized.
The computer-readable storage medium may be implemented by any type of volatile or non-volatile storage device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk. Readable storage media can be any available media that can be accessed by a general purpose or special purpose computer.
An exemplary readable storage medium is coupled to the processor such the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Of course, the processor and the readable storage medium may also reside as discrete components in the apparatus.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The foregoing program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A terminal control method, comprising:
monitoring the state of image acquisition equipment on a terminal in real time;
when the image acquisition equipment is monitored to be in an open state, acquiring an operating application program to obtain an application program set;
judging whether each application program in the application program set has the authority to start the image acquisition equipment;
and if at least one target application program does not have the authority of starting the image acquisition equipment, emptying the multimedia data acquired by the image acquisition equipment on the terminal.
2. The method of claim 1, wherein the multimedia data comprises photo stream data and/or preview stream data,
if at least one target application program does not have the authority of starting the image acquisition equipment, the method for emptying the multimedia data acquired by the image acquisition equipment comprises the following steps:
and if at least one target application program does not have the authority of starting the image acquisition equipment, performing zero setting operation on the photographing stream data and/or the preview stream data to be written into the buffer space.
3. The method according to claim 1, wherein the performing an emptying process on the multimedia data collected by the image collecting device if there is at least one target application program that does not have a right to open the image collecting device comprises:
and if at least one target application program does not have the authority of starting the image acquisition equipment, clearing the multimedia data to be sent to the target application program.
4. The method according to any one of claims 1-3, further comprising, before the determining whether each application in the set of applications has a right to turn on the image capture device:
receiving setting information of each application program, wherein the setting information carries authority information of image acquisition equipment;
and setting each application program based on the authority information of the image acquisition equipment corresponding to each application program.
5. The method according to any one of claims 1 to 3, wherein before the status of the image capture device on the real-time monitoring terminal, the method further comprises:
receiving a monitoring starting instruction;
and starting a monitoring function according to the monitoring starting instruction.
6. The method according to any one of claims 1 to 3, further comprising, after performing an emptying process on the multimedia data collected by the image capture device if there is at least one target application program that does not have the right to open the image capture device:
generating an emptying processing prompt;
and displaying the emptying processing prompt on a terminal interface.
7. The method of claim 5, wherein receiving a snoop turn-on command comprises:
receiving a monitoring starting instruction sent by a server;
or the like, or a combination thereof,
and receiving a monitoring starting instruction sent by a local three-party application program.
8. A terminal control apparatus, comprising:
the monitoring module is used for monitoring the state of the image acquisition equipment on the terminal in real time;
the processing module is used for acquiring an operating application program to obtain an application program set when the image acquisition equipment is monitored to be in an open state;
the processing module is further used for judging whether each application program in the application program set has the authority of starting the image acquisition equipment;
the processing module is further configured to perform emptying processing on the multimedia data acquired by the image acquisition device if at least one target application program does not have the authority to start the image acquisition device.
9. A terminal, comprising: at least one processor and a memory;
the image acquisition equipment is used for acquiring multimedia data and sending the acquired multimedia data to the processor;
the memory stores computer execution instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the terminal control method of any one of claims 1 to 7.
10. A computer-readable storage medium, wherein a computer-executable instruction is stored in the computer-readable storage medium, and when the computer-executable instruction is executed by a processor, the terminal control method according to any one of claims 1 to 7 is implemented.
CN202011295300.9A 2020-11-18 2020-11-18 Terminal control method and device and terminal Active CN114547631B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011295300.9A CN114547631B (en) 2020-11-18 2020-11-18 Terminal control method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011295300.9A CN114547631B (en) 2020-11-18 2020-11-18 Terminal control method and device and terminal

Publications (2)

Publication Number Publication Date
CN114547631A CN114547631A (en) 2022-05-27
CN114547631B true CN114547631B (en) 2023-03-28

Family

ID=81660280

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011295300.9A Active CN114547631B (en) 2020-11-18 2020-11-18 Terminal control method and device and terminal

Country Status (1)

Country Link
CN (1) CN114547631B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116204371B (en) * 2022-12-13 2023-11-24 远峰科技股份有限公司 Monitoring method and device for camera image data stream

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809027A (en) * 2014-12-29 2016-07-27 北京奇虎科技有限公司 Application program authority control method and device
CN105868624A (en) * 2016-03-23 2016-08-17 北京小米移动软件有限公司 Application program authority management method and device
CN108959864A (en) * 2017-05-25 2018-12-07 阿里巴巴集团控股有限公司 Funcall authentication, the method and apparatus of calling function and authority information method for building up
CN109697359A (en) * 2018-12-19 2019-04-30 惠州Tcl移动通信有限公司 A kind of message prompt method, device, storage medium and electronic equipment
CN111079134A (en) * 2019-12-17 2020-04-28 重庆擎华信息科技有限公司 Method and device for controlling authority globally, storage medium and electronic equipment
CN111143586A (en) * 2019-08-09 2020-05-12 华为技术有限公司 Picture processing method and related device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809027A (en) * 2014-12-29 2016-07-27 北京奇虎科技有限公司 Application program authority control method and device
CN105868624A (en) * 2016-03-23 2016-08-17 北京小米移动软件有限公司 Application program authority management method and device
CN108959864A (en) * 2017-05-25 2018-12-07 阿里巴巴集团控股有限公司 Funcall authentication, the method and apparatus of calling function and authority information method for building up
CN109697359A (en) * 2018-12-19 2019-04-30 惠州Tcl移动通信有限公司 A kind of message prompt method, device, storage medium and electronic equipment
CN111143586A (en) * 2019-08-09 2020-05-12 华为技术有限公司 Picture processing method and related device
CN111079134A (en) * 2019-12-17 2020-04-28 重庆擎华信息科技有限公司 Method and device for controlling authority globally, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN114547631A (en) 2022-05-27

Similar Documents

Publication Publication Date Title
CN109359458B (en) Application unlocking method and device and computer readable storage medium
CN109711148A (en) Hold-up interception method, device, computer equipment and the storage medium of application behavior
CN109325336B (en) Unlocking method, unlocking device and computer readable storage medium
CN110955541B (en) Data processing method, device, chip, electronic equipment and readable storage medium
WO2022078108A1 (en) Method and apparatus for monitoring permission use, device, and storage medium
CN110958399B (en) High dynamic range image HDR realization method and related product
CN113727035A (en) Image processing method, system, electronic device and storage medium
CN113923461B (en) Screen recording method and screen recording system
CN105979062B (en) Communication event processing method and device
CN114547631B (en) Terminal control method and device and terminal
CN112784262A (en) Data access method, device, terminal and storage medium
CN115361184A (en) Privacy protection method and related product
CN111526288A (en) Image processing method and device and storage medium
CN115836516B (en) Monitoring system
CN114341843A (en) Safety protection method and device, mobile terminal and storage medium
CN106528197B (en) Shooting method and device
CN111461950A (en) Image processing method and device
CN115086478A (en) Terminal information confidentiality method and device, electronic equipment and storage medium
CN110287692B (en) Application security management method and device based on terminal equipment
US10831926B1 (en) Privacy proof visual sensor
CN111125660B (en) Privacy protection method, mobile terminal and device with storage function
CN113473064A (en) Video call image processing method and device, computer equipment and storage medium
CN112632518A (en) Data access method, device, terminal and storage medium
CN111625811A (en) Data authorization method and device
CN112887590B (en) Image processing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant