[go: up one dir, main page]

CN116567698B - Information security assessment detection method, system, device and medium based on privacy protection - Google Patents

Information security assessment detection method, system, device and medium based on privacy protection Download PDF

Info

Publication number
CN116567698B
CN116567698B CN202310585584.2A CN202310585584A CN116567698B CN 116567698 B CN116567698 B CN 116567698B CN 202310585584 A CN202310585584 A CN 202310585584A CN 116567698 B CN116567698 B CN 116567698B
Authority
CN
China
Prior art keywords
mobile terminal
user
processor
information
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310585584.2A
Other languages
Chinese (zh)
Other versions
CN116567698A (en
Inventor
胡冬冬
高玉梅
韩玉美
王玉兰
刘影
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiweirui Enterprise Management Co ltd
Original Assignee
Shanghai Aiweirui Enterprise Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiweirui Enterprise Management Co ltd filed Critical Shanghai Aiweirui Enterprise Management Co ltd
Priority to CN202310585584.2A priority Critical patent/CN116567698B/en
Publication of CN116567698A publication Critical patent/CN116567698A/en
Application granted granted Critical
Publication of CN116567698B publication Critical patent/CN116567698B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to an information security assessment detection method, system, device and medium based on privacy protection, wherein the method comprises the steps that the mobile terminal receives incoming call information, the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor, if the mobile terminal is in the weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor, if the ambient light intensity is in a preset range, the mobile terminal is assessed to be possibly in a sealed environment and prompts a user to pay attention to a call environment through a display screen, if the incoming call information is received by the user, the processor controls the microphone to receive ambient environment sounds, and if the noisy degree of the ambient environment sounds exceeds a preset threshold, the processor assesses that the mobile terminal has privacy leakage risk and reminds the user of privacy leakage through a receiver.

Description

Information security assessment detection method, system, device and medium based on privacy protection
Technical Field
The present invention relates to the field of information security, and in particular, to a method, a system, an apparatus, and a medium for information security assessment and detection based on privacy protection.
Background
Mobile phones have become an indispensable electronic product in daily life of people, but privacy security problems are more and more prominent when people use mobile phones, for example, in relatively closed and narrow spaces, such as elevators, when people call, because the environment space is small, conversation contents are easily heard by surrounding people, and if privacy problems are involved, there is a risk that privacy is generally revealed.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, a system, a device and a medium for information security assessment and detection based on privacy protection.
The information security assessment detection method based on privacy protection is applied to a mobile terminal, the mobile terminal comprises an acceleration sensor, a microphone, a receiver, an ambient light sensor and a processor, wherein the acceleration sensor and the microphone are connected with the processor, and the method comprises the following steps:
the mobile terminal receives the incoming call information reminding;
the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor;
If the mobile terminal is in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor, if the ambient light intensity is in a preset range, the processor evaluates that the mobile terminal is possibly in a sealed environment, and prompts a user to pay attention to a call environment through a display screen;
If the time of the incoming call information is a preset time period, the processor controls the microphone to receive surrounding environment sounds, if the noisy degree of the surrounding environment sounds exceeds a preset threshold value, the mobile terminal is assessed to have privacy leakage risk, and the user is reminded of the privacy leakage through a receiver;
the preset time period is user-defined working time and working time.
In some embodiments, the processor includes a voice storage unit and a voice recognition unit for extracting voice information from the voice storage unit and performing voice recognition;
After the user receives the incoming call information, the processor recognizes preset sensitive information through the voice recognition unit, and prompts the user to pay attention to call privacy through the earphone.
In some embodiments, the preset sensitive information includes information preset by a user.
In some embodiments, the predetermined information includes a sensitive word including "amount, money, phone number, identification card, time, contract, location".
In some embodiments, the processor automatically reduces the volume of the receiver after recognizing the preset sensitive information through the voice recognition unit, and sends a prompt for the user to answer the possible inconvenience of the user.
In some embodiments, after receiving the incoming call information, the mobile terminal includes:
And monitoring the signal intensity of the mobile terminal in real time, and judging whether the mobile terminal is in a weightlessness or overweight state by the acceleration sensor if the signal intensity of the mobile terminal is changed from a first intensity value to a second intensity value within a preset time period before the incoming call information and the first intensity value is larger than the second intensity value.
In some embodiments, when the difference between the first intensity value and the second intensity value is greater than a preset value, the processor determines, through the acceleration sensor, whether the mobile terminal is in a weightless or overweight state.
A system, comprising:
One or more processors;
A memory;
A plurality of applications;
And one or more computer programs, wherein the one or more computer programs are stored in the memory, the one or more computer programs comprising instructions, which when executed by the system, cause the system to perform the privacy protection based information security assessment detection method of any of claims 1-7.
A computer readable storage medium comprising instructions which, when run on a mobile terminal, cause the mobile terminal to perform the method.
The embodiment of the invention provides an information security assessment detection method based on privacy protection, which is applied to a mobile terminal. The mobile terminal comprises an acceleration sensor, a microphone, an earphone, an ambient light sensor and a processor, wherein the acceleration sensor and the microphone are connected with the processor. The method comprises the following steps:
In the step, when the mobile terminal vibrates or has a bell, the mobile terminal considers that the incoming call information exists.
And the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor. It will be appreciated that when a user takes a car elevator, there are typically two processes of acceleration and deceleration, in which acceleration is necessarily generated due to non-uniform motion. The user standing in the elevator will necessarily have the same acceleration. An acceleration sensor is generally provided in a mobile terminal, and thus a change in acceleration can be sensed by the acceleration sensor. The mobile terminal can be in a weightless or overweight state according to the measurement of the acceleration sensor. In some embodiments, when the acceleration measured by the acceleration sensor is greater than the preset acceleration value for a certain period of time, it may be determined preliminarily that the user may be located in the elevator.
If the mobile terminal is in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor, if the ambient light intensity is in a preset range, the processor evaluates that the mobile terminal is possibly in a sealed environment, and prompts a user to pay attention to a call environment through a display screen. When the mobile terminal is judged to be in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor. It will be appreciated that in a car elevator, the brightness of the ambient light will not be as bright as in the daytime or as dark as at night, so that a brightness range suitable for use in the elevator can be set according to the empirical value, and if the ambient light intensity is within the preset range, it can be further determined that the mobile terminal is likely to be in the elevator. At this time, before the user has not received the call, a prompt may appear on the display screen, for example, "please pay attention to the call environment before the call", etc., to help the user evaluate whether there is a risk of privacy disclosure.
And if the user answers the incoming call information, the processor controls the microphone to receive surrounding environment sounds, and if the noisy degree of the surrounding environment sounds exceeds a preset threshold, the mobile terminal is estimated to have privacy leakage risk, and the user is reminded of the privacy leakage through the earphone. If the user answers the incoming call information, the possibility that the user leaks the privacy information is increased, in this case, the processor controls the microphone to receive surrounding environment sounds, the surrounding environment sounds can reflect the environment where the user is located, if the noisy degree is higher, the surrounding people of the user can be reflected to a certain extent, the sounds of the two parties can be heard by other people during the conversation, in this case, the mobile terminal can be evaluated that the mobile terminal has the privacy leakage risk, and therefore the processor can send a prompt sound to the user through the receiver to remind the user of the privacy leakage.
The information security assessment detection method based on privacy protection provided by the embodiment of the invention can assess whether a user is likely to be in an elevator or not, and assess the information security problem of the user when the user is talking according to the judgment result. Therefore, the user can be reminded of paying attention to privacy protection, and the information security awareness of the user is improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of an information security evaluation and detection method based on privacy protection according to an embodiment of the present invention.
Fig. 2 is a block diagram of a mobile terminal in the privacy protection-based information security assessment and detection method according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1 and fig. 2, an embodiment of the present invention provides an information security assessment and detection method based on privacy protection, which is applied to a mobile terminal. The mobile terminal comprises an acceleration sensor, a microphone, an earphone, an ambient light sensor and a processor, wherein the acceleration sensor and the microphone are connected with the processor. The method comprises the following steps:
S10, the mobile terminal receives incoming call information;
In this step, when the mobile terminal vibrates or has a bell, it is considered that there is incoming call information.
And S20, the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor.
It will be appreciated that when a user takes a car elevator, there are typically two processes of acceleration and deceleration, in which acceleration is necessarily generated due to non-uniform motion. The user standing in the elevator will necessarily have the same acceleration. An acceleration sensor is generally provided in a mobile terminal, and thus a change in acceleration can be sensed by the acceleration sensor. The mobile terminal can be in a weightless or overweight state according to the measurement of the acceleration sensor. In some embodiments, when the acceleration measured by the acceleration sensor is greater than the preset acceleration value for a certain period of time, it may be determined preliminarily that the user may be located in the elevator.
And S30, if the mobile terminal is in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor, if the ambient light intensity is in a preset range, the processor evaluates that the mobile terminal is possibly in a sealed environment and prompts a user to pay attention to the call environment through a display screen.
When the mobile terminal is judged to be in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor. It will be appreciated that in a car elevator, the brightness of the ambient light will not be as bright as in the daytime or as dark as at night, so that a brightness range suitable for use in the elevator can be set according to the empirical value, and if the ambient light intensity is within the preset range, it can be further determined that the mobile terminal is likely to be in the elevator. At this time, before the user has not received the call, a prompt may appear on the display screen, for example, "please pay attention to the call environment before the call", etc., to help the user evaluate whether there is a risk of privacy disclosure.
And S40, if the user receives the incoming call information, the processor determines the time for receiving the incoming call information, if the time of the incoming call information is a preset time period, the processor controls the microphone to receive surrounding environment sounds, if the noisy degree of the surrounding environment sounds exceeds a preset threshold, the mobile terminal is evaluated to have privacy leakage risk, and the user is reminded of privacy leakage through the earphone.
If the user answers the incoming call information, the risk of the communication privacy leakage is possibly existed, and the processor determines the time of receiving the incoming call information. It should be noted that, for a business person working in an office building, it is usually concentrated on going to work in a certain period of time in the morning, for example, 8 to 9 points, or concentrated on going off work in a certain period of time, for example, 5 to 6 points. In the case of going to and from work, the elevators are generally crowded and are easy to meet among the colleagues, while in the case of going to and from work, the colleagues usually come together with going to and from work, so that the colleagues familiar with the elevators are a high probability event. It will be appreciated that colleagues often have problems of isolation or competition from each other in work, and thus conversation content associated with work is more sensitive between colleagues.
Therefore, if the time of the incoming call information is a preset time period, such as the time of the office work or the office work, or the time of the noon with the business trip to the upstairs and the meal, the content of calling by the elevator in the time period is easy to leak among colleagues, which means that the possibility of the user leaking the privacy information is increased. It can be appreciated that the user can set the preset time period by himself or by machine learning to identify the working habit of the user. In this case, the processor controls the microphone to receive ambient sounds, the ambient sounds can reflect the environment where the user is located, when the colleagues meet in the elevator, the colleagues generally chat and call, so that the degree of the noise is higher, and the sounds of the two parties can be heard by other people to a certain extent, in this case, the mobile terminal can be estimated to have a privacy leakage risk, and therefore the processor can send a prompt tone to the user through the earphone to remind the user of the privacy leakage.
The information security assessment detection method based on privacy protection provided by the embodiment of the invention can assess whether a user is likely to be in an elevator or not, and assess the information security problem of the user when the user is talking according to the judgment result. Therefore, the user can be reminded of paying attention to privacy protection, and the information security awareness of the user is improved.
It can be understood that the information security evaluation detection method based on privacy protection can be used as a function for users to set whether to open or not in the mobile terminal so as to be applicable to different users.
In some embodiments, the processor includes a voice storage unit and a voice recognition unit for extracting voice information from the voice storage unit and performing voice recognition;
After the user receives the incoming call information, the processor recognizes preset sensitive information through the voice recognition unit, and prompts the user to pay attention to call privacy through the earphone. That is, when a user calls, particularly in a sealed environment such as an elevator, if the call content relates to information with high privacy or safety, and the user does not pay attention to the information, the mobile terminal can prompt the user through machine voice so that the user can pay attention to the call content and stop damage in time.
In some embodiments, the preset sensitive information includes information preset by a user. That is, the user can select the frequently-used sensitive vocabulary in the setting options of the mobile terminal, and the user can also customize the sensitive vocabulary. In some embodiments, the sensitive words include "amount, money, phone number, identification card, time, contract, place," and the like.
In some embodiments, the processor automatically reduces the volume of the receiver after recognizing the preset sensitive information through the voice recognition unit, and sends a prompt for the user to answer the possible inconvenience of the user. That is, if sensitive words are involved, by automatically lowering the earpiece volume, others around can be prevented from hearing. In addition, some sensitive question users may not be convenient to answer, in which case the incoming user may be prompted by machine voice, so that the incoming user can understand that the user may not answer at the moment, and misunderstanding of the incoming user is avoided.
In some embodiments, after the mobile terminal receives the incoming call information, monitoring signal intensity of the mobile terminal in real time, and if the signal intensity of the mobile terminal changes from a first intensity value to a second intensity value within a preset time period before the incoming call information, and the first intensity value is greater than the second intensity value, the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor. In general, if a user enters an elevator, since a car elevator has a certain shielding function, a signal is usually not too good, so that the signal of the user is weakened, and by determining that the signal strength of the mobile terminal changes from a first strength value to a second strength value within a preset time period before the incoming call information, the first strength value is greater than the second strength value, the method can be used as an important precondition factor for judging whether the user enters the car elevator.
In some embodiments, when the difference between the first intensity value and the second intensity value is greater than a preset value, the processor determines, through the acceleration sensor, whether the mobile terminal is in a weightless or overweight state. That is, when the difference between the first intensity value and the second intensity value is larger, the judgment of the weightlessness and overweight by the acceleration sensor is started, so that the judgment accuracy is further improved.
The embodiment of the invention also provides a system comprising one or more processors, a memory, a plurality of application programs and one or more computer programs. Wherein the one or more computer programs are stored in the memory, the one or more computer programs comprising instructions, which when executed by the system, cause the system to perform the privacy protection based information security assessment detection method.
The embodiment of the invention also provides a computer readable storage medium, which comprises instructions, when the instructions run on the mobile terminal, the mobile terminal is caused to execute the information security assessment detection method based on privacy protection.
It will be appreciated that the above-described terminal, etc. may comprise hardware structures and/or software modules that perform the respective functions in order to achieve the above-described functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the embodiments of the present invention.
The embodiment of the present invention may divide the functional modules of the electronic device 100 or the like according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated modules may be implemented in hardware or in software functional modules. It should be noted that, in the embodiment of the present invention, the division of the modules is schematic, which is merely a logic function division, and other division manners may be implemented in actual implementation. The following description will take the case of dividing each functional module into corresponding functions as an example:
The method provided by the embodiment of the invention can be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a network device, a terminal, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., digital video disc (digital video disc, DVD)), or a semiconductor medium (e.g., SSD), etc.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present invention, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The foregoing is merely a specific implementation of the present invention, but the scope of the embodiments of the present invention is not limited thereto, and any person skilled in the art may easily think of changes or substitutions within the technical scope of the embodiments of the present invention, and should be covered by the scope of the embodiments of the present invention. Therefore, the protection scope of the embodiments of the present invention shall be subject to the protection scope of the claims.

Claims (9)

1. The information security assessment detection method based on privacy protection is applied to a mobile terminal, and the mobile terminal comprises an acceleration sensor, a microphone, a receiver, an ambient light sensor and a processor, wherein the acceleration sensor and the microphone are connected with the processor, and the method is characterized by comprising the following steps:
the mobile terminal receives incoming call information;
the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor;
If the mobile terminal is in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor, if the ambient light intensity is in a preset range, the processor evaluates that the mobile terminal is possibly in a sealed environment, and prompts a user to pay attention to a call environment through a display screen;
If the user answers the incoming call information, the processor determines the time of receiving the incoming call information;
if the time of the incoming call information is a preset time period, the processor controls the microphone to receive surrounding environment sounds, and if the noisy degree of the surrounding environment sounds exceeds a preset threshold, the mobile terminal is estimated to have privacy leakage risk, and a receiver is used for reminding a user of the privacy leakage;
the preset time period is user-defined working time and working time.
2. The privacy-based information security assessment detection method according to claim 1, wherein the processor includes a voice storage unit and a voice recognition unit for extracting voice information from the voice storage unit and performing voice recognition;
After the user receives the incoming call information, the processor recognizes preset sensitive information through the voice recognition unit, and prompts the user to pay attention to call privacy through the earphone.
3. The privacy-based information security assessment detection method according to claim 2, wherein the preset sensitive information includes information preset by a user.
4. The privacy-based information security assessment detection method according to claim 3, wherein the predetermined information includes a sensitive vocabulary including "amount, money, phone number, identification card, time, contract, place".
5. The method for detecting information security assessment based on privacy protection as claimed in claim 4, wherein the processor automatically reduces the volume of the receiver after recognizing the preset sensitive information through the voice recognition unit, and sends a prompt for a user to answer the possible inconvenience of the user.
6. The privacy protection-based information security assessment detection method according to claim 5, wherein after receiving incoming call information, the mobile terminal comprises:
And monitoring the signal intensity of the mobile terminal in real time, and judging whether the mobile terminal is in a weightlessness or overweight state by the acceleration sensor if the signal intensity of the mobile terminal is changed from a first intensity value to a second intensity value within a preset time period before the incoming call information and the first intensity value is larger than the second intensity value.
7. The privacy protection-based information security assessment detection method as set forth in claim 6, wherein the processor determines whether the mobile terminal is in a weightless or overweight state through the acceleration sensor when a difference between the first intensity value and the second intensity value is greater than a preset value.
8. A system, comprising:
One or more processors;
A memory;
A plurality of applications;
And one or more computer programs, wherein the one or more computer programs are stored in the memory, the one or more computer programs comprising instructions, which when executed by the system, cause the system to perform the privacy protection based information security assessment detection method of any of claims 1-7.
9. A computer readable storage medium comprising instructions which, when run on a mobile terminal, cause the mobile terminal to perform the method of any of claims 1-7.
CN202310585584.2A 2023-05-23 2023-05-23 Information security assessment detection method, system, device and medium based on privacy protection Active CN116567698B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310585584.2A CN116567698B (en) 2023-05-23 2023-05-23 Information security assessment detection method, system, device and medium based on privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310585584.2A CN116567698B (en) 2023-05-23 2023-05-23 Information security assessment detection method, system, device and medium based on privacy protection

Publications (2)

Publication Number Publication Date
CN116567698A CN116567698A (en) 2023-08-08
CN116567698B true CN116567698B (en) 2025-02-18

Family

ID=87499931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310585584.2A Active CN116567698B (en) 2023-05-23 2023-05-23 Information security assessment detection method, system, device and medium based on privacy protection

Country Status (1)

Country Link
CN (1) CN116567698B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413442A (en) * 2011-11-10 2012-04-11 惠州Tcl移动通信有限公司 Method for preventing loss of mobile phone and mobile phone
CN109689554A (en) * 2016-09-15 2019-04-26 三菱电机株式会社 Elevator system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106557711B (en) * 2016-11-04 2018-07-24 深圳大学 The screen privacy guard method of mobile terminal device and system
US10685127B2 (en) * 2018-01-08 2020-06-16 International Business Machines Corporation Cognitive widgets and UI components for preserving privacy and security
CN110290262B (en) * 2019-06-14 2020-12-01 华为技术有限公司 Call method and terminal equipment
CN110921447A (en) * 2019-12-25 2020-03-27 杭州西奥电梯有限公司 Elevator arrival reminding method and system, computer equipment and readable storage medium
CN114501586A (en) * 2020-10-23 2022-05-13 中兴通讯股份有限公司 A terminal network searching method, terminal and readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413442A (en) * 2011-11-10 2012-04-11 惠州Tcl移动通信有限公司 Method for preventing loss of mobile phone and mobile phone
CN109689554A (en) * 2016-09-15 2019-04-26 三菱电机株式会社 Elevator system

Also Published As

Publication number Publication date
CN116567698A (en) 2023-08-08

Similar Documents

Publication Publication Date Title
US8451995B2 (en) User status management in a voice calling architecture
US8295448B2 (en) Communication system and method
CN109982228B (en) Microphone fault detection method and mobile terminal
RU2735363C1 (en) Method and device for sound processing and data medium
CN109688273B (en) Reminding method, reminding device, terminal and storage medium
KR101431596B1 (en) Apparatus and method for preventing voice phishing and user terminal for the same
CN108712561A (en) Rights management method, device, mobile terminal and storage medium
US20140273987A1 (en) Challenge Response System to Detect Automated Communications
CN105072280A (en) Processing method and system for mobile terminal to automatically hang up
CN108632460A (en) Rights management method, device, mobile terminal and storage medium
CN108763892A (en) Authority management method, device, mobile terminal and storage medium
CN106973163A (en) The dynamic calibration method and its device of a kind of infrared proximity transducer
CN106161749A (en) A kind of malicious call recognition methods, and device
US9628612B2 (en) Mobile phone call handling
CN109104525A (en) Control method, system, equipment and the storage medium of smart machine
CN107846516A (en) One kind call scene reminding method and mobile terminal
CN107995373A (en) A kind of method, mobile terminal and storage medium for being used to handle call request
CN108769366A (en) Right management method, device, mobile terminal and storage medium
CN116567698B (en) Information security assessment detection method, system, device and medium based on privacy protection
CN108769364B (en) Call control method, device, mobile terminal and computer readable medium
CN109561214B (en) Call processing method and mobile terminal
CN108683805B (en) Incoming call processing method, mobile terminal and computer readable storage medium
CN107154996B (en) Incoming call interception method and device, storage medium and terminal
US9819773B2 (en) Transmission of data pertaining to use of speaker phone function and people present during telephonic communication
CN105245732A (en) Handover method and device for terminal equipment and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20250113

Address after: Room 328, 1157 Hongqiao Road, Changning District, Shanghai 200051

Applicant after: Shanghai Aiweirui Enterprise Management Co.,Ltd.

Country or region after: China

Address before: Room 3504, Building 2, Ginza Center, No. 22799 Jingshi Road, Huaiyin District, Jinan City, Shandong Province, 250000

Applicant before: Shandong Chuangying Technology Information Co.,Ltd.

Country or region before: China

GR01 Patent grant
GR01 Patent grant