CN116567698B - Information security assessment detection method, system, device and medium based on privacy protection - Google Patents
Information security assessment detection method, system, device and medium based on privacy protection Download PDFInfo
- Publication number
- CN116567698B CN116567698B CN202310585584.2A CN202310585584A CN116567698B CN 116567698 B CN116567698 B CN 116567698B CN 202310585584 A CN202310585584 A CN 202310585584A CN 116567698 B CN116567698 B CN 116567698B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- user
- processor
- information
- privacy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 23
- 230000001133 acceleration Effects 0.000 claims abstract description 40
- 238000000034 method Methods 0.000 claims abstract description 19
- 238000004590 computer program Methods 0.000 claims description 11
- 238000012544 monitoring process Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 235000012054 meals Nutrition 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to an information security assessment detection method, system, device and medium based on privacy protection, wherein the method comprises the steps that the mobile terminal receives incoming call information, the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor, if the mobile terminal is in the weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor, if the ambient light intensity is in a preset range, the mobile terminal is assessed to be possibly in a sealed environment and prompts a user to pay attention to a call environment through a display screen, if the incoming call information is received by the user, the processor controls the microphone to receive ambient environment sounds, and if the noisy degree of the ambient environment sounds exceeds a preset threshold, the processor assesses that the mobile terminal has privacy leakage risk and reminds the user of privacy leakage through a receiver.
Description
Technical Field
The present invention relates to the field of information security, and in particular, to a method, a system, an apparatus, and a medium for information security assessment and detection based on privacy protection.
Background
Mobile phones have become an indispensable electronic product in daily life of people, but privacy security problems are more and more prominent when people use mobile phones, for example, in relatively closed and narrow spaces, such as elevators, when people call, because the environment space is small, conversation contents are easily heard by surrounding people, and if privacy problems are involved, there is a risk that privacy is generally revealed.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, a system, a device and a medium for information security assessment and detection based on privacy protection.
The information security assessment detection method based on privacy protection is applied to a mobile terminal, the mobile terminal comprises an acceleration sensor, a microphone, a receiver, an ambient light sensor and a processor, wherein the acceleration sensor and the microphone are connected with the processor, and the method comprises the following steps:
the mobile terminal receives the incoming call information reminding;
the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor;
If the mobile terminal is in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor, if the ambient light intensity is in a preset range, the processor evaluates that the mobile terminal is possibly in a sealed environment, and prompts a user to pay attention to a call environment through a display screen;
If the time of the incoming call information is a preset time period, the processor controls the microphone to receive surrounding environment sounds, if the noisy degree of the surrounding environment sounds exceeds a preset threshold value, the mobile terminal is assessed to have privacy leakage risk, and the user is reminded of the privacy leakage through a receiver;
the preset time period is user-defined working time and working time.
In some embodiments, the processor includes a voice storage unit and a voice recognition unit for extracting voice information from the voice storage unit and performing voice recognition;
After the user receives the incoming call information, the processor recognizes preset sensitive information through the voice recognition unit, and prompts the user to pay attention to call privacy through the earphone.
In some embodiments, the preset sensitive information includes information preset by a user.
In some embodiments, the predetermined information includes a sensitive word including "amount, money, phone number, identification card, time, contract, location".
In some embodiments, the processor automatically reduces the volume of the receiver after recognizing the preset sensitive information through the voice recognition unit, and sends a prompt for the user to answer the possible inconvenience of the user.
In some embodiments, after receiving the incoming call information, the mobile terminal includes:
And monitoring the signal intensity of the mobile terminal in real time, and judging whether the mobile terminal is in a weightlessness or overweight state by the acceleration sensor if the signal intensity of the mobile terminal is changed from a first intensity value to a second intensity value within a preset time period before the incoming call information and the first intensity value is larger than the second intensity value.
In some embodiments, when the difference between the first intensity value and the second intensity value is greater than a preset value, the processor determines, through the acceleration sensor, whether the mobile terminal is in a weightless or overweight state.
A system, comprising:
One or more processors;
A memory;
A plurality of applications;
And one or more computer programs, wherein the one or more computer programs are stored in the memory, the one or more computer programs comprising instructions, which when executed by the system, cause the system to perform the privacy protection based information security assessment detection method of any of claims 1-7.
A computer readable storage medium comprising instructions which, when run on a mobile terminal, cause the mobile terminal to perform the method.
The embodiment of the invention provides an information security assessment detection method based on privacy protection, which is applied to a mobile terminal. The mobile terminal comprises an acceleration sensor, a microphone, an earphone, an ambient light sensor and a processor, wherein the acceleration sensor and the microphone are connected with the processor. The method comprises the following steps:
In the step, when the mobile terminal vibrates or has a bell, the mobile terminal considers that the incoming call information exists.
And the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor. It will be appreciated that when a user takes a car elevator, there are typically two processes of acceleration and deceleration, in which acceleration is necessarily generated due to non-uniform motion. The user standing in the elevator will necessarily have the same acceleration. An acceleration sensor is generally provided in a mobile terminal, and thus a change in acceleration can be sensed by the acceleration sensor. The mobile terminal can be in a weightless or overweight state according to the measurement of the acceleration sensor. In some embodiments, when the acceleration measured by the acceleration sensor is greater than the preset acceleration value for a certain period of time, it may be determined preliminarily that the user may be located in the elevator.
If the mobile terminal is in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor, if the ambient light intensity is in a preset range, the processor evaluates that the mobile terminal is possibly in a sealed environment, and prompts a user to pay attention to a call environment through a display screen. When the mobile terminal is judged to be in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor. It will be appreciated that in a car elevator, the brightness of the ambient light will not be as bright as in the daytime or as dark as at night, so that a brightness range suitable for use in the elevator can be set according to the empirical value, and if the ambient light intensity is within the preset range, it can be further determined that the mobile terminal is likely to be in the elevator. At this time, before the user has not received the call, a prompt may appear on the display screen, for example, "please pay attention to the call environment before the call", etc., to help the user evaluate whether there is a risk of privacy disclosure.
And if the user answers the incoming call information, the processor controls the microphone to receive surrounding environment sounds, and if the noisy degree of the surrounding environment sounds exceeds a preset threshold, the mobile terminal is estimated to have privacy leakage risk, and the user is reminded of the privacy leakage through the earphone. If the user answers the incoming call information, the possibility that the user leaks the privacy information is increased, in this case, the processor controls the microphone to receive surrounding environment sounds, the surrounding environment sounds can reflect the environment where the user is located, if the noisy degree is higher, the surrounding people of the user can be reflected to a certain extent, the sounds of the two parties can be heard by other people during the conversation, in this case, the mobile terminal can be evaluated that the mobile terminal has the privacy leakage risk, and therefore the processor can send a prompt sound to the user through the receiver to remind the user of the privacy leakage.
The information security assessment detection method based on privacy protection provided by the embodiment of the invention can assess whether a user is likely to be in an elevator or not, and assess the information security problem of the user when the user is talking according to the judgment result. Therefore, the user can be reminded of paying attention to privacy protection, and the information security awareness of the user is improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of an information security evaluation and detection method based on privacy protection according to an embodiment of the present invention.
Fig. 2 is a block diagram of a mobile terminal in the privacy protection-based information security assessment and detection method according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1 and fig. 2, an embodiment of the present invention provides an information security assessment and detection method based on privacy protection, which is applied to a mobile terminal. The mobile terminal comprises an acceleration sensor, a microphone, an earphone, an ambient light sensor and a processor, wherein the acceleration sensor and the microphone are connected with the processor. The method comprises the following steps:
S10, the mobile terminal receives incoming call information;
In this step, when the mobile terminal vibrates or has a bell, it is considered that there is incoming call information.
And S20, the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor.
It will be appreciated that when a user takes a car elevator, there are typically two processes of acceleration and deceleration, in which acceleration is necessarily generated due to non-uniform motion. The user standing in the elevator will necessarily have the same acceleration. An acceleration sensor is generally provided in a mobile terminal, and thus a change in acceleration can be sensed by the acceleration sensor. The mobile terminal can be in a weightless or overweight state according to the measurement of the acceleration sensor. In some embodiments, when the acceleration measured by the acceleration sensor is greater than the preset acceleration value for a certain period of time, it may be determined preliminarily that the user may be located in the elevator.
And S30, if the mobile terminal is in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor, if the ambient light intensity is in a preset range, the processor evaluates that the mobile terminal is possibly in a sealed environment and prompts a user to pay attention to the call environment through a display screen.
When the mobile terminal is judged to be in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor. It will be appreciated that in a car elevator, the brightness of the ambient light will not be as bright as in the daytime or as dark as at night, so that a brightness range suitable for use in the elevator can be set according to the empirical value, and if the ambient light intensity is within the preset range, it can be further determined that the mobile terminal is likely to be in the elevator. At this time, before the user has not received the call, a prompt may appear on the display screen, for example, "please pay attention to the call environment before the call", etc., to help the user evaluate whether there is a risk of privacy disclosure.
And S40, if the user receives the incoming call information, the processor determines the time for receiving the incoming call information, if the time of the incoming call information is a preset time period, the processor controls the microphone to receive surrounding environment sounds, if the noisy degree of the surrounding environment sounds exceeds a preset threshold, the mobile terminal is evaluated to have privacy leakage risk, and the user is reminded of privacy leakage through the earphone.
If the user answers the incoming call information, the risk of the communication privacy leakage is possibly existed, and the processor determines the time of receiving the incoming call information. It should be noted that, for a business person working in an office building, it is usually concentrated on going to work in a certain period of time in the morning, for example, 8 to 9 points, or concentrated on going off work in a certain period of time, for example, 5 to 6 points. In the case of going to and from work, the elevators are generally crowded and are easy to meet among the colleagues, while in the case of going to and from work, the colleagues usually come together with going to and from work, so that the colleagues familiar with the elevators are a high probability event. It will be appreciated that colleagues often have problems of isolation or competition from each other in work, and thus conversation content associated with work is more sensitive between colleagues.
Therefore, if the time of the incoming call information is a preset time period, such as the time of the office work or the office work, or the time of the noon with the business trip to the upstairs and the meal, the content of calling by the elevator in the time period is easy to leak among colleagues, which means that the possibility of the user leaking the privacy information is increased. It can be appreciated that the user can set the preset time period by himself or by machine learning to identify the working habit of the user. In this case, the processor controls the microphone to receive ambient sounds, the ambient sounds can reflect the environment where the user is located, when the colleagues meet in the elevator, the colleagues generally chat and call, so that the degree of the noise is higher, and the sounds of the two parties can be heard by other people to a certain extent, in this case, the mobile terminal can be estimated to have a privacy leakage risk, and therefore the processor can send a prompt tone to the user through the earphone to remind the user of the privacy leakage.
The information security assessment detection method based on privacy protection provided by the embodiment of the invention can assess whether a user is likely to be in an elevator or not, and assess the information security problem of the user when the user is talking according to the judgment result. Therefore, the user can be reminded of paying attention to privacy protection, and the information security awareness of the user is improved.
It can be understood that the information security evaluation detection method based on privacy protection can be used as a function for users to set whether to open or not in the mobile terminal so as to be applicable to different users.
In some embodiments, the processor includes a voice storage unit and a voice recognition unit for extracting voice information from the voice storage unit and performing voice recognition;
After the user receives the incoming call information, the processor recognizes preset sensitive information through the voice recognition unit, and prompts the user to pay attention to call privacy through the earphone. That is, when a user calls, particularly in a sealed environment such as an elevator, if the call content relates to information with high privacy or safety, and the user does not pay attention to the information, the mobile terminal can prompt the user through machine voice so that the user can pay attention to the call content and stop damage in time.
In some embodiments, the preset sensitive information includes information preset by a user. That is, the user can select the frequently-used sensitive vocabulary in the setting options of the mobile terminal, and the user can also customize the sensitive vocabulary. In some embodiments, the sensitive words include "amount, money, phone number, identification card, time, contract, place," and the like.
In some embodiments, the processor automatically reduces the volume of the receiver after recognizing the preset sensitive information through the voice recognition unit, and sends a prompt for the user to answer the possible inconvenience of the user. That is, if sensitive words are involved, by automatically lowering the earpiece volume, others around can be prevented from hearing. In addition, some sensitive question users may not be convenient to answer, in which case the incoming user may be prompted by machine voice, so that the incoming user can understand that the user may not answer at the moment, and misunderstanding of the incoming user is avoided.
In some embodiments, after the mobile terminal receives the incoming call information, monitoring signal intensity of the mobile terminal in real time, and if the signal intensity of the mobile terminal changes from a first intensity value to a second intensity value within a preset time period before the incoming call information, and the first intensity value is greater than the second intensity value, the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor. In general, if a user enters an elevator, since a car elevator has a certain shielding function, a signal is usually not too good, so that the signal of the user is weakened, and by determining that the signal strength of the mobile terminal changes from a first strength value to a second strength value within a preset time period before the incoming call information, the first strength value is greater than the second strength value, the method can be used as an important precondition factor for judging whether the user enters the car elevator.
In some embodiments, when the difference between the first intensity value and the second intensity value is greater than a preset value, the processor determines, through the acceleration sensor, whether the mobile terminal is in a weightless or overweight state. That is, when the difference between the first intensity value and the second intensity value is larger, the judgment of the weightlessness and overweight by the acceleration sensor is started, so that the judgment accuracy is further improved.
The embodiment of the invention also provides a system comprising one or more processors, a memory, a plurality of application programs and one or more computer programs. Wherein the one or more computer programs are stored in the memory, the one or more computer programs comprising instructions, which when executed by the system, cause the system to perform the privacy protection based information security assessment detection method.
The embodiment of the invention also provides a computer readable storage medium, which comprises instructions, when the instructions run on the mobile terminal, the mobile terminal is caused to execute the information security assessment detection method based on privacy protection.
It will be appreciated that the above-described terminal, etc. may comprise hardware structures and/or software modules that perform the respective functions in order to achieve the above-described functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the embodiments of the present invention.
The embodiment of the present invention may divide the functional modules of the electronic device 100 or the like according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated modules may be implemented in hardware or in software functional modules. It should be noted that, in the embodiment of the present invention, the division of the modules is schematic, which is merely a logic function division, and other division manners may be implemented in actual implementation. The following description will take the case of dividing each functional module into corresponding functions as an example:
The method provided by the embodiment of the invention can be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a network device, a terminal, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., digital video disc (digital video disc, DVD)), or a semiconductor medium (e.g., SSD), etc.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present invention, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The foregoing is merely a specific implementation of the present invention, but the scope of the embodiments of the present invention is not limited thereto, and any person skilled in the art may easily think of changes or substitutions within the technical scope of the embodiments of the present invention, and should be covered by the scope of the embodiments of the present invention. Therefore, the protection scope of the embodiments of the present invention shall be subject to the protection scope of the claims.
Claims (9)
1. The information security assessment detection method based on privacy protection is applied to a mobile terminal, and the mobile terminal comprises an acceleration sensor, a microphone, a receiver, an ambient light sensor and a processor, wherein the acceleration sensor and the microphone are connected with the processor, and the method is characterized by comprising the following steps:
the mobile terminal receives incoming call information;
the processor judges whether the mobile terminal is in a weightless or overweight state through the acceleration sensor;
If the mobile terminal is in a weightless or overweight state, the processor further judges the ambient light intensity of the mobile terminal through the ambient light sensor, if the ambient light intensity is in a preset range, the processor evaluates that the mobile terminal is possibly in a sealed environment, and prompts a user to pay attention to a call environment through a display screen;
If the user answers the incoming call information, the processor determines the time of receiving the incoming call information;
if the time of the incoming call information is a preset time period, the processor controls the microphone to receive surrounding environment sounds, and if the noisy degree of the surrounding environment sounds exceeds a preset threshold, the mobile terminal is estimated to have privacy leakage risk, and a receiver is used for reminding a user of the privacy leakage;
the preset time period is user-defined working time and working time.
2. The privacy-based information security assessment detection method according to claim 1, wherein the processor includes a voice storage unit and a voice recognition unit for extracting voice information from the voice storage unit and performing voice recognition;
After the user receives the incoming call information, the processor recognizes preset sensitive information through the voice recognition unit, and prompts the user to pay attention to call privacy through the earphone.
3. The privacy-based information security assessment detection method according to claim 2, wherein the preset sensitive information includes information preset by a user.
4. The privacy-based information security assessment detection method according to claim 3, wherein the predetermined information includes a sensitive vocabulary including "amount, money, phone number, identification card, time, contract, place".
5. The method for detecting information security assessment based on privacy protection as claimed in claim 4, wherein the processor automatically reduces the volume of the receiver after recognizing the preset sensitive information through the voice recognition unit, and sends a prompt for a user to answer the possible inconvenience of the user.
6. The privacy protection-based information security assessment detection method according to claim 5, wherein after receiving incoming call information, the mobile terminal comprises:
And monitoring the signal intensity of the mobile terminal in real time, and judging whether the mobile terminal is in a weightlessness or overweight state by the acceleration sensor if the signal intensity of the mobile terminal is changed from a first intensity value to a second intensity value within a preset time period before the incoming call information and the first intensity value is larger than the second intensity value.
7. The privacy protection-based information security assessment detection method as set forth in claim 6, wherein the processor determines whether the mobile terminal is in a weightless or overweight state through the acceleration sensor when a difference between the first intensity value and the second intensity value is greater than a preset value.
8. A system, comprising:
One or more processors;
A memory;
A plurality of applications;
And one or more computer programs, wherein the one or more computer programs are stored in the memory, the one or more computer programs comprising instructions, which when executed by the system, cause the system to perform the privacy protection based information security assessment detection method of any of claims 1-7.
9. A computer readable storage medium comprising instructions which, when run on a mobile terminal, cause the mobile terminal to perform the method of any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310585584.2A CN116567698B (en) | 2023-05-23 | 2023-05-23 | Information security assessment detection method, system, device and medium based on privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310585584.2A CN116567698B (en) | 2023-05-23 | 2023-05-23 | Information security assessment detection method, system, device and medium based on privacy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116567698A CN116567698A (en) | 2023-08-08 |
CN116567698B true CN116567698B (en) | 2025-02-18 |
Family
ID=87499931
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310585584.2A Active CN116567698B (en) | 2023-05-23 | 2023-05-23 | Information security assessment detection method, system, device and medium based on privacy protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116567698B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413442A (en) * | 2011-11-10 | 2012-04-11 | 惠州Tcl移动通信有限公司 | Method for preventing loss of mobile phone and mobile phone |
CN109689554A (en) * | 2016-09-15 | 2019-04-26 | 三菱电机株式会社 | Elevator system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106557711B (en) * | 2016-11-04 | 2018-07-24 | 深圳大学 | The screen privacy guard method of mobile terminal device and system |
US10685127B2 (en) * | 2018-01-08 | 2020-06-16 | International Business Machines Corporation | Cognitive widgets and UI components for preserving privacy and security |
CN110290262B (en) * | 2019-06-14 | 2020-12-01 | 华为技术有限公司 | Call method and terminal equipment |
CN110921447A (en) * | 2019-12-25 | 2020-03-27 | 杭州西奥电梯有限公司 | Elevator arrival reminding method and system, computer equipment and readable storage medium |
CN114501586A (en) * | 2020-10-23 | 2022-05-13 | 中兴通讯股份有限公司 | A terminal network searching method, terminal and readable storage medium |
-
2023
- 2023-05-23 CN CN202310585584.2A patent/CN116567698B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413442A (en) * | 2011-11-10 | 2012-04-11 | 惠州Tcl移动通信有限公司 | Method for preventing loss of mobile phone and mobile phone |
CN109689554A (en) * | 2016-09-15 | 2019-04-26 | 三菱电机株式会社 | Elevator system |
Also Published As
Publication number | Publication date |
---|---|
CN116567698A (en) | 2023-08-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8451995B2 (en) | User status management in a voice calling architecture | |
US8295448B2 (en) | Communication system and method | |
CN109982228B (en) | Microphone fault detection method and mobile terminal | |
RU2735363C1 (en) | Method and device for sound processing and data medium | |
CN109688273B (en) | Reminding method, reminding device, terminal and storage medium | |
KR101431596B1 (en) | Apparatus and method for preventing voice phishing and user terminal for the same | |
CN108712561A (en) | Rights management method, device, mobile terminal and storage medium | |
US20140273987A1 (en) | Challenge Response System to Detect Automated Communications | |
CN105072280A (en) | Processing method and system for mobile terminal to automatically hang up | |
CN108632460A (en) | Rights management method, device, mobile terminal and storage medium | |
CN108763892A (en) | Authority management method, device, mobile terminal and storage medium | |
CN106973163A (en) | The dynamic calibration method and its device of a kind of infrared proximity transducer | |
CN106161749A (en) | A kind of malicious call recognition methods, and device | |
US9628612B2 (en) | Mobile phone call handling | |
CN109104525A (en) | Control method, system, equipment and the storage medium of smart machine | |
CN107846516A (en) | One kind call scene reminding method and mobile terminal | |
CN107995373A (en) | A kind of method, mobile terminal and storage medium for being used to handle call request | |
CN108769366A (en) | Right management method, device, mobile terminal and storage medium | |
CN116567698B (en) | Information security assessment detection method, system, device and medium based on privacy protection | |
CN108769364B (en) | Call control method, device, mobile terminal and computer readable medium | |
CN109561214B (en) | Call processing method and mobile terminal | |
CN108683805B (en) | Incoming call processing method, mobile terminal and computer readable storage medium | |
CN107154996B (en) | Incoming call interception method and device, storage medium and terminal | |
US9819773B2 (en) | Transmission of data pertaining to use of speaker phone function and people present during telephonic communication | |
CN105245732A (en) | Handover method and device for terminal equipment and terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20250113 Address after: Room 328, 1157 Hongqiao Road, Changning District, Shanghai 200051 Applicant after: Shanghai Aiweirui Enterprise Management Co.,Ltd. Country or region after: China Address before: Room 3504, Building 2, Ginza Center, No. 22799 Jingshi Road, Huaiyin District, Jinan City, Shandong Province, 250000 Applicant before: Shandong Chuangying Technology Information Co.,Ltd. Country or region before: China |
|
GR01 | Patent grant | ||
GR01 | Patent grant |