Nothing Special   »   [go: up one dir, main page]

CN105630854B - Data searching method, data searching device and terminal - Google Patents

Data searching method, data searching device and terminal Download PDF

Info

Publication number
CN105630854B
CN105630854B CN201510044118.9A CN201510044118A CN105630854B CN 105630854 B CN105630854 B CN 105630854B CN 201510044118 A CN201510044118 A CN 201510044118A CN 105630854 B CN105630854 B CN 105630854B
Authority
CN
China
Prior art keywords
data
virtual
keyword
real data
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510044118.9A
Other languages
Chinese (zh)
Other versions
CN105630854A (en
Inventor
陈春霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510044118.9A priority Critical patent/CN105630854B/en
Publication of CN105630854A publication Critical patent/CN105630854A/en
Application granted granted Critical
Publication of CN105630854B publication Critical patent/CN105630854B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data search method, a data search device and a terminal, wherein the method comprises the following steps: when a first application program in a terminal requests to acquire real data in a second application program, judging whether the first application program is allowed to acquire the real data prestored in a first preset database; if not, searching virtual data corresponding to the real data in the first preset database according to a received search command so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command. By the technical scheme, the application program can obtain the virtual data corresponding to the real data, so that the real data can be protected to the maximum extent while the application program can normally run, the real data is prevented from being leaked due to the fact that the real data is obtained by the application program, and the safety of the terminal is improved.

Description

Data searching method, data searching device and terminal
Technical Field
The present invention relates to the field of terminal technologies, and in particular, to a data search method, a data search apparatus, and a terminal.
Background
At present, in the related technical solutions, an application program in a terminal sends a request for acquiring real data when running, and queries whether the application program is allowed to acquire the real data, and if so, the application program can normally acquire the real data in the terminal; if not, the application program can not acquire the real data in the terminal.
However, some applications actively acquire real data and upload the real data to a server of the terminal without permission during running, so that the real data of the user is leaked, and unnecessary loss and trouble are caused to the user of the terminal.
Therefore, when the application program in the terminal is running, how to avoid the real data from being obtained and leaked by the application program becomes an urgent problem to be solved.
Disclosure of Invention
The present invention is based on the above problems, and provides a new technical solution, in which virtual data is substituted for real data, so that virtual data (i.e. dummy data) corresponding to the real data is obtained by an application program, and thus, the application program can operate normally according to the virtual data, and simultaneously, the real data can be protected to the greatest extent, and the real data is prevented from being obtained and leaked by the application program, thereby improving the security of the terminal.
In view of the above, an aspect of the present invention provides a data searching method, including: when a first application program in a terminal requests to acquire real data in a second application program, judging whether the first application program is allowed to acquire the real data prestored in a first preset database; if not, searching virtual data corresponding to the real data in the first preset database according to a received search command so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command.
In the technical scheme, when a first application program in a terminal requests to acquire real data in a second application program during running, whether the first application program is allowed to acquire the pre-stored real data in a first preset database is judged, when the first application program is not allowed to acquire the real data, namely the first application program is not authorized to acquire the real data, virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the first application program can normally run according to the virtual data, the real data can be protected to the maximum extent, the real data is prevented from being acquired by the first application program and being leaked, and therefore the safety of the terminal is improved, and in addition, if the first application program is allowed to acquire the real data, the real data is searched in the first preset database, the real data is sent directly to the first application.
In the foregoing technical solution, preferably, the searching for the virtual data corresponding to the real data in the first preset database specifically includes: acquiring at least one keyword in the real data according to the received acquisition instruction; searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword; sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
In the technical scheme, searching virtual data corresponding to real data in a preset database specifically comprises: at least one keyword such as time information, place information, character information, event information and the like in real data is firstly obtained, a first preset database corresponding to the data type of each keyword in the at least one keyword is searched for a virtual word corresponding to each keyword, then each keyword is sequentially replaced by the virtual words, so that the virtual data corresponding to the real data is obtained from the real data, and therefore the virtual data can achieve the effect of being falsified compared with the real data, for example, a short message in a mobile phone is sent by a mobile phone with the number of 12312341234, and the content of the short message, namely the real data is' today 8: 30 meet with zhang san in the Shangri-La Hotel ", obtaining keywords including, but not limited to, time information: today 8: 30, location information: Shangri-La Hotel, character information: and thirdly, in the short message database, the virtual words sequentially corresponding to the keywords are as follows: time information: tomorrow 8: 30, location information: happy hotel, character information: lie four, the virtual data obtained from the real data is "tomorrow 8: 30 and lie on a happy hotel meeting ", certainly, the real data and the virtual data may also be numbers, irregular graphs, labels, and the like, for example, 12312341234 is a mobile phone number of a contact person, and the virtual data 45645674567 corresponding to the number may be obtained by searching in a contact information database, so that when the first application program is not authorized to obtain the real data in the second application program, the first application program obtains the virtual data, thereby ensuring that the first application program can normally operate, and simultaneously protecting the real data in the second application program to the maximum extent, and preventing the real data from being leaked after being obtained by the first application program, thereby improving the security of the terminal.
In the foregoing technical solution, before the first application program acquires the virtual data, the method preferably further includes: determining an application scene of the real data according to the at least one keyword; searching scene data bound with the application scene in a second preset database according to the application scene; and merging the virtual data and the scene data so that the first application program obtains the merged final virtual data.
In the technical scheme, an application scene of real data is determined according to at least one keyword in the real data, scene data bound with the application scene is searched in a second preset database according to the application scene, and finally, the virtual data and the scene data are combined to obtain final virtual data, wherein the scene data can be a common phrase in the application scene, for example, the content of a short message in a mobile phone, that is, the real data is' today 8: 30 and zhang san in the Shanglira hotel, determining the application scene corresponding to the real data as a meeting scene according to the keyword ' meeting ', wherein the scene data searched in the database corresponding to the meeting scene is ' please bring relevant contract information ', because the keyword is equal to ' today 8: 30 preliminary virtual data corresponding to zhang san in the Shangri-La Hotel "is" tomorrow 8: 30 and lie four meet at the delicatessen hotel "so that the final virtual data after merging is" tomorrow 8: 30 and lie IV meet at a delightful hotel, please bring relevant contract information together ", thus adding scene data in the virtual data to ensure that the virtual data is more real and accords with logic, thereby achieving the effect of falseness and falseness of the virtual data, and thus, the first application program acquires the virtual data, thereby ensuring that the first application program can normally run, simultaneously protecting the real data in the second application program to the maximum extent, avoiding the real data from being leaked after being acquired by the first application program, and further improving the safety of the terminal.
In the foregoing technical solution, preferably, when a plurality of virtual words corresponding to any keyword in the at least one keyword are searched in a first preset database corresponding to the keyword, a target virtual word with the highest use frequency is selected from the plurality of virtual words as a virtual word corresponding to the keyword according to a principle that the use frequency is the highest; and the data search method further comprises: the attribute type of the real data is the same as the attribute type of the virtual data, wherein the attribute type comprises at least one of the following types: contact phone, name, mailbox address, head portrait.
In the technical scheme, when a plurality of virtual words corresponding to any keyword are searched in a first preset database corresponding to any keyword in at least one keyword, the virtual word with the highest use frequency in the plurality of virtual words is used as the virtual word of any keyword, so that a terminal can intelligently select a common virtual word from the plurality of virtual words to replace the keyword, manual selection of the virtual word by a user is avoided, and user experience is improved, and in addition, the attribute type of real data is the same as that of virtual data, for example: the attribute type of the real data is a mailbox address, and the attribute type of the virtual data obtained after the real data is subjected to pseudo processing is also the mailbox address, so that the real data is ensured to be similar to the virtual data to the greatest extent, the virtual data can achieve the effect of being falsified, so that the first application program obtains the virtual data instead of the real data, and the real data is protected, wherein the attribute type includes but is not limited to at least one of the following types: contact phone, name, mailbox address, avatar, for example, also place, voice information, video information, etc.
In the above technical solution, preferably, according to a received first storage instruction, each keyword and a virtual word corresponding to each keyword are correspondingly stored in a first preset database corresponding to a data type of each keyword; and correspondingly storing the application scene and scene data bound with the application scene in the first preset database according to the received second storage instruction.
In the technical scheme, the keywords and the virtual words corresponding to the keywords are correspondingly stored in the first preset database corresponding to the data type of the keywords, so that the virtual words corresponding to the keywords can be determined in the first database according to the keywords, and the virtual data corresponding to the real data can be determined.
Another aspect of the present invention provides a data searching apparatus, including: the judging unit is used for judging whether the first application program is allowed to acquire the real data prestored in the first preset database or not when the first application program in the terminal requests to acquire the real data in the second application program; the first searching unit is used for searching virtual data corresponding to the real data in the first preset database according to a received searching command when the judgment result is negative so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command.
In the technical scheme, when a first application program in a terminal requests to acquire real data in a second application program during running, whether the first application program is allowed to acquire the pre-stored real data in a first preset database is judged, when the first application program is not allowed to acquire the real data, namely the first application program is not authorized to acquire the real data, virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the first application program can normally run according to the virtual data, the real data can be protected to the maximum extent, the real data is prevented from being acquired by the first application program and being leaked, and therefore the safety of the terminal is improved, and in addition, if the first application program is allowed to acquire the real data, the real data is searched in the first preset database, the real data is sent directly to the first application.
In the foregoing technical solution, preferably, the first search unit is specifically configured to: acquiring at least one keyword in the real data according to the received acquisition instruction; searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword; sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
In the technical scheme, searching virtual data corresponding to real data in a preset database specifically comprises: at least one keyword such as time information, place information, character information, event information and the like in real data is firstly obtained, a first preset database corresponding to the data type of each keyword in the at least one keyword is searched for a virtual word corresponding to each keyword, then each keyword is sequentially replaced by the virtual words, so that the virtual data corresponding to the real data is obtained from the real data, and therefore the virtual data can achieve the effect of being falsified compared with the real data, for example, a short message in a mobile phone is sent by a mobile phone with the number of 12312341234, and the content of the short message, namely the real data is' today 8: 30 meet with zhang san in the Shangri-La Hotel ", obtaining keywords including, but not limited to, time information: today 8: 30, location information: Shangri-La Hotel, character information: and thirdly, in the short message database, the virtual words sequentially corresponding to the keywords are as follows: time information: tomorrow 8: 30, location information: happy hotel, character information: lie four, the virtual data obtained from the real data is "tomorrow 8: 30 and lie on a happy hotel meeting ", certainly, the real data and the virtual data may also be numbers, irregular graphs, labels, and the like, for example, 12312341234 is a mobile phone number of a contact person, and the virtual data 45645674567 corresponding to the number may be obtained by searching in a contact information database, so that when the first application program is not authorized to obtain the real data in the second application program, the first application program obtains the virtual data, thereby ensuring that the first application program can normally operate, and simultaneously protecting the real data in the second application program to the maximum extent, and preventing the real data from being leaked after being obtained by the first application program, thereby improving the security of the terminal.
In the above technical solution, preferably, the method further includes: a determining unit that determines an application scenario of the real data according to the at least one keyword before causing the first application to acquire the virtual data; the second searching unit is used for searching scene data bound with the application scene in a second preset database according to the application scene; and the merging unit is used for merging the virtual data and the scene data so as to enable the first application program to obtain the merged final virtual data.
In the technical scheme, an application scene of real data is determined according to at least one keyword in the real data, scene data bound with the application scene is searched in a second preset database according to the application scene, and finally, the virtual data and the scene data are combined to obtain final virtual data, wherein the scene data can be a common phrase in the application scene, for example, the content of a short message in a mobile phone, that is, the real data is' today 8: 30 and zhang san in the Shanglira hotel, determining the application scene corresponding to the real data as a meeting scene according to the keyword ' meeting ', wherein the scene data searched in the database corresponding to the meeting scene is ' please bring relevant contract information ', because the keyword is equal to ' today 8: 30 preliminary virtual data corresponding to zhang san in the Shangri-La Hotel "is" tomorrow 8: 30 and lie four meet at the delicatessen hotel "so that the final virtual data after merging is" tomorrow 8: 30 and lie IV meet at a delightful hotel, please bring relevant contract information together ", thus adding scene data in the virtual data to ensure that the virtual data is more real and accords with logic, thereby achieving the effect of falseness and falseness of the virtual data, and thus, the first application program acquires the virtual data, thereby ensuring that the first application program can normally run, simultaneously protecting the real data in the second application program to the maximum extent, avoiding the real data from being leaked after being acquired by the first application program, and further improving the safety of the terminal.
In the foregoing technical solution, preferably, when a plurality of virtual words corresponding to any keyword in the at least one keyword are searched in a first preset database corresponding to the keyword, the selecting unit selects a target virtual word with the highest use frequency from the plurality of virtual words as a virtual word corresponding to the keyword according to a principle that the use frequency is the highest; and the data search apparatus further comprises: the attribute type of the real data is the same as the attribute type of the virtual data, wherein the attribute type comprises at least one of the following types: contact phone, name, mailbox address, head portrait.
In the technical scheme, when a plurality of virtual words corresponding to any keyword are searched in a first preset database corresponding to any keyword in at least one keyword, the virtual word with the highest use frequency in the plurality of virtual words is used as the virtual word of any keyword, so that a terminal can intelligently select a common virtual word from the plurality of virtual words to replace the keyword, manual selection of the virtual word by a user is avoided, and user experience is improved, and in addition, the attribute type of real data is the same as that of virtual data, for example: the attribute type of the real data is a mailbox address, and the attribute type of the virtual data obtained after the real data is subjected to pseudo processing is also the mailbox address, so that the real data is ensured to be similar to the virtual data to the greatest extent, the virtual data can achieve the effect of being falsified, so that the first application program obtains the virtual data instead of the real data, and the real data is protected, wherein the attribute type includes but is not limited to at least one of the following types: contact phone, name, mailbox address, avatar, for example, also place, voice information, video information, etc.
In the foregoing technical solution, preferably, the first storage unit, according to a received first storage instruction, stores each keyword and a virtual word corresponding to each keyword in a first preset database corresponding to a data type of each keyword; and the second storage unit correspondingly stores the application scene and the scene data bound with the application scene in the first preset database according to the received second storage instruction.
In the technical scheme, the keywords and the virtual words corresponding to the keywords are correspondingly stored in the first preset database corresponding to the data type of the keywords, so that the virtual words corresponding to the keywords can be determined in the first database according to the keywords, and the virtual data corresponding to the real data can be determined.
A further aspect of the present invention provides a terminal, including the data search apparatus according to any one of the above technical solutions.
In the technical scheme, when the first application program is not allowed to acquire the real data, the virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the application program can normally run, the real data can be protected to the maximum extent, the real data is prevented from being acquired by the first application program and being leaked, and the safety of the terminal is improved.
By the technical scheme of the invention, the application program obtains the virtual data (namely the pseudo data) corresponding to the real data, so that the application program can normally run according to the virtual data, the real data can be protected to the maximum extent, the real data is prevented from being leaked due to the acquisition of the application program, and the safety of the terminal is improved.
Drawings
FIG. 1 shows a flow diagram of a data search method according to one embodiment of the invention;
FIG. 2 shows a flow diagram of a data search method according to another embodiment of the invention;
FIG. 3 shows a flow diagram of a data search method according to yet another embodiment of the invention;
FIG. 4 is a schematic structural diagram of a data search apparatus according to an embodiment of the present invention;
fig. 5 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
So that the manner in which the above recited objects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 shows a flow diagram of a data search method according to an embodiment of the invention.
As shown in fig. 1, a data search method according to an embodiment of the present invention includes:
step 102, when a first application program in a terminal requests to acquire real data in a second application program, judging whether the first application program is allowed to acquire the real data prestored in a first preset database;
104, when the judgment result is negative, searching virtual data corresponding to the real data in the first preset database according to the received search command so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command.
In the technical scheme, when a first application program in a terminal requests to acquire real data in a second application program during running, whether the first application program is allowed to acquire the pre-stored real data in a first preset database is judged, when the first application program is not allowed to acquire the real data, namely the first application program is not authorized to acquire the real data, virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the first application program can normally run according to the virtual data, the real data can be protected to the maximum extent, the real data is prevented from being acquired by the first application program and being leaked, and therefore the safety of the terminal is improved, and in addition, if the first application program is allowed to acquire the real data, the real data is searched in the first preset database, the real data is sent directly to the first application.
In the foregoing technical solution, preferably, the searching for the virtual data corresponding to the real data in the first preset database specifically includes: acquiring at least one keyword in the real data according to the received acquisition instruction; searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword; sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
In the technical scheme, searching virtual data corresponding to real data in a preset database specifically comprises: at least one keyword such as time information, place information, character information, event information and the like in real data is firstly obtained, a first preset database corresponding to the data type of each keyword in the at least one keyword is searched for a virtual word corresponding to each keyword, then each keyword is sequentially replaced by the virtual words, so that the virtual data corresponding to the real data is obtained from the real data, and therefore the virtual data can achieve the effect of being falsified compared with the real data, for example, a short message in a mobile phone is sent by a mobile phone with the number of 12312341234, and the content of the short message, namely the real data is' today 8: 30 meet with zhang san in the Shangri-La Hotel ", obtaining keywords including, but not limited to, time information: today 8: 30, location information: Shangri-La Hotel, character information: and thirdly, in the short message database, the virtual words sequentially corresponding to the keywords are as follows: time information: tomorrow 8: 30, location information: happy hotel, character information: lie four, the virtual data obtained from the real data is "tomorrow 8: 30 and lie on a happy hotel meeting ", certainly, the real data and the virtual data may also be numbers, irregular graphs, labels, and the like, for example, 12312341234 is a mobile phone number of a contact person, and the virtual data 45645674567 corresponding to the number may be obtained by searching in a contact information database, so that when the first application program is not authorized to obtain the real data in the second application program, the first application program obtains the virtual data, thereby ensuring that the first application program can normally operate, and simultaneously protecting the real data in the second application program to the maximum extent, and preventing the real data from being leaked after being obtained by the first application program, thereby improving the security of the terminal.
In the foregoing technical solution, before the first application program acquires the virtual data, the method preferably further includes: determining an application scene of the real data according to the at least one keyword; searching scene data bound with the application scene in a second preset database according to the application scene; and merging the virtual data and the scene data so that the first application program obtains the merged final virtual data.
In the technical scheme, an application scene of real data is determined according to at least one keyword in the real data, scene data bound with the application scene is searched in a second preset database according to the application scene, and finally, the virtual data and the scene data are combined to obtain final virtual data, wherein the scene data can be a common phrase in the application scene, for example, the content of a short message in a mobile phone, that is, the real data is' today 8: 30 and zhang san in the Shanglira hotel, determining the application scene corresponding to the real data as a meeting scene according to the keyword ' meeting ', wherein the scene data searched in the database corresponding to the meeting scene is ' please bring relevant contract information ', because the keyword is equal to ' today 8: 30 preliminary virtual data corresponding to zhang san in the Shangri-La Hotel "is" tomorrow 8: 30 and lie four meet at the delicatessen hotel "so that the final virtual data after merging is" tomorrow 8: 30 and lie IV meet at a delightful hotel, please bring relevant contract information together ", thus adding scene data in the virtual data to ensure that the virtual data is more real and accords with logic, thereby achieving the effect of falseness and falseness of the virtual data, and thus, the first application program acquires the virtual data, thereby ensuring that the first application program can normally run, simultaneously protecting the real data in the second application program to the maximum extent, avoiding the real data from being leaked after being acquired by the first application program, and further improving the safety of the terminal.
In the foregoing technical solution, preferably, when a plurality of virtual words corresponding to any keyword in the at least one keyword are searched in a first preset database corresponding to the keyword, a target virtual word with the highest use frequency is selected from the plurality of virtual words as a virtual word corresponding to the keyword according to a principle that the use frequency is the highest; and the data search method further comprises: the attribute type of the real data is the same as the attribute type of the virtual data, wherein the attribute type comprises at least one of the following types: contact phone, name, mailbox address, head portrait.
In the technical scheme, when a plurality of virtual words corresponding to any keyword are searched in a first preset database corresponding to any keyword in at least one keyword, the virtual word with the highest use frequency in the plurality of virtual words is used as the virtual word of any keyword, so that a terminal can intelligently select a common virtual word from the plurality of virtual words to replace the keyword, manual selection of the virtual word by a user is avoided, and user experience is improved, and in addition, the attribute type of real data is the same as that of virtual data, for example: the attribute type of the real data is a mailbox address, and the attribute type of the virtual data obtained after the real data is subjected to pseudo processing is also the mailbox address, so that the real data is ensured to be similar to the virtual data to the greatest extent, the virtual data can achieve the effect of being falsified, so that the first application program obtains the virtual data instead of the real data, and the real data is protected, wherein the attribute type includes but is not limited to at least one of the following types: contact phone, name, mailbox address, avatar, for example, also place, voice information, video information, etc.
In the above technical solution, preferably, according to a received first storage instruction, each keyword and a virtual word corresponding to each keyword are correspondingly stored in a first preset database corresponding to a data type of each keyword; and correspondingly storing the application scene and scene data bound with the application scene in the first preset database according to the received second storage instruction.
In the technical scheme, the keywords and the virtual words corresponding to the keywords are correspondingly stored in the first preset database corresponding to the data type of the keywords, so that the virtual words corresponding to the keywords can be determined in the first database according to the keywords, and the virtual data corresponding to the real data can be determined.
Fig. 2 shows a flow diagram of a data search method according to another embodiment of the present invention.
As shown in fig. 2, a data search method according to another embodiment of the present invention (in this embodiment, the terminal is a mobile phone) includes:
step 202, generating a feature library and a context sensor of various information, wherein the mobile phone stores each keyword in real data and a virtual word corresponding to each keyword in the real data in a first preset database (feature library) corresponding to the data type of each keyword according to a received first storage instruction; and the context sensor is used for correspondingly storing the application scene and the scene data bound with the application scene in the second preset database (context sensing database) according to the received second storage instruction.
Step 204, the first application requests to obtain the real data in the second application.
Step 206, determining whether to allow the first application program to access the real data pre-stored in the first preset database, if yes, entering step 208, and if no, ending the flow of the data searching method.
Step 208, determining whether to turn on a switch for generating the virtual data, entering step 210 if the determination result is yes (i.e. the first application is not allowed to obtain the real data pre-stored in the first preset database), and entering step 212 if the determination result is no.
Step 210, selecting a first preset database corresponding to the data type of at least one keyword in the real data, for example: and if the data type of at least one keyword in the real data is text content, searching the virtual text content of the text content in the text database, and if the data type of a certain keyword in the real data is a telephone number, searching the virtual number of the telephone number in the telephone number database.
Step 212, searching the real data in the first preset database, and transmitting the real data back to the first application program.
Step 214, searching the first preset database for virtual data corresponding to the real data.
Step 216, converting the preliminary virtual data into final virtual data conforming to logic according to the context sensor, specifically, determining an application scene of real data according to at least one keyword; searching scene data bound with the application scene in a second preset database according to the application scene; and merging the virtual data and the scene data so that the first application program acquires the merged final virtual data.
In step 218, the obtained final virtual data is transmitted back to the first application program, so that the first application program obtains the final virtual data, thereby protecting the real data to the maximum extent while the application program can operate normally, and preventing the real data from being leaked due to the acquisition of the application program, thereby improving the security of the terminal.
In addition, in the above technical solution, the method further includes: the mobile phone can flexibly select whether to generate the virtual data according to the real-time requirements of the user, specifically, when the terminal runs some application programs which can access the real data, a dialog box which can allow the application programs to access appears, and when the application programs are allowed to access the real data, the mobile phone can inquire whether a function of generating the virtual data is started. If the function of generating the virtual data is started, when the application program acquires the real data, the mobile phone generates corresponding virtual data according to the attribute type (short message, call record, mail, address book and the like) of the real data to be acquired by the application program. The virtual data is corresponding to the format, type and the like of the real data, and the effect of falsifying and falsifying can be achieved. In this way, the virtual data is obtained by the application program, and the real data is correspondingly protected.
Before generating the virtual data, a feature library (a first preset database) and a context-aware library (a second preset database) of various attribute types can be established in the mobile phone. For example, the text content of the short message corresponds to a feature library of the text content of the short message, the address book corresponds to a feature library of the address book, and the mail content corresponds to a feature library of the mail content. These feature libraries are a structure similar to conditions plus decisions, indicating what decisions need to be made under what conditions are met. Before the feature library works, the feature library needs to be trained through a data source (keywords). The data sources are also the same structure of conditions plus decisions, and each piece of data corresponds to information about what kind of decision is made under a certain condition. After training of a large number of data sources (according to the principle of highest use frequency, selecting a target virtual word with the highest use frequency from a plurality of virtual words as a virtual word corresponding to any keyword), the feature library can make relevant decisions according to conditions more accurately. The user can also train the feature library, and can set conditions and make decisions by himself to be added to the feature library. The context-aware library is similar to the feature library, but is responsible for generating more logical virtual data (determining an application scenario of real data according to at least one keyword; searching a second preset database for scenario data bound with the application scenario according to the application scenario; merging the virtual data and the scenario data so that the first application program obtains the merged final virtual data), and after the feature library and the context-aware library are obtained, the virtual data can be generated through the context-aware library.
Fig. 3 shows a flow diagram of a data search method according to yet another embodiment of the present invention.
As shown in fig. 3, a data search method according to another embodiment of the present invention (in this embodiment, the terminal is a mobile phone) includes:
step 302, the first application program requests to obtain real data in the short message of the second application program (real data in the second application program).
Step 304, judging whether the first application program is allowed to access the real data in the short message, if so, entering step 306, and if not, ending the flow of the data searching method.
Step 306, determining whether to turn on the switch of the virtual data of the short message, entering step 308 when the determination result is yes (i.e. the first application program is not allowed to obtain the real data of the short message pre-stored in the first preset database), and entering step 310 when the determination result is no.
Step 308, searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in at least one keyword in the real data in the short message.
Step 310, searching real data in the short message in a first preset database, and returning the real data of the short message to the first application program.
Step 312, searching the first preset database for the virtual short message data corresponding to the real short message data.
Step 314, generating a short message virtual data which can be spurious and real and is consistent with logic according to the context sensor, specifically comprising: determining an application scene of real data in the short message according to at least one keyword; searching scene data bound with the application scene in a second preset database according to the application scene; and combining the short message virtual data and the scene data so that the first application program can obtain the combined final short message virtual data.
Step 316, the generated final short message virtual data is transmitted back to the first application program, so that the first application program can obtain the final short message virtual data.
Fig. 4 shows a schematic structural diagram of a data search apparatus according to an embodiment of the present invention.
As shown in fig. 4, a data search apparatus 400 according to an embodiment of the present invention includes: a determining unit 402 and a first searching unit 404, where the determining unit 402 is configured to determine whether to allow a first application program in a terminal to acquire real data pre-stored in a first preset database when the first application program requests to acquire the real data in a second application program; a first searching unit 404, configured to search, according to a received search command, virtual data corresponding to the real data in the first preset database so that the first application program obtains the virtual data when the determination result is negative; otherwise, searching the real data in the first preset database according to the searching command.
In the technical scheme, when a first application program in a terminal requests to acquire real data in a second application program during running, whether the first application program is allowed to acquire the pre-stored real data in a first preset database is judged, when the first application program is not allowed to acquire the real data, namely the first application program is not authorized to acquire the real data, virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the first application program can normally run according to the virtual data, the real data can be protected to the maximum extent, the real data is prevented from being acquired by the first application program and being leaked, and therefore the safety of the terminal is improved, and in addition, if the first application program is allowed to acquire the real data, the real data is searched in the first preset database, the real data is sent directly to the first application.
In the foregoing technical solution, preferably, the first searching unit 404 is specifically configured to: acquiring at least one keyword in the real data according to the received acquisition instruction; searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword; sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
In the technical scheme, searching virtual data corresponding to real data in a preset database specifically comprises: at least one keyword such as time information, place information, character information, event information and the like in real data is firstly obtained, a first preset database corresponding to the data type of each keyword in the at least one keyword is searched for a virtual word corresponding to each keyword, then each keyword is sequentially replaced by the virtual words, so that the virtual data corresponding to the real data is obtained from the real data, and therefore the virtual data can achieve the effect of being falsified compared with the real data, for example, a short message in a mobile phone is sent by a mobile phone with the number of 12312341234, and the content of the short message, namely the real data is' today 8: 30 meet with zhang san in the Shangri-La Hotel ", obtaining keywords including, but not limited to, time information: today 8: 30, location information: Shangri-La Hotel, character information: and thirdly, in the short message database, the virtual words sequentially corresponding to the keywords are as follows: time information: tomorrow 8: 30, location information: happy hotel, character information: lie four, the virtual data obtained from the real data is "tomorrow 8: 30 and lie on a happy hotel meeting ", certainly, the real data and the virtual data may also be numbers, irregular graphs, labels, and the like, for example, 12312341234 is a mobile phone number of a contact person, and the virtual data 45645674567 corresponding to the number may be obtained by searching in a contact information database, so that when the first application program is not authorized to obtain the real data in the second application program, the first application program obtains the virtual data, thereby ensuring that the first application program can normally operate, and simultaneously protecting the real data in the second application program to the maximum extent, and preventing the real data from being leaked after being obtained by the first application program, thereby improving the security of the terminal.
In the above technical solution, preferably, the method further includes: a determining unit 406, configured to determine an application scenario of the real data according to the at least one keyword before causing the first application to acquire the virtual data; a second searching unit 408, which searches scene data bound with the application scene in a second preset database according to the application scene; a merging unit 410, merging the virtual data and the scene data, so that the first application program obtains the merged final virtual data.
In the technical scheme, an application scene of real data is determined according to at least one keyword in the real data, scene data bound with the application scene is searched in a second preset database according to the application scene, and finally, the virtual data and the scene data are combined to obtain final virtual data, wherein the scene data can be a common phrase in the application scene, for example, the content of a short message in a mobile phone, that is, the real data is' today 8: 30 and zhang san in the Shanglira hotel, determining the application scene corresponding to the real data as a meeting scene according to the keyword ' meeting ', wherein the scene data searched in the database corresponding to the meeting scene is ' please bring relevant contract information ', because the keyword is equal to ' today 8: 30 preliminary virtual data corresponding to zhang san in the Shangri-La Hotel "is" tomorrow 8: 30 and lie four meet at the delicatessen hotel "so that the final virtual data after merging is" tomorrow 8: 30 and lie IV meet at a delightful hotel, please bring relevant contract information together ", thus adding scene data in the virtual data to ensure that the virtual data is more real and accords with logic, thereby achieving the effect of falseness and falseness of the virtual data, and thus, the first application program acquires the virtual data, thereby ensuring that the first application program can normally run, simultaneously protecting the real data in the second application program to the maximum extent, avoiding the real data from being leaked after being acquired by the first application program, and further improving the safety of the terminal.
In the foregoing technical solution, preferably, when a plurality of virtual words corresponding to any keyword in the at least one keyword are searched in a first preset database corresponding to the keyword, the selecting unit 412 selects a target virtual word with the highest use frequency from the plurality of virtual words as a virtual word corresponding to the keyword according to a principle that the use frequency is the highest; and the data search apparatus 400 further comprises: the attribute type of the real data is the same as the attribute type of the virtual data, wherein the attribute type comprises at least one of the following types: contact phone, name, mailbox address, head portrait.
In the technical scheme, when a plurality of virtual words corresponding to any keyword are searched in a first preset database corresponding to any keyword in at least one keyword, the virtual word with the highest use frequency in the plurality of virtual words is used as the virtual word of any keyword, so that a terminal can intelligently select a common virtual word from the plurality of virtual words to replace the keyword, manual selection of the virtual word by a user is avoided, and user experience is improved, and in addition, the attribute type of real data is the same as that of virtual data, for example: the attribute type of the real data is a mailbox address, and the attribute type of the virtual data obtained after the real data is subjected to pseudo processing is also the mailbox address, so that the real data is ensured to be similar to the virtual data to the greatest extent, the virtual data can achieve the effect of being falsified, so that the first application program obtains the virtual data instead of the real data, and the real data is protected, wherein the attribute type includes but is not limited to at least one of the following types: contact phone, name, mailbox address, avatar, for example, also place, voice information, video information, etc.
In the foregoing technical solution, preferably, the first storage unit 414, according to a received first storage instruction, correspondingly stores each keyword and a virtual word corresponding to each keyword in a first preset database corresponding to a data type of each keyword; and a second storage unit 416, configured to correspondingly store the application scene and the scene data bound to the application scene in the first preset database according to the received second storage instruction.
In the technical scheme, the keywords and the virtual words corresponding to the keywords are correspondingly stored in the first preset database corresponding to the data type of the keywords, so that the virtual words corresponding to the keywords can be determined in the first database according to the keywords, and the virtual data corresponding to the real data can be determined.
Fig. 5 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
As shown in fig. 5, a terminal 500 according to an embodiment of the present invention includes the data search apparatus 400 according to any of the above-mentioned technical solutions.
In the technical scheme, when the first application program is not allowed to acquire the real data, the virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the application program can normally run, the real data can be protected to the maximum extent, the real data is prevented from being leaked due to acquisition of the real data by the first application program, and the safety of the terminal 500 is improved.
The technical scheme of the present invention is described in detail with reference to the drawings, so that the application program obtains virtual data (i.e. pseudo data) corresponding to the real data, and the application program can operate normally according to the virtual data, and simultaneously protect the real data to the greatest extent, and prevent the real data from being obtained and leaked by the application program, thereby improving the security of the terminal.
In the present invention, the terms "first", "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance; the term "plurality" means two or more. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. A method of searching data, comprising:
when a first application program in a terminal requests to acquire real data in a second application program, judging whether the first application program is allowed to acquire the real data prestored in a first preset database;
if not, searching virtual data corresponding to the real data in the first preset database according to a received search command so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command;
acquiring at least one keyword in the real data according to the received acquisition instruction;
before causing the first application to acquire the virtual data, further comprising:
determining an application scene of the real data according to the at least one keyword;
searching scene data bound with the application scene in a second preset database according to the application scene;
merging the virtual data and the scene data so that the first application program obtains merged final virtual data;
the searching for the virtual data corresponding to the real data in the first preset database specifically includes:
searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword;
sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
2. The data search method of claim 1,
when a plurality of virtual words corresponding to any keyword in the at least one keyword are searched in a first preset database corresponding to the keyword, selecting a target virtual word with the highest use frequency from the plurality of virtual words as a virtual word corresponding to the keyword according to the principle of the highest use frequency; and
the data search method further includes:
the attribute type of the real data is the same as the attribute type of the virtual data, wherein,
the attribute types include at least one of the following types: contact phone, name, mailbox address, head portrait.
3. The data search method according to claim 1 or 2,
according to a received first storage instruction, correspondingly storing each keyword and a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword; and
and correspondingly storing the application scene and scene data bound with the application scene in the first preset database according to the received second storage instruction.
4. A data search apparatus, comprising:
the judging unit is used for judging whether the first application program is allowed to acquire the real data prestored in the first preset database or not when the first application program in the terminal requests to acquire the real data in the second application program;
the first searching unit is used for searching virtual data corresponding to the real data in the first preset database according to a received searching command when the judgment result is negative so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command;
the first search unit is specifically configured to:
acquiring at least one keyword in the real data according to the received acquisition instruction;
a determining unit that determines an application scenario of the real data according to the at least one keyword before causing the first application to acquire the virtual data;
the second searching unit is used for searching scene data bound with the application scene in a second preset database according to the application scene;
a merging unit, which merges the virtual data and the scene data, so that the first application program obtains the merged final virtual data;
the first search unit is further configured to:
searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword;
sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
5. The data search apparatus according to claim 4,
the selection unit is used for selecting a target virtual word with the highest use frequency from the plurality of virtual words as a virtual word corresponding to any keyword according to the principle of the highest use frequency when the plurality of virtual words corresponding to the any keyword are searched in a first preset database corresponding to the keyword in the at least one keyword; and
the data search apparatus further includes:
the attribute type of the real data is the same as the attribute type of the virtual data, wherein,
the attribute types include at least one of the following types: contact phone, name, mailbox address, head portrait.
6. The data search apparatus according to claim 4 or 5,
the first storage unit is used for correspondingly storing each keyword and a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to a received first storage instruction; and
and the second storage unit correspondingly stores the application scene and the scene data bound with the application scene in the first preset database according to the received second storage instruction.
7. A terminal, comprising: a data search apparatus as claimed in any of claims 4 to 6.
CN201510044118.9A 2015-01-28 2015-01-28 Data searching method, data searching device and terminal Expired - Fee Related CN105630854B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510044118.9A CN105630854B (en) 2015-01-28 2015-01-28 Data searching method, data searching device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510044118.9A CN105630854B (en) 2015-01-28 2015-01-28 Data searching method, data searching device and terminal

Publications (2)

Publication Number Publication Date
CN105630854A CN105630854A (en) 2016-06-01
CN105630854B true CN105630854B (en) 2020-07-03

Family

ID=56045795

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510044118.9A Expired - Fee Related CN105630854B (en) 2015-01-28 2015-01-28 Data searching method, data searching device and terminal

Country Status (1)

Country Link
CN (1) CN105630854B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109213551A (en) * 2017-07-06 2019-01-15 阿里巴巴集团控股有限公司 A kind of user interface process method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533026A (en) * 2013-09-22 2014-01-22 四川智爱电子信息科技有限责任公司 Cloud platform-based mobile phone contact list information disguising method
CN104102358A (en) * 2014-07-18 2014-10-15 北京奇虎科技有限公司 Privacy information protecting method and privacy information protecting device
CN104200175A (en) * 2014-08-27 2014-12-10 华为技术有限公司 Information protection method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8065286B2 (en) * 2006-01-23 2011-11-22 Chacha Search, Inc. Scalable search system using human searchers

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533026A (en) * 2013-09-22 2014-01-22 四川智爱电子信息科技有限责任公司 Cloud platform-based mobile phone contact list information disguising method
CN104102358A (en) * 2014-07-18 2014-10-15 北京奇虎科技有限公司 Privacy information protecting method and privacy information protecting device
CN104200175A (en) * 2014-08-27 2014-12-10 华为技术有限公司 Information protection method and device

Also Published As

Publication number Publication date
CN105630854A (en) 2016-06-01

Similar Documents

Publication Publication Date Title
US7836134B2 (en) E-mail address inspection
US11093303B2 (en) Notification message processing method and apparatus
US11681757B2 (en) Similar email spam detection
AU2015202478A1 (en) Combining internal and external search results
CN104852883A (en) Method and system for protecting safety of account information
US20170339006A1 (en) Alert generation based on proximate events identified by source data analytics
KR102144868B1 (en) Apparatus and method for providing call record
US20190258825A1 (en) System and Method for Data Masking and Managing Communications
CN110060656B (en) Model management and speech synthesis method, device and system and storage medium
JP2017526995A (en) Dual channel identification and authentication
CN104980404B (en) Method and system for protecting account information security
US9633084B2 (en) Information searching method and device, and computer storage medium
CN108875364A (en) Menace determination method, device, electronic equipment and the storage medium of unknown file
CN106547791A (en) A kind of data access method and system
CN105630855A (en) File sharing method, file sharing system and terminal
US8402043B2 (en) Analytics of historical conversations in relation to present communication
CN105790948A (en) Identity authentication method and identity authentication device
WO2016145849A1 (en) Short message security management method, device and terminal
US9288244B2 (en) Managing a collaborative space
CN105630854B (en) Data searching method, data searching device and terminal
CN105490913B (en) Instant message processing method and device
CN109388558A (en) A kind of method, apparatus, equipment and storage medium managing electronic equipment
CN108513659B (en) Searching and retrieving keying data maintained using a keying database
CN106612283B (en) Method and device for identifying source of downloaded file
EP3193559B1 (en) Information processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200703

Termination date: 20220128

CF01 Termination of patent right due to non-payment of annual fee