CN105630854B - Data searching method, data searching device and terminal - Google Patents
Data searching method, data searching device and terminal Download PDFInfo
- Publication number
- CN105630854B CN105630854B CN201510044118.9A CN201510044118A CN105630854B CN 105630854 B CN105630854 B CN 105630854B CN 201510044118 A CN201510044118 A CN 201510044118A CN 105630854 B CN105630854 B CN 105630854B
- Authority
- CN
- China
- Prior art keywords
- data
- virtual
- keyword
- real data
- application program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data search method, a data search device and a terminal, wherein the method comprises the following steps: when a first application program in a terminal requests to acquire real data in a second application program, judging whether the first application program is allowed to acquire the real data prestored in a first preset database; if not, searching virtual data corresponding to the real data in the first preset database according to a received search command so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command. By the technical scheme, the application program can obtain the virtual data corresponding to the real data, so that the real data can be protected to the maximum extent while the application program can normally run, the real data is prevented from being leaked due to the fact that the real data is obtained by the application program, and the safety of the terminal is improved.
Description
Technical Field
The present invention relates to the field of terminal technologies, and in particular, to a data search method, a data search apparatus, and a terminal.
Background
At present, in the related technical solutions, an application program in a terminal sends a request for acquiring real data when running, and queries whether the application program is allowed to acquire the real data, and if so, the application program can normally acquire the real data in the terminal; if not, the application program can not acquire the real data in the terminal.
However, some applications actively acquire real data and upload the real data to a server of the terminal without permission during running, so that the real data of the user is leaked, and unnecessary loss and trouble are caused to the user of the terminal.
Therefore, when the application program in the terminal is running, how to avoid the real data from being obtained and leaked by the application program becomes an urgent problem to be solved.
Disclosure of Invention
The present invention is based on the above problems, and provides a new technical solution, in which virtual data is substituted for real data, so that virtual data (i.e. dummy data) corresponding to the real data is obtained by an application program, and thus, the application program can operate normally according to the virtual data, and simultaneously, the real data can be protected to the greatest extent, and the real data is prevented from being obtained and leaked by the application program, thereby improving the security of the terminal.
In view of the above, an aspect of the present invention provides a data searching method, including: when a first application program in a terminal requests to acquire real data in a second application program, judging whether the first application program is allowed to acquire the real data prestored in a first preset database; if not, searching virtual data corresponding to the real data in the first preset database according to a received search command so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command.
In the technical scheme, when a first application program in a terminal requests to acquire real data in a second application program during running, whether the first application program is allowed to acquire the pre-stored real data in a first preset database is judged, when the first application program is not allowed to acquire the real data, namely the first application program is not authorized to acquire the real data, virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the first application program can normally run according to the virtual data, the real data can be protected to the maximum extent, the real data is prevented from being acquired by the first application program and being leaked, and therefore the safety of the terminal is improved, and in addition, if the first application program is allowed to acquire the real data, the real data is searched in the first preset database, the real data is sent directly to the first application.
In the foregoing technical solution, preferably, the searching for the virtual data corresponding to the real data in the first preset database specifically includes: acquiring at least one keyword in the real data according to the received acquisition instruction; searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword; sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
In the technical scheme, searching virtual data corresponding to real data in a preset database specifically comprises: at least one keyword such as time information, place information, character information, event information and the like in real data is firstly obtained, a first preset database corresponding to the data type of each keyword in the at least one keyword is searched for a virtual word corresponding to each keyword, then each keyword is sequentially replaced by the virtual words, so that the virtual data corresponding to the real data is obtained from the real data, and therefore the virtual data can achieve the effect of being falsified compared with the real data, for example, a short message in a mobile phone is sent by a mobile phone with the number of 12312341234, and the content of the short message, namely the real data is' today 8: 30 meet with zhang san in the Shangri-La Hotel ", obtaining keywords including, but not limited to, time information: today 8: 30, location information: Shangri-La Hotel, character information: and thirdly, in the short message database, the virtual words sequentially corresponding to the keywords are as follows: time information: tomorrow 8: 30, location information: happy hotel, character information: lie four, the virtual data obtained from the real data is "tomorrow 8: 30 and lie on a happy hotel meeting ", certainly, the real data and the virtual data may also be numbers, irregular graphs, labels, and the like, for example, 12312341234 is a mobile phone number of a contact person, and the virtual data 45645674567 corresponding to the number may be obtained by searching in a contact information database, so that when the first application program is not authorized to obtain the real data in the second application program, the first application program obtains the virtual data, thereby ensuring that the first application program can normally operate, and simultaneously protecting the real data in the second application program to the maximum extent, and preventing the real data from being leaked after being obtained by the first application program, thereby improving the security of the terminal.
In the foregoing technical solution, before the first application program acquires the virtual data, the method preferably further includes: determining an application scene of the real data according to the at least one keyword; searching scene data bound with the application scene in a second preset database according to the application scene; and merging the virtual data and the scene data so that the first application program obtains the merged final virtual data.
In the technical scheme, an application scene of real data is determined according to at least one keyword in the real data, scene data bound with the application scene is searched in a second preset database according to the application scene, and finally, the virtual data and the scene data are combined to obtain final virtual data, wherein the scene data can be a common phrase in the application scene, for example, the content of a short message in a mobile phone, that is, the real data is' today 8: 30 and zhang san in the Shanglira hotel, determining the application scene corresponding to the real data as a meeting scene according to the keyword ' meeting ', wherein the scene data searched in the database corresponding to the meeting scene is ' please bring relevant contract information ', because the keyword is equal to ' today 8: 30 preliminary virtual data corresponding to zhang san in the Shangri-La Hotel "is" tomorrow 8: 30 and lie four meet at the delicatessen hotel "so that the final virtual data after merging is" tomorrow 8: 30 and lie IV meet at a delightful hotel, please bring relevant contract information together ", thus adding scene data in the virtual data to ensure that the virtual data is more real and accords with logic, thereby achieving the effect of falseness and falseness of the virtual data, and thus, the first application program acquires the virtual data, thereby ensuring that the first application program can normally run, simultaneously protecting the real data in the second application program to the maximum extent, avoiding the real data from being leaked after being acquired by the first application program, and further improving the safety of the terminal.
In the foregoing technical solution, preferably, when a plurality of virtual words corresponding to any keyword in the at least one keyword are searched in a first preset database corresponding to the keyword, a target virtual word with the highest use frequency is selected from the plurality of virtual words as a virtual word corresponding to the keyword according to a principle that the use frequency is the highest; and the data search method further comprises: the attribute type of the real data is the same as the attribute type of the virtual data, wherein the attribute type comprises at least one of the following types: contact phone, name, mailbox address, head portrait.
In the technical scheme, when a plurality of virtual words corresponding to any keyword are searched in a first preset database corresponding to any keyword in at least one keyword, the virtual word with the highest use frequency in the plurality of virtual words is used as the virtual word of any keyword, so that a terminal can intelligently select a common virtual word from the plurality of virtual words to replace the keyword, manual selection of the virtual word by a user is avoided, and user experience is improved, and in addition, the attribute type of real data is the same as that of virtual data, for example: the attribute type of the real data is a mailbox address, and the attribute type of the virtual data obtained after the real data is subjected to pseudo processing is also the mailbox address, so that the real data is ensured to be similar to the virtual data to the greatest extent, the virtual data can achieve the effect of being falsified, so that the first application program obtains the virtual data instead of the real data, and the real data is protected, wherein the attribute type includes but is not limited to at least one of the following types: contact phone, name, mailbox address, avatar, for example, also place, voice information, video information, etc.
In the above technical solution, preferably, according to a received first storage instruction, each keyword and a virtual word corresponding to each keyword are correspondingly stored in a first preset database corresponding to a data type of each keyword; and correspondingly storing the application scene and scene data bound with the application scene in the first preset database according to the received second storage instruction.
In the technical scheme, the keywords and the virtual words corresponding to the keywords are correspondingly stored in the first preset database corresponding to the data type of the keywords, so that the virtual words corresponding to the keywords can be determined in the first database according to the keywords, and the virtual data corresponding to the real data can be determined.
Another aspect of the present invention provides a data searching apparatus, including: the judging unit is used for judging whether the first application program is allowed to acquire the real data prestored in the first preset database or not when the first application program in the terminal requests to acquire the real data in the second application program; the first searching unit is used for searching virtual data corresponding to the real data in the first preset database according to a received searching command when the judgment result is negative so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command.
In the technical scheme, when a first application program in a terminal requests to acquire real data in a second application program during running, whether the first application program is allowed to acquire the pre-stored real data in a first preset database is judged, when the first application program is not allowed to acquire the real data, namely the first application program is not authorized to acquire the real data, virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the first application program can normally run according to the virtual data, the real data can be protected to the maximum extent, the real data is prevented from being acquired by the first application program and being leaked, and therefore the safety of the terminal is improved, and in addition, if the first application program is allowed to acquire the real data, the real data is searched in the first preset database, the real data is sent directly to the first application.
In the foregoing technical solution, preferably, the first search unit is specifically configured to: acquiring at least one keyword in the real data according to the received acquisition instruction; searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword; sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
In the technical scheme, searching virtual data corresponding to real data in a preset database specifically comprises: at least one keyword such as time information, place information, character information, event information and the like in real data is firstly obtained, a first preset database corresponding to the data type of each keyword in the at least one keyword is searched for a virtual word corresponding to each keyword, then each keyword is sequentially replaced by the virtual words, so that the virtual data corresponding to the real data is obtained from the real data, and therefore the virtual data can achieve the effect of being falsified compared with the real data, for example, a short message in a mobile phone is sent by a mobile phone with the number of 12312341234, and the content of the short message, namely the real data is' today 8: 30 meet with zhang san in the Shangri-La Hotel ", obtaining keywords including, but not limited to, time information: today 8: 30, location information: Shangri-La Hotel, character information: and thirdly, in the short message database, the virtual words sequentially corresponding to the keywords are as follows: time information: tomorrow 8: 30, location information: happy hotel, character information: lie four, the virtual data obtained from the real data is "tomorrow 8: 30 and lie on a happy hotel meeting ", certainly, the real data and the virtual data may also be numbers, irregular graphs, labels, and the like, for example, 12312341234 is a mobile phone number of a contact person, and the virtual data 45645674567 corresponding to the number may be obtained by searching in a contact information database, so that when the first application program is not authorized to obtain the real data in the second application program, the first application program obtains the virtual data, thereby ensuring that the first application program can normally operate, and simultaneously protecting the real data in the second application program to the maximum extent, and preventing the real data from being leaked after being obtained by the first application program, thereby improving the security of the terminal.
In the above technical solution, preferably, the method further includes: a determining unit that determines an application scenario of the real data according to the at least one keyword before causing the first application to acquire the virtual data; the second searching unit is used for searching scene data bound with the application scene in a second preset database according to the application scene; and the merging unit is used for merging the virtual data and the scene data so as to enable the first application program to obtain the merged final virtual data.
In the technical scheme, an application scene of real data is determined according to at least one keyword in the real data, scene data bound with the application scene is searched in a second preset database according to the application scene, and finally, the virtual data and the scene data are combined to obtain final virtual data, wherein the scene data can be a common phrase in the application scene, for example, the content of a short message in a mobile phone, that is, the real data is' today 8: 30 and zhang san in the Shanglira hotel, determining the application scene corresponding to the real data as a meeting scene according to the keyword ' meeting ', wherein the scene data searched in the database corresponding to the meeting scene is ' please bring relevant contract information ', because the keyword is equal to ' today 8: 30 preliminary virtual data corresponding to zhang san in the Shangri-La Hotel "is" tomorrow 8: 30 and lie four meet at the delicatessen hotel "so that the final virtual data after merging is" tomorrow 8: 30 and lie IV meet at a delightful hotel, please bring relevant contract information together ", thus adding scene data in the virtual data to ensure that the virtual data is more real and accords with logic, thereby achieving the effect of falseness and falseness of the virtual data, and thus, the first application program acquires the virtual data, thereby ensuring that the first application program can normally run, simultaneously protecting the real data in the second application program to the maximum extent, avoiding the real data from being leaked after being acquired by the first application program, and further improving the safety of the terminal.
In the foregoing technical solution, preferably, when a plurality of virtual words corresponding to any keyword in the at least one keyword are searched in a first preset database corresponding to the keyword, the selecting unit selects a target virtual word with the highest use frequency from the plurality of virtual words as a virtual word corresponding to the keyword according to a principle that the use frequency is the highest; and the data search apparatus further comprises: the attribute type of the real data is the same as the attribute type of the virtual data, wherein the attribute type comprises at least one of the following types: contact phone, name, mailbox address, head portrait.
In the technical scheme, when a plurality of virtual words corresponding to any keyword are searched in a first preset database corresponding to any keyword in at least one keyword, the virtual word with the highest use frequency in the plurality of virtual words is used as the virtual word of any keyword, so that a terminal can intelligently select a common virtual word from the plurality of virtual words to replace the keyword, manual selection of the virtual word by a user is avoided, and user experience is improved, and in addition, the attribute type of real data is the same as that of virtual data, for example: the attribute type of the real data is a mailbox address, and the attribute type of the virtual data obtained after the real data is subjected to pseudo processing is also the mailbox address, so that the real data is ensured to be similar to the virtual data to the greatest extent, the virtual data can achieve the effect of being falsified, so that the first application program obtains the virtual data instead of the real data, and the real data is protected, wherein the attribute type includes but is not limited to at least one of the following types: contact phone, name, mailbox address, avatar, for example, also place, voice information, video information, etc.
In the foregoing technical solution, preferably, the first storage unit, according to a received first storage instruction, stores each keyword and a virtual word corresponding to each keyword in a first preset database corresponding to a data type of each keyword; and the second storage unit correspondingly stores the application scene and the scene data bound with the application scene in the first preset database according to the received second storage instruction.
In the technical scheme, the keywords and the virtual words corresponding to the keywords are correspondingly stored in the first preset database corresponding to the data type of the keywords, so that the virtual words corresponding to the keywords can be determined in the first database according to the keywords, and the virtual data corresponding to the real data can be determined.
A further aspect of the present invention provides a terminal, including the data search apparatus according to any one of the above technical solutions.
In the technical scheme, when the first application program is not allowed to acquire the real data, the virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the application program can normally run, the real data can be protected to the maximum extent, the real data is prevented from being acquired by the first application program and being leaked, and the safety of the terminal is improved.
By the technical scheme of the invention, the application program obtains the virtual data (namely the pseudo data) corresponding to the real data, so that the application program can normally run according to the virtual data, the real data can be protected to the maximum extent, the real data is prevented from being leaked due to the acquisition of the application program, and the safety of the terminal is improved.
Drawings
FIG. 1 shows a flow diagram of a data search method according to one embodiment of the invention;
FIG. 2 shows a flow diagram of a data search method according to another embodiment of the invention;
FIG. 3 shows a flow diagram of a data search method according to yet another embodiment of the invention;
FIG. 4 is a schematic structural diagram of a data search apparatus according to an embodiment of the present invention;
fig. 5 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
So that the manner in which the above recited objects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 shows a flow diagram of a data search method according to an embodiment of the invention.
As shown in fig. 1, a data search method according to an embodiment of the present invention includes:
104, when the judgment result is negative, searching virtual data corresponding to the real data in the first preset database according to the received search command so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command.
In the technical scheme, when a first application program in a terminal requests to acquire real data in a second application program during running, whether the first application program is allowed to acquire the pre-stored real data in a first preset database is judged, when the first application program is not allowed to acquire the real data, namely the first application program is not authorized to acquire the real data, virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the first application program can normally run according to the virtual data, the real data can be protected to the maximum extent, the real data is prevented from being acquired by the first application program and being leaked, and therefore the safety of the terminal is improved, and in addition, if the first application program is allowed to acquire the real data, the real data is searched in the first preset database, the real data is sent directly to the first application.
In the foregoing technical solution, preferably, the searching for the virtual data corresponding to the real data in the first preset database specifically includes: acquiring at least one keyword in the real data according to the received acquisition instruction; searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword; sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
In the technical scheme, searching virtual data corresponding to real data in a preset database specifically comprises: at least one keyword such as time information, place information, character information, event information and the like in real data is firstly obtained, a first preset database corresponding to the data type of each keyword in the at least one keyword is searched for a virtual word corresponding to each keyword, then each keyword is sequentially replaced by the virtual words, so that the virtual data corresponding to the real data is obtained from the real data, and therefore the virtual data can achieve the effect of being falsified compared with the real data, for example, a short message in a mobile phone is sent by a mobile phone with the number of 12312341234, and the content of the short message, namely the real data is' today 8: 30 meet with zhang san in the Shangri-La Hotel ", obtaining keywords including, but not limited to, time information: today 8: 30, location information: Shangri-La Hotel, character information: and thirdly, in the short message database, the virtual words sequentially corresponding to the keywords are as follows: time information: tomorrow 8: 30, location information: happy hotel, character information: lie four, the virtual data obtained from the real data is "tomorrow 8: 30 and lie on a happy hotel meeting ", certainly, the real data and the virtual data may also be numbers, irregular graphs, labels, and the like, for example, 12312341234 is a mobile phone number of a contact person, and the virtual data 45645674567 corresponding to the number may be obtained by searching in a contact information database, so that when the first application program is not authorized to obtain the real data in the second application program, the first application program obtains the virtual data, thereby ensuring that the first application program can normally operate, and simultaneously protecting the real data in the second application program to the maximum extent, and preventing the real data from being leaked after being obtained by the first application program, thereby improving the security of the terminal.
In the foregoing technical solution, before the first application program acquires the virtual data, the method preferably further includes: determining an application scene of the real data according to the at least one keyword; searching scene data bound with the application scene in a second preset database according to the application scene; and merging the virtual data and the scene data so that the first application program obtains the merged final virtual data.
In the technical scheme, an application scene of real data is determined according to at least one keyword in the real data, scene data bound with the application scene is searched in a second preset database according to the application scene, and finally, the virtual data and the scene data are combined to obtain final virtual data, wherein the scene data can be a common phrase in the application scene, for example, the content of a short message in a mobile phone, that is, the real data is' today 8: 30 and zhang san in the Shanglira hotel, determining the application scene corresponding to the real data as a meeting scene according to the keyword ' meeting ', wherein the scene data searched in the database corresponding to the meeting scene is ' please bring relevant contract information ', because the keyword is equal to ' today 8: 30 preliminary virtual data corresponding to zhang san in the Shangri-La Hotel "is" tomorrow 8: 30 and lie four meet at the delicatessen hotel "so that the final virtual data after merging is" tomorrow 8: 30 and lie IV meet at a delightful hotel, please bring relevant contract information together ", thus adding scene data in the virtual data to ensure that the virtual data is more real and accords with logic, thereby achieving the effect of falseness and falseness of the virtual data, and thus, the first application program acquires the virtual data, thereby ensuring that the first application program can normally run, simultaneously protecting the real data in the second application program to the maximum extent, avoiding the real data from being leaked after being acquired by the first application program, and further improving the safety of the terminal.
In the foregoing technical solution, preferably, when a plurality of virtual words corresponding to any keyword in the at least one keyword are searched in a first preset database corresponding to the keyword, a target virtual word with the highest use frequency is selected from the plurality of virtual words as a virtual word corresponding to the keyword according to a principle that the use frequency is the highest; and the data search method further comprises: the attribute type of the real data is the same as the attribute type of the virtual data, wherein the attribute type comprises at least one of the following types: contact phone, name, mailbox address, head portrait.
In the technical scheme, when a plurality of virtual words corresponding to any keyword are searched in a first preset database corresponding to any keyword in at least one keyword, the virtual word with the highest use frequency in the plurality of virtual words is used as the virtual word of any keyword, so that a terminal can intelligently select a common virtual word from the plurality of virtual words to replace the keyword, manual selection of the virtual word by a user is avoided, and user experience is improved, and in addition, the attribute type of real data is the same as that of virtual data, for example: the attribute type of the real data is a mailbox address, and the attribute type of the virtual data obtained after the real data is subjected to pseudo processing is also the mailbox address, so that the real data is ensured to be similar to the virtual data to the greatest extent, the virtual data can achieve the effect of being falsified, so that the first application program obtains the virtual data instead of the real data, and the real data is protected, wherein the attribute type includes but is not limited to at least one of the following types: contact phone, name, mailbox address, avatar, for example, also place, voice information, video information, etc.
In the above technical solution, preferably, according to a received first storage instruction, each keyword and a virtual word corresponding to each keyword are correspondingly stored in a first preset database corresponding to a data type of each keyword; and correspondingly storing the application scene and scene data bound with the application scene in the first preset database according to the received second storage instruction.
In the technical scheme, the keywords and the virtual words corresponding to the keywords are correspondingly stored in the first preset database corresponding to the data type of the keywords, so that the virtual words corresponding to the keywords can be determined in the first database according to the keywords, and the virtual data corresponding to the real data can be determined.
Fig. 2 shows a flow diagram of a data search method according to another embodiment of the present invention.
As shown in fig. 2, a data search method according to another embodiment of the present invention (in this embodiment, the terminal is a mobile phone) includes:
In step 218, the obtained final virtual data is transmitted back to the first application program, so that the first application program obtains the final virtual data, thereby protecting the real data to the maximum extent while the application program can operate normally, and preventing the real data from being leaked due to the acquisition of the application program, thereby improving the security of the terminal.
In addition, in the above technical solution, the method further includes: the mobile phone can flexibly select whether to generate the virtual data according to the real-time requirements of the user, specifically, when the terminal runs some application programs which can access the real data, a dialog box which can allow the application programs to access appears, and when the application programs are allowed to access the real data, the mobile phone can inquire whether a function of generating the virtual data is started. If the function of generating the virtual data is started, when the application program acquires the real data, the mobile phone generates corresponding virtual data according to the attribute type (short message, call record, mail, address book and the like) of the real data to be acquired by the application program. The virtual data is corresponding to the format, type and the like of the real data, and the effect of falsifying and falsifying can be achieved. In this way, the virtual data is obtained by the application program, and the real data is correspondingly protected.
Before generating the virtual data, a feature library (a first preset database) and a context-aware library (a second preset database) of various attribute types can be established in the mobile phone. For example, the text content of the short message corresponds to a feature library of the text content of the short message, the address book corresponds to a feature library of the address book, and the mail content corresponds to a feature library of the mail content. These feature libraries are a structure similar to conditions plus decisions, indicating what decisions need to be made under what conditions are met. Before the feature library works, the feature library needs to be trained through a data source (keywords). The data sources are also the same structure of conditions plus decisions, and each piece of data corresponds to information about what kind of decision is made under a certain condition. After training of a large number of data sources (according to the principle of highest use frequency, selecting a target virtual word with the highest use frequency from a plurality of virtual words as a virtual word corresponding to any keyword), the feature library can make relevant decisions according to conditions more accurately. The user can also train the feature library, and can set conditions and make decisions by himself to be added to the feature library. The context-aware library is similar to the feature library, but is responsible for generating more logical virtual data (determining an application scenario of real data according to at least one keyword; searching a second preset database for scenario data bound with the application scenario according to the application scenario; merging the virtual data and the scenario data so that the first application program obtains the merged final virtual data), and after the feature library and the context-aware library are obtained, the virtual data can be generated through the context-aware library.
Fig. 3 shows a flow diagram of a data search method according to yet another embodiment of the present invention.
As shown in fig. 3, a data search method according to another embodiment of the present invention (in this embodiment, the terminal is a mobile phone) includes:
Fig. 4 shows a schematic structural diagram of a data search apparatus according to an embodiment of the present invention.
As shown in fig. 4, a data search apparatus 400 according to an embodiment of the present invention includes: a determining unit 402 and a first searching unit 404, where the determining unit 402 is configured to determine whether to allow a first application program in a terminal to acquire real data pre-stored in a first preset database when the first application program requests to acquire the real data in a second application program; a first searching unit 404, configured to search, according to a received search command, virtual data corresponding to the real data in the first preset database so that the first application program obtains the virtual data when the determination result is negative; otherwise, searching the real data in the first preset database according to the searching command.
In the technical scheme, when a first application program in a terminal requests to acquire real data in a second application program during running, whether the first application program is allowed to acquire the pre-stored real data in a first preset database is judged, when the first application program is not allowed to acquire the real data, namely the first application program is not authorized to acquire the real data, virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the first application program can normally run according to the virtual data, the real data can be protected to the maximum extent, the real data is prevented from being acquired by the first application program and being leaked, and therefore the safety of the terminal is improved, and in addition, if the first application program is allowed to acquire the real data, the real data is searched in the first preset database, the real data is sent directly to the first application.
In the foregoing technical solution, preferably, the first searching unit 404 is specifically configured to: acquiring at least one keyword in the real data according to the received acquisition instruction; searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword; sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
In the technical scheme, searching virtual data corresponding to real data in a preset database specifically comprises: at least one keyword such as time information, place information, character information, event information and the like in real data is firstly obtained, a first preset database corresponding to the data type of each keyword in the at least one keyword is searched for a virtual word corresponding to each keyword, then each keyword is sequentially replaced by the virtual words, so that the virtual data corresponding to the real data is obtained from the real data, and therefore the virtual data can achieve the effect of being falsified compared with the real data, for example, a short message in a mobile phone is sent by a mobile phone with the number of 12312341234, and the content of the short message, namely the real data is' today 8: 30 meet with zhang san in the Shangri-La Hotel ", obtaining keywords including, but not limited to, time information: today 8: 30, location information: Shangri-La Hotel, character information: and thirdly, in the short message database, the virtual words sequentially corresponding to the keywords are as follows: time information: tomorrow 8: 30, location information: happy hotel, character information: lie four, the virtual data obtained from the real data is "tomorrow 8: 30 and lie on a happy hotel meeting ", certainly, the real data and the virtual data may also be numbers, irregular graphs, labels, and the like, for example, 12312341234 is a mobile phone number of a contact person, and the virtual data 45645674567 corresponding to the number may be obtained by searching in a contact information database, so that when the first application program is not authorized to obtain the real data in the second application program, the first application program obtains the virtual data, thereby ensuring that the first application program can normally operate, and simultaneously protecting the real data in the second application program to the maximum extent, and preventing the real data from being leaked after being obtained by the first application program, thereby improving the security of the terminal.
In the above technical solution, preferably, the method further includes: a determining unit 406, configured to determine an application scenario of the real data according to the at least one keyword before causing the first application to acquire the virtual data; a second searching unit 408, which searches scene data bound with the application scene in a second preset database according to the application scene; a merging unit 410, merging the virtual data and the scene data, so that the first application program obtains the merged final virtual data.
In the technical scheme, an application scene of real data is determined according to at least one keyword in the real data, scene data bound with the application scene is searched in a second preset database according to the application scene, and finally, the virtual data and the scene data are combined to obtain final virtual data, wherein the scene data can be a common phrase in the application scene, for example, the content of a short message in a mobile phone, that is, the real data is' today 8: 30 and zhang san in the Shanglira hotel, determining the application scene corresponding to the real data as a meeting scene according to the keyword ' meeting ', wherein the scene data searched in the database corresponding to the meeting scene is ' please bring relevant contract information ', because the keyword is equal to ' today 8: 30 preliminary virtual data corresponding to zhang san in the Shangri-La Hotel "is" tomorrow 8: 30 and lie four meet at the delicatessen hotel "so that the final virtual data after merging is" tomorrow 8: 30 and lie IV meet at a delightful hotel, please bring relevant contract information together ", thus adding scene data in the virtual data to ensure that the virtual data is more real and accords with logic, thereby achieving the effect of falseness and falseness of the virtual data, and thus, the first application program acquires the virtual data, thereby ensuring that the first application program can normally run, simultaneously protecting the real data in the second application program to the maximum extent, avoiding the real data from being leaked after being acquired by the first application program, and further improving the safety of the terminal.
In the foregoing technical solution, preferably, when a plurality of virtual words corresponding to any keyword in the at least one keyword are searched in a first preset database corresponding to the keyword, the selecting unit 412 selects a target virtual word with the highest use frequency from the plurality of virtual words as a virtual word corresponding to the keyword according to a principle that the use frequency is the highest; and the data search apparatus 400 further comprises: the attribute type of the real data is the same as the attribute type of the virtual data, wherein the attribute type comprises at least one of the following types: contact phone, name, mailbox address, head portrait.
In the technical scheme, when a plurality of virtual words corresponding to any keyword are searched in a first preset database corresponding to any keyword in at least one keyword, the virtual word with the highest use frequency in the plurality of virtual words is used as the virtual word of any keyword, so that a terminal can intelligently select a common virtual word from the plurality of virtual words to replace the keyword, manual selection of the virtual word by a user is avoided, and user experience is improved, and in addition, the attribute type of real data is the same as that of virtual data, for example: the attribute type of the real data is a mailbox address, and the attribute type of the virtual data obtained after the real data is subjected to pseudo processing is also the mailbox address, so that the real data is ensured to be similar to the virtual data to the greatest extent, the virtual data can achieve the effect of being falsified, so that the first application program obtains the virtual data instead of the real data, and the real data is protected, wherein the attribute type includes but is not limited to at least one of the following types: contact phone, name, mailbox address, avatar, for example, also place, voice information, video information, etc.
In the foregoing technical solution, preferably, the first storage unit 414, according to a received first storage instruction, correspondingly stores each keyword and a virtual word corresponding to each keyword in a first preset database corresponding to a data type of each keyword; and a second storage unit 416, configured to correspondingly store the application scene and the scene data bound to the application scene in the first preset database according to the received second storage instruction.
In the technical scheme, the keywords and the virtual words corresponding to the keywords are correspondingly stored in the first preset database corresponding to the data type of the keywords, so that the virtual words corresponding to the keywords can be determined in the first database according to the keywords, and the virtual data corresponding to the real data can be determined.
Fig. 5 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
As shown in fig. 5, a terminal 500 according to an embodiment of the present invention includes the data search apparatus 400 according to any of the above-mentioned technical solutions.
In the technical scheme, when the first application program is not allowed to acquire the real data, the virtual data corresponding to the real data is searched in the first preset database, so that the first application program acquires the virtual data and does not acquire the real data, the application program can normally run, the real data can be protected to the maximum extent, the real data is prevented from being leaked due to acquisition of the real data by the first application program, and the safety of the terminal 500 is improved.
The technical scheme of the present invention is described in detail with reference to the drawings, so that the application program obtains virtual data (i.e. pseudo data) corresponding to the real data, and the application program can operate normally according to the virtual data, and simultaneously protect the real data to the greatest extent, and prevent the real data from being obtained and leaked by the application program, thereby improving the security of the terminal.
In the present invention, the terms "first", "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance; the term "plurality" means two or more. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (7)
1. A method of searching data, comprising:
when a first application program in a terminal requests to acquire real data in a second application program, judging whether the first application program is allowed to acquire the real data prestored in a first preset database;
if not, searching virtual data corresponding to the real data in the first preset database according to a received search command so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command;
acquiring at least one keyword in the real data according to the received acquisition instruction;
before causing the first application to acquire the virtual data, further comprising:
determining an application scene of the real data according to the at least one keyword;
searching scene data bound with the application scene in a second preset database according to the application scene;
merging the virtual data and the scene data so that the first application program obtains merged final virtual data;
the searching for the virtual data corresponding to the real data in the first preset database specifically includes:
searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword;
sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
2. The data search method of claim 1,
when a plurality of virtual words corresponding to any keyword in the at least one keyword are searched in a first preset database corresponding to the keyword, selecting a target virtual word with the highest use frequency from the plurality of virtual words as a virtual word corresponding to the keyword according to the principle of the highest use frequency; and
the data search method further includes:
the attribute type of the real data is the same as the attribute type of the virtual data, wherein,
the attribute types include at least one of the following types: contact phone, name, mailbox address, head portrait.
3. The data search method according to claim 1 or 2,
according to a received first storage instruction, correspondingly storing each keyword and a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword; and
and correspondingly storing the application scene and scene data bound with the application scene in the first preset database according to the received second storage instruction.
4. A data search apparatus, comprising:
the judging unit is used for judging whether the first application program is allowed to acquire the real data prestored in the first preset database or not when the first application program in the terminal requests to acquire the real data in the second application program;
the first searching unit is used for searching virtual data corresponding to the real data in the first preset database according to a received searching command when the judgment result is negative so that the first application program can acquire the virtual data; otherwise, searching the real data in the first preset database according to the searching command;
the first search unit is specifically configured to:
acquiring at least one keyword in the real data according to the received acquisition instruction;
a determining unit that determines an application scenario of the real data according to the at least one keyword before causing the first application to acquire the virtual data;
the second searching unit is used for searching scene data bound with the application scene in a second preset database according to the application scene;
a merging unit, which merges the virtual data and the scene data, so that the first application program obtains the merged final virtual data;
the first search unit is further configured to:
searching a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to the data type of each keyword in the at least one keyword;
sequentially replacing each keyword with a virtual word corresponding to each keyword to obtain virtual data corresponding to the real data, wherein the keywords comprise: and at least one of time information, place information and event information in the real data.
5. The data search apparatus according to claim 4,
the selection unit is used for selecting a target virtual word with the highest use frequency from the plurality of virtual words as a virtual word corresponding to any keyword according to the principle of the highest use frequency when the plurality of virtual words corresponding to the any keyword are searched in a first preset database corresponding to the keyword in the at least one keyword; and
the data search apparatus further includes:
the attribute type of the real data is the same as the attribute type of the virtual data, wherein,
the attribute types include at least one of the following types: contact phone, name, mailbox address, head portrait.
6. The data search apparatus according to claim 4 or 5,
the first storage unit is used for correspondingly storing each keyword and a virtual word corresponding to each keyword in a first preset database corresponding to the data type of each keyword according to a received first storage instruction; and
and the second storage unit correspondingly stores the application scene and the scene data bound with the application scene in the first preset database according to the received second storage instruction.
7. A terminal, comprising: a data search apparatus as claimed in any of claims 4 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510044118.9A CN105630854B (en) | 2015-01-28 | 2015-01-28 | Data searching method, data searching device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510044118.9A CN105630854B (en) | 2015-01-28 | 2015-01-28 | Data searching method, data searching device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105630854A CN105630854A (en) | 2016-06-01 |
CN105630854B true CN105630854B (en) | 2020-07-03 |
Family
ID=56045795
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510044118.9A Expired - Fee Related CN105630854B (en) | 2015-01-28 | 2015-01-28 | Data searching method, data searching device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105630854B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109213551A (en) * | 2017-07-06 | 2019-01-15 | 阿里巴巴集团控股有限公司 | A kind of user interface process method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103533026A (en) * | 2013-09-22 | 2014-01-22 | 四川智爱电子信息科技有限责任公司 | Cloud platform-based mobile phone contact list information disguising method |
CN104102358A (en) * | 2014-07-18 | 2014-10-15 | 北京奇虎科技有限公司 | Privacy information protecting method and privacy information protecting device |
CN104200175A (en) * | 2014-08-27 | 2014-12-10 | 华为技术有限公司 | Information protection method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8065286B2 (en) * | 2006-01-23 | 2011-11-22 | Chacha Search, Inc. | Scalable search system using human searchers |
-
2015
- 2015-01-28 CN CN201510044118.9A patent/CN105630854B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103533026A (en) * | 2013-09-22 | 2014-01-22 | 四川智爱电子信息科技有限责任公司 | Cloud platform-based mobile phone contact list information disguising method |
CN104102358A (en) * | 2014-07-18 | 2014-10-15 | 北京奇虎科技有限公司 | Privacy information protecting method and privacy information protecting device |
CN104200175A (en) * | 2014-08-27 | 2014-12-10 | 华为技术有限公司 | Information protection method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105630854A (en) | 2016-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7836134B2 (en) | E-mail address inspection | |
US11093303B2 (en) | Notification message processing method and apparatus | |
US11681757B2 (en) | Similar email spam detection | |
AU2015202478A1 (en) | Combining internal and external search results | |
CN104852883A (en) | Method and system for protecting safety of account information | |
US20170339006A1 (en) | Alert generation based on proximate events identified by source data analytics | |
KR102144868B1 (en) | Apparatus and method for providing call record | |
US20190258825A1 (en) | System and Method for Data Masking and Managing Communications | |
CN110060656B (en) | Model management and speech synthesis method, device and system and storage medium | |
JP2017526995A (en) | Dual channel identification and authentication | |
CN104980404B (en) | Method and system for protecting account information security | |
US9633084B2 (en) | Information searching method and device, and computer storage medium | |
CN108875364A (en) | Menace determination method, device, electronic equipment and the storage medium of unknown file | |
CN106547791A (en) | A kind of data access method and system | |
CN105630855A (en) | File sharing method, file sharing system and terminal | |
US8402043B2 (en) | Analytics of historical conversations in relation to present communication | |
CN105790948A (en) | Identity authentication method and identity authentication device | |
WO2016145849A1 (en) | Short message security management method, device and terminal | |
US9288244B2 (en) | Managing a collaborative space | |
CN105630854B (en) | Data searching method, data searching device and terminal | |
CN105490913B (en) | Instant message processing method and device | |
CN109388558A (en) | A kind of method, apparatus, equipment and storage medium managing electronic equipment | |
CN108513659B (en) | Searching and retrieving keying data maintained using a keying database | |
CN106612283B (en) | Method and device for identifying source of downloaded file | |
EP3193559B1 (en) | Information processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200703 Termination date: 20220128 |
|
CF01 | Termination of patent right due to non-payment of annual fee |