CN-121980627-A - Privacy protection method, system, equipment, medium and product of terminal equipment
Abstract
The application provides a privacy protection method, a privacy protection system, privacy protection equipment, privacy protection media and privacy protection products for terminal equipment, and relates to the technical field of intelligent terminals. The method comprises the steps of responding to privacy protection instructions triggered by a user on terminal equipment, analyzing the privacy protection instructions to generate control signals, calling a bottom layer driver to receive the control signals and send the control signals to a hardware circuit, controlling the on or off of a power supply of at least one sensing device based on the control signals through the hardware circuit, and the sensing device is used for collecting environment information and/or user information. The privacy protection instruction triggered by the user is analyzed through software, and the bottom layer driver is called to directly control the hardware circuit, so that the power supply of various sensing devices on the terminal equipment is quickly and accurately switched on and off, the power supply of the sensing devices is cut off at a physical level, and reliable privacy protection capability and use safety of the terminal equipment are provided for the user.
Inventors
- CHENG TAO
- LIU YANG
Assignees
- 深圳市一曌科技有限公司
Dates
- Publication Date
- 20260505
- Application Date
- 20260211
Claims (15)
- 1. A method for protecting privacy of a terminal device, the method comprising: responding to a privacy protection instruction triggered by a user on the terminal equipment, analyzing the privacy protection instruction, and generating a control signal; calling a bottom layer driver to receive the control signal and sending the control signal to a hardware circuit; and the hardware circuit is used for controlling the on-off of the power supply of at least one sensing device based on the control signal, and the sensing device is used for collecting environment information and/or user information.
- 2. The method of claim 1, wherein the controlling, by the hardware circuit, the on or off of the power to the at least one sensing device based on the control signal comprises: And controlling the on or off of the power supply of all the sensing devices based on the control signals through the hardware circuit.
- 3. The method of claim 1, wherein the responding to privacy preserving instructions triggered by a user on the terminal device comprises: And responding to touch operation of an operation interface of a user on the terminal equipment, and triggering the privacy protection instruction.
- 4. The method according to claim 1, wherein the method further comprises: after the power supply of the at least one sensing device is turned on or off, traversing nodes of all sensing devices registered in a power supply tree; and acquiring and checking the working states of the sensing devices according to the order of the nodes, and returning the working states to an application layer so as to perform visual display on the terminal equipment.
- 5. The method according to claim 4, wherein the method further comprises: If the working state of any sensing device is detected to be abnormal, the hierarchical power-off operation is executed based on the sequence of the nodes, and/or abnormal prompt information is generated.
- 6. The method of claim 5, wherein the performing a hierarchical power down operation based on the order of the nodes comprises: controlling the hardware circuit to turn off a power supply corresponding to the abnormal sensing device; If the power supply of the abnormal sensing device fails to be turned off, or the working state of the abnormal sensing device still indicates abnormality after the power supply fails to be turned off, gradually and upwards tracing and sequentially turning off all levels of power supplies for the abnormal sensing device according to the sequence of the nodes until the working states of all the sensing devices are checked to be normal.
- 7. The method of claim 1, wherein the underlying driver communicates with the hardware circuit via a predetermined communication protocol to transmit the control signal.
- 8. The method of claim 1, wherein the hardware circuit is integrated within a power management integrated circuit or the hardware circuit is the power management integrated circuit.
- 9. The method according to claim 1, wherein the method further comprises: After the power supply of the at least one sensing device is conducted, controlling to execute initialization operation on the at least one sensing device, wherein the initialization operation comprises the operation environment, a communication interface with the hardware circuit and a register mapping relation.
- 10. The method according to claim 1, wherein the method further comprises: after the hardware circuit performs a turning operation between on and off of the power supply of the at least one sensing device based on the control signal, writing the power supply state of each sensing device of the at least one sensing device; after the writing is finished, reading the power state of each sensing device; And according to the read power state, checking whether the turned power state is consistent with the expected state.
- 11. A privacy preserving system for a terminal device, the system employing a hierarchical architecture, the system comprising: the user interaction layer is used for receiving privacy protection instructions triggered by a user on the terminal equipment; the control logic layer is used for receiving and analyzing the privacy protection instruction and generating a control signal; the hardware execution layer comprises a bottom layer driver, is used for receiving the control signal and is communicated with the hardware circuit so as to send the control signal; The hardware circuit is used for receiving the control signal and controlling the on or off of the power supply of at least one sensing device based on the control signal, and the sensing device is used for collecting environment information and/or user information.
- 12. A privacy preserving apparatus of a terminal device, the apparatus comprising: The analysis module is used for responding to privacy protection instructions triggered by a user on the terminal equipment, analyzing the privacy protection instructions and generating control signals; The sending module is used for calling a bottom layer driver to receive the control signal and sending the control signal to a hardware circuit; the control module is used for controlling the on-off of the power supply of at least one sensing device based on the control signal through the hardware circuit, and the sensing device is used for collecting environment information and/or user information.
- 13. The terminal equipment is characterized by comprising at least one sensing device, a hardware circuit, a memory and a processor; the hardware circuit is used for controlling the on-off of the power supply of the at least one sensing device; the memory stores computer-executable instructions; the processor executing computer-executable instructions stored in the memory, causing the processor to perform the method of any one of claims 1-10.
- 14. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to carry out the method of any one of claims 1-10.
- 15. A computer program product comprising a computer program which, when executed by a processor, implements the method of any of claims 1-10.
Description
Privacy protection method, system, equipment, medium and product of terminal equipment Technical Field The application relates to the technical field of intelligent terminals, in particular to a privacy protection method, a privacy protection system, privacy protection equipment, privacy protection media and privacy protection products for terminal equipment. Background In the digital era, the intelligent terminal is deeply integrated into daily life, and various integrated sensing devices such as a camera, a microphone, a sensor and the like continuously collect environment information and user information while providing convenient services, so that personal privacy faces continuous and hidden leakage risks. In the prior art, rights management at the operating system or application software level is mainly relied upon, for example, sensor access rights of individual applications are manually authorized or closed by a user. However, the above-mentioned relying users manually manage the sensing devices one by one, which is complicated in operation and easy to miss, and is difficult to deal with the sudden privacy protection requirement, and secondly, because the existing scheme is still remained at the software authority management and control level, the authority is easily bypassed by unauthorized software, and a certain security risk exists. Disclosure of Invention The application provides a privacy protection method, a system, equipment, a medium and a product of terminal equipment, which analyze privacy protection instructions triggered by users through software and call a bottom layer driver to directly control a hardware circuit, so that the quick and accurate on-off of power supplies of various sensing devices on the terminal equipment is realized, the power supplies of the sensing devices are cut off at a physical level, and reliable privacy protection capability is provided for the users. In a first aspect, the present application provides a privacy protection method for a terminal device, where the method includes: Responding to a privacy protection instruction triggered by a user on terminal equipment, analyzing the privacy protection instruction, and generating a control signal; calling a bottom layer driver to receive a control signal and sending the control signal to a hardware circuit; the power supply of at least one sensing device is controlled to be turned on or off based on the control signal through the hardware circuit, and the sensing device is used for collecting environment information and/or user information. Therefore, unified control of the power state of at least one sensing device can be realized by responding to a single privacy protection instruction, so that complicated operations of manually managing application or sensor authority one by a user are avoided, privacy protection flow is simplified, and operation efficiency is improved. And the physical on-off of the power supply of the sensing device is directly controlled through the hardware circuit, the power supply of the sensing device is cut off from the power supply source, the risk that unauthorized software bypasses the operating system or the authority management and control of the application software layer is effectively prevented, and deeper and more thorough privacy protection is realized. And by establishing a direct control path from a privacy protection instruction triggered by a user to hardware execution, a conventional software authority management system is bypassed, a control mechanism is converted from an operating system and application software level to a hardware circuit level, and the robustness and the credibility of privacy protection are enhanced. Therefore, the application can effectively avoid the risk of disclosure of personal privacy information caused by continuous operation of the sensing device, provides a convenient and reliable privacy protection way for users, and enhances the privacy security sense of the users in the process of using the electronic equipment. In addition, based on the design, the sudden privacy protection requirement of a user can be responded quickly, the instant physical blocking or recovery of the function of the sensing device is realized through hardware-level control, and the hysteresis of the gradual setting of the existing software scheme is avoided. Optionally, controlling, by the hardware circuit, on or off of the power supply of the at least one sensing device based on the control signal includes: The on or off of the power supply of all the sensing devices is controlled by a hardware circuit based on the control signal. Therefore, the application can cut off or recover the power supply of all the sensing devices at one time through a single privacy protection instruction, avoids the operation burden that a user needs to respectively manage a plurality of sensors, and provides extremely simple global privacy protection operation. And because all the sensing