CN105190590A - Methods and systems for managing data and/or services for devices - Google Patents

Methods and systems for managing data and/or services for devices Download PDF

Info

Publication number
CN105190590A
CN105190590A CN201480024191.3A CN201480024191A CN105190590A CN 105190590 A CN105190590 A CN 105190590A CN 201480024191 A CN201480024191 A CN 201480024191A CN 105190590 A CN105190590 A CN 105190590A
Authority
CN
China
Prior art keywords
particular device
module
access
agency
device protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201480024191.3A
Other languages
Chinese (zh)
Other versions
CN105190590B (en
Inventor
爱德华·K·Y·荣格
罗伊斯·A·莱维恩
理查德·T·洛德
罗伯特·W·洛德
马克·A·马拉默德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Elwha LLC
Original Assignee
Elwha LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/781,194 external-priority patent/US10216957B2/en
Application filed by Elwha LLC filed Critical Elwha LLC
Publication of CN105190590A publication Critical patent/CN105190590A/en
Application granted granted Critical
Publication of CN105190590B publication Critical patent/CN105190590B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Abstract

Computationally implemented methods and systems include acquiring data regarding an application configured to access one or more protected portions of a particular device, said application configured to provide one or more services, detecting that the application has completed at least one of the one or more services and that the application maintains access to the one or more protected portions of the particular device, presenting information indicating that the one or more services are completed and that the application maintains access to the one or more protected portions of the particular device, and circuitry for facilitating presentation of an option to discontinue the access of the application to the one or more protected portions of the particular device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.

Description

Method and system for management data and/or the service for equipment
Earlier application and related application and earlier application and related application arbitrarily and all themes of the application of all female cases, grandmother's case, great grandmother's case etc. (comprising any prior claims) by way of reference with these themes with there is no inconsistent degree herein and be incorporated herein.
Background
The application relates to data, services.
Summary of the invention
In one or more, a kind of method includes but not limited to: the data obtaining the application about being configured to one or more protection parts of accessing specific device, and described application is configured to provide one or more to serve; Detect application completed at least one in one or more services and applied the access maintained one or more protection parts of specific device; Present and show to complete one or more services and the information of application maintenance to the access of one or more protection parts of specific device; And promote to present option to interrupt applying the access to one or more protection parts of specific device.In addition to the above, form in the claims of the disclosed part set forth herein, accompanying drawing and text and describe additive method aspect.
In one or more, one or more related system can be limited to the patentability theme according to 35U.S.C.101 machine, material composition or manufacturing system in implement.One or more related system can include but not limited to circuit for implementing the method aspect mentioned herein and/or programming.Circuit and/or programming can in fact be the design alternative that is configured to according to system designer and be limited to the combination in any realizing the hardware of the method aspect mentioned, software and/or firmware according to the patentability theme of 35U.S.C.101 herein.
In one or more, a kind of system includes but not limited to: for obtaining the device of the data of the application about being configured to one or more protection parts of accessing specific device, described application is configured to provide one or more to serve; Complete at least one in one or more services for detecting application and applied the device maintained the access of one or more protection parts of specific device; Show to complete one or more services and the device of application maintenance to the information of the access of one or more protection parts of specific device for presenting; And present option to interrupt applying the device to the access of one or more protection parts of specific device for promoting.In addition to the above, form in the claims of the disclosed part set forth herein, accompanying drawing and text and describe other system aspect.
In one or more, a kind of system includes but not limited to: for obtaining the circuit of the data of the application about being configured to one or more protection parts of accessing specific device, described application is configured to provide one or more to serve; Complete at least one in one or more services for detecting application and applied the circuit maintained the access of one or more protection parts of specific device; Show to complete one or more services and the circuit of application maintenance to the information of the access of one or more protection parts of specific device for presenting; And present option to interrupt applying the circuit to the access of one or more protection parts of specific device for promoting.Apart from the above, form in the claims of the disclosed part set forth herein, accompanying drawing and text and describe other system aspect.
In one or more various method, a kind of computer program, comprise the signal bearing medium carrying one or more instruction, described one or more instruction includes but not limited to: for obtaining one or more instructions of the data of the application about being configured to one or more protection parts of accessing specific device, described application is configured to provide one or more to serve; Complete at least one in one or more services for detecting application and applied the one or more instructions maintained the access of one or more protection parts of specific device; Show to complete one or more services and the one or more instructions of application maintenance to the information of the access of one or more protection parts of specific device for presenting; And present option to interrupt applying the one or more instructions to the access of one or more protection parts of specific device for promoting.Apart from the above, form in the claims of the disclosed part set forth herein, accompanying drawing and text and describe other computer program aspects.
One or more various in, device is defined by computational language, described device is comprised: the one or more interchain physical machines ordering the data for obtaining the application about being configured to one or more protection parts of accessing specific device, described application is configured to provide one or more to serve; Order and completed at least one in one or more services for detecting application and applied the one or more interchain physical machines maintained the access of one or more protection parts of specific device; Order and show to complete one or more services and the one or more interchain physical machines of application maintenance to the information of the access of one or more protection parts of specific device for presenting; And order presents option to interrupt applying the one or more interchain physical machines to the access of one or more protection parts of specific device for promoting.
Apart from the above, set forth in the instruction of such as text of the present disclosure (such as, claims and/or embodiment) and/or accompanying drawing and describe various additive method and/or system and/or program product aspect.
Foregoing is general introduction and the letter that therefore can comprise details is talked about, summarizes, comprises and/or omitted; Therefore, those skilled in the art are to be understood that this general introduction is only illustrative, and are not intended to be construed as limiting by any way.Become apparent making other aspects, features and advantages of equipment described herein and/or method and/or other themes by referring to embodiment, corresponding accompanying drawing and/or the instruction of setting forth herein.
Accompanying drawing explanation
In order to comprehend embodiment, now by reference to the accompanying drawings with reference to following description.Use the project that identical mark ordinary representation is similar or identical in different figures, unless the context indicates otherwise.The exemplary embodiment described in embodiment, accompanying drawing and claims does not also mean that restriction.When not departing from the spirit or scope of theme disclosed herein, other embodiments can be utilized, and other amendments can be carried out.
Figure 1A shows the high level block diagram of the exemplary environments 100 according to embodiment.
Figure 1B shows the high level block diagram of the personal device 120 worked in exemplary environments 100 according to embodiment.
Fig. 1 C shows the high level block diagram of the personal device 120 worked in exemplary embodiment 100' according to embodiment and computing equipment 130A.
Fig. 1 D show according to embodiment in exemplary embodiment 100 " in the personal device 120 of work and the high level block diagram of computing equipment 130B.
Fig. 1 E show according to embodiment in exemplary embodiment 100 " ' in the personal device 120 of work and the high level block diagram of computing equipment 130C.
Fig. 1 F show according to embodiment in exemplary embodiment 100 " " in the personal device 120 of work and the high level block diagram of computing equipment 130D.
Fig. 2; comprising Fig. 2 A-2C, showing according to 152 of embodiment about being configured to provide one or more services and one or more particular device protection portion of optionally accessing the processing module 150 of the personal device 120 of Figure 1B divide the concrete skeleton view of the data of the agency obtaining module.
Fig. 3, comprises Fig. 3 A-3D, shows to stop according to agencies of 154 of embodiment one or more services and one or more particular device protection portion that agency continues the processing module 150 of the personal device 120 of access Figure 1B divide the concrete skeleton view of detection module.
Fig. 4, comprises Fig. 4 A-4C, shows and protects one or more services of the processing module 150 of the personal device 120 of part and Figure 1B to present the concrete skeleton view of designator of the stopping of module according to the one or more particular device of 156 continuation proxy access of embodiment.
Fig. 5, comprises Fig. 5 A-5D, shows and presents according to 158 of embodiment the concrete skeleton view stopping one or more particular device protection parts of the processing module 150 of the personal device 120 of proxy access Figure 1B to promote the option of module.
Fig. 6 is the high-level logic flowchart of the process according to embodiment, such as, and workflow diagram 600.
Fig. 7 A is the high-level logic flowchart depicting the process of the alternate embodiments obtaining data manipulation 602 according to one or more embodiment.
Fig. 7 B is the high-level logic flowchart depicting the process of the alternate embodiments obtaining data manipulation 602 according to one or more embodiment.
Fig. 7 C is the high-level logic flowchart depicting the process of the alternate embodiments obtaining data manipulation 602 according to one or more embodiment.
Fig. 8 A is the high-level logic flowchart depicting the process of the alternate embodiments having detected and continued accessing operation 604 according to one or more embodiment.
Fig. 8 B is the high-level logic flowchart depicting the process of the alternate embodiments having detected and continued accessing operation 604 according to one or more embodiment.
Fig. 8 C is the high-level logic flowchart depicting the process of the alternate embodiments having detected and continued accessing operation 604 according to one or more embodiment.
Fig. 8 D is the high-level logic flowchart depicting the process of the alternate embodiments having detected and continued accessing operation 604 according to one or more embodiment.
Fig. 9 A is the high-level logic flowchart depicting the process of the alternate embodiments presenting information operating 606 according to one or more embodiment.
Fig. 9 B is the high-level logic flowchart depicting the process of the alternate embodiments presenting information operating 606 according to one or more embodiment.
Fig. 9 C is the high-level logic flowchart depicting the process of the alternate embodiments presenting information operating 606 according to one or more embodiment.
Figure 10 A promotes to present the high-level logic flowchart of the process of the alternate embodiments of operation 608 according to depicting of one or more embodiment.
Figure 10 B promotes to present the high-level logic flowchart of the process of the alternate embodiments of operation 608 according to depicting of one or more embodiment.
Figure 10 C promotes to present the high-level logic flowchart of the process of the alternate embodiments of operation 608 according to depicting of one or more embodiment.
Figure 10 D promotes to present the high-level logic flowchart of the process of the alternate embodiments of operation 608 according to depicting of one or more embodiment.
Embodiment
In the following detailed description, with reference to the accompanying drawing of a part for formation instructions.In the accompanying drawings, similar mark identifies similar or identical assembly or project usually, unless be otherwise noted in context.The exemplary embodiment described in embodiment, accompanying drawing and claims does not also mean that restriction.When not departing from the spirit or scope of theme disclosed herein, other embodiments can be utilized, and other amendments can be carried out.
Therefore, according to various embodiment, calculate implement method, system, circuit, goods, article sequenced chain be designed to computer program (inter alia): be provided for obtaining the relevant interface being configured to the data of the application of one or more protection parts of access specific device, described application is configured to provide one or more to serve; Detect application completed at least one in one or more services and applied the access maintained one or more protection parts of specific device; Present and show to complete one or more services and the information of application maintenance to the access of one or more protection parts of specific device; And promote to present option to interrupt applying the access to one or more protection parts of specific device.
Claims of the application, instructions and accompanying drawing can describe one or more instant technology with operation/function language, such as, and one group of operation that computing machine will perform.In most of the cases, the description of these operation/function can be understood as the hardware of special configuration (such as by those skilled in the art, because multi-purpose computer is once be programmed to perform the specific function according to from the instruction of program software, in fact it just becomes special purpose computer).
Importantly, although it is that human thinking is understandable that operation/function as herein described describes, they are not the abstract concepts implementing the operation/function be separated from the calculating of these operation/function.On the contrary, operation/function represents the specification of computing machine for very complicated or other devices.Discuss in detail according to following, must at correct technical background, that is, as the concrete norm of physical implementation, reading operations/functional language.
Logical operation/function as herein described is other physical mechanisms that the distillation of machine specification or operation/function are specified, and makes otherwise the machine specification that cannot understand can be understood by human thinking.This distillation also allow those skilled in the art when being not limited to hardware configuration or the platform of specific supplier between the hardware configuration or platform of the supplier of many different specification adaptive technique operation/function describe.
Some current technology can be set forth with regard to logical operation/function and describe (such as, embodiment, accompanying drawing, claims etc.).Describe in more detail according to following paragraph, these logical operation/functions do not represent abstract concept, but represent static state or the sequence specification of various hardware element.In other words, unless otherwise indicated by context, logical operation/function is understood as the static state or sequence specification that represent various hardware element by those skilled in the art.Because those skilled in the art can be used for enforcement, disclosed in the technology of operation/function form elaboration, instrument---high-level programming language (such as, C, java, visualbasic) instrument of form or very-high-speed hardware descriptive language (" VHDL ", a kind ofly use the language of text description logical circuit) form instrument---be the static state of various hardware configuration or the maker of sequence specification, therefore this is genuine.Wide in range term " software " sometimes can fuzzy this be true, but, according to following explanation, it is understood to one skilled in the art that what be called as " software " is writing a Chinese character in simplified form of the very complicated exchange/specification of orderly matter essential factor.Term " orderly matter essential factor " can refer to physical computing assembly, such as, and the assembly of electronic logic door, the logic composition, quantum calculation mechanism etc. of molecular computing.
Such as, high-level programming language has such as from the programming language of abstract by force (such as, the multilevel abstract) of the details such as sequential organization, state, input, output of the actual machine of specifying of high-level programming language.See the Wikipedia of http://en.wikipedia.org/wiki/High-level_programming_language (on June 5th, 2012,21:00GMT) that such as can derive from website, High-levelprogramminglanguage.For the ease of human intelligible, in many instances, high-level programming language imitates or even shares the symbol of natural language.See the Wikipedia that such as can derive from website http://en.wikipedia.org/wiki/Natural_language (at 21:00GMT on June 5th, 2012), Naturallanguage.
Existing arguement, because high-level programming language use by force abstract (such as, they can imitate or the symbol of shared natural language), therefore they be " pure intelligence structure " (such as, " software " computer program or computer programming are the intelligence structure that cannot understand to a certain extent, because under high-level abstractions, it can be conceived by human thinking and understand).This argument has been that the technology of the function/operation format of " abstract concept " describes to a certain extent for being characterized in.In fact, be not like this in technical field (such as, information and communication technology (ICT)).
It is the instruction of abstract concept that high-level programming language uses the abstract by force so that fact of human intelligible should not be treated as to be expressed.In fact, it is understood to one skilled in the art that, just in time real by contrast.If high-level programming language be applicable to implement function/operation format technology disclosed in instrument, so those skilled in the art should be understood that, be far from abstract, coarse, " fuzzy " or " intelligence " in any remarkable semanteme sense, this instrument is the intimate precise sequence specification that cannot understand of specific calculation machine on the contrary, the part of this machine by from usually more generally computing machine start/select (such as, the clock time) change in time of these parts and set up.This fact that surface similarity between high-level programming language and natural language is sometimes fuzzy.These surface similarity also can cover the fact that high-level programming language implements finally to perform by setting up/controlling many different computing machines valuable work.
The many different computing machine that high-level programming language describes is almost unthinkable complexity.In essence, the hardware used in computing machine usually by some types being configured to form logic gate orderly material (such as, conventional electronics (such as, transistor), DNA (deoxyribonucleic acid) (DNA), quantum device, mechanical switch, optical element, flow element, pneumatic element, optical device (such as, interference of light device), molecule etc.) composition.Logic gate normally can electrically, mechanically, chemically or otherwise be driven to change physical state thus be set up the physical device of the physical reality of Boolean logic.
Logic gate can be configured to form logical circuit, and this logical circuit normally can electrically, mechanically, chemically or otherwise be driven the physical device of the physical reality setting up some logic function.The type of logical circuit comprises the devices such as such as multiplexer, register, ALU (ALU), computer memory, the device of every type can in conjunction with the physical device to form another type, such as, the central processing unit of central processing unit (CPU)-know most is microprocessor.Modern microprocessor comprises more than 100,000,000 logic gates (and usually more than 1,000,000,000 transistors) at its numerous logical circuit usually.See the Wikipedia of such as http://en.wikipedia.org/wiki/Logic_gates (on June 5th, 2012,21:03GMT), Logicgates.
The logical circuit forming microprocessor is configured to provide micro-architecture, the instruction that the instruction set architecture that execution is limited by microprocessor defines by this micro-architecture.Instruction set architecture relates to a part for the microprocessor architecture design of programming, comprises native data types, instruction, register, addressing mode, memory architecture, interruption and abnormality processing and outside I/O.See the Wikipedia of such as http://en.wikipedia.org/wiki/Computer_architecture (21:03GMT on June 5th, 2012), Computerarchitecture.
Instruction set architecture comprises the specification that programmer can be used for the machine language using/control microprocessor.Because machine language instruction can directly be performed by microprocessor, so machine language instruction is made up of the character string of binary digit or position usually.Such as, typical machine language instruction can have a lot of position long (such as, 32,64 or 128 character strings are general at present).Typical machine language instruction can adopt the form of " 11110000101011110000111100111111 " (32 bit instruction).
Here, importantly, although machine language instruction is written to sequence of binary digits, in reality, these binary digits specify physical reality.Such as, if use some semiconductor to become physical reality to make Boolean logic operation, in machine language instruction, surface is so that mathematics position " 1 " and " 0 " in fact form to specify in specific circuit and applies writing a Chinese character in simplified form of specific voltage.Such as, in some semiconductor technologies, binary number " 1 " in machine language instruction (such as, logical one) specify and be applied to concrete " circuit " (such as, metal trace on printed circuit board (PCB)) upper approximately+5V, and binary number " 0 " (such as, logical zero) in machine language instruction specifies the about-5V be applied on specific " circuit ".Except the voltage of specified machine configuration, these machine language instructions are also selected from up to a million logic gates of more common machine and are activated the logic gate of particular demographic.Therefore, be far from abstract mathematical expression, machine language instruction repertorie, even if write as a string 0 and 1, also specify physical machine or the physical machine state of various structure.
Machine language is most people's (such as, above-mentioned example is an instruction, and some personal computers execution per second instruction more than 2,000,000) that cannot understand normally.See the Wikipedia of such as http://en.wikipedia.org/wiki/Instructions_per_second (on June 5th, 2012,21:04GMT), Instructionspersecond.Therefore, program-its length being write as machine language may up to ten million machine language instructions-be to understand.Given this, develop the early stage assembly language of the numerical value having referred to machine language instruction instead of direct use machine language instruction since using mnemonic code (such as, in order to perform multiply operation, programmer will abridge " mult " encode, and it represents the binary number " 011000 " in MIPS machine code).Although assembly language greatly helps the mankind to control microprocessor execution work at first, as time goes by, the complexity of the work that human needs completes only uses assembly language to control the ability of microprocessor beyond the mankind.
In this point, notice that needs again and again complete same task, and the machine language completing these iterative tasks needs is identical.Given this, compiler is created.Compiler be adopt than machine language also or assembly language better by the statement of human intelligible, such as " add 2+2 and Output rusults ", and human understandable statement is construed to complexity, dull and huge machine language code (such as, the numeric string of 32,64 or 128 bit lengths up to a million).Therefore high-level programming language is translated into machine language by compiler.
Then the machine language of this compiling as above is used as technical manual, and this technical manual sequentially constructs and makes many different computing machine compounding practices make the tangible and concrete work useful to the mankind.Such as, as mentioned above, this machine language---compiled version of higher level lanquage---serves as the technical manual selecting hardware logic door, specified voltage level, voltage-transition calendar scheduling, makes to complete the work useful to the mankind by hardware.
Therefore, the technology of function/operation is described in those skilled in the art and it seems and be far from abstract concept.On the contrary, the technology of this function/operation is described in human understandable expression, its complicacy and specificity anyone understandability of super large part far away by being understood as that hardware specification when available instrument is understood in such as firm this area described on the contrary.Accordingly, those skilled in the art should be understood that, in view of the knowledge of disclosure herein and those skilled in the art, the technology of any this operation/function describes the operation that can be understood to be formed physical reality by the following: the physical machine of (a) one or more mutual link; B () is configured to the logic gate of the mutual link of the one or more physical machines setting up order of representation/combinational logic; C () composition logic gate (such as, the electron device of mutual link (such as, transistor), DNA, quantum device, mechanical switch, optical element, flow element, pneumatic element, molecule etc.) the orderly material of mutual link, described logic gate sets up the physical reality of presentation logic; Or (d) in fact aforementioned every any combination.In fact, there is stable, the measurable and any physical object of changeable state to can be used for describing based on above-mentioned technology building machine.Such as, CharlesBabbage built be made up of timber and the First computing machine of being powered by swinging handle.
Therefore, be far from and be interpreted as abstract concept, the technology of function/operation is described understanding by those skilled in that art almost cannot imagine complicated and the illustrative human understandable expression of the hardware of time sequencing for one or more.The technology description of function/operation can make it easily by not describing the instruction of the pure statement being abstract concept or abstract concept as the technology of these function/operations with the fact that the senior computational language (or pin high-level block diagram as to this) that natural language shares identical word, structure, phrase etc. is stated.In fact, according to what summarize herein, true really not so in technical field.When by those skilled in the art can tool observes time, the technology of these function/operations describes and is regarded as almost imagining complicated hardware configuration.
According to above-mentioned general introduction, the reason that the technology of using function/operation describes has two aspects at least.First, the technology of using function/operation describes machine and the machine operation of the almost limitless complexity allowing the hardware element of the mutual link be described from the mode that can will process with human thinking (such as, by natural imitation language and logical statements stream) to obtain.Secondly, the technology of using function/operation is described through to provide and contributes to those skilled in the art independent of the description of the hardware component of any specific supplier more or less and understand described theme.
The technology of using function/operation describes and contributes to those skilled in the art and understand described theme, although because obviously find out that the technology set forth this file can easily promptly not describe by people from above-mentioned discussion adapt into many trillion 1 and 0, the machine code of billions of single file compilation level, the middle abstraction hierarchy of millions of logic gates, thousands of gate array or any amount.But, if any this low-level technologies describes will replace current technology description, so those skilled in the art can run into too much difficulty when enforcement technology is open, because this low-level technology describes probably increase complicacy (such as, by describing the theme utilizing the agreement of the hardware component of one or more vendor-specific) when not having corresponding beneficial effect.Therefore, the technology of using function/operation is described through technology description separately helpful to those skilled in the art from the agreement of the hardware component of any vendor-specific.
According to foregoing, the logical operation/function set forth in current technology describes represents static state or the sequence specification of various orderly matter essential factor, so that this specification can be understood by human thinking and be suitable for creating numerous hardware configuration.Logical operation/function as herein described should be treated like this, and only should not be characterized by abstract concept scornfully, because these specifications represented by logical operation/function the mode of easy understand can present and apply in the mode of the hardware implementation independent of specific supplier with those skilled in the art.
Those skilled in the art will recognize that, prior art has developed into the hardware of the many aspects of system, software and/or firmware implementation and has only had very other degree of community; The use of hardware, software and/or firmware is generally the design alternative that (such was the case with but not, and in some contexts, the selection between hardware and software becomes very important) represents cost and efficiency tradeoff.Those skilled in the art will know, the various carriers that existence can make method described herein and/or system and/or other technologies play a role (such as, hardware, software and/or firmware), and preferred carrier can change according to the change of the background of employing method and/or system and/or other technologies.Such as, if implementer determines that speed and degree of accuracy are most important, so implementer can select main hardware and/or firmware vehicle; Alternately, if dirigibility is most important, so implementer can select main Software Implementation; Or moreover alternately, implementer can select one or more machines of the theme be limited to according to 35USC101 patentability, article combination and manufacture some combinations of hardware, software and/or firmware in goods.Therefore, there is several feasible carrier that method as herein described and/or equipment and/or other technologies can play a role, they are not better than other inherently, because any carrier that will utilize depends on that the selection of background of carrier and implementer's specifically consider (such as by adopting, speed, dirigibility or predictability), any one all may change.Person of skill in the art will appreciate that the optics aspect of embodiment adopts optics guiding hardware, software and/or firmware usually.
In embodiments more as herein described, logic and similar embodiment can comprise software or other control structures.Such as, electronic circuit can have the one or more current paths being constructed and being arranged to implement various function as herein described.In some embodiments, when the detectable instruction of the device operationally performed according to mode described herein is preserved or sent to this medium, one or more media can be configured to the detectable embodiment of load bearing equipment.In some variations, such as, embodiment can comprise reception by such as performing one or more instructions relevant to one or more operation as herein described or conveying and to the renewal of existing software or firmware or gate array or programmable hardware or amendment.Alternatively or additionally, in some variations, a kind of embodiment can comprise specialized hardware, software, fastener components and/or execution or call the general purpose module of personal module.Specification or other embodiments can by one or more examples of tangible transmission media as herein described, optionally by bag transmission or perhaps by transmitting via distribution medium transmission at different time.
Alternatively or additionally, embodiment can comprise for enabling, triggering, coordinate, ask or perhaps cause the special instruction sequence of in fact any feature operation generation one or many described herein or call circuit.In some variations, operation herein or other logical descriptions can be expressed as source code and be compiled as executable instruction sequence calling as executable instruction sequence in other words conj.or perhaps.In some cases, such as, embodiment can be provided by source code whole or in part, such as C++ or other code sequences.In other embodiments, use the source code of technology that is that be purchased and/or this area or the embodiment of other codes can be compiled/implement/translate/convert to high level description language (such as, the technology that original adoption C or C++ programming language describe, after this being converted to by programming language embodiment can the language embodiment of logic synthesis, hardware description language embodiment, Software for Design simulation embodiment and/or other similar form of presentation).Such as, some or all of logic statements (such as, computer programming language embodiment) Verilog class hardware description can be shown as (such as, by hardware description language (HDL) and/or Very High Speed Integrated Circuit (VHSIC) hardware description language (VHDL)) or may be used for other circuit models that foundation has the physical embodiments of hardware (such as, special IC) afterwards.It will be understood by those skilled in the art that according to these delivery element that how instruction obtains, allocation and optimization is suitable or computing element, material supply, actuator or other common structures.
Those skilled in the art will recognize that, generally device for carrying out said and/or process and/or system in this area, then use engineering and/or other practices by these devices implemented and/or process and/or the system integration in more complicated device and/or process and/or system.That is, can being integrated in other devices and/or process and/or system by the experiment of fair amount at least partially of device as herein described and/or process and/or system.One skilled in the art will realize that, the example of these other devices and/or process and/or system can comprise, in background with when applying suitable, the all or part device of the following and/or process and/or system: (a) air transportation (such as, aircraft, rocket, helicopter etc.); (b) ground transport (such as, automobile, truck, locomotive, tank, armored personnel carrier etc.); (c) building (such as, house, warehouse, office etc.); (d) facility (such as, refrigerator, washing machine, exsiccator etc.); (e) communication system (such as, network system, telephone system, ip voice system etc.); (f) business entity (such as, ISP (ISP) enterprise, such as, ComcastCable, Qwest, SouthwesternBell etc.); Or (g) wire/wireless service entities (such as, Sprint, Cingular, Nextel etc.) etc.
In some cases, even if assembly is positioned at outside certain scope, also system or method can be used in territory.Such as, in Distributed Calculation situation, even if it is outer (such as that the part of system can be positioned at certain scope, be positioned at this extraneous repeater, server, processor, signal bearing medium, transmission computing machine, receiving computer etc.), also can use distributed computing system within the scope of this.
Equally, though the assembly of system or method to be positioned at certain scope outer and/or use outward in certain scope, also can marketing system or method in this range.In addition, the embodiment at least partially for the system of manner of execution in a scope does not get rid of the system be used in another scope.
In general sense, one skilled in the art will realize that, various embodiment as herein described can by the following separately and/or common implementing: various types of Mechatronic Systems with far-ranging electronic component, such as, hardware, software, firmware and/or in fact their combination in any, be limited to the theme according to 35U.S.C.101 patentability; The far-ranging assembly of mechanical force or motion can be given, such as rigid body, spring body or reverse body, hydraulic means, electromechanical actuators and/or in fact their combination in any.Therefore, " Mechatronic Systems " as herein described comprises, but be not limited to: with transducer (such as, actuator, motor, piezoelectric crystal, MEMS (micro electro mechanical system) (MEMS) etc.) circuit that operationally combines, there is the circuit of at least one discrete circuit, there is the circuit of at least one integrated circuit, there is the circuit of at least one special IC, the universal computing device that formation is configured by computer program (such as, the multi-purpose computer configured by the computer program performing method as herein described and/or equipment at least in part, or by perform at least in part method as herein described and/or equipment computer program configure microprocessor) circuit, form the circuit of memory device (such as, various forms of storer (such as, random access memory, flash memory, ROM (read-only memory) etc.)), form communication facilities (such as, modulator-demodular unit, communication switchboard, optoelectronic device etc.) circuit, and/or the mimic channel of any non-electrical, such as optical analogy circuit or other mimic channels are (such as, circuit based on Graphene).Those skilled in the art also will appreciate that, the example of Mechatronic Systems includes but not limited to various consumer electronics system, medicine equipment and other system, such as motorized transport systems, factory's automatic system, security system and/or communication/computing system.It will be understood by those skilled in the art that " electromechanics " used herein may not be confined to have the system of electric actuator and mechanical actuator, outside showing unless otherwise.
Saying in general sense, those of skill in the art will recognize that the many aspects as herein described that can be implemented individually and/or jointly by far-ranging hardware, software, firmware and/or their combination in any can be regarded as to be made up of various types of " circuit ".Therefore, " circuit " used herein comprises, but be not limited to: the circuit with at least one discrete circuit, there is the circuit of at least one integrated circuit, there is the circuit of at least one special IC, formed by the universal computing device of computer system configurations (such as, the multi-purpose computer configured by the computer program performing method as herein described and/or equipment at least in part, or by perform at least in part method as herein described and/or equipment computer program configure microprocessor) circuit, form memory device (such as, form storer (such as, random access memory, flash memory, ROM (read-only memory) etc.)) circuit, and/or form communication facilities (such as, modulator-demodular unit, communication switchboard, optoelectronic device etc.) circuit.Those of skill in the art will recognize that theme as herein described may be embodied as analog or digital mode or their some combinations.
What it will be understood by those skilled in the art that equipment as herein described and/or method can be integrated in image processing system at least partially.One skilled in the art will realize that, it is one or more that typical image processing system generally comprises in following parts: system component housing, video display apparatus, the storer of such as volatibility or nonvolatile memory, the processor of such as microprocessor or digital signal processor, the computational entity of such as operating system, driver, application program, one or more interactive device (such as, Trackpad, touch-screen, antenna etc.), comprise backfeed loop and control motor (such as, for sensing the feedback of lens position and/or speed, for movement/distortion lens to provide the control motor of required focus) control system.Image processing system can utilize suitable commercially available assembly to implement, such as, and the element usually found in digital still system and/or digital motion systems.
What it will be understood by those skilled in the art that equipment as herein described and/or method can be integrated in data handling system at least partially.One skilled in the art will realize that, it is one or more that digital processing system generally comprises in following parts: system component housing, video display apparatus, the storer of such as volatibility or nonvolatile memory, the processor of such as microprocessor or digital signal processor, the computational entity of such as operating system, driver, graphic user interface, application program, one or more interactive device (such as, Trackpad, touch-screen, antenna etc.), and/or comprise backfeed loop and control motor (such as, for the feedback of sense position and/or speed, for mobile and/or adjusting part and/or quantification control motor) control system.Digital processing system can utilize suitable commercially available assembly to implement, such as, and the assembly usually found in digital computation/communication and/or network calculations/communication system.
It will be understood by those skilled in the art that can being integrated at least partially in miniature (mote) system of equipment as herein described and/or method.Those of skill in the art will recognize that typical microsystem generally comprises: one or more storer, such as, volatibility or nonvolatile memory; Processor, such as, microprocessor or digital signal processor; Computational entity, such as operating system, user interface, driver, sensor, actuator, application program, one or more interactive device (such as, antenna, USB port, acoustical ports etc.); Control system, comprise backfeed loop and control motor (such as, for sense or assess location and or the feedback of speed, for mobile and/or adjusting part and/or quantification control motor).Microsystem can utilize suitable assembly to implement, such as, and these assemblies found in miniature calculating/communication system.The instantiation of these assemblies comprises micromodule and support hardware, software and/or the firmware of IntelCorporation and/or CrossbowCorporation.
In order to the object of the application, " cloud " calculates and can be understood as the implication described in cloud computing document.Such as, cloud computing can be transmission calculated capacity and/or memory capacity as service method and/or system." cloud " can refer to transmission or help transmission to calculate and/or one or more hardware of memory capacity and/or component software, and what include but not limited to list below is one or more: client, application, platform, framework and/or server.Cloud can refer to any hardware relevant to client, application, platform, framework and/or server and/or software.Such as, cloud and cloud computing can refer to list one or more below: computing machine, processor, storage medium, router, switch, modulator-demodular unit, virtual machine (such as, virtual server), data center, operating system, middleware, firmware, hardware rear end, software rear end and/or software application.Cloud can refer to privately owned cloud, public cloud, mixed cloud and/or community's cloud.Cloud can be the shared pool of configurable computational resource, configurable computational resource can be disclosed, privately owned, half privately owned, assignable, extendible, flexibly, interim, virtual and/or physics.Cloud or cloud service can be transmitted by the network (such as, mobile communications network and internet) of one or more types.
Cloud as used in this application or cloud service can comprise one or more that list below: framework as service (" IaaS "), platform as service (" PaaS "), software as service (" SaaS's ") and/or desktop as service (" DaaS ").As non-exclusive example, Iaas can comprise, such as, can start, stop, accessing and/or configuration virtual server and/or storage center (such as, one or more processor, storage space and/or Internet resources are provided as required, such as, EMC and Rackspace) one or more virtual servers illustrate.PaaS can comprise, and such as, is deposited with such as, one or more software on framework (such as, client can set up computing platform and/or the solution storehouse of software interface and application from it, MicrosoftAzure) and/or developing instrument.SaaS can comprise, and such as, to be presided over and such as, by the software (such as, can be retained in network for the software applied and/or the data relevant to software application, GoogleApps, SalesForce) of network access by provider.DaaS can comprise, such as, the desktop of user, application, data and/or service is provided for (such as by network, pass through network, such as, Citrix, the service application in many application architectures, framework, the data relevant to application being provided and/or being correlated with application and/or data).Above-mentioned referring to is mentioned in this application as " cloud " or " system of the type of cloud computing and/or method and not should be understood to completely or thoroughly.
Those of skill in the art will recognize that the object in order to clear concept, assembly as herein described (such as, operation), device, object and the discussion along with them are used as example, and various configuration modification is all in expection.Therefore, set forth concrete example used herein and adjoint discussion are intended to represent their more generally classifications.Generally speaking, use any concrete example to be intended to represent its classification, and do not comprise concrete assembly (such as, operate), device and object and should not be considered as restriction.
Theme as herein described sometimes illustrates different assemblies that are that other different assemblies comprise or that connect from other different assemblies.Should be appreciated that the framework of this description is only exemplary, and in fact, other frameworks many obtaining identical function can be implemented.In concept meaning, any assembly obtaining identical function arrange " association " effectively make to obtain needed for function.Therefore, any two assemblies combining to obtain specific function herein can be regarded as each other " relevant " make to obtain needed for function, and how ignore framework or intermediate module.Similarly, two assemblies of such association also can be considered as each other " being operably connected ", or " operationally coupling " is to obtain required function, and any two assemblies that can associate so also can be considered as each other " operationally coupling " to obtain required function.The instantiation that operationally can couple includes, but are not limited to: that can mate physically and/or interactional physically assembly; And/or wirelessly can be mutual and/or wirelessly interactional assembly; And/or logically interact and/or logically interactive assembly etc.
Present in the degree of formal outline headings in this application, should be understood that, outline headings is the object in order to demonstrate, and dissimilar theme can be discussed (such as in whole application, can under process/operation title tracing device/structure, under structure/prelude, process/operation can be discussed; And/or the description of single title can across two or more topic headings).Therefore, use in this instructions formal outline headings be only used to demonstrate object and and not intended to be limit in any form.
In whole application, give and there is bracket, abbreviation " such as " or both examples and enumerate.Unless expressly stated otherwise, these examples are only exemplary and non-exhaustive with enumerating.In most of the cases, each example is enumerated and each combination will can't afford.Therefore, use less illustrative list and example, focus on and provide the understanding of claim and the scope of these claims unrestricted.
For the term using plural number and/or odd number roughly arbitrarily herein, those skilled in the art contextually and/or can apply for that plural number is understood as odd number and/or odd number is understood as plural number by the mode be applicable to.For purposes of clarity, unspecial replacement of setting forth various singular/plural herein.
Those of skill in the art will recognize that the object in order to clear concept, assembly as herein described (such as, operation), device, object and the discussion along with them are used as example, and envision various configuration modification all in expection.Therefore, set forth concrete example used herein and adjoint discussion are intended to represent their more generally classifications.Generally speaking, use any concrete example to be intended to represent its classification, and do not comprise concrete assembly (such as, operate), device and object and should not be considered as restriction.
Although user 105 in this article (such as in FIG) and other positions is illustrated/is described as single illustrated personage, but those skilled in the art should be understood that, user 105 can represent one or more human user, robotic user (such as, computational entity) and/or substantially they any combination (such as, one or more robot agent can help user), unless the context otherwise requires.It will be understood by those skilled in the art that generally speaking, user can regard " sender " as and/or other take entity as the term (when using these terms herein) of guiding, unless the context opposite situation.
In some cases, one or more assembly can be called " being configured to ", " passing through ... configuration ", " can be configured to ", " operationally/operatively with ", " be suitable for/can be suitable for ", " energy ", " can follow/follow " etc. in this article.Those of skill in the art will recognize that these terms (such as, " being configured to ") generally comprise active state assembly and/or inactive state assembly and/or holding state assembly, unless the context otherwise requires.
In known systems, with one or more user-dependent equipment, such as, mobile phone, panel computer, notebook computer, desktop computer, automobile, games system, household electrical appliances etc., can collect the data of associated subscriber.Third party can need these data.In other embodiments, the following describe the method and system managing the user data collected by one or more equipment, these user data also may be useful to the entity not being user, and these entities may not have permission these data of access.
Illustrate the environment 100 of example see Fig. 1, Fig. 1, wherein one or more personal devices 120 can implement method, system, circuit, goods and computer program according to various embodiment and framework.As shown in Figure 1A, one or more personal device 120, one or more service provider 170, one or more services developers 160 and one or more computing equipment 30 can be communicated by one or more communication network 140.In one embodiment, service provider 170 can have one or more services that personal device 120 may be wanted.In one embodiment, computing equipment 130 (can be long-range or home server, or distributed server group) can manage passive by personal device 120 or collect on one's own initiative, store, control, access, limit, monitor ... under control, consult, check, verify, certification, mandate, operation, renewal, change, filtration or the data that otherwise act on.In one embodiment, as discussed in more detail herein, computing equipment 130 can access the some or all of data on personal device 120.In another embodiment, computing equipment 130 can access the only a part of data on personal device 120.In embodiment other again, computing equipment 130 can access the revision of the data on personal device 120.Specifically, in one embodiment, computing equipment 130 can access the data be stored on personal device 120, but with anonymous way.
In one embodiment, computing equipment 130 provides one or more to serve can to personal device 120.In one embodiment, providing of one or more services can with the access rights of the partial data being stored by personal device 120 and/or collected or all data for condition.In one embodiment, computing equipment 130 can receive one or more services from service provider 170 and/or services developers 160, and one or more services received can be selected to be used for presenting to personal device 120.In one embodiment, the data from personal device 120 can be shared with one or more service provider 170 and services developers 160.In one embodiment, the data from personal device 120 can be anonymous before sharing with services developers 160 and/or service provider 170.
Refer again to Figure 1A, Figure 1A shows personal device 120.Personal device 120 can be by one or more user operation or the portable or non-portable electronic equipment with one or more user-association.Personal device 120 is illustrated as with user 105 mutual.As mentioned above, user 105 can be other entities of individual or crowd or imitation user operation.In certain embodiments, user 105 can be computing machine or computer-controlled device.Personal device 120 can be (but being not limited to) cellular handset, network mobile phone, smart mobile phone, panel computer, music player, intercom, radio station, usb driver, portable solid state driver, portable disc type hard disk drive, augmented reality equipment (such as, augmented reality glasses and/or headphone), earphone, headphone, audio/video devices, media player, TV, projection screen, flat screen, display, clock, household electrical appliances are (as micro-wave oven, convection oven, kitchen range, refrigerator, refrigerator-freezer), navigational system (such as, GPS (" GPS ") system), medical alert device, Long-distance Control, peripheral equipment, electronic safe, electronic lock, electronic safety system, video camera, personal video recorder, personal audio recordings device etc.
Refer again to Figure 1A, personal device 120 can comprise operating system 124.In this case, computing system 124 refers to be considered to any hardware on the core of equipment or basis, software, firmware or their combination.Such as, a part for operating system can be considered to the application of hardware direct interaction.In certain embodiments, operating system 124 can be FPGA, printed circuit board (PCB) or other non-wireless means.In one embodiment, operating system 124 can comprise the various implementation schemes etc. of Windows, Linux of iOS, Microsoft of Android, Apple of one or more Google.In certain embodiments, operating system 124 can comprise the root menu for one or more TV, stereo system, media player etc.In certain embodiments, operating system 124 can be device " master " screen.
Refer again to Figure 1A, in one embodiment, personal device 120 can comprise user interface 123.User interface 123 can comprise and allows user 105 and personal device 120 mutual and for the personal device 120 any hardware mutual with user 105, software, firmware and their combination.In certain embodiments, user interface 123 can comprise monitor, screen, touch-screen, liquid crystal display (" LCD ") screen, light emitting diode (" LED ") screen, loudspeaker, microphone, earphone, keyboard, keypad, touch pad, mouse, trace ball, telepilot, button groups, microphone, video camera, camera, charge-coupled image sensor (" CCD ") element, photovalve etc.
Refer again to Figure 1A, in certain embodiments, personal device 120 can comprise device memory 126.In certain embodiments, device memory 126 can comprise storer, random access memory (" RAM "), ROM (read-only memory) (" ROM "), flash memory, hard disk drive, the media based on disk, the media based on CD, magnetic store, optical memory, volatile memory, nonvolatile memory and their combination in any.In certain embodiments, device memory 126 can on the equipment different from such as network available or by radio can the device separates of equipment and so on open.Such as, in networked system, may have many personal devices 120, the device memory 126 of these personal devices is positioned at potential range several feet central server far or in overseas.
Refer again to Figure 1A, in certain embodiments, device memory 126 can comprise one or more protected data 126A and non-protected data 126B.And the embodiment of not all comprise protected data or non-protected data often kind or both, but protected data 126A and non-protected data 126B can be there is in one or more embodiments.Protected data 126A can comprise any data; comprise the data be stored on personal device 120, personal device 120 is maintained until the data etc. that monitoring capability was monitored or provided to data, personal device 120 that small part controls, need the mandate of some forms to visit these data.Mandate can have any form and relate to any subelement, comprises device interior and outside subelement.Such as, in one embodiment, protected data 126A can comprise at least one that run on the computing device and applies disabled data.And for example, in one embodiment, protected data 126A can be used for one to be applied in any time available, and for Another application special time can, or apply first and can not use when usage data.In one embodiment, protected data 126A comprises application (such as, microsoft operation system mandate, or user ID is set to very) must be authorized to access the data of protected data 126A.
In one embodiment, protected data 126A comprises the user of such as user 105 and so on until user 105 verifies the data that their identity (such as by Password Input or bio-identification) just can be seen.In one embodiment, protected data 126A is not limited to equipment, and is not transferred to any other system not under the direct control of personal device 120.In one embodiment, protected data 126A is not limited to personal device 120, and the application being only derived from personal device 120 or utilizing user 105 to originate from can allow fetch protection data 126A.In one embodiment, personal device 120 is revised or for protected data 126A to be modified, so change or obfuscation protected data 126A are at least partially.In one embodiment, personal device 120 allow protected data 126A when external entity by change or obfuscation at least partially protected data 126A be transferred to external entity.
Refer again to Figure 1A, in one embodiment, personal device 120 can comprise device memory 126, and in certain embodiments, device memory 126 can comprise non-protected data 126B.In one embodiment, non-protected data 126B does not protect or limits.In another embodiment, non-protected data 126B has protection or restriction, but is subject to less protection and/or restriction than protected data 126B.In one embodiment, broadcast when asking or otherwise propagate non-protected data 126B.In one embodiment; due to equipment de-sign or other factors; the entity of personal device 120 outside cannot access non-protected data 126B, but does not specifically protect to prevent the one or more entities beyond personal device 120 to conduct interviews to non-protected data 126B.
Refer again to Figure 1A, in one embodiment, personal device 120 can comprise device interface component 128.In one embodiment, device interface component 128 comprises any assembly of permission equipment and its environmental interaction.Such as, in one embodiment, device interface component 128 comprises one or more sensor, such as, camera, microphone, accelerometer, thermometer, global position system (SPS) sensor, barometer, humidity sensor, compass, gyroscope, magnetometer, pressure transducer, oscillating detector, optical sensor, Inertial Measurement Unit (IMU), touch sensor, touch sensor, flexible transducer, MEMS (micro electro mechanical system) (MEMS), radio station, comprise wireless station, transmitter, receiver, transmitter, broadcasting equipment etc.In one embodiment, device interface component 128 can also comprise one or more user's interface unit, such as, user interface 122 (such as, although describe separately, in certain embodiments, user interface 122 can be the device interface component 128 of any type), and in certain embodiments, comprise one or more user and input receiving unit and output presents assembly.
Refer again to Figure 1A, in one embodiment, device interface component 128 can comprise protection assembly 128A.Protection assembly 128A can comprise any interface module 128, having enumerated some limiting examples of interface module before this, needs the mandate of some forms and/or proof to visit data.Mandate can have any form and relate to any subelement, comprises device interior and outside subelement.In one embodiment, assembly 128A is protected to be similar to protected data 126A.Such as, in one embodiment, personal device 120 (such as, smart mobile phone) can have 12 application run on smart mobile phone.In one embodiment, protection assembly 128A (such as, alignment sensor) can be accessed for 6 in these application, and other 6 can not be accessed.In certain embodiments, the data of being collected by protection assembly 128A are parts of protection assembly 128A.In certain embodiments, the data of being collected by protection assembly 128A become protected data 126A.In certain embodiments, the data that some time is collected by protection assembly 128A become protected data 126A, or not free.In certain embodiments; the data that protection assembly 128A collects can be that a part of protection assembly 128A continues special time amount (such as; two weeks), be then transformed into non-protected data or be not considered to the data protected or not protected data.In certain embodiments, anyone can at special time and/or environment access protection assembly 128A.Such as, protection assembly 128A (such as, wireless station) can supply any entities access between 7 o'clock to 8 o'clock in the afternoon, and can only supply specific entity and/or application access at other times.In certain embodiments; protection assembly 128A (such as; image collection assembly) can when meeting one or more condition for any entities access; these conditions can relate to or not relate to protection assembly 128A or personal device 120; such as, when personal device 120 is in ad-hoc location.
Refer again to Figure 1A, in certain embodiments, computing equipment 130 can comprise personal device interface module 132.In certain embodiments, personal device interface module 132 can communicate with one or more personal device 120.In certain embodiments, personal device interface module 132 can receive the data 131 received from personal device 120.The personal device data 131 obtained can comprise by any way from any data that personal device 120 is collected.In certain embodiments, computing equipment 30 can ask the data from personal device 120.In certain embodiments, computing equipment 130 can receive the data from personal device 120 on schedule.In certain embodiments, when some condition is fulfilled, computing equipment 130 can retrieve the data from personal device 120.In certain embodiments, personal device 120 is just at broadcast data, and computing equipment 130 collects the data of broadcast.In certain embodiments, personal device 120 is broadcasted only computing equipment 130 and can be used the data of (such as, deciphering, explanation etc.).In certain embodiments, the personal device data 131 that personal device 120 can use one or more communication network 140 to send and obtain arrive computing equipment 30, will be described in further detail herein.
Refer again to Figure 1A, in certain embodiments, the personal device data 131 of acquisition can be anonymous data 131A.In one embodiment, anonymous data refers to the data uniquely cannot determining Data Source.In certain embodiments, Data Source can refer to personal device 120, such as, and unique identifier, such as, MAC Address.In certain embodiments, Data Source can refer to by the right to use, use or with other relations of equipment (such as, the title of user name, user or the social insurance of user or other identifiers, or the network address or identity) user 105 associated with the data.It is to be noted, in certain embodiments, equipment can identification data be originated (such as, the identity of personal device 120), namely send data due to the attribute decision of data transmission, but do not infer Data Source by data itself, in this case, in certain embodiments, this data are still considered to anonymous data 131A.
Anonymous data 131A can comprise the data having removed unique identifying information, or hide, fuzzy, make uncertain, make data that are fuzzy, that shield, pretend, cover up, hide, cover, conceal, encode, decode or otherwise change unique identifying information.In certain embodiments, the anonymous data 131A of reception never comprises unique identifying information.In certain embodiments, anonymous data 131A partly or non-uniquely can identify that it is originated, such as, user 105 or anonymous data from personal device 120.In certain embodiments, can use extra information, such as, look-up table, loose table or other known algorithms, extract unique identifying information from anonymous data 131A.In certain embodiments, can when not using extra information from anonymous data 131A derivation unique identifying information.In certain embodiments, once data are in its anonymous form, just unique identifying information cannot be retrieved from anonymous data 131A.
In one embodiment, the personal device data 131 of acquisition can comprise non-anonymous data 131B.In certain embodiments, non-anonymous data 131B can clearly or implicitly identification data source.In certain embodiments, Data Source can refer to personal device 120, such as, and unique identifier, such as, MAC Address.In certain embodiments, Data Source can refer to by the right to use, use or with other relations of equipment (such as, the title of user name, user or the social insurance of user or other identifiers, or the network address or identity) user 105 associated with the data.
See Figure 1A-1D, illustrate data anonymous system and method.Although these system and methods are illustrated as a part for computing equipment 130, this is only used to convenient diagram.In one embodiment, data go the one or more of anonymization information storage module 135, data anonymous device module 134A and data obfuscation module 134B can be arranged in personal device 120.In one embodiment, these modules can with device memory 126 direct interaction.In one embodiment, as shown in Figure 1A, computing equipment 130 can be included in the data anonymous module 134A with reference to non-anonymous data 131B being converted in Fig. 1 C to Fig. 1 D in greater detail process to anonymization data.In one embodiment, according to anonymization type, can exist and be used for making anonymization data go back to into the extra data of non-anonymous data (such as, look-up table).In some this embodiments, extra data, such as, go anonymization data, can be stored in data and go in anonymization information storage module 135.
Refer again to Figure 1A-1D, in one embodiment, computing equipment 130 can comprise data obfuscation module 134B.Such as, in one embodiment, data obfuscation module 134B can make non-anonymous data 131B fuzzy, is similar to data anonymous device module 134A.Such as, in one embodiment, data obfuscation module 134B can adopt data mask.In one embodiment, data obfuscation module 134B can be undertaken fuzzy by interpolation, such as, by increasing the identifying information of mistake in genuine identifying information, makes the identifying information that cannot distinguish mistake from genuine identifying information.Data can be lacked in certain embodiments and remove anonymization information storage module 135, data anonymous device module 134A and data obfuscation module 134B.
Refer again to Figure 1A, in certain embodiments, computing equipment 130 can comprise services developers interface module 136.Services developers interface module 136 can such as be communicated with services developers 160 by communication network 140.Specifically, in one embodiment, services developers interface module 136 can provide the limited information about the personal device data 131 obtained.In one embodiment, such as, services developers interface module 136 can provide the information of the data type about collecting to services developers 160.In one embodiment, such as, services developers interface module 136 can provide the information gathering brief introduction of the data about collecting to services developers 160.In one embodiment, services developers 160 can receive these information and such as use development decision-making module 162 to decide to develop the service of which kind of type.
Refer again to Figure 1A, in certain embodiments, computing equipment 130 can comprise service provider interface module 138.In one embodiment, service provider interface module 138 can such as be communicated with service provider 170 by communication network 140.
In one embodiment, service provider interface module 138 can comprise data permission administration module 138A.In one embodiment, data permission administration module 138A can keep following the trail of which service and has the right to access which personal device data.Such as, in one embodiment, serve 172A to have permission some anonymous data 131A.And for example, in one embodiment, serving 172B can to having permission through the data of data anonymous device 134A process.
Refer again to Figure 1A, in one embodiment, service provider interface module 138 can comprise information on services module 138B.In one embodiment, information on services module 138B can comprise a series of services provided from service provider 170, makes these information can be transferred to personal device 120.In one embodiment, computing equipment 130 can present one or more services enumerated in information on services module 138B to personal device 120 when asking or when detecting that personal device 120 may be served interested to one or more.
Refer again to Figure 1A, in one embodiment, service provider 170 provides service can to personal device 120.In one embodiment, these equipment can directly be transferred to personal device 120.In one embodiment, service provider 170 and personal device 120 have limited communication or do not communicate, and communication is processed by intermediary's (such as, computing equipment 130).In one embodiment; computing equipment 130 processes service between service provider 170 and personal device 120 and data are transmitted; protected data 126A and protection assembly 128A is affected from service provider 170; but service provider 170 still can provide service; such as; service 172A and service 172B, to personal device 120.In one embodiment, service provider 170 comprises the list of service management module 174, this service management module 174 maintains the service list of presenting to computing equipment 130, such as, to allow the information of information on services module 138B maintenance about various service of computing equipment 130.
In various embodiments, communication network 140 can comprise one or more local area network (LAN), wide area network (WAN), Metropolitan Area Network (MAN) (MAN), WLAN (WLAN), personal area network (PAN), worldwide interoperability for microwave access (WiMAX), public switch telephone network (PTSN), GPRS (GPRS) network, cellular network etc.Communication network 140 can be the combination of cable network, wireless network or cable network and wireless network.It is to be noted, as herein and accompanying drawing " communication network " used refer to can each other alternately or each other not alternately and can connect work wittingly or by mistake in certain embodiments so that one or more communication networks of communicating between one or more entity.
Referring now to Fig. 1 C, embodiment can comprise personal device 120A and personal device 120B.Personal device 120A can produce non-anonymous data 144A, and personal device 120B can produce non-anonymous data 144B.Non-anonymous data 144A and non-anonymous data 144B can be transferred to computing equipment 130A, and this computing equipment can be non-exclusive and the limiting examples of computing equipment 130.In one embodiment, computing equipment 130A can comprise data anonymous device module 134A.In one embodiment, data anonymous device module 134A can comprise irreversible Anonymizing module 137A, and this irreversible Anonymizing module produces irreversible anonymous data, such as, in an example, has eliminated the data of identification.In one embodiment, data anonymous device module 134A can comprise set Anonymizing module 137B, and this set Anonymizing module can adopt non-anonymous data 144A and non-anonymous data 144B and set up the general anonymous data gathered, as shown in Figure 1 C.In one embodiment, data anonymous device module 134A can comprise reversible Anonymizing module 137C, and this reversible Anonymizing module can use privately owned look-up table 135A thus convert non-anonymous data to anonymous data.In one embodiment, privately owned look-up table 135A can be stored in data and goes in anonymous information memory module 135.
Refer again to Fig. 1 D, in one embodiment, computing equipment 130B can have data anonymous device 134A, and this data anonymous device can adopt anonymization function 132A, as shown in figure ip.Such as, anonymous function can use private mark method, perturbation method, DataFly algorithm, top-down specialization and/or Mondarian multidimensional K-anonymous, as non-limiting and non-exclusive example.In another embodiment, the fuzzy non-anonymous data of data obfuscation module 134B.In one embodiment, fuzzy can by will seem phase Sihe seemingly believable " mistake " data add to reality identification data come, making after this cannot by means of only checking that data are to determine True Data.In one embodiment, anonymous data can be used to provide data to service provider 170 by service provider interface module 38, thus performs part of service, or determines which service can be used for one or more personal device 120.
Example shown in Fig. 1 C and 1D is only can the example of the how anonymous device of implementation data, and and not intended to be limiting or eliminating.There are many other technologies for anonymization data, some of them technology will be mentioned herein.
Referring now to Fig. 1 E, Fig. 1 E, show the embodiments of the invention paying close attention to service provider 170 and computing equipment 130C.Computing equipment 130C can receive the data from one or more equipment, and these data can anonymization, or can not have anonymization or can be fuzzy.In one embodiment, data that computing equipment 130C can receive from one or more equipment produce fuzzy data, be no matter directly receive from one or more equipment or indirectly receive from another source.In one embodiment, computing equipment 130C can the data of fuzzy reception, even if the data anonymization received.In another embodiment, computing equipment 130C can to anonymization or fuzzy data do not perform extra step before this.
Refer again to Fig. 1 E, in one embodiment, computing equipment 130C can ask one or more services 190 that can perform on one or more equipment.One or more services 190 can be performed by one or more equipment independently, or can be performed by computing equipment 130C so that one or more parts of serving.Computing equipment 130C request service provider 170 can provide one or more services can presenting to one or more equipment.In one embodiment, computing equipment 130C can transmit fuzzy data 185 to service provider 170.This transmission can be undertaken by any type of network, such as, and communication network 140 (not shown in fig. ie).In one embodiment, service provider 170 can be integrated with computing equipment 130C.In one embodiment, service provider 170 and computing equipment 130C can be subject to the control of single entity.
Refer again to Fig. 1 E, in one embodiment, service provider 170 can receive fuzzy data 185.Fuzzy data 185 can be any form, as described in several examples herein.The object of the example shown in Fig. 1 E and the following drawings is only used to be convenient to understand, and should not regard as can fuzzy data mode thoroughly or exclusive enumerating.Such as, in one embodiment, by can fuzzy irreversible anonymous data 185A from data-removal apparatus source-information, make to use irreversible anonymous data 185A to recover data.In order to obtain the source device information forming irreversible anonymous data 185A, the copy of derived data can be retrieved.Such as, in one embodiment, computing equipment 130C can store the independent copy of the data causing irreversible anonymous data 185A, existence anduniquess identification equipment information in the copy preserved by computing equipment 130C.
In one embodiment, fuzzy data 185 can comprise reversible anonymous data 185B.Data 185B is not limited to the form of particular type, but shows simple example.In instances, the device identifier of one or more personal device 120A and 120B, such as, 00123 and 00124, be converted into new identifier XYZ and YYZ (such as, as shown in Figure 1 C), in one embodiment, this can the identity 00123 and 00124 of prevention service provider 170 facility for study.In one embodiment, can by the data providing one or more algorithms, look-up table, key, encryption key, hash function etc. reversible anonymous data 185B to be converted to the one or more equipment of unique identification.
In one embodiment, fuzzy data 185 can comprise general anonymous data 185C.In one embodiment, such data can comprise the combined data of any form, and these combined data provide the information about one or more equipment, but do not identify the one or more equipment causing summary information especially.Such as, general anonymous data 185C can comprise these data, as " finding that there are 35 equipment being greater than 20 contact persons in contacts list ", or data more specifically, such as " 35 smart mobile phones such as running the AppleiPhone4S of iOS6.0 have more than 2.0Gb remaining space, find to have more than 20 contact persons in contacts list ".
Refer again to Fig. 1 E, in one embodiment, service provider 170 can receive fuzzy data 185, as referring to figure 1e.In one embodiment, service provider 170 can comprise fuzzy data analysis module 173.Fuzzy data analysis module 173 can receive fuzzy data 185 and use fuzzy data 185 to serve or be used in the service of the type of the equipment quoted in fuzzy data 185 to determine one or more.Fuzzy data analysis module 173 can be completely automatically, or can have some artificial interferences in this process.In one embodiment, fuzzy data analyzer 173 can obtain fuzzy data 185 from several different computing equipment 130C, and these fuzzy datas can allow service provider 170 more efficiently to provide one or more to serve.In one embodiment, service provider 170 can comprise service management module 174.Service management module 174 can comprise existing service analysis module 174A and new service generation module 174B.Existing service analysis module 174A and new service generation module 174B can together with or work independently, and use or do not use fuzzy data analysis module 173, to determine according to the fuzzy data received whether the service existed meets the requirement determined.If there is no this service, so new service generation module 174B can produce new service by being asked by third party, asking artificial interference (such as, people writes the program of new service), or can automatically produce new service.
In one embodiment, service provider 170 can comprise service transmission module 175, this service transmission module can be transmitted one or more services 186 and turn back to computing equipment 130C, such as, turn back to service reception module 138B, this service reception module can be a part for service provider interface module 138 in one embodiment.In various embodiments, once perform one or more operation relative to one or more services 186 of reception, de-fuzzy data 187 can be the data that can make fuzzy data 185 deblurring, de-fuzzy data 187 can be transferred to service provider 170, such as, the data deblurring module 176 of service provider 170 is transferred to.In one embodiment, de-fuzzy data 187 are combined with fuzzy data 185 data obtaining deblurring.In another embodiment, de-fuzzy data 187 do not need to be combined to obtain the data of deblurring with fuzzy data 185.In one embodiment, de-fuzzy data 187 can be transmitted when receiving one or more and serving 186.In another embodiment, the one or more operations relating to one or more services 186 can be performed before transmission de-fuzzy data 187, such as, propose one or more services to one or more equipment.In one embodiment, if the user of specific quantity does not use one or more services 186, so computing equipment 130C can not transmit de-fuzzy data 187.
Referring now to Fig. 1 F, Fig. 1 F, show as exemplary embodiment 100 " " shown in embodiments of the invention.Such as, Fig. 1 F shows the computing equipment 130D with personal device 120 interaction.In one embodiment, computing equipment 130D receives the device data 188 from personal device 120.Although Fig. 1 F shows directly from this transmission of personal device 120, but in one embodiment, computing equipment 130D can receive the device data 188 from any source, and described source comprises the 3rd equipment, communication network, social network sites, equipment manufacturers etc.In one embodiment, computing equipment 130D monitors one or more personal device 120 for device data 188.In one embodiment, computing equipment 130D monitors other source one or more for the device data 188 about personal device 120.
In one embodiment, device data 188 can comprise the data that personal device 120 has been collected.In one embodiment, device data 188 can through revising the user with the identity of obscuring device 120 or equipment 120.In one embodiment, device data 188 is not fuzzy.In one embodiment, device data 188 can be about on the equipment of being stored in 120 or be otherwise subject to the data that personal device 120 controls, instead of is subject to the real data of control of personal device 120.Such as, as shown in fig. 1f, personal device 120 can comprise protected data 126A, and protected data can comprise 30 last positions that personal device 120 is accessed in one embodiment.In one embodiment, device data 188 can comprise 30 last positions that personal device 120 is accessed.In another embodiment, device data 188 can comprise the instruction having 30 device locations in the storer of personal device 120.In one embodiment, device data 188 can comprise the instruction having 30 device locations in the storer of personal device 120, and in these positions 20 are that the entity communicated with computing equipment 130D has given expression to interested position.
Refer again to Fig. 1 F, in one embodiment, computing equipment 130D can comprise personal device interface module 132.Personal device interface module 132 can comprise data value monitoring modular 132A.In one embodiment; the data value monitoring modular 132A data that can receive about which kind of type be valuable information (such as; position data or show the position data etc. of equipment in eve on New Year's Day in Times Square), and have for personal device 120 and be evaluated as the one or more instructions whether valuable data and data protected and can monitor one or more equipment and other positions.In one embodiment, personal device interface module can comprise the facility information receiver module 132B being configured to receiving equipment data 188.Device data 188 can have the form of any amount, as mentioned above, and as shown in the limiting examples in the example that provides further herein.
Refer again to Fig. 1 F, in one embodiment, computing equipment 130D can comprise monitoring of equipment module 132C.In one embodiment, monitoring of equipment module 132C can monitor one or more personal device 120 by any monitoring technology.In one embodiment, monitoring of equipment module 132C can comprise and can be configured to back be reported to software, hardware or the firmware relevant to personal device 120 of monitoring of equipment module 132C with the specific time interval.In one embodiment, monitoring of equipment module 132C by one or more communication network 140 (not shown) monitoring personal device 120, and directly can communicate with personal device 120.In one embodiment, monitoring of equipment module 132C can monitor personal device 120 by indirect mode, such as, by personal device 120 other equipment operable or system.
Refer again to Fig. 1 F, in one embodiment, personal device interface module 132 can comprise service providing module 132D.Such as, as previously mentioned, computing equipment 130D can require that one or more are served.These services can be presented to personal device 120, for presenting to user, or for the automatic decision about whether receiving service.In one embodiment; one or more services 188 can require access protected data (such as; the protected data 126A of personal device 120) or one or more protection assembly (such as, the protection assembly 128A of personal device 120) or both.In one embodiment, computing equipment 130D can so that present to the user 105 of personal device 120 by one or more services by personal device 120.
Refer again to Figure 1B, Figure 1B shows the more detailed description of personal device 120.In one embodiment, personal device 120 can comprise processor 110.Processor 110 can comprise one or more microprocessor, central processing unit (" CPU "), graphic process unit (" GPU "), physical processing unit, digital signal processor, network processing unit, floating point processor etc.In certain embodiments, processor 110 can be server.In certain embodiments, processor 110 can be distributed kernel processor.Although processor 110 is single processors of the part as single personal device 120, processor 110 can be the multiprocessor being distributed in one or more equipment 120, and these processors can or be configured to work together.Processor 110 is illustrated as execution computer-readable instruction, to perform above-mentioned one or more operation, and as shown in Fig. 6,7A-7C, 8A-8D, 9A-9C and 10A-10D.In certain embodiments, processor 110 is designed to be configured to operate according to processing module 150, this processing module 150 can comprise 152 about being configured to provide one or more services and optionally accessing the data that one or more particular device protection portion divides the agency obtaining module, the agency of 154 one or more services stops and the one or more particular device protection portion of agency's continuation access divides detection module, the designator and 158 that 156 continuation proxy access one or more particular device protection part and one or more service present module stopping stops the one or more particular device of proxy access to protect part to promote the one or more of the data presented of the option of module.
Refer again to Figure 1B, in one embodiment, personal device 120 can comprise device memory 126.In certain embodiments, storer 126 can comprise one or more of the memory device of one or more memory device, ROM (read-only memory) (ROM), programmable read only memory (PROM), Erasable Programmable Read Only Memory EPROM (EPROM), buffer memory (such as, random access memory (RAM), flash memory, synchronous RAM (SRAM), dynamic RAM (DRAM)) and/or other types.In certain embodiments, storer 126 can be positioned at single website.In certain embodiments, storer 126 can be positioned at multiple website, comprises website away from each other.
Refer again to Figure 1B, in one embodiment, personal device 120 can comprise protection assembly 128A and not protect assembly 128B, same with reference to Figure 1A.Refer again to Figure 1B; protection assembly 128A can comprise one or more assembly, and each assembly can be hardware, software, firmware, data structure, class, API, the data of any form, link, the reference of pointer or other data or position, interface or their combination in any etc.Similarly, assembly 128B is not protected can to comprise one or more assembly.In one embodiment, interface module 128 also can comprise one or more optional assembly, comprises assemblies monitor module 128C, monitoring of equipment module 128D, application monitoring modular 128E and/or security module 128F.According to embodiment, these optional modules can presence or absence.Existing of they is dispensable.Such as, in one embodiment, component detection module 128C can exist, and can follow the trail of which entity and accessing various protection assembly 128A.In another embodiment, assemblies monitor module 128C can be omitted.
Refer again to Figure 1B, in one embodiment, interface module 128 can comprise monitoring of equipment module 128D.Monitoring of equipment module 128D can one or more states of monitoring equipment, and such as, which application is arranged in storer, and which application can use which resource of equipment, or can follow the trail of Using statistics, utilize statistics etc.Monitoring of equipment module 128D can monitor the equipment being in various level detail, such as, at whole equipment level, in application level, in process level, at resource level, or in interface level, or these combination in any, or the similar level of details.
Refer again to Figure 1B, in one embodiment, interface module 128 can comprise application monitoring modular 128E.Application monitoring modular 128E can be the part of application, hard coded or be hardwired to the part of the operating system in equipment, or can be the independent application run in the prospect or background of equipment.Application monitoring modular 128E can an application on monitoring equipment, one group apply or all application.Application monitoring modular 128E can monitor the many aspects of one or more application, the resource etc. of such as purposes, utilization, use.
Refer again to Figure 1B, in one embodiment, interface module 128 can comprise security module 128F.Security module 128F can one or more level of access of multiple parts of monitoring equipment, such as, and application, assembly, interface, storage block, module etc.In one embodiment, security module 128F can only monitor security level and report.In another embodiment, security module 128F can perform other functions, such as, and amendment security level or remove the secure access of one or more part or the secure access of accessing from one or more part.
In various embodiments can individually or comprise with any combination or can get rid of completely assemblies monitor module 128C, monitoring of equipment module 128D, application monitoring modular 128E and security module 128F in each.
Referring now to Fig. 2, Fig. 2, illustrate 152 about being configured to provide one or more services and optionally accessing the illustrative embodiments that one or more particular device protection portion divides the data of the agency obtaining module.As shown in Figure 2; in various alternate embodiments and embodiment, 152 divide the data of the agency obtaining module can comprise one or more sub-logic module about being configured to provide one or more services and optionally accessing one or more particular device protection portion.Such as, as shown in Figure 2, such as, Fig. 2 A, in certain embodiments, module 152 can comprise in following data one or more: 202 about being configured to provide one or more services and optionally accessing the data that one or more particular device protection portion divides the existence of the agency obtaining module, 204 about being configured to provide one or more services and optionally accessing the data that one or more particular device protection portion divides the installment state of the agency obtaining module, 206 about being configured to provide one or more services and optionally accessing the user activated data that one or more particular device protection portion divides the agency obtaining module, 208 require one or more services of the one or more particular device protection part of access and optionally access one or more particular device protection portion to divide the data of the agency obtaining module (such as about being configured to provide, in certain embodiments, 210 can be comprised about being configured to provide the one or more cycle efficienies display service needed for the one or more particular device protection part of access and optionally accessing the data that one or more particular device protection portion divides the bicycle efficiency monitor agent obtaining module), 212 receive from particular device module be relevantly configured to provide one or more services and relevant being configured to that the data and 214 of optionally accessing the agency of one or more particular device protection part obtain by scanning particular device module provides one or more to serve and optionally access the data of the agency of one or more particular device protection part.
Refer again to Fig. 2, such as, Fig. 2 B, in certain embodiments, module 152 can comprise following in one or more: 216 obtain from operating system module be relevantly configured to provide one or more services and optionally access the data of the agency of one or more particular device protection part, 218 provide one or more to serve from one or more particular device protection portion sub-module about being configured to and optionally accessing the data of the agency by the one or more particular device protection parts to one or more particular device protection portion sub-module and/or one or more transmission of monitoring, 220 be configured to provide one or more services from one or more particular device daily record relevant and selective access one or more particular device protection portion divide the data of the agency obtaining module and 222 agencies to perform one or more services and continue that the one or more particular device protection portion of access divides the agency of detection module can detection indicator.
Refer again to Fig. 2; such as Fig. 2 C; as implied above, in certain embodiments, module 152 can comprise 224 agencies stopped relating to activities of performing one or more services and after stopping activity detection module, continue the one or more particular device protection part of access can detection indicator.In certain embodiments, module 224 can comprise 226 agencies stopped relating to activities of performing one or more services and after the termination activity detected at least partially by analyzing particular device module, continue the one or more particular device protection part of access can detection indicator, 228 agencies stopped relating to activities of performing one or more services and after the termination activity that the report using particular device module to issue at least in part detects, continue to access one or more particular device protection part can detection indicator, 230 agencies stopped relating to activities of performing one or more services and after the termination activity of the data-flow detection by analyzing one or more particular device protection portion sub-module, continue the one or more particular device protection part of access can detection indicator, 232 and agency stopped relating to activities of performing one or more services and after the termination activity that the report using the monitor agent of one or more particular device protection portion sub-module to issue at least in part detects, continue to access one or more particular device protection part can detection indicator.In certain embodiments, module 232 can comprise 234 agencies stopped relating to activities of performing one or more services and after the termination activity that the report using the monitor agent based on kernel of one or more particular device protection portion sub-module to issue at least in part detects, continue to access one or more particular device protection part can detection indicator.
Referring now to Fig. 3, Fig. 3, the agency illustrating 154 one or more services stops and acting on behalf of the illustrative embodiments continuing the one or more particular device protection portion of access and divide detection module.As shown in Figure 3, in various alternative embodiment and embodiment, the agency of 154 one or more services stops and the one or more particular device protection portion of agency's continuation access divides detection module can comprise one or more sub-logic module.Such as; as Fig. 3 (such as; Fig. 3 A) shown in, in certain embodiments, module 154 can comprise the stopping of 302 one or more service reception modules notice and 304 agency continue access one or more particular device protection portion divide the one or more of the notice of receiver module.In certain embodiments, module 302 can comprise the notice of the stopping of one or more services that 306 receive from proxy module and the one or more of 308 one or more expiry notifications of serving received from particular device operating system module.In certain embodiments, module 304 can 310 comprise the agency that notice and 316 that agency that notice, 312 that the agency received from one or more particular device protection portion sub-module continues to access one or more particular device protection part receives from proterctive equipment assembly module continues to access one or more particular device protection part receives from notification agent module and continues the one or more of the notice of accessing one or more particular device protection part.In certain embodiments, module 312 can comprise the notice that 314 agencies received from the proterctive equipment assembly of the part as one or more particular device protection portion sub-module continue to access one or more particular device protection part.
Refer again to Fig. 3; such as; Fig. 3 B; in certain embodiments, module 154 can comprise the one or more agent operation of 318 termination with perform one or more service detection module and 320 access one or more particular device protection portion divide the agency of the stopping of detection module to prevent one or more.In certain embodiments, module 320 can comprise 322 and accesses one or more particular device protection portion by particular device detection module and divide the agency of the stopping of detection prevent and 324 divide the agency of the stopping of detection to prevent by the one or more particular device protection portion of the particular device output access of presenting to particular device user monitor module.
Refer again to Fig. 3; such as; Fig. 3 C, in certain embodiments, the designator that the agency that module 154 can comprise 326 one or more service acquisition modules stops and 328 agencies continue the one or more particular device protection portion of access and divide the one or more of the designator of acquisition module.In certain embodiments, module 328 list under can comprising in one or more: 330 agencies obtained by particular device state monitoring modular continue to access the designator of one or more particular device protection part, 332 continue the designator of accessing one or more particular device protection part by the agency of monitor agent level of access data module acquisition, 334 continue the designator of accessing one or more particular device protection part by the agency of monitoring particular device visit data module acquisition, 336 attempt by monitoring the designator that agency that designator and 338 that agencies that the one or more particular device protection portion sub-module of access obtains continue to access one or more particular device protection part obtained by agents analysis module continues to access one or more particular device protection part.
Refer again to Fig. 3; such as; Fig. 3 D; in certain embodiments; module 154 list under can comprising in one or more: agencies of 340 one or more services stop and agency continue the one or more particular device protection portion of access divide detection module, 342 one or more look for friend to serve look for friend to act on behalf of stopping and looking for friend to act on behalf of and continue access particular device contacts list detection module, and the notice based on agency of the stoppings of one or more services and 346 agencies continue the notice that one or more particular device protection portion of access divide receiver module.In some instances, module 342 can comprise looking for friend to act on behalf of location and one or more stoppings of looking for friend to serve and looking for friend to act on behalf of continuation access particular device contacts list after the location of one or more entity detection module and identification of the 344 one or more entities listed in the contacts list of the particular device completed.In certain embodiments, module 346 can comprise following one or more: the notice based on agency and the one or more particular device protection portion of continuation access of the stopping of 348 one or more services divide the notice based on agency of receiver module, the notice based on agency and 350 of the stopping of one or more services acts on behalf of the notice based on particular device protection part continuing the one or more particular device protection portion of access and divide receiver module.
Referring now to Fig. 4, Fig. 4, illustrating the one or more particular device of 156 continuation proxy access protects part and one or more service to present the exemplary embodiment of the designator of the stopping of module.As shown in Figure 4, in various alternative embodiment and embodiment, the designator that 156 continuation proxy access one or more particular device protection part and one or more service present the stopping of module can comprise one or more sub-logic module.Such as, as shown in Figure 4, such as, Fig. 4 A, in certain embodiments, module 156 can comprise following in one or more: the vision of the stoppings of the 402 continuation proxy access presented in particular device output precision module one or more particular device protection part and one or more services presents, the 408 continuation proxy access one or more particular device protection parts presented to the entity relevant to particular device and 410 one or more services present the designator of the stopping of module, continuing the one or more particular device of proxy access protects part and one or more service to present the notice of the stopping of module, and 412 visual notification of stoppings of the continuation proxy access shown by particular device module one or more particular device protection part and one or more services.In certain embodiments, the vision of stoppings that module 402 can comprise the 404 continuation proxy access tablet device alignment sensors presented in particular device output precision module and one or more services presents.In certain embodiments, the vision that module 404 can comprise the stopping of travel's assistant service of the 406 continuation proxy access tablet device alignment sensors presented in particular device output precision module and children's highway presents.In certain embodiments, module 412 can comprise the notification icon of the stoppings of the 414 continuation proxy access shown by particular device screen module one or more particular device protection parts and one or more services.
Refer again to Fig. 4, such as, Fig. 4 B, in certain embodiments, module 156 can comprise the one or more of the following: 416 have continued the list of one or more agencies of proxy access one or more particular device protection part and stopped one or more service to present one or more one or more designators in one or more agencies of module; 418 describe the report of continuation proxy access one or more particular device protection part and show whether one or more services have stopped obtaining the report of module; 420 instruction particular devices present the designator of the stopping continuing proxy access one or more particular device protection part and one or more service module; And 422 change the stopping acted on behalf of and present to show to continue proxy access one or more particular device protection part and one or more service module.In certain embodiments; module 422 can comprise the one or more of the following: the color that the visions that 424 changes are acted on behalf of present is to show that continuing the one or more particular device of proxy access protects partly and the agency of the stopping of one or more service module, and 426 changes will for one or more steps of user's execution be to select to act on behalf of thus to show that the one or more particular device of continuation proxy access is protected partly and the stopping of one or more service module.In certain embodiments, module 426 can comprise 428 increase requirements is one or more steps of being performed by user to select to act on behalf of thus to show to continue the stopping of proxy access one or more particular device protection part and one or more service module.
Refer again to Fig. 4; such as; Fig. 4 C, in certain embodiments, module 156 can comprise 430 changes to show the relative position in the operating system that the agency of the stopping continuing proxy access one or more particular device protection part and one or more service module presents.
Referring now to Fig. 5, Fig. 5, the agency illustrating 158 one or more services stops and acting on behalf of the illustrative embodiments continuing the one or more particular device protection portion of access and divide detection module.As shown in Figure 5, in various alternative embodiment and embodiment, the agency of 158 one or more services stops and the one or more particular device protection portion of agency's continuation access divides detection module can comprise one or more sub-logic module.Such as; as shown in Figure 5; such as; Fig. 5 A; in certain embodiments, module 158 can comprise presenting of the option of 502 stopping proxy access one or more particular device protection portion subset indicating module and 508 and present one or more of the option of module for stopping proxy access one or more particular device protection part.In certain embodiments, module 502 can comprise 504 and is used to indicate the module of particular device to stop presenting of the option of proxy access one or more particular device protection portion subset indicating module.In certain embodiments, module 504 can comprise 506 and is used to indicate the module of particular device to stop presenting of the optional user-selectable options of proxy access one or more particular device protection portion subset indicating module.In certain embodiments, module 508 can comprise the option that 510 present to stopping proxy access one or more particular device protection part of the protection part access control part of particular device module.
Refer again to Fig. 5; such as; Fig. 5 B; in certain embodiments, module 158 can comprise 512 indicating equipments stop proxy access one or more particular device protection part promote presenting of the option that the user of module is arranged and 518 to the entity relevant to particular device present stop proxy access one or more particular device protection part promote the option of module present one or more.In some instances, module 512 can comprise 514 before agent operation indicating equipment stop proxy access one or more particular device protection part promote presenting of the option that the user of module is arranged and 516 indicating equipment before agency obtains stop proxy access one or more particular device protection part promote the option of the subscriber equipment of module present one or more.
Refer again to Fig. 5; such as; Fig. 5 C; in certain embodiments, module 158 can comprise the selectable option of 520 stopping proxy access one or more particular device protection part display module, 522 proxy access one or more particular device protection portion ends module, 530 by forbidding agency promote module stop presenting of the option of proxy access one or more particular device protection part and 532 by remove agency promote module stop the option of proxy access one or more particular device protection part present one or more.In certain embodiments, module 520 can comprise the selectable option of the multiple agency of 524 stopping (comprising agency) to the access of one or more particular device protection part display module.In certain embodiments, module 522 can comprise one or more access one or more particular device protection portion ends module of 526 one or more agency (comprising agency) classes and each access one or more particular device protection portion ends module of 528 one or more agencies.
Refer again to Fig. 5; such as; Fig. 5 D; in certain embodiments, module 158 can comprise 534 for set up proxy access one or more particular device protection part promote presenting of the option of the restriction of module and 546 require for continue proxy access one or more particular device protection part promote the option of the data anonymous of module present one or more.In certain embodiments, module 534 can comprise 536 requirements rebuild proxy access one or more particular device protection part promote the presenting of the option of the express authorization of module access, 538 to arrange to allow agency rebuild access one or more particular device protection part promote presenting of the option of the restriction of the number of times of module and 542 to set up to allow to rebuild proxy access one or more particular device protection part promote the option of the condition precedent of module present one or more.In certain embodiments, module 538 can comprise 540 and is arranged on and allows agency during special time period to rebuild access one or more particular device protection part to promote presenting of the option of the restriction of the number of times of module.In certain embodiments, module 542 can comprise 544 and sets up ad-hoc location and promote presenting of the option of the condition precedent of module as allowing to rebuild proxy access one or more particular device protection part.
Below a series of process flow diagrams describing embodiment.In order to easy understand, process flow diagram is organized into and makes initial flowchart present embodiment by the embodiment of example, and the process flow diagram after this presents the expansion of alternative embodiment and/or initial flowchart as the sub-component operation be based upon on one or more process flow diagram presented in early days or add-on assemble operation.Those skilled in the art are to be understood that, the presentation mode that utilizes herein (such as, with present example embodiment and after this provide subsequent flow set up and/or other details process flow diagram present beginning) usually allow to various process embodiment fast and easily understand.In addition, this area designer should understand further, and presentation mode used herein also makes the example itself becoming modularization and/or Object-oriented Programming Design well.
In addition, in figure 6, and in accompanying drawing after this, the mode can overlapping frame with frame describes various operation.These descriptions can show that the operation in inside casing can be included in the embodiment of the optional example of illustrated operation steps in one or more housing.But, should be appreciated that inside casing operation can regard the independent operation separated to relevant housing as, and can perform with any order relative to every other illustrated operation, or can perform simultaneously.Moreover these operations shown in Fig. 6-10 and other operations that will describe herein can be performed by least one of machine, goods or article combination.
Following instance is only provided as the explanation how can implementing various embodiment.Following instance is not intended to restriction, and all examples enumerated herein can in conjunction with the part of other examples enumerated herein, until these are combined in logic without inconsistent degree.Because space constraint, when can implement this example, do not write out each example at every turn.Therefore, unless otherwise expressly noted, other examples each that each example is enumerated before and after should be understood to and being included in instant example, and can in conjunction with any or all part of other examples.Each example not intended to be limiting single claim or in groups claim, but how can implement the illustration of one or more embodiment.Can't permit below and be understood as any claim of restriction or enumerate the exhaustive list how can implementing one or more claimed embodiment.
Referring now to Fig. 6, Fig. 6, show operation 600, this operation 600 can comprise the operation 602 of the data describing the application obtained about being configured to one or more protection parts of accessing particular device, and described application is configured to provide one or more to serve.Such as, Fig. 1, such as, Figure 1B, show 152 about being configured to provide one or more services and optionally accessing the data that one or more particular device protection portion divides the agency obtaining module, described particular device protection portion is divided and is obtained module and obtain and (obtain from list or other data structures, receive, calculate, select, or receive the information about inference, perform and calculate to find inference, retrieval shows the data of inference, reception notification, no matter receive the information obtaining inference, be by people or automated procedure, or participate in being notified, any action of reasoning or deduction or transaction, include but not limited to the situation not having absolute belief, comprise may and/or other threshold values) relevant be configured to access and (such as, send and receive order, receive the data arrived, check the data etc. of going to and arriving) particular device is (such as, cell phone, smart mobile phone, IP phone, VOIP phone, telephone receiver, microphone, camera (such as, video camera, Still Camera, digital camera etc.), earphone, receiver, screen, display, TV, games system, receiver (such as, audio/video receiver), media player (such as, DVD player, Blu-ray player, CD Player, MP3 player, cassette tape player), tablet device, net book computing machine, notebook computer, router, wireless router, bridge, the network equipment, server, desk-top computer, personal computer, individual calculus thermomechanical components (such as, RAM, hard disk drive, video card, Deng), personal navigation system, Vehicular navigation system, motor vehicles, motor vehicles sound equipment, motor vehicles control system, motor vehicles communication system (such as, OnStar), household electrical appliances, security system (such as, home security system), electronic security device (such as, electronic safe, safety door system, door-locking system), sound system, loudspeaker, telepilot (such as, universal remote control, or appliance remote control), radio, two-way radio, intercom, ham radio, metal detector, radar detedtor, weather station, robot (such as, Roomba), suction cleaner, wearable article, the personal effects, augmented reality article, " intelligence " clothes, have the glasses etc. of augmented reality) one or more protections parts (no matter be such as, virtual, physics, relative, absolute, dynamic or static restriction, programmable, any structure such as changeable, at least one entity applies demand to access this part, no matter this requirement is loaded down with trivial details or heavy, no matter and this requires it is consistent application, that always apply or apply in AD HOC) application (such as, one or more hardware, software, firmware, API, Internet resources, the set in storehouse etc.) data (such as, Apply Names, application type, any characteristic of application or attribute, whether by applying, equipment or third party limit, whether general or local etc.), described application is configured to provide (such as, take the one or more steps at least partially helping to perform one or more services) one or more services (such as, equipment or equipment any task that can perform in conjunction with another equipment, or any combination of any part of any task or task, the interaction of people can be comprised, or the interaction of people can not be comprised, and may be required in equipment this locality or away from one or more resources of equipment, and can hardware be comprised, software, firmware, be stored in any assembly, module, the data operated in the part of part or equipment or by it, include but not limited to, hardware, software, application, application programming interface (" API "), one or more virtual machine, one or more dynamic reading storehouse (" DLL "), one or more relational database, one or more GUI framework, the any part of any other equipment that one or more COM structure memory or the equipment that is subject to control, such as, cloud resource etc.).
Refer again to Fig. 6, operation 600 can comprise operation 604, and this operation 604 depicts to detect to apply and completed one or more at least one of serving and applied the one or more protection parts maintaining access particular device.Such as, Fig. 1, such as, Figure 1B, the agency showing 154 one or more services stops and acting on behalf of the one or more particular device protection portion of continuation access dividing detection module, and this particular device protection portion divides detection module to detect application (such as, one or more hardware, software, firmware, API, Internet resources, the set in storehouse etc.) complete (such as, application reach such point: observer whole or in part application help under sum up complete at least one task) one or more service at least one and application maintain (such as, application access level does not change according to aforementioned completing) no matter the one or more protections of access particular device (be such as, partly virtual, physics, relative, absolute, dynamic or static restriction, programmable, any structure such as changeable, at least one entity applies demand to access this part, no matter this requirement is loaded down with trivial details or heavy, no matter and this requires it is consistent application, that always apply or to apply in AD HOC).
Refer again to Fig. 6, operation 600 can comprise operation 606, and this operation 606 depicts to present and shows to complete one or more services and the information of one or more protection parts of application maintenance access particular device.Such as.Fig. 1; such as; Figure 1B; showing the one or more particular device of 156 continuation proxy access protects part and one or more service to present the designator of the stopping of module; this service presents module and presents (such as; such as; may not show or promote display visually with any medium, one or more sensation inclusive NAND people entities of participating user are connected) show to complete one or more services and application maintains information to the access of one or more protection parts of particular device.
Refer again to Fig. 6, operation 600 can comprise operation 608, and this operation 608 depicts to promote to present and stops the option of application to the access of one or more protection parts of particular device.Such as.Fig. 1, such as, Figure 1B, show the option that 158 stopping proxy access one or more particular device protection parts promote module, this particular device protection part promotes that module promotes (such as, performing and contribute to performing or completing the one or more operations presented) stopping is (such as to present (such as being shown by any combination of vision and non-vision interface), stop, or in stopped process, or attempt stopping, hit or miss, no matter whether this stopping is interim or permanent) application access particular device one or more protection part option (such as, non-essential alternative interface).
Fig. 7 A-7C depicts the various embodiments of operation 602, and operation 602 describes the data of the application obtained about being configured to one or more protection parts of accessing particular device, and described application is configured to provide one or more services according to embodiment.Referring now to Fig. 7 A, operation 602 can comprise operation 702, and this operation 702 describes the data of the existence of the application obtained about being configured to one or more protection parts of accessing particular device, and described application is configured to provide one or more to serve.Such as, Fig. 2, such as, Fig. 2 A, show 202 about being configured to provide one or more services and optionally accessing the data that one or more particular device protection portion divides the existence of the agency obtaining module, this particular device protection portion divides acquisition module to obtain about being configured to access particular device (such as, network-enabled digital camera) one or more protections part (such as, view data) application (such as, report from device operating system) the data of existence, described application is configured to provide one or more services (such as, picture tag is served).
Refer again to Fig. 7 A, operation 602 can comprise operation 704, and this operation 704 describes the data of the installation of the application obtained about being configured to one or more protection parts of accessing particular device, and described application is configured to provide one or more to serve.Such as, Fig. 2, such as, Fig. 2 A, show 204 about being configured to provide one or more services and optionally accessing the data that one or more particular device protection portion divides the installment state of the agency obtaining module, this particular device protection portion divides acquisition module to obtain about being configured to access particular device (such as, the intelligent watch that user dresses) one or more protections partly (such as, blood glucose monitor) installation (such as, application memory long-range or local on the storer of equipment, or the foundation of the interface between device operating system and application, such as, there is provided user can activate the mechanism of application, such as, when user from application shop select can down load application time) data, described application is configured to provide one or more services (such as, picture tag is served).
Refer again to Fig. 7 A, operation 602 can comprise operation 706, and this operation 706 describes the user activated data of the application obtained about being configured to one or more protection parts of accessing particular device, and described application is configured to provide one or more to serve.Such as, Fig. 2, such as, Fig. 2 A, show 206 about being configured to provide one or more services and optionally accessing the user activated data that one or more particular device protection portion divides the agency obtaining module, this particular device protection portion divides acquisition module to obtain about being configured to access particular device (such as, intelligent television) one or more protections part (such as, network communication components) application (such as, internet use apply) user activate (such as user perform, such as, user is to equipment, the operating system instruction of such as intelligent television, with working procedure, such as, internet use Monitoring Service) data, described application is configured to provide one or more services (such as, the service of the content of the online viewing of monitoring).
Refer again to Fig. 7 A; operation 602 can comprise operation 708; this operation 708 describes the data of the application obtained about being configured to one or more protection parts of accessing particular device, and described application is configured to provide one or more services of the one or more protection parts requiring access particular device.Such as, Fig. 2, such as, Fig. 2 A, show 208 relevant be configured to provide require one or more services of the one or more particular device protection part of access and optionally access the data that one or more particular device protection portion divides the agency obtaining module, this particular device protection portion divides acquisition module to obtain about being configured to access particular device (such as, such as smart mobile phone, and the part that holder is particular device deposited by picture, because particular device controls it, such as, execution is checked, amendment, change, increase, deduct and delete one or more ability of the one or more files as a part of depositing holder) one or more protections part (such as, holder deposited by the picture be stored in the cloud network storage) application (such as, picture uploading apply) data, described application be configured to provide require the one or more particular device protection part of access one or more services (such as, picture uploading is served).
Refer again to Fig. 7 A, operation 708 can comprise operation 710, this operation 710 depicts the data of the bicycle efficiency application obtained about being configured to the alignment sensor of accessing particular device, described bicycle efficiency application provides one or more efficiency statistics by bike after being configured to carry this equipment when the user of particular device is by bike, and the described statistics of cycle efficieny by bike requires to use alignment sensor.Such as, Fig. 2, such as, Fig. 2 A, 210 relevant one or more efficiency display services and optionally access the data that one or more particular device protection portion divides the bicycle efficiency monitor agent obtaining module being by bike configured to provide needed for the one or more particular device protection part of access are provided, this particular device protection portion divides acquisition module to obtain about being configured to access particular device (such as, tie up at bicycle handlebar monitoring equipment on hand) alignment sensor bicycle efficiency application data (such as, obtain the position in the storer loading application), the application of described bicycle efficiency after being configured to carry this equipment when the user of particular device is by bike (such as, ride the bicycle connecting this equipment) provide one or more efficiency statistics by bike (such as, height change hourly), described efficiency statistics by bike requires to use alignment sensor (such as, this equipment can use three-dimensional triangulation to measure, and it is to be noted, other modes can be had to carry out measuring height change, such as, pass through altitude gauge, but this equipment can not have altitude gauge, or can the triangulation of choice for use three-dimensional position).
Refer again to Fig. 7 A; operation 602 can comprise operation 712; this operation 712 describes the data showing to exist the application being configured to one or more protection parts of accessing particular device received from particular device, and described application is configured to provide one or more to serve.Such as, Fig. 2, such as, Fig. 2 A, show 212 about being configured to provide one or more services and the data of optionally accessing the agency of the one or more particular device protection parts received from particular device module, this particular device from particular device (such as, cellular smart mobile phone) receive show existence be configured to access particular device (such as, the list of the number of calling in the telephony feature in the end seven days of equipment) one or more protection parts application (such as, there is application, application link or other relative indicator) data (such as, application consumes one or more device resources, such as, processor power, fix or random access memory, Internet resources, or the designator using the device operating system of one or more sensor and/or input/output interface to produce), described application is configured to provide one or more services (such as, use pattern generator service).
Refer again to Fig. 7 A, operation 602 can comprise operation 714, and this operation describes scanning particular device to determine the identity of the application being configured to one or more protection parts of accessing particular device, and described application is configured to provide one or more to serve.Such as, Fig. 2, such as, Fig. 2 B, show 214 to be configured to provide one or more services and the data of optionally accessing the agency of one or more particular device protection part by the relevant of scanning particular device module acquisition, this particular device module scans (such as, equipment (is comprised, storer) one or more parts perform the analysis of any type, that whether fix or activity, and such as circuit, sensor, other scannings of input/output interface etc., and comprise the data of the relevant devices that scanning is collected, such as, registry file or remote journal file) particular device to be to determine to be configured to access particular device (such as, the video camera that Wi-Fi enables) one or more protections part (such as, the particular category of the picture that user is appointed as " privately owned ") application (such as, picture enhancement service) identity (such as, the title of application or the relevant information applied or inner code name, such as, process identifier number), described application is configured to provide one or more to serve.
Refer again to Fig. 7 B; operation 602 can comprise operation 716; this operation 716 describes the data obtaining the application about being configured to one or more protection parts of accessing particular device from the operating system of particular device, and described application is configured to provide one or more to serve.Such as, Fig. 2, such as, Fig. 2 B, show 216 provide one or more to serve from relevant being configured to that operating system module obtains and optionally accessing the data of the agency of one or more particular device protection part, this operating system module is from particular device (such as panel computer, such as, iPad) operating system (such as, iOS) obtain about being configured to access particular device (such as panel computer, such as, the application of one or more protection parts iPad) (such as, ATM searches for application) data, described application is configured to provide one or more services (such as, search at the nearest ATM of the current location of user).
Refer again to Fig. 7 B; operation 602 can comprise operation 718; this operation 718 describes the data of monitoring the one or more protection parts be sent to and/or from particular device, comprises the data of the application be sent to and/or from the one or more protection parts being configured to access particular device.Such as, Fig. 2, such as, Fig. 2 B, show 218 by be sent to and/or one or more transmission of monitoring relevant from one or more particular device protection portion sub-module is configured to provide one or more services and the data of optionally accessing the agency of one or more particular device protection part, the monitoring of this particular device protection portion sub-module (such as, receive all or a part of of data, such as, a packet in every ten packets) to be sent to and/or from particular device (such as, onboard navigation system) one or more protections part (such as, GPS localization tracker) data, comprise and be sent to and/or access particular device (such as from being configured to, onboard navigation system) one or more protection part application (such as, refuelling station's gas price compares application) data.
Refer again to Fig. 7 B; operation 602 can comprise operation 720; this operation 720 describes the one or more usage logs receiving particular device, and described usage log comprises the use information of the one or more application about being configured to one or more protection parts of accessing particular device.Such as, Fig. 2, such as, Fig. 2 B, show 220 from about being configured to provide one or more services and optionally accessing the data that one or more particular device protection portion divides one or more particular device daily records of the agency obtaining module, this particular device protection portion divides acquisition module to receive particular device (such as, the smart mobile phone of user) one or more usage logs (such as, look for the daily record of friend's application access equipment contacts list) at every turn, described usage log comprises about being configured to access particular device (such as, the smart mobile phone of user) one or more protections part (such as, the contacts list of user) one or more application (such as, use look for friend to apply and may with these zero or more other frequencies applied device-dependent and/or multiple parts of looking for the smart mobile phone of friend's application access user (such as, be stored on smart mobile phone or smart mobile phone can the frequency of contacts list) daily record) use information.
Refer again to Fig. 7 B, operation 602 can comprise operation 722, and this operation 722 depicts to detect to apply and performed one or more at least one of serving and applied the one or more protection parts maintaining access particular device.Such as, Fig. 2, such as, Fig. 2 B, show 222 agencies performed one or more services and continue that the one or more particular device protection portion of access divides detection module can detection indicator, this particular device protection portion divides detection module to detect application (such as, phonetic synthesis is applied) perform one or more services (such as, cover up the sound of user when communicating with telephone plant) at least one and application maintain access particular device (such as, the telephone system that VoIP enables) one or more protections part (such as, the microphone of equipment).
Referring now to Fig. 7 C; operation 602 can comprise operation 724, this operation 724 depict detect application perform at least one of one or more services at least partially after stopped and apply maintenance after termination accessing one or more protection parts of particular device.Such as, Fig. 2, such as Fig. 2 B, show 224 agencies stopped relating to activities of performing one or more services and after stopping activity detection module, continue the one or more particular device protection part of access can detection indicator, this termination activity detection module detects in one or more services of execution (such as, be arranged on home computer and surf the web the internet use Monitoring Service of content to notice children) at least one at least partially after application stop (such as, stop, provisionally or until reactivation etc.) and application after termination maintain access particular device (such as, home computer) one or more protections part (such as, the list of websites of the browser access operated on computers).
Refer again to Fig. 7 C; operation 724 can comprise operation 726, this operation 726 depict storer by checking particular device detect at least partially application perform at least one of one or more services at least partially after stopped and apply maintenance after termination accessing one or more protection parts of particular device.Such as, Fig. 2, such as Fig. 2 B, show 226 agencies stopped relating to activities of performing one or more services and after the termination activity detected at least partially by analyzing particular device module, continue the one or more particular device protection part of access can detection indicator, this particular device module is by detecting particular device (such as, home computer) storer (part of depositing is applied in the operation of such as storer) detect at least partially execution one or more service (such as, allow user have meal) at least partially after application (such as, calorie consumption tracker) stop and applied the one or more protection parts (having how many caloric database in such as various food) maintaining access particular device after termination.
Refer again to Fig. 7 C; operation 724 can comprise operation 728, this operation 728 depict by receive from the report storing monitoring and measuring application detect application perform at least one of one or more services at least partially after stopped and apply maintenance after termination accessing one or more protection parts of particular device.Such as, Fig. 2, such as Fig. 2 C, show 228 agencies stopped relating to activities of performing one or more services and after the termination activity that the report using particular device module to issue at least in part detects, continue to access one or more particular device protection part can detection indicator, this particular device module detects in one or more services of execution (such as by the report received from storer monitoring and measuring application, the positioning service of soda water vending machine) at least partially after application stopped and apply after termination maintain access particular device one or more protection parts (such as, alignment sensor).
Refer again to Fig. 7 C; operation 724 can comprise operation 730, this operation 730 depict detect application perform at least one of one or more services at least partially after stopped and flow to by monitoring and/or detect application from the data stream of one or more protection parts of particular device maintaining one or more protection parts of accessing particular device after termination.Such as, Fig. 2, such as Fig. 2 C, show 230 agencies stopped relating to activities of performing one or more services and after the termination activity of the data-flow detection by analyzing one or more particular device protection portion sub-module, continue the one or more particular device protection part of access can detection indicator, this particular device protection portion sub-module detect application perform one or more service at least one at least partially after stopped and monitor flow to and/or from one or more protection parts of particular device data stream to detect application maintain after termination access particular device (such as, the tablet device of user) one or more protection parts.
Refer again to Fig. 7 C; operation 724 can comprise operation 732, this operation 732 depict detect application perform at least one of one or more services at least partially after stopped and detected application by the report received from protection part monitoring and measuring application maintaining one or more protection parts of accessing particular device after termination.Such as, Fig. 2, such as Fig. 2 C, show 232 agencies stopped relating to activities of performing one or more services and after the termination activity that the report using the monitor agent of one or more particular device protection portion sub-module to issue at least in part detects, continue to access one or more particular device protection part can detection indicator, this particular device protection portion sub-module detects in one or more services of execution (such as, the user of the selection of music equipment listened based on the user of equipment may interested concert) at least one at least partially after application (such as, based on the music that equipment (such as media player) or the user of equipment that comprises media player are listened, collect concert information and select the application of the interested concert of the user of equipment possibility) stop and passed through to receive from protection part monitoring and measuring application (can being such as a part for operating system, can be maybe independent application) report detect application after termination maintain access particular device (such as, media player or the operation computing machine of music player application or other equipment) one or more protection parts (music playlist that user sets up).
Refer again to Fig. 7 C; operation 732 can comprise operation 734, this operation 734 depict detect application perform at least one of one or more services at least partially after stopped and detected application by the report received from the device operating system of the one or more protection part of monitoring maintaining one or more protection parts of accessing particular device after termination.Such as, Fig. 2, such as Fig. 2 C, show 234 agencies stopped relating to activities of performing one or more services and after the termination activity that the report using the monitor agent based on kernel of one or more particular device protection portion sub-module to issue at least in part detects, continue to access one or more particular device protection part can detection indicator, this particular device protection portion sub-module detects and performs one or more services (such as in application, monitoring subjective situation to detect the service of medical emergency) at least one at least partially after stopped and by receive from monitor one or more protection part device operating system (such as, the Android operation system revised by equipment supplier run on the equipment that equipment supplier manufactures) report detect one or more protection parts that application maintains access particular device after termination.
Fig. 8 A-8D depicts the various embodiments of the operation 604 according to embodiment, and this operation 604 depicts at least one and one or more protection parts of application maintenance access particular device of detecting and applying and completed one or more services.Referring now to Fig. 8 A, operation 604 can comprise operation 802, and this operation 802 depicts and receives the notice that application has completed at least one of one or more services.Such as, Fig. 3, such as, Fig. 3 A, show the notice of the stopping of 302 one or more service reception modules, this service reception module receives application (such as, self-driving travel intended application) and has completed one or more services (such as, auxiliary plan self-driving travel) the notice (such as, notification received packet) of at least one.
Refer again to Fig. 8 A, operation 604 can comprise operation 804, and this operation 804 depicts and receives the notice that application maintains one or more protection parts of access particular device.Such as; Fig. 3; such as; Fig. 3 A; show 304 agencies and continue to access the notice that one or more particular device protection portion divides receiver module; this particular device protection portion divides receiver module to receive application (such as; video-game strengthens application) maintain access particular device (such as; video game system; such as; the notice (electric pulse such as, causing machine state to change) of one or more protections part (such as, video card buffer memory) NintendoWii).
Refer again to Fig. 8 A, operation 802 can comprise operation 806, and this operation 806 depicts and receives from application the notice that application has completed at least one of one or more services.Such as, Fig. 3, such as, Fig. 3 A, show the notice of the stopping of one or more services that 306 receive from proxy module, this proxy module receives application (such as, wireless network strength analysis) from application and has completed one or more services (such as, analyze the available wireless network that user connects) the notice (such as, receive designator) of at least one.
Refer again to Fig. 8 A, operation 802 can comprise operation 808, and this operation 808 depicts and receives from device operating system the notice that application has completed at least one of one or more services.Such as, Fig. 3, such as, Fig. 3 A, show the notice of the stopping of one or more services that 308 receive from particular device operating system module, this particular device operating system module receives application (such as from device operating system (such as, the self-defining operation system of equipment supplier's amendment), speech processing applications) complete the notice of at least one one or more services (such as, pre-service receive from user voice command).
Refer again to Fig. 8 A, operation 804 can comprise operation 810, and this operation 810 depicts the notice of dividing the one or more protection parts receiving application maintenance access particular device from one or more protection portion of particular device.Such as, Fig. 3, such as, Fig. 3 A, show the notice that 310 agencies received from one or more particular device protection portion sub-module continue to access one or more particular device protection part, this particular device protection portion sub-module from particular device (such as, Windowsphone, such as, NokiaLumia) one or more protection parts (such as, the accelerometer of equipment) receive application (such as, sense be about to occur impact time proterctive equipment impact early warning application) maintain access particular device (such as, Windowsphone) one or more protection parts (such as, accelerometer) notice.
Refer again to Fig. 8 A, operation 804 can comprise operation 812, and this operation 812 depicts and receives from apparatus assembly the notice that application maintains one or more protection parts of access particular device.Such as; Fig. 3; such as; Fig. 3 A; show 312 agencies received from proterctive equipment assembly module and continue to access the notice of one or more particular device protection part; this proterctive equipment assembly module receives from apparatus assembly (such as, from the application monitoring assembly of hardware implementation) notice that application maintains one or more protection parts of access particular device (such as, vendor-specific smart mobile phone).
Refer again to Fig. 8 A, operation 812 can comprise operation 814, and this operation 814 depicts and receives from the apparatus assembly of a part for the one or more protection parts as particular device the notice that application maintains one or more protection parts of access particular device.Such as, Fig. 3, such as, Fig. 3 A, show the notice that 314 agencies received from the proterctive equipment assembly of the part as one or more particular device protection portion sub-module continue to access one or more equipment protection part, this particular device protection portion sub-module from the one or more protection parts as particular device (such as notebook computer) (such as, the protection portion of equipment is divided and is comprised sensor and determine which kind of entity just at the monitor for this sensor of access sensors, or, in another embodiment, the protection portion of equipment divides the fragment comprising storer, and be designed to check the fragment of storer and identify the application of the one or more entities accessing or attempting the fragment of accessing storer) apparatus assembly receive the notices that application maintains one or more protection parts of access particular device.
Refer again to Fig. 8 A, operation 804 can comprise operation 816, and this operation 816 depicts and receives from the notice application of one or more protection parts of accessing particular device the notice that application maintains one or more protection parts of access particular device.Such as, Fig. 3, such as, Fig. 3 A, show the notice that 316 agencies continue to access the one or more equipment protection parts received from notification agent module, this notification agent module is from accessing particular device (such as, tablet device) one or more protection part notices application (such as, an object is had at least to be determine which kind of entity is accessing the application of what part of equipment at least partially at least one entity and equipment) receive application (such as, photo face recognition is served) maintain access particular device (such as, image acquiring sensor) one or more protection part notices.
Referring now to Fig. 8 B, operation 604 can comprise operation 818, and this operation 818 depicts and detects at least one that application has completed one or more services.Such as, Fig. 3, such as, Fig. 3 B, show the one or more agent operation of 318 termination to perform one or more service detection module, this service detection module detects at least one that application (such as, running mileage follows the trail of application program) has completed one or more services (such as, following the trail of the service of how many mileages as a part for training program of running).
Refer again to Fig. 8 B, operation 604 can comprise operation 820, and this operation 820 depicts and receives the notice that application maintains one or more protection parts of access particular device.Such as; Fig. 3; such as; Fig. 3 B; showing 320 divides the agency of the stopping of the access of detection module to prevent to one or more particular device protection portion; this particular device protection portion divides detection module to receive application (such as; running mileage follows the trail of application) maintain access (such as; after user has shown that running terminates; application still accesses alignment sensor) particular device is (such as; exercise aiding apparatus) the notice of one or more protections part (such as, alignment sensor).
Refer again to Fig. 8 B, operation 820 can comprise operation 822, and this operation 822 describes one or more states of one or more parts of observing particular device to determine to apply at least one having completed one or more services.Such as, Fig. 3, such as, Fig. 3 B, show agency's prevention of the stopping of the access to one or more particular device protection part that 322 are detected by particular device monitoring modular, this particular device monitoring modular is observed (such as, receive the data about one or more states, or the report received about one or more states, or insert in the order wire between two assemblies, or between virtual insertion two methods, or serve as two or more assemblies, sensor, interface, contact between user etc. or interface) particular device is (such as, smart mobile phone) one or more parts one or more states (such as, status information, such as, environmental factor dependence and/or environmental factor dependence information) to determine application (such as, the processor of Monitoring Service uses) complete one or more at least one of serving.
Refer again to Fig. 8 B, operation 820 can comprise operation 824, and this operation 824 describes observes one or more outputs of presenting to user by one or more output precisions of particular device.Such as, Fig. 3, such as, Fig. 3 B, show 324 by present to particular device user monitor module particular device output detections protect the agency of the stopping of part access to prevent to one or more particular device, this particular device user monitor module is observed (such as, receive the data about one or more states, or the report received about one or more states, or insert in the order wire between two assemblies, or between virtual insertion two methods, or serve as two or more assemblies, sensor, interface, contact between user etc. or interface) by particular device (such as, video game system and associated peripheral, such as, TV and controller) one or more output precisions (such as, LED light, touch screen, lcd screen, loudspeaker, earphone, tactile feedback button etc.) present to one or more outputs of user (such as, vision, the sense of hearing, sense of touch or other forms of output).
Referring now to Fig. 8 C, operation 604 can comprise operation 826, and this operation 826 depicts and receives the notice that application has completed at least one of one or more services.Such as, Fig. 3, such as, Fig. 3 C, the designator that the agency that the 326 one or more services that show obtain module stops, this service obtains module and receives the notice that application (such as, network connection management application) has completed at least one of one or more services (such as, for asking the user downloaded movies to find high-efficiency network).
Refer again to Fig. 8 C, operation 604 can comprise operation 828, and this operation 828 depicts and detects one or more protection parts that application maintains access particular device.Such as; Fig. 3; such as; Fig. 3 C; show 328 agencies to continue to access one or more particular device protection portion and divide the designator obtaining module, this particular device protection portion is divided and is obtained module and detect application (such as, network connection management application) and maintain access particular device (such as; smart mobile phone, panel computer, notebook computer etc.) one or more protections part (such as, the I/O stream of network controller).
Refer again to Fig. 8 C, operation 828 can comprise operation 830, and this operation 830 depicts one or more states of one or more parts of observing particular device to determine to apply the one or more protection parts maintaining access particular device.Such as; Fig. 3; such as; Fig. 3 C; show 330 to detect by particular device state the agency that monitoring modular obtains and continue to access the designator of one or more particular device protection part; this particular device state detects monitoring modular and observes particular device (such as; the network user of company and the personal portfolio of employee) one or more parts one or more states with determine apply maintain access particular device (network computer such as, in corporate networks corporate environment) one or more protection parts.
Refer again to Fig. 8 C, operation 828 can comprise operation 832, and this operation 832 depicts reads the one or more level of access data relevant to particular device, and described level of access data show the one or more level of access applied.Such as, Fig. 3, such as, Fig. 3 C, show 332 agencies obtained by monitor agent level of access data module and continue to access the designator of one or more particular device protection part, this proxy access horizontal data module reads the one or more level of access data relevant with particular device (such as, be allowed for the list of the level of access of various application, or the list of the required level of access such as various sensor and/or fragment), described level of access data show one or more level of access of application (such as, whether from application side or protection part side, and whether refer to application or the part as set of applications or application class specially).
Refer again to Fig. 8 C; operation 828 can comprise operation 834; this operation 834 depicts to read and divides relevant visit data to one or more protection portion of particular device; described visit data shows the one or more entities accessing protection part, and this one or more entity comprises one or more application.Such as, Fig. 3, such as, Fig. 3 C, show the designator that 334 agencies obtained by monitoring particular device visit data module continue to access one or more particular device protection part, the reading of this particular device visit data module and particular device are (such as, desktop computer) one or more protection portion divide relevant visit data (such as, the one or more assembly of relevant access, application, memory segment, the data of section etc.), described visit data shows to access one or more entities of protection part (such as, people, application, application class, developer, operating system etc.), this one or more entity comprises one or more application.
Refer again to Fig. 8 C, operation 828 can comprise operation 836, and this operation 836 depicts one or more access rights of one or more protection parts of monitoring particular device to determine to apply the one or more protection parts maintaining access particular device.Such as; Fig. 3; such as; Fig. 3 C; show the designator that 336 agencies obtained by monitoring the one or more particular device protection portion sub-module of trial access continue to access one or more particular device protection part; this particular device protection portion sub-module monitoring particular device (such as; cellular communication apparatus) protection part (such as; speed pickup) one or more access rights with determine application (such as; location tracking equipment) maintain one or more protections of access particular device partly (such as, speed pickup).
Refer again to Fig. 8 C, operation 828 can comprise operation 838, and this operation 838 depicts one or more features of analytical applications to determine to apply the one or more protection parts maintaining access particular device.Such as; Fig. 3; such as; Fig. 3 C; show the designator that 338 agencies obtained by agents analysis module continue to access one or more particular device protection part, one or more features of this Agent Analysis module analysis application are (such as, in the level, API level, interface level etc. of source code; whether directly process application or processing relevant information) to determine to apply the one or more protection parts maintaining access particular device (such as, smart mobile phone).
Refer again to Fig. 8 D, operation 604 can comprise operation 840, and one or more protection parts of particular device are accessed in this operation 840 after depicting at least one detecting and be applied in one or more services.Such as, Fig. 3, such as, Fig. 3 D, the agency showing 340 one or more services stops and acting on behalf of the one or more particular device protection portion of special access dividing detection module, this particular device protection portion divides detection module to detect application (such as, the positioning service of soda water vending machine) complete one or more service at least one after (such as, to user location and/or provide nearest and have the guide of the soda water vending machine of SunkistOrange stock) access particular device (such as, smart mobile phone) one or more protections part (such as, alignment sensor).
Refer again to Fig. 8 D, operation 604 can comprise operation 842, and this operation 842 depicts to detect to look for friend to apply completing and looks for friend to serve and look for friend to apply maintaining access to store contacts list on a particular device.Such as, Fig. 3, such as, Fig. 3 D, show 342 one or more look for friend to serve look for friend to act on behalf of stopping and looking for friend to act on behalf of and continue access particular device contacts list detection module, this particular device contacts list detection module detects to look for friend to apply completing and looks for friend to serve and look for friend to apply maintaining access to be stored in contacts list on particular device (such as, having the smart mobile phone of the shared contacts list shared between the several equipment comprising notebook computer, desktop computer, tablet device and smart mobile phone).
Refer again to Fig. 8 D, operation 842 can comprise operation 844, this operation 844 depicts one or more entity of detecting and looking for friend to apply locating and list in storage contacts list on a particular device and identifies one or more entities of location to the user of particular device, and looks for friend to be applied in for user locates and access contacts list after identifying the one or more entities listed in contacts list.Such as, Fig. 3, such as, Fig. 3 D, show looking for friend to act on behalf of location and one or more stoppings of looking for friend to serve and looking for friend to act on behalf of continuation access particular device contacts list after the location of one or more entity detection module and identification of the 344 one or more entities listed in the particular device contacts list completed, this entity detection module detects one or more entity of looking for friend to apply locating and listing in storage contacts list on a particular device and identifies one or more entities of location to the user of particular device, and look for friend to be applied in for user locates and access contacts list after identifying the one or more entities listed in contacts list.
Refer again to Fig. 8 D, operate 604 and can comprise operation 846, this operation 846 depicts the notice having completed the notice of at least one of one or more services and one or more protection parts of reception application maintenance access particular device from application reception application.Such as, Fig. 3, such as, Fig. 3 D, show the notice based on agency of the stopping of 346 one or more services and act on behalf of the notice continuing the one or more particular device protection portion of access and divide receiver module, this particular device protection portion divides receiver module from application (such as, music assorting apply) receive application completed one or more service at least one (such as, by equipment record or classify from a piece of music of web download) notice and receive application (such as, music assorting is applied) maintain one or more protection parts of access particular device (such as, deposit the part of the storer of music or the microphone for recording musical) notice (such as, from operating system or from protection part or from Another application).
Refer again to Fig. 8 D; operation 846 can comprise operation 848, and this operation 848 depicts and completed the notice of at least one that one or more are served from application reception application and received the notice applied and maintain one or more protection parts of accessing particular device from application.Such as, Fig. 3, such as, Fig. 3 D, show the notice based on agency of dividing receiver module based on the notice acted on behalf of and the one or more particular device protection portion of continuation access of the stopping of 348 one or more services, this particular device protection portion divides receiver module from application (such as, walking mileage tracker) receive application and complete at least one of one or more services (such as, application shows that it is closed, or complete discrete tasks) notice and receive application (such as, walking mileage tracker) maintain access particular device (such as, portable passometer device) one or more protections part (such as, passometer) notice.
Refer again to Fig. 8 D; operation 846 can comprise operation 850, and this operation 850 depicts and completed the notice of at least one of one or more services from applying reception application and divided the notice receiving the one or more protection parts applying maintenance access particular device from one or more protection portion of particular device.Such as, Fig. 3, such as, Fig. 3 D, show the notice based on agency of the stopping of 350 one or more services and act on behalf of the notice based on particular device protection part continuing the one or more particular device protection portion of access and divide receiver module, this particular device protection portion divides receiver module from application (such as, under tracking current weather conditions, the hiking path status of the availability in specific hiking path follows the trail of application) receive application (such as, under tracking current weather conditions, the hiking path status of the availability in specific hiking path follows the trail of application) complete the notice of at least one of one or more services and divided reception notification from one or more protection portion of particular device.
Fig. 9 A-9C depicts the various embodiments of the operation 606 according to embodiment, and this operation 606 depicts to present and shows to complete one or more services and the information of one or more protection parts of application maintenance access particular device.Referring now to Fig. 8 A, operation 606 can comprise operation 902, and this operation 902 depicts vision on the display of particular device and presents and complete one or more services and application maintains the information of one or more protection parts of access particular device.Such as, Fig. 4, such as, Fig. 4 A, the vision showing the stopping of the 402 continuation proxy access presented in particular device output precision module one or more particular device protection parts and one or more services presents, this particular device output precision module particular device display (such as, screen) on present complete one or more service and apply (such as, wireless network strength analyzer) maintain access particular device (such as, tablet device) the vision of one or more protection parts present (such as, notice graphic icons).
Referring now to Fig. 9 A, operation 902 can comprise operation 904, and this operation 904 depicts to present on the display of particular device and completes one or more services and the vision that the application being configured to provide one or more serve maintains the alignment sensor of accessing tablet device presents.Such as, Fig. 4, such as, Fig. 4 A, the vision showing the stopping of the 404 continuation proxy access tablet device alignment sensors presented in particular device output precision module and one or more services presents, this particular device output precision module at particular device (such as, smart mobile phone) display on present and complete one or more services and the vision that the application being configured to provide one or more serve maintains the alignment sensor of accessing tablet device presents (such as, present the stop element of sensor, such as, for the letter " GPS " of alignment sensor in stop element).
Referring now to Fig. 9 A, operation 904 can comprise operation 906, and this operation 906 depicts and on the display of particular device, presents the travel's assistant service completing children's highway and the vision being configured to provide the application of travel's assistant service of children's highway to maintain the alignment sensor of access tablet device presents.Such as, Fig. 4, such as, Fig. 4 A, the vision showing the stopping of travel's assistant service of the 406 continuation proxy access tablet device alignment sensors presented in particular device output precision module and children's highway presents, and this particular device output precision module on the display of particular device, present the travel's assistant service completing children's highway and the vision being configured to provide the application of travel's assistant service of children's highway to maintain the alignment sensor of access tablet device presents.
Refer again to Fig. 9 A, operation 606 can comprise operation 908, and this operation 908 user depicted to equipment presents and shows to complete one or more services and application maintains the information of one or more protection parts of access particular device.Such as; Fig. 4; such as; Fig. 4 A; show the designator that the 408 continuation proxy access one or more particular device protection parts presented to the entity relating to particular device and one or more service present the stopping of module, this service presents module and presents to the user of equipment and show to complete one or more services and application maintains the information of one or more protection parts of access particular device.
Refer again to Fig. 9 A, operation 606 can comprise operation 910, and this operation 910 depicts to present and completes one or more services and the notice of one or more protection parts of application maintenance access particular device.Such as; Fig. 4; such as; Fig. 4 A; show 410 continuation proxy access one or more particular device protection part and one or more service presents the notice of the stopping of module, this service presents module and presents and complete one or more services (such as, public lavatory searcher service) and application maintains access particular device (such as; smart mobile phone) the notice of one or more protections part (such as, GPS location sensor).
Refer again to Fig. 9 A, operation 606 can comprise operation 912, and this operation 912 depicts to show on a particular device and completes one or more services and the notice of one or more protection parts of application maintenance access particular device.Such as; Fig. 4; such as; Fig. 4 A; show the visual notification of the stoppings of the 412 continuation proxy access shown by particular device module one or more particular device protection parts and one or more services; this particular device module at particular device (such as; tablet device) upper display completed one or more services (such as; picture classification becomes directory service) and application maintains access particular device (such as; tablet device) the notice of one or more protections part (such as, the view data of picture).
Referring now to Fig. 9 A, operation 912 can comprise operation 914, and this operation 914 depicts display on the screen of particular device and shows to complete one or more services and the icon of one or more protection parts of application maintenance access particular device.Such as, Fig. 4, such as, Fig. 4 A, show the notification icon of the stoppings of the 414 continuation proxy access shown by particular device screen module one or more particular device protection parts and one or more services, this particular device screen module at particular device (such as, tablet device) screen on show complete one or more service (such as, be designed to the service finding concert based on the music of device plays and device location in the region of user) and application maintain access particular device (such as, tablet device) one or more protections part (such as, store the list of song on a user device, and the broadcasting frequency of device traces back) icon.
Referring now to Fig. 9 B; operation 606 can comprise operation 916, this operation 916 depict the one or more application presenting the one or more protection parts maintaining access particular device list and show one or more application which completed one or more services.Such as, Fig. 4, such as, Fig. 4 B, show the list of one or more agencies of 416 continuation proxy access one or more particular device protection part and stop one or more service to present one or more one or more designators of one or more agencies of module, this service presents module and presents maintenance access particular device (such as, tablet device) one or more protections part (such as, picture database) one or more application (such as, picture enhancement service (such as, go to see red) and the service of picture face recognition) list and show one or more application which completed one or more and served (such as, strengthen one or more picture and perform face recognition on one or more picture).
Refer again to Fig. 9 B; operation 606 can comprise operation 918; this operation 918 depicts the report of the one or more application producing the one or more protection parts maintaining access particular device, and wherein report shows application and whether accesses one or more protection parts of particular device to perform one or more services.Such as, Fig. 4, such as, Fig. 4 B, show 418 descriptions continue the report of proxy access one or more particular device protection part and show whether one or more services have stopped obtaining the report of module, this acquisition module produces and maintains access particular device (such as, the cellular handset of user) one or more protections part (such as, equipment contacts list) one or more application (such as, contact person's positioning service) report, wherein report shows application and whether accesses particular device (such as, the cellular handset of user) one or more protections part (such as, equipment contacts list) to perform one or more services (such as, whether anyone in identification contacts list be at ad-hoc location).
Refer again to Fig. 9 B, operation 606 can comprise operation 920, and this operation 920 depicts and indicates particular device to show to complete one or more services and one or more protection parts of application maintenance access particular device to the user of equipment.Such as; Fig. 4; such as; Fig. 4 B; show the designator that 420 instruction particular devices present the stopping continuing proxy access one or more particular device protection part and one or more service module; the instruction of this service module (such as; instruction is provided; or identifier is set; or cause one or more subroutine or hardware component activation and/or execution) particular device shows to complete to the user of equipment the information that one or more services (such as, music classifier service) and application maintain one or more protection parts of access particular device.
Refer again to Fig. 9 B, operation 606 can comprise operation 922, and this operation 922 depicts the one or more protection parts presenting to show to apply maintenance access particular device changing application.Such as; Fig. 4; such as; Fig. 4 B; show the stopping that 422 change agencies present to show to continue proxy access one or more particular device protection part and one or more service module; this service module changes application (such as; selection is made to gray alternatively; or the color of word is changed when icon hovers; or on touch screen; provide tactile feedback when selective gist) present (such as, changing outward appearance to user) with show apply maintain access particular device (such as, tablet device) one or more protection parts.
Refer again to Fig. 9 B, operation 922 can comprise operation 924, and this operation 924 depicts to change applies the color of relevant icon to show to apply the one or more protection parts maintaining access equipment to execution.Such as; Fig. 4; such as; Fig. 4 B; the vision showing 424 change agencies presents the stopping showing to continue proxy access one or more particular device protection part and one or more service module; this service module changes and performs the color of the relevant icon of application (such as, self-driving travel intended services) to show to apply the one or more protection parts maintaining access equipment (such as, smart mobile phone).
Refer again to Fig. 9 B, operation 922 can comprise operation 926, and this operation 926 depicts the execution of configuration application to require one or more extra step thus to show to user to apply the one or more protection parts maintaining access equipment.Such as, Fig. 4, such as, Fig. 4 B, showing 426 changes will for one or more steps of user's execution be to select to act on behalf of thus to show to continue the stopping that the one or more particular device of proxy access protects part and one or more service module, this service module configuration application (such as, perform the application of picture face recognition service) execution to require one or more extra step (such as, click the dialog box of extra " determining that you want to run this application ") thus show that application maintains access particular device (such as to user, tablet device) one or more protection parts.
Refer again to Fig. 9 B; operation 926 can comprise operation 928, and the execution that this operation 928 depicts configuration application is applied with the time requiring user extra with particular device interaction to activate thus shows to apply the one or more protection parts maintaining and access particular device to user.Such as, Fig. 4, such as, Fig. 4 B, show one or more steps that 428 increase requirements perform by user to select to act on behalf of thus to show to continue the stopping of proxy access one or more particular device protection part and one or more service module, the execution of this service module configuration application with the time requiring the interaction of user and particular device extra (such as, again click, or pattern is dragged with finger on touch screen) to activate application (such as, motion tracker is applied) thus show to user to apply the one or more protection parts maintaining access particular device.
Refer again to Fig. 9 B; operation 606 can comprise operation 930, and this operation 930 depicts the relative position of the one or more icons changing the interior representative application of operating system thus shows to complete one or more services and one or more protection parts of application maintenance access particular device.Such as; Fig. 4; such as; Fig. 4 B; show 430 changes to show that the agency of the stopping continuing proxy access one or more particular device protection part and one or more service module is presented on the relative position in operating system; this service module changes the relative position of one or more icons in operating system of representative application (such as; move to different windows; or menu; or dedicated menu) thus show the one or more protection parts completing one or more services and application maintenance access particular device (such as, tablet device).
Figure 10 A-10D depicts the various embodiments of the operation 608 according to embodiment, and this operation 608 depicts and promotes application stopping presenting the option of the access of one or more protection parts of particular device.Referring now to Figure 10 A, operation 608 can comprise operation 1002, and this operation 1002 depicts instruction particular device to present the option of application stopping to the access of one or more protection parts of particular device.Such as; Fig. 5; such as; Fig. 5 A; show presenting of the option of 502 stopping proxy access one or more particular device protection portion subset indicating module; this particular device protection portion subset indicating module instruction particular device (such as; Smartphone device) to present application (such as; look for friend's tracker) stop to particular device (such as; Smartphone device) the option of access of one or more protections part (the Facebook list of friends such as, being locally stored on cell phone apparatus or recovering from server).
Refer again to Figure 10 A, operation 1002 can comprise operation 1004, and this operation 1004 depicts instruction particular device and stops application to the option of one or more protection part access of particular device to present instruction particular device.Such as; Fig. 5; such as; Fig. 5 A; show 504 and be used to indicate the module of particular device to stop agency's presenting the option of the access of one or more particular device protection portion subset indicating module; this particular device protection portion subset indicating module instruction particular device (such as; notebook computing device) to present instruction particular device (such as; notebook computing device) stop applying the option of accessing one or more protections part (such as, camera) of particular device.
Refer again to Figure 10 A; operation 1004 can comprise operation 1006, and this operation 1006 indicates particular device to present the optional option of user of Gong the equipment of the one or more protection parts stopping application access particular device to the part of the particular device of one or more protection parts of access control particular device.Such as; Fig. 5; such as; Fig. 5 A; show the option that 506 modules being used to indicate particular device stop the user of proxy access one or more particular device protection portion subset indicating module optionally optional; this particular device protection portion subset indicating module instruction particular device presents one or more protection parts of instruction access control particular device (such as; alignment sensor) particular device a part thus application stop access particular device (such as, smart mobile phone) one or more protection part Gong equipment user selection options.
Refer again to Figure 10 A, operation 608 can comprise operation 1008, and this operation 1008 depicts the option presenting the one or more protection parts stopping application access particular device.Such as; Fig. 5; such as; Fig. 5 A; show the option that 508 stopping proxy access one or more particular device protection parts present module; this particular device protection part presents module instruction particular device and presents the option that application (such as, calorie follows the trail of application) stops one or more protection parts of access particular device (such as, tablet device).
Refer again to Figure 10 A; operation 1008 can comprise operation 1010, and the part that this operation 1010 depicts the particular device of the one or more protection parts to access control particular device presents the option of the one or more protection parts stopping application access particular device.Such as; Fig. 5; such as; Fig. 5 A; show the option that 510 present to the one or more particular device of stopping proxy access of the protection part access control part of particular device module; this particular device module to access control particular device (such as; device operating system; or device core layer; or device hardware interface layer) the parts of particular device of one or more protection parts present application (such as; voice operation demonstrator) stop the one or more of access particular device (such as, smart mobile phone) to protect options partly.
Referring now to Figure 10 B, operation 608 can comprise operation 1012, and this operation 1012 depicts the presenting by the configurable setting of the user of particular device promoting to stop one or more parts of application access particular device after completing one or more services.Such as, Fig. 5, such as, Fig. 5 B, show presenting of the option of indicating equipment stopping proxy access one or more particular device protection part promotion module that 512 are arranged for user, this particular device protection part promotes that module promotes complete one or more services (such as, the 5 first associated song the estimating user found according to the playlist of user may be liked) after application (such as, relevant musical searching service) stop access particular device (such as, self-control playlist part) one or more parts equipment the configurable setting of user (such as, the menu setting that the operating system of equipment promotes) present.
Refer again to Figure 10 B, operation 608 can comprise operation 1014, this operation 1014 depict promote to stop after completing one or more services one or more parts of application access particular device by the user of particular device the presenting of configurable setting before operational applications.Such as, Fig. 5, such as, Fig. 5 B, show presenting of 514 option that indicating equipment stops the user of proxy access one or more particular device protection part promotion module to arrange before agent operation, this particular device protection part promotes module to promote, and after completing one or more services, application (such as, picture face recognition is served) stop access particular device (such as, computing machine, smart mobile phone or tablet device) one or more protections part (such as, image acquiring sensor) equipment (such as, access control sensor, such as, the physical switch of image acquiring sensor or alignment sensor, such as, soft key, or hard wired buttons, switch, key, knob etc.) user's the presenting of configurable setting before operational applications.
Refer again to Figure 10 B, operation 608 can comprise operation 1016, this operation 1016 depict promote to stop after completing one or more services one or more parts of application access particular device receive application on a particular device by the user of particular device before the presenting of configurable setting.Such as, Fig. 5, such as, Fig. 5 B, show presenting of the option of 516 user's settings of indicating equipment stopping proxy access one or more particular device protection part promotion module before acting on behalf of acquisition, this particular device protection part promotes that module promotes complete one or more services (such as, friend is looked for serve) access of application stopping afterwards particular device is (such as, tablet device) one or more parts particular device (such as, tablet device) the configurable setting of user (such as, the broadcast box that " user option " screen of device operating system checks) present.
Refer again to Figure 10 B, operation 608 can comprise operation 1018, and this operation 1018 depicts and promotes that the user to particular device presents the option of one or more protection parts of application stopping access particular device.Such as, Fig. 5, such as, Fig. 5 B, show 518 and present to the entity relevant to particular device the option stopping proxy access one or more particular device protection part to promote module, this particular device protection part promotes that module promotes (such as, perform and contribute to allowing or completing the one or more operations presented) to particular device (such as, smart mobile phone) user present (such as by any combination display in vision and non-vision cross section) application (such as, mileage of riding follows the trail of application) stop access particular device (such as, smart mobile phone) one or more protection part options.
Referring now to Figure 10 C, operation 608 can comprise operation 1020, and this operation 1020 depicts the display that application stops the selectable option of one or more protection parts of access particular device.Such as, Fig. 5, such as, Fig. 5 C, show the selectable option of 520 stopping proxy access one or more particular device protection part display module, this particular device protection part display module display application (such as, running mileage tracker) stop access particular device (such as, wearable intelligent clothing, such as, mileage can be followed the trail of and/or detect socks that bubble formed to) one or more protections partly (such as, alignment sensor) selectable option (such as, phrase " you want to stop access " is said to user by loudspeaker, and wait for that user passes through the response of microphone).
Refer again to Figure 10 C, operation 608 can comprise operation 1022, and this operation 1022 depicts the application when receiving the selection stopping Access Options and stops one or more protection parts of access particular device.Such as; Fig. 5; such as; Fig. 5 C; show 522 proxy access one or more particular device protection portion ends module; this particular device protection portion ends module stops application (such as, blood glucose level monitor application) to the access of one or more protection parts of particular device (such as, being bundled in the blood/sweat sampling thief of the probe be connected on health and with smart mobile phone with belt) when receiving the selection stopping Access Options.
Refer again to Figure 10 C, operation 1020 can comprise operation 1024, and this operation 1024 depicts display and stops more than one application to access (comprising the application performing one or more services) selectable option of one or more protection parts of particular device.Such as, Fig. 5, such as, Fig. 5 C, show the selectable option that one or more particular device protection part display module is accessed in the multiple agency of 524 stopping (comprising agency), the display of this particular device protection part display module stops more than one application (to comprise and perform one or more services (such as, ATM searching service) application) access particular device (such as, the atm interface equipment that bank provides) one or more protections part (such as, bank account information) selectable option (such as, with word, " you want to stop access in display, Yes/No " dialog box).
Refer again to Figure 10 C, operation 1022 can comprise operation 1026, and this operation 1026 depicts and stops when receiving the selection stopping Access Options the application class comprising application to the access of one or more protection parts of particular device.Such as, Fig. 5, such as, Fig. 5 C, show 526 and comprise the class of one or more agencies of agency to the access of one or more particular device protection portion ends module, the stopping when receiving the selection stopping Access Options of this particular device protection portion ends module comprises the application class of application (such as, " all application that Apple company manufactures ", or " fat-reducing application used ", or " all application more than 50Mb ", or " user is appointed as all application of 5 level security levels ", or " equipment manufacturers are appointed as all application of 5 level security levels ", or " all application of access alignment sensor ", or " all application of access equipment contacts list ", or " in the end 50 days obtain all application " etc.) one or more protection parts of access particular device.
Refer again to Figure 10 C; operation 1022 can comprise operation 1028, and this operation 1028 depicts and stops when the selection of the option receiving the one or more protection parts stopping application access particular device all application that particular device exists to the access of one or more protection parts of particular device.Such as; Fig. 5; such as; Fig. 5 C; show each access one or more particular device protection portion ends module of 528 one or more agencies; this particular device protection portion ends module is receiving the selection of option to stop application access (such as; access protection part; such as; alignment sensor) time stop particular device (such as; tablet device) go up one or more protections of all application access particular devices (such as, tablet device) existed partly (such as, alignment sensor).
Refer again to Figure 10 C, operation 608 can comprise operation 1030, and this operation 1030 depicts the option thus one or more protection parts of stopping access particular device that promote to present forbidding application.Such as, Fig. 5, such as, Fig. 5 C, show 530 to present and promote that module stops presenting of the option of proxy access one or more particular device protection part by forbidding agency, this agency promotes that module promotes (such as, perform auxiliary execution or complete the one or more operations presented) present (such as, being represented by any combination at vision and non-vision interface) forbidding is (such as, the assembly of user or Another application or equipment is stoped to operate) application is (such as, 4G network speed measures application) thus stop access particular device (such as, augmented reality glasses) one or more protections part (such as, 4G radio) option.
Refer again to Figure 10 C, operation 608 can comprise operation 1032, and this operation 1032 depicts the option thus one or more protection parts of stopping access particular device that promote to present removal application.Such as, Fig. 5, such as, Fig. 5 C, show 532 for promoting that module stops presenting of the option of proxy access one or more particular device protection part by removing agency, this agency promotes that module promotes (such as, perform auxiliary execution or complete the one or more operations presented) present (such as, represented by any combination at vision and non-vision interface) remove application (such as, application is removed from storer, or to one or more link of application site and/or pointer in removal storer) thus stop access particular device (such as, smart mobile phone) one or more protections part (such as, loudspeaker export) option.
Refer again to Figure 10 D, operation 608 can comprise operation 1034, and this operation 1034 depicts and promotes to present the option implemented about one or more restrictions of one or more protection parts of application access particular device.Such as, Fig. 5, such as, Fig. 5 D, show 534 and promote presenting of the option of the restriction of module for setting up proxy access one or more particular device protection part, this particular device protection part promotes that module promotes (such as, perform auxiliary execution or complete the one or more operations presented) present (such as, represented with any combination at non-vision interface by vision) implement relevant application (such as, farm intended application) access particular device (such as, smart mobile phone) one or more protections part (such as, serve as the image acquiring sensor of optical sensor) one or more restrictions (such as, restriction, condition, reduce, regulations etc.) option.
Refer again to Figure 10 D, operation 1034 can comprise operation 1036, and this operation 1036 depicts the option that one or more protection portion timesharing of working as application trial access particular device promote to present one or more protection parts of requirement granted access particular device.Such as, Fig. 5, such as, Fig. 5 D, show 536 for requiring that express authorization is rebuild proxy access one or more particular device protection part and promoted presenting of the option of module, this particular device protection part promotes that module is when applying (such as, garden planning application) attempt access particular device (such as, family expenses weather station) one or more protection portion timesharing promote (such as, perform auxiliary execution or assisted the one or more operations presented) require that granted access is (such as, level of access is caused to change to the operation of the level allowing access) particular device is (such as, family expenses weather station) one or more protections part (such as, barometer) option present (such as, represented by any combination at vision and non-vision interface).
Refer again to Figure 10 D, operation 1034 can comprise operation 1038, and this operation 1038 depicts and promotes to present the option that restriction allows the number of times of one or more protection parts of application access particular device.Such as; Fig. 5; such as; Fig. 5 D; showing 538 allows agency's reconstruction access one or more particular device protection part to promote presenting of the option that the number of times of module limits for arranging; this particular device protection part promotes that module promotes (such as; perform auxiliary execution or assisted the one or more operations presented) present the option that (such as being shown by any combination in vision and non-vision cross section) restriction allows one or more protections number of times partly of application access particular device (such as, tablet device).
Refer again to Figure 10 D, operation 1038 can comprise operation 1040, this operation 1040 depict promote to present be limited in special time period during allow the option of the number of times of one or more protection parts of application access particular device.Such as, Fig. 5, such as, Fig. 5 D, showing 540 allows agency's reconstruction during special time period to promote presenting of the option of the number of times of the access of module restriction to one or more particular device protection part for arranging, this particular device protection part promotes that module promotes (such as, perform and auxiliary perform or assist the one or more operations presented) present (such as being shown by any combination in vision and non-vision cross section) be limited in special time period during (such as, during the time period that user is appointed as practice periods) allow application (such as, motion tracker) access one or more protection parts of particular device (such as, the caloric burn data stored) the option of number of times.
Refer again to Figure 10 D, operation 1034 can comprise operation 1042, and this operation 1042 depicts and promotes to arrange about allowing application when to access presenting of the option of one or more conditions of one or more protection parts of particular device.Such as, Fig. 5, such as, Fig. 5 D, show 542 foundation, for allowing to rebuild agency, promoted to one or more particular device protection part presenting of the option of the condition precedent of the access of module, this particular device protection part promotes that module promotes (such as, perform auxiliary execution or assisted the one or more operations presented) present (such as, represented by any combination at vision and non-vision interface) arrange about allowing application when to access particular device (such as, cellular smart cell phone apparatus) one or more protections part (such as, position data) one or more conditions (such as, only be traveled beyond 30 miles per hours when equipment is per hour, such as, show that equipment on the rolling stock, could access location data) option.
Refer again to Figure 10 D, operation 1042 can comprise operation 1044, and this operation 1044 depicts and promotes that restriction allows presenting of the option of the number of times of one or more protection parts of application access particular device when particular device is positioned at ad-hoc location.Such as, Fig. 5, such as, Fig. 5 D, show 544 and promote the presenting of the option of the condition precedent of module for allowing to rebuild ad-hoc location as proxy access one or more particular device protection part for setting up, this particular device protection part promotes that module promotes (such as, perform auxiliary execution or assisted the one or more operations presented) present (such as, represented by any combination at vision and non-vision interface) limit when particular device is positioned at ad-hoc location (such as, Times Square) time allow application (such as, open wireless network detector) access particular device (such as, Portable thermal point device or there is the cellular handset equipment of Wi-Fi broadcast) one or more protections partly (such as, radio broadcasting) the option of number of times.
Refer again to Figure 10 D; operation 608 can comprise operation 1046, and this operation 1046 depicts and promotes to require that application makes to divide the data anonymous obtained to maintain presenting of the option of the access of the one or more protection parts to particular device from one or more protection portion of particular device.Such as, Fig. 5, such as, Fig. 5 D, show 546 and promote presenting of the option of the data anonymous of module for requiring for continuing proxy access one or more particular device protection part, this particular device protection part promotes that module promotes to present (such as, take one or more step (such as, operation, subroutine, physical change etc.) with auxiliary execution) require that application makes from particular device (such as, smart mobile phone) one or more protections part (such as, alignment sensor data) data anonymous that obtains is (such as, fuzzy, remove, change the source etc. of data) to maintain access (such as, when not anonymization, can interrupt access) particular device one or more protection part options.
Although illustrated and described the particular aspects of theme as herein described, but those skilled in the art can understand, it is evident that, according to instruction herein, can carry out when not departing from theme as herein described and broad range thereof changing and revising, therefore appended claims within the scope of it by contain fall into theme as herein described true spirit and scope in all such changes and modifications.What it will be understood by those skilled in the art that is, generally speaking, term as herein described, and the term especially in appended claims (such as, the main body of appended claims), is generally intended for " open " term (such as, term " comprises " and should be understood to " comprise; but be not limited to ", term " has " and should be understood to " at least having ", term " comprises " and should be understood to " including but not limited to " etc.).
Those skilled in the art can understand further, if the claim recitation of the introducing of specific quantity is intentional, then such intention can clearly be stated in the claims, and when there is not this statement, just there is not this intention.Such as, in order to help to understand, following appended claims can comprise use leading question " at least one " and " one or more " to introduce claim recitation.But, use this phrase should not to be managed solution becomes to imply notany specific rights comprising the claim recitation of this introducing is required that being defined as claims only comprises a this statement by the claim recitation that definite article " " or " one " are introduced, even when same claim comprises the indefinite article guiding phrase " one or more " or " at least one " and such as " " or " one " (such as, " one " and/or " one " should be understood to " at least one " or " one or more " usually); Use for the definite article for introducing claim recitation is like this equally.In addition, even if clearly describe the concrete quantity of the claim recitation of introducing, one skilled in the art will realize that, this statement usually should be understood to and means that the quantity at least stated (such as, the blunt statement of " two statements ", when there is no other modifiers, usually mean at least two statements, or two or more statements).
In addition, be similar to these situations of the agreement of " in A, B and C etc. at least one " in use under, general this structure be the agreement that it will be understood by those skilled in the art that the meaning (such as, " there is the system of at least one of A, B and C " can comprise but not limit: the system only having A, the system only having B, only have the system of C, have A with B together with system, have the system together with A with C, have B with C together with system and/or the system etc. that has A, B together with C).Be similar to these situations of the agreement of " in A, B or C etc. at least one " in use under, general this structure be the agreement that it will be understood by those skilled in the art that the meaning (such as, " there is the system of at least one in A, B or C " can include but not limited to: the system only having A, the system only having B, only have the system of C, have A with B together with system, have the system together with A with C, have B with C together with system and/or the system etc. that has A, B together with C).What those skilled in the art can understand further is, usually, represent that any separation word of two or more options and/or word (no matter being in instructions, claims or accompanying drawing) are to be understood as to consider to comprise one of them, comprise any one or comprise the possibility of two items, unless the context opposite situation.Such as, the phrase of " A or B " is understood as that the possibility comprising " A " or " B " or " A and B " usually.
For appended claims, it will be understood by those skilled in the art that, the operation stated herein generally can perform according to random order.In addition, although provide multiple operating process in order, should be understood that, multiple operation can perform according to other orders except the order illustrated, or can perform simultaneously.The example of this alternative sequence can comprise overlap, interlocks, interrupts, reorders, increases, prepares, supplements, synchronous, oppositely or other different sequences, unless context indicates in addition.In addition, as " response ", " relating to " or the adjectival term of other past tenses, also not intended to be gets rid of this variant, unless context indicates in addition.
The application can with reference to one or more trade mark, such as by a manufacturer or wholesale dealer adopt and for making his or her product distinguish and/or be different from the word of other people product, letter, symbol or equipment.Brand name used herein is to set forth with such language: namely, make their identity clear, they are different from common description noun, there is fixing and clear and definite implication, or in many (if not all) situation, other being attended by the term using trade mark not comprise identify specially.In addition, brand name used herein has implication that is known in document and definition, but do not relate to its need to know one or more secret of the trade to predict product or the compound of their implication.The all trade marks mentioned in this manual are their possessory properties separately, and the appearance of one or more in this manual trade mark can not reduce or otherwise adversely affect the validity of one or more trade mark.The registration occurred in this manual or unregistered all trade marks are assumed that and comprise suitable trade mark, such as, the R of zone circle or bracketed capitalization (such as, [brand name]), even if these trade marks do not occur by trade mark clearly.As long as use trade mark to refer to product or method with describing mode, this trade mark just should be understood to the corresponding product or method that represent from submitting the date of this patented claim to.
In this description, term " in an embodiment ", " in one embodiment ", " in certain embodiments ", " in several embodiments ", " at least one embodiment ", " in various embodiments " etc. can be used.These terms each and all these similar terms should be understood to " at least one embodiment, and may but may not in all embodiments ", unless otherwise expressly noted.Specifically, unless otherwise expressly noted, the non-exclusive of embodiments of the present invention is to provide and limiting examples as the object of these phrases.One, some pure statements that perhaps many embodiments comprise one or more things or have one or more feature do not imply that all embodiments comprise one or more things or have one or more feature, but do not imply that these embodiments must exist yet.Only refer to example and should otherwise not understand, unless clearly stated like this.

Claims (41)

1. an equipment, it comprises:
About being configured to provide one or more services and optionally accessing the data that one or more particular device protection portion divides the agency obtaining module;
The stopping of one or more services described that described agency provides and described agency continue to access one or more particular device protection portion and divide detection module;
The one or more particular device of continuation proxy access that agency presents module to be provided protects the designator of the stoppings of part and one or more services; And
One or more particular device protection part described in proxy access is stopped to promote presenting of the option of module.
2. equipment according to claim 1, wherein saidly divides the data of the agency obtaining module to comprise about being configured to provide one or more services and optionally accessing one or more particular device protection portion:
Relevant be configured to provide require one or more services of the one or more particular device protection part of access and optionally access the data that described one or more particular device protection portion divides the agency obtaining module.
3. equipment according to claim 1, wherein saidly divides the data of the agency obtaining module to comprise about being configured to provide one or more services and optionally accessing one or more particular device protection portion:
Relevant being configured to obtained by scanning described particular device module provides one or more to serve and optionally accesses the data of the agency of one or more particular device protection part.
4. equipment according to claim 1, wherein saidly divides the data of the agency obtaining module to comprise about being configured to provide one or more services and optionally accessing one or more particular device protection portion:
By to and/or one or more transmission of monitoring relevant from described one or more particular device protection portion sub-module be configured to provide one or more services and the data of optionally accessing the agency of one or more particular device protection part.
5. equipment according to claim 1, wherein saidly divides the data of the agency obtaining module to comprise about being configured to provide one or more services and optionally accessing one or more particular device protection portion:
Be configured to provide one or more services from one or more particular device daily record relevant and optionally access the data that one or more particular device protection portion divides the described agency obtaining module.
6. equipment according to claim 1, the stopping of one or more services that wherein said agency provides and described agency continue the described one or more particular device protection portion of access and divide detection module to comprise:
Described agency stopped relating to activities of performing one or more services and after stopping activity detection module, continue the one or more particular device protection part of access can detection indicator.
7. equipment according to claim 6, wherein said agency has stopped relating to and has performed one or more activities of serving and continue can detection indicator to comprise described in the one or more particular device protection part of access after termination activity detection module:
Described agency stopped relating to activities of performing one or more services and after the termination activity that the report using described particular device module to issue at least in part detects, continue to access one or more particular device protection part can detection indicator.
8. equipment according to claim 6, wherein said agency has stopped relating to and has performed one or more activities of serving and continue can detection indicator to comprise described in the one or more particular device protection part of access after termination activity detection module:
Described agency stopped relating to activities of performing one or more services and after the termination activity of the data-flow detection by analyzing described one or more particular device protection portion sub-module, continue the one or more particular device protection part of access can detection indicator.
9. equipment according to claim 6, wherein said agency has stopped relating to and has performed one or more activities of serving and continue can detection indicator to comprise described in the one or more particular device protection part of access after termination activity detection module:
Described agency stopped relating to activities of performing one or more services and after the termination activity that the report using the monitor agent of described one or more particular device protection portion sub-module to issue at least in part detects, continue to access one or more particular device protection part can detection indicator.
10. equipment according to claim 9, wherein said agency has stopped relating to and has performed one or more activities of serving and continue can detection indicator to comprise described in the one or more particular device protection part of access after the termination activity that the report using the monitor agent of described one or more particular device protection portion sub-module to issue at least in part detects:
Described agency stopped relating to activities of performing one or more services and after the termination activity that the report using the monitor agent based on kernel of described one or more particular device protection portion sub-module to issue at least in part detects, continue to access one or more particular device protection part can detection indicator.
11. equipment according to claim 1, the stopping of one or more services described that wherein said agency provides and described agency continue the described one or more particular device protection portion of access and divide detection module to comprise:
The described notice acting on behalf of the described stopping of one or more services described that receiver module provides; And
Described agency continues the notice that the described one or more particular device protection portion of access divides receiver module.
12. equipment according to claim 11, the wherein said described notice acting on behalf of the described stopping of one or more services described that receiver module provides comprises:
The notice of the described stopping of one or more services described in receiving from proxy module.
13. equipment according to claim 11, wherein said agency continues the described one or more particular device protection portion of access and divides the notice of receiver module to comprise:
The agency received from described one or more particular device protection portion sub-module continues the notice of accessing described one or more particular device protection part.
14. equipment according to claim 1, the described stopping of one or more services described that wherein said agency provides and described agency continue the described one or more particular device protection portion of access and divide detection module to comprise:
Stop the termination being configured to detect the one or more agent operation detection modules being performed the termination of one or more operations taked at least partially of one or more services described by described agency; And
Access is configured to detect described agency and has prevented one or more particular device protection portion of the stopping of accessing described one or more particular device protection part to divide the agency of the stopping of detection module to prevent.
15. equipment according to claim 1, the described stopping of one or more services described that wherein said agency provides and described agency continue the described one or more particular device protection portion of access and divide detection module to comprise:
The designator that the agency that described one or more service obtains module stops; And
Agency continues the one or more particular device protection portion of access and divides the designator obtaining module.
16. equipment according to claim 15, wherein said agency continues to access one or more particular device protection portion and divides the described designator obtaining module to comprise:
The agency being attempted the described one or more particular device protection portion sub-module acquisition of access by monitoring continues the designator of accessing one or more particular device protection part.
17. equipment according to claim 15, wherein said agency continues to access one or more particular device protection portion and divides the described designator obtaining module to comprise:
The agency obtained by agents analysis module continues the designator of accessing one or more particular device protection part.
18. equipment according to claim 1, the described stopping of one or more services that wherein said agency provides and described agency continue the described one or more particular device protection portion of access and divide detection module to comprise:
Stopping and the one or more particular device protection portion of continuation proxy access of the described agency of one or more services described divide detection module.
19. equipment according to claim 1, the described stopping of one or more services that wherein said agency provides and described agency continue the described one or more particular device protection portion of access and divide detection module to comprise:
The notice based on agency of the stopping of one or more services and agency continue the notice that the one or more particular device protection portion of access divides receiver module.
20. equipment according to claim 19, the described notice based on agency of the stopping of one or more services wherein said and agency continue the one or more particular device protection portion of access and divide the notice of receiver module to comprise:
The described notice based on agency of the stopping of one or more services described and agency continue the notice based on particular device protection part that the one or more particular device protection portion of access divides receiver module.
21. equipment according to claim 1, the one or more particular device of continuation proxy access that wherein said agency presents module to be provided protects the described designator of the stopping of part and one or more services described to comprise:
The continuation proxy access one or more particular device protection part presented to the entity relating to described particular device and one or more service present the designator of the stopping of module.
22. equipment according to claim 1, the one or more particular device of continuation proxy access that wherein said agency presents module to be provided protects the described designator of the stopping of part and one or more services described to comprise:
Continuing the one or more particular device of proxy access protects part and described one or more service to present the notice of the stopping of module.
23. equipment according to claim 1, the one or more particular device of continuation proxy access that wherein said agency presents module to be provided protects the described designator of the stopping of part and one or more services described to comprise:
The visual notification of the stopping of the continuation proxy access shown by particular device module one or more particular device protection part and one or more services.
24. equipment according to claim 1, the one or more particular device of continuation proxy access that wherein said agency presents module to be provided protects the described designator of the stopping of part and one or more services described to comprise:
Continue the list of one or more agencies of proxy access one or more particular device protection part and stopped described one or more service to present one or more one or more designators of one or more agencies of module.
25. equipment according to claim 1, the one or more particular device of continuation proxy access that wherein said agency presents module to be provided protects the described designator of the stopping of part and one or more services described to comprise:
Describe the report of continuation proxy access one or more particular device protection part and show whether one or more services described have stopped obtaining the report of module.
26. equipment according to claim 1, the one or more particular device of continuation proxy access that wherein said agency presents module to be provided protects the described designator of the stoppings of part and one or more services to comprise:
Indicate described particular device to present and continue the designator that the one or more particular device of proxy access protects the stopping of part and described one or more service module.
27. equipment according to claim 1, the one or more particular device of continuation proxy access that wherein said agency presents module to be provided protects the described designator of the stoppings of part and one or more services to comprise:
Change the stopping that agency presents to show to continue proxy access one or more particular device protection part and described one or more service module.
28. equipment according to claim 27, the stopping that wherein said change agency presents to show to continue proxy access one or more particular device protection part and described one or more service module comprises:
One or more steps that change will perform for user are to select to act on behalf of thus to show to continue the stopping that the one or more particular device of proxy access protects part and described one or more service module.
29. equipment according to claim 28, one or more steps that wherein said change will perform for user are to select to act on behalf of thus to show that the stopping continuing proxy access one or more particular device protection part and described one or more service module comprises:
Increase requires that the one or more steps performed by described user are to select to act on behalf of thus to show that continuing the one or more particular device of proxy access protects partly and the stopping of described one or more service module.
30. equipment according to claim 1, described in wherein said stopping proxy access, one or more particular device protection part promotes that the presenting of option of module comprises:
Stop presenting of the option of one or more particular device protection portion subset indicating module described in proxy access.
31. equipment according to claim 1, described in wherein said stopping proxy access, one or more particular device protection part promotes that the presenting of option of module comprises:
Proxy access one or more particular device protection part is stopped to present the option of module.
32. equipment according to claim 1, described in wherein said stopping proxy access, one or more particular device protection part promotes that the presenting of option of module comprises:
Described equipment is indicated to stop proxy access one or more particular device protection part to promote presenting of the option that the user of module is arranged.
33. equipment according to claim 32, wherein indicate described equipment to stop proxy access one or more particular device protection part to promote to present described in the option that the user of module is arranged to comprise:
Before agent operation, indicate described equipment to stop proxy access one or more particular device protection part to promote presenting of the option that the user of module is arranged.
34. equipment according to claim 1, described in wherein said stopping proxy access, one or more particular device protection part promotes that the presenting of option of module comprises:
Presenting to the entity relevant to described particular device stops the one or more particular device of proxy access to protect part to promote presenting of the option of module.
35. equipment according to claim 1, described in wherein said stopping proxy access, one or more particular device protection part promotes that the presenting of option of module comprises:
Stop the selectable option of one or more particular device protection part display module described in proxy access; And
Proxy access one or more particular device protection portion ends module.
36. equipment according to claim 35, the described agency of the described one or more particular device protection portion ends module of wherein said access comprises:
Access each of one or more agencies of described one or more particular device protection portion ends module.
37. equipment according to claim 1, described in wherein said stopping proxy access, one or more particular device protection part promotes that the presenting of option of module comprises:
Presenting of the option of the restriction of module is promoted for setting up one or more particular device protection part described in proxy access.
38. according to equipment according to claim 37, and the presenting of option of the wherein said restriction for setting up one or more particular device protection part promotion module described in proxy access comprises:
The described one or more particular device protection part of described agency's reconstruction access is allowed to promote presenting of the option that the number of times of module limits for arranging.
39. according to equipment according to claim 37, and the presenting of option of the wherein said restriction for setting up one or more particular device protection part promotion module described in proxy access comprises:
Set up and promote presenting of the option of the condition precedent of module for allowing to rebuild one or more particular device protection part described in proxy access.
40. equipment according to claim 1, described in wherein said stopping proxy access, one or more particular device protection part promotes that the presenting of option of module comprises:
Require to promote presenting of the option of the data anonymous of module for continuing proxy access one or more particular device protection part.
41. 1 kinds of equipment, it comprises:
One or more universal integrated circuit, is configured to receive instruction to be configured at one or more first special time relevant be configured to provide one or more services and the data of optionally accessing that one or more particular device protection portion divides the agency of acquisition module:
One or more universal integrated circuit, is configured to receive instruction and continues the described one or more particular device protection portion of access with the stoppings and described agency that are configured to one or more services that described agency provides at one or more second special time and divide detection module;
One or more universal integrated circuit, is configured to receive instruction and protects part and described agency to present the designator of the stoppings of one or more services that module provides to be configured to the continuing one or more particular device of proxy access at one or more 3rd special time; And
One or more universal integrated circuit, is configured to receive instruction to be configured at one or more 4th special time stop one or more particular device protection part described in proxy access to promote presenting of the option of module.
CN201480024191.3A 2013-02-28 2014-02-28 For managing the method and system of data and/or for the service of equipment Expired - Fee Related CN105190590B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US13/781,194 US10216957B2 (en) 2012-11-26 2013-02-28 Methods and systems for managing data and/or services for devices
US13/781,456 2013-02-28
US13/781,456 US20140123325A1 (en) 2012-11-26 2013-02-28 Methods and systems for managing data and/or services for devices
US13/781,194 2013-02-28
PCT/US2014/019562 WO2014134516A1 (en) 2013-02-28 2014-02-28 Managing data and/or services for devices

Publications (2)

Publication Number Publication Date
CN105190590A true CN105190590A (en) 2015-12-23
CN105190590B CN105190590B (en) 2019-04-19

Family

ID=51428860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480024191.3A Expired - Fee Related CN105190590B (en) 2013-02-28 2014-02-28 For managing the method and system of data and/or for the service of equipment

Country Status (3)

Country Link
EP (1) EP2962211A4 (en)
CN (1) CN105190590B (en)
WO (1) WO2014134516A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105785957A (en) * 2016-04-29 2016-07-20 广东美的制冷设备有限公司 Internet of things household appliance control method, apparatus, system and router thereof
CN107491538A (en) * 2017-08-23 2017-12-19 成都安恒信息技术有限公司 A kind of storing process order of DB2 database and parameter value extracting method
CN109714461A (en) * 2017-10-25 2019-05-03 伊德里斯·尤斯菲 For reducing the method and apparatus of telephone call charges
CN111209541A (en) * 2016-06-12 2020-05-29 苹果公司 Device level authorization for viewing content
CN111554266A (en) * 2019-02-08 2020-08-18 夏普株式会社 Voice output device and electrical equipment
CN111562951A (en) * 2020-05-11 2020-08-21 电子科技大学 Radar application component service implementation method
CN113032491A (en) * 2021-04-07 2021-06-25 工银科技有限公司 Method, device, electronic equipment and medium for realizing static data synchronization
CN114912122A (en) * 2022-05-27 2022-08-16 国家计算机网络与信息安全管理中心 Firmware interface variable tracking method based on bidirectional reasoning
US11934640B2 (en) 2021-01-29 2024-03-19 Apple Inc. User interfaces for record labels
US11962836B2 (en) 2019-03-24 2024-04-16 Apple Inc. User interfaces for a media browsing application
US11966560B2 (en) 2016-10-26 2024-04-23 Apple Inc. User interfaces for browsing content from multiple content applications on an electronic device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11867533B2 (en) * 2018-02-23 2024-01-09 The Boeing Company Sensing systems and methods

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1543616A (en) * 2001-06-29 2004-11-03 ���ܿ���ϵͳ���޹�˾ Security system and method for computers
US20060010047A1 (en) * 2004-07-06 2006-01-12 Oculus Inc Sarbanes-Oxley Anonymous Reporting System
CN101002180A (en) * 2004-07-30 2007-07-18 捷讯研究有限公司 Method and system for coordinating client and host security modules
US20070232268A1 (en) * 2006-04-03 2007-10-04 Samsung Electronics, Co., Ltd. Apparatus for restricting access to application module in mobile wireless device and method of restricting access to application module using the same
CN101535948A (en) * 2006-11-01 2009-09-16 微软公司 Securing distributed application information delivery
US7873957B2 (en) * 2006-07-27 2011-01-18 Microsoft Corporation Minimizing user disruption during modification operations
US20120096080A1 (en) * 2006-06-16 2012-04-19 Michel Levesque Method for activating and deactivating client-side services from a remote server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8949421B2 (en) * 2009-07-29 2015-02-03 Teradata Us, Inc. Techniques for discovering database connectivity leaks

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1543616A (en) * 2001-06-29 2004-11-03 ���ܿ���ϵͳ���޹�˾ Security system and method for computers
US20060010047A1 (en) * 2004-07-06 2006-01-12 Oculus Inc Sarbanes-Oxley Anonymous Reporting System
CN101002180A (en) * 2004-07-30 2007-07-18 捷讯研究有限公司 Method and system for coordinating client and host security modules
US20070232268A1 (en) * 2006-04-03 2007-10-04 Samsung Electronics, Co., Ltd. Apparatus for restricting access to application module in mobile wireless device and method of restricting access to application module using the same
US20120096080A1 (en) * 2006-06-16 2012-04-19 Michel Levesque Method for activating and deactivating client-side services from a remote server
US7873957B2 (en) * 2006-07-27 2011-01-18 Microsoft Corporation Minimizing user disruption during modification operations
CN101535948A (en) * 2006-11-01 2009-09-16 微软公司 Securing distributed application information delivery

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105785957B (en) * 2016-04-29 2019-06-28 广东美的制冷设备有限公司 A kind of internet of things home appliance control method, device, system and router
CN105785957A (en) * 2016-04-29 2016-07-20 广东美的制冷设备有限公司 Internet of things household appliance control method, apparatus, system and router thereof
CN111209541B (en) * 2016-06-12 2023-11-07 苹果公司 Method and electronic device for multi-application authorization for viewing content
CN111209541A (en) * 2016-06-12 2020-05-29 苹果公司 Device level authorization for viewing content
US11966560B2 (en) 2016-10-26 2024-04-23 Apple Inc. User interfaces for browsing content from multiple content applications on an electronic device
CN107491538A (en) * 2017-08-23 2017-12-19 成都安恒信息技术有限公司 A kind of storing process order of DB2 database and parameter value extracting method
CN107491538B (en) * 2017-08-23 2021-01-29 成都安恒信息技术有限公司 Storage process command and parameter value extraction method of DB2 database
CN109714461A (en) * 2017-10-25 2019-05-03 伊德里斯·尤斯菲 For reducing the method and apparatus of telephone call charges
CN111554266A (en) * 2019-02-08 2020-08-18 夏普株式会社 Voice output device and electrical equipment
US11962836B2 (en) 2019-03-24 2024-04-16 Apple Inc. User interfaces for a media browsing application
CN111562951A (en) * 2020-05-11 2020-08-21 电子科技大学 Radar application component service implementation method
US11934640B2 (en) 2021-01-29 2024-03-19 Apple Inc. User interfaces for record labels
CN113032491A (en) * 2021-04-07 2021-06-25 工银科技有限公司 Method, device, electronic equipment and medium for realizing static data synchronization
CN114912122A (en) * 2022-05-27 2022-08-16 国家计算机网络与信息安全管理中心 Firmware interface variable tracking method based on bidirectional reasoning

Also Published As

Publication number Publication date
EP2962211A4 (en) 2016-11-16
CN105190590B (en) 2019-04-19
EP2962211A1 (en) 2016-01-06
WO2014134516A1 (en) 2014-09-04

Similar Documents

Publication Publication Date Title
CN105190590A (en) Methods and systems for managing data and/or services for devices
AU2020256380B2 (en) Methods and systems for secure and reliable identity-based computing
US9619497B2 (en) Methods and systems for managing one or more services and/or device data
JP7064576B2 (en) Systems and methods for implementing centralized privacy control in decentralized systems
CN107924342B (en) Automated data transfer from a mobile application silo to an authorized third party application
US9825800B2 (en) Methods and systems for managing data
US9749206B2 (en) Methods and systems for monitoring and/or managing device data
US9626503B2 (en) Methods and systems for managing services and device data
CN108780463A (en) Social map generalization and management
US20140123308A1 (en) Methods and systems for managing data and/or services for devices
Gurrin et al. A privacy by design approach to lifelogging
CN106104522B (en) For reinforcing the method, system and computer memory device of any user content
Banos et al. Mining minds: an innovative framework for personalized health and wellness support
Ma et al. Digital explosions and digital clones
US20190220485A1 (en) Methods and Systems for Managing Data
Al-Motwakel et al. Ubiquitous computing and its security concerns
Azubuike et al. West African Journal of Industrial & Academic Research Vol. 19 No. 2. April 31, 2018 Engineering Research and Production Page No
Mellaty EXPLORING DATA EXHAUST IN IOT DEVICES WITH A FOCUS ON VOICE ASSISTANTS
Fonnes Exploring methods for securing users against potential loss of privacy in the context of the Internet of Things
Woelfel 4.29 Randomized Shared Memory Algorithms
Koussouris et al. Technical components
Parimala et al. Domain Sensitive Recommendation with User Item Subgroup Analysis
Behan Sensorial Networks embedded in Mobile Devices
KUMAR PARENTAL CARE

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190419