CN104123509A - Information processing method and electronic device - Google Patents

Information processing method and electronic device Download PDF

Info

Publication number
CN104123509A
CN104123509A CN201410347616.6A CN201410347616A CN104123509A CN 104123509 A CN104123509 A CN 104123509A CN 201410347616 A CN201410347616 A CN 201410347616A CN 104123509 A CN104123509 A CN 104123509A
Authority
CN
China
Prior art keywords
privacy
judgment
rule
judged result
privacy class
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410347616.6A
Other languages
Chinese (zh)
Other versions
CN104123509B (en
Inventor
苏寅
欧博
张宇
张渊毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201410347616.6A priority Critical patent/CN104123509B/en
Publication of CN104123509A publication Critical patent/CN104123509A/en
Application granted granted Critical
Publication of CN104123509B publication Critical patent/CN104123509B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information processing method and an electronic device which solve the technical problems that in the prior art, operation of schemes on a privacy object is complex, and the privacy object cannot be protected reasonably. The information processing method comprises the steps of obtaining a first object; calling a preset privacy level model, wherein the preset privacy level model comprises judgment conditions of at least two privacy levels; processing the first object based on the preset privacy level model, and determining an N<th> privacy level corresponding to the first object, wherein each privacy level corresponds to one privacy value; taking the privacy value corresponding to the N<th> privacy level as a privacy attribute value of the first object, wherein the privacy attribute value is used for setting accessible states of the first object based on permission of a user of the electronic device. The higher the privacy level is, the higher the permission of the user of the electronic device is.

Description

A kind of information processing method and electronic equipment
Technical field
The present invention relates to electronic technology field, relate in particular to a kind of information processing method and electronic equipment.
Background technology
In existing life, the picture in personal device (such as computer, mobile phone, movable storage device, camera etc.) or photograph usually can because of for public use other people or be connected to other equipment and the situation that privacy is revealed occur.
In prior art, in order to protect user's privacy, personal device can by by privacy object (such as, photograph, picture, video etc.) deposit the file of independent foundation in, and to file encryption or hide and process.
But in prior art, the equipment owner is in the time using encryption or hide the privacy object of processing; also need by password authentification; fingerprint authentication etc. mode; and; owing to lending other users or connection device difference outward, also difference to some extent of privacy object, comprehensive above-mentioned 2 considerations; protection scheme complicated operation to privacy object in prior art, and can not Reasonable Protection privacy object.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method and electronic equipment, has eliminated the scheme complicated operation to privacy object in prior art, and technical matters that can not Reasonable Protection privacy object.
First aspect, the embodiment of the present invention provides a kind of information processing method, and described method is applied in electronic equipment, and described method comprises:
Obtain the first object;
Call prescribed privacy level model, described prescribed privacy level model comprises the Rule of judgment of the privacy class of at least two ranks;
Process described the first object based on described prescribed privacy level model, determine the N level privacy class that described the first object is corresponding, N is more than or equal to 1 positive integer, wherein, and every grade of corresponding privacy value of privacy class; Described
Privacy property value using the corresponding privacy value of described N level privacy class as described the first object; Wherein, described privacy property value is set the addressable state of described the first object for the rights of using of the user based on described electronic equipment, and wherein, the user's of the described electronic equipment of the higher correspondence of described privacy class rights of using are higher.
Preferably, described method also comprises:
Obtain the current user's of described electronic equipment right to use limit value;
Determine the privacy property value corresponding with described right to use limit value according to described right to use limit value;
The object that meets described privacy property value is set as to addressable state.
Preferably, describedly process described the first object based on described prescribed privacy level model, determine that the N level privacy class step that described the first object is corresponding comprises:
The first Rule of judgment is, while whether there is face in definite object, to judge described the first object according to described the first Rule of judgment, obtains the first judged result;
Be no in described the first judged result, judge described the first object according to the second Rule of judgment, obtain the second judged result, wherein, described the second Rule of judgment is to determine in object whether have animal;
While being no, determine that described the first object is the first privacy class in described the second judged result, otherwise determine that described the first object is the second privacy class higher than described the first privacy class.
Preferably, judge described the first object described according to described the first Rule of judgment, after obtaining the first judged result, described method also comprises:
When being, further judge the privacy class of described the first object in described the first judged result according to the 3rd Rule of judgment, wherein, the history that described the 3rd Rule of judgment is object is used information; The history of described the first object is used information difference, the privacy class difference of described the first object.
Preferably, described the 3rd Rule of judgment, specifically comprises: the first sub-Rule of judgment is to judge whether object carries out Internet Transmission.
Preferably, the described privacy class that further judges described the first object according to the 3rd Rule of judgment, is specially:
According to the first object described in described the first sub-condition judgment, obtain the 3rd judged result;
When being, determine that described the first object is the 3rd privacy class higher than described the second privacy class in described the 3rd judged result.
Preferably, also comprise at described the 3rd Rule of judgment: the second sub-Rule of judgment is whether the access times that judge object are when exceeding a setting and using threshold value; Described, according to the first object described in described the first sub-condition judgment, after obtaining the 3rd judged result, described method also comprises:
While being no, judge described first object according to described the second sub-Rule of judgment in described the 3rd judged result, obtain the 4th judged result;
When being, determine that described the first object is the 4th privacy class higher than described the 3rd privacy class in described the 4th judged result.
Preferably, described the 3rd Rule of judgment also comprises: the 3rd sub-Rule of judgment be judge object service time whether in a setting-up time section; Judge described the first object described according to described the second sub-Rule of judgment, after obtaining the 4th judged result, described method also comprises:
While being no, judge described first object according to described the 3rd sub-Rule of judgment in described the 4th judged result, obtain the 5th judged result;
When being, determine that described the first object is the 5th privacy class higher than described the 4th privacy class in described the 5th judged result; While being no, determine that described the first object is the 6th privacy class higher than described the 5th privacy class in described the 5th judged result.
Second aspect, the embodiment of the present invention provides a kind of electronic equipment, comprising:
First obtains unit, for obtaining the first object;
Call unit, for calling prescribed privacy level model, described prescribed privacy level model comprises the Rule of judgment of the privacy class of at least two ranks;
The first determining unit, for processing described the first object based on described prescribed privacy level model, determines the N level privacy class that described the first object is corresponding, and N is more than or equal to 1 positive integer, wherein, and every grade of corresponding privacy value of privacy class; Described
Performance element, for the privacy property value using the corresponding privacy value of described N level privacy class as described the first object; Wherein, described privacy property value is set the addressable state of described the first object for the rights of using of the user based on described electronic equipment, and wherein, the user's of the described electronic equipment of the higher correspondence of described privacy class rights of using are higher.
Preferably, described electronic equipment also comprises:
Second obtains unit, for obtaining current user's the right to use limit value of described electronic equipment,
The second determining unit, for determining the privacy property value corresponding with described right to use limit value according to described right to use limit value;
Setup unit, for being set as addressable state by the object that meets described privacy property value.
Preferably, described the first determining unit, specifically for:
The first Rule of judgment is, while whether there is face in definite object, to judge described the first object according to described the first Rule of judgment, obtains the first judged result;
Be no in described the first judged result, judge described the first object according to the second Rule of judgment, obtain the second judged result, wherein, described the second Rule of judgment is to determine in object whether have animal;
While being no, determine that described the first object is the first privacy class in described the second judged result, otherwise determine that described the first object is the second privacy class higher than described the first privacy class.
Preferably, described the first determining unit also for:
When being, further judge the privacy class of described the first object in described the first judged result according to the 3rd Rule of judgment, wherein, the history that described the 3rd Rule of judgment is object is used information; The history of described the first object is used information difference, the privacy class difference of described the first object.
Preferably, described the 3rd Rule of judgment, specifically comprises: the first sub-Rule of judgment is to judge whether object carries out Internet Transmission.
Preferably, described the first determining unit also for:
According to the first object described in described the first sub-condition judgment, obtain the 3rd judged result;
When being, determine that described the first object is the 3rd privacy class higher than described the second privacy class in described the 3rd judged result.
Preferably, also comprise at described the 3rd Rule of judgment: the second sub-Rule of judgment is whether the access times that judge object are when exceeding a setting and using threshold value; Described the first determining unit also for:
While being no, judge described first object according to described the second sub-Rule of judgment in described the 3rd judged result, obtain the 4th judged result;
When being, determine that described the first object is the 4th privacy class higher than described the 3rd privacy class in described the 4th judged result.
Preferably, described the 3rd Rule of judgment also comprises: the 3rd sub-Rule of judgment be judge object service time whether in a setting-up time section; Described the first determining unit also for:
While being no, judge described first object according to described the 3rd sub-Rule of judgment in described the 4th judged result, obtain the 5th judged result;
When being, determine that described the first object is the 5th privacy class higher than described the 4th privacy class in described the 5th judged result; While being no, determine that described the first object is the 6th privacy class higher than described the 5th privacy class in described the 5th judged result.
The one or more technical schemes that provide in the embodiment of the present invention, at least have following technique effect or advantage:
In the embodiment of the present invention, obtain the first object owing to having adopted; Call prescribed privacy level model, prescribed privacy level model comprises the Rule of judgment of the privacy class of at least two ranks; Process the first object based on prescribed privacy level model, determine the N level privacy class that the first object is corresponding, wherein, every grade of corresponding privacy value of privacy class; Privacy property value using corresponding N level privacy class privacy value as the first object; Wherein, privacy property value is set the addressable state of the first object for the rights of using of the user based on electronic equipment; wherein; the user's of the electronic equipment of the higher correspondence of privacy class the higher technical scheme of rights of using; this shows; can determine according to the first object self character the privacy class of the first object, automatically set the privacy class of object according to object difference, therefore eliminate the technical matters to the protection scheme complicated operation to privacy object in prior art.
And then; because privacy property value is set the addressable state of the first object for the rights of using of user based on electronic equipment; therefore can conduct interviews to the object of different privacy class according to user's rights of using; eliminated in prior art can not Reasonable Protection privacy object technical matters; realize the different technique effects of automatically determining accessible object because of user, therefore there is stronger secret protection specific aim.
Brief description of the drawings
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, other accompanying drawing can also be provided according to the accompanying drawing providing.
Fig. 1 is the process flow diagram of the information processing method in the embodiment of the present invention;
Fig. 2 is that the privacy class in the embodiment of the present invention judges schematic diagram;
Fig. 3 is the process flow diagram of settled front user's right to use limit value really in the embodiment of the present invention;
Fig. 4 is a kind of rights of using judgment models schematic diagram in the embodiment of the present invention;
Fig. 5 is the module map of the electronic equipment in the embodiment of the present invention.
Embodiment
In order to eliminate the protection scheme complicated operation to privacy object in prior art, and technical matters that can not Reasonable Protection privacy object, total invention thinking is as follows:
Call the prescribed privacy level model with at least two Rule of judgment, determine the privacy class of the first object thereby the first object obtaining by judgement meets the mode of which Rule of judgment in prescribed privacy level model.The privacy class that can set the first object is higher, and user's the right to use limit value that can access the first object is higher.Thereby eliminate the protection scheme complicated operation to privacy object in prior art; and technical matters that can not Reasonable Protection privacy object; realize the different technique effects of automatically determining accessible object because of user, therefore there is stronger secret protection specific aim.
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
The information processing method that the embodiment of the present invention provides is applied to an electronic equipment, and this electronic apparatus application is in private mobile device, such as mobile phone, camera, movable storage device, computer etc., certainly, the method flow in the embodiment of the present invention also can be applied in other device ends.
Shown in figure 1, the information processing method in the embodiment of the present invention comprises following flow process:
101, obtain the first object.
Concrete, the first object can picture file or video file.Can also be the alternative document form that comprises picture or video, such as being pasted with the file of PDF of picture, be pasted with the file of the WORD form of picture.
Concrete, according to the type difference of the first object, the mode that obtains the first object is not identical yet.Such as, can take pictures or video by the camera of this electronic equipment, also can be rendered images in this electronic equipment, also can be for this electronic equipment inediting be pasted with the file of the PDF of picture, editor be pasted with the file of the WORD form of picture etc. can also receive picture file, video files from other equipment, be pasted with the PDF of picture file, be pasted with any file of WORD form of picture.
102, call prescribed privacy level model, described prescribed privacy level model comprises the Rule of judgment of the privacy class of at least two ranks.
Concrete, the privacy class Rule of judgment of two ranks of prescribed privacy level model can comprise two Rule of judgment, three Rule of judgment, four Rule of judgment etc., below to the description of giving an example of the possible framework of prescribed privacy level model, but be not used in restriction the present invention.
Embodiment mono-:
Prescribed privacy level model comprises the first Rule of judgment and the second Rule of judgment.
Concrete, the first Rule of judgment can be: determine in object, whether there is face; Specifically determine in object whether have eyes by face recognition technology, face, nose, or identify in object, whether there is face by facial contour.The second Rule of judgment can be: determine in object, whether there is animal.Specifically by whether there is animal in image recognition technology identifying object.Such as, can identify by hair, the technology such as animal painting contrast determines in object, whether there is animal.
Those skilled in the art can determine in object, whether there is face with reference to face recognition technology of the prior art, and determine in object, whether there is animal by image recognition technology of the prior art.
Certainly,, in specific implementation process, not limiting the first Rule of judgment is to determine in object whether have face, and the second Rule of judgment is to determine in object whether have animal.Can also be for being set as other forms of Rule of judgment.
Embodiment bis-:
Continue to use on the basis of embodiment mono-, prescribed privacy level model also comprises using the history use information of object as the 3rd Rule of judgment.Concrete, the history of object use the type of information comprise following at least one:
1, browse and/or edit session;
2, browse and/or edit number of times;
3, whether carry out Internet Transmission, such as, upload social networks or send to other equipment.
Concrete, use the type difference of information according to history, the 3rd Rule of judgment specifically at least comprises: the first sub-Rule of judgment, such as whether the first sub-Rule of judgment for carrying out Internet Transmission.
Further, the 3rd Rule of judgment can also comprise the second sub-Rule of judgment, such as judging whether the access times of object exceed a setting and use threshold value.In specific implementation process, access times comprise browses and/or edits number of times.
Further, the 3rd Rule of judgment can also comprise the 3rd sub-Rule of judgment, such as whether the service time that judges object is in a setting-up time section.
Certainly, in specific implementation process, the first sub-Rule of judgment of the 3rd Rule of judgment, the second sub-Rule of judgment, the 3rd sub-Rule of judgment is not defined as above-mentioned giving an example.
103, process the first object based on prescribed privacy level model, determine the N level privacy class that described the first object is corresponding, N is more than or equal to 1 positive integer, wherein, and every grade of corresponding privacy value of privacy class;
Concrete, at least one prescribed privacy level model of introducing in application 102 is processed the first object.By way of example,
Embodiment one, if the prescribed privacy level model in previous embodiment one is processed the first object, determining the first object is the first privacy class, or the second privacy class, or the 3rd privacy class.The first step, processes the first object according to the first Rule of judgment, and result is as follows:
1,, while determining the first object and have face, determine that the first object is the 3rd privacy class;
2, determine while not comprising face in the first object, continue to carry out second step: process the first object according to the second Rule of judgment, result is as follows:
If determine in the first object and have animal, determine that the first object is the second privacy class lower than the 3rd privacy class, if determine in the first object and do not have animal (such as only comprising landscape or still life), determine that the first object is the first privacy class lower than the second privacy class.
Embodiment two, if the first prescribed privacy level model of describing according to previous embodiment two is processed the first object, determining may be that the first object is the first privacy class, or the second privacy class, or the 3rd privacy class, or the 4th privacy class.
Specifically, process the first object according to the first Rule of judgment (concrete example is: determine whether object exists face), after determining and having face in the first object, for refinement privacy class more, what embodiment two was different from embodiment one is to continue to carry out the 3rd step: process the first object according to the first sub-Rule of judgment, determine whether the first object carries out Internet Transmission, if the first object carries out Internet Transmission, determine that the first object is the 3rd privacy class higher than the second privacy class; If the first object carries out Internet Transmission, determine that the first object is the 4th privacy class higher than the 3rd privacy class.
If the second prescribed privacy level model that embodiment three is described according to previous embodiment two is processed the first object, determining the first object may be the first privacy class, or the second privacy class, or the 3rd privacy class, or the 4th privacy class, or the 5th privacy class.
Specifically, process the first object according to the first sub-Rule of judgment, after determining that the first object does not carry out Internet Transmission, for the enterprising step refining privacy class in the basis at embodiment two, what embodiment three was different from embodiment two is, continue to carry out the 4th step: process the first object according to the second sub-Rule of judgment, judge whether the access times of the first object exceed a setting use threshold value.Exceed setting use threshold value if judge the access times of the first object, determine that the first object is the 4th privacy class higher than the 3rd privacy class; Do not exceed setting use threshold value if judge the access times of the first object, determine that the first object is the 5th privacy class higher than the 4th privacy class.
In specific implementation process, setting and use threshold value can be the average of the access times of all objects in electronic equipment, can be also other self-defined numerical value.
Embodiment four, shown in figure 2, if the third prescribed privacy level model of describing according to previous embodiment two is processed the first object, determining the first object may be the first privacy class, or the second privacy class, or the 3rd privacy class, or the 4th privacy class, or the 5th privacy class, or the 6th privacy class.
Specifically, process the first object according to the second sub-Rule of judgment, the access times of determining the first object do not exceed after a setting uses threshold value, for refinement privacy class further on the basis at embodiment three, what embodiment four was different from embodiment three is, continue to carry out the 5th step: process the first object according to the 3rd sub-Rule of judgment, judge that the service time of the first object is whether in a setting-up time section.If judge the service time of the first object in a setting-up time section, determine that the first object is the 5th privacy class higher than the 4th privacy class; If judge the service time of the first object not within the time period of a setting, determine that the first object is the 6th privacy class higher than the 5th privacy class.
That describes by above-mentioned embodiment one to embodiment five determines the mode of the privacy class of the first object according to the prescribed privacy level model of certain rule, automatically the object in electronic equipment is carried out to privacy class evaluation, thereby realize, the object in electronic equipment is divided into some levels according to degree of privacy.
104, the privacy property value using the corresponding privacy value of described N level privacy class as described the first object; Wherein, described privacy property value is set the addressable state of described the first object for the rights of using of the user based on described electronic equipment, and wherein, the user's of the described electronic equipment of the higher correspondence of described privacy class rights of using are higher.
Concrete, every grade of privacy class is to corresponding privacy value, such as, to comprise six privacy class, the privacy value that can be set as the first privacy class is " 1 ", and the privacy value of the second privacy class is " 2 ", the privacy value of the 3rd privacy class is " 3 ", the privacy value of the 4th privacy class is " 4 ", and the privacy value of the 5th privacy class is " 5 ", and the privacy value of the 6th privacy class is " 6 ".Certainly, in specific implementation process, also can be for being set as other numerical value, the present invention does not limit.
In specific implementation process, the user of electronic equipment can be the owner of electronic equipment, also can be for using other users of this electronic equipment or another connection device being connected with this electronic equipment.Concrete, user's rights of using are different and different according to user.
Therefore, in specific implementation process, shown in figure 3, described method also comprises following flow process, the object for determining that current user can access:
201, the current user's of electron gain equipment right to use limit value.
Concrete, user is corresponding with right to use limit value, user or developer can set the corresponding relation of user's type and right to use limit value, such as being set as, the highest right to use limit value of electronic equipment owner correspondence, the corresponding medium right to use limit value of the possessory good friend of electronic equipment, the corresponding minimum right to use limit value of non-good friend user.Such as being set as: the highest right to use limit value of electronic equipment owner correspondence, household has the second right to use limit value, and friend and colleague have the 3rd right to use limit value, other corresponding minimum right to use limit values.
202, determine the privacy property value corresponding with described right to use limit value according to described right to use limit value.
Concrete, the right to use limit value that obtains current user comprises numerous embodiments, describes for example below to 201~202.
1, the scheme that is user for user is applied to the electronic equipment that includes camera or voice collecting unit, catches current user's facial image, and carry out recognition of face and identify current user by camera; Or gather current user's voice by voice collecting unit, and carry out speech recognition and identify current user.Thereby according to the corresponding relation of user and user's authority credentials, determine the right to use limit value corresponding with current user.Be the electronic equipment owner such as identifying current user, current user has the highest use weights; Be the possessory non-good friend of electronic equipment such as identifying current user, when user has minimum use weights; Such as identifying current user's good friend, current user has medium use weights.
With reference to figure 4 for instance, determine by recognition of face or speech recognition whether current user is the electronic equipment owner, if the electronic equipment owner obtains highest weight limit value: 4; No person, determine and continue to determine by recognition of face or speech recognition whether current user is the possessory good friend of electronic equipment, whether is specifically SNS good friend by net mate, or QQ good friend etc., if not the possessory good friend of electronic equipment obtains least privilege value: " 1 "; If the possessory good friend of electronic equipment, further determine whether for the possessory high frequency good friend of electronic equipment (high frequency good friend is for exceeding a setting numerical value with the possessory number of times that contacts of electronic equipment), if the possessory high frequency good friend of electronic equipment, obtains right to use limit value " 3 "; If not the possessory high frequency good friend of electronic equipment obtains and uses weights " 2 ".
2, the scheme that is connection device for user is applied to the electronic equipment that does not exist camera maybe can not connect family networking, such as, this electronic equipment is the situation of the memory devices such as portable hard drive, this electronic equipment can detect and whether current connection device be carried out to the setting of right of privacy limit value, if the right of privacy limit value that current connection device is set detected, determine corresponding privacy property value according to the right of privacy limit value of setting, if the right of privacy limit value that connection device is set do not detected, this electronic equipment is according to current connection device and the historical right of privacy limit value of determining current connection device of being connected of this electronic equipment, concrete, this electronic equipment judges the historical connection data of current connection device and this electronic equipment, without connecting, low frequency connects (set connection number of times and be less than first threshold), high frequency connects which kind of situation in (set connection number of times and be more than or equal to first threshold), current connection device is judged to be to height, in, one in low three authority credentials.
In specific implementation process, as electronic equipment can obtain by above-mentioned two kinds of modes user's right to use limit value, preferred first kind of way.
Concrete, set the privacy property value corresponding with using weights, describe as example with reference to six privacy class that comprise shown in figure 2 continuing, when current user has the highest use weights, determine current user's the corresponding all privacy property values " 1 " " 2 " " 3 " " 4 " " 5 " of right to use limit value " 6 "; When current user has medium use weights, determine current user's right to use limit value corresponding part privacy property value, such as comprising " 1 " " 2 " " 3 " " 4 " " 5 ", or comprise " 1 " " 2 " " 3 " " 4 ", etc. situation.Current user has minimum right to use limit value, determines than medium right to use limit value privacy property value still less, and such as comprising " 1 ", or " 1 " " 2 " etc. combined situation.
203, the object that the right to use restriction that meets current user is worth to corresponding privacy property value is set as addressable state.
By above-mentioned 201~203, can make the first object different users time, be addressable state or inaccessible state, thereby realize rational secret protection.
Based on same inventive concept, the embodiment of the present invention provides a kind of electronic equipment, shown in figure 5, comprising:
First obtains unit 401, for obtaining the first object;
Call unit 402, for calling prescribed privacy level model, described prescribed privacy level model comprises the Rule of judgment of the privacy class of at least two ranks;
The first determining unit 403, for processing described the first object based on described prescribed privacy level model, determines the N level privacy class that described the first object is corresponding, and N is more than or equal to 1 positive integer, wherein, and every grade of corresponding privacy value of privacy class;
Performance element 404, for the privacy property value using the corresponding privacy value of described N level privacy class as described the first object; Wherein, described privacy property value is set the addressable state of described the first object for the rights of using of the user based on described electronic equipment, and wherein, the user's of the described electronic equipment of the higher correspondence of described privacy class rights of using are higher.
Further, described electronic equipment also comprises:
Second obtains unit, for obtaining current user's the right to use limit value of described electronic equipment,
The second determining unit, for determining the privacy property value corresponding with described right to use limit value according to described right to use limit value;
Setup unit, for being set as addressable state by the object that meets described privacy property value.
Further, in specific implementation process, described the first determining unit 403, specifically for:
The first Rule of judgment is, while whether there is face in definite object, to judge described the first object according to described the first Rule of judgment, obtains the first judged result;
Be no in described the first judged result, judge described the first object according to the second Rule of judgment, obtain the second judged result, wherein, described the second Rule of judgment is to determine in object whether have animal;
While being no, determine that described the first object is the first privacy class in described the second judged result, otherwise determine that described the first object is the second privacy class higher than described the first privacy class.
Further, in specific implementation process, described the first determining unit 403 also for:
When being, further judge the privacy class of described the first object in described the first judged result according to the 3rd Rule of judgment, wherein, the history that described the 3rd Rule of judgment is object is used information; The history of described the first object is used information difference, the privacy class difference of described the first object.
Further, in specific implementation process, described the 3rd Rule of judgment, specifically comprises: the first sub-Rule of judgment is to judge whether object carries out Internet Transmission.
Further, in specific implementation process, described the first determining unit 403 also for:
According to the first object described in described the first sub-condition judgment, obtain the 3rd judged result;
When being, determine that described the first object is the 3rd privacy class higher than described the second privacy class in described the 3rd judged result.
Further, in specific implementation process, also comprise at described the 3rd Rule of judgment: the second sub-Rule of judgment is whether the access times that judge object are when exceeding a setting and using threshold value; Described the first determining unit 403 also for:
While being no, judge described first object according to described the second sub-Rule of judgment in described the 3rd judged result, obtain the 4th judged result;
When being, determine that described the first object is the 4th privacy class higher than described the 3rd privacy class in described the 4th judged result.
Further, in specific implementation process, described the 3rd Rule of judgment also comprises: the 3rd sub-Rule of judgment be judge object service time whether in a setting-up time section; Described the first determining unit 403 also for:
While being no, judge described first object according to described the 3rd sub-Rule of judgment in described the 4th judged result, obtain the 5th judged result;
When being, determine that described the first object is the 5th privacy class higher than described the 4th privacy class in described the 5th judged result; While being no, determine that described the first object is the 6th privacy class higher than described the 5th privacy class in described the 5th judged result.
Various variation patterns in information processing method in previous embodiment and instantiation are equally applicable to the electronic equipment of the present embodiment, by the aforementioned detailed description to information processing method, those skilled in the art can clearly know the implementation method of electronic equipment in the present embodiment, so succinct for instructions, is not described in detail in this.
Technical scheme in the embodiment of the present invention at least has following technique effect or advantage:
In the embodiment of the present invention, obtain the first object owing to having adopted; Call prescribed privacy level model, prescribed privacy level model comprises the Rule of judgment of the privacy class of at least two ranks; Process the first object based on prescribed privacy level model, determine the N level privacy class that the first object is corresponding, wherein, every grade of corresponding privacy value of privacy class; Privacy property value using corresponding N level privacy class privacy value as the first object; Wherein, privacy property value is set the addressable state of the first object for the rights of using of the user based on electronic equipment; wherein; the user's of the electronic equipment of the higher correspondence of privacy class the higher technical scheme of rights of using; this shows; can determine according to the first object self character the privacy class of the first object, automatically set the privacy class of object according to object difference, therefore eliminate the technical matters to the protection scheme complicated operation to privacy object in prior art.
And then; because privacy property value is set the addressable state of the first object for the rights of using of user based on electronic equipment; therefore can conduct interviews to the object of different privacy class according to user's rights of using; eliminated in prior art can not Reasonable Protection privacy object technical matters; realize the different technique effects of automatically determining accessible object because of user, therefore there is stronger secret protection specific aim.
Specifically, computer program instructions corresponding to information processing method in the embodiment of the present application can be stored in CD, hard disk, on the storage mediums such as USB flash disk, in the time that the computer program instructions corresponding with information processing method in storage medium read or be performed by an electronic equipment, comprise the steps:
Obtain the first object;
Call prescribed privacy level model, described prescribed privacy level model comprises the Rule of judgment of the privacy class of at least two ranks;
Process described the first object based on described prescribed privacy level model, determine the N level privacy class that described the first object is corresponding, N is more than or equal to 1 positive integer, wherein, and every grade of corresponding privacy value of privacy class;
Privacy property value using the corresponding privacy value of described N level privacy class as described the first object; Wherein, described privacy property value is set the addressable state of described the first object for the rights of using of the user based on described electronic equipment, and wherein, the user's of the described electronic equipment of the higher correspondence of described privacy class rights of using are higher.
Preferably, described method also comprises:
Obtain the current user's of described electronic equipment right to use limit value;
Determine the privacy property value corresponding with described right to use limit value according to described right to use limit value;
The object that meets described privacy property value is set as to addressable state.
Preferably, describedly process described the first object based on described prescribed privacy level model, determine that the N level privacy class step that described the first object is corresponding comprises:
The first Rule of judgment is, while whether there is face in definite object, to judge described the first object according to described the first Rule of judgment, obtains the first judged result;
Be no in described the first judged result, judge described the first object according to the second Rule of judgment, obtain the second judged result, wherein, described the second Rule of judgment is to determine in object whether have animal;
While being no, determine that described the first object is the first privacy class in described the second judged result, otherwise determine that described the first object is the second privacy class higher than described the first privacy class.
Preferably, judge described the first object described according to described the first Rule of judgment, after obtaining the first judged result, described method also comprises:
When being, further judge the privacy class of described the first object in described the first judged result according to the 3rd Rule of judgment, wherein, the history that described the 3rd Rule of judgment is object is used information; The history of described the first object is used information difference, the privacy class difference of described the first object.
Preferably, described the 3rd Rule of judgment, specifically comprises: the first sub-Rule of judgment is to judge whether object carries out Internet Transmission.
Preferably, the described privacy class that further judges described the first object according to the 3rd Rule of judgment, is specially:
According to the first object described in described the first sub-condition judgment, obtain the 3rd judged result;
When being, determine that described the first object is the 3rd privacy class higher than described the second privacy class in described the 3rd judged result.
Preferably, also comprise at described the 3rd Rule of judgment: the second sub-Rule of judgment is whether the access times that judge object are when exceeding a setting and using threshold value; Described, according to the first object described in described the first sub-condition judgment, after obtaining the 3rd judged result, described method also comprises:
While being no, judge described first object according to described the second sub-Rule of judgment in described the 3rd judged result, obtain the 4th judged result;
When being, determine that described the first object is the 4th privacy class higher than described the 3rd privacy class in described the 4th judged result.
Preferably, described the 3rd Rule of judgment also comprises: the 3rd sub-Rule of judgment be judge object service time whether in a setting-up time section; Judge described the first object described according to described the second sub-Rule of judgment, after obtaining the 4th judged result, described method also comprises:
While being no, judge described first object according to described the 3rd sub-Rule of judgment in described the 4th judged result, obtain the 5th judged result;
When being, determine that described the first object is the 5th privacy class higher than described the 4th privacy class in described the 5th judged result; While being no, determine that described the first object is the 6th privacy class higher than described the 5th privacy class in described the 5th judged result.
Although described the preferred embodiments of the present invention, once those skilled in the art obtain the basic creative concept of cicada, can make other change and amendment to these embodiment.So claims are intended to be interpreted as comprising preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if these amendments of the present invention and within modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification interior.

Claims (16)

1. an information processing method, described method is applied in electronic equipment, and described method comprises:
Obtain the first object;
Call prescribed privacy level model, described prescribed privacy level model comprises the Rule of judgment of the privacy class of at least two ranks;
Process described the first object based on described prescribed privacy level model, determine the N level privacy class that described the first object is corresponding, N is more than or equal to 1 positive integer, wherein, and every grade of corresponding privacy value of privacy class;
Privacy property value using the corresponding privacy value of described N level privacy class as described the first object; Wherein, described privacy property value is set the addressable state of described the first object for the rights of using of the user based on described electronic equipment, and wherein, the user's of the described electronic equipment of the higher correspondence of described privacy class rights of using are higher.
2. the method for claim 1, is characterized in that, described method also comprises:
Obtain the current user's of described electronic equipment right to use limit value;
Determine the privacy property value corresponding with described right to use limit value according to described right to use limit value;
The object that meets described privacy property value is set as to addressable state.
3. the method for claim 1, is characterized in that, describedly processes described the first object based on described prescribed privacy level model, determines that the N level privacy class step that described the first object is corresponding comprises:
The first Rule of judgment is, while whether there is face in definite object, to judge described the first object according to described the first Rule of judgment, obtains the first judged result;
Be no in described the first judged result, judge described the first object according to the second Rule of judgment, obtain the second judged result, wherein, described the second Rule of judgment is to determine in object whether have animal;
While being no, determine that described the first object is the first privacy class in described the second judged result, otherwise determine that described the first object is the second privacy class higher than described the first privacy class.
4. method as claimed in claim 3, is characterized in that, judges described the first object described according to described the first Rule of judgment, and after obtaining the first judged result, described method also comprises:
When being, further judge the privacy class of described the first object in described the first judged result according to the 3rd Rule of judgment, wherein, the history that described the 3rd Rule of judgment is object is used information; The history of described the first object is used information difference, the privacy class difference of described the first object.
5. method as claimed in claim 4, is characterized in that, described the 3rd Rule of judgment, specifically comprises: the first sub-Rule of judgment is to judge whether object carries out Internet Transmission.
6. method as claimed in claim 5, is characterized in that, the described privacy class that further judges described the first object according to the 3rd Rule of judgment, is specially:
According to the first object described in described the first sub-condition judgment, obtain the 3rd judged result;
When being, determine that described the first object is the 3rd privacy class higher than described the second privacy class in described the 3rd judged result.
7. method as claimed in claim 6, is characterized in that, also comprises at described the 3rd Rule of judgment: the second sub-Rule of judgment is whether the access times that judge object are when exceeding a setting and using threshold value; Described, according to the first object described in described the first sub-condition judgment, after obtaining the 3rd judged result, described method also comprises:
While being no, judge described first object according to described the second sub-Rule of judgment in described the 3rd judged result, obtain the 4th judged result;
When being, determine that described the first object is the 4th privacy class higher than described the 3rd privacy class in described the 4th judged result.
8. method as claimed in claim 7, is characterized in that, described the 3rd Rule of judgment also comprises: the 3rd sub-Rule of judgment be judge object service time whether in a setting-up time section; Judge described the first object described according to described the second sub-Rule of judgment, after obtaining the 4th judged result, described method also comprises:
While being no, judge described first object according to described the 3rd sub-Rule of judgment in described the 4th judged result, obtain the 5th judged result;
When being, determine that described the first object is the 5th privacy class higher than described the 4th privacy class in described the 5th judged result; While being no, determine that described the first object is the 6th privacy class higher than described the 5th privacy class in described the 5th judged result.
9. an electronic equipment, comprising:
First obtains unit, for obtaining the first object;
Call unit, for calling prescribed privacy level model, described prescribed privacy level model comprises the Rule of judgment of the privacy class of at least two ranks;
The first determining unit, for processing described the first object based on described prescribed privacy level model, determines the N level privacy class that described the first object is corresponding, and N is more than or equal to 1 positive integer, wherein, and every grade of corresponding privacy value of privacy class;
Performance element, for the privacy property value using the corresponding privacy value of described N level privacy class as described the first object; Wherein, described privacy property value is set the addressable state of described the first object for the rights of using of the user based on described electronic equipment, and wherein, the user's of the described electronic equipment of the higher correspondence of described privacy class rights of using are higher.
10. electronic equipment as claimed in claim 9, is characterized in that, described electronic equipment also comprises:
Second obtains unit, for obtaining current user's the right to use limit value of described electronic equipment,
The second determining unit, for determining the privacy property value corresponding with described right to use limit value according to described right to use limit value;
Setup unit, for being set as addressable state by the object that meets described privacy property value.
11. electronic equipments as claimed in claim 9, is characterized in that, described the first determining unit, specifically for:
The first Rule of judgment is, while whether there is face in definite object, to judge described the first object according to described the first Rule of judgment, obtains the first judged result;
Be no in described the first judged result, judge described the first object according to the second Rule of judgment, obtain the second judged result, wherein, described the second Rule of judgment is to determine in object whether have animal;
While being no, determine that described the first object is the first privacy class in described the second judged result, otherwise determine that described the first object is the second privacy class higher than described the first privacy class.
12. electronic equipments as claimed in claim 11, is characterized in that, described the first determining unit also for:
When being, further judge the privacy class of described the first object in described the first judged result according to the 3rd Rule of judgment, wherein, the history that described the 3rd Rule of judgment is object is used information; The history of described the first object is used information difference, the privacy class difference of described the first object.
13. electronic equipments as claimed in claim 12, is characterized in that, described the 3rd Rule of judgment, specifically comprises: the first sub-Rule of judgment is to judge whether object carries out Internet Transmission.
14. electronic equipments as claimed in claim 13, is characterized in that, described the first determining unit also for:
According to the first object described in described the first sub-condition judgment, obtain the 3rd judged result;
When being, determine that described the first object is the 3rd privacy class higher than described the second privacy class in described the 3rd judged result.
15. electronic equipments as claimed in claim 14, is characterized in that, also comprise at described the 3rd Rule of judgment: the second sub-Rule of judgment is whether the access times that judge object are when exceeding a setting and using threshold value; Described the first determining unit also for:
While being no, judge described first object according to described the second sub-Rule of judgment in described the 3rd judged result, obtain the 4th judged result;
When being, determine that described the first object is the 4th privacy class higher than described the 3rd privacy class in described the 4th judged result.
16. electronic equipments as claimed in claim 15, is characterized in that, described the 3rd Rule of judgment also comprises: the 3rd sub-Rule of judgment be judge object service time whether in a setting-up time section; Described the first determining unit also for:
While being no, judge described first object according to described the 3rd sub-Rule of judgment in described the 4th judged result, obtain the 5th judged result;
When being, determine that described the first object is the 5th privacy class higher than described the 4th privacy class in described the 5th judged result; While being no, determine that described the first object is the 6th privacy class higher than described the 5th privacy class in described the 5th judged result.
CN201410347616.6A 2014-07-21 2014-07-21 A kind of information processing method and electronic equipment Active CN104123509B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410347616.6A CN104123509B (en) 2014-07-21 2014-07-21 A kind of information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410347616.6A CN104123509B (en) 2014-07-21 2014-07-21 A kind of information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN104123509A true CN104123509A (en) 2014-10-29
CN104123509B CN104123509B (en) 2017-07-21

Family

ID=51768917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410347616.6A Active CN104123509B (en) 2014-07-21 2014-07-21 A kind of information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN104123509B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537289A (en) * 2014-12-18 2015-04-22 乐视致新电子科技(天津)有限公司 Method and device for protecting intended target in terminal device
CN106921791A (en) * 2017-01-25 2017-07-04 北京奇虎科技有限公司 The storage and inspection method of a kind of multimedia file, device and mobile terminal
CN107465810A (en) * 2017-07-11 2017-12-12 广东欧珀移动通信有限公司 Data control method and related product
CN108763893A (en) * 2018-04-26 2018-11-06 上海闻泰电子科技有限公司 Read-write equipment, method based on recognition of face and electronic equipment
CN109241775A (en) * 2018-11-09 2019-01-18 维沃移动通信有限公司 A kind of method for secret protection and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917513A (en) * 2010-08-02 2010-12-15 中兴通讯股份有限公司 Method and device for implementing graded display of privacy information
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
CN103714280A (en) * 2013-12-02 2014-04-09 联想(北京)有限公司 Permission control method and electronic equipment
CN103794015A (en) * 2013-12-16 2014-05-14 柳州博泽科技有限公司 Smart anti-theft system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917513A (en) * 2010-08-02 2010-12-15 中兴通讯股份有限公司 Method and device for implementing graded display of privacy information
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
CN103714280A (en) * 2013-12-02 2014-04-09 联想(北京)有限公司 Permission control method and electronic equipment
CN103794015A (en) * 2013-12-16 2014-05-14 柳州博泽科技有限公司 Smart anti-theft system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537289A (en) * 2014-12-18 2015-04-22 乐视致新电子科技(天津)有限公司 Method and device for protecting intended target in terminal device
CN106921791A (en) * 2017-01-25 2017-07-04 北京奇虎科技有限公司 The storage and inspection method of a kind of multimedia file, device and mobile terminal
CN106921791B (en) * 2017-01-25 2020-06-09 北京安云世纪科技有限公司 Multimedia file storage and viewing method and device and mobile terminal
CN107465810A (en) * 2017-07-11 2017-12-12 广东欧珀移动通信有限公司 Data control method and related product
CN108763893A (en) * 2018-04-26 2018-11-06 上海闻泰电子科技有限公司 Read-write equipment, method based on recognition of face and electronic equipment
CN109241775A (en) * 2018-11-09 2019-01-18 维沃移动通信有限公司 A kind of method for secret protection and terminal
CN109241775B (en) * 2018-11-09 2021-01-08 维沃移动通信有限公司 Privacy protection method and terminal

Also Published As

Publication number Publication date
CN104123509B (en) 2017-07-21

Similar Documents

Publication Publication Date Title
US10097576B2 (en) Systems and methods for application security analysis
CN104123509A (en) Information processing method and electronic device
CN104184705B (en) Verification method, device, server, subscriber data center and system
CN104463017B (en) A kind of information processing method and electronic equipment
JP6611199B2 (en) System and method for restricting user access to suspicious objects in social networks
CN107204986A (en) High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
CN109274582B (en) Instant communication message display method, device, equipment and storage medium
CN110046297B (en) Operation and maintenance violation identification method and device and storage medium
CN105930726B (en) A kind of processing method and user terminal of malicious operation behavior
CN105790948B (en) A kind of identity identifying method and device
CN105515830A (en) User management method and device
CN103995997A (en) Method and equipment for distributing user rights
CN109902611B (en) Target certificate detection method and device and terminal equipment
Bertini et al. Profile resolution across multilayer networks through smartphone camera fingerprint
CN109272378A (en) A kind of discovery method and apparatus of risk group
Kaur et al. A secure data classification model in cloud computing using machine learning approach
CN107330848A (en) Image processing method, mobile terminal and storage device
US20160034717A1 (en) Filtering Transferred Media Content
CN103906045A (en) Method and system for monitoring mobile terminal privacy stealing behaviors
US9014634B2 (en) Social network based Wi-Fi connectivity
Cascavilla et al. OSSINT-Open Source Social Network Intelligence: An efficient and effective way to uncover “private” information in OSN profiles
CN112688951B (en) Visitor management method and related device
CN109145827A (en) Video communication method and device
CN108040064A (en) Data transmission method, device, electronic equipment and storage medium
CN114297710A (en) Household data security management storage method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant