CN104123509B - A kind of information processing method and electronic equipment - Google Patents
A kind of information processing method and electronic equipment Download PDFInfo
- Publication number
- CN104123509B CN104123509B CN201410347616.6A CN201410347616A CN104123509B CN 104123509 B CN104123509 B CN 104123509B CN 201410347616 A CN201410347616 A CN 201410347616A CN 104123509 B CN104123509 B CN 104123509B
- Authority
- CN
- China
- Prior art keywords
- privacy
- judgment
- rule
- judged result
- electronic equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of information processing method and electronic equipment, the scheme complex operation having in the prior art in technology to privacy object is solved, and be unable to the technical problem of Reasonable Protection privacy object.This method includes:Obtain the first object;Prescribed privacy level model is called, the prescribed privacy level model includes the Rule of judgment of the privacy class of at least two ranks;Based on prescribed privacy level model processing first object, the corresponding N grades of privacy class of first object are determined, wherein, every grade of privacy class correspondence privacy value;Using the privacy value corresponding to the N grades of privacy class as first object private attribute value;Wherein, the private attribute value is used for the accessiable state of access right setting first object of the user based on the electronic equipment, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of information processing method and electronic equipment.
Background technology
In existing life, picture or phase in personal device (such as computer, mobile phone, movable storage device, camera etc.)
Piece usually can because of it is for public use other people or be connected to other equipment and occur the situation of privacy leakage.
In the prior art, in order to protect the privacy of user, personal device can be by by privacy object (such as, photograph, figure
Piece, video etc.) file individually set up is stored in, and to file encryption or hide processing.
But the equipment owner is in the privacy object using encryption or hiding processing in the prior art, it is also desirable to logical
Cross password authentification, fingerprint authentication etc. mode is additionally, since and outer lends other users or connection equipment is different, privacy object
Also difference, 2 points of considerations of summary, in the prior art to the protection scheme complex operation of privacy object, and can not be reasonable
Protect privacy object.
The content of the invention
The embodiments of the invention provide a kind of information processing method and electronic equipment, eliminate in the prior art to privacy pair
The scheme complex operation of elephant, and it is unable to the technical problem of Reasonable Protection privacy object.
In a first aspect, the embodiments of the invention provide a kind of information processing method, methods described is applied in electronic equipment,
Methods described includes:
Obtain the first object;
Prescribed privacy level model is called, the prescribed privacy level model includes the privacy class of at least two ranks
Rule of judgment;
Based on prescribed privacy level model processing first object, determine that first object is corresponding N grades
Privacy class, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;It is described
Using the privacy value corresponding to the N grades of privacy class as first object private attribute value;Wherein, institute
Stating private attribute value is used for the addressable shape of access right setting first object of the user based on the electronic equipment
State, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher.
Preferably, methods described also includes:
Obtain the right to use limit value of the currently used person of the electronic equipment;
Private attribute value corresponding with the right to use limit value is determined according to the right to use limit value;
The object for meeting the private attribute value is set as accessiable state.
Preferably, it is described that first object is handled based on the prescribed privacy level model, determine first object
Corresponding N grades of privacy class steps include:
First Rule of judgment is to determine when whether there is face in object, and described the is judged according to first Rule of judgment
One object, obtains the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains second and judge
As a result, wherein, second Rule of judgment be to determine in object whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, is otherwise determined described
First object is the second privacy class higher than first privacy class.
Preferably, first object judged according to first Rule of judgment described, obtain the first judged result it
Afterwards, methods described also includes:
When first judged result is to be, the privacy of first object is determined whether according to the 3rd Rule of judgment
Rank, wherein, the 3rd Rule of judgment is the history use information of object;The history use information of first object is not
Together, the privacy class of first object is different.
Preferably, the 3rd Rule of judgment, is specifically included:First sub- Rule of judgment is to judge whether object carries out network
Transmission.
Preferably, the privacy class that first object is determined whether according to the 3rd Rule of judgment, be specially:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is higher than the 3rd of second privacy class to determine first object
Privacy class.
Preferably, also include in the 3rd Rule of judgment:Second sub- Rule of judgment is that the access times for judging object are
It is no more than one setting using threshold value when;In first object according to the described first sub- condition judgment, obtain the 3rd and judge
As a result after, methods described also includes:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, obtained
4th judged result;
When the 4th judged result is to be, it is higher than the 4th of the 3rd privacy class to determine first object
Privacy class.
Preferably, the 3rd Rule of judgment also includes:3rd sub- Rule of judgment be judge object use time whether
In setting time section;First object judged according to the described second sub- Rule of judgment described, the 4th is obtained and judges knot
After fruit, methods described also includes:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, obtained
5th judged result;
When the 5th judged result is to be, it is higher than the 5th of the 4th privacy class to determine first object
Privacy class;The 5th judged result for it is no when, it is higher than the of the 5th privacy class to determine first object
Six privacy class.
Second aspect, the embodiments of the invention provide a kind of electronic equipment, including:
First obtains unit, for obtaining the first object;
Call unit, for calling prescribed privacy level model, the prescribed privacy level model includes at least two grades
The Rule of judgment of other privacy class;
First determining unit, for based on prescribed privacy level model processing first object, determining described the
The corresponding N grades of privacy class of one object, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;It is described
Execution unit, for using the privacy value corresponding to the N grades of privacy class as first object privacy
Property value;Wherein, the private attribute value is used for the access right setting described first of the user based on the electronic equipment
The accessiable state of object, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is more
It is high.
Preferably, the electronic equipment also includes:
Second obtaining unit, the right to use limit value of the currently used person for obtaining the electronic equipment,
Second determining unit, for determining private attribute corresponding with the right to use limit value according to the right to use limit value
Value;
Setup unit, for the object for meeting the private attribute value to be set as into accessiable state.
Preferably, first determining unit, specifically for:
First Rule of judgment is to determine when whether there is face in object, and described the is judged according to first Rule of judgment
One object, obtains the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains second and judge
As a result, wherein, second Rule of judgment be to determine in object whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, is otherwise determined described
First object is the second privacy class higher than first privacy class.
Preferably, first determining unit is additionally operable to:
When first judged result is to be, the privacy of first object is determined whether according to the 3rd Rule of judgment
Rank, wherein, the 3rd Rule of judgment is the history use information of object;The history use information of first object is not
Together, the privacy class of first object is different.
Preferably, the 3rd Rule of judgment, is specifically included:First sub- Rule of judgment is to judge whether object carries out network
Transmission.
Preferably, first determining unit is additionally operable to:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is higher than the 3rd of second privacy class to determine first object
Privacy class.
Preferably, also include in the 3rd Rule of judgment:Second sub- Rule of judgment is that the access times for judging object are
It is no more than one setting using threshold value when;First determining unit is additionally operable to:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, obtained
4th judged result;
When the 4th judged result is to be, it is higher than the 4th of the 3rd privacy class to determine first object
Privacy class.
Preferably, the 3rd Rule of judgment also includes:3rd sub- Rule of judgment be judge object use time whether
In setting time section;First determining unit is additionally operable to:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, obtained
5th judged result;
When the 5th judged result is to be, it is higher than the 5th of the 4th privacy class to determine first object
Privacy class;The 5th judged result for it is no when, it is higher than the of the 5th privacy class to determine first object
Six privacy class.
The one or more technical schemes provided in the embodiment of the present invention, have at least the following technical effects or advantages:
As a result of obtaining the first object in the embodiment of the present invention;Call prescribed privacy level model, prescribed privacy level
Other model includes the Rule of judgment of the privacy class of at least two ranks;First object is handled based on prescribed privacy level model,
The corresponding N grades of privacy class of the first object are determined, wherein, every grade of privacy class correspondence privacy value;By N grades of privacy class institutes
Corresponding privacy value as the first object private attribute value;Wherein, private attribute value is used for the user based on electronic equipment
Access right set the first object accessiable state, wherein, the user's of the more high corresponding electronic equipment of privacy class
The higher technical scheme of access right, it can thus be seen that the hidden of the first object can be determined according to the first object self character
Private rank, the privacy class of object is set automatically according to object difference, it is thus eliminated that in the prior art to privacy object
Protection scheme complex operation technical problem.
And then, due to private attribute value be used for the user based on electronic equipment access right set the first object can
Access state, conducts interviews therefore, it is possible to the access right according to user to the object of different privacy class, eliminates existing
The technical problem of Reasonable Protection privacy object is unable in technology, realizes and automatically determines accessible object because user is different
Technique effect, therefore with stronger secret protection specific aim.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 be the embodiment of the present invention in information processing method flow chart;
Fig. 2 is that the privacy class in the embodiment of the present invention judges schematic diagram;
Fig. 3 is the flow chart of the right to use limit value of settled preceding user really in the embodiment of the present invention;
Fig. 4 is a kind of access right judgment models schematic diagram in the embodiment of the present invention;
Fig. 5 be the embodiment of the present invention in electronic equipment module map.
Embodiment
In order to eliminate protection scheme complex operation in the prior art to privacy object, and it is unable to Reasonable Protection privacy object
Technical problem, total invention thinking is as follows:
The prescribed privacy level model with least two Rule of judgment is called, so as to pass through the first object for judging to obtain
The mode for meeting which of prescribed privacy level model Rule of judgment determines the privacy class of the first object.Can then be set
The privacy class of one object is higher, is able to access that the right to use limit value of the user of the first object is higher.Thus eliminate existing
To the protection scheme complex operation of privacy object in technology, and be unable to the technical problem of Reasonable Protection privacy object, realize because
User is different and automatically determines the technique effect of accessible object, therefore with stronger secret protection specific aim.
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Information processing method provided in an embodiment of the present invention is applied to an electronic equipment, and the electronic apparatus application is moved in individual
Dynamic equipment, such as mobile phone, camera, movable storage device, computer etc., certainly, the method flow in the embodiment of the present invention also may be used
With applied in other equipment terminal.
With reference to shown in Fig. 1, the information processing method in the embodiment of the present invention includes following flow:
101st, the first object is obtained.
Specifically, the first object can be with picture file or video file.Can also be to include other texts of picture or video
Part form, such as be pasted with the file of the PDF format of picture, is pasted with the file of the WORD forms of picture.
Different according to the type of the first object for specific, the mode for obtaining the first object is also differed.Such as, may be used
To shoot photo or video by the camera of the electronic equipment, or draw picture in the electronic equipment, or
Editor is pasted with the file of the PDF format of picture in the electronic equipment, and editor is pasted with file of WORD forms of picture etc. also
Can from other equipment receive picture file, video file, be pasted with picture PDF format file, be pasted with picture
Any of file of WORD forms.
102nd, prescribed privacy level model is called, the prescribed privacy level model includes the privacy level of at least two ranks
Other Rule of judgment.
Specifically, the privacy class Rule of judgment of two ranks of prescribed privacy level model can judge bar including two
Part, three Rule of judgment, four Rule of judgment etc. carry out citing to the possibility framework of prescribed privacy level model below and retouched
State, but be not used in the restriction present invention.
Embodiment one:
Prescribed privacy level model includes the first Rule of judgment and the second Rule of judgment.
Specifically, the first Rule of judgment can be:Determine to whether there is face in object;Especially by face recognition technology
Determine to whether there is eyes in object, face, nose, or identify in object with the presence or absence of face by facial contour.The
Two Rule of judgment can be:Determine to whether there is animal in object.Especially by whether being deposited in image recognition technology identification object
In animal.Such as, can be recognized by hair, animal painting contrast etc. technology determine in object whether there is animal.
Those skilled in the art may be referred to face recognition technology of the prior art and determine to whether there is face in object,
And determine to whether there is animal in object by image recognition technology of the prior art.
Certainly, in specific implementation process, do not limit the first Rule of judgment and be to determine in object with the presence or absence of face, and
Second Rule of judgment, which is to determine in object, whether there is animal.It can also be the Rule of judgment for being set as other forms.
Embodiment two:
On the basis of continuing to use embodiment one, prescribed privacy level model also includes regarding the history use information of object as the
Three Rule of judgment.Specifically, the type of the history use information of object includes following at least one:
1st, browse and/or edit session;
2nd, browse and/or edit number of times;
3rd, whether network transmission is carried out, such as, uploads social networks or be sent to other equipment.
Specifically, different according to the type of history use information, the 3rd Rule of judgment specifically at least includes:First son judges
Condition, such as the first sub- Rule of judgment is whether to carry out network transmission.
Further, the 3rd Rule of judgment can also include the second sub- Rule of judgment, such as judging the access times of object is
It is no to use threshold value more than a setting.In specific implementation process, access times include browsing and/or editing number of times.
Further, the 3rd Rule of judgment can also include the 3rd sub- Rule of judgment, such as judging the use time of object is
It is no interior in setting time section.
Certainly, in specific implementation process, the first sub- Rule of judgment of the 3rd Rule of judgment, the second sub- Rule of judgment, the
Three sub- Rule of judgment are not limited to the example above.
103rd, the first object is handled based on prescribed privacy level model, determines the corresponding N grades of privacies of first object
Rank, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;
Specifically, handling the first object using at least one prescribed privacy level model introduced in 102.For example,
Embodiment one, if prescribed privacy level model in previous embodiment one handles the first object, determines the
One object is the first privacy class, either the second privacy class or the 3rd privacy class.The first step, bar is judged according to first
Part handles the first object, and result is as follows:
When the 1st, determining that the first object has face, it is determined that the first object is the 3rd privacy class;
When the 2nd, determining in the first object not including face, second step is continued executing with:The is handled according to the second Rule of judgment
One object, result is as follows:
If it is determined that there is animal in the first object, it is determined that the first object is the second privacy less than the 3rd privacy class
Rank, however, it is determined that go out in the first object to be not present animal (such as only including landscape or still life), it is determined that the first object is low
In the first privacy class of the second privacy class.
Embodiment two, if the first the prescribed privacy level model described according to previous embodiment two handles first pair
As, it is determined that it may be that the first object is the first privacy class, either the second privacy class or the 3rd privacy class to go out, or
The privacy class of person the 4th.
Specifically, according to the first Rule of judgment, (concrete example is:Determine that object whether there is face) first pair of processing
As determining to exist in the first object after face, in order to more refine privacy class, embodiment two is different from embodiment one
It is to continue with performing the 3rd step:First object is handled according to the first sub- Rule of judgment, determines whether the first object carries out network transmission,
If the first object carries out network transmission, it is determined that the first object is the 3rd privacy class higher than the second privacy class;If first
Object carries out network transmission, it is determined that the first object is the 4th privacy class higher than the 3rd privacy class.
If embodiment three, second of the prescribed privacy level model described according to previous embodiment two handle first pair
As, it is determined that it may be the first privacy class to go out the first object, either the second privacy class or the 3rd privacy class, or
4th privacy class, or the 5th privacy class.
Specifically, the first object is handled according to the first sub- Rule of judgment, determines that the first object does not carry out network transmission
Afterwards, in order to further refine privacy class on the basis of embodiment two, embodiment three is different from embodiment two
It is to continue executing with the 4th step:First object is handled according to the second sub- Rule of judgment, judges whether the access times of the first object surpass
Cross a setting and use threshold value.If judging, the access times of the first object use threshold value more than setting, it is determined that the first object is
Higher than the 4th privacy class of the 3rd privacy class;If judging, the access times of the first object are not above setting and use threshold
Value, it is determined that the first object is the 5th privacy class higher than the 4th privacy class.
In specific implementation process, setting can be the equal of the access times of all objects in electronic equipment using threshold value
Value, or other self-defined numerical value.
Embodiment four, with reference to shown in Fig. 2, if the third prescribed privacy rank mould described according to previous embodiment two
Type handles the first object, it is determined that it may be that the first privacy class, either the second privacy class or the 3rd are hidden to go out the first object
Private rank, either the 4th privacy class or the 5th privacy class, or the 6th privacy class.
Specifically, the first object is handled according to the second sub- Rule of judgment, determines that the access times of the first object do not surpass
A setting is crossed using after threshold value, in order to further refine privacy class, embodiment four on the basis of embodiment three
From unlike embodiment three, continuing executing with the 5th step:First object is handled according to the 3rd sub- Rule of judgment, first pair is judged
Whether the use time of elephant is in setting time section.If judging the use time of the first object in setting time section,
It is the 5th privacy class higher than the 4th privacy class then to determine the first object;Do not have if judging the use time of the first object
Within the period of a setting, it is determined that the first object is the 6th privacy class higher than the 5th privacy class.
The prescribed privacy level model of the certain rule of foundation described by above-mentioned embodiment one to embodiment five is true
The mode of the privacy class of fixed first object, carries out privacy class evaluation to the object in electronic equipment automatically, thus realize by
Object in electronic equipment is divided into some levels according to degree of privacy.
104th, using the privacy value corresponding to the N grades of privacy class as first object private attribute value;Its
In, the access right that the private attribute value is used for the user based on the electronic equipment sets visiting for first object
State is asked, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher.
Specifically, every grade of privacy class is to correspondence privacy value, such as, including six privacy class, then can be set as
The privacy value of first privacy class is " 1 ", and the privacy value of the second privacy class is " 2 ", and the privacy value of the 3rd privacy class is
" 3 ", the privacy value of the 4th privacy class is " 4 ", and the privacy value of the 5th privacy class is " 5 ", the privacy value of the 6th privacy class
For " 6 ".Certainly, in specific implementation process, or be set as other numerical value, the present invention is without limiting.
In specific implementation process, the user of electronic equipment can be the owner of electronic equipment, or use
The other users of the electronic equipment or another connection equipment being connected with the electronic equipment.Specifically, the right to use of user
Limit is different according to user's difference.
Therefore, in specific implementation process, with reference to shown in Fig. 3, methods described also includes following flow, current for determining
The object that user can access:
201st, the right to use limit value of the currently used person of electronic equipment is obtained.
Specifically, user is corresponding with right to use limit value, user or developer can set user's type with making
With the corresponding relation of authority credentials, such as it can be set as, electronic equipment owner correspondence highest right to use limit value, electronic equipment institute
The medium right to use limit value of good friend's correspondence for the person of having, the minimum right to use limit value of non-good friend user's correspondence.It can also such as be set as:
Electronic equipment owner correspondence highest right to use limit value, household has the second right to use limit value, and friend and colleague have the 3rd to make
With authority credentials, other minimum right to use limit values of correspondence.
202nd, private attribute value corresponding with the right to use limit value is determined according to the right to use limit value.
Specifically, obtaining the right to use limit value of currently used person includes numerous embodiments, illustrate below to 201~202
Illustrate.
1st, it is applied to include the electronic equipment of camera or voice collecting unit for the scheme of user for user, leads to
Cross camera and catch the facial image of currently used person, and carry out recognition of face to identify currently used person;Or pass through language
Sound collecting unit gathers the voice of currently used person, and carries out speech recognition to identify currently used person.So as to according to using
Person and the corresponding relation of user's authority credentials, it is determined that right to use limit value corresponding with currently used person.Such as identifying currently makes
User is the electronic equipment owner, then currently used person has highest using weights;It is electronics such as to identify currently used person
The non-good friend of the equipment owner, then when user has minimum using weights;Such as identify the good friend of currently used person, then when
Preceding user has medium using weights.
With reference to Fig. 4 for example, determine whether currently used person is electronic equipment institute by recognition of face or speech recognition
The person of having, if the electronic equipment owner, then obtains highest authority credentials:4;No person, it is determined that continuing through recognition of face or voice knowledge
Do not determine currently used person whether be the electronic equipment owner good friend, whether be SNS good friends especially by net mate, or
QQ good friends etc., if not the good friend of the electronic equipment owner, then obtain least privilege value:“1”;If the electronic equipment owner
Good friend, then further determine whether for the electronic equipment owner high frequency good friend (high frequency good friend be and the electronic equipment owner
Contact number of times more than one setting numerical value), if the high frequency good friend of the electronic equipment owner, then obtain right to use limit value " 3 ";If
It is not the high frequency good friend of the electronic equipment owner, then obtains using weights " 2 ".
2nd, it is applied to for the scheme of connection equipment in the absence of camera for user or the electronics of family networking can not be connected
Equipment, such as, the electronic equipment are the situation of the storage devices such as mobile hard disk, then the electronic equipment can be detected whether to current
Connect equipment and carry out the setting of right of privacy limit value, if detecting the right of privacy limit value set to current connection devices, basis is set
Fixed right of privacy limit value determines corresponding private attribute value, if not detecting the right of privacy limit value of connection equipment setting, the electricity
Sub- equipment determines the right of privacy limit value of current connection devices according to the connection history of current connection devices and the electronic equipment, specifically
, the electronic equipment judges that current connection devices are connected data with the history of the electronic equipment, is connectionless, low frequency connection (is set
Surely connection number of times is less than first threshold), which kind of situation in high frequency connection (setting connection number of times is more than or equal to first threshold) will
Current connection devices are determined as one kind in high, medium and low three authority credentials.
In specific implementation process, as electronic equipment can obtain the right to use limit value of user by above two mode,
Then preferred first way.
Specifically, setting private attribute value corresponding with using weights, to include six privacies with continued reference to shown in Fig. 2
Illustrated exemplified by rank, when currently used person has highest using weights, it is determined that the right to use limit value pair of currently used person
Should all private attribute values " 1 " " 2 " " 3 " " 4 " " 5 " " 6 ";When currently used person has medium using weights, it is determined that currently make
The right to use limit value corresponding part private attribute value of user, such as including " 1 " " 2 " " 3 " " 4 " " 5 ", or including " 1 " " 2 " " 3 "
" 4 ", etc. situation.Currently used person has minimum right to use limit value, it is determined that the privacy category less than medium right to use limit value
Property value, such as including " 1 ", or " 1 " " 2 " etc. combined situation.
203rd, the object of the corresponding private attribute value of the right to use limits value for meeting currently used person is set as may have access to
State.
It is accessiable state or inaccessible when can make the first object different users by above-mentioned 201~203
State, so as to realize rational secret protection.
Based on same inventive concept, the embodiments of the invention provide a kind of electronic equipment, with reference to shown in Fig. 5, including:
First obtains unit 401, for obtaining the first object;
Call unit 402, for calling prescribed privacy level model, the prescribed privacy level model includes at least two
The Rule of judgment of the privacy class of rank;
First determining unit 403, for based on prescribed privacy level model processing first object, it is determined that described
The corresponding N grades of privacy class of first object, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;
Execution unit 404, for regarding the privacy value corresponding to the N grades of privacy class as the hidden of first object
Private property value;Wherein, the private attribute value is used for the access right setting described the of the user based on the electronic equipment
The accessiable state of one object, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class
It is higher.
Further, the electronic equipment also includes:
Second obtaining unit, the right to use limit value of the currently used person for obtaining the electronic equipment,
Second determining unit, for determining private attribute corresponding with the right to use limit value according to the right to use limit value
Value;
Setup unit, for the object for meeting the private attribute value to be set as into accessiable state.
Further, in specific implementation process, first determining unit 403, specifically for:
First Rule of judgment is to determine when whether there is face in object, and described the is judged according to first Rule of judgment
One object, obtains the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains second and judge
As a result, wherein, second Rule of judgment be to determine in object whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, is otherwise determined described
First object is the second privacy class higher than first privacy class.
Further, in specific implementation process, first determining unit 403 is additionally operable to:
When first judged result is to be, the privacy of first object is determined whether according to the 3rd Rule of judgment
Rank, wherein, the 3rd Rule of judgment is the history use information of object;The history use information of first object is not
Together, the privacy class of first object is different.
Further, in specific implementation process, the 3rd Rule of judgment is specifically included:First sub- Rule of judgment is to sentence
Whether disconnected object carries out network transmission.
Further, in specific implementation process, first determining unit 403 is additionally operable to:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is higher than the 3rd of second privacy class to determine first object
Privacy class.
Further, in specific implementation process, also include in the 3rd Rule of judgment:Second sub- Rule of judgment is to judge
When whether the access times of object use threshold value more than a setting;First determining unit 403 is additionally operable to:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, obtained
4th judged result;
When the 4th judged result is to be, it is higher than the 4th of the 3rd privacy class to determine first object
Privacy class.
Further, in specific implementation process, the 3rd Rule of judgment also includes:3rd sub- Rule of judgment is judgement pair
Whether the use time of elephant is in setting time section;First determining unit 403 is additionally operable to:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, obtained
5th judged result;
When the 5th judged result is to be, it is higher than the 5th of the 4th privacy class to determine first object
Privacy class;The 5th judged result for it is no when, it is higher than the of the 5th privacy class to determine first object
Six privacy class.
Various change mode and instantiation in information processing method in previous embodiment are equally applicable to this implementation
The electronic equipment of example, by the foregoing detailed description to information processing method, those skilled in the art are clear that this
The implementation of electronic equipment in embodiment, thus it is succinct for specification, it will not be described in detail herein.
Technical scheme in the embodiment of the present invention has at least the following technical effects or advantages:
As a result of obtaining the first object in the embodiment of the present invention;Call prescribed privacy level model, prescribed privacy level
Other model includes the Rule of judgment of the privacy class of at least two ranks;First object is handled based on prescribed privacy level model,
The corresponding N grades of privacy class of the first object are determined, wherein, every grade of privacy class correspondence privacy value;By N grades of privacy class institutes
Corresponding privacy value as the first object private attribute value;Wherein, private attribute value is used for the user based on electronic equipment
Access right set the first object accessiable state, wherein, the user's of the more high corresponding electronic equipment of privacy class
The higher technical scheme of access right, it can thus be seen that the hidden of the first object can be determined according to the first object self character
Private rank, the privacy class of object is set automatically according to object difference, it is thus eliminated that in the prior art to privacy object
Protection scheme complex operation technical problem.
And then, due to private attribute value be used for the user based on electronic equipment access right set the first object can
Access state, conducts interviews therefore, it is possible to the access right according to user to the object of different privacy class, eliminates existing
The technical problem of Reasonable Protection privacy object is unable in technology, realizes and automatically determines accessible object because user is different
Technique effect, therefore with stronger secret protection specific aim.
Specifically, the corresponding computer program instructions of information processing method in the embodiment of the present application can be stored in
On CD, hard disk, the storage medium such as USB flash disk, when computer program instructions quilt corresponding with information processing method in storage medium
When one electronic equipment reads or is performed, comprise the following steps:
Obtain the first object;
Prescribed privacy level model is called, the prescribed privacy level model includes the privacy class of at least two ranks
Rule of judgment;
Based on prescribed privacy level model processing first object, determine that first object is corresponding N grades
Privacy class, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;
Using the privacy value corresponding to the N grades of privacy class as first object private attribute value;Wherein, institute
Stating private attribute value is used for the addressable shape of access right setting first object of the user based on the electronic equipment
State, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher.
It is preferred that, methods described also includes:
Obtain the right to use limit value of the currently used person of the electronic equipment;
Private attribute value corresponding with the right to use limit value is determined according to the right to use limit value;
The object for meeting the private attribute value is set as accessiable state.
It is preferred that, it is described that first object is handled based on the prescribed privacy level model, determine first object
Corresponding N grades of privacy class steps include:
First Rule of judgment is to determine when whether there is face in object, and described the is judged according to first Rule of judgment
One object, obtains the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains second and judge
As a result, wherein, second Rule of judgment be to determine in object whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, is otherwise determined described
First object is the second privacy class higher than first privacy class.
It is preferred that, first object judged according to first Rule of judgment described, obtain the first judged result it
Afterwards, methods described also includes:
When first judged result is to be, the privacy of first object is determined whether according to the 3rd Rule of judgment
Rank, wherein, the 3rd Rule of judgment is the history use information of object;The history use information of first object is not
Together, the privacy class of first object is different.
It is preferred that, the 3rd Rule of judgment is specifically included:First sub- Rule of judgment is to judge whether object carries out network
Transmission.
It is preferred that, the privacy class that first object is determined whether according to the 3rd Rule of judgment is specially:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is higher than the 3rd of second privacy class to determine first object
Privacy class.
It is preferred that, also include in the 3rd Rule of judgment:Second sub- Rule of judgment is that the access times for judging object are
It is no more than one setting using threshold value when;In first object according to the described first sub- condition judgment, obtain the 3rd and judge
As a result after, methods described also includes:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, obtained
4th judged result;
When the 4th judged result is to be, it is higher than the 4th of the 3rd privacy class to determine first object
Privacy class.
It is preferred that, the 3rd Rule of judgment also includes:3rd sub- Rule of judgment be judge object use time whether
In setting time section;First object judged according to the described second sub- Rule of judgment described, the 4th is obtained and judges knot
After fruit, methods described also includes:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, obtained
5th judged result;
When the 5th judged result is to be, it is higher than the 5th of the 4th privacy class to determine first object
Privacy class;The 5th judged result for it is no when, it is higher than the of the 5th privacy class to determine first object
Six privacy class.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been described
Property concept, then can make other change and modification to these embodiments.So, appended claims are intended to be construed to include excellent
Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention
God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these changes and modification.
Claims (14)
1. a kind of information processing method, methods described is applied in electronic equipment, methods described includes:
Obtain the first object;File of first object including picture file, video file, the PDF format for being pasted with picture
Or it is pasted with the file of the WORD forms of picture;
Prescribed privacy level model is called, the prescribed privacy level model includes the judgement of the privacy class of at least two ranks
Condition;
Based on prescribed privacy level model processing first object, the corresponding N grades of privacies of first object are determined
Rank, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;
Using the privacy value corresponding to the N grades of privacy class as first object private attribute value;Wherein, it is described hidden
Private property value is used for the accessiable state of access right setting first object of the user based on the electronic equipment, its
In, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher;
It is described that first object is handled based on the prescribed privacy level model, determine that first object is corresponding N grades
The step of privacy class, includes:
When first Rule of judgment is to determine in object with the presence or absence of face, described first pair is judged according to first Rule of judgment
As obtaining the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains the second judged result,
Wherein, second Rule of judgment, which is to determine in object, whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, otherwise determines described first
Object is the second privacy class higher than first privacy class.
2. the method as described in claim 1, it is characterised in that methods described also includes:
Obtain the right to use limit value of the currently used person of the electronic equipment;
Private attribute value corresponding with the right to use limit value is determined according to the right to use limit value;
The object for meeting the private attribute value is set as accessiable state.
3. the method as described in claim 1, it is characterised in that according to first Rule of judgment judge described first described
Object, is obtained after the first judged result, methods described also includes:
When first judged result is to be, the privacy level of first object is determined whether according to the 3rd Rule of judgment
Not, wherein, the 3rd Rule of judgment be object history use information;The history use information of first object is different,
The privacy class of first object is different.
4. method as claimed in claim 3, it is characterised in that the 3rd Rule of judgment, is specifically included:First son judges bar
Part is to judge whether object carries out network transmission.
5. method as claimed in claim 4, it is characterised in that described to determine whether described first according to the 3rd Rule of judgment
The privacy class of object, be specially:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is the 3rd privacy higher than second privacy class to determine first object
Rank.
6. method as claimed in claim 5, it is characterised in that also include in the 3rd Rule of judgment:Second son judges bar
Part be judge object access times whether more than one setting using threshold value when;Described according to the described first sub- condition judgment institute
The first object is stated, is obtained after the 3rd judged result, methods described also includes:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, the 4th is obtained
Judged result;
When the 4th judged result is to be, it is the 4th privacy higher than the 3rd privacy class to determine first object
Rank.
7. method as claimed in claim 6, it is characterised in that the 3rd Rule of judgment also includes:3rd sub- Rule of judgment
It is to judge whether the use time of object is interior in setting time section;Described according to judging the described second sub- Rule of judgment
First object, is obtained after the 4th judged result, methods described also includes:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, the 5th is obtained
Judged result;
When the 5th judged result is to be, it is the 5th privacy higher than the 4th privacy class to determine first object
Rank;When the 5th judged result is no, determine that first object is hidden for the 6th higher than the 5th privacy class
Private rank.
8. a kind of electronic equipment, including:
First obtains unit, for obtaining the first object;First object includes picture file, video file, is pasted with figure
The file of the PDF format of piece or be pasted with picture WORD forms file;
Call unit, for calling prescribed privacy level model, the prescribed privacy level model includes at least two ranks
The Rule of judgment of privacy class;
First determining unit, for based on prescribed privacy level model processing first object, determining described first pair
As corresponding N grades of privacy class, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;
Execution unit, for using the privacy value corresponding to the N grades of privacy class as first object private attribute
Value;Wherein, the private attribute value is used for access right setting first object of the user based on the electronic equipment
Accessiable state, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher;
First determining unit, specifically for:
When first Rule of judgment is to determine in object with the presence or absence of face, described first pair is judged according to first Rule of judgment
As obtaining the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains the second judged result,
Wherein, second Rule of judgment, which is to determine in object, whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, otherwise determines described first
Object is the second privacy class higher than first privacy class.
9. electronic equipment as claimed in claim 8, it is characterised in that the electronic equipment also includes:
Second obtaining unit, the right to use limit value of the currently used person for obtaining the electronic equipment,
Second determining unit, for determining private attribute value corresponding with the right to use limit value according to the right to use limit value;
Setup unit, for the object for meeting the private attribute value to be set as into accessiable state.
10. electronic equipment as claimed in claim 8, it is characterised in that first determining unit is additionally operable to:
When first judged result is to be, the privacy level of first object is determined whether according to the 3rd Rule of judgment
Not, wherein, the 3rd Rule of judgment be object history use information;The history use information of first object is different,
The privacy class of first object is different.
11. electronic equipment as claimed in claim 10, it is characterised in that the 3rd Rule of judgment, is specifically included:First son
Rule of judgment is to judge whether object carries out network transmission.
12. electronic equipment as claimed in claim 11, it is characterised in that first determining unit is additionally operable to:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is the 3rd privacy higher than second privacy class to determine first object
Rank.
13. electronic equipment as claimed in claim 12, it is characterised in that also include in the 3rd Rule of judgment:Second son
Rule of judgment be judge object access times whether more than one setting using threshold value when;First determining unit is additionally operable to:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, the 4th is obtained
Judged result;
When the 4th judged result is to be, it is the 4th privacy higher than the 3rd privacy class to determine first object
Rank.
14. electronic equipment as claimed in claim 13, it is characterised in that the 3rd Rule of judgment also includes:3rd son is sentenced
Whether broken strip part is the use time for judging object in setting time section;First determining unit is additionally operable to:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, the 5th is obtained
Judged result;
When the 5th judged result is to be, it is the 5th privacy higher than the 4th privacy class to determine first object
Rank;When the 5th judged result is no, determine that first object is hidden for the 6th higher than the 5th privacy class
Private rank.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410347616.6A CN104123509B (en) | 2014-07-21 | 2014-07-21 | A kind of information processing method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410347616.6A CN104123509B (en) | 2014-07-21 | 2014-07-21 | A kind of information processing method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104123509A CN104123509A (en) | 2014-10-29 |
CN104123509B true CN104123509B (en) | 2017-07-21 |
Family
ID=51768917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410347616.6A Active CN104123509B (en) | 2014-07-21 | 2014-07-21 | A kind of information processing method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104123509B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537289A (en) * | 2014-12-18 | 2015-04-22 | 乐视致新电子科技(天津)有限公司 | Method and device for protecting intended target in terminal device |
CN106921791B (en) * | 2017-01-25 | 2020-06-09 | 北京安云世纪科技有限公司 | Multimedia file storage and viewing method and device and mobile terminal |
CN107465810B (en) * | 2017-07-11 | 2020-07-21 | Oppo广东移动通信有限公司 | Data control method and related product |
CN108763893A (en) * | 2018-04-26 | 2018-11-06 | 上海闻泰电子科技有限公司 | Read-write equipment, method based on recognition of face and electronic equipment |
CN109241775B (en) * | 2018-11-09 | 2021-01-08 | 维沃移动通信有限公司 | Privacy protection method and terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101917513A (en) * | 2010-08-02 | 2010-12-15 | 中兴通讯股份有限公司 | Method and device for implementing graded display of privacy information |
CN103077339A (en) * | 2012-12-28 | 2013-05-01 | 广东欧珀移动通信有限公司 | Data protection method and device |
CN103714280A (en) * | 2013-12-02 | 2014-04-09 | 联想(北京)有限公司 | Permission control method and electronic equipment |
CN103794015A (en) * | 2013-12-16 | 2014-05-14 | 柳州博泽科技有限公司 | Smart anti-theft system |
-
2014
- 2014-07-21 CN CN201410347616.6A patent/CN104123509B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101917513A (en) * | 2010-08-02 | 2010-12-15 | 中兴通讯股份有限公司 | Method and device for implementing graded display of privacy information |
CN103077339A (en) * | 2012-12-28 | 2013-05-01 | 广东欧珀移动通信有限公司 | Data protection method and device |
CN103714280A (en) * | 2013-12-02 | 2014-04-09 | 联想(北京)有限公司 | Permission control method and electronic equipment |
CN103794015A (en) * | 2013-12-16 | 2014-05-14 | 柳州博泽科技有限公司 | Smart anti-theft system |
Also Published As
Publication number | Publication date |
---|---|
CN104123509A (en) | 2014-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104123509B (en) | A kind of information processing method and electronic equipment | |
CN104660549B (en) | Auth method and device | |
CN104184705B (en) | Verification method, device, server, subscriber data center and system | |
CN106302534B (en) | A kind of method and system of detection and processing illegal user | |
CN104361076B (en) | The abnormality eliminating method and device of browser | |
CN105095726B (en) | Generate the method and device of identifying code | |
JP6611199B2 (en) | System and method for restricting user access to suspicious objects in social networks | |
CN105991593B (en) | A kind of method and device identifying consumer's risk | |
CN107968730A (en) | The method and system that monitoring Internet of Things network interface card is stolen | |
CN103854031B (en) | For the method and apparatus identifying picture material | |
CN104144240B (en) | A kind of contact management method and device, terminal device | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
CN106789543A (en) | The method and apparatus that facial expression image sends are realized in session | |
CN106797561A (en) | A kind of identity identifying method and wearable device | |
CN103152324B (en) | The user authen method of Behavior-based control feature | |
CN103324697A (en) | Method for removing copycatting applications in android application search and based on icon contrast | |
CN104778031A (en) | Method and device for closing processes | |
CN106951796A (en) | A kind of desensitization method and its device of data-privacy protection | |
CN105760778A (en) | Method and device for improving security of private picture and electronic equipment | |
CN110866236A (en) | Private picture display method, device, terminal and storage medium | |
CN107437012A (en) | The guard method of data and device | |
CN110297942B (en) | Video exploration method, device, equipment and storage medium | |
CN103997573B (en) | Mobile terminal and virtual incoming call implementation method thereof | |
US20120121140A1 (en) | Leveraging Real-Time Biometric Recognition Software in Software Systems Management | |
CN103685349A (en) | Method for information processing and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |