CN104123509B - A kind of information processing method and electronic equipment - Google Patents

A kind of information processing method and electronic equipment Download PDF

Info

Publication number
CN104123509B
CN104123509B CN201410347616.6A CN201410347616A CN104123509B CN 104123509 B CN104123509 B CN 104123509B CN 201410347616 A CN201410347616 A CN 201410347616A CN 104123509 B CN104123509 B CN 104123509B
Authority
CN
China
Prior art keywords
privacy
judgment
rule
judged result
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410347616.6A
Other languages
Chinese (zh)
Other versions
CN104123509A (en
Inventor
苏寅
欧博
张宇
张渊毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201410347616.6A priority Critical patent/CN104123509B/en
Publication of CN104123509A publication Critical patent/CN104123509A/en
Application granted granted Critical
Publication of CN104123509B publication Critical patent/CN104123509B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of information processing method and electronic equipment, the scheme complex operation having in the prior art in technology to privacy object is solved, and be unable to the technical problem of Reasonable Protection privacy object.This method includes:Obtain the first object;Prescribed privacy level model is called, the prescribed privacy level model includes the Rule of judgment of the privacy class of at least two ranks;Based on prescribed privacy level model processing first object, the corresponding N grades of privacy class of first object are determined, wherein, every grade of privacy class correspondence privacy value;Using the privacy value corresponding to the N grades of privacy class as first object private attribute value;Wherein, the private attribute value is used for the accessiable state of access right setting first object of the user based on the electronic equipment, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher.

Description

A kind of information processing method and electronic equipment
Technical field
The present invention relates to electronic technology field, more particularly to a kind of information processing method and electronic equipment.
Background technology
In existing life, picture or phase in personal device (such as computer, mobile phone, movable storage device, camera etc.) Piece usually can because of it is for public use other people or be connected to other equipment and occur the situation of privacy leakage.
In the prior art, in order to protect the privacy of user, personal device can be by by privacy object (such as, photograph, figure Piece, video etc.) file individually set up is stored in, and to file encryption or hide processing.
But the equipment owner is in the privacy object using encryption or hiding processing in the prior art, it is also desirable to logical Cross password authentification, fingerprint authentication etc. mode is additionally, since and outer lends other users or connection equipment is different, privacy object Also difference, 2 points of considerations of summary, in the prior art to the protection scheme complex operation of privacy object, and can not be reasonable Protect privacy object.
The content of the invention
The embodiments of the invention provide a kind of information processing method and electronic equipment, eliminate in the prior art to privacy pair The scheme complex operation of elephant, and it is unable to the technical problem of Reasonable Protection privacy object.
In a first aspect, the embodiments of the invention provide a kind of information processing method, methods described is applied in electronic equipment, Methods described includes:
Obtain the first object;
Prescribed privacy level model is called, the prescribed privacy level model includes the privacy class of at least two ranks Rule of judgment;
Based on prescribed privacy level model processing first object, determine that first object is corresponding N grades Privacy class, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;It is described
Using the privacy value corresponding to the N grades of privacy class as first object private attribute value;Wherein, institute Stating private attribute value is used for the addressable shape of access right setting first object of the user based on the electronic equipment State, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher.
Preferably, methods described also includes:
Obtain the right to use limit value of the currently used person of the electronic equipment;
Private attribute value corresponding with the right to use limit value is determined according to the right to use limit value;
The object for meeting the private attribute value is set as accessiable state.
Preferably, it is described that first object is handled based on the prescribed privacy level model, determine first object Corresponding N grades of privacy class steps include:
First Rule of judgment is to determine when whether there is face in object, and described the is judged according to first Rule of judgment One object, obtains the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains second and judge As a result, wherein, second Rule of judgment be to determine in object whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, is otherwise determined described First object is the second privacy class higher than first privacy class.
Preferably, first object judged according to first Rule of judgment described, obtain the first judged result it Afterwards, methods described also includes:
When first judged result is to be, the privacy of first object is determined whether according to the 3rd Rule of judgment Rank, wherein, the 3rd Rule of judgment is the history use information of object;The history use information of first object is not Together, the privacy class of first object is different.
Preferably, the 3rd Rule of judgment, is specifically included:First sub- Rule of judgment is to judge whether object carries out network Transmission.
Preferably, the privacy class that first object is determined whether according to the 3rd Rule of judgment, be specially:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is higher than the 3rd of second privacy class to determine first object Privacy class.
Preferably, also include in the 3rd Rule of judgment:Second sub- Rule of judgment is that the access times for judging object are It is no more than one setting using threshold value when;In first object according to the described first sub- condition judgment, obtain the 3rd and judge As a result after, methods described also includes:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, obtained 4th judged result;
When the 4th judged result is to be, it is higher than the 4th of the 3rd privacy class to determine first object Privacy class.
Preferably, the 3rd Rule of judgment also includes:3rd sub- Rule of judgment be judge object use time whether In setting time section;First object judged according to the described second sub- Rule of judgment described, the 4th is obtained and judges knot After fruit, methods described also includes:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, obtained 5th judged result;
When the 5th judged result is to be, it is higher than the 5th of the 4th privacy class to determine first object Privacy class;The 5th judged result for it is no when, it is higher than the of the 5th privacy class to determine first object Six privacy class.
Second aspect, the embodiments of the invention provide a kind of electronic equipment, including:
First obtains unit, for obtaining the first object;
Call unit, for calling prescribed privacy level model, the prescribed privacy level model includes at least two grades The Rule of judgment of other privacy class;
First determining unit, for based on prescribed privacy level model processing first object, determining described the The corresponding N grades of privacy class of one object, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;It is described
Execution unit, for using the privacy value corresponding to the N grades of privacy class as first object privacy Property value;Wherein, the private attribute value is used for the access right setting described first of the user based on the electronic equipment The accessiable state of object, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is more It is high.
Preferably, the electronic equipment also includes:
Second obtaining unit, the right to use limit value of the currently used person for obtaining the electronic equipment,
Second determining unit, for determining private attribute corresponding with the right to use limit value according to the right to use limit value Value;
Setup unit, for the object for meeting the private attribute value to be set as into accessiable state.
Preferably, first determining unit, specifically for:
First Rule of judgment is to determine when whether there is face in object, and described the is judged according to first Rule of judgment One object, obtains the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains second and judge As a result, wherein, second Rule of judgment be to determine in object whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, is otherwise determined described First object is the second privacy class higher than first privacy class.
Preferably, first determining unit is additionally operable to:
When first judged result is to be, the privacy of first object is determined whether according to the 3rd Rule of judgment Rank, wherein, the 3rd Rule of judgment is the history use information of object;The history use information of first object is not Together, the privacy class of first object is different.
Preferably, the 3rd Rule of judgment, is specifically included:First sub- Rule of judgment is to judge whether object carries out network Transmission.
Preferably, first determining unit is additionally operable to:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is higher than the 3rd of second privacy class to determine first object Privacy class.
Preferably, also include in the 3rd Rule of judgment:Second sub- Rule of judgment is that the access times for judging object are It is no more than one setting using threshold value when;First determining unit is additionally operable to:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, obtained 4th judged result;
When the 4th judged result is to be, it is higher than the 4th of the 3rd privacy class to determine first object Privacy class.
Preferably, the 3rd Rule of judgment also includes:3rd sub- Rule of judgment be judge object use time whether In setting time section;First determining unit is additionally operable to:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, obtained 5th judged result;
When the 5th judged result is to be, it is higher than the 5th of the 4th privacy class to determine first object Privacy class;The 5th judged result for it is no when, it is higher than the of the 5th privacy class to determine first object Six privacy class.
The one or more technical schemes provided in the embodiment of the present invention, have at least the following technical effects or advantages:
As a result of obtaining the first object in the embodiment of the present invention;Call prescribed privacy level model, prescribed privacy level Other model includes the Rule of judgment of the privacy class of at least two ranks;First object is handled based on prescribed privacy level model, The corresponding N grades of privacy class of the first object are determined, wherein, every grade of privacy class correspondence privacy value;By N grades of privacy class institutes Corresponding privacy value as the first object private attribute value;Wherein, private attribute value is used for the user based on electronic equipment Access right set the first object accessiable state, wherein, the user's of the more high corresponding electronic equipment of privacy class The higher technical scheme of access right, it can thus be seen that the hidden of the first object can be determined according to the first object self character Private rank, the privacy class of object is set automatically according to object difference, it is thus eliminated that in the prior art to privacy object Protection scheme complex operation technical problem.
And then, due to private attribute value be used for the user based on electronic equipment access right set the first object can Access state, conducts interviews therefore, it is possible to the access right according to user to the object of different privacy class, eliminates existing The technical problem of Reasonable Protection privacy object is unable in technology, realizes and automatically determines accessible object because user is different Technique effect, therefore with stronger secret protection specific aim.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 be the embodiment of the present invention in information processing method flow chart;
Fig. 2 is that the privacy class in the embodiment of the present invention judges schematic diagram;
Fig. 3 is the flow chart of the right to use limit value of settled preceding user really in the embodiment of the present invention;
Fig. 4 is a kind of access right judgment models schematic diagram in the embodiment of the present invention;
Fig. 5 be the embodiment of the present invention in electronic equipment module map.
Embodiment
In order to eliminate protection scheme complex operation in the prior art to privacy object, and it is unable to Reasonable Protection privacy object Technical problem, total invention thinking is as follows:
The prescribed privacy level model with least two Rule of judgment is called, so as to pass through the first object for judging to obtain The mode for meeting which of prescribed privacy level model Rule of judgment determines the privacy class of the first object.Can then be set The privacy class of one object is higher, is able to access that the right to use limit value of the user of the first object is higher.Thus eliminate existing To the protection scheme complex operation of privacy object in technology, and be unable to the technical problem of Reasonable Protection privacy object, realize because User is different and automatically determines the technique effect of accessible object, therefore with stronger secret protection specific aim.
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Information processing method provided in an embodiment of the present invention is applied to an electronic equipment, and the electronic apparatus application is moved in individual Dynamic equipment, such as mobile phone, camera, movable storage device, computer etc., certainly, the method flow in the embodiment of the present invention also may be used With applied in other equipment terminal.
With reference to shown in Fig. 1, the information processing method in the embodiment of the present invention includes following flow:
101st, the first object is obtained.
Specifically, the first object can be with picture file or video file.Can also be to include other texts of picture or video Part form, such as be pasted with the file of the PDF format of picture, is pasted with the file of the WORD forms of picture.
Different according to the type of the first object for specific, the mode for obtaining the first object is also differed.Such as, may be used To shoot photo or video by the camera of the electronic equipment, or draw picture in the electronic equipment, or Editor is pasted with the file of the PDF format of picture in the electronic equipment, and editor is pasted with file of WORD forms of picture etc. also Can from other equipment receive picture file, video file, be pasted with picture PDF format file, be pasted with picture Any of file of WORD forms.
102nd, prescribed privacy level model is called, the prescribed privacy level model includes the privacy level of at least two ranks Other Rule of judgment.
Specifically, the privacy class Rule of judgment of two ranks of prescribed privacy level model can judge bar including two Part, three Rule of judgment, four Rule of judgment etc. carry out citing to the possibility framework of prescribed privacy level model below and retouched State, but be not used in the restriction present invention.
Embodiment one:
Prescribed privacy level model includes the first Rule of judgment and the second Rule of judgment.
Specifically, the first Rule of judgment can be:Determine to whether there is face in object;Especially by face recognition technology Determine to whether there is eyes in object, face, nose, or identify in object with the presence or absence of face by facial contour.The Two Rule of judgment can be:Determine to whether there is animal in object.Especially by whether being deposited in image recognition technology identification object In animal.Such as, can be recognized by hair, animal painting contrast etc. technology determine in object whether there is animal.
Those skilled in the art may be referred to face recognition technology of the prior art and determine to whether there is face in object, And determine to whether there is animal in object by image recognition technology of the prior art.
Certainly, in specific implementation process, do not limit the first Rule of judgment and be to determine in object with the presence or absence of face, and Second Rule of judgment, which is to determine in object, whether there is animal.It can also be the Rule of judgment for being set as other forms.
Embodiment two:
On the basis of continuing to use embodiment one, prescribed privacy level model also includes regarding the history use information of object as the Three Rule of judgment.Specifically, the type of the history use information of object includes following at least one:
1st, browse and/or edit session;
2nd, browse and/or edit number of times;
3rd, whether network transmission is carried out, such as, uploads social networks or be sent to other equipment.
Specifically, different according to the type of history use information, the 3rd Rule of judgment specifically at least includes:First son judges Condition, such as the first sub- Rule of judgment is whether to carry out network transmission.
Further, the 3rd Rule of judgment can also include the second sub- Rule of judgment, such as judging the access times of object is It is no to use threshold value more than a setting.In specific implementation process, access times include browsing and/or editing number of times.
Further, the 3rd Rule of judgment can also include the 3rd sub- Rule of judgment, such as judging the use time of object is It is no interior in setting time section.
Certainly, in specific implementation process, the first sub- Rule of judgment of the 3rd Rule of judgment, the second sub- Rule of judgment, the Three sub- Rule of judgment are not limited to the example above.
103rd, the first object is handled based on prescribed privacy level model, determines the corresponding N grades of privacies of first object Rank, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;
Specifically, handling the first object using at least one prescribed privacy level model introduced in 102.For example,
Embodiment one, if prescribed privacy level model in previous embodiment one handles the first object, determines the One object is the first privacy class, either the second privacy class or the 3rd privacy class.The first step, bar is judged according to first Part handles the first object, and result is as follows:
When the 1st, determining that the first object has face, it is determined that the first object is the 3rd privacy class;
When the 2nd, determining in the first object not including face, second step is continued executing with:The is handled according to the second Rule of judgment One object, result is as follows:
If it is determined that there is animal in the first object, it is determined that the first object is the second privacy less than the 3rd privacy class Rank, however, it is determined that go out in the first object to be not present animal (such as only including landscape or still life), it is determined that the first object is low In the first privacy class of the second privacy class.
Embodiment two, if the first the prescribed privacy level model described according to previous embodiment two handles first pair As, it is determined that it may be that the first object is the first privacy class, either the second privacy class or the 3rd privacy class to go out, or The privacy class of person the 4th.
Specifically, according to the first Rule of judgment, (concrete example is:Determine that object whether there is face) first pair of processing As determining to exist in the first object after face, in order to more refine privacy class, embodiment two is different from embodiment one It is to continue with performing the 3rd step:First object is handled according to the first sub- Rule of judgment, determines whether the first object carries out network transmission, If the first object carries out network transmission, it is determined that the first object is the 3rd privacy class higher than the second privacy class;If first Object carries out network transmission, it is determined that the first object is the 4th privacy class higher than the 3rd privacy class.
If embodiment three, second of the prescribed privacy level model described according to previous embodiment two handle first pair As, it is determined that it may be the first privacy class to go out the first object, either the second privacy class or the 3rd privacy class, or 4th privacy class, or the 5th privacy class.
Specifically, the first object is handled according to the first sub- Rule of judgment, determines that the first object does not carry out network transmission Afterwards, in order to further refine privacy class on the basis of embodiment two, embodiment three is different from embodiment two It is to continue executing with the 4th step:First object is handled according to the second sub- Rule of judgment, judges whether the access times of the first object surpass Cross a setting and use threshold value.If judging, the access times of the first object use threshold value more than setting, it is determined that the first object is Higher than the 4th privacy class of the 3rd privacy class;If judging, the access times of the first object are not above setting and use threshold Value, it is determined that the first object is the 5th privacy class higher than the 4th privacy class.
In specific implementation process, setting can be the equal of the access times of all objects in electronic equipment using threshold value Value, or other self-defined numerical value.
Embodiment four, with reference to shown in Fig. 2, if the third prescribed privacy rank mould described according to previous embodiment two Type handles the first object, it is determined that it may be that the first privacy class, either the second privacy class or the 3rd are hidden to go out the first object Private rank, either the 4th privacy class or the 5th privacy class, or the 6th privacy class.
Specifically, the first object is handled according to the second sub- Rule of judgment, determines that the access times of the first object do not surpass A setting is crossed using after threshold value, in order to further refine privacy class, embodiment four on the basis of embodiment three From unlike embodiment three, continuing executing with the 5th step:First object is handled according to the 3rd sub- Rule of judgment, first pair is judged Whether the use time of elephant is in setting time section.If judging the use time of the first object in setting time section, It is the 5th privacy class higher than the 4th privacy class then to determine the first object;Do not have if judging the use time of the first object Within the period of a setting, it is determined that the first object is the 6th privacy class higher than the 5th privacy class.
The prescribed privacy level model of the certain rule of foundation described by above-mentioned embodiment one to embodiment five is true The mode of the privacy class of fixed first object, carries out privacy class evaluation to the object in electronic equipment automatically, thus realize by Object in electronic equipment is divided into some levels according to degree of privacy.
104th, using the privacy value corresponding to the N grades of privacy class as first object private attribute value;Its In, the access right that the private attribute value is used for the user based on the electronic equipment sets visiting for first object State is asked, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher.
Specifically, every grade of privacy class is to correspondence privacy value, such as, including six privacy class, then can be set as The privacy value of first privacy class is " 1 ", and the privacy value of the second privacy class is " 2 ", and the privacy value of the 3rd privacy class is " 3 ", the privacy value of the 4th privacy class is " 4 ", and the privacy value of the 5th privacy class is " 5 ", the privacy value of the 6th privacy class For " 6 ".Certainly, in specific implementation process, or be set as other numerical value, the present invention is without limiting.
In specific implementation process, the user of electronic equipment can be the owner of electronic equipment, or use The other users of the electronic equipment or another connection equipment being connected with the electronic equipment.Specifically, the right to use of user Limit is different according to user's difference.
Therefore, in specific implementation process, with reference to shown in Fig. 3, methods described also includes following flow, current for determining The object that user can access:
201st, the right to use limit value of the currently used person of electronic equipment is obtained.
Specifically, user is corresponding with right to use limit value, user or developer can set user's type with making With the corresponding relation of authority credentials, such as it can be set as, electronic equipment owner correspondence highest right to use limit value, electronic equipment institute The medium right to use limit value of good friend's correspondence for the person of having, the minimum right to use limit value of non-good friend user's correspondence.It can also such as be set as: Electronic equipment owner correspondence highest right to use limit value, household has the second right to use limit value, and friend and colleague have the 3rd to make With authority credentials, other minimum right to use limit values of correspondence.
202nd, private attribute value corresponding with the right to use limit value is determined according to the right to use limit value.
Specifically, obtaining the right to use limit value of currently used person includes numerous embodiments, illustrate below to 201~202 Illustrate.
1st, it is applied to include the electronic equipment of camera or voice collecting unit for the scheme of user for user, leads to Cross camera and catch the facial image of currently used person, and carry out recognition of face to identify currently used person;Or pass through language Sound collecting unit gathers the voice of currently used person, and carries out speech recognition to identify currently used person.So as to according to using Person and the corresponding relation of user's authority credentials, it is determined that right to use limit value corresponding with currently used person.Such as identifying currently makes User is the electronic equipment owner, then currently used person has highest using weights;It is electronics such as to identify currently used person The non-good friend of the equipment owner, then when user has minimum using weights;Such as identify the good friend of currently used person, then when Preceding user has medium using weights.
With reference to Fig. 4 for example, determine whether currently used person is electronic equipment institute by recognition of face or speech recognition The person of having, if the electronic equipment owner, then obtains highest authority credentials:4;No person, it is determined that continuing through recognition of face or voice knowledge Do not determine currently used person whether be the electronic equipment owner good friend, whether be SNS good friends especially by net mate, or QQ good friends etc., if not the good friend of the electronic equipment owner, then obtain least privilege value:“1”;If the electronic equipment owner Good friend, then further determine whether for the electronic equipment owner high frequency good friend (high frequency good friend be and the electronic equipment owner Contact number of times more than one setting numerical value), if the high frequency good friend of the electronic equipment owner, then obtain right to use limit value " 3 ";If It is not the high frequency good friend of the electronic equipment owner, then obtains using weights " 2 ".
2nd, it is applied to for the scheme of connection equipment in the absence of camera for user or the electronics of family networking can not be connected Equipment, such as, the electronic equipment are the situation of the storage devices such as mobile hard disk, then the electronic equipment can be detected whether to current Connect equipment and carry out the setting of right of privacy limit value, if detecting the right of privacy limit value set to current connection devices, basis is set Fixed right of privacy limit value determines corresponding private attribute value, if not detecting the right of privacy limit value of connection equipment setting, the electricity Sub- equipment determines the right of privacy limit value of current connection devices according to the connection history of current connection devices and the electronic equipment, specifically , the electronic equipment judges that current connection devices are connected data with the history of the electronic equipment, is connectionless, low frequency connection (is set Surely connection number of times is less than first threshold), which kind of situation in high frequency connection (setting connection number of times is more than or equal to first threshold) will Current connection devices are determined as one kind in high, medium and low three authority credentials.
In specific implementation process, as electronic equipment can obtain the right to use limit value of user by above two mode, Then preferred first way.
Specifically, setting private attribute value corresponding with using weights, to include six privacies with continued reference to shown in Fig. 2 Illustrated exemplified by rank, when currently used person has highest using weights, it is determined that the right to use limit value pair of currently used person Should all private attribute values " 1 " " 2 " " 3 " " 4 " " 5 " " 6 ";When currently used person has medium using weights, it is determined that currently make The right to use limit value corresponding part private attribute value of user, such as including " 1 " " 2 " " 3 " " 4 " " 5 ", or including " 1 " " 2 " " 3 " " 4 ", etc. situation.Currently used person has minimum right to use limit value, it is determined that the privacy category less than medium right to use limit value Property value, such as including " 1 ", or " 1 " " 2 " etc. combined situation.
203rd, the object of the corresponding private attribute value of the right to use limits value for meeting currently used person is set as may have access to State.
It is accessiable state or inaccessible when can make the first object different users by above-mentioned 201~203 State, so as to realize rational secret protection.
Based on same inventive concept, the embodiments of the invention provide a kind of electronic equipment, with reference to shown in Fig. 5, including:
First obtains unit 401, for obtaining the first object;
Call unit 402, for calling prescribed privacy level model, the prescribed privacy level model includes at least two The Rule of judgment of the privacy class of rank;
First determining unit 403, for based on prescribed privacy level model processing first object, it is determined that described The corresponding N grades of privacy class of first object, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;
Execution unit 404, for regarding the privacy value corresponding to the N grades of privacy class as the hidden of first object Private property value;Wherein, the private attribute value is used for the access right setting described the of the user based on the electronic equipment The accessiable state of one object, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class It is higher.
Further, the electronic equipment also includes:
Second obtaining unit, the right to use limit value of the currently used person for obtaining the electronic equipment,
Second determining unit, for determining private attribute corresponding with the right to use limit value according to the right to use limit value Value;
Setup unit, for the object for meeting the private attribute value to be set as into accessiable state.
Further, in specific implementation process, first determining unit 403, specifically for:
First Rule of judgment is to determine when whether there is face in object, and described the is judged according to first Rule of judgment One object, obtains the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains second and judge As a result, wherein, second Rule of judgment be to determine in object whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, is otherwise determined described First object is the second privacy class higher than first privacy class.
Further, in specific implementation process, first determining unit 403 is additionally operable to:
When first judged result is to be, the privacy of first object is determined whether according to the 3rd Rule of judgment Rank, wherein, the 3rd Rule of judgment is the history use information of object;The history use information of first object is not Together, the privacy class of first object is different.
Further, in specific implementation process, the 3rd Rule of judgment is specifically included:First sub- Rule of judgment is to sentence Whether disconnected object carries out network transmission.
Further, in specific implementation process, first determining unit 403 is additionally operable to:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is higher than the 3rd of second privacy class to determine first object Privacy class.
Further, in specific implementation process, also include in the 3rd Rule of judgment:Second sub- Rule of judgment is to judge When whether the access times of object use threshold value more than a setting;First determining unit 403 is additionally operable to:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, obtained 4th judged result;
When the 4th judged result is to be, it is higher than the 4th of the 3rd privacy class to determine first object Privacy class.
Further, in specific implementation process, the 3rd Rule of judgment also includes:3rd sub- Rule of judgment is judgement pair Whether the use time of elephant is in setting time section;First determining unit 403 is additionally operable to:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, obtained 5th judged result;
When the 5th judged result is to be, it is higher than the 5th of the 4th privacy class to determine first object Privacy class;The 5th judged result for it is no when, it is higher than the of the 5th privacy class to determine first object Six privacy class.
Various change mode and instantiation in information processing method in previous embodiment are equally applicable to this implementation The electronic equipment of example, by the foregoing detailed description to information processing method, those skilled in the art are clear that this The implementation of electronic equipment in embodiment, thus it is succinct for specification, it will not be described in detail herein.
Technical scheme in the embodiment of the present invention has at least the following technical effects or advantages:
As a result of obtaining the first object in the embodiment of the present invention;Call prescribed privacy level model, prescribed privacy level Other model includes the Rule of judgment of the privacy class of at least two ranks;First object is handled based on prescribed privacy level model, The corresponding N grades of privacy class of the first object are determined, wherein, every grade of privacy class correspondence privacy value;By N grades of privacy class institutes Corresponding privacy value as the first object private attribute value;Wherein, private attribute value is used for the user based on electronic equipment Access right set the first object accessiable state, wherein, the user's of the more high corresponding electronic equipment of privacy class The higher technical scheme of access right, it can thus be seen that the hidden of the first object can be determined according to the first object self character Private rank, the privacy class of object is set automatically according to object difference, it is thus eliminated that in the prior art to privacy object Protection scheme complex operation technical problem.
And then, due to private attribute value be used for the user based on electronic equipment access right set the first object can Access state, conducts interviews therefore, it is possible to the access right according to user to the object of different privacy class, eliminates existing The technical problem of Reasonable Protection privacy object is unable in technology, realizes and automatically determines accessible object because user is different Technique effect, therefore with stronger secret protection specific aim.
Specifically, the corresponding computer program instructions of information processing method in the embodiment of the present application can be stored in On CD, hard disk, the storage medium such as USB flash disk, when computer program instructions quilt corresponding with information processing method in storage medium When one electronic equipment reads or is performed, comprise the following steps:
Obtain the first object;
Prescribed privacy level model is called, the prescribed privacy level model includes the privacy class of at least two ranks Rule of judgment;
Based on prescribed privacy level model processing first object, determine that first object is corresponding N grades Privacy class, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;
Using the privacy value corresponding to the N grades of privacy class as first object private attribute value;Wherein, institute Stating private attribute value is used for the addressable shape of access right setting first object of the user based on the electronic equipment State, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher.
It is preferred that, methods described also includes:
Obtain the right to use limit value of the currently used person of the electronic equipment;
Private attribute value corresponding with the right to use limit value is determined according to the right to use limit value;
The object for meeting the private attribute value is set as accessiable state.
It is preferred that, it is described that first object is handled based on the prescribed privacy level model, determine first object Corresponding N grades of privacy class steps include:
First Rule of judgment is to determine when whether there is face in object, and described the is judged according to first Rule of judgment One object, obtains the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains second and judge As a result, wherein, second Rule of judgment be to determine in object whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, is otherwise determined described First object is the second privacy class higher than first privacy class.
It is preferred that, first object judged according to first Rule of judgment described, obtain the first judged result it Afterwards, methods described also includes:
When first judged result is to be, the privacy of first object is determined whether according to the 3rd Rule of judgment Rank, wherein, the 3rd Rule of judgment is the history use information of object;The history use information of first object is not Together, the privacy class of first object is different.
It is preferred that, the 3rd Rule of judgment is specifically included:First sub- Rule of judgment is to judge whether object carries out network Transmission.
It is preferred that, the privacy class that first object is determined whether according to the 3rd Rule of judgment is specially:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is higher than the 3rd of second privacy class to determine first object Privacy class.
It is preferred that, also include in the 3rd Rule of judgment:Second sub- Rule of judgment is that the access times for judging object are It is no more than one setting using threshold value when;In first object according to the described first sub- condition judgment, obtain the 3rd and judge As a result after, methods described also includes:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, obtained 4th judged result;
When the 4th judged result is to be, it is higher than the 4th of the 3rd privacy class to determine first object Privacy class.
It is preferred that, the 3rd Rule of judgment also includes:3rd sub- Rule of judgment be judge object use time whether In setting time section;First object judged according to the described second sub- Rule of judgment described, the 4th is obtained and judges knot After fruit, methods described also includes:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, obtained 5th judged result;
When the 5th judged result is to be, it is higher than the 5th of the 4th privacy class to determine first object Privacy class;The 5th judged result for it is no when, it is higher than the of the 5th privacy class to determine first object Six privacy class.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been described Property concept, then can make other change and modification to these embodiments.So, appended claims are intended to be construed to include excellent Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (14)

1. a kind of information processing method, methods described is applied in electronic equipment, methods described includes:
Obtain the first object;File of first object including picture file, video file, the PDF format for being pasted with picture Or it is pasted with the file of the WORD forms of picture;
Prescribed privacy level model is called, the prescribed privacy level model includes the judgement of the privacy class of at least two ranks Condition;
Based on prescribed privacy level model processing first object, the corresponding N grades of privacies of first object are determined Rank, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;
Using the privacy value corresponding to the N grades of privacy class as first object private attribute value;Wherein, it is described hidden Private property value is used for the accessiable state of access right setting first object of the user based on the electronic equipment, its In, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher;
It is described that first object is handled based on the prescribed privacy level model, determine that first object is corresponding N grades The step of privacy class, includes:
When first Rule of judgment is to determine in object with the presence or absence of face, described first pair is judged according to first Rule of judgment As obtaining the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains the second judged result, Wherein, second Rule of judgment, which is to determine in object, whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, otherwise determines described first Object is the second privacy class higher than first privacy class.
2. the method as described in claim 1, it is characterised in that methods described also includes:
Obtain the right to use limit value of the currently used person of the electronic equipment;
Private attribute value corresponding with the right to use limit value is determined according to the right to use limit value;
The object for meeting the private attribute value is set as accessiable state.
3. the method as described in claim 1, it is characterised in that according to first Rule of judgment judge described first described Object, is obtained after the first judged result, methods described also includes:
When first judged result is to be, the privacy level of first object is determined whether according to the 3rd Rule of judgment Not, wherein, the 3rd Rule of judgment be object history use information;The history use information of first object is different, The privacy class of first object is different.
4. method as claimed in claim 3, it is characterised in that the 3rd Rule of judgment, is specifically included:First son judges bar Part is to judge whether object carries out network transmission.
5. method as claimed in claim 4, it is characterised in that described to determine whether described first according to the 3rd Rule of judgment The privacy class of object, be specially:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is the 3rd privacy higher than second privacy class to determine first object Rank.
6. method as claimed in claim 5, it is characterised in that also include in the 3rd Rule of judgment:Second son judges bar Part be judge object access times whether more than one setting using threshold value when;Described according to the described first sub- condition judgment institute The first object is stated, is obtained after the 3rd judged result, methods described also includes:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, the 4th is obtained Judged result;
When the 4th judged result is to be, it is the 4th privacy higher than the 3rd privacy class to determine first object Rank.
7. method as claimed in claim 6, it is characterised in that the 3rd Rule of judgment also includes:3rd sub- Rule of judgment It is to judge whether the use time of object is interior in setting time section;Described according to judging the described second sub- Rule of judgment First object, is obtained after the 4th judged result, methods described also includes:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, the 5th is obtained Judged result;
When the 5th judged result is to be, it is the 5th privacy higher than the 4th privacy class to determine first object Rank;When the 5th judged result is no, determine that first object is hidden for the 6th higher than the 5th privacy class Private rank.
8. a kind of electronic equipment, including:
First obtains unit, for obtaining the first object;First object includes picture file, video file, is pasted with figure The file of the PDF format of piece or be pasted with picture WORD forms file;
Call unit, for calling prescribed privacy level model, the prescribed privacy level model includes at least two ranks The Rule of judgment of privacy class;
First determining unit, for based on prescribed privacy level model processing first object, determining described first pair As corresponding N grades of privacy class, N is more than or equal to 1 positive integer, wherein, every grade of privacy class correspondence privacy value;
Execution unit, for using the privacy value corresponding to the N grades of privacy class as first object private attribute Value;Wherein, the private attribute value is used for access right setting first object of the user based on the electronic equipment Accessiable state, wherein, the access right of the user of the more high corresponding electronic equipment of the privacy class is higher;
First determining unit, specifically for:
When first Rule of judgment is to determine in object with the presence or absence of face, described first pair is judged according to first Rule of judgment As obtaining the first judged result;
It is no in first judged result, first object is judged according to the second Rule of judgment, obtains the second judged result, Wherein, second Rule of judgment, which is to determine in object, whether there is animal;
When second judged result is no, it is the first privacy class to determine first object, otherwise determines described first Object is the second privacy class higher than first privacy class.
9. electronic equipment as claimed in claim 8, it is characterised in that the electronic equipment also includes:
Second obtaining unit, the right to use limit value of the currently used person for obtaining the electronic equipment,
Second determining unit, for determining private attribute value corresponding with the right to use limit value according to the right to use limit value;
Setup unit, for the object for meeting the private attribute value to be set as into accessiable state.
10. electronic equipment as claimed in claim 8, it is characterised in that first determining unit is additionally operable to:
When first judged result is to be, the privacy level of first object is determined whether according to the 3rd Rule of judgment Not, wherein, the 3rd Rule of judgment be object history use information;The history use information of first object is different, The privacy class of first object is different.
11. electronic equipment as claimed in claim 10, it is characterised in that the 3rd Rule of judgment, is specifically included:First son Rule of judgment is to judge whether object carries out network transmission.
12. electronic equipment as claimed in claim 11, it is characterised in that first determining unit is additionally operable to:
The first object according to the described first sub- condition judgment, obtains the 3rd judged result;
When the 3rd judged result is to be, it is the 3rd privacy higher than second privacy class to determine first object Rank.
13. electronic equipment as claimed in claim 12, it is characterised in that also include in the 3rd Rule of judgment:Second son Rule of judgment be judge object access times whether more than one setting using threshold value when;First determining unit is additionally operable to:
When the 3rd judged result is no, first object is judged according to the described second sub- Rule of judgment, the 4th is obtained Judged result;
When the 4th judged result is to be, it is the 4th privacy higher than the 3rd privacy class to determine first object Rank.
14. electronic equipment as claimed in claim 13, it is characterised in that the 3rd Rule of judgment also includes:3rd son is sentenced Whether broken strip part is the use time for judging object in setting time section;First determining unit is additionally operable to:
When the 4th judged result is no, first object is judged according to the 3rd sub- Rule of judgment, the 5th is obtained Judged result;
When the 5th judged result is to be, it is the 5th privacy higher than the 4th privacy class to determine first object Rank;When the 5th judged result is no, determine that first object is hidden for the 6th higher than the 5th privacy class Private rank.
CN201410347616.6A 2014-07-21 2014-07-21 A kind of information processing method and electronic equipment Active CN104123509B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410347616.6A CN104123509B (en) 2014-07-21 2014-07-21 A kind of information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410347616.6A CN104123509B (en) 2014-07-21 2014-07-21 A kind of information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN104123509A CN104123509A (en) 2014-10-29
CN104123509B true CN104123509B (en) 2017-07-21

Family

ID=51768917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410347616.6A Active CN104123509B (en) 2014-07-21 2014-07-21 A kind of information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN104123509B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537289A (en) * 2014-12-18 2015-04-22 乐视致新电子科技(天津)有限公司 Method and device for protecting intended target in terminal device
CN106921791B (en) * 2017-01-25 2020-06-09 北京安云世纪科技有限公司 Multimedia file storage and viewing method and device and mobile terminal
CN107465810B (en) * 2017-07-11 2020-07-21 Oppo广东移动通信有限公司 Data control method and related product
CN108763893A (en) * 2018-04-26 2018-11-06 上海闻泰电子科技有限公司 Read-write equipment, method based on recognition of face and electronic equipment
CN109241775B (en) * 2018-11-09 2021-01-08 维沃移动通信有限公司 Privacy protection method and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917513A (en) * 2010-08-02 2010-12-15 中兴通讯股份有限公司 Method and device for implementing graded display of privacy information
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
CN103714280A (en) * 2013-12-02 2014-04-09 联想(北京)有限公司 Permission control method and electronic equipment
CN103794015A (en) * 2013-12-16 2014-05-14 柳州博泽科技有限公司 Smart anti-theft system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917513A (en) * 2010-08-02 2010-12-15 中兴通讯股份有限公司 Method and device for implementing graded display of privacy information
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
CN103714280A (en) * 2013-12-02 2014-04-09 联想(北京)有限公司 Permission control method and electronic equipment
CN103794015A (en) * 2013-12-16 2014-05-14 柳州博泽科技有限公司 Smart anti-theft system

Also Published As

Publication number Publication date
CN104123509A (en) 2014-10-29

Similar Documents

Publication Publication Date Title
CN104123509B (en) A kind of information processing method and electronic equipment
CN104660549B (en) Auth method and device
CN104184705B (en) Verification method, device, server, subscriber data center and system
CN106302534B (en) A kind of method and system of detection and processing illegal user
CN104361076B (en) The abnormality eliminating method and device of browser
CN105095726B (en) Generate the method and device of identifying code
JP6611199B2 (en) System and method for restricting user access to suspicious objects in social networks
CN105991593B (en) A kind of method and device identifying consumer's risk
CN107968730A (en) The method and system that monitoring Internet of Things network interface card is stolen
CN103854031B (en) For the method and apparatus identifying picture material
CN104144240B (en) A kind of contact management method and device, terminal device
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN106789543A (en) The method and apparatus that facial expression image sends are realized in session
CN106797561A (en) A kind of identity identifying method and wearable device
CN103152324B (en) The user authen method of Behavior-based control feature
CN103324697A (en) Method for removing copycatting applications in android application search and based on icon contrast
CN104778031A (en) Method and device for closing processes
CN106951796A (en) A kind of desensitization method and its device of data-privacy protection
CN105760778A (en) Method and device for improving security of private picture and electronic equipment
CN110866236A (en) Private picture display method, device, terminal and storage medium
CN107437012A (en) The guard method of data and device
CN110297942B (en) Video exploration method, device, equipment and storage medium
CN103997573B (en) Mobile terminal and virtual incoming call implementation method thereof
US20120121140A1 (en) Leveraging Real-Time Biometric Recognition Software in Software Systems Management
CN103685349A (en) Method for information processing and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant