CN106874718A - privacy processing method, device and terminal - Google Patents

privacy processing method, device and terminal Download PDF

Info

Publication number
CN106874718A
CN106874718A CN201610602621.6A CN201610602621A CN106874718A CN 106874718 A CN106874718 A CN 106874718A CN 201610602621 A CN201610602621 A CN 201610602621A CN 106874718 A CN106874718 A CN 106874718A
Authority
CN
China
Prior art keywords
privacy
configuration
node
password
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610602621.6A
Other languages
Chinese (zh)
Other versions
CN106874718B (en
Inventor
周登朋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN202110158244.2A priority Critical patent/CN112800401B/en
Priority to CN201610602621.6A priority patent/CN106874718B/en
Publication of CN106874718A publication Critical patent/CN106874718A/en
Application granted granted Critical
Publication of CN106874718B publication Critical patent/CN106874718B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

This application discloses a kind of privacy processing method, device and terminal, methods described includes:When the event for triggering privacy profile occurs, user input configuration password is pointed out;After receiving correct configuration password, the configuration interface containing privacy object is exported, the configuration operation whether privacy information shows is carried out so that user is based on the configuration interface.Implement the application; being easy to user to be based on the configuration interface carries out the configuration operation whether privacy information shows; if privacy information is prohibited display; while can't see privacy information; the other users for being configured without password do not know that configuration interface whether there is yet; and then cannot know whether and conceal privacy information, thus privacy of user can more effectively be protected, improve secret protection availability.

Description

Privacy processing method, device and terminal
Technical field
The application is related to field of computer technology, more particularly to privacy processing method, device and terminal.
Background technology
With mobile terminal and the development of application APP (Application), the application APP in mobile terminal is more and more, The privacy of user being related to using APP is more and more, user to the attention degree of privacy content protection in application APP also increasingly It is high.
In order to protect using the privacy content in APP, existing method for secret protection is to set up to need to visit in application APP The private file folder of password is asked, by the privacy information of user, such as contact person, short message, picture, video is stored in the private file In folder, could be opened after user input correctly accesses password and checked.
Private file folder can to a certain extent protect the privacy information of user, cannot without the other users for accessing password The specific privacy information of private file folder storage is checked, but still knows that the private file underedge is stored with privacy information, its His user can attempt input and access password or require user input access password, and then check the privacy information of user, so Resulting in privacy of user cannot be effectively protected, and reduce the validity of secret protection.
The content of the invention
The application provides privacy processing method, device and terminal, and privacy of user is protected with solving existing method for secret protection Shield availability not enough, reduces the problem of the validity of secret protection.
According to the first aspect of the embodiment of the present application, there is provided a kind of privacy processing method, comprise the following steps:
When the event for triggering privacy profile occurs, user input configuration password is pointed out;
After receiving correct configuration password, the configuration interface containing privacy object is exported, so that user is based on described matching somebody with somebody Putting interface carries out the configuration operation whether privacy information shows.
In one embodiment, the configuration interface includes:
Privacy object tree, wherein, the root node of the privacy object tree is application program node, and leaf node includes application Privacy content node in program, remaining node includes the privacy function node in the application program.
In one embodiment, when the privacy content node is configured as not showing, the privacy content node institute The privacy content of association is all not displayed on any display interface of the application program;When the privacy function node is matched somebody with somebody Be set to when not showing, the function associated by the privacy function node on any display interface of the application program not by Display.
In one embodiment, before the prompting user input configuration password, methods described also includes:
Trigger action of the detection for the privacy information configuration in menu;
If detecting the trigger action, it is determined that the event of triggering privacy profile occurs;
The prompting user input configuration password, including:
Ejection prompting user input configures the interface of password.
In one embodiment, after the prompting user input configuration password, methods described also includes:
If receiving the configuration password of mistake or configuration password not being received in preset period of time, privacy of user is pointed out Processing function not enabled.
According to the second aspect of the embodiment of the present application, there is provided a kind of privacy processing unit, including:
Configuration password prompt module, during for occurring in the event for triggering privacy profile, points out user input configuration password;
Configuration interface output module, for after correct configuration password is received, exporting the configuration containing privacy object Interface, the configuration operation whether privacy information shows is carried out so that user is based on the configuration interface.
In one embodiment, the configuration interface includes:
Privacy object tree, wherein, the root node of the privacy object tree is application program node, and leaf node includes application Privacy content node in program, remaining node includes the privacy function node in the application program.
In one embodiment, when the privacy content node is configured as not showing, the privacy content node institute The privacy content of association is all not displayed on any display interface of the application program;When the privacy function node is matched somebody with somebody Be set to when not showing, the function associated by the privacy function node on any display interface of the application program not by Display.
In one embodiment, described device also includes:
Trigger action detection module, for detecting the trigger action for the privacy information configuration in menu;
Trigger event determining module, for when the trigger action is detected, it is determined that the event hair of triggering privacy profile It is raw;
The configuration password prompt module also includes:
Configuration password prompt submodule, the interface of password is configured for ejecting prompting user input.
In one embodiment, described device also includes:
Function prompt module, for receiving the configuration password of mistake or not receive in preset period of time configuration close During code, privacy of user processing function not enabled is pointed out.
According to the third aspect of the embodiment of the present application, there is provided a kind of terminal, including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
When the event for triggering privacy profile occurs, user input configuration password is pointed out;
After receiving correct configuration password, the configuration interface containing privacy object is exported, so that user is based on described matching somebody with somebody Putting interface carries out the configuration operation whether privacy information shows.
Using the embodiment of the present application, when the event for triggering privacy profile occurs, user input configuration password is pointed out;Receive To after correct configuration password, export the configuration interface containing privacy object, so as to user carried out based on the configuration interface it is hidden The whether configuration of private presentation of information is operated, if privacy information is prohibited display, while can't see privacy information, is configured without close The other users of code do not know that configuration interface whether there is yet, and then cannot know whether and conceal privacy information, thus may be used More effectively protected with to privacy of user, improved secret protection availability.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The application can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the application Example, and it is used to explain the principle of the application together with specification.
Fig. 1 is one embodiment flow chart of the application privacy processing method;
Fig. 2 a are another embodiment flow charts of the application privacy processing method;
Fig. 2 b are the privacy profile interface schematic diagrams of privacy processing method in the embodiment of the present application;
Fig. 3 is a kind of hardware structure diagram of terminal where the application privacy processing unit;
Fig. 4 is one embodiment block diagram of the application privacy processing unit.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in implementation method do not represent all implementation methods consistent with the application.Conversely, they be only with it is such as appended The example of the consistent apparatus and method of some aspects described in detail in claims, the application.
It is the purpose only merely for description specific embodiment in term used in this application, and is not intended to be limiting the application. " one kind ", " described " and " being somebody's turn to do " of singulative used in the application and appended claims is also intended to include majority Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wraps May be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used for being distinguished from each other open same type of information.For example, not departing from In the case of the application scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining ".
Referring to Fig. 1, Fig. 1 is one embodiment flow chart of the application privacy processing method, and the embodiment can be used for end In end, 101-102 is comprised the following steps:
Step 101:When the event for triggering privacy profile occurs, user input configuration password is pointed out.
The terminal being related in the embodiment of the present application, can be the terminal for being only capable of exporting self-contained or collection information, example Such as, recorder, audio player, camera, video player, handheld reader, private tutor's machine etc.;Can also be provided with it is various Using the intelligent terminal of APP, for example, smart mobile phone, panel computer, PDA (Personal Digital Assistant, individual Digital assistants), desktop computer etc..Terminal user has found to need to hide in the data message of arrangement or browsing terminal equipment Privacy when, privacy treatment can be carried out by triggering privacy profile.
In some examples, button can be configured by triggering default privacy information so that the thing of triggering privacy profile Part occurs, and then causes terminal notifying user input configuration password.Can be with self-defined other modes so that triggering privacy profile Event occur, this embodiment of the present application is not limited.
In order to determine whether the event for triggering privacy profile occurs, can be determined by following optional implementation:Detection For the trigger action of the privacy information configuration in menu;If detecting the trigger action, it is determined that triggering privacy profile Event occurs.It is determined that after occurring, the interface prompt user input that password can be configured by ejecting prompting user input configures close Code.
In other examples, user input configuration password is pointed out, Password Input can be shown in the display screen of terminal device Frame, or Password Input voice etc. can be played by the voice system of terminal, user can be defeated by the character of terminal device Enter system or voice entry system input function setting up password.
In some scenes so that triggering privacy profile event occur user, may not usual using terminal set Standby user, but the other users of other interim using terminal equipment, other users are not aware that configuration password, are set in terminal After standby prompting user input configuration password, other users may not input configuration password, or can input error configuration it is close Code, in order to allow other users to further determine that, terminal user does not hide privacy, so that privacy of user is more thoroughly protected, this Shen Please embodiment privacy processing method, prompting user input configuration password after, may also include following operation:If receiving mistake Configuration password or configuration password is not received in preset period of time, then point out privacy of user processing function not enabled.
For the preset period of time, can according to the actual requirements, the preset period of time is carried out in advance it is self-defined, for example, The preset period of time is defined for 5 seconds.
Step 102:After receiving correct configuration password, the configuration interface containing privacy object is exported, so as to user's base The configuration operation whether privacy information shows is carried out in the configuration interface.
In the embodiment of the present application, the privacy object is used to associate the privacy information that can be hidden, and can be privacy information Title, numbering, button, menu etc.;And privacy information can be only capable of that output is self-contained or the terminal of information of collection is deposited The data messages such as word, picture, video, the audio of storage, can also be and be provided with the intelligent terminal of various application APP Privacy application APP, the privacy function using APP, the privacy content in function, wherein, privacy application APP as social class application, Mail applications etc., using the blacklist function of the privacy function such as short message application of APP, the city credit report of sesame credit application Function etc., the special contact person in privacy content such as address list in function, the secret short message in short message inbox, in picture library Secret photo, private video in video library etc..
During practical application, after receiving password, the password of reception is compared with the configuration password for prestoring, if unanimously, Can determine to have received correct configuration password, then export configuration interface.Privacy object in configuration interface is believed with privacy Breath association, can distribute unique identity information ID for privacy object, set up an incidence relation table, incidence relation table correspondence Storage privacy object, ID and privacy information, after privacy object is triggered, are easy to search the privacy object according to its ID The privacy information of association, the privacy information that will be found is set to the object that need to be hidden.Triggering privacy object, can be by user's striking The residing interface zone in configuration interface of privacy object is realized, by way of example, the interface zone residing for privacy object, Ke Yishi With the privacy object in region residing for form, or privacy object tree containing privacy object in privacy list object Region residing for corresponding tree node.
User can be associated by the interface zone residing for the privacy object in striking configuration interface to the privacy object The configuration operation that whether is shown of privacy information, the interface zone residing for the privacy object in striking configuration interface first, The privacy information that can determine that privacy object association is to need hiding information, to prevent beyond user other people know institute The privacy information of association, and then the effective protection to associated privacy information is realized, associated privacy information is configured to Do not it has been shown that, associated privacy information can be forbidden to be shown on any display interface.In order to further more effectively protection is closed The privacy information of connection, it is also possible to forbid the privacy information associated by playing, or the privacy that no thoroughfare associated by network transmission Information etc., is not limited to this embodiment of the present application.
In some examples, associated privacy information can be forbidden in any display interface by following optional implementation Upper display:
When default presentation of information condition is met, judge whether include the privacy object in data message to be shown The privacy information of association.
If not including, display carries the first display object of the data message to be shown.
If including, corresponding display processing is carried out to other data messages in addition to associated privacy information, generate Second display object.
Show the second display object.
The embodiment of the present application, when data message to be shown includes the privacy information of the privacy object association, weight New that other data messages in addition to associated privacy information are carried out with corresponding display processing, generation second shows object, so After show the second display object, when associated privacy information can be avoided to be arranged to not show, cause display interface The typesetting exception of displayed content, enters without influence information display effect.
Wherein, receive information display instruction or reach presentation of information time etc., you can to judge to meet default letter Breath display condition.After meeting default presentation of information condition, can be from application server request the first display object, it is also possible to The first display object is transferred from the storage region of the terminal device for installing application, after obtaining the first display object, Ke Yicha Look for the presence or absence of hiding information is needed in the data message of its carrying, if finding, it is possible to determine that data message to be shown Include the privacy information of the privacy object association, if not finding, it is possible to determine that do not include in data message to be shown The privacy information of the privacy object association.
In the other embodiment of the application, determine that corresponding privacy object is the information that need to be hidden, forbid associated After privacy information shows on any display interface, if the privacy information that user wants associated by recovery is the letter that need not be hidden Breath, interface zone that can be residing for privacy object again in striking configuration interface so that the privacy information of privacy object association The information that need not be hidden is converted to, permits the privacy information associated by display.
Whether the privacy information for distinguishing the association of privacy object for the ease of user has been prohibited display, can be in any privacy pair As the privacy information for associating is inhibited in after any display interface show, correspondence any privacy object adds hidden identification and arrives Configuration interface, hidden identification can be default color, icon etc..
, it is necessary to carry out secret protection using APP in terminal device in some scenes, and this applies APP's Function is more, and the data message content of application content is larger, it is corresponding the need for the privacy function hidden and privacy content compared with It is many, if completing all privacy functions and the equal privacy treatment of privacy content, it is necessary to search each privacy work(one by one from configuration interface Energy privacy object corresponding with privacy content, the time spent by search procedure is more, can reduce privacy treatment effeciency.In order to contract Short privacy object searches the time and improves privacy treatment effeciency, can represent that this applies APP, the privacy content in it with tree construction And privacy function, Fig. 2 a are for details, reference can be made to, Fig. 2 a are another embodiment flow chart of the application privacy processing method, the implementation Example may comprise steps of 201-202:
Step 201:When the event for triggering privacy profile occurs, user input configuration password is pointed out.
Step 202:After receiving correct configuration password, the configuration interface containing privacy object tree is exported, so as to user The configuration operation whether privacy information shows is carried out based on the configuration interface, wherein, the root node of the privacy object tree is Application program node, leaf node includes the privacy content node in application program, and remaining node is included in the application program Privacy function node.
In the embodiment of the present application, privacy object refers to the privacy function node and privacy content node contained by privacy object tree. Privacy information can include some privacy functions of the privacy content and the application program under some functions of application program, institute Stating privacy object tree can include application program node, the privacy content node in application program, the privacy content node Privacy function node in upper-layer functionality node and the application program, wherein, root node is application program node, leaf Node is privacy content node, and remaining node is the upper-layer functionality node or the application program of the privacy content node Interior privacy function node.Privacy object and non-privacy object are distinguished for the ease of user, privacy object addition face can be corresponded to The information such as color, icon are distinguishing privacy object and non-privacy object.
In order to build the privacy object tree, can first by application APP institute it is functional and it is functional under it is all answer A utility tree is modeled as with content, privacy object is represented with the node of pre-set color in the utility tree, with privacy information (privacy function or privacy content) is associated, and such node can be the application content under leaf node, corresponding function, such node Can also be non-leaf nodes, the function of correspondence application program.
Then the upper strata section of the node of root node, the node of pre-set color and pre-set color is retained in the utility tree Point, such utility tree is converted to privacy object tree.For each node in privacy object tree, the unique identity letter of generation one Breath ID is indicated, and the ID can be title, identity number, account, unique encodings, exclusive number of privacy object etc..
For each node of privacy object tree, a node mapping table can be set up, the node mapping table The privacy information of each node of correspondence storage, the ID of each node and the association of each node, after each node is triggered, is easy to basis Corresponding ID searches associated privacy information, and the privacy information that will be found is set to the information that need to be hidden.
Refer to Fig. 2 b, Fig. 2 b by taking credit evaluation class APP as an example, the function that will can be hidden in credit evaluation class APP and Application content, has been built into the privacy object tree shown in the configuration interface in Fig. 2 b, the identity of each node in privacy object tree Information is the title of function or the title of application content, urban applications function of reporting, negative records with number designation 1,2,3 1st, negative records 2 are privacy object.Credit evaluation class APP such as sesame credit APP, integrated treatment to magnanimity information data and comment Estimate, personal credit standing be presented, can credit card, the consumer finance, financing lease, hotel, rent a house, go on a journey, classification information, Multiple scenes such as student's service, government utility service provide the user credit services.
During practical application, user is by the privacy content node (section of label 2 or 3 in configuration interface shown in striking Fig. 2 b Point) or privacy function node (node of label 1) residing for interface zone, can be to the privacy content node or described hidden The configuration whether privacy information of private functional node association is shown is operated, first the privacy content section in striking configuration interface Interface zone residing for point or privacy function node, it may be determined that what the privacy content node or the privacy function node were associated Privacy information is to need hiding information, and associated privacy information is configured as not show.Wherein, when the privacy content When node is configured as not showing, any display of privacy content associated by the privacy content node in the application program All it is not displayed on interface;When the privacy function node is configured as not showing, associated by the privacy function node Function is all not displayed on any display interface of the application program.
In other examples, when privacy object refers to the privacy function node and privacy content node contained by privacy object tree, The privacy object tree can also simultaneously include that all functional nodes in application program node, application program and institute are active Content node under energy node, wherein, root node is application program node, and leaf node is the content node of application program, is remained Remaining node is the functional node of the application program, and content node includes privacy content node and non-privacy content node, function Node includes privacy function node and non-privacy function node.Privacy object and non-privacy object are distinguished for the ease of user, can The information such as color, icon are added to distinguish privacy object and non-privacy object with correspondence privacy object.
In other embodiments, privacy object can singly refer to the privacy function node or privacy content section contained by privacy object tree Point, now, the privacy object tree can also only include the privacy function node in application program node and application program, or Only include the upper-layer functionality node of the privacy content node and the privacy content node in application program node, application program.
From above-described embodiment, the application points out user input configuration close when the event for triggering privacy profile occurs Code;After receiving correct configuration password, the configuration interface containing privacy object is exported, so that user is based on the configuration interface Carry out configuration operation that whether privacy information show, it is necessary to whether privacy information is shown configuration when, only by striking Privacy object in configuration interface can complete configuration, without setting up private file folder.If privacy information is configured as forbidding showing Show, while can't see privacy information, the other users for being configured without password do not know that configuration interface whether there is yet, Jin Erwu Method knows whether and conceals privacy information, thus privacy of user more effectively can be protected that improving secret protection has Validity.
Additionally, the privacy processing method for passing through the embodiment of the present application, to needing hiding function and application content more Application APP, when carrying out privacy and processing, the privacy object using APP and Qi Nei is represented with tree construction, boundary is configured by striking Privacy object in face can quickly realize the configuration of the privacy information of association, without searching privacy information one by one, to finding Privacy information carry out privacy settings one by one, more without by the privacy information after privacy settings store one by one private file folder, Therefore the convenience and availability of privacy treatment can further be improved.
Embodiment with foregoing privacy processing method is corresponding, present invention also provides the embodiment of privacy processing unit.
The embodiment of the application privacy processing unit can be applied in terminal.Device embodiment can be by software reality It is existing, it is also possible to be realized by way of hardware or software and hardware combining.As a example by implemented in software, as on a logical meaning Device, is that corresponding computer program instructions in nonvolatile memory are read into internal memory by the processor of terminal where it What middle operation was formed.From for hardware view, as shown in figure 3, being a kind of hardware of the application privacy processing unit place terminal Structure chart, in addition to the processor 310 shown in Fig. 3, network interface 320, internal memory 330 and nonvolatile memory 340, Terminal in embodiment where device can also include other hardware generally according to the actual functional capability of the terminal, and this is no longer gone to live in the household of one's in-laws on getting married State.
Above-mentioned processor 310 is configured as:When the event for triggering privacy profile occurs, point out user input configuration close Code;After receiving correct configuration password, the configuration interface containing privacy object is exported, so that user is based on the configuration interface Carry out the configuration operation whether privacy information shows.
Referring to Fig. 4, Fig. 4 is one embodiment block diagram of the application privacy processing unit, and the device may include:Configuration password Reminding module 410 and configuration interface output module 420.
Wherein, configuration password prompt module 410, during for occurring in the event for triggering privacy profile, points out user input Configuration password.
Configuration interface output module 410, for after correct configuration password is received, exporting matching somebody with somebody containing privacy object Interface is put, the configuration operation whether privacy information shows is carried out so that user is based on the configuration interface.
In an optional implementation, the configuration interface includes:
Privacy object tree, wherein, the root node of the privacy object tree is application program node, and leaf node includes application Privacy content node in program, remaining node includes the privacy function node in the application program.
In another optional implementation, when the privacy content node is configured as not showing, in the privacy Hold the privacy content associated by node to be all not displayed on any display interface of the application program;When the privacy function When node is configured as not showing, any display interface of function associated by the privacy function node in the application program On be all not displayed.
In another optional implementation, the privacy processing unit is also included (not shown in Fig. 4):
Trigger action detection module, for detecting the trigger action for the privacy information configuration in menu.
Trigger event determining module, for when the trigger action is detected, it is determined that the event hair of triggering privacy profile It is raw.
Configuration password prompt module 410 is also included (not shown in Fig. 4):
Configuration password prompt submodule, the interface of password is configured for ejecting prompting user input.
In another optional implementation, the privacy processing unit is also included (not shown in Fig. 4):
Function prompt module, for receiving the configuration password of mistake or not receive in preset period of time configuration close During code, privacy of user processing function not enabled is pointed out.
The function of modules and the implementation process of effect correspond to step in specifically referring to the above method in said apparatus Implementation process, will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is referring to method reality Apply the part explanation of example.Device embodiment described above is only schematical, wherein described as separating component The module of explanation can be or may not be physically separate, and the part shown as module can be or can also It is not physical module, you can with positioned at a place, or can also be distributed on multiple mixed-media network modules mixed-medias.Can be according to reality Selection some or all of module therein is needed to realize the purpose of application scheme.
Those of ordinary skill in the art are without creative efforts, you can to understand and implement.This area Technical staff will readily occur to other embodiments of the application after considering specification and putting into practice invention disclosed herein.This Application is intended to any modification, purposes or the adaptations of the application, and these modifications, purposes or adaptations are abided by Follow the general principle of the application and including the undocumented common knowledge or conventional techniques in the art of the application. Description and embodiments are considered only as exemplary, and the true scope of the application and spirit are pointed out by following claim.
It should be appreciated that the application is not limited to the precision architecture for being described above and being shown in the drawings, and And can without departing from the scope carry out various modifications and changes.Scope of the present application is only limited by appended claim.

Claims (11)

1. a kind of privacy processing method, it is characterised in that comprise the following steps:
When the event for triggering privacy profile occurs, user input configuration password is pointed out;
After receiving correct configuration password, the configuration interface containing privacy object is exported, so that user is based on configuration circle Face carries out the configuration operation whether privacy information shows.
2. method according to claim 1, it is characterised in that the configuration interface includes:
Privacy object tree, wherein, the root node of the privacy object tree is application program node, and leaf node includes application program Interior privacy content node, remaining node includes the privacy function node in the application program.
3. method according to claim 2, it is characterised in that:
When the privacy content node is configured as not showing, the privacy content associated by the privacy content node is described All it is not displayed on any display interface of application program;It is described hidden when the privacy function node is configured as not showing Function associated by private functional node is all not displayed on any display interface of the application program.
4. method according to claim 1, it is characterised in that before the prompting user input configuration password, methods described Also include:
Trigger action of the detection for the privacy information configuration in menu;
If detecting the trigger action, it is determined that the event of triggering privacy profile occurs;
The prompting user input configuration password, including:
Ejection prompting user input configures the interface of password.
5. method according to claim 1, it is characterised in that after the prompting user input configuration password, methods described Also include:
If receiving the configuration password of mistake or configuration password not being received in preset period of time, privacy of user treatment is pointed out Function not enabled.
6. a kind of privacy processing unit, it is characterised in that including:
Configuration password prompt module, during for occurring in the event for triggering privacy profile, points out user input configuration password;
Configuration interface output module, for after correct configuration password is received, exporting the configuration interface containing privacy object, The configuration operation whether privacy information shows is carried out so that user is based on the configuration interface.
7. device according to claim 6, it is characterised in that the configuration interface includes:
Privacy object tree, wherein, the root node of the privacy object tree is application program node, and leaf node includes application program Interior privacy content node, remaining node includes the privacy function node in the application program.
8. device according to claim 7, it is characterised in that:
When the privacy content node is configured as not showing, the privacy content associated by the privacy content node is described All it is not displayed on any display interface of application program;It is described hidden when the privacy function node is configured as not showing Function associated by private functional node is all not displayed on any display interface of the application program.
9. device according to claim 6, it is characterised in that described device also includes:
Trigger action detection module, for detecting the trigger action for the privacy information configuration in menu;
Trigger event determining module, for when the trigger action is detected, it is determined that the event of triggering privacy profile occurs;
The configuration password prompt module also includes:
Configuration password prompt submodule, the interface of password is configured for ejecting prompting user input.
10. device according to claim 6, it is characterised in that described device also includes:
Function prompt module, for when receiving the configuration password of mistake or not receiving in preset period of time configuration password, Prompting privacy of user processing function not enabled.
A kind of 11. terminals, it is characterised in that including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
When the event for triggering privacy profile occurs, user input configuration password is pointed out;
After receiving correct configuration password, the configuration interface containing privacy object is exported, so that user is based on configuration circle Face carries out the configuration operation whether privacy information shows.
CN201610602621.6A 2016-07-27 2016-07-27 Privacy processing method and device and terminal Active CN106874718B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110158244.2A CN112800401B (en) 2016-07-27 2016-07-27 Privacy processing method, privacy processing device and terminal
CN201610602621.6A CN106874718B (en) 2016-07-27 2016-07-27 Privacy processing method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610602621.6A CN106874718B (en) 2016-07-27 2016-07-27 Privacy processing method and device and terminal

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202110158244.2A Division CN112800401B (en) 2016-07-27 2016-07-27 Privacy processing method, privacy processing device and terminal

Publications (2)

Publication Number Publication Date
CN106874718A true CN106874718A (en) 2017-06-20
CN106874718B CN106874718B (en) 2020-12-15

Family

ID=59239390

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610602621.6A Active CN106874718B (en) 2016-07-27 2016-07-27 Privacy processing method and device and terminal
CN202110158244.2A Active CN112800401B (en) 2016-07-27 2016-07-27 Privacy processing method, privacy processing device and terminal

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202110158244.2A Active CN112800401B (en) 2016-07-27 2016-07-27 Privacy processing method, privacy processing device and terminal

Country Status (1)

Country Link
CN (2) CN106874718B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109803343A (en) * 2019-01-04 2019-05-24 全球能源互联网研究院有限公司 Mobile application Node Credit evaluation method, device and readable storage medium storing program for executing
CN112783737A (en) * 2019-11-07 2021-05-11 北京京东尚科信息技术有限公司 Display method and device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113838547A (en) * 2021-09-28 2021-12-24 湖南康凯信息技术有限公司 Intelligent medical service management system based on intelligent terminal
CN115499539B (en) * 2022-08-09 2023-07-25 岚图汽车科技有限公司 Vehicle, and vehicle user privacy processing method and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101026822A (en) * 2006-02-24 2007-08-29 江苏高通科技实业有限公司 Method for protecting mobile phone private data
CN101587528A (en) * 2008-05-20 2009-11-25 佳能株式会社 Information processing apparatus and control method therefor
CN102591639A (en) * 2011-12-14 2012-07-18 广东威创视讯科技股份有限公司 Method for setting permission of Windows folders
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN103701801A (en) * 2013-12-26 2014-04-02 四川九洲电器集团有限责任公司 Resource access control method
CN103955638A (en) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 Method and device for privacy protection
CN104079574A (en) * 2014-07-02 2014-10-01 南京邮电大学 User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment
CN104182662A (en) * 2014-08-22 2014-12-03 广东欧珀移动通信有限公司 Mobile terminal, system and method for hiding and starting hidden application programs
CN104834865A (en) * 2015-04-30 2015-08-12 上海锐鸿通信技术有限公司 Method for setting access permission of mobile terminal and mobile terminal

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006068551A1 (en) * 2004-12-22 2006-06-29 Telefonaktiebolaget Lm Ericsson (Publ) Means and method for control of personal data
US20100024020A1 (en) * 2008-07-22 2010-01-28 Ernest Samuel Baugher Wireless mobile device with privacy groups that independently control access to resident application programs
CN104217172B (en) * 2013-06-03 2019-05-14 腾讯科技(深圳)有限公司 Privacy content inspection method and device
US9679144B2 (en) * 2013-11-15 2017-06-13 Microsoft Technology Licensing, Llc Protecting privacy in web-based immersive augmented reality
CN103617382B (en) * 2013-11-22 2017-10-17 北京奇虎科技有限公司 Method for secret protection and its device
CN109165063A (en) * 2014-03-31 2019-01-08 华为技术有限公司 Method for secret protection and terminal device
CN104050267B (en) * 2014-06-23 2017-10-03 中国科学院软件研究所 The personalized recommendation method and system of privacy of user protection are met based on correlation rule
CN104375836B (en) * 2014-11-19 2018-08-17 深圳市腾讯计算机***有限公司 A kind of method and device of displaying screen locking window
KR20160086160A (en) * 2015-01-09 2016-07-19 엘지전자 주식회사 Mobile terminal and method for controlling the same
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN105260658A (en) * 2015-09-17 2016-01-20 广东欧珀移动通信有限公司 Method and system for setting privacy interface
CN105426717A (en) * 2015-11-11 2016-03-23 广东欧珀移动通信有限公司 Interface display method and apparatus
CN105678180A (en) * 2015-11-30 2016-06-15 上海闻泰电子科技有限公司 Privacy protection system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101026822A (en) * 2006-02-24 2007-08-29 江苏高通科技实业有限公司 Method for protecting mobile phone private data
CN101587528A (en) * 2008-05-20 2009-11-25 佳能株式会社 Information processing apparatus and control method therefor
CN102591639A (en) * 2011-12-14 2012-07-18 广东威创视讯科技股份有限公司 Method for setting permission of Windows folders
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN103701801A (en) * 2013-12-26 2014-04-02 四川九洲电器集团有限责任公司 Resource access control method
CN103955638A (en) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 Method and device for privacy protection
CN104079574A (en) * 2014-07-02 2014-10-01 南京邮电大学 User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment
CN104182662A (en) * 2014-08-22 2014-12-03 广东欧珀移动通信有限公司 Mobile terminal, system and method for hiding and starting hidden application programs
CN104834865A (en) * 2015-04-30 2015-08-12 上海锐鸿通信技术有限公司 Method for setting access permission of mobile terminal and mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109803343A (en) * 2019-01-04 2019-05-24 全球能源互联网研究院有限公司 Mobile application Node Credit evaluation method, device and readable storage medium storing program for executing
CN112783737A (en) * 2019-11-07 2021-05-11 北京京东尚科信息技术有限公司 Display method and device
CN112783737B (en) * 2019-11-07 2024-04-16 北京京东尚科信息技术有限公司 Display method and device

Also Published As

Publication number Publication date
CN112800401A (en) 2021-05-14
CN112800401B (en) 2024-01-30
CN106874718B (en) 2020-12-15

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN104375836B (en) A kind of method and device of displaying screen locking window
KR101719933B1 (en) Method for producing dynamic data structures for authentication and/or password identification
US8332937B1 (en) Access using images
US10547624B2 (en) Identity authentication method, apparatus, and system
WO2017114391A1 (en) Method, apparatus, and electronic device based on use of electronic device by multiple accounts
CN105592146A (en) Equipment control method, device and terminal
CN106020587A (en) Method and device for message display
CN104182662A (en) Mobile terminal, system and method for hiding and starting hidden application programs
CN104866770B (en) Sensitive data scanning method and system
CN106874718A (en) privacy processing method, device and terminal
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
CN106815509A (en) A kind of multimedia file guard method, device and electronic equipment
CN107358120A (en) Document edit method and device, terminal device and computer-readable recording medium
WO2022199040A1 (en) Content display method and apparatus, and device and storage medium
CN105868625B (en) Method and device for intercepting restart deletion of file
JP2022002103A (en) Privacy protecting method and protecting device for mobile terminal and mobile terminal
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN109359482B (en) Webpage browsing method and device
CN106385470A (en) Information push method and device
CN109657428A (en) A kind of control method of mobile terminal, mobile terminal and storage medium
US10212168B2 (en) Electronic device and control method thereof
CN116561355A (en) Method and device for processing multimedia resources, computer equipment and storage medium
CN106649469A (en) Chat record information management method and terminal
CN107094079A (en) A kind of method for opening termination function, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant