The content of the invention
The application provides privacy processing method, device and terminal, and privacy of user is protected with solving existing method for secret protection
Shield availability not enough, reduces the problem of the validity of secret protection.
According to the first aspect of the embodiment of the present application, there is provided a kind of privacy processing method, comprise the following steps:
When the event for triggering privacy profile occurs, user input configuration password is pointed out;
After receiving correct configuration password, the configuration interface containing privacy object is exported, so that user is based on described matching somebody with somebody
Putting interface carries out the configuration operation whether privacy information shows.
In one embodiment, the configuration interface includes:
Privacy object tree, wherein, the root node of the privacy object tree is application program node, and leaf node includes application
Privacy content node in program, remaining node includes the privacy function node in the application program.
In one embodiment, when the privacy content node is configured as not showing, the privacy content node institute
The privacy content of association is all not displayed on any display interface of the application program;When the privacy function node is matched somebody with somebody
Be set to when not showing, the function associated by the privacy function node on any display interface of the application program not by
Display.
In one embodiment, before the prompting user input configuration password, methods described also includes:
Trigger action of the detection for the privacy information configuration in menu;
If detecting the trigger action, it is determined that the event of triggering privacy profile occurs;
The prompting user input configuration password, including:
Ejection prompting user input configures the interface of password.
In one embodiment, after the prompting user input configuration password, methods described also includes:
If receiving the configuration password of mistake or configuration password not being received in preset period of time, privacy of user is pointed out
Processing function not enabled.
According to the second aspect of the embodiment of the present application, there is provided a kind of privacy processing unit, including:
Configuration password prompt module, during for occurring in the event for triggering privacy profile, points out user input configuration password;
Configuration interface output module, for after correct configuration password is received, exporting the configuration containing privacy object
Interface, the configuration operation whether privacy information shows is carried out so that user is based on the configuration interface.
In one embodiment, the configuration interface includes:
Privacy object tree, wherein, the root node of the privacy object tree is application program node, and leaf node includes application
Privacy content node in program, remaining node includes the privacy function node in the application program.
In one embodiment, when the privacy content node is configured as not showing, the privacy content node institute
The privacy content of association is all not displayed on any display interface of the application program;When the privacy function node is matched somebody with somebody
Be set to when not showing, the function associated by the privacy function node on any display interface of the application program not by
Display.
In one embodiment, described device also includes:
Trigger action detection module, for detecting the trigger action for the privacy information configuration in menu;
Trigger event determining module, for when the trigger action is detected, it is determined that the event hair of triggering privacy profile
It is raw;
The configuration password prompt module also includes:
Configuration password prompt submodule, the interface of password is configured for ejecting prompting user input.
In one embodiment, described device also includes:
Function prompt module, for receiving the configuration password of mistake or not receive in preset period of time configuration close
During code, privacy of user processing function not enabled is pointed out.
According to the third aspect of the embodiment of the present application, there is provided a kind of terminal, including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
When the event for triggering privacy profile occurs, user input configuration password is pointed out;
After receiving correct configuration password, the configuration interface containing privacy object is exported, so that user is based on described matching somebody with somebody
Putting interface carries out the configuration operation whether privacy information shows.
Using the embodiment of the present application, when the event for triggering privacy profile occurs, user input configuration password is pointed out;Receive
To after correct configuration password, export the configuration interface containing privacy object, so as to user carried out based on the configuration interface it is hidden
The whether configuration of private presentation of information is operated, if privacy information is prohibited display, while can't see privacy information, is configured without close
The other users of code do not know that configuration interface whether there is yet, and then cannot know whether and conceal privacy information, thus may be used
More effectively protected with to privacy of user, improved secret protection availability.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
The application can be limited.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in implementation method do not represent all implementation methods consistent with the application.Conversely, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects described in detail in claims, the application.
It is the purpose only merely for description specific embodiment in term used in this application, and is not intended to be limiting the application.
" one kind ", " described " and " being somebody's turn to do " of singulative used in the application and appended claims is also intended to include majority
Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wraps
May be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application
A little information should not necessarily be limited by these terms.These terms are only used for being distinguished from each other open same type of information.For example, not departing from
In the case of the application scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining ".
Referring to Fig. 1, Fig. 1 is one embodiment flow chart of the application privacy processing method, and the embodiment can be used for end
In end, 101-102 is comprised the following steps:
Step 101:When the event for triggering privacy profile occurs, user input configuration password is pointed out.
The terminal being related in the embodiment of the present application, can be the terminal for being only capable of exporting self-contained or collection information, example
Such as, recorder, audio player, camera, video player, handheld reader, private tutor's machine etc.;Can also be provided with it is various
Using the intelligent terminal of APP, for example, smart mobile phone, panel computer, PDA (Personal Digital Assistant, individual
Digital assistants), desktop computer etc..Terminal user has found to need to hide in the data message of arrangement or browsing terminal equipment
Privacy when, privacy treatment can be carried out by triggering privacy profile.
In some examples, button can be configured by triggering default privacy information so that the thing of triggering privacy profile
Part occurs, and then causes terminal notifying user input configuration password.Can be with self-defined other modes so that triggering privacy profile
Event occur, this embodiment of the present application is not limited.
In order to determine whether the event for triggering privacy profile occurs, can be determined by following optional implementation:Detection
For the trigger action of the privacy information configuration in menu;If detecting the trigger action, it is determined that triggering privacy profile
Event occurs.It is determined that after occurring, the interface prompt user input that password can be configured by ejecting prompting user input configures close
Code.
In other examples, user input configuration password is pointed out, Password Input can be shown in the display screen of terminal device
Frame, or Password Input voice etc. can be played by the voice system of terminal, user can be defeated by the character of terminal device
Enter system or voice entry system input function setting up password.
In some scenes so that triggering privacy profile event occur user, may not usual using terminal set
Standby user, but the other users of other interim using terminal equipment, other users are not aware that configuration password, are set in terminal
After standby prompting user input configuration password, other users may not input configuration password, or can input error configuration it is close
Code, in order to allow other users to further determine that, terminal user does not hide privacy, so that privacy of user is more thoroughly protected, this Shen
Please embodiment privacy processing method, prompting user input configuration password after, may also include following operation:If receiving mistake
Configuration password or configuration password is not received in preset period of time, then point out privacy of user processing function not enabled.
For the preset period of time, can according to the actual requirements, the preset period of time is carried out in advance it is self-defined, for example,
The preset period of time is defined for 5 seconds.
Step 102:After receiving correct configuration password, the configuration interface containing privacy object is exported, so as to user's base
The configuration operation whether privacy information shows is carried out in the configuration interface.
In the embodiment of the present application, the privacy object is used to associate the privacy information that can be hidden, and can be privacy information
Title, numbering, button, menu etc.;And privacy information can be only capable of that output is self-contained or the terminal of information of collection is deposited
The data messages such as word, picture, video, the audio of storage, can also be and be provided with the intelligent terminal of various application APP
Privacy application APP, the privacy function using APP, the privacy content in function, wherein, privacy application APP as social class application,
Mail applications etc., using the blacklist function of the privacy function such as short message application of APP, the city credit report of sesame credit application
Function etc., the special contact person in privacy content such as address list in function, the secret short message in short message inbox, in picture library
Secret photo, private video in video library etc..
During practical application, after receiving password, the password of reception is compared with the configuration password for prestoring, if unanimously,
Can determine to have received correct configuration password, then export configuration interface.Privacy object in configuration interface is believed with privacy
Breath association, can distribute unique identity information ID for privacy object, set up an incidence relation table, incidence relation table correspondence
Storage privacy object, ID and privacy information, after privacy object is triggered, are easy to search the privacy object according to its ID
The privacy information of association, the privacy information that will be found is set to the object that need to be hidden.Triggering privacy object, can be by user's striking
The residing interface zone in configuration interface of privacy object is realized, by way of example, the interface zone residing for privacy object, Ke Yishi
With the privacy object in region residing for form, or privacy object tree containing privacy object in privacy list object
Region residing for corresponding tree node.
User can be associated by the interface zone residing for the privacy object in striking configuration interface to the privacy object
The configuration operation that whether is shown of privacy information, the interface zone residing for the privacy object in striking configuration interface first,
The privacy information that can determine that privacy object association is to need hiding information, to prevent beyond user other people know institute
The privacy information of association, and then the effective protection to associated privacy information is realized, associated privacy information is configured to
Do not it has been shown that, associated privacy information can be forbidden to be shown on any display interface.In order to further more effectively protection is closed
The privacy information of connection, it is also possible to forbid the privacy information associated by playing, or the privacy that no thoroughfare associated by network transmission
Information etc., is not limited to this embodiment of the present application.
In some examples, associated privacy information can be forbidden in any display interface by following optional implementation
Upper display:
When default presentation of information condition is met, judge whether include the privacy object in data message to be shown
The privacy information of association.
If not including, display carries the first display object of the data message to be shown.
If including, corresponding display processing is carried out to other data messages in addition to associated privacy information, generate
Second display object.
Show the second display object.
The embodiment of the present application, when data message to be shown includes the privacy information of the privacy object association, weight
New that other data messages in addition to associated privacy information are carried out with corresponding display processing, generation second shows object, so
After show the second display object, when associated privacy information can be avoided to be arranged to not show, cause display interface
The typesetting exception of displayed content, enters without influence information display effect.
Wherein, receive information display instruction or reach presentation of information time etc., you can to judge to meet default letter
Breath display condition.After meeting default presentation of information condition, can be from application server request the first display object, it is also possible to
The first display object is transferred from the storage region of the terminal device for installing application, after obtaining the first display object, Ke Yicha
Look for the presence or absence of hiding information is needed in the data message of its carrying, if finding, it is possible to determine that data message to be shown
Include the privacy information of the privacy object association, if not finding, it is possible to determine that do not include in data message to be shown
The privacy information of the privacy object association.
In the other embodiment of the application, determine that corresponding privacy object is the information that need to be hidden, forbid associated
After privacy information shows on any display interface, if the privacy information that user wants associated by recovery is the letter that need not be hidden
Breath, interface zone that can be residing for privacy object again in striking configuration interface so that the privacy information of privacy object association
The information that need not be hidden is converted to, permits the privacy information associated by display.
Whether the privacy information for distinguishing the association of privacy object for the ease of user has been prohibited display, can be in any privacy pair
As the privacy information for associating is inhibited in after any display interface show, correspondence any privacy object adds hidden identification and arrives
Configuration interface, hidden identification can be default color, icon etc..
, it is necessary to carry out secret protection using APP in terminal device in some scenes, and this applies APP's
Function is more, and the data message content of application content is larger, it is corresponding the need for the privacy function hidden and privacy content compared with
It is many, if completing all privacy functions and the equal privacy treatment of privacy content, it is necessary to search each privacy work(one by one from configuration interface
Energy privacy object corresponding with privacy content, the time spent by search procedure is more, can reduce privacy treatment effeciency.In order to contract
Short privacy object searches the time and improves privacy treatment effeciency, can represent that this applies APP, the privacy content in it with tree construction
And privacy function, Fig. 2 a are for details, reference can be made to, Fig. 2 a are another embodiment flow chart of the application privacy processing method, the implementation
Example may comprise steps of 201-202:
Step 201:When the event for triggering privacy profile occurs, user input configuration password is pointed out.
Step 202:After receiving correct configuration password, the configuration interface containing privacy object tree is exported, so as to user
The configuration operation whether privacy information shows is carried out based on the configuration interface, wherein, the root node of the privacy object tree is
Application program node, leaf node includes the privacy content node in application program, and remaining node is included in the application program
Privacy function node.
In the embodiment of the present application, privacy object refers to the privacy function node and privacy content node contained by privacy object tree.
Privacy information can include some privacy functions of the privacy content and the application program under some functions of application program, institute
Stating privacy object tree can include application program node, the privacy content node in application program, the privacy content node
Privacy function node in upper-layer functionality node and the application program, wherein, root node is application program node, leaf
Node is privacy content node, and remaining node is the upper-layer functionality node or the application program of the privacy content node
Interior privacy function node.Privacy object and non-privacy object are distinguished for the ease of user, privacy object addition face can be corresponded to
The information such as color, icon are distinguishing privacy object and non-privacy object.
In order to build the privacy object tree, can first by application APP institute it is functional and it is functional under it is all answer
A utility tree is modeled as with content, privacy object is represented with the node of pre-set color in the utility tree, with privacy information
(privacy function or privacy content) is associated, and such node can be the application content under leaf node, corresponding function, such node
Can also be non-leaf nodes, the function of correspondence application program.
Then the upper strata section of the node of root node, the node of pre-set color and pre-set color is retained in the utility tree
Point, such utility tree is converted to privacy object tree.For each node in privacy object tree, the unique identity letter of generation one
Breath ID is indicated, and the ID can be title, identity number, account, unique encodings, exclusive number of privacy object etc..
For each node of privacy object tree, a node mapping table can be set up, the node mapping table
The privacy information of each node of correspondence storage, the ID of each node and the association of each node, after each node is triggered, is easy to basis
Corresponding ID searches associated privacy information, and the privacy information that will be found is set to the information that need to be hidden.
Refer to Fig. 2 b, Fig. 2 b by taking credit evaluation class APP as an example, the function that will can be hidden in credit evaluation class APP and
Application content, has been built into the privacy object tree shown in the configuration interface in Fig. 2 b, the identity of each node in privacy object tree
Information is the title of function or the title of application content, urban applications function of reporting, negative records with number designation 1,2,3
1st, negative records 2 are privacy object.Credit evaluation class APP such as sesame credit APP, integrated treatment to magnanimity information data and comment
Estimate, personal credit standing be presented, can credit card, the consumer finance, financing lease, hotel, rent a house, go on a journey, classification information,
Multiple scenes such as student's service, government utility service provide the user credit services.
During practical application, user is by the privacy content node (section of label 2 or 3 in configuration interface shown in striking Fig. 2 b
Point) or privacy function node (node of label 1) residing for interface zone, can be to the privacy content node or described hidden
The configuration whether privacy information of private functional node association is shown is operated, first the privacy content section in striking configuration interface
Interface zone residing for point or privacy function node, it may be determined that what the privacy content node or the privacy function node were associated
Privacy information is to need hiding information, and associated privacy information is configured as not show.Wherein, when the privacy content
When node is configured as not showing, any display of privacy content associated by the privacy content node in the application program
All it is not displayed on interface;When the privacy function node is configured as not showing, associated by the privacy function node
Function is all not displayed on any display interface of the application program.
In other examples, when privacy object refers to the privacy function node and privacy content node contained by privacy object tree,
The privacy object tree can also simultaneously include that all functional nodes in application program node, application program and institute are active
Content node under energy node, wherein, root node is application program node, and leaf node is the content node of application program, is remained
Remaining node is the functional node of the application program, and content node includes privacy content node and non-privacy content node, function
Node includes privacy function node and non-privacy function node.Privacy object and non-privacy object are distinguished for the ease of user, can
The information such as color, icon are added to distinguish privacy object and non-privacy object with correspondence privacy object.
In other embodiments, privacy object can singly refer to the privacy function node or privacy content section contained by privacy object tree
Point, now, the privacy object tree can also only include the privacy function node in application program node and application program, or
Only include the upper-layer functionality node of the privacy content node and the privacy content node in application program node, application program.
From above-described embodiment, the application points out user input configuration close when the event for triggering privacy profile occurs
Code;After receiving correct configuration password, the configuration interface containing privacy object is exported, so that user is based on the configuration interface
Carry out configuration operation that whether privacy information show, it is necessary to whether privacy information is shown configuration when, only by striking
Privacy object in configuration interface can complete configuration, without setting up private file folder.If privacy information is configured as forbidding showing
Show, while can't see privacy information, the other users for being configured without password do not know that configuration interface whether there is yet, Jin Erwu
Method knows whether and conceals privacy information, thus privacy of user more effectively can be protected that improving secret protection has
Validity.
Additionally, the privacy processing method for passing through the embodiment of the present application, to needing hiding function and application content more
Application APP, when carrying out privacy and processing, the privacy object using APP and Qi Nei is represented with tree construction, boundary is configured by striking
Privacy object in face can quickly realize the configuration of the privacy information of association, without searching privacy information one by one, to finding
Privacy information carry out privacy settings one by one, more without by the privacy information after privacy settings store one by one private file folder,
Therefore the convenience and availability of privacy treatment can further be improved.
Embodiment with foregoing privacy processing method is corresponding, present invention also provides the embodiment of privacy processing unit.
The embodiment of the application privacy processing unit can be applied in terminal.Device embodiment can be by software reality
It is existing, it is also possible to be realized by way of hardware or software and hardware combining.As a example by implemented in software, as on a logical meaning
Device, is that corresponding computer program instructions in nonvolatile memory are read into internal memory by the processor of terminal where it
What middle operation was formed.From for hardware view, as shown in figure 3, being a kind of hardware of the application privacy processing unit place terminal
Structure chart, in addition to the processor 310 shown in Fig. 3, network interface 320, internal memory 330 and nonvolatile memory 340,
Terminal in embodiment where device can also include other hardware generally according to the actual functional capability of the terminal, and this is no longer gone to live in the household of one's in-laws on getting married
State.
Above-mentioned processor 310 is configured as:When the event for triggering privacy profile occurs, point out user input configuration close
Code;After receiving correct configuration password, the configuration interface containing privacy object is exported, so that user is based on the configuration interface
Carry out the configuration operation whether privacy information shows.
Referring to Fig. 4, Fig. 4 is one embodiment block diagram of the application privacy processing unit, and the device may include:Configuration password
Reminding module 410 and configuration interface output module 420.
Wherein, configuration password prompt module 410, during for occurring in the event for triggering privacy profile, points out user input
Configuration password.
Configuration interface output module 410, for after correct configuration password is received, exporting matching somebody with somebody containing privacy object
Interface is put, the configuration operation whether privacy information shows is carried out so that user is based on the configuration interface.
In an optional implementation, the configuration interface includes:
Privacy object tree, wherein, the root node of the privacy object tree is application program node, and leaf node includes application
Privacy content node in program, remaining node includes the privacy function node in the application program.
In another optional implementation, when the privacy content node is configured as not showing, in the privacy
Hold the privacy content associated by node to be all not displayed on any display interface of the application program;When the privacy function
When node is configured as not showing, any display interface of function associated by the privacy function node in the application program
On be all not displayed.
In another optional implementation, the privacy processing unit is also included (not shown in Fig. 4):
Trigger action detection module, for detecting the trigger action for the privacy information configuration in menu.
Trigger event determining module, for when the trigger action is detected, it is determined that the event hair of triggering privacy profile
It is raw.
Configuration password prompt module 410 is also included (not shown in Fig. 4):
Configuration password prompt submodule, the interface of password is configured for ejecting prompting user input.
In another optional implementation, the privacy processing unit is also included (not shown in Fig. 4):
Function prompt module, for receiving the configuration password of mistake or not receive in preset period of time configuration close
During code, privacy of user processing function not enabled is pointed out.
The function of modules and the implementation process of effect correspond to step in specifically referring to the above method in said apparatus
Implementation process, will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is referring to method reality
Apply the part explanation of example.Device embodiment described above is only schematical, wherein described as separating component
The module of explanation can be or may not be physically separate, and the part shown as module can be or can also
It is not physical module, you can with positioned at a place, or can also be distributed on multiple mixed-media network modules mixed-medias.Can be according to reality
Selection some or all of module therein is needed to realize the purpose of application scheme.
Those of ordinary skill in the art are without creative efforts, you can to understand and implement.This area
Technical staff will readily occur to other embodiments of the application after considering specification and putting into practice invention disclosed herein.This
Application is intended to any modification, purposes or the adaptations of the application, and these modifications, purposes or adaptations are abided by
Follow the general principle of the application and including the undocumented common knowledge or conventional techniques in the art of the application.
Description and embodiments are considered only as exemplary, and the true scope of the application and spirit are pointed out by following claim.
It should be appreciated that the application is not limited to the precision architecture for being described above and being shown in the drawings, and
And can without departing from the scope carry out various modifications and changes.Scope of the present application is only limited by appended claim.