CN108319865B - Privacy protection method based on multiple roles, storage medium and terminal equipment - Google Patents

Privacy protection method based on multiple roles, storage medium and terminal equipment Download PDF

Info

Publication number
CN108319865B
CN108319865B CN201810046091.0A CN201810046091A CN108319865B CN 108319865 B CN108319865 B CN 108319865B CN 201810046091 A CN201810046091 A CN 201810046091A CN 108319865 B CN108319865 B CN 108319865B
Authority
CN
China
Prior art keywords
role
hidden
social
state
roles
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810046091.0A
Other languages
Chinese (zh)
Other versions
CN108319865A (en
Inventor
崔健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dt International Technology Co ltd
Original Assignee
Dt International Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dt International Technology Co ltd filed Critical Dt International Technology Co ltd
Priority to CN201810046091.0A priority Critical patent/CN108319865B/en
Publication of CN108319865A publication Critical patent/CN108319865A/en
Application granted granted Critical
Publication of CN108319865B publication Critical patent/CN108319865B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a privacy protection method, a storage medium and a terminal device based on multiple roles, wherein the method comprises the following steps: creating a plurality of roles for the same social account in advance, and detecting the operation of configuring hidden roles in real time; when the operation of configuring the hidden role is detected, configuring a hidden password for the corresponding role according to the operation, and setting the role in a hidden state; when the terminal equipment executes a first preset operation, hiding the role in the hidden state so as to hide the social information corresponding to the role in the hidden state. According to the method and the device, the hidden state is configured for the role, and the role in the hidden state is hidden, so that the virtual role in the hidden state is not displayed when the social software runs, the social network relation is relatively complicated in a multi-role social mode, inconvenience and disclosure of a user can be still guaranteed, or sensitive privacy is not exposed, and the safety of the social software is improved.

Description

Privacy protection method based on multiple roles, storage medium and terminal equipment
Technical Field
The invention relates to the technical field of instant messaging, in particular to a privacy protection method based on multiple roles, a storage medium and terminal equipment.
Background
With the continuous development of instant messaging, the functions of instant messaging social software are more and more comprehensive, and some software supports a mode that multiple roles of one account are switched to chat simultaneously in order to protect the privacy of users and distinguish friend relationships. The multiple roles can divide the friends of the social account into friends under different roles, so that social activities can be performed independently to avoid some privacy information from being revealed to strangers. The user classifies the friends of the user's social network, and establishes a plurality of roles and relations between the friends of the corresponding categories, so that the roles can be conveniently switched to chat with the friends with different familiarity in one account, and social activities can be carried out.
However, with the deep use of the user in the later period and the reason that some users create roles on the same account due to social relationship or working environment, the number of the created roles is increased, and in the actual situation, the social activities of each role under the account of the user are more and more complex, and some roles which are equivalent to the private roles seen by the user are generated. For example, customers of important projects do not want to see others, or roles for contacting with family do not want to display some pictures and information of family or friends on social software when a company works, but inevitably some people communicate face to face or display their own social accounts in work or life, which causes the leakage of user privacy.
Thus, the prior art has yet to be improved and enhanced.
Disclosure of Invention
In view of the shortcomings in the prior art, an object of the present invention is to provide a privacy protection method, a storage medium and a terminal device based on multiple roles.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
a multi-role based privacy preserving method, comprising:
creating a plurality of roles for the same social account in advance, and detecting the operation of configuring hidden roles in real time;
when the operation of configuring the hidden role is detected, configuring a hidden password for the corresponding role according to the operation, and setting the role in a hidden state;
when the terminal equipment executes a first preset operation, hiding the role in the hidden state so as to hide the social information corresponding to the role in the hidden state.
The privacy protection method based on multiple roles, wherein, when an operation of configuring a hidden role is detected, configuring a hidden password for the corresponding role according to the operation, and setting the role to be in a hidden state specifically includes:
when receiving an operation of configuring a hidden role, acquiring the role corresponding to the operation, and receiving a hidden password configured for the role by a user;
and binding the role with the hidden password, and setting the role in a hidden state.
The privacy protection method based on the multiple roles comprises the steps of locking a screen, controlling the social software corresponding to the social account to run in a background, logging in the social account again after logging out, and controlling the social software corresponding to the social account to finish running.
The privacy protection method based on multiple roles, wherein hiding the role in the hidden state when the terminal device executes a first preset operation specifically includes:
when the terminal equipment executes a first preset operation, acquiring all hidden roles in a hidden state;
hiding all hidden roles such that all hidden roles are not revealed at the social software.
The privacy protection method based on multiple roles, wherein when the terminal device executes a first preset operation, hiding the role in the hidden state, so as to further include, after hiding the social information corresponding to the role in the hidden state:
when receiving social information, determining a first role corresponding to the social information, and judging the role state of the first role;
receiving and displaying the social information when the first role is not in a hidden state;
receiving and hiding the social information when the first character is in a hidden state, and displaying the social information when the first character is displayed.
The privacy protection method based on multiple roles, wherein when the terminal device executes a first preset operation, hiding the role in the hidden state, so as to hide the social information corresponding to the role in the hidden state, and then the method comprises the following steps:
monitoring a first hidden password input by a user when the social software corresponding to the social account is in a foreground running state;
when a first hidden password is monitored, verifying the first hidden password;
and when the verification is successful, displaying a first hidden role corresponding to the first hidden password, and displaying the social information received in the hiding process of the first hidden role.
The privacy protection method based on multiple roles, wherein when the social software corresponding to the social account is in a foreground running state, monitoring a first hidden password input by a user specifically includes:
when the social software corresponding to the social account is in a foreground running state, displaying at least one role which is not in a hidden state;
monitoring a second preset operation executed by a user on the current role, and controlling the terminal equipment to display a hidden role configuration interface according to the second preset operation;
and receiving a first hidden password input by a user through the hidden role configuration interface.
The privacy protection method based on multiple roles, wherein, when the verification is successful, displaying a first hidden role corresponding to the first hidden password, and displaying social information received in the first hidden role hiding process further includes:
after the hidden role is displayed, monitoring an in-place instruction input by a user, wherein the in-place instruction carries a second hidden password;
and verifying the second hidden password, and configuring a second hidden role corresponding to the second hidden password into a display state when the verification is successful.
A computer readable storage medium, storing one or more programs, which are executable by one or more processors to implement the steps in the multi-role based privacy preserving method as described in any one of the above.
A terminal device, comprising: the device comprises a processor, a memory and a communication bus, wherein the memory is stored with a computer readable program which can be executed by the processor;
the communication bus realizes connection communication between the processor and the memory;
the processor, when executing the computer readable program, implements the steps in the multi-role based privacy preserving method as described in any one of the above.
Has the advantages that: compared with the prior art, the invention provides a privacy protection method, a storage medium and terminal equipment based on multiple roles, wherein the method comprises the following steps: creating a plurality of roles for the same social account in advance, and detecting the operation of configuring hidden roles in real time; when the operation of configuring the hidden role is detected, configuring a hidden password for the corresponding role according to the operation, and setting the role in a hidden state; when the terminal equipment executes a first preset operation, hiding the role in the hidden state so as to hide the social information corresponding to the role in the hidden state. According to the method and the device, the hidden state is configured for the role, and the role in the hidden state is hidden, so that the virtual role in the hidden state is not displayed when the social software runs, the social network relation is relatively complicated in a multi-role social mode, inconvenience and disclosure of a user can be still guaranteed, or sensitive privacy is not exposed, and the safety of the social software is improved.
Drawings
Fig. 1 is a flowchart of a first embodiment of a privacy protection method based on multiple roles provided in the present invention.
Fig. 2 is a flowchart illustrating controlling the display of hidden roles in a second embodiment of the privacy protection method based on multiple roles provided in the present invention.
FIG. 3 is a flowchart of modifying role attributes of hidden roles in a third embodiment of the privacy protection method based on multiple roles provided in the present invention
Fig. 4 is a schematic structural diagram of a preferred embodiment of a terminal device according to the present invention.
Detailed Description
The invention provides a privacy protection method, a storage medium and a terminal device based on multiple roles, and in order to make the purpose, technical scheme and effect of the invention clearer and clearer, the invention is further described in detail below by referring to the attached drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The invention will be further explained by the description of the embodiments with reference to the drawings.
Example one
The embodiment provides a privacy protection method based on multiple roles, as shown in fig. 1, the method includes:
and S10, creating a plurality of roles for the same social account in advance, and detecting the operation of configuring the hidden roles in real time.
Specifically, the social account number is obtained in advance, for example, by registering in a social platform. The social account number may include an account number and a password, which may be one or a combination of letters, symbols, and numbers. In this embodiment, in order to create a plurality of roles for the same social account, a unique identifier may be configured for the social account (for example, an account of the social account is the unique identifier), when creating a role, the role is associated with the unique identifier of the social account, the association relationship is sent to a background server of social software corresponding to the social account, and the association relationship is stored by the background server, so that when logging in the social account, all roles included in the social account can be quickly determined. Certainly, in order to distinguish the roles, each role is configured with a role ID, and the unique identifier and the role association of the social account are the unique identifier and the role ID association of the social account, so that all roles included in the social account can be determined according to the unique identifier and the role ID of the social account, the roles are distinguished by the role IDs, and the role can be found according to the role ID.
Meanwhile, in this embodiment, each role is configured with a role database, the role database is used for storing role data, and the role databases are independent of each other. The role database can adopt the role ID as a unique identifier, so that the corresponding role database can be found according to the role ID, and the received social information sent by the role database can be stored in the role database.
In addition, after the virtual character is created, character attributes can be configured for the virtual character, wherein the character attributes comprise a display state and a hidden state, the display state is used for controlling the virtual character to be displayed when the social software is in the running state, and the hidden state is used for controlling the virtual character to be hidden when the social software is in the running state. In this embodiment, when a virtual character is created, the state is displayed after the default state of the virtual character, and the character state of the virtual character can be modified according to the operation of the user after the virtual character is created. That is, after multiple virtual characters are created for the same social account, an operation of configuring the virtual characters, which is used to configure the character attributes of the virtual characters as hidden attributes, may be detected in real time. The operation may be performed in a fixed account information setting field.
S20, when detecting the operation of configuring the hidden role, configuring the hidden password for the corresponding role according to the operation, and setting the role as the hidden state.
Specifically, the hidden password is set by the user and used for verifying the password of the hidden character, that is, the virtual character in the hidden state can be controlled to be displayed through the hidden password. The hidden password may be set in a touch screen gesture, a character password, a fingerprint password, pupil recognition, face recognition or voice recognition, and the hidden password may be in a plurality of forms, which are not described herein. In addition, when an operation of configuring a hidden role is detected, the role ID of the virtual role to be hidden needs to be determined, and the received hidden password is related to the role ID, so that when the hidden password is received, the corresponding virtual role can be determined. Correspondingly, when the operation of configuring the hidden role is detected, configuring the hidden password for the role corresponding to the operation according to the operation, and setting the role in the hidden state specifically includes:
s21, when receiving the operation of configuring the hidden role, acquiring the role corresponding to the operation, and receiving the hidden password configured for the role by the user;
s22, binding the role with the hidden password, and setting the role to be in a hidden state.
Specifically, the role may be determined by the operation carried role information, for example, a user directly performs an operation on a role to be hidden, so that a role corresponding to the operation may be directly obtained; or the user can input the role ID of the role to be hidden when performing the operation, so that the operation carries the role ID. Meanwhile, after the role is obtained, a hidden password input by a user is received, and the hidden password is sent to a background server, so that the background server stores the hidden password in a role database corresponding to the role, and the hidden password is stored through the role database.
In addition, before the role is bound with the hidden password, the user can be prompted to input the hidden password again, the hidden passwords input twice are compared, and when the hidden passwords input twice are consistent, the hidden passwords are associated with the role. Certainly, in practical application, the user may be required to perform multiple times of authentication according to the setting mode of the hidden password, so as to ensure the reliability of the hidden password. For example, when the hidden password is a character password, the user may be prompted to repeatedly input the character password twice or three times, and the character password received twice or three times is verified, so that the user can specify the hidden password; when the hidden password is a fingerprint, prompting a user to perform fingerprint input for multiple times so as to obtain complete fingerprint information; when the hidden password is used for face recognition, the face information can be collected only once. In addition, other ways of hiding the password are not described here.
Meanwhile, in this embodiment, after the role is associated with the hidden password, the role state is set to be the hidden state, and the hidden state is configured in the role database corresponding to the role, so that when the social information in the role database changes, the background server does not synchronize the change of the social information to the terminal device logging in the social software, so that the terminal device does not display the social information. In addition, the background server synchronizes the hidden state of the hidden role to all terminal devices logged in the social network, so that the terminal devices logged in the social account configure the state of the role to be the hidden state, and the hidden role is hidden after the terminal devices perform a preset first operation.
S30, when the terminal device executes the first preset operation, hiding the role in the hidden state so as to hide the social information corresponding to the role in the hidden state.
Specifically, the first preset operation is preset and is used for controlling the role in the hidden state to be hidden. That is to say, when the terminal device executes the first preset operation, the terminal device sends a hiding instruction to the background server, and the background server hides the role database corresponding to the role according to the hiding instruction, so that the terminal device cannot acquire the role information of the hidden role. That is to say, after the terminal device executes the first preset operation, the terminal device cannot acquire the role information of the hidden role, so that the terminal device cannot display the role.
The first preset operation may be screen locking, controlling the social software corresponding to the social account to run in a background, logging in the social account again after log-out, controlling the social software corresponding to the social account to finish running, and the like. That is to say, in the using process of the terminal, the user can trigger the hiding role in the hiding state set in advance to be hidden through screen locking operation, manual program exiting or program placement in background running.
Meanwhile, when the social account configures a plurality of hidden roles, the plurality of hidden roles are triggered to execute hidden operations simultaneously through the first preset operation. Correspondingly, when the terminal device executes the first preset operation, hiding the role in the hidden state specifically includes:
s31, when the terminal equipment executes a first preset operation, all hidden roles in a hidden state are acquired;
s32, hiding all hidden roles so that all hidden roles are not displayed in the social software.
Specifically, the terminal devices refer to all terminal devices logged in the social account, that is, after the role is configured in the hidden state, the hidden state of the role is stored in the background server, so that the background server controls the social account to hide the hidden role. That is, when a user exits from a login, changes a logged-in terminal, or logs in at a plurality of terminal devices at the same time, the role state of the role is inconvenient, thereby avoiding the hidden role in the hidden state from being exposed, and improving the security of privacy.
In addition, after all the hidden roles are hidden, the social information received by each hidden role in the hiding process is not displayed and prompted. That is, the hidden character in the hidden state does not display and prompt any social information. Correspondingly, when the terminal device executes the first preset operation, hiding the role in the hidden state to hide the social information corresponding to the role in the hidden state further includes:
when receiving social information, determining a first role corresponding to the social information, and judging the role state of the first role;
receiving and displaying the social information when the first role is not in a hidden state;
receiving and hiding the social information when the first character is in a hidden state, and displaying the social information when the first character is displayed.
Specifically, the social information is a social signal sent to the social account by other users through a social platform, and when the social information is received, the social account sending the social information can be determined, the role of the social account is searched, and corresponding operation is performed according to the role attribute of the role. In addition, the social account corresponding to the social information may be included in one or more roles, that is, when the social information corresponds to one role, the role state of the role is directly determined, and corresponding operations are performed according to the role state, and when the social information corresponds to a plurality of roles, the role states of the roles corresponding to the social information are respectively determined, and corresponding operations are performed according to the role states of the roles. That is, the social accounts included in the roles may not be repeated, or may partially overlap.
Example two
The embodiment provides a privacy protection method based on multiple roles, and as shown in fig. 2, the method includes, after the steps of the above embodiment, after hiding a role in a hidden state, a step of controlling the hidden role to be hidden to be displayed. The method further comprises the following steps:
s40, monitoring a first hidden password input by a user when the social software corresponding to the social account is in a foreground running state;
s50, when the first hidden password is monitored, the first hidden password is verified;
s60, when the verification is successful, displaying a first hidden role corresponding to the first hidden password, and displaying social information received in the first hidden role hiding process.
Specifically, when a first hidden password is received, a corresponding first hidden role is searched according to the hidden password, and the corresponding relation between the hidden password and the hidden role is stored in a background server in advance. That is to say, after receiving a first hidden password, sending the first hidden password to a background server, verifying the first hidden password by the background server, and displaying a first hidden role corresponding to the first hidden password to a terminal device when the verification of the first hidden password is successful, so that the terminal device displays the first hidden role.
In addition, the background server may store a hidden password list, the hidden password list is associated with the social account, when a first hidden password sent by the social account is received, the first hidden password is searched in the hidden password list, when the first hidden password is found, it is determined that the first hidden password is successfully verified, a corresponding first hidden role is determined according to the same hidden password in the hidden password list, and the first hidden role is controlled to be displayed on the terminal device. And when the first hidden password is not found, discarding the first hidden password.
Meanwhile, in this embodiment, the first hidden password may correspond to one first hidden role and may correspond to a plurality of first hidden roles, and when the first hidden password corresponds to the first hidden role, the first hidden role is controlled to be displayed on the terminal device, and when the first hidden password corresponds to the plurality of first hidden roles, the plurality of first hidden roles are controlled to be simultaneously displayed on the terminal device.
Further, in order to facilitate control of display of a first hidden role according to a first hidden password, when the first hidden role is found, a role state of the first hidden role may be configured to be a temporary display state, so as to control display of the first hidden role through the temporary display state; and when the terminal equipment executes a first preset operation, modifying the role state of the role in the temporary display state into a hidden state, and hiding the first hidden role.
In addition, in order to provide security of the hidden role, when the terminal device receives the first hidden password and sends the first hidden password to the background server, the terminal device sends the device information of the terminal device to the background server, so that the background server displays the first hidden role on the terminal device corresponding to the device information when the first hidden password is successfully verified, and synchronizes social information received by the first hidden role in the hiding process to the terminal device corresponding to the device information, thereby further improving the security of the hidden role.
Meanwhile, in this embodiment, the first hidden password may be a hidden role configuration interface invoked by performing a preset operation on a role currently displayed by the social account, and the first hidden password is input through the hidden role configuration interface. Correspondingly, when the social software corresponding to the social account is in a foreground operating state, monitoring the first hidden password input by the user specifically includes:
s41, when the social software corresponding to the social account is in a foreground running state, displaying at least one role which is not in a hidden state;
s42, monitoring a second preset operation executed by the user on the current role, and controlling the terminal equipment to display a hidden role configuration interface according to the second preset operation;
and S43, receiving a first hidden password input by the user through the hidden role configuration interface.
Specifically, the second preset operation is preset and is used for calling out an operation of hiding the role configuration interface. For example, pressing the information bar or the head portrait area of the currently used role of the social account for a long time enters a hidden role configuration interface, and the hidden role configuration interface only displays a hidden password input window so as to input a first hidden password through the hidden password input window. That is, hidden role information is not displayed on the hidden role configuration interface.
EXAMPLE III
The embodiment provides a privacy protection method based on multiple roles, and as shown in fig. 3, the method includes, after the steps of the above embodiment, after displaying a hidden role, a step of configuring a role state of the hidden role to a display state. The method further comprises the following steps:
s70, monitoring a present instruction input by a user after the hidden role is displayed, wherein the present instruction carries a second hidden password;
s80, verifying the second hidden password, and configuring the second hidden role corresponding to the second hidden password into a display state when the verification is successful.
Specifically, the avatar instruction is used to modify the character state of the displayed stealth character, that is, modify the character state of the displayed stealth character into a display state. That is to say, modifying the state attribute of the hidden role requires controlling the hidden role to be displayed first, so that the corresponding role is found at the terminal, then the hidden password preset by the role is input by clicking the corresponding role, the terminal encrypts the hidden password input by the user and sends the encrypted hidden password to the background server, query and verification are performed through the background server, the terminal device modifies the role state of the hidden role into the display state after receiving the feedback information of successful verification of the server, and the terminal device which logs in the social account at the same time is controlled by the server to modify the role state of the hidden role synchronously.
In addition, in order to facilitate the user to quickly modify the role states of all hidden roles, the account password can be sent to the background server, and the role states of all hidden roles can be modified through the account password, so that the situation that the user cannot modify the role state of a hidden role because the user forgets the hidden password of a certain hidden role can be avoided. In this embodiment, the account password may also be used to control all hidden roles to be displayed. In practical application, in order to improve the confidentiality of the social account, when receiving the account password, the server may perform authentication in a binding manner of the social account, for example, authentication in a mailbox, authentication in a mobile phone authentication code, or the like. That is, the terminal device receives a user password input by a user, requests the background server to perform account login password authentication, the background server authenticates the account password, sends authentication information to the social account binding account according to the binding mode of the social account when the authentication is successful, receives the authentication information sent by the terminal device, and sends feedback information to the terminal after receiving the authentication information; and allowing the terminal equipment to operate all hidden roles with hidden states set under the social account. The operation can be to modify the role states of all hidden roles into a display state, and clear hidden passwords, use records and other characteristic information of all hidden roles at the same time; or may display the hidden character or the like
Based on the multi-role based privacy protection method, the invention further provides a computer readable storage medium storing one or more programs, which are executable by one or more processors to implement the steps in the multi-role based privacy protection method according to the above embodiment.
The present invention also provides a terminal device, as shown in fig. 4, which includes at least one processor (processor) 20; a display screen 21; and a memory (memory) 22, and may further include a communication Interface (Communications Interface) 23 and a bus 24. The processor 20, the display 21, the memory 22 and the communication interface 23 can communicate with each other through the bus 24. The display screen 21 is configured to display a user guidance interface preset in the initial setting mode. The communication interface 23 may transmit information. Processor 20 may call logic instructions in memory 22 to perform the methods in the embodiments described above.
Furthermore, the logic instructions in the memory 22 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product.
The memory 22, which is a computer-readable storage medium, may be configured to store a software program, a computer-executable program, such as program instructions or modules corresponding to the methods in the embodiments of the present disclosure. The processor 30 executes the functional application and data processing, i.e. implements the method in the above-described embodiments, by executing the software program, instructions or modules stored in the memory 22.
The memory 22 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. Further, the memory 22 may include a high speed random access memory and may also include a non-volatile memory. For example, a variety of media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, may also be transient storage media.
In addition, the specific processes loaded and executed by the storage medium and the instruction processors in the terminal device are described in detail in the method, and are not stated herein.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A privacy protection method based on multiple roles is characterized by comprising the following steps:
creating a plurality of roles for the same social account in advance, and detecting the operation of configuring and hiding the roles in real time, wherein the roles are configured with role attributes, the role attributes comprise a display state and a hidden state, the display state is used for controlling the roles to be displayed when the social software is in an operating state, and the hidden state is used for controlling the roles to be hidden when the social software is in the operating state;
when the operation of configuring the hidden role is detected, configuring a hidden password for the corresponding role according to the operation, and setting the role in a hidden state; configuring the hidden state in a role database corresponding to the role, so that when the social information in the role database changes, the background server does not synchronize the change of the social information to terminal equipment logging in social software, and the terminal equipment does not display the social information; the background server synchronizes the hidden state of the hidden role to all terminal equipment logged in the social account, so that the terminal equipment logged in the social account configures the state of the role into the hidden state;
when the terminal equipment executes a first preset operation, hiding the role in the hidden state, and hiding social information corresponding to the role in the hidden state; when the social account configures a plurality of hidden roles, simultaneously triggering the plurality of hidden roles to execute hidden operations through the first preset operation;
after the role is configured to be in the hidden state, the hidden state of the role is stored in a background server, so that the background server controls the social account to hide the hidden role; when a user exits from the login, changes the logged-in terminal or logs in at the same time in a plurality of terminal devices, the role state of the role is not changed;
when the social information corresponds to a role, directly judging the role state of the role, and performing corresponding operation according to the role state; when the social information corresponds to a plurality of roles, the role states of the corresponding roles are respectively judged, and corresponding operation is carried out according to the role states of the roles; the social accounts included in the roles are not repeated or partially overlapped.
2. The privacy protection method based on multiple roles as claimed in claim 1, wherein the configuring, when detecting an operation of configuring a hidden role, a hidden password for its corresponding role according to the operation, and setting the role to a hidden state specifically includes:
when receiving an operation of configuring a hidden role, acquiring the role corresponding to the operation, and receiving a hidden password configured for the role by a user;
and binding the role with the hidden password, and setting the role in a hidden state.
3. The privacy protection method based on multiple roles as claimed in claim 1, wherein the first preset operation at least includes locking a screen, controlling a social software corresponding to the social account to run in a background, logging in the social account again after logging out, and controlling the social software corresponding to the social account to finish running.
4. The privacy protection method based on multiple roles as claimed in claim 1 or 3, wherein hiding the role in the hidden state when the terminal device performs the first preset operation specifically comprises:
when the terminal equipment executes a first preset operation, acquiring all hidden roles in a hidden state;
hiding all hidden roles such that all hidden roles are not revealed at the social software.
5. The privacy protection method based on multiple roles as claimed in claim 1, wherein hiding the role in the hidden state when the terminal device performs the first preset operation to hide the social information corresponding to the role in the hidden state further comprises:
when receiving social information, determining a first role corresponding to the social information, and judging the role state of the first role;
receiving and displaying the social information when the first role is not in a hidden state;
receiving and hiding the social information when the first character is in a hidden state, and displaying the social information when the first character is displayed.
6. The privacy protection method based on multiple roles as claimed in claim 1, wherein hiding the role in the hidden state when the terminal device performs the first preset operation to hide the social information corresponding to the role in the hidden state comprises:
monitoring a first hidden password input by a user when the social software corresponding to the social account is in a foreground running state;
when a first hidden password is monitored, verifying the first hidden password;
and when the verification is successful, displaying a first hidden role corresponding to the first hidden password, and displaying the social information received in the first hidden role hiding process.
7. The privacy protection method based on multiple roles as claimed in claim 6, wherein the monitoring of the first hidden password input by the user when the social software corresponding to the social account is in a foreground running state specifically includes:
when the social software corresponding to the social account is in a foreground running state, displaying at least one role which is not in a hidden state;
monitoring a second preset operation executed by a user on the current role, and controlling the terminal equipment to display a hidden role configuration interface according to the second preset operation;
and receiving a first hidden password input by a user through the hidden role configuration interface.
8. The privacy protection method based on multiple roles as claimed in claim 6, wherein, after displaying the first hidden role corresponding to the first hidden password and displaying the social information received in the process of hiding the first hidden role when the authentication is successful, the method further comprises:
after the hidden role is displayed, monitoring an in-place instruction input by a user, wherein the in-place instruction carries a second hidden password;
and verifying the second hidden password, and configuring a second hidden role corresponding to the second hidden password into a display state when the verification is successful.
9. A computer-readable storage medium storing one or more programs, the one or more programs being executable by one or more processors for performing the steps of the multi-role based privacy protection method of any one of claims 1-8.
10. A terminal device, comprising: a processor, a memory, and a communication bus;
the memory has stored thereon a computer readable program executable by the processor;
the communication bus realizes connection communication between the processor and the memory;
the processor, when executing the computer readable program, implements the steps in the multi-role based privacy preserving method of any one of claims 1-8.
CN201810046091.0A 2018-01-17 2018-01-17 Privacy protection method based on multiple roles, storage medium and terminal equipment Active CN108319865B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810046091.0A CN108319865B (en) 2018-01-17 2018-01-17 Privacy protection method based on multiple roles, storage medium and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810046091.0A CN108319865B (en) 2018-01-17 2018-01-17 Privacy protection method based on multiple roles, storage medium and terminal equipment

Publications (2)

Publication Number Publication Date
CN108319865A CN108319865A (en) 2018-07-24
CN108319865B true CN108319865B (en) 2022-08-02

Family

ID=62894653

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810046091.0A Active CN108319865B (en) 2018-01-17 2018-01-17 Privacy protection method based on multiple roles, storage medium and terminal equipment

Country Status (1)

Country Link
CN (1) CN108319865B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109144651A (en) * 2018-08-27 2019-01-04 郑州云海信息技术有限公司 Hidden method, device, equipment and the medium of attribute information in a kind of schematic diagram
CN111311425A (en) * 2018-12-10 2020-06-19 深圳总和网络科技有限公司 Mobile internet system
CN110113443B (en) * 2019-04-24 2023-01-31 上海连尚网络科技有限公司 Social role management method, computer device and storage medium
CN111589162B (en) * 2020-05-22 2023-06-13 网易(杭州)网络有限公司 Method, device, equipment and storage medium for adding friends in game
CN111984994B (en) * 2020-08-06 2024-02-02 武汉华中时讯科技有限责任公司 Method for associating roles under account with private information flow
CN111984993B (en) * 2020-08-06 2024-02-13 武汉华中时讯科技有限责任公司 Method for associating roles under account with non-private information flow

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617382B (en) * 2013-11-22 2017-10-17 北京奇虎科技有限公司 Method for secret protection and its device
CN104253864B (en) * 2014-09-17 2015-09-16 深圳市多彩人生技术股份有限公司 A kind of data hierarchy storage means and system
CN104270348B (en) * 2014-09-17 2015-09-16 深圳市多彩人生技术股份有限公司 The polygonal look implementation method of the same account of social networks, changing method and system
CN104320327A (en) * 2014-10-28 2015-01-28 深圳市多彩人生技术有限公司 Method and system for enabling multiple roles of one account of social network to be online simultaneously
CN106203011B (en) * 2015-05-06 2020-08-25 腾讯科技(深圳)有限公司 Method and device for entering operating system desktop
CN107577968A (en) * 2017-09-05 2018-01-12 深圳支点电子智能科技有限公司 A kind of mobile terminal is stolen processing method and mobile terminal

Also Published As

Publication number Publication date
CN108319865A (en) 2018-07-24

Similar Documents

Publication Publication Date Title
CN108319865B (en) Privacy protection method based on multiple roles, storage medium and terminal equipment
US10572639B2 (en) Selectively providing personal information and access to functionality on lock screen based on biometric user authentication
US10169564B2 (en) Variable image presentation for authenticating a user
US8595810B1 (en) Method for automatically updating application access security
CA2792707C (en) Associating services to perimeters
JP6571203B2 (en) Privacy protection method and protection device for mobile terminal, and mobile terminal
EP3213464B1 (en) Policy settings configuration with signals
US20160112437A1 (en) Apparatus and Method for Authenticating a User via Multiple User Devices
Sen et al. Putting ‘pressure’on mobile authentication
US9930705B2 (en) Mobile terminal control method, apparatus and system
WO2016188268A1 (en) Multi-user login method, device and storage medium
WO2017114391A1 (en) Method, apparatus, and electronic device based on use of electronic device by multiple accounts
CN111783055A (en) Account information management method and device and electronic equipment
CN106797561A (en) A kind of identity identifying method and wearable device
WO2018054387A1 (en) Method and device for managing permission of terminal
US11237636B2 (en) System and method for network configuration and behavior control by proximity enabled devices
WO2020253197A1 (en) Method and apparatus for managing virtual user identification card, terminal device and storage medium
JP2021500656A (en) User selection key authentication
CN106209569B (en) Authentication method and device for enterprise instant messaging
CN106341379B (en) Information processing method, device and system
US20220121293A1 (en) Character editing on a physical device via interaction with a virtual device user interface
RU2751095C2 (en) Providing access to structured stored data
CN105930501B (en) Network account correlating method and device
US10977350B2 (en) Contact information display method and device, and information display method and device
EP3346406A1 (en) Data input method, and electronic device and system for implementing the data input method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant