CN112163239A - Privacy information protection method and device and electronic equipment - Google Patents

Privacy information protection method and device and electronic equipment Download PDF

Info

Publication number
CN112163239A
CN112163239A CN202011053352.5A CN202011053352A CN112163239A CN 112163239 A CN112163239 A CN 112163239A CN 202011053352 A CN202011053352 A CN 202011053352A CN 112163239 A CN112163239 A CN 112163239A
Authority
CN
China
Prior art keywords
information
input
privacy
chat interface
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011053352.5A
Other languages
Chinese (zh)
Inventor
付凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202011053352.5A priority Critical patent/CN112163239A/en
Publication of CN112163239A publication Critical patent/CN112163239A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application provides a privacy information protection method and device and electronic equipment. The privacy information protection method comprises the following steps: acquiring first information input by a user on a chat interface, wherein the first information comprises privacy information; receiving a first input of a user; in response to the first input, sending second information if the first input indicates sending the first information; the second information is obtained after processing the privacy information in the first information. Therefore, when the first information containing the private information exists in the chat interface, the second information after the private information in the first information is processed can be sent according to the first input of the user, so that the contact person in the chat interface cannot directly see the private information in the first information, and the safety of the user information is improved.

Description

Privacy information protection method and device and electronic equipment
Technical Field
The application belongs to the technical field of computers, and particularly relates to a privacy information protection method and device and electronic equipment.
Background
The input method is widely applied to electronic equipment and various application programs as an information input tool, and when a user chats with other people by using the input method, the user inevitably inputs some private information in a chatting interface. In the process of implementing the present application, the inventor finds that at least the following problems exist in the existing input method, and since the existing input method can only be manually withdrawn after the private information is sent, the private information of the user is easily leaked.
Disclosure of Invention
The embodiment of the application provides a method and a device for protecting private information and electronic equipment, and can solve the problem that the existing input method easily causes the private information of a user to be revealed.
In order to solve the above problems, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a method for protecting private information, including:
acquiring first information input by a user on a chat interface, wherein the first information comprises privacy information;
receiving a first input of a user;
in response to the first input, sending second information if the first input indicates sending the first information;
the second information is obtained after processing the privacy information in the first information.
In a second aspect, an embodiment of the present application provides a privacy information protection apparatus, including:
the system comprises an acquisition module, a chat module and a display module, wherein the acquisition module is used for acquiring first information input by a user on a chat interface, and the first information comprises privacy information;
the receiving module is used for receiving a first input of a user;
the processing module is used for responding to the first input, and sending second information under the condition that the first input indicates that the first information is sent;
the second information is obtained after processing the privacy information in the first information.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or an instruction stored in the memory and executable on the processor, where the program or the instruction, when executed by the processor, implements the steps of the method for protecting private information according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the private information protection method according to the first aspect.
In the embodiment of the application, first information input by a user on a chat interface is obtained, wherein the first information comprises privacy information; receiving a first input of a user; in response to the first input, sending second information if the first input indicates sending the first information; the second information is obtained after processing the privacy information in the first information. Therefore, when the first information containing the private information exists in the chat interface, the second information after the private information in the first information is processed can be sent according to the first input of the user, so that the contact person in the chat interface cannot directly see the private information in the first information, and the safety of the user information is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of a method for protecting private information according to an embodiment of the present disclosure;
fig. 2 is a second flowchart of a method for protecting private information according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a chat interface provided in an embodiment of the present application;
FIG. 4 is a second schematic view of a chat interface provided in the embodiment of the present application;
FIG. 5 is a third schematic diagram of a chat interface provided in the embodiment of the present application;
fig. 6 is a third flowchart of a method for protecting private information according to an embodiment of the present application;
FIG. 7 is a fourth schematic diagram illustrating a chat interface according to an embodiment of the present application;
FIG. 8 is a fifth illustration of a chat interface provided by embodiments of the present application;
fig. 9 is a fourth flowchart of a method for protecting private information according to an embodiment of the present application;
FIG. 10 is a sixth schematic view of a chat interface provided in an embodiment of the present application;
FIG. 11 is a seventh illustration of a chat interface display provided by embodiments of the present application;
fig. 12 is an eighth schematic display diagram of a chat interface provided in the embodiment of the present application;
FIG. 13 is a ninth illustration of a chat interface display provided by embodiments of the present application;
FIG. 14 is a tenth illustrative display of a chat interface provided by embodiments of the present application;
FIG. 15 is an eleventh illustration of a chat interface display provided by embodiments of the present application;
fig. 16 is a block diagram of a private information protection apparatus according to an embodiment of the present application;
fig. 17 is one of the structural diagrams of an electronic device provided in an embodiment of the present application;
fig. 18 is a second structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The display control method, the display control apparatus, the electronic device, and the computer-readable storage medium provided in the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
An embodiment of the present application provides a method for protecting private information, and as shown in fig. 1, the method for protecting private information includes:
step S102, first information input by a user on a chat interface is obtained, and the first information comprises privacy information.
The device in the embodiment of the application can be any mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted electronic device, a wearable device, a super-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the mobile terminal is provided with an input method, so that information can be input in a chat interface to chat with a contact person in the chat interface based on the input method.
The first information is information input in the chat interface based on an input method, and may include text information such as Chinese and English characters, numbers, symbols, and the like. The privacy information is user-defined text information containing personal privacy, such as an identification number, a mobile phone number, an address, a name and the like. The mobile terminal user (hereinafter referred to as user) can input the content to be input in the chat interface through the input method and send the content to the contact person in the chat interface, so that the contact person can view the information sent by the user on the mobile device of the contact person. In order to protect the private information of the user from being leaked, the first information in the chat interface needs to be identified, so as to confirm whether the chat interface contains the private information.
Specifically, the manner of acquiring the first information input by the user on the chat interface may be based on a preset keyword for recognition, or based on a preset entity recognition model for recognition. When the recognition is performed based on the preset keywords, the first information in the chat interface needs to be matched with the preset keywords according to the keywords about the privacy information preset by the user, such as the keyword "xiaohong" about the name, the keyword "beijing city x district" about the address, and the like, and whether the chat interface contains the first information is determined according to the matching result. When the recognition is carried out based on the preset entity recognition model, the context information in the chat interface needs to be input into the preset entity recognition model, vocabularies of all key fields related to the privacy information are obtained through pre-training in the preset entity recognition model, and the privacy information in the context information in the chat interface and the tags of the privacy information are extracted, so that whether the chat interface contains the first information or not is determined. Since the real-time recognition model is the prior art, it is not described in detail herein.
Step S104, receiving a first input of a user.
The first input comprises at least one of: click input, slide input, press input. Specifically, the input mode in the embodiments of the present application is not particularly limited, and may be any realizable mode.
Step S106, responding to the first input, and sending second information under the condition that the first input indicates sending the first information; and the second information is obtained after processing the privacy information in the first information.
After receiving the first input of the user, the second information may be transmitted in response to the first input in a case where the first input indicates that the first information is transmitted. In this step, the user may indicate that the first information needs to be sent to the contact of the chat interface by clicking a send button of the chat interface, and send the second information to the corresponding contact. The second information is obtained by processing the privacy information in the first information, and may include the privacy information and desensitization information corresponding to the privacy information, or only include the desensitization information corresponding to the privacy information, which is not specifically limited in this application.
In this embodiment, when the chat interface has the first information including the private information, the second information obtained by processing the private information in the first information may be sent according to the first input of the user, so that the contact person in the chat interface cannot directly see the private information in the first information, thereby improving the security of the user information.
Further, referring to fig. 2, fig. 2 is a second flowchart of a method for protecting privacy information according to an embodiment of the present application, and based on the embodiment shown in fig. 1, when a contact corresponding to a chat interface is of a first type, the step S106 is to send the second information, which may specifically include:
step S108, second information and first indication information are sent, wherein the first indication information is used for indicating that the privacy information in the second information is processed under the condition that the second information receives second input.
The first type is a type of a contact having no viewing authority set by a user. The second input comprises at least one of: click input, slide input, press input. Specifically, the input mode in the embodiments of the present application is not particularly limited, and may be any realizable mode. In this step, the user can perform a second input on the second information in the chat interface, such as a long press or a double click, and then display the contact person viewing permission options in the chat interface, the user sets the viewing permission of each contact person from the contact person viewing permission options, after the setting is completed, the mobile terminal can send the second information and the first indication information to the server of the application to which the chat interface belongs, and the server performs the processing on the privacy information in the second information of the chat interface of the contact person of the first type according to the first indication information. The removal process at this time may be to cancel the display of the second information or to desensitize the display of the second information.
In response to the first input, in the case that the first input indicates to send the first information, sending the second information and the first indication information; the second information is obtained after processing the private information in the first information, and the first indication information is used for indicating that the private information in the second information is to be processed under the condition that the second information receives a second input
Referring to fig. 3 to 5, fig. 3 is a schematic display diagram of a chat interface displaying a contact viewing permission option on a mobile terminal, where a user may configure viewing permissions of different contacts in the chat interface based on the contact viewing permission option 310, and if the configured contact a is visible and the configured contact B is invisible, a server respectively performs display control on chat interfaces of the contact a and the contact B after receiving first indication information, and finally, the chat interface of the contact a is as shown in fig. 4, and second information 410 of private information is displayed on the chat interface of the contact a; contact B's chat interface as shown in fig. 5, second information 510 containing desensitization information is displayed at contact B's chat interface.
In this embodiment, the contact viewing permission setting may be performed on the second information, and the first indication information including the contact viewing permission information is sent to the server, and the server may perform cancellation display or desensitization display on the privacy information in the chat interface of the first type of contact according to the first indication information, so that a contact without the viewing permission cannot view the privacy information of the user, and a contact with the viewing permission may view the privacy information of the user, thereby playing a role in protecting the privacy information of the user.
Referring to fig. 6, fig. 6 is a third flowchart of a privacy information protection method provided in the embodiment of the present application, and based on the embodiment shown in fig. 1, when a contact corresponding to a chat interface is of a second type, step S106 above sends second information, which specifically includes:
and S110, sending second information and second indication information, wherein the second indication information is used for canceling the display of the second information under the condition that the display time length of the second information is greater than a preset value.
And sending second information and first indication information, wherein the first indication information is used for indicating that the privacy information in the second information is processed under the condition that the second information receives a second input.
The second type is a type of a contact with a view duration limit set by a user. In this step, the user may perform an input operation on the second information in the chat interface, such as long pressing or double clicking, and further display a viewing duration option, such as 0S, 30S, 1min, 5min, 10min, and the like, in the chat interface. The user sets the display duration of the second information from the viewing duration option, after the setting is finished, the mobile terminal can send the second information and the second indication information to the server of the application to which the chat interface belongs, the server cancels the display of the privacy information in the second information of the chat interface of the second type of contact according to the second indication information, and specifically, the second information is cancelled or desensitized to be displayed under the condition that the display duration of the second information of the chat interface of the second type of contact is longer than the preset duration in the viewing duration option.
Referring to fig. 7 to 8, fig. 7 is a display schematic diagram of a chat interface displaying a viewing duration option on a mobile terminal, a user may configure a display duration of private information based on the viewing duration option 710, such as 1min, 2min, 5min, and the like, after the setting is completed, send second information and second indication information to a server of an application to which the chat interface belongs, after receiving the second indication information, the server determines whether the second information display duration reaches a preset duration corresponding to the viewing duration information, and when the second information display duration reaches the preset duration, cancel or desensitize the display of the second information 810, where the schematic diagram of the chat interface of a second type of contact in the chat interface is shown in fig. 8.
In this embodiment, the viewing duration of the second information may be set, and the second indication information including the viewing duration information may be sent to the server, and the server may cancel display of the privacy information in the chat interface of the second type of contact according to the second indication information, so that even if the second information is sent to the chat interface of the contact and cannot be withdrawn, the second information may be canceled and displayed, thereby playing a role in protecting the privacy information of the user.
In an embodiment of the application, after the step S102 of acquiring the first information input by the user in the chat interface, the method includes:
determining a target category of the privacy information;
and storing the privacy information into a word bank corresponding to the target category of the input method.
Each private information has its corresponding category, such as address information, identity information, phone number, etc. of the user. At the beginning of establishment of the privacy word stock of the input method, the mobile terminal can determine a target category corresponding to the privacy information through a preset entity recognition model under the condition that the privacy information in the first information is recognized, and store the privacy information into the word stock of the target category in the privacy word stock under the condition that the target category is determined. Therefore, a word bank with more private information is formed, the subsequent process can be conveniently and directly identified on the basis of the word bank, and the identification efficiency and accuracy of the private information are improved.
The privacy information protection method of the above embodiment is further described below by taking fig. 9 to fig. 13 as examples.
Referring to fig. 9, fig. 9 is a fourth flowchart of a method for protecting private information according to an embodiment of the present application, where the flowchart includes the following steps:
step S902, acquiring first information input by a user on a chat interface;
step S904, identifying the privacy information in the first information;
step S906, determining the target category of the privacy information;
step S908, the privacy information is added to the thesaurus of the input method corresponding to the target category.
The chat interface based on the input method may be a chat interface in a chat application, as shown in fig. 10, fig. 10 is a schematic view of a chat interface without performing privacy information identification, the chat interface includes a chat dialog box display area 1000, an input box 1010 and an input method function display area 1020, and information in the chat dialog box is history dialog information between a user and a contact in the chat interface. After the chat interface shown in fig. 10 is identified with the private information, the private information is highlighted, and a corresponding tag is displayed near the private information, as shown in fig. 11, in the chat interface shown in fig. 11, it is identified that the input information includes the phone number of the user, at this time, the phone number of the user is highlighted, and a "phone" tag 1110 is displayed beside the phone number, at this time, the user 1120 may directly operate the tag 1110, such as clicking, long pressing, and the like, to store the private information into the private word stock.
Referring to fig. 12, fig. 12 is a schematic diagram illustrating a display of a privacy thesaurus in a chat interface, so that the privacy information of the privacy thesaurus can be displayed in an input method function display area without affecting the user to view chat content. All the private information in the private thesaurus can be viewed in the area through sliding left and right, or sliding up and down. Specifically, the privacy information of the different displayed pages may be viewed in a side-to-side sliding manner, such as the solid circle "●" indicating the currently displayed page and the solid circle "O" indicating the undisplayed page. In the privacy thesaurus, different tags 1200 can be set according to the types of the privacy information, and different types of privacy information 1210 can be associated with the corresponding tags 1200, such as a plurality of telephone numbers contained in a "telephone" tag, a plurality of addresses contained in an "address" tag, and the like. If the user needs to edit or delete the phone number at the beginning of 153 in fig. 12, the user may double-click the display frame of the private information to edit a new phone number, or may press the display frame for a long time and then click the close button to delete the phone number, and the effect diagram of the modification interface for the private thesaurus is shown in fig. 13.
In the embodiment, the user establishes the privacy word bank based on the privacy information identified on the chat interface, so that the user can conveniently and subsequently directly identify the privacy information based on the word bank, and the identification efficiency and accuracy of the privacy information are improved. Meanwhile, the user can check, edit and delete the privacy information in the privacy word stock, so that the user can update the privacy information in the privacy word stock in real time, and the personalized setting of the privacy information of the user is realized.
Further, after storing the private information in the thesaurus of the input method corresponding to the target category in the above step S908, the method includes:
step S910, under the condition that the third information is displayed in the input box of the chat interface, identifying target privacy information in the third information based on the word stock;
step S912, displaying the target privacy information in a target manner, and displaying a tag corresponding to the category to which the target privacy information belongs.
In this embodiment, by identifying the third information in the input box in the chat interface, when the target privacy information is identified, the target privacy information may be displayed in a target manner, for example, the target privacy information is highlighted, or a text background color is added, and meanwhile, a tag corresponding to a category to which the target privacy information belongs is displayed to remind a user, so that the personal privacy information is prevented from being leaked without attention of the user.
The privacy information protection method of the input method according to the above embodiment is further described below with reference to fig. 14 to 15 as examples. Referring to fig. 14, fig. 14 is a schematic view showing a chat interface when third information is input in an input box. For example, the input information "i is born in 7 months and i is a leone", which includes the privacy information of the birth date and constellation of the user, and at this time, when the user inputs this third message, the "7 months" and the "leone" are highlighted, and the labels 1430 of the "birth date" and the "constellation" are displayed above the "7 months" and the "leone", respectively, to prompt the user of the privacy information here. Further, the user may also perform a desensitization process manually based on the chat interface to desensitize the original information, the effect of desensitization is shown in fig. 15, and "i am Capricorn" appears in the input block 1510 shown in fig. 15. The desensitization information corresponding to the privacy information can be set by the user in the privacy lexicon, and the replacement information can be randomly selected based on a preset desensitization algorithm.
In this embodiment, the third information being input by the input box may be displayed in a target manner, the tag corresponding to the privacy information may be displayed, and desensitization processing may be performed on the privacy information, so as to facilitate reminding a user that the privacy information exists in the currently input information, and the privacy information may be replaced with other non-privacy information before being sent to the contact person, thereby achieving the purpose of protecting the privacy information of the user.
Fig. 16 is a schematic diagram showing a possible structure of the private information protection apparatus according to the embodiment of the present application. As shown in fig. 16, the private information protection apparatus 1600 includes:
an obtaining module 1601, configured to obtain first information input by a user on a chat interface, where the first information includes privacy information;
a receiving module 1602, configured to receive a first input of a user;
a processing module 1603 for responding to the first input, and sending the second information under the condition that the first input indicates to send the first information;
and the second information is obtained after processing the privacy information in the first information.
Further, in a case that the contact corresponding to the chat interface is of the first type, the processing module 1603 is further configured to:
and sending second information and first indication information, wherein the first indication information is used for indicating that the privacy information in the second information is processed under the condition that the second information receives a second input.
Further, in a case that the contact corresponding to the chat interface is of the second type, the processing module 1603 is further configured to:
and sending second information and second indication information, wherein the second indication information is used for canceling the display of the second information under the condition that the display time length of the second information is greater than a preset value.
Further, the private information protection apparatus 1600 further includes:
the determining module is used for determining the target category of the privacy information;
and the storage module is used for storing the privacy information into a word bank corresponding to the target category of the input method.
Further, the private information protection apparatus 1600 further includes:
the identification module is used for identifying target privacy information in the third information based on the word stock under the condition that the third information is displayed in the input box of the chat interface;
and the display module is used for displaying the target privacy information in a target mode and displaying the labels corresponding to the categories to which the target privacy information belongs.
It should be noted that the privacy information protection apparatus can implement each process of the privacy information protection method provided in the embodiment of the present application, and can achieve the same technical effect, and for avoiding repetition, details are not repeated here.
The privacy information protection device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The privacy information protection device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
An embodiment of the present application provides an electronic device, as shown in fig. 17, the electronic device 1700 includes:
the processor 1701 and the memory 1702 are respectively a program or an instruction stored in the memory 1702 and executable on the processor 1701, and when the program or the instruction is executed by the processor 1701, the program or the instruction implements the processes of the above embodiment of the method for protecting privacy information, and can achieve the same technical effect, and in order to avoid repetition, the detailed description is omitted here.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic device and the non-mobile electronic device described above.
Fig. 18 is a schematic hardware structure diagram of an electronic device implementing an embodiment of the present application. The electronic device 1800 includes, but is not limited to: the electronic device 1800 includes, but is not limited to: radio frequency unit 1801, network module 1802, audio output unit 1803, input unit 1804, sensors 1805, display unit 1806, user input unit 1807, interface unit 1808, memory 1809, and processor 1810.
Those skilled in the art will appreciate that the electronic device 1800 may also include a power supply (e.g., a battery) for powering the various components, and that the power supply may be logically connected to the processor 1810 via a power management system to perform functions such as managing charging, discharging, and power consumption. The electronic device structure shown in fig. 18 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description thereof is omitted.
The processor 1810 is configured to acquire first information input by a user on the chat interface, where the first information includes privacy information; a user input unit 1807, configured to receive a first input by a user; processor 1810, further configured to send, in response to the first input, second information if the first input indicates sending the first information; and the second information is obtained after processing the privacy information in the first information.
Further, the processor 1810 is further configured to send second information and first indication information, where the first indication information is used to indicate that the privacy information in the second information is to be processed when the second information receives a second input.
Further, the processor 1810 is further configured to send second information and second indication information, where the second indication information is used to cancel displaying the second information when the display duration of the second information is longer than a preset value.
Further, the processor 1810 is further configured to determine a target category of the private information; and storing the privacy information into a word bank corresponding to the target category of the input method.
Further, the processor 1810 is further configured to, in a case that the third information is displayed in the input box of the chat interface, identify, based on the thesaurus, the target privacy information in the third information; and displaying the target privacy information in a target mode, and displaying the label corresponding to the category to which the target privacy information belongs.
It should be understood that in the embodiment of the present application, the input Unit 1804 may include a Graphics Processing Unit (GPU) 18041 and a microphone 18042, and the Graphics Processing Unit 18041 processes image data of still pictures or videos obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 1806 may include a display panel 18061, and the display panel 18061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1807 includes a touch panel 18071 and other input devices 18072. A touch panel 18071, also referred to as a touch screen. The touch panel 18071 may include two parts of a touch detection device and a touch controller. Other input devices 18072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 1809 may be used to store software programs as well as various data, including but not limited to application programs and an operating system. Processor 1810 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 1810.
Embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the above-mentioned privacy information protection method.
In the embodiment of the present application, the computer-readable storage medium can implement each process of the privacy information protection method provided in the embodiment of the present application, and can achieve the same technical effect, and is not described here again to avoid repetition. The computer-readable storage medium includes a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the methods of the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (12)

1. A method for protecting private information, the method comprising:
acquiring first information input by a user on a chat interface, wherein the first information comprises privacy information;
receiving a first input of a user;
in response to the first input, sending second information if the first input indicates sending the first information;
the second information is obtained after processing the privacy information in the first information.
2. The method of claim 1, wherein in a case that the contact corresponding to the chat interface is of the first type, the sending the second information comprises:
and sending the second information and first indication information, wherein the first indication information is used for indicating that the privacy information in the second information is processed under the condition that the second information receives a second input.
3. The method of claim 1, wherein in a case that the contact corresponding to the chat interface is of the second type, the sending the second information comprises:
and sending the second information and second indication information, wherein the second indication information is used for indicating that the second information is cancelled to be displayed under the condition that the display time length of the second information is greater than a preset value.
4. The method of claim 1, after the obtaining the first information input by the user in the chat interface, comprising:
determining a target category of the private information;
and storing the privacy information into a word bank of an input method corresponding to the target category.
5. The method of claim 4, wherein after storing the private information in a thesaurus of input methods corresponding to the target category, the method comprises:
under the condition that third information is displayed in an input box of the chat interface, identifying target privacy information in the third information based on the word stock;
and displaying the target privacy information in a target mode, and displaying a label corresponding to the category to which the target privacy information belongs.
6. An apparatus for protecting private information, the apparatus comprising:
the system comprises an acquisition module, a chat module and a display module, wherein the acquisition module is used for acquiring first information input by a user on a chat interface, and the first information comprises privacy information;
the receiving module is used for receiving a first input of a user;
the processing module is used for responding to the first input, and sending second information under the condition that the first input indicates that the first information is sent;
the second information is obtained after processing the privacy information in the first information.
7. The apparatus for protecting private information according to claim 6, wherein, in a case that the contact corresponding to the chat interface is of the first type, the processing module is further configured to:
and sending the second information and first indication information, wherein the first indication information is used for indicating that the privacy information in the second information is processed under the condition that the second information receives a second input.
8. The apparatus for protecting private information according to claim 6, wherein, in a case that the contact corresponding to the chat interface is of the second type, the processing module is further configured to:
and sending the second information and second indication information, wherein the second indication information is used for indicating that the second information is cancelled to be displayed under the condition that the display time length of the second information is greater than a preset value.
9. The apparatus according to claim 6, characterized in that the apparatus further comprises:
a determination module for determining a target category of the privacy information;
and the storage module is used for storing the privacy information into a word bank of an input method corresponding to the target category.
10. The apparatus according to claim 9, characterized in that the apparatus further comprises:
the identification module is used for identifying target privacy information in third information based on the word stock under the condition that the third information is displayed in an input box of the chat interface;
and the display module is used for displaying the target privacy information in a target mode and displaying the labels corresponding to the categories to which the target privacy information belongs.
11. An electronic device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the method of protecting private information according to any one of claims 1-5.
12. A readable storage medium, on which a program or instructions are stored, which when executed by a processor, implement the steps of the private information protection method according to any one of claims 1 to 5.
CN202011053352.5A 2020-09-29 2020-09-29 Privacy information protection method and device and electronic equipment Pending CN112163239A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011053352.5A CN112163239A (en) 2020-09-29 2020-09-29 Privacy information protection method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011053352.5A CN112163239A (en) 2020-09-29 2020-09-29 Privacy information protection method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN112163239A true CN112163239A (en) 2021-01-01

Family

ID=73860929

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011053352.5A Pending CN112163239A (en) 2020-09-29 2020-09-29 Privacy information protection method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112163239A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113312662A (en) * 2021-05-28 2021-08-27 维沃移动通信有限公司 Message processing method and device and electronic equipment
CN113452530A (en) * 2021-06-29 2021-09-28 维沃移动通信有限公司 Information transmission method and device
CN113840035A (en) * 2021-09-28 2021-12-24 维沃移动通信(杭州)有限公司 Information sharing method and device, electronic equipment and readable storage medium
CN113965640A (en) * 2021-10-11 2022-01-21 维沃移动通信有限公司 Message processing method and device
CN114760259A (en) * 2022-04-27 2022-07-15 深圳小湃科技有限公司 Offline message sending method and device, electronic equipment and readable storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506410A (en) * 2014-12-03 2015-04-08 小米科技有限责任公司 Instant communication method and device
CN106534572A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Information display method and device and terminal
CN106570405A (en) * 2016-11-04 2017-04-19 北京百度网讯科技有限公司 Method and apparatus for performing encryption/decryption on text in input method
CN106709383A (en) * 2016-11-30 2017-05-24 广东欧珀移动通信有限公司 Communication message protection method and device and mobile terminal
CN107438023A (en) * 2016-05-26 2017-12-05 周兰兰 Session time slot scrambling
CN107846351A (en) * 2017-10-23 2018-03-27 苏州亿科赛卓电子科技有限公司 A kind of chat messages sensitive information encryption method and device
CN107889070A (en) * 2017-11-08 2018-04-06 广东欧珀移动通信有限公司 Image processing method, device, terminal and computer-readable recording medium
CN109995542A (en) * 2019-03-25 2019-07-09 联想(北京)有限公司 Information processing method, device and electronic equipment
CN110188524A (en) * 2019-05-23 2019-08-30 维沃移动通信有限公司 Information ciphering method, information decryption method and terminal
CN111143805A (en) * 2019-12-27 2020-05-12 维沃移动通信有限公司 Operation method and device and electronic equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506410A (en) * 2014-12-03 2015-04-08 小米科技有限责任公司 Instant communication method and device
CN107438023A (en) * 2016-05-26 2017-12-05 周兰兰 Session time slot scrambling
CN106570405A (en) * 2016-11-04 2017-04-19 北京百度网讯科技有限公司 Method and apparatus for performing encryption/decryption on text in input method
CN106534572A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Information display method and device and terminal
CN106709383A (en) * 2016-11-30 2017-05-24 广东欧珀移动通信有限公司 Communication message protection method and device and mobile terminal
CN107846351A (en) * 2017-10-23 2018-03-27 苏州亿科赛卓电子科技有限公司 A kind of chat messages sensitive information encryption method and device
CN107889070A (en) * 2017-11-08 2018-04-06 广东欧珀移动通信有限公司 Image processing method, device, terminal and computer-readable recording medium
CN109995542A (en) * 2019-03-25 2019-07-09 联想(北京)有限公司 Information processing method, device and electronic equipment
CN110188524A (en) * 2019-05-23 2019-08-30 维沃移动通信有限公司 Information ciphering method, information decryption method and terminal
CN111143805A (en) * 2019-12-27 2020-05-12 维沃移动通信有限公司 Operation method and device and electronic equipment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113312662A (en) * 2021-05-28 2021-08-27 维沃移动通信有限公司 Message processing method and device and electronic equipment
CN113452530A (en) * 2021-06-29 2021-09-28 维沃移动通信有限公司 Information transmission method and device
CN113840035A (en) * 2021-09-28 2021-12-24 维沃移动通信(杭州)有限公司 Information sharing method and device, electronic equipment and readable storage medium
CN113965640A (en) * 2021-10-11 2022-01-21 维沃移动通信有限公司 Message processing method and device
CN113965640B (en) * 2021-10-11 2023-09-01 维沃移动通信有限公司 Message processing method and device
CN114760259A (en) * 2022-04-27 2022-07-15 深圳小湃科技有限公司 Offline message sending method and device, electronic equipment and readable storage medium
CN114760259B (en) * 2022-04-27 2024-01-16 深圳小湃科技有限公司 Offline message sending method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN112163239A (en) Privacy information protection method and device and electronic equipment
CN112804445B (en) Display method and device and electronic equipment
CN112269798B (en) Information display method and device and electronic equipment
CN112947807A (en) Display method and device and electronic equipment
CN112099704A (en) Information display method and device, electronic equipment and readable storage medium
CN112699363A (en) Graphic code identification method and device and electronic equipment
CN112528326A (en) Information processing method and device and electronic equipment
CN112533072A (en) Image sending method and device and electronic equipment
CN115618826A (en) Form filling method and device, electronic equipment and medium
CN111651106A (en) Unread message prompting method, unread message prompting device, unread message prompting equipment and readable storage medium
CN111641550A (en) Communication object adding method and device and electronic equipment
CN111917628A (en) Message processing method and device and electronic equipment
CN114443203A (en) Information display method and device, electronic equipment and readable storage medium
CN111898159B (en) Risk prompting method, risk prompting device, electronic equipment and readable storage medium
CN112578975A (en) Information processing method and device and electronic equipment
CN112184168A (en) Reminding task generation method and device and electronic equipment
CN111857997A (en) Application program body-separating identification display method, device, equipment and medium
WO2023051508A1 (en) Graphic code display method and apparatus
WO2023061267A1 (en) Personal information display method and apparatus, and device and storage medium
CN113364915B (en) Information display method and device and electronic equipment
CN113840035B (en) Information sharing method and device, electronic equipment and readable storage medium
CN113127653B (en) Information display method and device
CN115061580A (en) Input method, input device, electronic equipment and readable storage medium
CN113138675A (en) Information display method and device and electronic equipment
CN114020384A (en) Message display method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210101