CN108491733A - Method and apparatus, storage medium, electronic equipment are recommended in privacy application - Google Patents

Method and apparatus, storage medium, electronic equipment are recommended in privacy application Download PDF

Info

Publication number
CN108491733A
CN108491733A CN201810317212.0A CN201810317212A CN108491733A CN 108491733 A CN108491733 A CN 108491733A CN 201810317212 A CN201810317212 A CN 201810317212A CN 108491733 A CN108491733 A CN 108491733A
Authority
CN
China
Prior art keywords
application
privacy
user
list
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810317212.0A
Other languages
Chinese (zh)
Inventor
张俊
张伟杰
谭春宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810317212.0A priority Critical patent/CN108491733A/en
Publication of CN108491733A publication Critical patent/CN108491733A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

This application involves a kind of applications of privacy to recommend method and apparatus, electronic equipment, computer readable storage medium, initial Privacy list of application recommended to the user is obtained, user is obtained and the application on electronic equipment is carried out using the generated and relevant use habit data of privacy information.According to initial Privacy list of application combine with the relevant use habit data of privacy information, obtain target privacy list of application recommended to the user.Initial Privacy list of application is obtained first, since the privacy application recommended in initial Privacy list of application may be inconsistent with the actual use habit of user, then obtain user and the application on electronic equipment is carried out using the generated and relevant use habit data of privacy information.To which the two to be combined, the target privacy list of application more met with user is obtained so that user screens.User can be quick and be accurately added to privacy list of application using batch by itself need to hide, without carrying out one by one addition manually.

Description

Method and apparatus, storage medium, electronic equipment are recommended in privacy application
Technical field
This application involves field of computer technology, recommend method and apparatus, storage to be situated between more particularly to a kind of application of privacy Matter, electronic equipment.
Background technology
With universal and mobile Internet the rapid development of mobile terminal, user's usage amount of mobile terminal is increasingly Greatly.User cannot judge installed application program needs add in which mobile terminal at the first time during use It is added in the list of secret protection.General user need to carry out one by one manually need to privacy application to be added be added to privacy guarantor Protect list, it is clear that this mode added manually one by one is very inconvenient, and prodigious puzzlement is caused to the use of user.
Invention content
Method and apparatus, storage medium, electronic equipment are recommended in a kind of privacy application of the embodiment of the present application offer, can be direct Recommend privacy application to user.
A kind of privacy application recommendation method, including:
Obtain initial Privacy list of application recommended to the user;
It obtains the user application on electronic equipment practised with relevant use of privacy information using generated Used data;
According to the initial Privacy list of application in conjunction with the described and relevant use habit data of privacy information, obtain to institute State the target privacy list of application of user's recommendation.
A kind of privacy application recommendation apparatus, described device include:
Initial Privacy list of application acquisition module, for obtaining initial Privacy list of application recommended to the user;
Use habit data acquisition module carries out using produced application on electronic equipment for obtaining the user With the relevant use habit data of privacy information;
Target privacy list of application obtains module, for being believed with privacy in conjunction with described according to the initial Privacy list of application Relevant use habit data are ceased, the target privacy list of application recommended to the user is obtained.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of privacy application recommendation method as described above is realized when row.
A kind of electronic equipment, including memory, processor and storage are on a memory and the meter that can run on a processor The step of calculation machine program, processor executes privacy application recommendation method as described above when executing computer program.
Method and apparatus, storage medium, electronic equipment are recommended in above-mentioned privacy application, obtain initial Privacy recommended to the user List of application obtains user and carries out the application on electronic equipment using the generated and relevant use habit number of privacy information According to.According to initial Privacy list of application combine with the relevant use habit data of privacy information, obtain target recommended to the user Privacy list of application.Initial Privacy list of application is obtained first, by the privacy application recommended in initial Privacy list of application May be inconsistent with the actual use habit of user, therefore obtain user again and the application on electronic equipment is carried out using produced With the relevant use habit data of privacy information.To which the two to be combined, it is hidden to obtain the target more met with user Private list of application screens for user.User can be quick and itself will accurately need to hide hidden using being added in batches Private list of application, without carrying out one by one addition manually.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the internal structure chart of electronic equipment in one embodiment;
Fig. 2 is the applied environment figure of privacy application recommendation method in one embodiment;
Fig. 3 is the flow chart of privacy application recommendation method in one embodiment;
Fig. 4 is the flow chart that use habit data method is obtained in Fig. 3;
Fig. 5 is the flow chart of privacy application recommendation method in one embodiment;
Fig. 6 is the structural schematic diagram of privacy application recommendation apparatus in one embodiment;
Fig. 7 is the structural schematic diagram of privacy application recommendation apparatus in one embodiment;
Fig. 8 is the structural schematic diagram of privacy application recommendation apparatus in one embodiment;
Fig. 9 is the block diagram of the part-structure of the relevant mobile phone of electronic equipment provided in one embodiment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
Fig. 1 is the internal structure schematic diagram of electronic equipment in one embodiment.As shown in Figure 1, the electronic equipment includes logical Cross processor, memory and the network interface of system bus connection.Wherein, which is used to provide calculating and control ability, Support the operation of entire electronic equipment.Memory for storing data, program etc., at least one computer journey is stored on memory Sequence, the computer program can be executed by processor, to realize the privacy suitable for electronic equipment provided in the embodiment of the present application Using recommendation method.Memory may include that magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. are non-easily The property lost storage medium or random access memory (Random-Access-Memory, RAM) etc..For example, in one embodiment In, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system and calculating Machine program.The computer program can be performed by processor, for a kind of realization privacy that each embodiment is provided below Using recommendation method.Built-in storage provides the fortune of cache for the operating system computer program in non-volatile memory medium Row environment.Network interface can be Ethernet card or wireless network card etc., for being communicated with external electronic equipment.The electronics Equipment can be mobile phone, tablet computer or personal digital assistant or Wearable etc..
Privacy application recommendation method provided by the embodiments of the present application can be applied in environment as shown in Figure 2.With reference to 2 institute of figure Show, electronic equipment 202 is connect by network with server 204.
In one embodiment, as shown in figure 3, providing a kind of privacy application recommendation method, it is applied to Fig. 1 in this way In electronic equipment for illustrate, including:
Step 310, initial Privacy list of application recommended to the user is obtained.
Electronic equipment obtains server initial Privacy list of application recommended to the user.It is current that server collects a large number of users The privacy list of application of the secret protection of setting analyzes the feature applied in privacy list of application, counts the application journey of general character These application programs with general character are added to initial Privacy list of application by sequence.The initial Privacy application stored on server List can be the different list of one or more parts.For example, a initial Privacy list of application may include wechat, QQ, footpath between fields footpath between fields Etc. chat applications, further include broadcast soon, B station etc. Video Applications.
Step 320, obtain user to the application on electronic equipment carry out using it is generated with privacy information is relevant makes With custom data.
Specifically, user carries out using generated and privacy information relevant use habit the application on electronic equipment Data may include that user input, the output waited when using the application have been related to privacy information, and privacy information includes that wealth is handed over Easily, identity information etc..User can also be included to some access rights of application with the relevant use habit data of privacy information Setting, for example, user is provided with the application to the application cannot access location information, address list, photograph album etc..User is obtained to exist Using each on electronic equipment using the generated and relevant use habit data of privacy information.
Step 330, according to initial Privacy list of application combine with the relevant use habit data of privacy information, obtain to The target privacy list of application that family is recommended.
There is initial Privacy list of application and then is combining acquired user using each on electronic equipment Using the generated and relevant use habit data of privacy information.First determine whether is application in initial Privacy list of application It is already installed in the electronic equipment of user, if so, continuing to judge that these are mounted and being present in initial Privacy application row Application in table continues to determine whether to be related to privacy information during the use of this user, if being related to privacy information Continue to obtain some and the relevant use habit data of privacy information of user.If the application is related to privacy information (including money Wealth transaction, identity information etc.) or user to the application be provided with the application cannot access location information, address list, photograph album Deng, then the Apply Names are added in target privacy list of application, which is recommended into user, so as to User selects in target privacy list of application, and selected application batch is hidden.
In the embodiment of the present application, initial Privacy list of application is obtained first, by being recommended in initial Privacy list of application Privacy application may be inconsistent with the actual use habit of user, therefore obtain again user on electronic equipment application carry out Use the generated and relevant use habit data of privacy information.To which the two to be combined, obtain more according with user The target privacy list of application of conjunction screens for user.User can be quick and itself is accurately needed hiding application batch Amount is added to privacy list of application, without carrying out one by one addition manually.
In one embodiment, initial Privacy list of application recommended to the user is obtained, including:
Initial Privacy list of application recommended to the user is obtained from server, initial Privacy list of application is server pair The privacy application that collected different user is arranged on an electronic device carries out statistical analysis and obtains.
Specifically, the privacy list of application of itself upper set progress secret protection is uploaded to service by electronic equipment Device, server collect privacy list of application of a large number of users to the current set secret protection of electronics setting.And to collected The privacy list of application of all users carry out statistical analysis, it is the privacy that is hidden of user's high frequency to analyze those applications Using.For example, analyzing the data of collected 10,000 samples, the privacy application that user's high frequency is hidden is analyzed Including wechat, QQ, footpath between fields footpath between fields, broadcast soon, B station etc..It is of course also possible to according to collected sample analysis go out other users high frequency into The hiding application of row.The privacy that these high frequencies are hidden is applied and just constitutes initial Privacy list of application.Electronic equipment again from Initial Privacy list of application recommended to the user is got in server.
In the embodiment of the present application, user is collected by server, the privacy being hidden application is set on an electronic device Then sample data analyzes the privacy application for showing that the general high frequency of user is hidden, by these users further according to sample data The privacy application that high frequency is hidden constitutes initial Privacy list of application, and the initial Privacy list of application is recommended user, When user setting privacy is applied as reference.The initial Privacy that big data analysis obtains is carried out by server in this way to answer Can be more accurate with the data in list, more there is reference value.
In one embodiment, as shown in figure 4, obtain user to the application on electronic equipment carry out using it is generated with The relevant use habit data of privacy information, including:
Step 322, user in preset time period is collected respectively to carry out using produced application each of on electronic equipment Use data.
Preset time period could be provided as one week or one month, or use the frequency of electronic equipment correspondingly according to user It is configured.For example, it is also possible to be set as one day or three days as a preset time period.After provided with preset time period, User is just collected in the preset time period application each of on electronic equipment is carried out to use data using generated.It collects Using data may include within a preset period of time user using application frequency, using duration, inputoutput data, user Whether set can access location information, address list, photograph album etc..
Step 324, it is obtained in data and privacy information is relevant uses data from using.
Above-mentioned collected use data are screened, is involved in and goes out with the relevant use data screening of privacy information Come.If for example, to privacy information (including wealth transaction, identity information etc.) or some are important merely involved in inputoutput data Whether location information, address list, photograph album etc. can be accessed set by its information etc. and user.By above-mentioned with privacy information phase Pass is come out using data screening.
Pair step 326, to privacy information it is relevant using data carry out deep learning be applied it is related with privacy information Use habit data.
It is relevant using after data with privacy information getting that user generated using some application, to these with Privacy information is relevant to carry out deep learning using data, learns user when using the application more particularly, to privacy letter Use habit when breath.For example, the probability of occurrence and privacy classes of the privacy information being related to using the application when, from And judge that this applies the power of privacy according to the probability of occurrence for the privacy information being related to and privacy classes.
In the embodiment of the present application, user is collected using the use data of application within a preset period of time, therefrom Filter out useful information (generated and privacy information is relevant when using the application uses data).Then useful to these Information carry out deep learning, after deep learning, learn user's generated and privacy using the application when The relevant use habit data of information.It can be reflected using for user from the relevant use habit data of privacy information Privacy it is strong and weak.
In one embodiment, pair with privacy information is relevant carries out using data that deep learning is applied and privacy is believed Relevant use habit data are ceased, including:
It obtains and the relevant probability of occurrence and privacy classes using data in using data of privacy information;
Probability of occurrence and privacy classes are subjected to deep learning, show that the privacy of application is strong and weak.
Specifically, A is applied for one, gets user within a preset period of time and data is used using all of A to this, Then therefrom get and calculate privacy information it is relevant use data.Then, calculate within a preset period of time with it is hidden Personal letter ceases relevant probability of occurrence and privacy classes using data in using data.It can be in advance according to the division mark of user Standard carries out the division of privacy classes, is divided into high, normal, basic third gear, is handed over for example, being related to wealth during applying A using this Easily, but can be arranged be related to 500 yuan or more wealth transaction, then the privacy classes of the privacy information be height;It can be arranged It is related to 500 yuan and wealth below transaction, then during the privacy classes of the privacy information are;If being related to during using the application And arriving identity information (such as ID card No., name native place and bank card number etc.), then the privacy classes of the privacy information are Low, the user behavior that other are substantially not present to privacy risk does not divide privacy class, that is, is considered as that there is no privacy class.When So, above-mentioned to merely provide a kind of dividing mode, can also according to individual subscriber for the different demarcation standard of privacy classes and Execute corresponding standard.
According to above-mentioned calculation, so that it may produced when using using A to calculate user within a preset period of time The corresponding privacy classes of use data, and calculate the probability of occurrence corresponding to each privacy classes.For example, counting use Family privacy classes when using using A are height, and corresponding probability of occurrence is 80%;It is corresponding to occur generally during privacy classes are Rate is 60%;Privacy classes are low, and corresponding probability of occurrence is 80%.Assuming that privacy classes it is that high weights are set as 1, and Weights in being by privacy classes are set as 0.7, and are that low weights are set as 0.2 by privacy classes.The setting of the above weights Be after carrying out big data analysis according to acquired sample data, it is obtained can be than the privacy of reasonably reactive applications Property strong and weak numerical value, naturally it is also possible to replace with other reasonably numerical value.The computational methods of privacy power using A are set For:The corresponding probability of occurrence of above-mentioned privacy classes is weighted summation according to weights.And then it calculates strong and weak using the privacy of A Value is:1 × 80%+0.7 × 60%+0.2 × 80%=1.38.
In the embodiment of the present application,
In one embodiment, according to initial Privacy list of application combine with the relevant use habit data of privacy information, Target privacy list of application recommended to the user is obtained, including:
Judge whether the privacy power of application is more than given threshold;
If so, judging application with the presence or absence of in initial Privacy list of application;
It is added in target privacy list of application recommended to the user if so, will apply, generates target privacy application row Table.
Specifically, such as can to preset the given threshold of the strong and weak corresponding value of privacy be 0.5, is said more than 0.5 Bright privacy is stronger, illustrates that privacy is weaker less than or equal to 0.5.In preset time period (one week) interior user using using B When privacy classes be height, corresponding probability of occurrence be 0;During privacy classes are, corresponding probability of occurrence is 60%;Privacy classes To be low, corresponding probability of occurrence is 20%.Assuming that 1 is set as high weights to privacy classes, and in being by privacy classes Weights are set as 0.7, and are that low weights are set as 0.2 by privacy classes.The computational methods of privacy power using B are set For:The corresponding probability of occurrence of above-mentioned privacy classes is weighted summation according to weights.And then it calculates strong and weak using the privacy of B Value is:1 × 0+0.7 × 60%+0.2 × 20%=0.46 < 0.5.It then calculates weaker using the privacy of B.Above-mentioned division is hidden The numerical value 0.5 of private power, this numerical value are the ratios for according to acquired sample data obtained after big data analysis Compared with the numerical value for the privacy power for capableing of reactive applications, naturally it is also possible to replace with other reasonably numerical value.
If it has been more than setting to be by the strong and weak corresponding value of the privacy obtained after above-mentioned calculating for some application If threshold value, can the application be directly added to target privacy list of application recommended to the user.It can also be further continued for judging Using with the presence or absence of in initial Privacy list of application, target privacy application recommended to the user is added to if so, will apply In list, target privacy list of application is generated.It is added to target privacy application row recommended to the user if it is not, will not then apply In table.May be within a preset period of time that error occurs in statistical result to reduce, and caused by noise jamming, can also be sample This system time is too short and reality does not reflect the use habit of user and error occurs and cause noise jamming.
In the embodiment of the present application, judge whether the privacy power of application is more than given threshold, is further continued for judging that application is It is no to be present in initial Privacy list of application.Obtained by being analyzed to multiple users on individual subscriber use habit and server The use habit gone out is combined, to take into account population sample universality and personal sample particularity so that it is final to combine The target privacy list of application recommended to the user of gained is more nearly the real demand of user later.
In one embodiment, as shown in figure 5, being combined and privacy information is relevant makes according to initial Privacy list of application With custom data, after obtaining target privacy list of application recommended to the user, including:
Step 340, target privacy list of application is shown so that user screens.
Step 350, the privacy application that user filters out from target privacy list of application is received, privacy application is carried out hidden It hides.
In the embodiment of the present application, such as user has been after having used electronic equipment preset time period, and has obtained to user After the target privacy list of application of recommendation, it is assumed that user, which needs to be arranged when privacy is applied, then carries out target privacy list of application Displaying is screened for user.The mode of displaying can be shown by interface, so that user intuitively clicks Screening.After which application is hidden when the user clicks, then just these is applied in backstage and be set as hidden state, that is, located It is the application that can not be intuitively accessed in the display interface of electronic equipment in the application of hidden state, usually needs carry out one It can just access after a little special authentications.
In one embodiment, the privacy application filtered out from target privacy list of application in reception user, to privacy After being hidden, including:
The privacy application that user is arranged on an electronic device is recorded, and record is uploaded to server and is protected It deposits.
In the embodiment of the present application, pushed away when recommending method to user in setting privacy application by above-mentioned privacy It recommends, and after user screen and carried out corresponding privacy settings.It also needs to answer what user was actually hidden Information is recorded, and record is uploaded in server and is preserved.Server will pass through this information collection mode, Collect the privacy settings information of more users.Statistics credit constantly is carried out to the privacy list of application of collected all users Analysis, it is the privacy application that user's high frequency is hidden to analyze those applications, with the initial Privacy constantly to recommending user List of application carries out data update.
In one embodiment, as shown in fig. 6, providing a kind of privacy application recommendation apparatus 600, device includes:Initially Privacy list of application acquisition module 610, use habit data acquisition module 620 and target privacy list of application obtain module 630. Wherein,
Initial Privacy list of application acquisition module 610, for obtaining initial Privacy list of application recommended to the user;
Use habit data acquisition module 620 carries out using produced application on electronic equipment for obtaining user With the relevant use habit data of privacy information;
Target privacy list of application obtains module 630, for being combined and privacy information phase according to initial Privacy list of application The use habit data of pass obtain target privacy list of application recommended to the user.
In one embodiment, initial Privacy list of application acquisition module 610 is additionally operable to be obtained from server to user The initial Privacy list of application of recommendation, initial Privacy list of application be server to collected different user on an electronic device The privacy application of setting carries out statistical analysis and obtains.
In one embodiment, use habit data acquisition module 620 is additionally operable to collect user in preset time period respectively Application each of on electronic equipment is carried out to use data using generated;From use in data obtain it is related to privacy information Use data;Pair with privacy information it is relevant using data carry out deep learning be applied and the relevant use of privacy information It is accustomed to data.
In one embodiment, use habit data acquisition module 620 is additionally operable to obtain and the relevant use of privacy information Probability of occurrence and privacy classes of the data in using data;
Probability of occurrence and privacy classes are subjected to deep learning, show that the privacy of application is strong and weak.
In one embodiment, target privacy list of application obtains module 630, is additionally operable to judge that the privacy of application is strong and weak Whether it is more than given threshold;If so, judging application with the presence or absence of in initial Privacy list of application;Add if so, will apply It adds in target privacy list of application recommended to the user, generates target privacy list of application.
In one embodiment, as shown in fig. 7, providing a kind of privacy application recommendation apparatus 600, device further includes:
Screening module 640, for being shown target privacy list of application so that user screens;
Hidden module 650, the privacy application filtered out from target privacy list of application for receiving user, answers privacy With being hidden.
In one embodiment, as shown in figure 8, providing a kind of privacy application recommendation apparatus 600, device further includes:Note Uploading module 660 is recorded, the privacy application for user to be arranged on an electronic device records, and record is uploaded to service Device is preserved.
The division of modules is only used for for example, in other embodiments in above-mentioned privacy application recommendation apparatus, can Privacy application recommendation apparatus is divided into different modules as required, with complete above-mentioned privacy application recommendation apparatus whole or Partial function.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated The step of privacy application recommendation method that the various embodiments described above are provided is realized when machine program is executed by processor.
In one embodiment, a kind of electronic equipment is provided, including memory, processor and storage are on a memory simultaneously It is hidden to realize that the various embodiments described above are provided for the computer program that can be run on a processor when processor executes computer program The step of recommendation method, is applied in private.
The embodiment of the present application also provides a kind of computer program products, when run on a computer so that calculate Machine executes the step of privacy application recommendation method that the various embodiments described above are provided.、
The embodiment of the present application also provides a kind of electronic equipment.As shown in figure 9, for convenience of description, illustrating only and this Apply for that the relevant part of embodiment, particular technique details are not disclosed, please refers to the embodiment of the present application method part.The electronics is set Include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS for that can be The arbitrary terminal device such as (Point of Sales, point-of-sale terminal), vehicle-mounted computer, Wearable, using electronic equipment as mobile phone For:
Fig. 9 is the block diagram with the part-structure of the relevant mobile phone of electronic equipment provided by the embodiments of the present application.With reference to figure 9, Mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 910, input unit 930, display unit 940, passes memory 920 Sensor 950, voicefrequency circuit 990, Wireless Fidelity (wireless fidelity, WiFi) module 970, processor 980, Yi Ji electricity The components such as source 990.It, can be with it will be understood by those skilled in the art that handset structure shown in Fig. 9 does not constitute the restriction to mobile phone Including than illustrating more or fewer components, either combining certain components or different components arrangement.
Wherein, RF circuits 910 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station After downlink information receives, handled to processor 980;The data of uplink can also be sent to base station.In general, RF circuits include but Be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 910 can also be communicated with network and other equipment by radio communication.Above-mentioned channel radio Letter can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email, Short message service (Short Messaging Service, SMS) etc..
Memory 920 can be used for storing software program and module, and processor 980 is stored in memory 920 by operation Software program and module, to execute various function application and the data processing of mobile phone.Memory 920 can include mainly Program storage area and data storage area, wherein program storage area can storage program area, the application journey needed at least one function Sequence (such as the application program of sound-playing function, application program of image player function etc.) etc.;Data storage area can store root Created data (such as audio data, address list etc.) etc. are used according to mobile phone.In addition, memory 920 may include high speed Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or Other volatile solid-state parts.
Input unit 930 can be used for receiving the number or character information of input, and generate the user setting with mobile phone 900 And the related key signals input of function control.Specifically, input unit 930 may include touch panel 931 and other inputs Equipment 932.Touch panel 931, alternatively referred to as touch screen collect user on it or neighbouring touch operation (such as user Use the operation of any suitable object or attachment such as finger, stylus on touch panel 931 or near touch panel 931), And corresponding attachment device is driven according to preset formula.In one embodiment, touch panel 931 may include touching inspection Survey two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation The signal brought, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and will It is converted into contact coordinate, then gives processor 980, and can receive order that processor 980 is sent and be executed.In addition, The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave may be used and realize touch panel 931.In addition to touch surface Plate 931, input unit 930 can also include other input equipments 932.Specifically, other input equipments 932 may include but not It is limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.) etc..
Display unit 940 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 940 may include display panel 941.In one embodiment, liquid crystal display (Liquid may be used Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 941.In one embodiment, touch panel 931 can cover display panel 941, when touch panel 931 is examined It measures and sends processor 980 on it or after neighbouring touch operation to determine the type of touch event, be followed by subsequent processing device 980 provide corresponding visual output according to the type of touch event on display panel 941.Although in fig.9, touch panel 931 be to realize input and the input function of mobile phone as two independent components with display panel 941, but in certain implementations In example, can be integrated by touch panel 931 and display panel 941 and that realizes mobile phone output and input function.
Mobile phone 900 may also include at least one sensor 950, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 941, and proximity sensor can close display panel when mobile phone is moved in one's ear 941 and/or backlight.Motion sensor may include acceleration transducer, can detect by acceleration transducer and adds in all directions The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture Switching), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, humidity Other sensors such as meter, thermometer, infrared sensor etc..
Voicefrequency circuit 990, loud speaker 991 and microphone 992 can provide the audio interface between user and mobile phone.Audio-frequency electric The transformed electric signal of the audio data received can be transferred to loud speaker 991 by road 990, and sound is converted to by loud speaker 991 Signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 992, is turned after being received by voicefrequency circuit 990 It is changed to audio data, then by after the processing of audio data output processor 980, another mobile phone can be sent to through RF circuits 910, or Person exports audio data to memory 920 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 970 Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 9 is shown WiFi module 970, but it is understood that, and it is not belonging to must be configured into for mobile phone 900, it can omit as needed.
Processor 980 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 920, and call and be stored in memory 920 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.In one embodiment, it handles Device 980 may include one or more processing units.In one embodiment, processor 980 can integrate application processor and modulation Demodulation processor, wherein the main processing operation system of application processor, user interface and application program etc.;Modulation /demodulation is handled Device mainly handles wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 980.
Mobile phone 900 further includes the power supply 990 (such as battery) powered to all parts, it is preferred that power supply can pass through electricity Management system and processor 980 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system The functions such as management.
In one embodiment, mobile phone 900 can also include camera, bluetooth module etc..
Used in this application may include to any reference of memory, storage, database or other media is non-volatile And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously Cannot the limitation to the application the scope of the claims therefore be interpreted as.It should be pointed out that for those of ordinary skill in the art For, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the guarantor of the application Protect range.Therefore, the protection domain of the application patent should be determined by the appended claims.

Claims (10)

1. a kind of privacy application recommendation method, which is characterized in that including:
Obtain initial Privacy list of application recommended to the user;
The user is obtained to carry out using generated and privacy information relevant use habit number the application on electronic equipment According to;
According to the initial Privacy list of application in conjunction with the described and relevant use habit data of privacy information, obtain to the use The target privacy list of application that family is recommended.
2. according to the method described in claim 1, it is characterized in that, described obtain initial Privacy application row recommended to the user Table, including:
Initial Privacy list of application recommended to the user is obtained from server, the initial Privacy list of application is server pair The privacy application that collected different user is arranged on an electronic device carries out statistical analysis and obtains.
3. according to the method described in claim 1, it is characterized in that, it is described obtain the user to the application on electronic equipment into It exercises and uses the generated and relevant use habit data of privacy information, including:
The user in preset time period is collected respectively application each of on electronic equipment is carried out to use number using generated According to;
From described data are used using acquisition in data and privacy information are relevant;
Relevant with privacy information carry out using data that deep learning obtains the application and privacy information is relevant makes to described With custom data.
4. according to the method described in claim 3, it is characterized in that, to described relevant deep using data progress with privacy information Degree study obtains the application and the relevant use habit data of privacy information, including:
Obtain it is described with privacy information it is relevant using data in the probability of occurrence and privacy classes using in data;
The probability of occurrence and the privacy classes are subjected to deep learning, show that the privacy of the application is strong and weak.
5. according to the method described in claim 4, it is characterized in that, according to the initial Privacy list of application in conjunction with it is described with it is hidden Personal letter ceases relevant use habit data, obtains the target privacy list of application recommended to the user, including:
Judge whether the privacy power of the application is more than given threshold;
If so, judging that the application whether there is in the initial Privacy list of application;
If so, being added to the application into the target privacy list of application that the user recommends, generates target privacy and answer Use list.
6. according to the method described in claim 1, it is characterized in that, described according to initial Privacy list of application combination institute State with the relevant use habit data of privacy information, obtain after the target privacy list of application that the user recommends, including:
The target privacy list of application is shown so that the user screens;
The privacy application that the user filters out from the target privacy list of application is received, privacy application is carried out hidden It hides.
7. according to the method described in claim 6, it is characterized in that, receiving the user from the target privacy list of application In the privacy application that filters out, after being hidden to the privacy application, including:
The privacy application that the user is arranged on an electronic device is recorded, and the record is uploaded to server and is carried out It preserves.
8. a kind of privacy application recommendation apparatus, which is characterized in that described device includes:
Initial Privacy list of application acquisition module, for obtaining initial Privacy list of application recommended to the user;
Use habit data acquisition module, for obtain the user to the application on electronic equipment carry out using it is generated with The relevant use habit data of privacy information;
Target privacy list of application obtains module, for according to the initial Privacy list of application in conjunction with described with privacy information phase The use habit data of pass obtain the target privacy list of application recommended to the user.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of privacy application recommendation method as described in any one of claim 1 to 7 is realized when processor executes.
10. a kind of electronic equipment, including memory, processor and storage are on a memory and the calculating that can run on a processor Machine program, which is characterized in that the processor is realized when executing the computer program described in any one of claim 1 to 7 Privacy application recommendation method the step of.
CN201810317212.0A 2018-04-10 2018-04-10 Method and apparatus, storage medium, electronic equipment are recommended in privacy application Pending CN108491733A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810317212.0A CN108491733A (en) 2018-04-10 2018-04-10 Method and apparatus, storage medium, electronic equipment are recommended in privacy application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810317212.0A CN108491733A (en) 2018-04-10 2018-04-10 Method and apparatus, storage medium, electronic equipment are recommended in privacy application

Publications (1)

Publication Number Publication Date
CN108491733A true CN108491733A (en) 2018-09-04

Family

ID=63315522

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810317212.0A Pending CN108491733A (en) 2018-04-10 2018-04-10 Method and apparatus, storage medium, electronic equipment are recommended in privacy application

Country Status (1)

Country Link
CN (1) CN108491733A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543105A (en) * 2018-11-15 2019-03-29 万惠投资管理有限公司 A kind of content recommendation method and system of mobile device application
CN110321479A (en) * 2019-05-27 2019-10-11 哈尔滨工业大学(深圳) A kind of secret protection Information Mobile Service recommended method and client, recommender system
CN112329060A (en) * 2020-11-05 2021-02-05 华为技术有限公司 Privacy information generation method and terminal equipment
US20210406942A1 (en) * 2020-06-26 2021-12-30 Steven Eric Lilley System and method for optimizing online privacy recommendations for entity users

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937547A (en) * 2010-09-15 2011-01-05 宇龙计算机通信科技(深圳)有限公司 Software and/or software information pushing method, system, acquisition device, software shop service system and mobile terminal
CN103327102A (en) * 2013-06-24 2013-09-25 北京小米科技有限责任公司 Application program recommending method and device
CN104217169A (en) * 2013-06-05 2014-12-17 腾讯科技(深圳)有限公司 Encryption recommendation method and device and terminal
CN105117544A (en) * 2015-08-21 2015-12-02 李涛 Android platform App risk assessment method based on mobile cloud computing and Android platform App risk assessment device based on mobile cloud computing
CN105472460A (en) * 2015-11-27 2016-04-06 广东长虹电子有限公司 Intelligent sorting method and system of television applications
CN105678180A (en) * 2015-11-30 2016-06-15 上海闻泰电子科技有限公司 Privacy protection system
CN105912905A (en) * 2016-04-11 2016-08-31 广东欧珀移动通信有限公司 Fingerprint unlocking method and terminal
CN106127039A (en) * 2016-06-22 2016-11-16 广州市久邦数码科技有限公司 A kind of privacy checking method based on Android system and system thereof
CN106254404A (en) * 2015-06-10 2016-12-21 中兴通讯股份有限公司 Application software authority recommends methods, devices and systems
CN106570361A (en) * 2016-10-31 2017-04-19 杭州联络互动信息科技股份有限公司 Privacy protection method and privacy protection device for smart watch
CN106716324A (en) * 2014-12-18 2017-05-24 谷歌公司 Methods, systems, and media for launching a mobile application using a public display device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937547A (en) * 2010-09-15 2011-01-05 宇龙计算机通信科技(深圳)有限公司 Software and/or software information pushing method, system, acquisition device, software shop service system and mobile terminal
CN104217169A (en) * 2013-06-05 2014-12-17 腾讯科技(深圳)有限公司 Encryption recommendation method and device and terminal
CN103327102A (en) * 2013-06-24 2013-09-25 北京小米科技有限责任公司 Application program recommending method and device
CN106716324A (en) * 2014-12-18 2017-05-24 谷歌公司 Methods, systems, and media for launching a mobile application using a public display device
CN106254404A (en) * 2015-06-10 2016-12-21 中兴通讯股份有限公司 Application software authority recommends methods, devices and systems
CN105117544A (en) * 2015-08-21 2015-12-02 李涛 Android platform App risk assessment method based on mobile cloud computing and Android platform App risk assessment device based on mobile cloud computing
CN105472460A (en) * 2015-11-27 2016-04-06 广东长虹电子有限公司 Intelligent sorting method and system of television applications
CN105678180A (en) * 2015-11-30 2016-06-15 上海闻泰电子科技有限公司 Privacy protection system
CN105912905A (en) * 2016-04-11 2016-08-31 广东欧珀移动通信有限公司 Fingerprint unlocking method and terminal
CN106127039A (en) * 2016-06-22 2016-11-16 广州市久邦数码科技有限公司 A kind of privacy checking method based on Android system and system thereof
CN106570361A (en) * 2016-10-31 2017-04-19 杭州联络互动信息科技股份有限公司 Privacy protection method and privacy protection device for smart watch

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543105A (en) * 2018-11-15 2019-03-29 万惠投资管理有限公司 A kind of content recommendation method and system of mobile device application
CN110321479A (en) * 2019-05-27 2019-10-11 哈尔滨工业大学(深圳) A kind of secret protection Information Mobile Service recommended method and client, recommender system
CN110321479B (en) * 2019-05-27 2021-07-20 哈尔滨工业大学(深圳) Privacy protection mobile service recommendation method, client and recommendation system
US20210406942A1 (en) * 2020-06-26 2021-12-30 Steven Eric Lilley System and method for optimizing online privacy recommendations for entity users
US11880857B2 (en) * 2020-06-26 2024-01-23 Steven Eric Lilley System and method for optimizing online privacy recommendations for entity users
CN112329060A (en) * 2020-11-05 2021-02-05 华为技术有限公司 Privacy information generation method and terminal equipment

Similar Documents

Publication Publication Date Title
CN108334755A (en) Private space creation method and device, storage medium, electronic equipment
CN105094613B (en) Terminal control mechanism and method
CN108491733A (en) Method and apparatus, storage medium, electronic equipment are recommended in privacy application
CN108038192A (en) Application searches method and apparatus, electronic equipment, computer-readable recording medium
CN107562835A (en) File search method, device, mobile terminal and computer-readable recording medium
CN107977674A (en) Image processing method, device, mobile terminal and computer-readable recording medium
CN106598529A (en) Method and device for sub-screen display of mobile terminal, and mobile terminal
CN108052591A (en) Information recommendation method, device, mobile terminal and computer readable storage medium
CN108280692A (en) Reward distribution method, device, computer readable storage medium and terminal
CN108573169A (en) Nearest task list display methods and device, storage medium, electronic equipment
CN108573168A (en) Private space starts method and apparatus, storage medium, electronic equipment
CN103313139A (en) History display method and device and electronic device
CN108537037A (en) Privacy control method and device, computer readable storage medium, terminal
CN107944414A (en) Image processing method, device, electronic equipment and computer-readable recording medium
CN107807820A (en) Information processing method, device, mobile terminal and readable storage medium storing program for executing
CN112540996A (en) Service data verification method and device, electronic equipment and storage medium
CN105554710A (en) Message display method and device
CN106791153A (en) Using PUSH message classifying indication method, device and mobile terminal
CN108804062A (en) Display methods and device, storage medium, electronic equipment
CN104750722B (en) A kind of acquisition of information and methods of exhibiting and device
CN107330867A (en) Image combining method, device, computer-readable recording medium and computer equipment
CN106294087B (en) Statistical method and device for operation frequency of business execution operation
CN107102913B (en) Data back up method, device and computer equipment
CN108921086A (en) Image processing method and device, storage medium, electronic equipment
CN108256466A (en) Data processing method, device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180904