CN113656834A - Private data protection method and device - Google Patents

Private data protection method and device Download PDF

Info

Publication number
CN113656834A
CN113656834A CN202110956425.XA CN202110956425A CN113656834A CN 113656834 A CN113656834 A CN 113656834A CN 202110956425 A CN202110956425 A CN 202110956425A CN 113656834 A CN113656834 A CN 113656834A
Authority
CN
China
Prior art keywords
target
mail
application
privacy
feedback
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110956425.XA
Other languages
Chinese (zh)
Inventor
洪雪莲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202110956425.XA priority Critical patent/CN113656834A/en
Publication of CN113656834A publication Critical patent/CN113656834A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/62Uninstallation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a method and a device for protecting private data, and belongs to the technical field of computers. The privacy data protection method comprises the following steps: receiving an uninstalling operation of a target application; under the condition of obtaining the privacy clearing authority of the target application, sending a target mail to a target mailbox corresponding to the target application; the target mail is used for triggering the server to execute the operation of deleting the personal data of the target application of the target user.

Description

Private data protection method and device
Technical Field
The application belongs to the technical field of computers, and particularly relates to a method and a device for protecting private data.
Background
In the case of an application uninstalled by a user, to protect the privacy of the user, the Data Subject Rights (DSR) is exercised, and at present, two methods are mainly included: firstly, under the condition that an application program exists in a data management center (or a privacy center), before the application program is uninstalled, a user enters the data management center (or the privacy center) to manually operate, and triggers operations of account logout or specific data deletion and the like, so as to delete personal data of the user; and secondly, under the condition that the application program does not have a data management center (or a privacy center), the user knows a channel (such as a mailbox or a website) for exercising the DSR on the basis of the privacy statement of the application program, and communicates with the authorized party of the application program on the basis of the channel for exercising the DSR, so that the authorized party of the application program deletes the personal data of the user.
In summary, the two existing methods have the disadvantages of complicated steps, time and labor waste, and low efficiency, and are only suitable for a few users with privacy protection awareness and related knowledge, and the application range is limited.
Disclosure of Invention
The embodiment of the application aims to provide a method and a device for protecting private data, which can solve the problem of low efficiency of protecting the private data.
In a first aspect, an embodiment of the present application provides a method for protecting private data, where the method includes:
receiving an uninstalling operation of a target application;
under the condition of obtaining the privacy clearing authority of the target application, sending a target mail to a target mailbox corresponding to the target application;
the target mail is used for triggering the server to execute the operation of deleting the personal data of the target application of the target user.
In a second aspect, an embodiment of the present application provides an apparatus for protecting private data, where the apparatus includes:
the receiving module is used for receiving the unloading operation of the target application;
the right-of-line module is used for sending a target mail to a target mailbox corresponding to the target application under the condition of obtaining the privacy clearing authority of the target application;
the target mail is used for triggering the server to execute the operation of deleting the personal data of the target application of the target user.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In the embodiment of the application, the mailbox application is called under the condition that the uninstalling operation of the target application is received and the privacy clearing authority of the target application is obtained, the target mail for exercising the data main body right is sent to the target mailbox corresponding to the target application, the data main body right is exercised, and the user can select the exercising data main body right by one key by clicking the uninstalling application without other manual operations, so that the operation of exercising the data main body right can be automatically, conveniently and quickly executed, the efficiency of protecting the privacy data is improved, and the risk of privacy disclosure of the user is reduced. Furthermore, the process does not require that the user has privacy protection consciousness and relevant knowledge, is wider in application range and more universal, and can protect privacy data of all users.
Drawings
Fig. 1 is a schematic flowchart of a private data protection method provided in an embodiment of the present application;
fig. 2 is a schematic structural diagram of a private data protection apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 4 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The following describes in detail a method and an apparatus for protecting private data according to an embodiment of the present application with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a private data protection method according to an embodiment of the present application. The privacy data protection method provided by the embodiment of the present application is described below with reference to fig. 1. As shown in fig. 1, the method includes:
step 101, receiving an uninstalling operation of a target application.
Optionally, an execution subject of the private data protection method provided by the embodiment of the present application is a private data protection device.
The privacy data protection apparatus may be implemented in various forms. For example, the private data protection apparatus described in the embodiments of the present application may include a mobile terminal such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet), a PMP (portable multimedia player), a navigation apparatus, a smart band, a smart hand, a digital camera, and the like, and a fixed terminal such as a desktop computer and the like. In the following, it is assumed that the private data protection apparatus is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present application can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
And the user uninstalls the target application, and the private data protection device is used for triggering the target application to be uninstalled.
Optionally, the unloading operation of the user on the target application may be an operation of clicking a first control in a target interface of the private data protection apparatus. And the target interface can be a desktop or an interface of a management application program.
For example, an operation of uninstalling the target application by the user may be an operation of dragging a first control (also referred to as an "icon representing the target application") representing the target application to the top of the desktop of the private data protection apparatus.
And the private data protection device can receive the uninstalling operation of the user on the target application.
102, sending a target mail to a target mailbox corresponding to a target application under the condition of obtaining the privacy clearing authority of the target application;
the target mail is used for triggering the server to execute the operation of deleting the personal data of the target application of the target user.
Optionally, the privacy data protection device may invoke a mailbox application, send a target mail to a target mailbox, and send a DSR application to an authority of the target application based on a mailbox account of the user and a preset mail template.
And the target mailbox is a mailbox corresponding to the target application. Optionally, the target mailbox is a mailbox provided by the authority of the target application for receiving the target mail.
Alternatively, the address of the target mailbox may be determined according to a rule matching algorithm by traversing the text of the privacy statement of the target application.
Alternatively, the address of the target mailbox may be obtained by extracting the character "@" in the text of the privacy statement of the target application and analyzing characters before and after the character "@".
The target mail, also called as a right-of-way mail, is used for the user to exercise the data body right and trigger the server of the target application to execute the operation of the personal data of the target application of the target user. The personal information of the user and the address of the target mailbox can be filled in the mail template, and the generation of the target mail is completed.
Optionally, the personal information of the user filled in the mail template may include: the name and account number of the user can also comprise a mailbox address and/or a contact way and the like. The contact information may include a mobile phone number and/or a telephone number of a fixed telephone, and the like.
Alternatively, after receiving an uninstall operation of the target application, the privacy data protection apparatus may detect whether or not to obtain the privacy clear authority of the target application. In case the privacy clear authority of the target application is obtained, step 102 is performed.
Before step 102, the user may set the setting items of privacy protection and set the privacy preferences based on the system setting interface of the privacy data protection apparatus. The setting items may include target setting items. The target setting item may be whether or not the DSR deletion right is exercised by synchronization default at the time of uninstallation for the target application.
Alternatively, the user may input the first input to set the target setting item on the system setting interface. A first input for setting a target setting item.
The first input may be touch input, voice input, gesture input or key input, or may be a second operation.
For example, the first input may be an operation of clicking a second control. A second control, which may be a control representing a switch; setting the switch to a position (e.g., left side) indicating "off", indicating that the target setting item is set to "exercising DSR deletion right by default at the time of uninstallation asynchronously"; the switch is set to a position (e.g., right side) indicating "on", indicating that the target setting item is set to "DSR deletion right is exercised by synchronization default at the time of unloading".
It is to be understood that the above listed inputs are exemplary lists, i.e., embodiments of the present application include, but are not limited to, the above listed inputs. In practical implementation, the input may also include any other possible input, which may be specifically determined according to practical use requirements, and the embodiment of the present application is not limited.
For the target application, the target setting item is set to 'synchronously and defaultly exercise DSR deletion right when uninstalling', which means that the privacy clearing authority of the target application is obtained; the target setting item is set to "do not synchronize the default DSR deletion right at the time of uninstallation", which means that the privacy clear authority of the target application is not obtained.
It should be noted that, in the case where the privacy removing authority of the target application is not obtained, the privacy data protection apparatus may display the first prompt message to notify the user that the setting of the target setting item is possible or whether the setting of the target setting item is required. The user can input a first input to set the target setting item on the system setting interface. The privacy data protection device receives a first input, and obtains privacy clearing authority of the target application in response to the first input.
Optionally, the first prompt message is displayed in a pop-up window manner.
According to the method and the device, the mailbox application is called under the condition that the uninstalling operation of the target application is received and the privacy clearing authority of the target application is obtained, the target mail for exercising the data main body right is sent to the target mailbox corresponding to the target application, the data main body right is exercised, a user clicks the uninstalling application, the data main body right can be exercised by one key, other manual operations are not needed, the operation of exercising the data main body right can be automatically, conveniently and quickly executed, the efficiency of protecting the privacy data is improved, and the risk of privacy disclosure of the user is reduced. Furthermore, the process does not require that the user has privacy protection consciousness and relevant knowledge, is wider in application range and more universal, and can protect privacy data of all users.
Optionally, in a case that the privacy clearing authority of the target application is obtained, after the target email is sent to the target mailbox corresponding to the target application, the method further includes: and determining the feedback period of the target mail according to the text of the privacy statement of the target application.
Alternatively, the feedback deadline may be determined according to a rule matching algorithm by traversing the text of the privacy statement of the target application.
Alternatively, the feedback period may be determined by extracting text content such as "feedback period" or "delete within … … day" in the text of the privacy statement of the target application.
And the feedback period is the maximum time length stated in the privacy statement of the target application and used for feeding back the target mail of the user. For example, the feedback period is 30 days.
And adding a feedback period on the basis of the time when the target mail is successfully sent, so as to obtain a feedback time limit. And the feedback time limit is the last time of the feedback mail which is the target mail and is expected by the user.
Based on the feedback deadline and the current time, a first duration is determined.
The first duration is the duration between the current time and the feedback deadline.
Optionally, after the target email is successfully sent, a countdown may be performed, where the countdown result is the first duration. The feedback period may be set to the maximum time counted down. Based on the feedback period, a countdown is started. The time when the target mail is successfully sent is the starting time of countdown, and the first time length can be determined based on the time difference between the current time and the feedback time limit, so that the countdown is dynamically updated.
The first time length is used for prompting the user of the remaining time from the last time of the feedback mail of the expected received target mail.
The end condition of the countdown may include: count down to 0 and not receive the feedback mail of the target mail; alternatively, the countdown is less than 0 and a feedback mail for the target mail is received.
According to the method and the device, the feedback time limit is determined by traversing the text of the privacy statement of the target application, the first duration is determined based on the feedback time limit and the current time, the time for receiving the feedback mail can be monitored more accurately, the result for exercising the data main body right can be tracked automatically, conveniently and quickly, and the efficiency of protecting the privacy data is improved.
Optionally, after determining the first duration based on the feedback deadline and the current time, the method further comprises: and executing a first operation under the condition that the first time length is less than a preset threshold value.
Optionally, after the first duration is determined, the first duration may be compared with a preset threshold, and whether the first duration is smaller than the preset threshold may be determined.
The preset threshold value can be set according to actual conditions. Optionally, one or more preset thresholds may be set, and the duration of each preset threshold is less than or equal to the feedback period.
For example, in the case where the feedback period is 30 days, the preset threshold may include 3 days, 7 days, 15 days, and the like.
By setting a preset threshold value, risk warning can be carried out on the expired DSR application at regular intervals, and a user is prompted to carry out tracking intervention.
Through the above steps, each application exercising the data body right can be regulated, the data body right is exercised for the application, and the result of exercising the data body right is tracked.
On the basis, each application for exercising the data body right can be managed and controlled in a centralized mode. Optionally, each application that exercises the rights of the data body may be centrally managed based on a unified privacy management center. After a certain application is unloaded, the interface of the privacy management center can be automatically popped up, so that the user can conveniently manage and control the privacy. The user can carry out self-service control on the pop-up mode and the frequency of the interface of the privacy management center.
Alternatively, the preset threshold may be determined based on input from the user, or may be a default value.
Optionally, the method may further include: receiving a second input of the user; in response to a second input, a preset threshold is determined.
The user may enter the second input based on a privacy-preserving interface for the target application.
And a second input for a user to input or select information of the target time.
The second input may be touch input, voice input, gesture input, or key input, or may be a second operation.
For example, the second input may be an operation of clicking a third target control. A third target control, which may be a control indicating whether to select "remind 3 days ahead"; setting a switch in the control to be in an off position (such as the left side), namely not selected, indicating that the prompt is not carried out 3 days in advance, namely the prompt is not a preset threshold value for 3 days; and setting a switch in the control to be in an on position (such as the right side), namely selecting the switch to indicate that the alarm is reminded 3 days in advance, namely 3 days are a preset threshold value.
For another example, the second input may be a length of time information entered in the input box, the length of time information being used to characterize the preset threshold.
It is to be understood that the above listed inputs are exemplary lists, i.e., embodiments of the present application include, but are not limited to, the above listed inputs. In practical implementation, the input may also include any other possible input, which may be specifically determined according to practical use requirements, and the embodiment of the present application is not limited.
The interface for privacy protection of the target application may display a row right channel, a deletion right configuration state, DSR feedback information, and the like of the target application. The right-of-way channel of the target application may include an address of a target mailbox and/or a target website address corresponding to the target application. And the deletion right configuration state refers to whether the privacy clearing authority of the target application is obtained. DSR feedback information, which may include a feedback period and a feedback countdown.
After the private data protection apparatus receives the second input, the preset threshold may be determined in response to the second input. Based on the second input, a preset threshold for user input or selection may be determined.
The privacy data protection device may not perform the first operation in a case where the first duration is greater than or equal to a preset threshold; in the case where the first duration is less than the preset threshold, the private data protection apparatus may automatically perform the first operation.
The first operation includes at least one of: and displaying the first time length to prompt the user to retransmit the target mail.
Optionally, the first operation may be displaying the first time length, or may be prompting the user to retransmit the target email, or may be displaying the first time length and prompting the user to retransmit the target email.
It should be noted that the privacy data protection device may include a display screen. A first duration may be displayed on the display screen to prompt the user that the duration from the feedback deadline has been less than a predetermined threshold.
Prompting the user to retransmit the target email may be implemented in a variety of ways. For example, an interface for resending the target mail to the target mailbox can be directly displayed or second prompt information is displayed, and the user is prompted to perform the operation of resending the target mail to the target mailbox.
According to the embodiment of the application, the first time length is displayed and/or the user is prompted to resend the target mail under the condition that the first time length is smaller than the preset threshold value, corresponding processing is carried out according to the condition of tracking the result of exercising the data main body right, the user can be guaranteed to efficiently and conveniently execute the operation of exercising the data main body right, and the efficiency of protecting the private data is improved.
Optionally, in a case that the first duration is smaller than a preset threshold, a first operation is performed, including: and under the condition that the feedback mails of the target mail are not received before the current time, displaying a first time length on the first interface.
Optionally, after the target mailbox receives the target email, the authority of the target application deletes the personal data of the user collected and processed by the authority of the target application, and feeds back the deleted result to the user through a feedback email.
The first duration is less than a preset threshold, and the feedback mail of the target mail is not received before the current time, the first duration can be displayed in a first interface displayed on a display screen of the privacy data protection device, so that a user is prompted that the feedback mail is not received and the duration from the feedback deadline is less than a certain preset threshold.
The first interface may be configured to display the preset thresholds, in addition to the first duration.
It will be appreciated that receiving a feedback mail for a target mail before the feedback deadline, indicating that the user has successfully exercised DSR, and that the personal data of the target application for the user has been deleted, greatly reduces the risk of information security and privacy disclosure for the user.
According to the method and the device, the first duration is displayed on the first interface under the condition that the first duration is smaller than the preset threshold and the feedback mail of the target mail is not received before the current time, and the user is prompted that the feedback mail is not received and the duration from the feedback time limit is not longer than the preset threshold, so that the user can timely execute further operation of exercising the data main body right, the privacy data protection efficiency is improved, and the risk of privacy disclosure of the user is reduced.
Optionally, in a case that the first duration is smaller than a preset threshold, a first operation is performed, including: and displaying a second interface under the condition that the feedback mails of the target mail are not received before the current time.
And the second interface is used for resending the target mail to the target mailbox.
Optionally, in the case that the feedback mail of the target mail is not received within the target time, the private data protection device may display a second interface for resending the target mail to the target mailbox.
The user may enter a third input based on the second interface. A third input for resending or not resending the target mail.
The third input may be touch input, voice input, gesture input, or key input, or may be a third operation.
For example, the third input may be an operation of clicking a control indicating transmission of the target mail, and the privacy data protection apparatus may retransmit the target mail in response to the third input to hasten DSR for exercising; the third input may also be an operation of clicking a control to cancel sending the target email, and the private data protection apparatus does not resend the target email in response to the third input.
It is to be understood that the above listed inputs are exemplary lists, i.e., embodiments of the present application include, but are not limited to, the above listed inputs. In practical implementation, the input may also include any other possible input, which may be specifically determined according to practical use requirements, and the embodiment of the present application is not limited.
Optionally, in a case where the third input is an input for not resending the target mail, the user may also input a fourth input according to actual needs. A fourth input for sending a revocation application.
The fourth input may be touch input, voice input, gesture input, or key input, or may be a fourth operation.
For example, the fourth input may include an operation of editing the undo application and an operation of clicking on a control indicating the undo application. The private data protection device sends a revocation application to the target mailbox informing the authority of the target application that the user revokes DSR in response to the fourth input.
It is to be understood that the above listed inputs are exemplary lists, i.e., embodiments of the present application include, but are not limited to, the above listed inputs. In practical implementation, the input may also include any other possible input, which may be specifically determined according to practical use requirements, and the embodiment of the present application is not limited.
According to the method and the device, the second interface for sending the target mail to the target mailbox again is displayed under the condition that the first time is less than the preset threshold value and the feedback mail of the target mail is not received before the current time, so that the operation of exercising the right of the data main body can be automatically, conveniently and quickly executed, the efficiency of protecting the privacy data is improved, and the risk of privacy disclosure of a user is reduced.
Optionally, in the case of obtaining the privacy clearing authority of the target application, it may be further determined whether the target application has a privacy center.
The private data protection appliance may traverse the directory hierarchy of the target application to see if the target application provides a privacy center (or data management center) for the user, and mark in the background.
For example, the parameter exist _ privacy-center is used to mark whether the target application exists in the privacy center, an exist _ privacy-center of 1 indicates that the target application exists in the privacy center, and an exist _ privacy-center of 0 indicates that the target application does not exist in the privacy center.
It should be noted that the step of marking whether the target application has the privacy center may be performed before step 102, or may be performed in step 102.
In the case that the step of marking whether the target application has the privacy center is performed before the step 102, in the step 102, whether the target application has the privacy center may be determined by detecting the parameter; in the case where the step of marking whether the target application has a privacy center is performed in step 102, it may be determined whether the target application has a privacy center and marked after the directory hierarchy of the target application is traversed.
In the case where the privacy center does not exist for the target application, the privacy data protection apparatus may exercise DSR by sending mail. The privacy data protection device can call a mailbox application, and based on a user mailbox account and a preset mail template, a target mail is sent to a target mailbox to exercise DSR.
It should be noted that, in a case that the target application exists in the privacy center, the private data protection device may display third prompt information to remind the user that the target application exists in the privacy center, and the user may perform operations such as account logout and/or personal data deletion based on the privacy center.
Optionally, the third prompt message is displayed in a pop-up window manner.
According to the method and the device, the mailbox application is called under the condition that the privacy clearing authority of the target application is obtained and the target application does not have a privacy center, the target mail is sent to the target mailbox, the user clicks the uninstalling application to select the exercise data main body right in one key, other manual operations are not needed, the operation of exercising the data main body right can be automatically, conveniently and quickly executed, and the efficiency of protecting the privacy data is improved. Furthermore, the process does not require that the user has privacy protection consciousness and relevant knowledge, is wider in application range and more universal, and can protect privacy data of all users.
It should be noted that, in the private data protection method provided in the embodiment of the present application, the execution subject may be a private data protection apparatus, or the execution subject may be a control module in the private data protection apparatus for executing the private data protection method. In the embodiment of the present application, a method for executing private data protection by a private data protection apparatus is taken as an example, and the private data protection apparatus provided in the embodiment of the present application is described.
Fig. 2 is a schematic structural diagram of a private data protection apparatus according to an embodiment of the present application. Optionally, as shown in fig. 2, the apparatus includes a receiving module 201 and a row right module 202, wherein:
a receiving module 201, configured to receive an uninstalling operation on a target application;
the right of line module 202 is used for sending a target mail to a target mailbox corresponding to the target application under the condition of obtaining the privacy clearing authority of the target application;
the target mail is used for triggering the server to execute the operation of deleting the personal data of the target application of the target user.
Optionally, the receiving module 201 and the row weight module 202 are electrically connected.
The receiving module 201 may receive an uninstall operation of a target application by a user.
After receiving the uninstall operation of the target application, the row right module 202 may invoke the mailbox application to send the target mail to the target mailbox based on the mailbox account of the user and the preset mail template.
Optionally, the privacy data protection apparatus may further include:
the determining module is used for determining the feedback time limit of the target mail according to the text of the privacy statement of the target application;
the determining module is further used for determining a first time length based on the feedback time limit and the current time;
the first duration is the duration between the current time and the feedback deadline.
Optionally, the privacy data protection apparatus may further include:
the execution module is used for executing a first operation under the condition that the first time length is smaller than a preset threshold value;
the first operation includes at least one of: and displaying the first time length to prompt the user to retransmit the target mail.
Optionally, the operation execution module is specifically configured to display the first duration on the first interface under the condition that the feedback email of the target email is not received before the current time.
Optionally, the operation execution module may be further specifically configured to display the second interface when the feedback email of the target email is not received before the current time;
and the second interface is used for resending the target mail to the target mailbox.
According to the method and the device, the mailbox application is called under the condition that the uninstalling operation of the target application is received and the privacy clearing authority of the target application is obtained, the target mail for exercising the data main body right is sent to the target mailbox corresponding to the target application, the data main body right is exercised, a user clicks the uninstalling application, the data main body right can be exercised by one key, other manual operations are not needed, the operation of exercising the data main body right can be automatically, conveniently and quickly executed, the efficiency of protecting the privacy data is improved, and the risk of privacy disclosure of the user is reduced. Furthermore, the process does not require that the user has privacy protection consciousness and relevant knowledge, is wider in application range and more universal, and can protect privacy data of all users.
The privacy data protection device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The private data protection device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android operating system (Android), an iOS operating system, or other possible operating systems, which is not specifically limited in the embodiments of the present application.
The private data protection apparatus provided in the embodiment of the present application can implement each process implemented in the method embodiment of fig. 1, and is not described here again to avoid repetition.
Optionally, as shown in fig. 3, an electronic device 300 is further provided in this embodiment of the present application, and includes a processor 301, a memory 302, and a program or an instruction stored in the memory 302 and capable of running on the processor 301, where the program or the instruction is executed by the processor 301 to implement each process of the foregoing private data protection method embodiment, and can achieve the same technical effect, and in order to avoid repetition, it is not described here again.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 4 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present application.
The electronic device 400 includes, but is not limited to: radio unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit 406, user input unit 407, interface unit 408, memory 409, and processor 410.
Those skilled in the art will appreciate that the electronic device 400 may further include a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 410 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 4 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or may combine some components, or different arrangements of components, and thus will not be described herein.
Wherein, the processor 410 is configured to receive an uninstall operation for a target application;
the processor 410 is further configured to, in a case that the privacy clearing authority of the target application is obtained, invoke a mailbox application, and send a target mail for exercising a data body right to a target mailbox corresponding to the target application;
the processor 410 is also used for setting and displaying a feedback countdown in the case that the target mail is successfully sent;
and the display unit 406 is configured to display an interface for resending the target email to the target mailbox when the feedback email of the target email is not received within the target time.
According to the method and the device, the mailbox application is called under the condition that the uninstalling operation of the target application is received and the privacy clearing authority of the target application is obtained, the target mail for exercising the data body right is sent to the target mailbox corresponding to the target application, the data body right is exercised, the interface for sending the target mail to the target mailbox again is displayed under the condition that the feedback mail of the target mail is not received within the target time, a user can select the exercising data body right by clicking the uninstalling application, other manual operations are not needed, the operation for exercising the data body right can be automatically, conveniently and quickly executed, the efficiency of protecting the privacy data is improved, and the risk of privacy disclosure of the user is reduced. Furthermore, the process does not require that the user has privacy protection consciousness and relevant knowledge, is wider in application range and more universal, and can protect privacy data of all users.
Optionally, the processor 410 is further configured to determine a feedback deadline of the target email according to the text of the privacy statement of the target application;
a processor 410, further configured to determine a first duration based on the feedback deadline and the current time;
the first duration is the duration between the current time and the feedback deadline.
Optionally, the processor 410 is further configured to perform a first operation when the first duration is less than a preset threshold;
the first operation includes at least one of: and displaying the first time length to prompt the user to retransmit the target mail.
Optionally, the processor 410 is further configured to display the first duration on the first interface in a case that the feedback e-mail of the target e-mail is not received before the current time.
Optionally, the processor 410 is further configured to display a second interface in a case that a feedback mail of the target mail is not received before the current time;
and the second interface is used for resending the target mail to the target mailbox.
It should be understood that in the embodiment of the present application, the input Unit 404 may include a Graphics Processing Unit (GPU) 4041 and a microphone 4042, and the Graphics processor 4041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 406 may include a display panel 4061, and the display panel 4061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 407 includes a touch panel 4071 and other input devices 4072. A touch panel 4071, also referred to as a touch screen. The touch panel 4071 may include two parts, a touch detection device and a touch controller. Other input devices 4072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 409 may be used to store software programs as well as various data including, but not limited to, target applications and operating systems. The processor 410 may integrate an application processor, which primarily handles operating system, user interface, and target applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 410.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned private data protection method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the above private data protection method embodiment, and can achieve the same technical effect, and for avoiding repetition, the description is omitted here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A method for protecting private data, comprising:
receiving an uninstalling operation of a target application;
under the condition of obtaining the privacy clearing authority of the target application, sending a target mail to a target mailbox corresponding to the target application;
the target mail is used for triggering the server to execute the operation of deleting the personal data of the target application of the target user.
2. The method for protecting private data according to claim 1, wherein after sending the target email to the target mailbox corresponding to the target application in the case of obtaining the privacy clearing authority of the target application, the method further comprises:
determining the feedback time limit of the target mail according to the text of the privacy statement of the target application;
determining a first duration based on the feedback deadline and a current time;
and the first time length is the time length from the current time to the feedback deadline.
3. The method of claim 2, wherein after determining the first duration based on the feedback deadline and the current time, the method further comprises:
executing a first operation under the condition that the first time length is smaller than a preset threshold value;
the first operation includes at least one of: and displaying the first time length and prompting a user to retransmit the target mail.
4. The method for protecting private data according to claim 3, wherein in the case that the first duration is less than a preset threshold, performing a first operation includes:
and under the condition that the feedback mails of the target mail are not received before the current time, displaying the first time length on a first interface.
5. The method for protecting private data according to claim 3, wherein in the case that the first duration is less than a preset threshold, performing a first operation includes:
displaying a second interface under the condition that a feedback mail of the target mail is not received before the current time;
and the second interface is used for resending the target mail to the target mailbox.
6. An apparatus for protecting private data, comprising:
the receiving module is used for receiving the unloading operation of the target application;
the right-of-line module is used for sending a target mail to a target mailbox corresponding to the target application under the condition of obtaining the privacy clearing authority of the target application;
the target mail is used for triggering the server to execute the operation of deleting the personal data of the target application of the target user.
7. The apparatus for protecting private data according to claim 6, further comprising:
the determining module is used for determining the feedback time limit of the target mail according to the text of the privacy statement of the target application;
the determining module is further configured to determine a first duration based on the feedback deadline and the current time;
and the first time length is the time length from the current time to the feedback deadline.
8. The apparatus for protecting private data according to claim 7, further comprising:
the execution module is used for executing a first operation under the condition that the first time length is smaller than a preset threshold value;
the first operation includes at least one of: and displaying the first time length and prompting a user to retransmit the target mail.
9. The apparatus according to claim 8, wherein the execution module is specifically configured to display the first duration on the first interface if the feedback e-mail of the target e-mail is not received before the current time.
10. The apparatus according to claim 8, wherein the execution module is specifically configured to display a second interface if a feedback email of the target email is not received before a current time;
and the second interface is used for resending the target mail to the target mailbox.
CN202110956425.XA 2021-08-19 2021-08-19 Private data protection method and device Pending CN113656834A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110956425.XA CN113656834A (en) 2021-08-19 2021-08-19 Private data protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110956425.XA CN113656834A (en) 2021-08-19 2021-08-19 Private data protection method and device

Publications (1)

Publication Number Publication Date
CN113656834A true CN113656834A (en) 2021-11-16

Family

ID=78492445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110956425.XA Pending CN113656834A (en) 2021-08-19 2021-08-19 Private data protection method and device

Country Status (1)

Country Link
CN (1) CN113656834A (en)

Similar Documents

Publication Publication Date Title
US11301114B2 (en) Method and apparatus for managing notification bar message
CN112099685B (en) Notification message display control method and device, electronic equipment and readable storage medium
CN112286412A (en) Notification message management method and device
CN106896986B (en) Conference record generation method and device
CN112671635A (en) Sending method, sending device and electronic equipment
CN113709306B (en) Session processing method and device and electronic equipment
CN112948843B (en) Encryption method, encryption device, electronic equipment and medium
CN113965614A (en) Session creation method and device and electronic equipment
CN113114845A (en) Notification message display method and device
CN113992615A (en) Display method and device of withdrawal message, electronic equipment and storage medium
CN111857466B (en) Message display method and device
CN112286616A (en) Dynamic wallpaper setting method and device and electronic equipment
WO2022253132A1 (en) Information display method and apparatus, and electronic device
CN113656834A (en) Private data protection method and device
CN106201678A (en) application program freezing method and system
CN112134987B (en) Information processing method and device and electronic equipment
CN114416264A (en) Message display method and device
CN113239212A (en) Information processing method and device and electronic equipment
CN112882789A (en) Information display method and device, electronic equipment and storage medium
CN112256179A (en) Text processing method and device
CN112230831A (en) Image processing method and device
CN112448884A (en) Content saving method and device
CN112578966B (en) Application program switching method and device and electronic equipment
CN114500445A (en) Communication record acquisition method and device, electronic equipment and storage medium
CN113961516A (en) File display method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination