CN108537037A - Privacy control method and device, computer readable storage medium, terminal - Google Patents

Privacy control method and device, computer readable storage medium, terminal Download PDF

Info

Publication number
CN108537037A
CN108537037A CN201810274179.8A CN201810274179A CN108537037A CN 108537037 A CN108537037 A CN 108537037A CN 201810274179 A CN201810274179 A CN 201810274179A CN 108537037 A CN108537037 A CN 108537037A
Authority
CN
China
Prior art keywords
terminal
privacy
use environment
preset
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810274179.8A
Other languages
Chinese (zh)
Inventor
张伟杰
张俊
谭春宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810274179.8A priority Critical patent/CN108537037A/en
Publication of CN108537037A publication Critical patent/CN108537037A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

This application involves a kind of privacy control methods and device, computer readable storage medium, terminal.This method includes:One in the preset multiple privacy class of each single item curriculum offering can independently to carry out privacy control in terminal;Multiple preset use environments are set for terminal, and configure corresponding testing conditions;A variety of preset control programs are provided for terminal;Establish the correspondence between the privacy class, use environment and control program;When terminal meets the feature of a use environment in multiple preset use environments, corresponding control program is executed according to the privacy class of content.By the way that multiple privacy class, multiple use environments and multiple control programs is arranged, it may be implemented to make a variety of privacy controls for meeting various usage scenarios to the content that can independently carry out privacy control in system, and it is to meet user demand and easy to use according to regular (i.e. correspondence) progress automatically.

Description

Privacy control method and device, computer readable storage medium, terminal
Technical field
This application involves field of terminal technology, more particularly to a kind of privacy control method and device, computer-readable deposit Storage media, terminal.
Background technology
As terminal device enters the intelligent epoch, the mobile terminals such as mobile phone, communication tablet are played the part of more in people's lives Carry out more important role.By various software applications, people can be met in social, shopping, amusement, work, study etc. Different demands.
Currently, the privacy control demand of intelligent terminal is more and more, and become increasingly complex, cannot meet various multiple Demand under miscellaneous scene, the demand under usage scenario especially with more spaces or multi-user.
Invention content
A kind of privacy control method of the embodiment of the present application offer and device, computer readable storage medium, terminal, to meet Intelligent privacy control demand under complex scene.
A kind of privacy control method is applied to terminal, the method includes:
One in the preset multiple privacy class of each single item curriculum offering can independently to carry out privacy control in terminal;
Multiple preset use environments are set for terminal, and configure corresponding testing conditions;
A variety of preset control programs are provided for terminal;
Establish the correspondence between the privacy class, use environment and control program;
When terminal meets the feature of a use environment in multiple preset use environments, according to the privacy grade of content Corresponding control program is not executed.
A kind of privacy apparatus method, including:
Privacy class setup module, for for each single item curriculum offering that privacy control can be independently carried out in terminal it is preset One in multiple privacy class;
Use environment configuration module for multiple preset use environments to be arranged for terminal, and configures corresponding detector bar Part;
Control program provides module, for providing a variety of preset control programs for terminal;
Corresponding relation building module, for establishing the correspondence between the privacy class, use environment and control program Relationship;
Privacy control execution module, the spy for meeting a use environment in multiple preset use environments when terminal When sign, corresponding control program is executed according to the privacy class of content.
A kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of the method in each embodiment of the application is realized when being executed by processor.
A kind of terminal, including memory, processor and storage are on a memory and the computer that can run on a processor Program, which is characterized in that the processor realizes the side in each embodiment of the application when executing the computer program The step of method.
Privacy control method and device that the embodiment of the present application is provided, computer readable storage medium, terminal, by setting Multiple privacy class, multiple use environments and multiple control programs are set, may be implemented to can independently carry out privacy in system The content of control make it is a variety of meet the privacy control of various usage scenarios, and be automatically according to regular (i.e. correspondence) into Row meets user demand and easy to use.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 2 is the flow chart of privacy control method in one embodiment;
Fig. 3 is use environment, the relational graph of privacy class, control program in one embodiment;
Fig. 4 is the flow chart of privacy control method in another embodiment;
Fig. 5 is use environment, the relational graph of privacy class, control program and Permission Levels in another embodiment;
Fig. 6 is the setting procedure figure of the privacy class in one embodiment;
Fig. 7 is the setting procedure figure of the default use environment in one embodiment;
Fig. 8 is the structure diagram of the privacy apparatus method in an embodiment;
Fig. 9 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe herein various elements, But these elements should not be limited by these terms.These terms are only used to distinguish first element and another element.Citing comes It says, without departing from the scope of the invention, the first privacy class can be known as the second privacy class, and similarly, Second privacy class can be known as the first privacy class.First privacy class and the second privacy class both privacy class, But it is not same privacy class.
In one embodiment, as shown in Figure 1, providing a kind of internal structure schematic diagram of terminal.The terminal includes logical Cross processor, memory and the display screen of system bus connection.Wherein, the processor is for providing calculating and control ability, branch Support the operation of entire terminal.Memory for storing data, program, and/or instruction code etc., stored on memory at least one Computer program, the computer program can be executed by processor, to realize that is provided in the embodiment of the present application is suitable for terminal Privacy control method.Memory may include that magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. are non-easily The property lost storage medium or random access memory (Random-Access-Memory, RAM) etc..For example, in one embodiment In, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system, database And computer program.A kind of privacy control method phase provided for realizing above each embodiment is provided in the database The data of pass, for example default processing strategy or default verification information can be stored etc..The computer program can performed by processor, For realizing a kind of privacy control method that each embodiment of the application is provided.Built-in storage is non-volatile memory medium In operating system, database and computer program the running environment of cache is provided.Display screen can be touch screen, such as For capacitance plate or electrical screen, it to be used for the interface information of display terminal.The terminal can be mobile phone, tablet computer or individual digital Assistant or Wearable etc..
Privacy control method in the present embodiment is described for running in terminal.The privacy control method Applied to terminal, and it specifically can be adapted for the system with the single space of single user, there are the multiple spaces of multiple users System and system with the multiple spaces of single user.
In the application, system refers to the operating system of terminal.The operating system can have the function in more spaces so that one Portion's terminal can open up multiple spaces, and user enters different spaces under different situations and uses.Include using situation but not It is limited to:One terminal only has there are one user, and only there are one user's spaces;One terminal only has there are one user, the user It opens in systems and belongs to the more than two user's spaces of itself, such as the principal space and private space or the principal space With children's spatial or the principal space and visitor space;One terminal has more than two users, each to use per family in systems Open a user's space for belonging to itself, or and wherein at least one user also additional there are one one's own Private space.
For the system in the single space of single user, corresponding privacy control demand can be, in different use environments In, different applications and data are shown, are pretended, replaced or hidden.Such as in working environment, by game application into Row is hidden.
For the system in the multiple spaces of single user, space that user may open up be one's own private space or The visitor space that person uses temporarily.Corresponding privacy control demand can be, in different use environments, to different applications Whole permission control is carried out with data, that is, carries out space switching.
For the system in the multiple spaces of multiple users, each user has one's own exclusive space.It is cut carrying out space It is related to the transfer of terminal between users when changing.Corresponding privacy control demand can be, it is ensured that multiple before and after switching is completed Privacy between user will not all be revealed.
This application involves terminals to need to carry out content the scheme of different privacy controls in different use environments.
The privacy control method of one embodiment of the application is as shown in Fig. 2, including step 202 to step 210.
Step 202:Can independently to carry out the preset multiple privacy class of each single item curriculum offering of privacy control in terminal In one.The content that privacy control can independently be carried out may include apply, data, setting, interface, user's space etc..It answers With such as social networking application, game application, Video Applications, reading application etc..Data such as short message content, audio file, video File, document, contact person etc..Setting such as hot spot setting, multi-user's setting, Bluetooth transmission setting etc.;Interface such as table Face background, account login interface etc..User's space such as owner space, private space, children's spatial.When being related to multi-user, The same application of multiple users also belongs to different independent privacy control contents.
Privacy class shows the degree of privacy of content for classifying to the content to be controlled.Privacy class is illustrated such as Under:Privacy class is high, in privacy class, privacy class it is low etc. etc..
The separately controllable property that privacy control emphasizes content can be independently carried out, meets more personalized control need to facilitate It asks.Such as it can be specific to the hidden of the short message to a certain short message or some contact person to the privacy control of note data Private control.
The privacy class can be that system provides, recommends or carried out by user self-defined.
Step 204:Multiple preset use environments are set for terminal, and configure corresponding testing conditions.I.e. to terminal into Row configuration, the multiple possible use environments of prior typing wherein.These use environments are to need to carry out privacy for users The use environment of control.The preset use environment can be that system provides, recommends or carried out by user self-defined.
When configuring use environment, needs cooperation to provide corresponding testing conditions, that is, confirm the testing conditions of use environment. Testing conditions may come from the system detectio function that terminal is capable of providing, to obtain system detectio parameter, including but not limited to The illumination letter of location information, light sensor offer that posture information, GPS sensor or the communication module that gyroscope provides provide The touch information and press that breath, the finger print information of fingerprint module offer, the image information of imaging sensor offer, touch screen provide The key information etc. that key provides.
In some embodiments, the correspondence of use environment and testing conditions may include at least one of:
When terminal connects and use family wifi or geographical location to be near residence in preset range, used for family Environment;When terminal connects and use school wifi or geographical location is in the preset range of school area, ring is used for school Border;When terminal connects and use company wifi or geographical location to be near company in preset range, for use environment of handling official business; It is public use environment when terminal connects and use public wifi or geographical location is in public activity region.These make It is mainly distinguished from the position where terminal with environment, wherein home environment has obvious privacy.At other In embodiment, other use environments are can also be.
Step 206:A variety of preset control programs are provided for terminal.Control program refers to that is made to the content that needs control Kind control.Based on privacy control demand, control program may include:It hides, replaces, pretend, switch, can access, forbid visiting It asks, Authority Verification and display etc..Such as it is carried out when hiding data, replacement application icon, camouflage applications entrance, modification setting Authority Verification etc..These controls are the operations to the object in system, and the function of being provided by system can be realized.
Step 208:Establish the correspondence between the privacy class, use environment and control program.
As shown in figure 3, for use environment, the relationship of privacy class, control program.
Use environment includes:Use environment 1, use environment 2 ..., use environment n;
Privacy class includes:Privacy class 1, privacy class 2 ..., privacy class n;
Control program includes:Control program 1, control program 2 ..., control program n.
Wherein, use environment and privacy class correspond to control program jointly.It, can be to which kind of i.e. under which kind of use environment Which kind of control program is the content of privacy class make.Use environment and privacy class are decided by the control program of content.
In the relationship between establishing three, control program=f (use environment, privacy class).The relationship may be used The mode of mapping table is fixed.The relationship can be that system provides, recommends or carried out by user self-defined.
Step 210:When terminal meets the feature of a use environment in multiple preset use environments, according to content Privacy class execute corresponding control program.This step can indicate to be performed simultaneously various control side in a use environment Case.Such as in a use environment, need to do three kinds of different controls respectively to the content of three kinds of different privacy class respectively Scheme.At this time if existing simultaneously the content of three kinds of privacy class in terminal, three kinds of different control programs are required to execute. Control program is executed i.e. to the operation in target system objectives execution system.Such as object is hidden, access rights are set Etc..
Above-mentioned privacy control method can by the way that multiple privacy class, multiple use environments and multiple control programs is arranged A variety of privacy controls for meeting various usage scenarios are made to the content that can independently carry out privacy control in system to realize, and And it is to meet user demand and easy to use according to regular (i.e. correspondence) progress automatically.
The privacy control method of another embodiment of the application is as shown in figure 4, including step 402 to step 412.
Step 402:One in the multiple privacy class of each single item curriculum offering can independently to carry out privacy control in terminal It is a.The content that privacy control can independently be carried out may include apply, data, setting, interface, user's space etc..Using for example Social networking application, game application, Video Applications, reading application etc..Data such as short message content, audio file, video file, text Shelves, contact person etc..Setting such as hot spot setting, multi-user's setting, Bluetooth transmission setting etc.;Interface such as desktop background, Account login interface etc..User's space such as owner space, private space, children's spatial.When being related to multi-user, multiple users Same application also belong to different independent privacy control contents.
Privacy class shows that content will carry out the control of which kind of degree for classifying to the content to be controlled.Privacy Rank is exemplified below:Privacy class is high, in privacy class, privacy class it is low etc..
The separately controllable property that privacy control emphasizes content can be independently carried out, meets more personalized control need to facilitate It asks.Such as it can be specific to the hidden of the short message to a certain short message or some contact person to the privacy control of note data Private control.
The privacy class can be that system provides, recommends or carried out by user self-defined.
Step 404:Multiple preset use environments are set for terminal, and configure corresponding testing conditions.I.e. to terminal into Row configuration, the multiple possible use environments of prior typing wherein.These use environments are to need to carry out privacy for users The use environment of control.The preset use environment can be that system provides, recommends or carried out by user self-defined.
When configuring use environment, needs cooperation to provide corresponding testing conditions, that is, confirm the testing conditions of use environment. Testing conditions may come from the system detectio function that terminal is capable of providing, to obtain system detectio parameter, including but not limited to The illumination letter of location information, light sensor offer that posture information, GPS sensor or the communication module that gyroscope provides provide The touch information and press that breath, the finger print information of fingerprint module offer, the image information of imaging sensor offer, touch screen provide The key information etc. that key provides.
Step 406:A variety of preset control programs are provided for terminal.Control program refers to that is made to the content that needs control Kind control.Based on privacy control demand, control program may include:It hides, replaces, pretend, switch, can access, forbid visiting It asks, Authority Verification and display etc..Such as it is carried out when hiding data, replacement application icon, camouflage applications entrance, modification setting Authority Verification etc..These controls are the operations to the object in system, and the function of being provided by system can be realized.
Step 408:Multiple users are set for terminal, and are each user setting Permission Levels.It is support multi-user Can also be each user setting Permission Levels after multi-user is set, to identify each user to can be only in system in system The vertical content for carrying out privacy control has great permission.The Permission Levels of user can also influence the setting of privacy class.Example If its curriculum offering can only be lower privacy class by the user of relatively low Permission Levels.
Step 410:Establish the correspondence between the privacy class, use environment, control program and Permission Levels.
As shown in figure 5, for use environment, the relationship of privacy class, control program and Permission Levels.
Use environment includes:Use environment 1, use environment 2 ..., use environment n;
Privacy class includes:Privacy class 1, privacy class 2 ..., privacy class n;
Control program includes:Control program 1, control program 2 ..., control program n;
Permission Levels include:Permission Levels 1, Permission Levels 2 ..., Permission Levels n.
Wherein, use environment, privacy class and Permission Levels correspond to control program jointly.I.e. under which kind of use environment, Which kind of control program can be made to the content of which kind of privacy class with which kind of Permission Levels.The control program of content is determined In use environment, privacy class and Permission Levels.
When establishing the relationship between four, control program=f (use environment, privacy class, Permission Levels).The relationship The mode that mapping table may be used is fixed.The relationship can be that system provides, recommends or carried out by user self-defined.
Step 412:When terminal meets the feature of a use environment in multiple preset use environments, according to content Privacy class execute corresponding control program.This step can indicate to be performed simultaneously various control side in a use environment Case.Such as in a use environment, need to do three kinds of different controls respectively to the content of three kinds of different privacy class respectively Scheme.At this time if existing simultaneously the content of three kinds of privacy class in terminal, three kinds of different control programs are required to execute. Control program is executed i.e. to the operation in target system objectives execution system.Such as object is hidden, access rights are set Etc..
In some embodiments, as shown in fig. 6, being installed in each single item can independently to carry out privacy control in terminal One step in preset multiple privacy class is set, i.e. above-mentioned steps 202 or step 402 includes:
Step 602:Multiple privacy class classification are provided.Can independently to carry out each single item content configuration of privacy control additionally Attribute, which can be selected as one kind in the classification of multiple privacy class.Or safeguard a mapping table, wherein content Mark storage corresponding with its privacy class.
Step 604:Each single item content is placed in one the classification of privacy class according to the user's choice.For configuring volume The attribute of each single item content is supplied to user to select by the realization method of outer attribute, system, and according to the choosing of user Instruction is selected to set property.For by the way of mapping table realization, by the mark of each single item content and privacy class according to The input or selection at family are stored.
In some embodiments, as shown in fig. 7, multiple preset use environments are arranged for terminal, and corresponding inspection is configured The step of survey condition, i.e. step 204 or step 404 may include:
Step 702:Use environment is created according to user instruction.Such as user can create a use environment, and name For " new use environment 1 ".
Step 704:System detectio function is provided, to obtain system detectio parameter.System provides system function, such as provides " GPS data ", " touch control detection data ", " wifi connection status data " etc..
Step 706:It is at least one system detectio function of newly-built use environment configuration according to user instruction, and is corresponding System detectio parameter setting detected value.Specify the newly-built use environment uses which detection data and qualified value It is how many.The Configuration Values of these testing conditions are inputted and preserved by user.To form user-defined use environment.
Step 702, which can also be, reads existing use environment, and in subsequent steps, to have use environment configuration New system detectio function and its detected value, or to the new detected value of existing system detectio functional configuration to adjust the use The testing conditions of environment keep it more accurate.
It will illustrate the privacy control method of the application with some specific examples below.
Family's use environment is entered by public use environment
Application, data, setting, interface in terminal etc. have been provided with predefined privacy grade under user's active operation Not.Such as " wechat:Privacy class is low ", " short message:In privacy class ", " hot spot be arranged:In privacy class ", " account of attending to anything else:It is hidden Private rank is high ".In some embodiments, which allows user's addition or self-defined.Such as define privacy class 1, Privacy class 2, privacy class 3, privacy class 4 etc..
Terminal saves a variety of use environments, such as " public use environment ", " family's use environment " by configuration.Its The testing conditions of middle public use environment configurations are:Terminal connects and uses public wifi or geographical location to be in public activity area In domain;The testing conditions of family use environment configuration are:It is attached that terminal connects and use family wifi or geographical location to be in residence In nearly preset range.Normally, it is not connected with public wifi and can also be used as the testing conditions in public use environment.Wherein, The determination in geographical location can be obtained according to the GPS sensor in terminal, or be obtained according to the communication of communication module and signal tower .
In some embodiments, which allows User Defined.Such as user can create a use environment, And it is named as " new use environment 1 ", then testing conditions are configured for it.System provides system function for the configuration process, such as There is provided " GPS data ", " touch control detection data ", " wifi connection status data " etc., and by the Configuration Values of these testing conditions It is inputted by user and is preserved.To form user-defined use environment.
Correspondence between privacy class, use environment and control program has been established by configuration in terminal.Wherein control Scheme is that system provides in advance, can realize these control programs by calling system function.The correspondence of foundation can be with It is:
Public use environment-privacy class is low-display;
In public use environment-privacy class-display;
Public use environment-privacy class is high-is hidden, forbids accessing;
Family's use environment-privacy class height-display can access;
Family's use environment-privacy class is low-display.
It, can privacy class is low and privacy grade according to above-mentioned correspondence when terminal is in public use environment Application, data, setting and interface in not are shown that is, wechat, short message and hot spot setting can be in public use environment In arbitrarily use.But account of attending to anything else will not then be shown, can not be accessed.
When detecting that terminal is connected to family wifi, or detect that the geographical location of terminal is in residence preset range It is interior, such as when in 100 meters, judge that user enters home environment, it, can be low by privacy class, hidden according to above-mentioned correspondence In private rank and application, data, setting and interface that privacy class is high shown, i.e., wechat, short message, hot spot setting, point Body account can all show and can access.
In some embodiments, the process of establishing of the correspondence allows user's modification or self-defined.Such as will be " public to make With in environment-privacy class-show " be revised as " in public use environment-privacy class-camouflage ".
School's use environment is entered by public use environment, and user is coordinated to switch
There is multi-user in terminal, and specifically there is parent user and child user.It is child suitable for parent It is equipped with the scene of mobile phone.The space that parent uses is owner space, and the space that child uses is children's spatial.Owner user and youngster Virgin user has different operating rights, and specifically, the operating right of owner user is more than the operating right of child user.
Owner space and children's spatial in terminal have been provided with predefined privacy class under user's active operation.Example Such as " children's spatial:Privacy class is low ", " owner space:Privacy class is high ".This is equivalent to all the elements in user's space Identical privacy class configuration is carried out.
Terminal saves a variety of use environments, such as " public use environment ", " school's use environment " by configuration.Its The testing conditions of middle public use environment configurations are:Terminal connects and uses public wifi or geographical location to be in public activity area In domain;The testing conditions of school use environment configuration are:It is attached that terminal connects and use school wifi or geographical location to be in school In nearly preset range.Normally, it is not connected with public wifi and can also be used as the testing conditions in public use environment.Wherein, The determination in geographical location can be obtained according to the GPS sensor in terminal, or be obtained according to the communication of communication module and signal tower .
Correspondence between privacy class, use environment and control program has been established by configuration in terminal.Wherein control Scheme is that system provides in advance, can realize these control programs by calling system function.The correspondence of foundation can be with It is:
Public use environment-privacy class is low-can access;
Public use environment-privacy class is high-can access;
School's use environment-privacy class is high-forbids accessing;
School's use environment-privacy class is low-can access.
It, can privacy class is low and privacy grade according to above-mentioned correspondence when terminal is in public use environment Not high owner space and children's spatial can access.
When detecting that terminal is connected to school wifi, or detect that the geographical location of terminal is in school's preset range It is interior, such as when in 100 meters, judge that user enters school environment, according to above-mentioned correspondence, it is low privacy class can be switched to Children's spatial so that it can access, and the high owner space of privacy class cannot then reuse.
It should be understood that although each step in the flow chart of Fig. 1-7 is shown successively according to the instruction of arrow, These steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 1-7 Part steps may include that either these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can either the sub-step of other steps or at least part in stage be in turn or alternately with other steps It executes.
Fig. 8 is the structure diagram of the privacy apparatus method of one embodiment of the application.The privacy apparatus method includes:
Privacy class setup module 802, for for each single item curriculum offering that privacy control can be independently carried out in terminal it is pre- If multiple privacy class in one;
Use environment configuration module 804 for multiple preset use environments to be arranged for terminal, and configures corresponding detection Condition;
Control program provides module 806, for providing a variety of preset control programs for terminal;
Corresponding relation building module 808, for establishing pair between the privacy class, use environment and control program It should be related to;
Privacy control execution module 810, for meeting a use environment in multiple preset use environments when terminal Feature when, corresponding control program is executed according to the privacy class of content.
In some embodiments, the privacy class setup module 802 includes:
Privacy class provides unit, for providing multiple privacy class classification;
Privacy class setup unit, for each single item content to be placed in one a privacy class point according to the user's choice Class.
In some embodiments, the use environment configuration module 804 includes:
Newly-built unit, for creating use environment according to user instruction;
System function provides unit, for providing system detectio function, to obtain system detectio parameter;
Parameter configuration unit, for being that newly-built use environment configures at least one system detectio function according to user instruction, And it is corresponding system detectio parameter setting detected value.
In some embodiments, the use environment configuration module 804 includes:
Reading unit, for reading preset use environment;
System function provides unit, for providing system detectio function, to obtain system detectio parameter;
Parameter configuration unit, for configuring new system detectio function according to the use environment that user instruction is reading, and For corresponding system detectio parameter setting detected value;Or detected value is reconfigured to configured system detectio function.
Specific about privacy apparatus method limits the restriction that may refer to above for privacy control method, herein not It repeats again.Modules in above-mentioned privacy apparatus method can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in or independently of in the processor in computer equipment, can also store in a software form in the form of hardware In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
Realizing for modules in the privacy apparatus method provided in the embodiment of the present application can be the shape of computer program Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal Or on the memory of server.When the computer program is executed by processor, privacy control described in the embodiment of the present application is realized The step of method processed.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors When so that the processor executes the step of privacy control method.
A kind of computer program product including instruction, when run on a computer so that computer executes privacy Control method.
The embodiment of the present application also provides a kind of terminals.As shown in figure 9, for convenience of description, illustrate only and the application The relevant part of embodiment, particular technique details do not disclose, please refer to the embodiment of the present application method part.The terminal can be Including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer, the arbitrary terminal device such as Wearable, by taking terminal is mobile phone as an example:
Fig. 9 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 9, mobile phone Including:Radio frequency (Radio Frequency, RF) circuit 910, memory 920, input unit 930, display unit 940, sensor 950, voicefrequency circuit 960, Wireless Fidelity (wireless fidelity, WiFi) module 970, processor 980 and power supply 990 Equal components.It will be understood by those skilled in the art that handset structure shown in Fig. 9 does not constitute the restriction to mobile phone, may include Than illustrating more or fewer components, certain components or different components arrangement are either combined.
Wherein, RF circuits 910 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station After downlink information receives, handled to processor 980;The data of uplink can also be sent to base station.In general, RF circuits include but Be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 910 can also be communicated with network and other equipment by radio communication.Above-mentioned channel radio Letter can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email, Short message service (Short Messaging Service, SMS) etc..
Memory 920 can be used for storing software program and module, and processor 980 is stored in memory 920 by operation Software program and module, to execute various function application and the data processing of mobile phone.Memory 920 can include mainly Program storage area and data storage area, wherein program storage area can storage program area, the application journey needed at least one function Sequence (such as the application program of sound-playing function, application program of image player function etc.) etc.;Data storage area can store root Created data (such as audio data, address list etc.) etc. are used according to mobile phone.In addition, memory 920 may include high speed Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or Other volatile solid-state parts.
Input unit 930 can be used for receiving the number or character information of input, and generate the user setting with mobile phone 900 And the related key signals input of function control.Specifically, input unit 930 may include operation panel 931 and other inputs Equipment 932.Operation panel 931, alternatively referred to as touch screen collect user on it or neighbouring touch operation (such as user Use the operation of any suitable object or attachment such as finger, stylus on operation panel 931 or near operation panel 931), And corresponding attachment device is driven according to preset formula.In one embodiment, operation panel 931 may include touching inspection Survey two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation The signal brought, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and will It is converted into contact coordinate, then gives processor 980, and can receive order that processor 980 is sent and be executed.In addition, The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave may be used and realize operation panel 931.In addition to operating surface Plate 931, input unit 930 can also include other input equipments 932.Specifically, other input equipments 932 may include but not It is limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.) etc..
Display unit 940 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 940 may include display panel 941.In one embodiment, liquid crystal display (Liquid may be used Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 941.In one embodiment, operation panel 931 can cover display panel 941, when operation panel 931 is examined It measures and sends processor 980 on it or after neighbouring touch operation to determine the type of touch event, be followed by subsequent processing device 980 provide corresponding visual output according to the type of touch event on display panel 941.Although in fig.9, operation panel 931 be to realize input and the input function of mobile phone as two independent components with display panel 941, but in certain implementations In example, can be integrated by operation panel 931 and display panel 941 and that realizes mobile phone output and input function.
Mobile phone 900 may also include at least one sensor 950, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and range sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 941, and range sensor can close display panel when mobile phone is moved in one's ear 941 and/or backlight.Motion sensor may include acceleration transducer, can detect by acceleration transducer and adds in all directions The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture Switching), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, humidity Other sensors such as meter, thermometer, infrared sensor etc..
Voicefrequency circuit 960, loud speaker 961 and microphone 962 can provide the audio interface between user and mobile phone.Audio-frequency electric The transformed electric signal of the audio data received can be transferred to loud speaker 961 by road 960, and sound is converted to by loud speaker 961 Signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 962, is turned after being received by voicefrequency circuit 960 It is changed to audio data, then by after the processing of audio data output processor 980, another mobile phone can be sent to through RF circuits 910, or Person exports audio data to memory 920 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 970 Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 9 is shown WiFi module 970, but it is understood that, and it is not belonging to must be configured into for mobile phone 900, it can omit as needed.
Processor 980 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 920, and call and be stored in memory 920 Data execute the various functions and processing data of mobile phone, to carry out whole monitoring to mobile phone.In one embodiment, it handles Device 980 may include one or more processing units.In one embodiment, processor 980 can integrate application processor and modulation Demodulator, wherein the main processing operation system of application processor, user interface and application program etc.;Modem is mainly located Reason wireless communication.It is understood that above-mentioned modem can not also be integrated into processor 980.For example, the processor 980 can integrate application processor and baseband processor, baseband processor with and the composable modem such as other peripheral chips. Mobile phone 900 further includes the power supply 990 (such as battery) powered to all parts, it is preferred that power supply can pass through power management system System is logically contiguous with processor 980, to realize the work(such as management charging, electric discharge and power managed by power-supply management system Energy.
In one embodiment, mobile phone 900 can also include camera, bluetooth module etc..
In the embodiment of the present application, when the processor included by the mobile phone executes the computer program of storage on a memory Realize above-mentioned described privacy control method.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, it is all considered to be the range of this specification record.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention Range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (10)

1. a kind of privacy control method is applied to terminal, the method includes:
One in the preset multiple privacy class of each single item curriculum offering can independently to carry out privacy control in terminal;
Multiple preset use environments are set for terminal, and configure corresponding testing conditions;
A variety of preset control programs are provided for terminal;
Establish the correspondence between the privacy class, use environment and control program;
When terminal meets the feature of a use environment in multiple preset use environments, held according to the privacy class of content The corresponding control program of row.
2. according to the method described in claim 1, it is characterized in that, described is that can independently carry out each of privacy control in terminal One step in preset multiple privacy class of curriculum offering includes:
Multiple privacy class classification are provided;
Each single item content is placed in one the classification of privacy class according to the user's choice.
3. according to the method described in claim 1, it is characterized in that, described be arranged multiple preset use environments for terminal, and The step of configuring corresponding testing conditions include:
Use environment is created according to user instruction;
System detectio function is provided, to obtain system detectio parameter;
It is at least one system detectio function of newly-built use environment configuration according to user instruction, and is corresponding system detectio parameter Detected value is set.
4. according to the method described in claim 1, it is characterized in that, described be arranged multiple preset use environments for terminal, and The step of configuring corresponding testing conditions include:
Read preset use environment;
System detectio function is provided, to obtain system detectio parameter;
It is that the use environment read configures new system detectio function, and is set for corresponding system detectio parameter according to user instruction Set detected value;Or detected value is reconfigured to configured system detectio function.
5. according to the method described in claim 1, it is characterized in that, described be arranged multiple preset use environments for terminal, and In the step of configuring corresponding testing conditions, the correspondence of use environment and testing conditions includes at least one of:
When terminal connects and use family wifi or geographical location to be near residence in preset range, ring is used for family Border;
When terminal connects and use school wifi or geographical location is in the preset range of school area, ring is used for school Border;
When terminal connects and use company wifi or geographical location to be near company in preset range, ring is used for office Border;
It is public use environment when terminal connects and use public wifi or geographical location is in public activity region.
6. according to the method described in claim 1, it is characterized in that, a variety of preset control programs include:It hides, replace Change, pretend, can access, forbid access, Authority Verification and display in it is a variety of.
7. according to the method described in claim 1, it is characterized in that, further including:
Multiple users are set for terminal, and are each user setting Permission Levels;
Establish the correspondence between the privacy class, use environment, control program and Permission Levels;
When terminal meets the feature of a use environment in multiple preset use environments, according to the privacy class of content and The Permission Levels of user execute corresponding control program.
8. a kind of privacy apparatus method, which is characterized in that described device includes:
Privacy class setup module, for for each single item curriculum offering that privacy control can be independently carried out in terminal it is preset multiple One in privacy class;
Use environment configuration module for multiple preset use environments to be arranged for terminal, and configures corresponding testing conditions;
Control program provides module, for providing a variety of preset control programs for terminal;
Corresponding relation building module, for establishing the correspondence between the privacy class, use environment and control program;
Privacy control execution module, the feature for meeting a use environment in multiple preset use environments when terminal When, corresponding control program is executed according to the privacy class of content.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of any one of claim 1 to 7 the method is realized when processor executes.
10. a kind of terminal, including memory, processor and storage are on a memory and the computer journey that can run on a processor Sequence, which is characterized in that the processor realizes any one of claim 1 to 7 the method when executing the computer program The step of.
CN201810274179.8A 2018-03-29 2018-03-29 Privacy control method and device, computer readable storage medium, terminal Pending CN108537037A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810274179.8A CN108537037A (en) 2018-03-29 2018-03-29 Privacy control method and device, computer readable storage medium, terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810274179.8A CN108537037A (en) 2018-03-29 2018-03-29 Privacy control method and device, computer readable storage medium, terminal

Publications (1)

Publication Number Publication Date
CN108537037A true CN108537037A (en) 2018-09-14

Family

ID=63481650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810274179.8A Pending CN108537037A (en) 2018-03-29 2018-03-29 Privacy control method and device, computer readable storage medium, terminal

Country Status (1)

Country Link
CN (1) CN108537037A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815676A (en) * 2019-01-29 2019-05-28 维沃移动通信有限公司 A kind of private space operating method and terminal device
CN109981904A (en) * 2019-03-28 2019-07-05 维沃移动通信有限公司 A kind of method for controlling volume and terminal device
CN110443036A (en) * 2019-08-13 2019-11-12 杭州安恒信息技术股份有限公司 A kind of method and apparatus that program carries out mimicry camouflage
CN110457879A (en) * 2019-06-26 2019-11-15 维沃移动通信有限公司 Object displaying method and terminal device
CN110995934A (en) * 2019-12-16 2020-04-10 北京小米移动软件有限公司 Method, device and medium for realizing multi-user use of intelligent terminal
CN112329060A (en) * 2020-11-05 2021-02-05 华为技术有限公司 Privacy information generation method and terminal equipment
WO2021190017A1 (en) * 2020-03-25 2021-09-30 支付宝(杭州)信息技术有限公司 Private data access method and apparatus, and electronic device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103685499A (en) * 2013-12-06 2014-03-26 深圳酷派技术有限公司 Terminal, server, application program management system and application program management method
CN103853986A (en) * 2014-01-03 2014-06-11 李凤华 Access control method and device
CN105554264A (en) * 2015-12-11 2016-05-04 北京元心科技有限公司 function limiting method and system of mobile terminal
CN105873062A (en) * 2016-06-27 2016-08-17 联想(北京)有限公司 Method and device to be networked with wireless communication network, and terminal equipment
CN106682539A (en) * 2016-11-30 2017-05-17 宇龙计算机通信科技(深圳)有限公司 Terminal screen unlocking control method and device
CN106997761A (en) * 2017-04-20 2017-08-01 滁州职业技术学院 The method and mobile terminal of a kind of secret protection
CN107153779A (en) * 2017-04-21 2017-09-12 珠海市魅族科技有限公司 Method for secret protection and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103685499A (en) * 2013-12-06 2014-03-26 深圳酷派技术有限公司 Terminal, server, application program management system and application program management method
CN103853986A (en) * 2014-01-03 2014-06-11 李凤华 Access control method and device
CN105554264A (en) * 2015-12-11 2016-05-04 北京元心科技有限公司 function limiting method and system of mobile terminal
CN105873062A (en) * 2016-06-27 2016-08-17 联想(北京)有限公司 Method and device to be networked with wireless communication network, and terminal equipment
CN106682539A (en) * 2016-11-30 2017-05-17 宇龙计算机通信科技(深圳)有限公司 Terminal screen unlocking control method and device
CN106997761A (en) * 2017-04-20 2017-08-01 滁州职业技术学院 The method and mobile terminal of a kind of secret protection
CN107153779A (en) * 2017-04-21 2017-09-12 珠海市魅族科技有限公司 Method for secret protection and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815676A (en) * 2019-01-29 2019-05-28 维沃移动通信有限公司 A kind of private space operating method and terminal device
CN109815676B (en) * 2019-01-29 2021-07-02 维沃移动通信有限公司 Privacy space operation method and terminal equipment
CN109981904A (en) * 2019-03-28 2019-07-05 维沃移动通信有限公司 A kind of method for controlling volume and terminal device
CN110457879A (en) * 2019-06-26 2019-11-15 维沃移动通信有限公司 Object displaying method and terminal device
CN110443036A (en) * 2019-08-13 2019-11-12 杭州安恒信息技术股份有限公司 A kind of method and apparatus that program carries out mimicry camouflage
CN110995934A (en) * 2019-12-16 2020-04-10 北京小米移动软件有限公司 Method, device and medium for realizing multi-user use of intelligent terminal
WO2021190017A1 (en) * 2020-03-25 2021-09-30 支付宝(杭州)信息技术有限公司 Private data access method and apparatus, and electronic device
CN112329060A (en) * 2020-11-05 2021-02-05 华为技术有限公司 Privacy information generation method and terminal equipment

Similar Documents

Publication Publication Date Title
CN108537037A (en) Privacy control method and device, computer readable storage medium, terminal
CN104915582B (en) unlocking method and device
CN105100090B (en) Communication method, server and system based on internal and external network separation
CN104426963B (en) The method and terminal of associated terminal
CN108334755A (en) Private space creation method and device, storage medium, electronic equipment
CN108536783A (en) Data processing method and device, terminal, computer readable storage medium
CN105898794A (en) Device and method of transmitting data
CN106412093A (en) Method, device and system for uploading data
CN108521494A (en) Terminal control method and device, readable storage medium storing program for executing, terminal
CN108563932A (en) Application control method and apparatus, readable storage medium storing program for executing, terminal
CN108573169A (en) Nearest task list display methods and device, storage medium, electronic equipment
CN105100477B (en) Terminal notifying device and method
CN108573168A (en) Private space starts method and apparatus, storage medium, electronic equipment
CN107682851A (en) Information processing method, device, mobile terminal and computer-readable recording medium
CN104820546B (en) Function information methods of exhibiting and device
CN108509788A (en) Information sharing method and device, computer readable storage medium, terminal
CN107786749A (en) A kind of information processing method, terminal and computer-readable recording medium
CN108537027A (en) Resource allocation methods and device, terminal, computer readable storage medium
CN107133507A (en) A kind of privacy services system access method, device and mobile terminal
CN108632454A (en) Information processing method and device, computer readable storage medium, terminal
CN107103074A (en) The processing method and mobile terminal of a kind of sharing information
CN108551524A (en) Message informing method and device, terminal between polygonal color in terminal
CN104901992B (en) A kind of method and apparatus of resource transfers
CN108012029A (en) A kind of information processing method, equipment and computer-readable recording medium
CN106210276A (en) Mobile terminal and the processing method of application message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180914

RJ01 Rejection of invention patent application after publication