CN108763953A - A kind of the privacy settings method, apparatus and terminal device of social software - Google Patents
A kind of the privacy settings method, apparatus and terminal device of social software Download PDFInfo
- Publication number
- CN108763953A CN108763953A CN201810450506.0A CN201810450506A CN108763953A CN 108763953 A CN108763953 A CN 108763953A CN 201810450506 A CN201810450506 A CN 201810450506A CN 108763953 A CN108763953 A CN 108763953A
- Authority
- CN
- China
- Prior art keywords
- information
- social software
- user
- affiliated person
- privacy policy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000004891 communication Methods 0.000 claims description 46
- 238000012545 processing Methods 0.000 claims description 12
- 230000006399 behavior Effects 0.000 claims description 11
- 230000003542 behavioural effect Effects 0.000 claims description 10
- 230000000694 effects Effects 0.000 claims description 8
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 230000005611 electricity Effects 0.000 description 3
- 210000004556 brain Anatomy 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 210000003813 thumb Anatomy 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Tourism & Hospitality (AREA)
- Primary Health Care (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- Economics (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the present application provides a kind of the privacy settings method, apparatus and terminal device of social software, the method includes:The method includes:There are associated information with user's history behavior for acquisition, and affiliated person's information of the user is obtained according to described information;According to affiliated person's information of the user, the identity information that each affiliated person logs in each social software is obtained;The privacy policy of each social software is set, all or part of affiliated person of the user is shielded according to the privacy policy and the identity information of each social software.The embodiment of the present application can more preferably realize the privacy settings of social software, by the way that privacy policy batch shielding affiliated person is arranged.
Description
Technical field
The invention relates to a kind of privacy settings method of Internet technical field more particularly to social software, dresses
It sets and terminal device.
Background technology
With the development of Internet technology, the social softwares such as microblogging, wechat pass through at the key player in for people's lives
Social software is shared daily life and is come to realize as the important channel made friends.Usual user can pass through the privacy policy of social software
Some affiliated persons are masked, avoids it from watching all or part of of oneself and dynamically shares.
But user is sometimes for protection privacy or particular demands, it is desirable to the dynamic issued share mask it is all ripe
People is not intended to any multidate information that there is social associated people and obtain oneself publication.And existing social software is for this
Type shielding can not provide enough selection spaces, and user can only mask known association people by way of selection.
In addition existing social software is that label is arranged for the affiliated person in social software address list manually by user, is led to
It crosses to manually select label or manually select specific affiliated person and privacy policy is set, in shielded segment social software address list
Affiliated person avoids it from watching all or part of of oneself and dynamically shares.
But user needs to be arranged into row label manually or be associated person manually to select, it can not be soft according to other social activities
Affiliated person in part address list carries out unified privacy policy setting.For example, under certain dynamic of wechat circle of friends, it is unified to select
Select the affiliated person masked in mobile portable phone address list.Alternatively, under certain dynamic of microblogging, unified selection masks every other
The affiliated person in address list in social software, i.e., invisible dynamic of all acquaintances etc..In addition, if social software is microblogging
Equal unidirectional relationships social media platform, user can not be arranged privacy policy and carry out batch affiliated person's shielding, can only be according to the association
The identity information of people carries out privacy policy setting by manually mode one by one, shields the affiliated person.
Therefore, how more preferably to realize that the privacy settings of social software are asked as technology urgently to be resolved hurrily in the prior art
Topic.
Invention content
The embodiment of the present application provides a kind of the privacy settings method, apparatus and terminal device of social software, can be more
The privacy settings of good realization social software, by the way that privacy policy batch shielding affiliated person is arranged.
According to the one side of the embodiment of the present application, a kind of privacy settings method of social software, the method are provided
Including:There are associated information with user's history behavior for acquisition, and affiliated person's information of the user is obtained according to described information;
According to affiliated person's information of the user, the identity information that each affiliated person logs in each social software is obtained;Each social activity is set
The privacy policy of software, according to the privacy policy and the identity information of each social software to the whole of the user or
Partial association people shields.
According to the other side of the embodiment of the present application, a kind of privacy settings device of social software is additionally provided, it is described
Device includes:Information acquisition module, for acquisition, there are associated information with user's history behavior, and are obtained according to described information
Affiliated person's information of the user;Identity obtains module, for affiliated person's information according to the user, obtains each affiliated person and steps on
Record the identity information of each social software;Strategy setting module, the privacy policy for each social software to be arranged, according to described
Privacy policy and the identity information of each social software shield all or part of affiliated person of the user.
According to the another aspect of the embodiment of the present application, a kind of terminal device is additionally provided, including:Processor, memory,
Communication interface and communication bus, the processor, the memory and the communication interface complete phase by the communication bus
Communication between mutually;The memory makes the processor execute for storing an at least executable instruction, the executable instruction
The corresponding operation of privacy settings method of social software as described above.
According to technical solution provided by the embodiments of the present application, the embodiment of the present application obtains institute according to user's history behavioural information
Affiliated person's information of user is stated, and then according to affiliated person's information of the user, obtains each affiliated person and logs in each social software
Identity information.The privacy policy of each social software described in user setting, according to the privacy policy and each social software
Identity information shields all or part of affiliated person of the user.It follows that the embodiment of the present application can will be used
Family historical behavior information establishes association, to obtain the identity information that user-association people logs in each social software, utilizes the body
The privacy policy of part information and the social software of setting, thus to the whole of other social softwares or portion in social software
Affiliated person is divided to shield.Also, the application can be applied to individual event social platform class social software simultaneously and both-way communication is social
Software.
Description of the drawings
Fig. 1 is the step flow chart according to a kind of privacy settings method of social software of the embodiment of the present application one;
The step of Fig. 2 is the step S101 according to a kind of privacy settings method of social software of the embodiment of the present application one is flowed
Cheng Tu;
The step of Fig. 3 is the step S103 according to a kind of privacy settings method of social software of the embodiment of the present application one is flowed
Cheng Tu;
Fig. 4 is one set according to a kind of privacy policy of the privacy settings method of social software of the embodiment of the present application one
Page schematic diagram;
The step of Fig. 5 is the step S1032 according to a kind of privacy settings method of social software of the embodiment of the present application one
Flow chart;
Fig. 6 be set according to a kind of privacy policy of the privacy settings method of social software of the embodiment of the present application one it is another
One page schematic diagram;
Fig. 7 is the structure diagram according to a kind of privacy settings device of social software of the embodiment of the present application two;
Fig. 8 is the knot according to a kind of information acquisition module of the privacy settings device of social software of the embodiment of the present application two
Structure block diagram;
Fig. 9 is the knot according to a kind of strategy setting module of the privacy settings device of social software of the embodiment of the present application two
Structure block diagram;
Figure 10 is the selection screen unit according to a kind of privacy settings device of social software of the embodiment of the present application two
Structure diagram;
Figure 11 is the structure diagram according to a kind of terminal device of the embodiment of the present application three.
Specific implementation mode
(identical label indicates identical element in several attached drawings) and embodiment below in conjunction with the accompanying drawings, implement the application
The specific implementation mode of example is described in further detail.Following embodiment is not limited to the application for illustrating the application
Range.
It will be understood by those skilled in the art that the terms such as " first ", " second " in the embodiment of the present application are only used for distinguishing
Different step, equipment or module etc. neither represent any particular technology meaning, also do not indicate that the inevitable logic between them is suitable
Sequence.
Embodiment one
Referring to Fig.1, the step of showing the privacy settings method according to a kind of social software of the embodiment of the present application one is flowed
Cheng Tu.
It is worth noting that herein described step S101 to S103 does not represent the sequencing of its execution.
The privacy settings method of the social software of the present embodiment includes the following steps:
Step S101:There are associated information with user's history behavior for acquisition, and obtain the user according to described information
Affiliated person's information.
Herein described user's history behavior includes:The communication of telephonic communication record information and/or each social software in terminal
Record information, comment information interactive informations, the personal letter such as thumb up etc..
For example, the embodiment of the present application obtains the address list information of telephonic communication record information and/or each social software in terminal,
Affiliated person's information of the user is obtained according to the address list information.The embodiment of the present application can also be by storing beyond the clouds
Social software address list obtains affiliated person's information of user.Social software address list described in the embodiment of the present application also includes unidirectional
Affiliated person's information, such as:" people of concern ", " interested people ", " public platform " etc..
For another example, the embodiment of the present application obtains other comments under the comment information and the comment that user delivers in certain forum
Information, the user and another forum user are affiliated person according to the comment information, obtain affiliated person's information of user.
In the application in the specific implementation, referring to Fig. 2, the step S101 includes:
Step S1011:The user's history behavioural information is merged, there may be passes with the user for analysis acquisition
Affiliated person's information of connection.
Step S1012:To described there may be the progress analyzing processing of associated affiliated person's information, the user is determined most
Whole affiliated person's information.
For example, being logged in since each social software requires input handset number to complete registration, pass through the logical of phone
The address list information for each social software that news record information is installed with terminal merges, and acquisition is established associated address list information and made
For there may be associated affiliated person's information.For another example since the comment of user user in public forum is usually associated with, utilize
Association comment obtain user between incidence relation, obtain the user there may be associated affiliated person's information.
There may be associated affiliated person's information to carry out analyzing processing described in for the embodiment of the present application.For example, according to figure
As identification technology identifies that personage issues personage in photo with other affiliated persons in each social software in the photo in user's photograph album
The similar relationship obtained in each social software between each affiliated person.For another example according to the person names occurred in each social software,
The pet name and various "@" relationships etc. obtain the relationship between each affiliated person.Using the relationship between each affiliated person to the merging
Information afterwards is handled, and the relationship that user can be manually between each affiliated person is adjusted and merges, can also be according to machine
Device learning algorithm is realized between each affiliated person the adjustment of relationship and is merged.
Therefore, the embodiment of the present application can utilize the user's history behavioural information and the analysis by algorithm and place
Reason obtains the relationship between affiliated person in each address list of the comprehensive user, ensures affiliated person's information of the user
Accurately with it is detailed.
Step S102:According to affiliated person's information of the user, the identity letter that each affiliated person logs in each social software is obtained
Breath.
It is another in the application in the specific implementation, the step S102 is specially:
Analyzing processing is carried out to final affiliated person's information, obtains the identity letter that the affiliated person logs in each social software
Breath.
For example, the application by each affiliated person obtained according to the incidence relation log in the identity information of each social software with
Telephone number establishes correspondence, can obtain each affiliated person's identity information in each social software by unique telephone number
Between association.
Step S103:The privacy policy of each social software is set, it is soft according to the privacy policy and each social activity
The identity information of part shields all or part of affiliated person of the user.
It is another in the specific implementation, referring to Fig. 3, the step S103 includes in the application:
Step S1031:The privacy policy of each social software is configured according to user instruction, the privacy policy
Include that the affiliated person recorded to other social softwares and/or telephonic communication shields situation.
Specifically, referring to Fig. 4, user carries out privacy policy by operational order to each social software of the terminal operating
Setting, by privacy policy be arranged the page, selection mask other social softwares and/or telephonic communication record it is all or part of
Affiliated person.
Step S1032:According to the identity information of the privacy policy and each social software, select corresponding social activity soft
All or part of affiliated person in part and/or telephonic communication record shields.
Referring to Fig. 5, the step S1032 includes:
Step S10321:The corresponding social software of the privacy policy is obtained, and logs in the association of the social software
People's identity information.
Step S10322:Whole in selecting the social software and/or telephonic communication to record according to user instruction or portion
Affiliated person is divided to shield.
Specifically, referring to Fig. 6, according to the identity information of the privacy policy and each social software, user can be into
All or part of affiliated person during one step selects corresponding social software and/or telephonic communication to record in operation pages is shielded
It covers.
It follows that the embodiment of the present application obtains affiliated person's information of the user according to user's history behavioural information, into
And according to affiliated person's information of the user, obtain the identity information that each affiliated person logs in each social software.Described in user setting
The privacy policy of each social software, according to the privacy policy and the identity information of each social software to the complete of the user
Portion or partial association people shield.It is associated with it follows that the embodiment of the present application can establish user's history behavioural information,
To obtain the identity information that user-association people logs in each social software, the identity information and the social software of setting are utilized
Privacy policy, to being shielded to all or part of affiliated person of other social softwares in social software.Also, this
Application can be applied to individual event social platform class social software and both-way communication social software simultaneously.
The privacy settings method of the social software of the present embodiment can be set by any suitable privacy with social software
The equipment of capability executes, including but not limited to:Various terminal equipment or server-side, including but not limited to PC machine, tablet electricity
Brain, mobile terminal etc..
Embodiment two
With reference to Fig. 7, a kind of structure chart of the privacy settings device of social software according to the embodiment of the present application two is shown.
The privacy settings device of the social software of the present embodiment includes:
Information acquisition module 701, for acquisition, there are associated information with user's history behavior, and are obtained according to described information
Obtain affiliated person's information of the user.
Identity obtains module 702, and for affiliated person's information according to the user, it is soft to obtain each social activity of each affiliated person's login
The identity information of part.
Strategy setting module 703, the privacy policy for each social software to be arranged, according to the privacy policy and institute
The identity information for stating each social software shields all or part of affiliated person of the user.
Herein described user's history behavior includes:The communication of telephonic communication record information and/or each social software in terminal
Record information, comment information interactive informations, the personal letter such as thumb up etc..
For example, the embodiment of the present application obtains the address list information of telephonic communication record information and/or each social software in terminal,
Affiliated person's information of the user is obtained according to the address list information.The embodiment of the present application can also be by storing beyond the clouds
Social software address list obtains affiliated person's information of user.Social software address list described in the embodiment of the present application also includes unidirectional
Affiliated person's information, such as:" people of concern ", " interested people ", " public platform " etc..
For another example, the embodiment of the present application obtains other comments under the comment information and the comment that user delivers in certain forum
Information, the user and another forum user are affiliated person according to the comment information, obtain affiliated person's information of user.
In the application in the specific implementation, referring to Fig. 8, described information obtains module 701 and includes:
Information combination unit 7011, for merging the user's history behavioural information, analysis obtains and the use
There may be associated affiliated person's information at family.
Information process unit 7012, for, there may be the progress analyzing processing of associated affiliated person's information, being determined to described
Final affiliated person's information of the user.
For example, being logged in since each social software requires input handset number to complete registration, pass through the logical of phone
The address list information for each social software that news record information is installed with terminal merges, and acquisition is established associated address list information and made
For there may be associated affiliated person's information.For another example since the comment of user user in public forum is usually associated with, utilize
Association comment obtain user between incidence relation, obtain the user there may be associated affiliated person's information.
There may be associated affiliated person's information to carry out analyzing processing described in for the embodiment of the present application.For example, according to figure
As identification technology identifies that personage issues personage in photo with other affiliated persons in each social software in the photo in user's photograph album
The similar relationship obtained in each social software between each affiliated person.For another example according to the person names occurred in each social software,
The pet name and various "@" relationships etc. obtain the relationship between each affiliated person.Using the relationship between each affiliated person to the merging
Information afterwards is handled, and the relationship that user can be manually between each affiliated person is adjusted and merges, can also be according to machine
Device learning algorithm is realized between each affiliated person the adjustment of relationship and is merged.
Therefore, the embodiment of the present application can utilize the user's history behavioural information and the analysis by algorithm and place
Reason obtains the relationship between affiliated person in each address list of the comprehensive user, ensures affiliated person's information of the user
Accurately with it is detailed.
It is another in the application in the specific implementation, the identity obtains module 702 is specially:
Analyzing processing is carried out to final affiliated person's information, obtains the identity letter that the affiliated person logs in each social software
Breath.
For example, the application by each affiliated person obtained according to the incidence relation log in the identity information of each social software with
Telephone number establishes correspondence, can obtain each affiliated person's identity information in each social software by unique telephone number
Between association.
It is another in the specific implementation, referring to Fig. 9, the strategy setting module 703 includes in the application:
Instruction reception unit 7031, for being configured to the privacy policy of each social software according to user instruction,
The privacy policy includes that the affiliated person recorded to other social softwares and/or telephonic communication shields situation.
Screen unit 7032 is selected, for the identity information according to the privacy policy and each social software, selection
All or part of affiliated person in corresponding social software and/or telephonic communication record shields.
Specifically, referring to Fig. 4, user carries out privacy policy by operational order to each social software of the terminal operating
Setting, by privacy policy be arranged the page, selection mask other social softwares and/or telephonic communication record it is all or part of
Affiliated person.
Referring to Figure 10, the step selection screen unit 7032 includes:
First shielding subelement 70321, for obtaining the corresponding social software of the privacy policy, and the login society
Hand over affiliated person's identity information of software;
Secondary shielding subelement 70322, for being selected in the social software and/or telephonic communication record according to user instruction
All or part of affiliated person shield.
Specifically, referring to Fig. 5, according to the identity information of the privacy policy and each social software, user can be into
All or part of affiliated person during one step selects corresponding social software and/or telephonic communication to record in operation pages is shielded
It covers.
It follows that the embodiment of the present application can establish subscriber phone address list and/or the address list of each social software
Association is believed to obtain the identity information that the affiliated person in user communication record information logs in each social software using the identity
The privacy policy of breath and the social software of setting, thus to all or part of pass of other social softwares in social software
Connection people shields.Also, the application can be applied to individual event social platform class social software and both-way communication social software simultaneously.
Therefore, the embodiment of the present application can more preferably realize the privacy settings of social software, be closed by the way that privacy policy batch shielding is arranged
Join people.
The privacy settings method of the social software of the present embodiment can be set by any suitable privacy with social software
The equipment of capability executes, including but not limited to:Various terminal equipment or server-side, including but not limited to PC machine, tablet electricity
Brain, mobile terminal etc..
Embodiment three
Referring to Fig.1 1, show that a kind of structure diagram of terminal device according to the embodiment of the present application three, the application are specific
Embodiment does not limit the specific implementation of terminal device.
As shown in figure 11, which may include:Processor (processor) 1102, communication interface
(Communications Interface) 1104, memory (memory) 1106 and communication bus 1108.
Wherein:
Processor 1102, communication interface 1104 and memory 1106 complete mutual lead to by communication bus 1108
Letter.
Communication interface 1104, for being communicated with the network element of the such as other terminals of miscellaneous equipment or server-side etc..
Processor 1102, for executing program 1110, the privacy settings method that can specifically execute above-mentioned social software is real
Apply the correlation step in example.
Specifically, program 1110 may include program code, which includes computer-managed instruction.
Processor 1102 may be central processor CPU or specific integrated circuit ASIC (Application
Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present application
Road.The one or more processors that terminal device includes can be same type of processor, such as one or more CPU;Also may be used
To be different types of processor, such as one or more CPU and one or more ASIC.
Memory 1106, for storing program 1110.Memory 1106 may include high-speed RAM memory, it is also possible to also
Including nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Program 1110 specifically can be used for so that processor 1102 executes following operation:It obtains and exists with user's history behavior
Associated information, and obtain according to described information affiliated person's information of the user;According to affiliated person's information of the user, obtain
Obtain the identity information that each affiliated person logs in each social software;The privacy policy of each social software is set, according to the privacy
The identity information of tactful and described each social software shields all or part of affiliated person of the user.
In a kind of optional embodiment, program 1110 is additionally operable to merge the user's history behavioural information,
There may be associated affiliated person's information with the user for analysis acquisition;There may be the progress of associated affiliated person's information to described
Analyzing processing determines final affiliated person's information of the user.
In a kind of optional embodiment, program 1110 is additionally operable to carry out at analysis final affiliated person's information
Reason, obtains the identity information that the affiliated person logs in each social software.
In a kind of optional embodiment, program 1110 is additionally operable to according to user instruction to the hidden of each social software
Private strategy is configured, and the privacy policy includes that the affiliated person recorded to other social softwares and/or telephonic communication shields situation;
According to the identity information of the privacy policy and each social software, corresponding social software and/or telephonic communication is selected to record
In all or part of affiliated person shield.
In a kind of optional embodiment, program 1110 is additionally operable to obtain the corresponding social software of the privacy policy,
And log in affiliated person's identity information of the social software;Select the social software and/or phone logical according to user instruction
All or part of affiliated person in news record shields.
It follows that the embodiment of the present application can establish subscriber phone address list and/or the address list of each social software
Association is believed to obtain the identity information that the affiliated person in user communication record information logs in each social software using the identity
The privacy policy of breath and the social software of setting, thus to all or part of pass of other social softwares in social software
Connection people shields.Also, the application can be applied to individual event social platform class social software and both-way communication social software simultaneously.
Therefore, the embodiment of the present application can more preferably realize the privacy settings of social software, be closed by the way that privacy policy batch shielding is arranged
Join people.
It may be noted that according to the needs of implementation, all parts/step described in the embodiment of the present application can be split as more
The part operation of two or more components/steps or components/steps can be also combined into new component/step by multi-part/step
Suddenly, to realize the purpose of the embodiment of the present application.
The above-mentioned method according to the embodiment of the present application can be realized in hardware, firmware, or be implemented as being storable in note
Software or computer code in recording medium (such as CD ROM, RAM, floppy disk, hard disk or magneto-optic disk), or it is implemented through net
The original storage that network is downloaded in long-range recording medium or nonvolatile machine readable media and will be stored in local recording medium
In computer code, can be stored in using all-purpose computer, application specific processor or can compile to method described here
Such software processing in journey or the recording medium of specialized hardware (such as ASIC or FPGA).It is appreciated that computer, processing
Device, microprocessor controller or programmable hardware include can store or receive software or computer code storage assembly (for example,
RAM, ROM, flash memory etc.), when the software or computer code are by computer, processor or hardware access and execute, realize
The privacy settings method of social software described here.In addition, when all-purpose computer accesses for realizing the social activity being shown here
When the code of the privacy settings method of software, the execution of code is converted to all-purpose computer for executing the social activity being shown here
The special purpose computer of the privacy settings method of software.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and method and step can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The range of the embodiment of the present application.
Embodiment of above is merely to illustrate the embodiment of the present application, and is not the limitation to the embodiment of the present application, related skill
The those of ordinary skill in art field can also make various in the case where not departing from the spirit and scope of the embodiment of the present application
Variation and modification, therefore all equivalent technical solutions also belong to the scope of the embodiment of the present application, the patent of the embodiment of the present application
Protection domain should be defined by the claims.
Claims (11)
1. a kind of privacy settings method of social software, which is characterized in that the method includes:
There are associated information with user's history behavior for acquisition, and affiliated person's information of the user is obtained according to described information;
According to affiliated person's information of the user, the identity information that each affiliated person logs in each social software is obtained;
The privacy policy of each social software is set, according to the identity information pair of the privacy policy and each social software
The all or part of affiliated person of the user shields.
2. according to the method described in claim 1, it is characterized in that, it is described obtain there are associated letters with user's history behavior
Breath, and the affiliated person's information for obtaining according to described information the user includes:
The user's history behavioural information is merged, there may be associated affiliated persons to believe with the user for analysis acquisition
Breath;
To described there may be the progress analyzing processing of associated affiliated person's information, final affiliated person's information of the user is determined.
3. according to the method described in claim 2, it is characterized in that, affiliated person's information according to the user, obtains each
The identity information that affiliated person logs in each social software is specially:
Analyzing processing is carried out to final affiliated person's information, obtains the identity information that the affiliated person logs in each social software.
4. according to the method in any one of claims 1 to 3, which is characterized in that setting each social software
Privacy policy, according to the privacy policy and the identity information of each social software to all or part of pass of the user
Connection people carries out shielding:
The privacy policy of each social software is configured according to user instruction, the privacy policy includes to other social activities
The affiliated person of software and/or telephonic communication record shields situation;
According to the identity information of the privacy policy and each social software, select corresponding social software and/or phone logical
All or part of affiliated person in news record shields.
5. according to the method described in claim 4, it is characterized in that, described according to the privacy policy and each social software
Identity information, all or part of affiliated person in selecting corresponding social software and/or telephonic communication to record carries out shielding packet
It includes:
The corresponding social software of the privacy policy is obtained, and logs in affiliated person's identity information of the social software;
All or part of affiliated person in selecting the social software and/or telephonic communication to record according to user instruction is shielded
It covers.
6. a kind of privacy settings device of social software, which is characterized in that described device includes:
Information acquisition module, there are associated information with user's history behavior for obtaining, and described in being obtained according to described information
Affiliated person's information of user;
Identity obtains module, for affiliated person's information according to the user, obtains the body that each affiliated person logs in each social software
Part information;
Strategy setting module, the privacy policy for each social software to be arranged, according to the privacy policy and each society
The identity information of software is handed over to shield all or part of affiliated person of the user.
7. device according to claim 6, which is characterized in that described information obtains module and includes:
Information combination unit, for merging the user's history behavioural information, analysis is obtained and may be deposited with the user
In associated affiliated person's information;
Information process unit, for, there may be the progress analyzing processing of associated affiliated person's information, determining the user to described
Final affiliated person's information.
8. device according to claim 7, which is characterized in that the identity obtains module and is specifically used for:
Analyzing processing is carried out to final affiliated person's information, obtains the identity information that the affiliated person logs in each social software.
9. the device according to any one of claim 6 to 8, which is characterized in that the strategy setting module includes:
Instruction reception unit, for being configured to the privacy policy of each social software according to user instruction, the privacy
Strategy includes that the affiliated person recorded to other social softwares and/or telephonic communication shields situation;
Screen unit is selected, for the identity information according to the privacy policy and each social software, selects corresponding society
The all or part of affiliated person in software and/or telephonic communication record is handed over to shield.
10. device according to claim 9, which is characterized in that the selection screen unit includes:
First shielding subelement for obtaining the corresponding social software of the privacy policy, and logs in the social software
Affiliated person's identity information;
Secondary shielding subelement, in selecting the social software and/or telephonic communication to record according to user instruction whole or
Person partial association people shields.
11. a kind of terminal device, including:Processor, memory, communication interface and communication bus, the processor, the storage
Device and the communication interface complete mutual communication by the communication bus;The memory can be held for storing at least one
Row instruction, the executable instruction make the processor execute such as any one of claim 1-5 corresponding operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810450506.0A CN108763953B (en) | 2018-05-11 | 2018-05-11 | Privacy setting method and device of social software and terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810450506.0A CN108763953B (en) | 2018-05-11 | 2018-05-11 | Privacy setting method and device of social software and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108763953A true CN108763953A (en) | 2018-11-06 |
CN108763953B CN108763953B (en) | 2021-09-17 |
Family
ID=64010550
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810450506.0A Active CN108763953B (en) | 2018-05-11 | 2018-05-11 | Privacy setting method and device of social software and terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108763953B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105262674A (en) * | 2015-10-29 | 2016-01-20 | 小米科技有限责任公司 | Method, apparatus, server and terminal for setting privacy authority |
CN107666435A (en) * | 2017-11-15 | 2018-02-06 | 珠海市魅族科技有限公司 | A kind of method and device for shielding message |
US20180167459A1 (en) * | 2013-06-19 | 2018-06-14 | Tencent Technology (Shenzhen) Company Limited | Method, system and computer-readable storage medium for cross-platform synchronization of contacts in a multi-platform environment |
-
2018
- 2018-05-11 CN CN201810450506.0A patent/CN108763953B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180167459A1 (en) * | 2013-06-19 | 2018-06-14 | Tencent Technology (Shenzhen) Company Limited | Method, system and computer-readable storage medium for cross-platform synchronization of contacts in a multi-platform environment |
CN105262674A (en) * | 2015-10-29 | 2016-01-20 | 小米科技有限责任公司 | Method, apparatus, server and terminal for setting privacy authority |
CN107666435A (en) * | 2017-11-15 | 2018-02-06 | 珠海市魅族科技有限公司 | A kind of method and device for shielding message |
Also Published As
Publication number | Publication date |
---|---|
CN108763953B (en) | 2021-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105072244B (en) | Method and device based on terminal call recommendation service interface | |
US20180234545A1 (en) | Assisted-communication with intelligent personal assistant | |
US9477574B2 (en) | Collection of intranet activity data | |
CN107911798A (en) | Information push method, device and terminal | |
CN106302534B (en) | A kind of method and system of detection and processing illegal user | |
US11003768B2 (en) | System and method for consent centric data compliance checking | |
CN105338154B (en) | A kind of contact sequencing method, device and terminal | |
CN106464727A (en) | Terminal device, cloud device, method for driving terminal device, method for cooperatively processing data and computer readable recording medium | |
CN108259529A (en) | A kind of acquisition methods and device of page sharing information | |
CN104780257A (en) | Contact prompt information generating method, device and terminal | |
CN112231667A (en) | Identity verification method, device, storage medium, system and equipment | |
US20060161616A1 (en) | Provision of services over a common delivery platform such as a mobile telephony network | |
CN1398375A (en) | Method and device for authenticating user | |
CN111885339A (en) | Privacy processing method and device, computer-readable storage medium and electronic medium | |
CN105959306A (en) | IP address identification method and device | |
Kraus | User experience with mobile security and privacy mechanisms | |
US12003509B2 (en) | Temporary holds for dating application | |
CN107977436A (en) | Filename generation method, device, terminal and the storage medium of record screen file | |
CN108763953A (en) | A kind of the privacy settings method, apparatus and terminal device of social software | |
US11665278B2 (en) | Contextual call handling mechanism with learned relationship filter | |
CN109167883A (en) | Intelligent shielding method and system based on social content and intelligent terminal | |
US9529988B2 (en) | Dossier packaging | |
US11290405B2 (en) | Method, system and apparatus for providing a contextual keyword collective for communication events in a multicommunication platform environment | |
WO2015117382A1 (en) | Page access method and device | |
CN112688939A (en) | Method and device for determining illegal organization information, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200527 Address after: 310051 room 508, floor 5, building 4, No. 699, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province Applicant after: Alibaba (China) Co.,Ltd. Address before: 100083 floor twelve, A block, you Sheng mansion, 28 Cheng Fu Road, Haidian District, Beijing. Applicant before: UC MOBILE Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |