CN108763953A - A kind of the privacy settings method, apparatus and terminal device of social software - Google Patents

A kind of the privacy settings method, apparatus and terminal device of social software Download PDF

Info

Publication number
CN108763953A
CN108763953A CN201810450506.0A CN201810450506A CN108763953A CN 108763953 A CN108763953 A CN 108763953A CN 201810450506 A CN201810450506 A CN 201810450506A CN 108763953 A CN108763953 A CN 108763953A
Authority
CN
China
Prior art keywords
information
social software
user
affiliated person
privacy policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810450506.0A
Other languages
Chinese (zh)
Other versions
CN108763953B (en
Inventor
张小博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Original Assignee
Ucweb Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ucweb Inc filed Critical Ucweb Inc
Priority to CN201810450506.0A priority Critical patent/CN108763953B/en
Publication of CN108763953A publication Critical patent/CN108763953A/en
Application granted granted Critical
Publication of CN108763953B publication Critical patent/CN108763953B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the present application provides a kind of the privacy settings method, apparatus and terminal device of social software, the method includes:The method includes:There are associated information with user's history behavior for acquisition, and affiliated person's information of the user is obtained according to described information;According to affiliated person's information of the user, the identity information that each affiliated person logs in each social software is obtained;The privacy policy of each social software is set, all or part of affiliated person of the user is shielded according to the privacy policy and the identity information of each social software.The embodiment of the present application can more preferably realize the privacy settings of social software, by the way that privacy policy batch shielding affiliated person is arranged.

Description

A kind of the privacy settings method, apparatus and terminal device of social software
Technical field
The invention relates to a kind of privacy settings method of Internet technical field more particularly to social software, dresses It sets and terminal device.
Background technology
With the development of Internet technology, the social softwares such as microblogging, wechat pass through at the key player in for people's lives Social software is shared daily life and is come to realize as the important channel made friends.Usual user can pass through the privacy policy of social software Some affiliated persons are masked, avoids it from watching all or part of of oneself and dynamically shares.
But user is sometimes for protection privacy or particular demands, it is desirable to the dynamic issued share mask it is all ripe People is not intended to any multidate information that there is social associated people and obtain oneself publication.And existing social software is for this Type shielding can not provide enough selection spaces, and user can only mask known association people by way of selection.
In addition existing social software is that label is arranged for the affiliated person in social software address list manually by user, is led to It crosses to manually select label or manually select specific affiliated person and privacy policy is set, in shielded segment social software address list Affiliated person avoids it from watching all or part of of oneself and dynamically shares.
But user needs to be arranged into row label manually or be associated person manually to select, it can not be soft according to other social activities Affiliated person in part address list carries out unified privacy policy setting.For example, under certain dynamic of wechat circle of friends, it is unified to select Select the affiliated person masked in mobile portable phone address list.Alternatively, under certain dynamic of microblogging, unified selection masks every other The affiliated person in address list in social software, i.e., invisible dynamic of all acquaintances etc..In addition, if social software is microblogging Equal unidirectional relationships social media platform, user can not be arranged privacy policy and carry out batch affiliated person's shielding, can only be according to the association The identity information of people carries out privacy policy setting by manually mode one by one, shields the affiliated person.
Therefore, how more preferably to realize that the privacy settings of social software are asked as technology urgently to be resolved hurrily in the prior art Topic.
Invention content
The embodiment of the present application provides a kind of the privacy settings method, apparatus and terminal device of social software, can be more The privacy settings of good realization social software, by the way that privacy policy batch shielding affiliated person is arranged.
According to the one side of the embodiment of the present application, a kind of privacy settings method of social software, the method are provided Including:There are associated information with user's history behavior for acquisition, and affiliated person's information of the user is obtained according to described information; According to affiliated person's information of the user, the identity information that each affiliated person logs in each social software is obtained;Each social activity is set The privacy policy of software, according to the privacy policy and the identity information of each social software to the whole of the user or Partial association people shields.
According to the other side of the embodiment of the present application, a kind of privacy settings device of social software is additionally provided, it is described Device includes:Information acquisition module, for acquisition, there are associated information with user's history behavior, and are obtained according to described information Affiliated person's information of the user;Identity obtains module, for affiliated person's information according to the user, obtains each affiliated person and steps on Record the identity information of each social software;Strategy setting module, the privacy policy for each social software to be arranged, according to described Privacy policy and the identity information of each social software shield all or part of affiliated person of the user.
According to the another aspect of the embodiment of the present application, a kind of terminal device is additionally provided, including:Processor, memory, Communication interface and communication bus, the processor, the memory and the communication interface complete phase by the communication bus Communication between mutually;The memory makes the processor execute for storing an at least executable instruction, the executable instruction The corresponding operation of privacy settings method of social software as described above.
According to technical solution provided by the embodiments of the present application, the embodiment of the present application obtains institute according to user's history behavioural information Affiliated person's information of user is stated, and then according to affiliated person's information of the user, obtains each affiliated person and logs in each social software Identity information.The privacy policy of each social software described in user setting, according to the privacy policy and each social software Identity information shields all or part of affiliated person of the user.It follows that the embodiment of the present application can will be used Family historical behavior information establishes association, to obtain the identity information that user-association people logs in each social software, utilizes the body The privacy policy of part information and the social software of setting, thus to the whole of other social softwares or portion in social software Affiliated person is divided to shield.Also, the application can be applied to individual event social platform class social software simultaneously and both-way communication is social Software.
Description of the drawings
Fig. 1 is the step flow chart according to a kind of privacy settings method of social software of the embodiment of the present application one;
The step of Fig. 2 is the step S101 according to a kind of privacy settings method of social software of the embodiment of the present application one is flowed Cheng Tu;
The step of Fig. 3 is the step S103 according to a kind of privacy settings method of social software of the embodiment of the present application one is flowed Cheng Tu;
Fig. 4 is one set according to a kind of privacy policy of the privacy settings method of social software of the embodiment of the present application one Page schematic diagram;
The step of Fig. 5 is the step S1032 according to a kind of privacy settings method of social software of the embodiment of the present application one Flow chart;
Fig. 6 be set according to a kind of privacy policy of the privacy settings method of social software of the embodiment of the present application one it is another One page schematic diagram;
Fig. 7 is the structure diagram according to a kind of privacy settings device of social software of the embodiment of the present application two;
Fig. 8 is the knot according to a kind of information acquisition module of the privacy settings device of social software of the embodiment of the present application two Structure block diagram;
Fig. 9 is the knot according to a kind of strategy setting module of the privacy settings device of social software of the embodiment of the present application two Structure block diagram;
Figure 10 is the selection screen unit according to a kind of privacy settings device of social software of the embodiment of the present application two Structure diagram;
Figure 11 is the structure diagram according to a kind of terminal device of the embodiment of the present application three.
Specific implementation mode
(identical label indicates identical element in several attached drawings) and embodiment below in conjunction with the accompanying drawings, implement the application The specific implementation mode of example is described in further detail.Following embodiment is not limited to the application for illustrating the application Range.
It will be understood by those skilled in the art that the terms such as " first ", " second " in the embodiment of the present application are only used for distinguishing Different step, equipment or module etc. neither represent any particular technology meaning, also do not indicate that the inevitable logic between them is suitable Sequence.
Embodiment one
Referring to Fig.1, the step of showing the privacy settings method according to a kind of social software of the embodiment of the present application one is flowed Cheng Tu.
It is worth noting that herein described step S101 to S103 does not represent the sequencing of its execution.
The privacy settings method of the social software of the present embodiment includes the following steps:
Step S101:There are associated information with user's history behavior for acquisition, and obtain the user according to described information Affiliated person's information.
Herein described user's history behavior includes:The communication of telephonic communication record information and/or each social software in terminal Record information, comment information interactive informations, the personal letter such as thumb up etc..
For example, the embodiment of the present application obtains the address list information of telephonic communication record information and/or each social software in terminal, Affiliated person's information of the user is obtained according to the address list information.The embodiment of the present application can also be by storing beyond the clouds Social software address list obtains affiliated person's information of user.Social software address list described in the embodiment of the present application also includes unidirectional Affiliated person's information, such as:" people of concern ", " interested people ", " public platform " etc..
For another example, the embodiment of the present application obtains other comments under the comment information and the comment that user delivers in certain forum Information, the user and another forum user are affiliated person according to the comment information, obtain affiliated person's information of user.
In the application in the specific implementation, referring to Fig. 2, the step S101 includes:
Step S1011:The user's history behavioural information is merged, there may be passes with the user for analysis acquisition Affiliated person's information of connection.
Step S1012:To described there may be the progress analyzing processing of associated affiliated person's information, the user is determined most Whole affiliated person's information.
For example, being logged in since each social software requires input handset number to complete registration, pass through the logical of phone The address list information for each social software that news record information is installed with terminal merges, and acquisition is established associated address list information and made For there may be associated affiliated person's information.For another example since the comment of user user in public forum is usually associated with, utilize Association comment obtain user between incidence relation, obtain the user there may be associated affiliated person's information.
There may be associated affiliated person's information to carry out analyzing processing described in for the embodiment of the present application.For example, according to figure As identification technology identifies that personage issues personage in photo with other affiliated persons in each social software in the photo in user's photograph album The similar relationship obtained in each social software between each affiliated person.For another example according to the person names occurred in each social software, The pet name and various "@" relationships etc. obtain the relationship between each affiliated person.Using the relationship between each affiliated person to the merging Information afterwards is handled, and the relationship that user can be manually between each affiliated person is adjusted and merges, can also be according to machine Device learning algorithm is realized between each affiliated person the adjustment of relationship and is merged.
Therefore, the embodiment of the present application can utilize the user's history behavioural information and the analysis by algorithm and place Reason obtains the relationship between affiliated person in each address list of the comprehensive user, ensures affiliated person's information of the user Accurately with it is detailed.
Step S102:According to affiliated person's information of the user, the identity letter that each affiliated person logs in each social software is obtained Breath.
It is another in the application in the specific implementation, the step S102 is specially:
Analyzing processing is carried out to final affiliated person's information, obtains the identity letter that the affiliated person logs in each social software Breath.
For example, the application by each affiliated person obtained according to the incidence relation log in the identity information of each social software with Telephone number establishes correspondence, can obtain each affiliated person's identity information in each social software by unique telephone number Between association.
Step S103:The privacy policy of each social software is set, it is soft according to the privacy policy and each social activity The identity information of part shields all or part of affiliated person of the user.
It is another in the specific implementation, referring to Fig. 3, the step S103 includes in the application:
Step S1031:The privacy policy of each social software is configured according to user instruction, the privacy policy Include that the affiliated person recorded to other social softwares and/or telephonic communication shields situation.
Specifically, referring to Fig. 4, user carries out privacy policy by operational order to each social software of the terminal operating Setting, by privacy policy be arranged the page, selection mask other social softwares and/or telephonic communication record it is all or part of Affiliated person.
Step S1032:According to the identity information of the privacy policy and each social software, select corresponding social activity soft All or part of affiliated person in part and/or telephonic communication record shields.
Referring to Fig. 5, the step S1032 includes:
Step S10321:The corresponding social software of the privacy policy is obtained, and logs in the association of the social software People's identity information.
Step S10322:Whole in selecting the social software and/or telephonic communication to record according to user instruction or portion Affiliated person is divided to shield.
Specifically, referring to Fig. 6, according to the identity information of the privacy policy and each social software, user can be into All or part of affiliated person during one step selects corresponding social software and/or telephonic communication to record in operation pages is shielded It covers.
It follows that the embodiment of the present application obtains affiliated person's information of the user according to user's history behavioural information, into And according to affiliated person's information of the user, obtain the identity information that each affiliated person logs in each social software.Described in user setting The privacy policy of each social software, according to the privacy policy and the identity information of each social software to the complete of the user Portion or partial association people shield.It is associated with it follows that the embodiment of the present application can establish user's history behavioural information, To obtain the identity information that user-association people logs in each social software, the identity information and the social software of setting are utilized Privacy policy, to being shielded to all or part of affiliated person of other social softwares in social software.Also, this Application can be applied to individual event social platform class social software and both-way communication social software simultaneously.
The privacy settings method of the social software of the present embodiment can be set by any suitable privacy with social software The equipment of capability executes, including but not limited to:Various terminal equipment or server-side, including but not limited to PC machine, tablet electricity Brain, mobile terminal etc..
Embodiment two
With reference to Fig. 7, a kind of structure chart of the privacy settings device of social software according to the embodiment of the present application two is shown.
The privacy settings device of the social software of the present embodiment includes:
Information acquisition module 701, for acquisition, there are associated information with user's history behavior, and are obtained according to described information Obtain affiliated person's information of the user.
Identity obtains module 702, and for affiliated person's information according to the user, it is soft to obtain each social activity of each affiliated person's login The identity information of part.
Strategy setting module 703, the privacy policy for each social software to be arranged, according to the privacy policy and institute The identity information for stating each social software shields all or part of affiliated person of the user.
Herein described user's history behavior includes:The communication of telephonic communication record information and/or each social software in terminal Record information, comment information interactive informations, the personal letter such as thumb up etc..
For example, the embodiment of the present application obtains the address list information of telephonic communication record information and/or each social software in terminal, Affiliated person's information of the user is obtained according to the address list information.The embodiment of the present application can also be by storing beyond the clouds Social software address list obtains affiliated person's information of user.Social software address list described in the embodiment of the present application also includes unidirectional Affiliated person's information, such as:" people of concern ", " interested people ", " public platform " etc..
For another example, the embodiment of the present application obtains other comments under the comment information and the comment that user delivers in certain forum Information, the user and another forum user are affiliated person according to the comment information, obtain affiliated person's information of user.
In the application in the specific implementation, referring to Fig. 8, described information obtains module 701 and includes:
Information combination unit 7011, for merging the user's history behavioural information, analysis obtains and the use There may be associated affiliated person's information at family.
Information process unit 7012, for, there may be the progress analyzing processing of associated affiliated person's information, being determined to described Final affiliated person's information of the user.
For example, being logged in since each social software requires input handset number to complete registration, pass through the logical of phone The address list information for each social software that news record information is installed with terminal merges, and acquisition is established associated address list information and made For there may be associated affiliated person's information.For another example since the comment of user user in public forum is usually associated with, utilize Association comment obtain user between incidence relation, obtain the user there may be associated affiliated person's information.
There may be associated affiliated person's information to carry out analyzing processing described in for the embodiment of the present application.For example, according to figure As identification technology identifies that personage issues personage in photo with other affiliated persons in each social software in the photo in user's photograph album The similar relationship obtained in each social software between each affiliated person.For another example according to the person names occurred in each social software, The pet name and various "@" relationships etc. obtain the relationship between each affiliated person.Using the relationship between each affiliated person to the merging Information afterwards is handled, and the relationship that user can be manually between each affiliated person is adjusted and merges, can also be according to machine Device learning algorithm is realized between each affiliated person the adjustment of relationship and is merged.
Therefore, the embodiment of the present application can utilize the user's history behavioural information and the analysis by algorithm and place Reason obtains the relationship between affiliated person in each address list of the comprehensive user, ensures affiliated person's information of the user Accurately with it is detailed.
It is another in the application in the specific implementation, the identity obtains module 702 is specially:
Analyzing processing is carried out to final affiliated person's information, obtains the identity letter that the affiliated person logs in each social software Breath.
For example, the application by each affiliated person obtained according to the incidence relation log in the identity information of each social software with Telephone number establishes correspondence, can obtain each affiliated person's identity information in each social software by unique telephone number Between association.
It is another in the specific implementation, referring to Fig. 9, the strategy setting module 703 includes in the application:
Instruction reception unit 7031, for being configured to the privacy policy of each social software according to user instruction, The privacy policy includes that the affiliated person recorded to other social softwares and/or telephonic communication shields situation.
Screen unit 7032 is selected, for the identity information according to the privacy policy and each social software, selection All or part of affiliated person in corresponding social software and/or telephonic communication record shields.
Specifically, referring to Fig. 4, user carries out privacy policy by operational order to each social software of the terminal operating Setting, by privacy policy be arranged the page, selection mask other social softwares and/or telephonic communication record it is all or part of Affiliated person.
Referring to Figure 10, the step selection screen unit 7032 includes:
First shielding subelement 70321, for obtaining the corresponding social software of the privacy policy, and the login society Hand over affiliated person's identity information of software;
Secondary shielding subelement 70322, for being selected in the social software and/or telephonic communication record according to user instruction All or part of affiliated person shield.
Specifically, referring to Fig. 5, according to the identity information of the privacy policy and each social software, user can be into All or part of affiliated person during one step selects corresponding social software and/or telephonic communication to record in operation pages is shielded It covers.
It follows that the embodiment of the present application can establish subscriber phone address list and/or the address list of each social software Association is believed to obtain the identity information that the affiliated person in user communication record information logs in each social software using the identity The privacy policy of breath and the social software of setting, thus to all or part of pass of other social softwares in social software Connection people shields.Also, the application can be applied to individual event social platform class social software and both-way communication social software simultaneously. Therefore, the embodiment of the present application can more preferably realize the privacy settings of social software, be closed by the way that privacy policy batch shielding is arranged Join people.
The privacy settings method of the social software of the present embodiment can be set by any suitable privacy with social software The equipment of capability executes, including but not limited to:Various terminal equipment or server-side, including but not limited to PC machine, tablet electricity Brain, mobile terminal etc..
Embodiment three
Referring to Fig.1 1, show that a kind of structure diagram of terminal device according to the embodiment of the present application three, the application are specific Embodiment does not limit the specific implementation of terminal device.
As shown in figure 11, which may include:Processor (processor) 1102, communication interface (Communications Interface) 1104, memory (memory) 1106 and communication bus 1108.
Wherein:
Processor 1102, communication interface 1104 and memory 1106 complete mutual lead to by communication bus 1108 Letter.
Communication interface 1104, for being communicated with the network element of the such as other terminals of miscellaneous equipment or server-side etc..
Processor 1102, for executing program 1110, the privacy settings method that can specifically execute above-mentioned social software is real Apply the correlation step in example.
Specifically, program 1110 may include program code, which includes computer-managed instruction.
Processor 1102 may be central processor CPU or specific integrated circuit ASIC (Application Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present application Road.The one or more processors that terminal device includes can be same type of processor, such as one or more CPU;Also may be used To be different types of processor, such as one or more CPU and one or more ASIC.
Memory 1106, for storing program 1110.Memory 1106 may include high-speed RAM memory, it is also possible to also Including nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Program 1110 specifically can be used for so that processor 1102 executes following operation:It obtains and exists with user's history behavior Associated information, and obtain according to described information affiliated person's information of the user;According to affiliated person's information of the user, obtain Obtain the identity information that each affiliated person logs in each social software;The privacy policy of each social software is set, according to the privacy The identity information of tactful and described each social software shields all or part of affiliated person of the user.
In a kind of optional embodiment, program 1110 is additionally operable to merge the user's history behavioural information, There may be associated affiliated person's information with the user for analysis acquisition;There may be the progress of associated affiliated person's information to described Analyzing processing determines final affiliated person's information of the user.
In a kind of optional embodiment, program 1110 is additionally operable to carry out at analysis final affiliated person's information Reason, obtains the identity information that the affiliated person logs in each social software.
In a kind of optional embodiment, program 1110 is additionally operable to according to user instruction to the hidden of each social software Private strategy is configured, and the privacy policy includes that the affiliated person recorded to other social softwares and/or telephonic communication shields situation; According to the identity information of the privacy policy and each social software, corresponding social software and/or telephonic communication is selected to record In all or part of affiliated person shield.
In a kind of optional embodiment, program 1110 is additionally operable to obtain the corresponding social software of the privacy policy, And log in affiliated person's identity information of the social software;Select the social software and/or phone logical according to user instruction All or part of affiliated person in news record shields.
It follows that the embodiment of the present application can establish subscriber phone address list and/or the address list of each social software Association is believed to obtain the identity information that the affiliated person in user communication record information logs in each social software using the identity The privacy policy of breath and the social software of setting, thus to all or part of pass of other social softwares in social software Connection people shields.Also, the application can be applied to individual event social platform class social software and both-way communication social software simultaneously. Therefore, the embodiment of the present application can more preferably realize the privacy settings of social software, be closed by the way that privacy policy batch shielding is arranged Join people.
It may be noted that according to the needs of implementation, all parts/step described in the embodiment of the present application can be split as more The part operation of two or more components/steps or components/steps can be also combined into new component/step by multi-part/step Suddenly, to realize the purpose of the embodiment of the present application.
The above-mentioned method according to the embodiment of the present application can be realized in hardware, firmware, or be implemented as being storable in note Software or computer code in recording medium (such as CD ROM, RAM, floppy disk, hard disk or magneto-optic disk), or it is implemented through net The original storage that network is downloaded in long-range recording medium or nonvolatile machine readable media and will be stored in local recording medium In computer code, can be stored in using all-purpose computer, application specific processor or can compile to method described here Such software processing in journey or the recording medium of specialized hardware (such as ASIC or FPGA).It is appreciated that computer, processing Device, microprocessor controller or programmable hardware include can store or receive software or computer code storage assembly (for example, RAM, ROM, flash memory etc.), when the software or computer code are by computer, processor or hardware access and execute, realize The privacy settings method of social software described here.In addition, when all-purpose computer accesses for realizing the social activity being shown here When the code of the privacy settings method of software, the execution of code is converted to all-purpose computer for executing the social activity being shown here The special purpose computer of the privacy settings method of software.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and method and step can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The range of the embodiment of the present application.
Embodiment of above is merely to illustrate the embodiment of the present application, and is not the limitation to the embodiment of the present application, related skill The those of ordinary skill in art field can also make various in the case where not departing from the spirit and scope of the embodiment of the present application Variation and modification, therefore all equivalent technical solutions also belong to the scope of the embodiment of the present application, the patent of the embodiment of the present application Protection domain should be defined by the claims.

Claims (11)

1. a kind of privacy settings method of social software, which is characterized in that the method includes:
There are associated information with user's history behavior for acquisition, and affiliated person's information of the user is obtained according to described information;
According to affiliated person's information of the user, the identity information that each affiliated person logs in each social software is obtained;
The privacy policy of each social software is set, according to the identity information pair of the privacy policy and each social software The all or part of affiliated person of the user shields.
2. according to the method described in claim 1, it is characterized in that, it is described obtain there are associated letters with user's history behavior Breath, and the affiliated person's information for obtaining according to described information the user includes:
The user's history behavioural information is merged, there may be associated affiliated persons to believe with the user for analysis acquisition Breath;
To described there may be the progress analyzing processing of associated affiliated person's information, final affiliated person's information of the user is determined.
3. according to the method described in claim 2, it is characterized in that, affiliated person's information according to the user, obtains each The identity information that affiliated person logs in each social software is specially:
Analyzing processing is carried out to final affiliated person's information, obtains the identity information that the affiliated person logs in each social software.
4. according to the method in any one of claims 1 to 3, which is characterized in that setting each social software Privacy policy, according to the privacy policy and the identity information of each social software to all or part of pass of the user Connection people carries out shielding:
The privacy policy of each social software is configured according to user instruction, the privacy policy includes to other social activities The affiliated person of software and/or telephonic communication record shields situation;
According to the identity information of the privacy policy and each social software, select corresponding social software and/or phone logical All or part of affiliated person in news record shields.
5. according to the method described in claim 4, it is characterized in that, described according to the privacy policy and each social software Identity information, all or part of affiliated person in selecting corresponding social software and/or telephonic communication to record carries out shielding packet It includes:
The corresponding social software of the privacy policy is obtained, and logs in affiliated person's identity information of the social software;
All or part of affiliated person in selecting the social software and/or telephonic communication to record according to user instruction is shielded It covers.
6. a kind of privacy settings device of social software, which is characterized in that described device includes:
Information acquisition module, there are associated information with user's history behavior for obtaining, and described in being obtained according to described information Affiliated person's information of user;
Identity obtains module, for affiliated person's information according to the user, obtains the body that each affiliated person logs in each social software Part information;
Strategy setting module, the privacy policy for each social software to be arranged, according to the privacy policy and each society The identity information of software is handed over to shield all or part of affiliated person of the user.
7. device according to claim 6, which is characterized in that described information obtains module and includes:
Information combination unit, for merging the user's history behavioural information, analysis is obtained and may be deposited with the user In associated affiliated person's information;
Information process unit, for, there may be the progress analyzing processing of associated affiliated person's information, determining the user to described Final affiliated person's information.
8. device according to claim 7, which is characterized in that the identity obtains module and is specifically used for:
Analyzing processing is carried out to final affiliated person's information, obtains the identity information that the affiliated person logs in each social software.
9. the device according to any one of claim 6 to 8, which is characterized in that the strategy setting module includes:
Instruction reception unit, for being configured to the privacy policy of each social software according to user instruction, the privacy Strategy includes that the affiliated person recorded to other social softwares and/or telephonic communication shields situation;
Screen unit is selected, for the identity information according to the privacy policy and each social software, selects corresponding society The all or part of affiliated person in software and/or telephonic communication record is handed over to shield.
10. device according to claim 9, which is characterized in that the selection screen unit includes:
First shielding subelement for obtaining the corresponding social software of the privacy policy, and logs in the social software Affiliated person's identity information;
Secondary shielding subelement, in selecting the social software and/or telephonic communication to record according to user instruction whole or Person partial association people shields.
11. a kind of terminal device, including:Processor, memory, communication interface and communication bus, the processor, the storage Device and the communication interface complete mutual communication by the communication bus;The memory can be held for storing at least one Row instruction, the executable instruction make the processor execute such as any one of claim 1-5 corresponding operation.
CN201810450506.0A 2018-05-11 2018-05-11 Privacy setting method and device of social software and terminal equipment Active CN108763953B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810450506.0A CN108763953B (en) 2018-05-11 2018-05-11 Privacy setting method and device of social software and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810450506.0A CN108763953B (en) 2018-05-11 2018-05-11 Privacy setting method and device of social software and terminal equipment

Publications (2)

Publication Number Publication Date
CN108763953A true CN108763953A (en) 2018-11-06
CN108763953B CN108763953B (en) 2021-09-17

Family

ID=64010550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810450506.0A Active CN108763953B (en) 2018-05-11 2018-05-11 Privacy setting method and device of social software and terminal equipment

Country Status (1)

Country Link
CN (1) CN108763953B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105262674A (en) * 2015-10-29 2016-01-20 小米科技有限责任公司 Method, apparatus, server and terminal for setting privacy authority
CN107666435A (en) * 2017-11-15 2018-02-06 珠海市魅族科技有限公司 A kind of method and device for shielding message
US20180167459A1 (en) * 2013-06-19 2018-06-14 Tencent Technology (Shenzhen) Company Limited Method, system and computer-readable storage medium for cross-platform synchronization of contacts in a multi-platform environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180167459A1 (en) * 2013-06-19 2018-06-14 Tencent Technology (Shenzhen) Company Limited Method, system and computer-readable storage medium for cross-platform synchronization of contacts in a multi-platform environment
CN105262674A (en) * 2015-10-29 2016-01-20 小米科技有限责任公司 Method, apparatus, server and terminal for setting privacy authority
CN107666435A (en) * 2017-11-15 2018-02-06 珠海市魅族科技有限公司 A kind of method and device for shielding message

Also Published As

Publication number Publication date
CN108763953B (en) 2021-09-17

Similar Documents

Publication Publication Date Title
CN105072244B (en) Method and device based on terminal call recommendation service interface
US20180234545A1 (en) Assisted-communication with intelligent personal assistant
US9477574B2 (en) Collection of intranet activity data
CN107911798A (en) Information push method, device and terminal
CN106302534B (en) A kind of method and system of detection and processing illegal user
US11003768B2 (en) System and method for consent centric data compliance checking
CN105338154B (en) A kind of contact sequencing method, device and terminal
CN106464727A (en) Terminal device, cloud device, method for driving terminal device, method for cooperatively processing data and computer readable recording medium
CN108259529A (en) A kind of acquisition methods and device of page sharing information
CN104780257A (en) Contact prompt information generating method, device and terminal
CN112231667A (en) Identity verification method, device, storage medium, system and equipment
US20060161616A1 (en) Provision of services over a common delivery platform such as a mobile telephony network
CN1398375A (en) Method and device for authenticating user
CN111885339A (en) Privacy processing method and device, computer-readable storage medium and electronic medium
CN105959306A (en) IP address identification method and device
Kraus User experience with mobile security and privacy mechanisms
US12003509B2 (en) Temporary holds for dating application
CN107977436A (en) Filename generation method, device, terminal and the storage medium of record screen file
CN108763953A (en) A kind of the privacy settings method, apparatus and terminal device of social software
US11665278B2 (en) Contextual call handling mechanism with learned relationship filter
CN109167883A (en) Intelligent shielding method and system based on social content and intelligent terminal
US9529988B2 (en) Dossier packaging
US11290405B2 (en) Method, system and apparatus for providing a contextual keyword collective for communication events in a multicommunication platform environment
WO2015117382A1 (en) Page access method and device
CN112688939A (en) Method and device for determining illegal organization information, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200527

Address after: 310051 room 508, floor 5, building 4, No. 699, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Alibaba (China) Co.,Ltd.

Address before: 100083 floor twelve, A block, you Sheng mansion, 28 Cheng Fu Road, Haidian District, Beijing.

Applicant before: UC MOBILE Ltd.

GR01 Patent grant
GR01 Patent grant