CN109344646A - A kind of the user privacy information guard method and system of stranger's social activity - Google Patents

A kind of the user privacy information guard method and system of stranger's social activity Download PDF

Info

Publication number
CN109344646A
CN109344646A CN201811056509.2A CN201811056509A CN109344646A CN 109344646 A CN109344646 A CN 109344646A CN 201811056509 A CN201811056509 A CN 201811056509A CN 109344646 A CN109344646 A CN 109344646A
Authority
CN
China
Prior art keywords
user
active user
target user
degree
shielding
Prior art date
Application number
CN201811056509.2A
Other languages
Chinese (zh)
Other versions
CN109344646B (en
Inventor
陈俊华
Original Assignee
杭州飞弛网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州飞弛网络科技有限公司 filed Critical 杭州飞弛网络科技有限公司
Priority to CN201811056509.2A priority Critical patent/CN109344646B/en
Publication of CN109344646A publication Critical patent/CN109344646A/en
Application granted granted Critical
Publication of CN109344646B publication Critical patent/CN109344646B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Abstract

The embodiment of the present application provides the user privacy information guard method and system of a kind of stranger's social activity, and wherein method comprises determining that target user, the target user are the user for the personal information that active user is checked in request;Obtain tracking degree and the degree of association of the target user relative to active user;Tracking degree and the degree of association according to target user relative to active user determine shielding grade of the personal information to target user of active user;According to different shielding grades, the active user is shielded to the visible personal information of the target user.The application can be according to the frequency masks active user that the personal information of active user is checked by target user to the visible personal information of target user; to protect the individual privacy of user; so that the personal security of user is protected, user experience is improved, is conducive to the development of stranger's social activity.

Description

A kind of the user privacy information guard method and system of stranger's social activity

Technical field

This application involves Internet technical field more particularly to a kind of user privacy information guard methods of stranger social activity With system.

Background technique

Social activity refers to the dealings of person to person in society, is people's (tool) transmitting information, friendship by way of certain The consciousness of thought is flowed, to reach the social Activities of certain purpose.Current era, the variation of economy and society environment is so that people Contacts between people seem more important.Because we only constantly associates with all kinds of personnel and information communication, Oneself can be constantly enriched, develops oneself, expand oneself.

Application with Internet resources in life with the development of science and technology, interpersonal contacts start by Internet realizes, can also be carried out by internet social between stranger, and realization further develop oneself and expand oneself Purpose.For example, internet platform and the service of some leading stranger's social interaction servers have been had already appeared in the prior art, such as People near search carries out dialogue on line, transmission network drift bottle etc..

A kind of most emerging stranger's social platform is the APP that the platform is utilized by event organizer in the prior art, The social activity held in predetermined time and place (such as have a dinner party, outing, play games) is issued on the platform, and is set Surely the condition (such as gender, age etc.) that the social activity needs to meet is participated in;Other users can use APP on the platform It searches for oneself interested and itself qualified social activity and goes forward side by side and register on line, and then go on time as movable participant The predetermined area participates in the social activity.

In the platform of above-mentioned realization stranger social activity, user can be shown among the personal homepage of the register account number of user The essential informations such as head portrait, user name, gender and age and user personal multidate information, wherein multidate information includes using Activity that family is participated in history, the activity participated in or the activity not yet participated in of having registered.Other users can lead to Cross the APP of above-mentioned social platform and enter and check the personal homepage of the user with number of ways, for example, can by with user name, The factors such as geographical location search for user, and then check the personal homepage of the user searched;Some social activity can also be passed through It finds tissue, registration or pays close attention to the movable user, and then enter the personal homepage of these users.

Moreover, the personal homepage of user is open at present in most of stranger's social platforms, that is, in addition to Other than the good friend that family has been added, other strange users can also enter and browse the personal homepage of the user, this and current microblogging Equal platforms are similar to the administrative mechanism of personal homepage.Stranger's social platform is it using open personal homepage mechanism Necessary to objective, because not all originally being good friend by user's majority that the platform participates in social activity, but mutually not The stranger of acquaintance, therefore open personal homepage is set facilitates user and understand tissue and participate in other a certain movable use The information at family, such as identity, gender, age, interest, activity history etc., thus itself whether to participate in the social activity Reference is provided.

But open personal homepage mode on the one hand promotes knowing one another between user and social activity has Tissue is imitated, on the other hand, also be easy to cause propagating without limitation for user privacy information.In particular, can by individual subscriber homepage To obtain the movable activity time and activity venue that the user is participating in will participate in, it is possible to directly expose user's Position;The when and where for the historical act participated in by tracking user can also be with the activity trajectory of indirect analysis user and rule Rule.This is unfavorable for the protection of individual subscriber privacy, also causes hidden danger to the personal security of user, affects user experience, from And it is unfavorable for the development of stranger's social activity.

Summary of the invention

In view of this, the purpose of the application is to propose the user privacy information guard method of stranger's social activity a kind of and is System prevents strange user from infinitely producing to relate to for the open personal homepage that stranger's social platform in the prior art uses And the user information of individual privacy, while retaining user and personal interest and activity preference are shared by open personal homepage, with And check the convenience of these non-privacy informations of other users, to solve the guarantor that the prior art is unfavorable for individual subscriber privacy Shield, the technical issues of causing hidden danger to the personal security of user.

A kind of user privacy information of stranger's social activity is proposed in the first aspect of the application based on above-mentioned purpose Guard method, comprising:

Determine that target user, the target user are the user for the personal information that active user is checked in request;

Obtain tracking degree and the degree of association of the target user relative to active user;The tracking degree is within a preset period of time The frequency of the personal information of the active user is checked in target user's request;The degree of association is target user and active user Incidence relation;

Tracking degree and the degree of association according to target user relative to active user determine that the personal information of active user uses target The shielding grade at family;According to different shielding grades, the active user is shielded to the visible personal information of the target user.

In some embodiments, the shielding grade includes the first shielding grade, secondary shielding grade and third shielding etc. Grade, wherein the first shielding grade is to shield whole personal information, and secondary shielding grade is shielded segment personal information, the Three shielding grades are not shield personal information.

In some embodiments, the personal information, comprising: activity that the active user is participating in and/or described The historical act that the activity and/or active user that the movable and/or described active user that active user participates in initiates are participated in Action message.

In some embodiments, the shielded segment personal information, comprising: by the when and where of the action message into Row blurring.

In some embodiments, the blurring includes: after the when and where of the action message is mapped as expansion Time range and ground point range, alternatively, the when and where of shielding action message and only visible movable type.

In some embodiments, the tracking degree and the degree of association according to target user relative to active user determines current use The personal information at family specifically includes the shielding grade of target user:

The current shielding grade of target user is determined according to the degree of association;Determination is corresponding with the shielding grade that target user is current Threshold interval, it is when the frequency exceeds permitted threshold interval, then corresponding to improve the shielding grade.

In some embodiments, target user includes: onrelevant relationship, general pass relative to the incidence relation of active user Connection relationship and particular associative relationship.

In some embodiments, when the degree of association is particular associative relationship, shielding grade is determined as third shielding Grade;When the degree of association is general incidence relation, target user is to the frequency of active user without departing from the threshold value When section, then grade is shielded in third, if the frequency has exceeded the threshold interval, is shielded grade raising For secondary shielding grade;When the degree of association is onrelevant relationship, shielding grade is determined as secondary shielding grade, and work as The frequency exceeds the threshold interval, then is shielded grade and rise to the first shielding grade.

In some embodiments, further includes: receive the cancellation instruction that the active user sends, instructed according to the cancellation Cancel shielding of the active user to the visible personal information of the target user.

Based on above-mentioned purpose, in further aspect of the application, it is also proposed that a kind of privacy of user letter of stranger's social activity Cease protection system, comprising:

Target user's determining module, for determining that target user, the target user are the personal letter that active user is checked in request The user of breath;

Tracking degree and the degree of association obtain module, check the active user within a preset period of time for obtaining the target user Personal information frequency as the tracking degree;And it obtains the target user and makees relative to the incidence relation of active user For the degree of association;

Personal information shroud module, tracking degree and the degree of association according to target user relative to active user, determines active user Personal information is shielded by the active user and is used the target according to the shielding grade for the shielding grade of target user The visible personal information in family.

The embodiment of the present application provides the user privacy information guard method and system of a kind of stranger's social activity, can be according to working as The incidence relation of frequency and active user and target user that the personal information of preceding user is checked by target user, shielding are worked as Preceding user is to the visible personal information of target user, so that the individual privacy of user is protected, so that the personal security of user obtains To guarantee, user experience is improved, is conducive to the development of stranger's social activity.

Detailed description of the invention

By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:

Fig. 1 is the flow chart of the user privacy information guard method of stranger's social activity of the embodiment of the present application one;

Fig. 2 is the flow chart of the user privacy information guard method of stranger's social activity of the embodiment of the present application two;

Fig. 3 is the structural schematic diagram of the user privacy information protection system of stranger's social activity of the embodiment of the present application three.

Specific embodiment

The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to related invention is illustrated only in attached drawing.

It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.

As one embodiment of the application, as shown in Figure 1, be stranger's social activity of the embodiment of the present application one user it is hidden The flow chart of private information protecting method.From figure 1 it appears that the user privacy information protection side of stranger's social activity of this implementation Method may comprise steps of:

S101: determine that target user, the target user are the user for the personal information that active user is checked in request.

The user privacy information guard method of stranger's social activity of the embodiment of the present application is mainly used in and realizes stranger society The internet system of platform is handed over, which may include server and intelligent terminal, can wherein be equipped in intelligent terminal APP(application software), user can register personal account by APP to realize stranger's social activity.Specifically, user can pass through APP promotional activities, and action message is issued, so that other users is obtained the action message, and then sign up for described Activity, to realize the social activity between stranger.User can also participate in the activity of other users initiation, to realize between stranger Social activity.

In stranger's social platform of the invention, personal information at least part of active user is in other users Visible state.Specifically, platform can be its personal homepage of each user maintenance, record and dynamic update on the personal homepage To the visible personal information of other users, including personal multidate information and personal settings information.Other users can be by checking Personal multidate information that the personal homepage of active user is delivered or the personal settings information for checking user, and then obtain current use The visible personal information in family.Wherein, personal settings information is filled in by user and to other users it is seen, for example, user name, head Picture, date of birth, gender, personality label etc.;It is filled in by user but to the sightless information-of other users such as real name, identity Number, phone number, correspondent bank card number etc.-are demonstrate,proved not as the personal settings information shown on personal homepage.Personal dynamic Information is information showing on personal homepage, updating with various actions of the user in this social platform, this implementation The personal multidate information referred in example and subsequent embodiment is primarily referred to as information relevant to social activity, comprising: active user Activity that movable and/or described active user that the movable and/or described active user participated in participates in initiates and/or The action message for the historical act that active user participates in, action message includes movable type, time, place etc..Certain user The activity pay attention in, thumb up, commenting on can also be presented on personal homepage and as the personal multidate information.

When there is other users to wish to check the personal information of active user by APP, then the intelligence of the other users is whole End can send the request for checking active user's personal information to stranger's social platform, so that the other users are determined as by platform Target user.

S102: tracking degree and the degree of association of the target user relative to active user are obtained.

Wherein, tracking degree of the target user relative to active user are as follows: target user requests within a preset period of time Check the frequency of the personal information of the active user.

After target user has been determined, it is directed to after checking request of active user's personal information when receiving target user, Stranger's social platform can determine that target user checks active user's within a preset period of time according to the information of target user The frequency of personal information.In the present embodiment, when target user checks the personal information of active user every time, platform can be to mesh Mark user's checks that record records.When personal information request of the target user to active user is checked, platform tune With the record of checking of target user, and determine that target user checks the personal information of the active user within a preset period of time Frequency.In the present embodiment, preset time period can be set by platform or active user.For example, it can be set to preset time period It is the past 24 hours, one week or ten days.Determine that target user checks that the personal of active user is believed in the preset time period The number of breath, as the frequency.

The target user can be indicated relative to the degree of association of active user by different grades of incidence relation, be closed Connection relationship is divided into onrelevant relationship, general incidence relation and particular associative relationship.Specifically, if target user and current use Family is in and adds as a friend mutually, then can be determined as the two and belong to particular associative relationship;Target user and active user have altogether Same social activity, is determined as general incidence relation for the incidence relation of the two, and common social activity includes that target is used here Family and active user have registered some social activity, or have the history social activity participated in jointly;If target user Good friend is not it with active user and uncommon social activity, it is determined that the two onrelevant relationship.Certainly, the incidence relation Can also be by active user's self-setting, such as in the case where target user and active user add as a friend, active user Various remark informations can be set for target user, when the remark information being arranged for target user is labeled as the kinships such as elder brother Or when friends, then it can determine that incidence relation is particular associative relationship, such as remarks are not carried out to target user, then It can determine that incidence relation is general incidence relation.In another example when personal information of target user's request to active user carries out When checking, this for making target user checks that request and its personal information are in visible state to active user, such as uses to current Family sends prompting message, and active user can be arranged in response to prompting message and manually and belong to the incidence relation of target user Particular associative relationship, general incidence relation or onrelevant relationship.

S103: tracking degree and the degree of association according to target user relative to active user determine the personal letter of active user The shielding grade to target user is ceased, it is visible to the target user that the active user is shielded according to different shielding grades Personal information.

For example, the shielding grade can include but is not limited to the first shielding grade, secondary shielding grade and third shielding Grade, wherein the first shielding grade is to shield whole personal information, i.e. target user can not obtain the individual of active user Information.Secondary shielding grade is shielded segment personal information, comprising: active user is visible to the target user personal dynamic The activity time information and location information of social activity in state information are blurred, such as the when and where of social activity is reflected It penetrates for the time range and ground point range after expanding, such as by temporal information " on 09 01st, 2018 in original active information When -20 when 18 " expand mapping " on 09 01st, 2018 " or " 09 month 2018 ";For another example by original active information Location information " Changping District, Beijing recreation center (specified place) " expansion is mapped as " Changping District, Beijing " or " north Jing Shi ".It also include shielding movable time and ground to the blurring of social activity original active information under secondary shielding grade Point, and only visible movable type, such as original active information are " in ChangPing, Beijing City when -20 at 2018 09 month 01 day 18 Area plays card at recreation center singing ", the visual information after blurring only includes " playing card ", " singing ".Pass through blurring After processing, the preference that allows target user to recognize active user to social activity by the personal information of visible part Interest etc., but have no way of knowing the specific feelings such as time, the place of social activity of active user's preparation participation or history participation Condition, because of individual privacies such as position, schedule, activity trajectories without exposing active user.Third shielding grade is not shield to appoint What visible personal information.

About the tracking degree and the degree of association according to target user relative to active user, the personal information of active user is determined To the shielding grade of target user, specifically: when the degree of association is particular associative relationship, shielding grade being determined as the Three shielding grades, and grade is shielded according to third, the active user is not shielded to the visible personal information of the target user. When the degree of association is general incidence relation, according to the corresponding shielding of threshold interval at the frequency of the tracking degree Grade shields the active user to the visible personal information of the target user;That is, in the feelings of general incidence relation Under condition, if target user to the tracking degree frequency of active user not higher than certain threshold value when, allow its be in third shielding Grade;If tracking degree frequency is already higher than the threshold value, is shielded grade and rise to secondary shielding grade, i.e., only allow mesh It marks user and obtains personal information of the active user by blurring.When the degree of association is onrelevant relationship, grade will be shielded It is determined as secondary shielding grade, and equally judges threshold interval at the frequency of the tracking degree, if tracking degree frequency Rate is already higher than threshold value, then is shielded grade and rise to the first shielding grade, and shield institute completely according to the first shielding grade Active user is stated to the visible personal information of the target user.

As the alternative embodiment of the application, can also include:

When target user request the personal information of active user is checked when, make target user this check request and its it is a People's information is in visible state to active user, receives the cancellation instruction that the active user sends, is instructed according to the cancellation Cancel shielding of the active user to the visible personal information of the target user.Active user can be referred to by sending to cancel The mode of order cancels the personal information to target user's shielding.

The user privacy information guard method and system of stranger's social activity of this implementation, can be according to the individual of active user The incidence relation of frequency and active user and target user that information is checked by target user, graduation shielding active user The visible personal information open to target user, the mode including Fuzzy processing shields a part of personal information, to protect The individual privacy of user so that the personal security of user is protected improves user experience, and it is social to be conducive to stranger Development.

As shown in Fig. 2, being the flow chart of the user privacy information guard method of stranger's social activity of the embodiment of the present application two. The user privacy information guard method of stranger's social activity provided in this embodiment, may comprise steps of:

S201: determine that target user, the target user are the user for the personal information that active user is checked in request.Ought there be it It, will when his user checks the personal information of active user by the personal homepage that the APP request of social platform enters active user The user is determined as target user.

S202: it obtains the target user and requests to check the frequency of the personal information of the active user within a preset period of time Rate.

After target user has been determined, it can check that record determines when default according to it according to the information of target user Between in section target user check active user personal information frequency.

S203: threshold interval corresponding with the frequency is determined, the threshold interval is for improving shielding grade.

Specifically, the shielding grade may include that the first shielding grade, secondary shielding grade and third shield grade, In, the first shielding grade is to shield whole personal information, and secondary shielding grade is shielded segment personal information, third shielding Grade is not shield personal information.Details are not described herein for by the agency of above.

It can be by determining threshold interval corresponding with current shielding grade, when the frequency exceeds permitted threshold zone Between, then it is corresponding to improve the shielding grade.Also, the threshold interval can also further with shielding grade, at target user In different shielding grades, then corresponding threshold interval is also different.Threshold interval can be set by active user or Person is set by social platform.For example, being illustrated so that preset time period is one week as an example to the present embodiment, if at target user Grade is shielded in third, then corresponding to threshold interval for example can be 0-3 times/week, if target user checks active user Request then improves shielding grade to secondary shielding grade more than 3 times/week to it.If target user is in secondary shielding grade, Then corresponding to threshold interval can be 0-7 times/week, right if target user requests more than 7 times/week checking for active user It improves shielding grade to the first shielding grade.

S204: the degree of association of the target user Yu the active user are determined.

In the present embodiment, the target user can be indicated with active user's degree of association by incidence relation, Incidence relation is divided into onrelevant relationship, general incidence relation and particular associative relationship.As it was noted above, target user and current Whether the incidence relation of user can have common social activity to determine according to the whether mutual plusing good friend of the two and the two, or The incidence relation of person, the two can be actively arranged by active user, or respond target user by active user and check personal letter The request message of breath and be arranged.

S205: when the degree of association is onrelevant relationship, being determined as secondary shielding grade for shielding grade, and according to the Active user described in the cascade screens such as two shieldings is to the visible personal information of the target user.And then obtain secondary shielding grade pair The threshold interval answered, for example, 0-7 times of the morning weekly, judge target user within a predetermined period of time to active user's personal information Whether check request beyond the section, grade will be shielded if exceed and rise to the first shielding grade.

S206: when the degree of association is general incidence relation, shielding grade is determined as third shielding grade;Obtain the The corresponding threshold interval of three shielding grades, judges that target user within a predetermined period of time asks checking for active user's personal information Seeking Truth is no to exceed the section, and shielding grade is risen to secondary shielding grade if having exceeded.

S207: when the degree of association be particular associative relationship when, will shielding grade be determined as third shielding grade, and according to Active user described in the cascade screens such as third shielding is to the visible personal information of the target user;

It sets the personal information of active user to the target user as it can be seen that namely not shielding the active user to institute The visual information of target user is stated, and does not limit the frequency that target user checks the personal information.

S208: receiving the cancellation instruction that the active user sends, and cancels the active user according to cancellation instruction Shielding to the visible personal information of the target user.

User can also cancel the screen to the visible personal information of the target user by way of sending and cancelling instruction Cover so that the personal information of the active user be changed to it is visible to the target user.

The user privacy information guard method and system of stranger's social activity of this implementation, can be according to the individual of active user The frequency masks active user that information is checked by target user is to the visible personal information of target user, to protect user's Individual privacy improves user experience so that the personal security of user is protected, and is conducive to the development of stranger's social activity.

As shown in figure 3, be stranger's social activity of the embodiment of the present application three user privacy information protection system structure show It is intended to.The user privacy information of stranger's social activity of the present embodiment protects system, comprising:

Target user's determining module 301, for determining that target user, the target user are the individual that active user is checked in request The user of information;

Tracking degree and the degree of association obtain module 302, for obtain the target user check within a preset period of time it is described current The frequency of the personal information of user is as the tracking degree;And it obtains the target user and is closed relative to the association of active user System is used as the degree of association;

Personal information shroud module 303, for the tracking degree and the degree of association according to target user relative to active user, determination is worked as The personal information of preceding user shields the active user to described according to the shielding grade to the shielding grade of target user The visible personal information of target user.

The user privacy information of stranger's social activity of the present embodiment protects system, can obtain and above method embodiment phase Similar technical effect, which is not described herein again.

Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed herein Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (10)

1. a kind of user privacy information guard method of stranger's social activity, which comprises the following steps:
Determine that target user, the target user are the user for the personal information that active user is checked in request;
Obtain tracking degree and the degree of association of the target user relative to active user;The tracking degree is within a preset period of time The frequency of the personal information of the active user is checked in target user's request;The degree of association is target user and active user Incidence relation;
Tracking degree and the degree of association according to target user relative to active user determine that the personal information of active user uses target The shielding grade at family;According to different shielding grades, the active user is shielded to the visible personal information of the target user.
2. the user privacy information guard method of stranger's social activity according to claim 1, which is characterized in that the shielding Grade includes that the first shielding grade, secondary shielding grade and third shield grade, wherein the first shielding grade is that shielding is complete Portion's personal information, secondary shielding grade are shielded segment personal information, and third shielding grade is not shield personal information.
3. the user privacy information guard method of stranger's social activity according to claim 2, which is characterized in that the individual Information, comprising: activity that the movable and/or described active user that the active user is participating in participates in and/or described The action message for the historical act that the activity and/or active user that active user initiates are participated in.
4. the user privacy information guard method of stranger's social activity according to claim 3, which is characterized in that the shielding Partial personal information, comprising: be blurred the when and where of the action message.
5. the user privacy information guard method of stranger's social activity according to claim 4, which is characterized in that described fuzzy Change includes: that the when and where of the action message is mapped as the time range after expanding and ground point range, alternatively, shielding is lived Move the when and where of information and only visible movable type.
6. the user privacy information guard method of stranger's social activity according to claim 5, which is characterized in that according to target Tracking degree and the degree of association of the user relative to active user determine shielding grade of the personal information to target user of active user It specifically includes:
The current shielding grade of target user is determined according to the degree of association;Determination is corresponding with the shielding grade that target user is current Threshold interval, it is when the frequency exceeds permitted threshold interval, then corresponding to improve the shielding grade.
7. the user privacy information guard method of stranger's social activity according to claim 6, which is characterized in that target user Incidence relation relative to active user includes: onrelevant relationship, general incidence relation and particular associative relationship.
8. the user privacy information guard method of stranger's social activity according to claim 7, which is characterized in that when the pass When connection degree is particular associative relationship, shielding grade is determined as third shielding grade;When the degree of association is general incidence relation When, target user to the frequency of active user without departing from the threshold interval when, then in third shield grade, if institute It states frequency and has exceeded the threshold interval, then shielded grade and rise to secondary shielding grade;When the degree of association is nothing When incidence relation, shielding grade is determined as secondary shielding grade, and when the frequency exceeds the threshold interval, then by it Shielding grade rises to the first shielding grade.
9. the user privacy information guard method of stranger's social activity according to claim 8, which is characterized in that further include: The cancellation instruction that the active user sends is received, the active user is cancelled to the target user according to cancellation instruction The shielding of visible personal information.
10. a kind of user privacy information of stranger's social activity protects system characterized by comprising
Target user's determining module, for determining that target user, the target user are the personal letter that active user is checked in request The user of breath;
Tracking degree and the degree of association obtain module, check the active user within a preset period of time for obtaining the target user Personal information frequency as the tracking degree;And it obtains the target user and makees relative to the incidence relation of active user For the degree of association;
Personal information shroud module, tracking degree and the degree of association according to target user relative to active user, determines active user Personal information is shielded by the active user and is used the target according to the shielding grade for the shielding grade of target user The visible personal information in family.
CN201811056509.2A 2018-09-11 2018-09-11 A kind of the user privacy information guard method and system of stranger's social activity CN109344646B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811056509.2A CN109344646B (en) 2018-09-11 2018-09-11 A kind of the user privacy information guard method and system of stranger's social activity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811056509.2A CN109344646B (en) 2018-09-11 2018-09-11 A kind of the user privacy information guard method and system of stranger's social activity

Publications (2)

Publication Number Publication Date
CN109344646A true CN109344646A (en) 2019-02-15
CN109344646B CN109344646B (en) 2019-12-03

Family

ID=65305276

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811056509.2A CN109344646B (en) 2018-09-11 2018-09-11 A kind of the user privacy information guard method and system of stranger's social activity

Country Status (1)

Country Link
CN (1) CN109344646B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104704524A (en) * 2012-10-10 2015-06-10 Nec卡西欧移动通信株式会社 Information disclosure system, information disclosure server, communication terminal, information disclosure method, and non-temporary computer-readable medium
CN104852882A (en) * 2014-02-13 2015-08-19 夷希数码科技(上海)有限公司 Method for protecting user privacies in network social contact
US9396498B1 (en) * 2011-11-22 2016-07-19 Symantec Corporation Systems and methods for using social-networking accounts to identify characteristics that strangers share in common
CN108062390A (en) * 2017-12-15 2018-05-22 广州酷狗计算机科技有限公司 The method, apparatus and readable storage medium storing program for executing of recommended user
CN108282395A (en) * 2015-04-30 2018-07-13 广东欧珀移动通信有限公司 Method for message interaction and relevant apparatus and communication system and medium product

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9396498B1 (en) * 2011-11-22 2016-07-19 Symantec Corporation Systems and methods for using social-networking accounts to identify characteristics that strangers share in common
CN104704524A (en) * 2012-10-10 2015-06-10 Nec卡西欧移动通信株式会社 Information disclosure system, information disclosure server, communication terminal, information disclosure method, and non-temporary computer-readable medium
CN104852882A (en) * 2014-02-13 2015-08-19 夷希数码科技(上海)有限公司 Method for protecting user privacies in network social contact
CN108282395A (en) * 2015-04-30 2018-07-13 广东欧珀移动通信有限公司 Method for message interaction and relevant apparatus and communication system and medium product
CN108062390A (en) * 2017-12-15 2018-05-22 广州酷狗计算机科技有限公司 The method, apparatus and readable storage medium storing program for executing of recommended user

Also Published As

Publication number Publication date
CN109344646B (en) 2019-12-03

Similar Documents

Publication Publication Date Title
Brunton et al. Obfuscation: A user's guide for privacy and protest
Hawdon et al. Policing tactics and perceptions of police legitimacy
Kerr Lifting the Fog of Internet Surveillance: How a Suppression Remedy Would Change Computer Crime Law
Heckathorn et al. AIDS and social networks: HIV prevention through network mobilization
Donath Signals in social supernets
Foster et al. Assessing the impact of the Stephen Lawrence inquiry
US9906474B2 (en) Automated selection of appropriate information based on a computer user's context
US7395507B2 (en) Automated selection of appropriate information based on a computer user's context
Thebault-Spieker et al. Avoiding the south side and the suburbs: The geography of mobile crowdsourcing markets
Rodan The Internet and political control in Singapore
US8108414B2 (en) Dynamic location-based social networking
Persily The 2016 US Election: Can democracy survive the internet?
Rogers A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study
Tufekci Algorithmic harms beyond Facebook and Google: Emergent challenges of computational agency
Sanders Sexing up the subject: Methodological nuances in researching the female sex industry
Sands Torture team: Rumsfeld's memo and the betrayal of American values
Clark et al. Employer’s use of social networking sites: A socially irresponsible practice
JP5746348B2 (en) Dynamic place visibility in geosocial networking systems
Adler et al. The legal, ethical, and social implications of the reasonable woman standard in sexual harassment cases
Franks Sexual Harassment 2.0
Burgess Cellular phones, public fears, and a culture of precaution
Berk et al. Establishing rapport with deviant groups
Bocij Cyberstalking: Harassment in the Internet age and how to protect your family
Holtzman Privacy lost: how technology is endangering your privacy
KR20110063742A (en) Sharing of location information in a networked computing environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant