CN109388967A - A kind of data processing method, terminal and computer readable storage medium - Google Patents

A kind of data processing method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN109388967A
CN109388967A CN201811182952.4A CN201811182952A CN109388967A CN 109388967 A CN109388967 A CN 109388967A CN 201811182952 A CN201811182952 A CN 201811182952A CN 109388967 A CN109388967 A CN 109388967A
Authority
CN
China
Prior art keywords
privacy
operation information
secret protection
protection condition
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811182952.4A
Other languages
Chinese (zh)
Other versions
CN109388967B (en
Inventor
卢亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201811182952.4A priority Critical patent/CN109388967B/en
Publication of CN109388967A publication Critical patent/CN109388967A/en
Application granted granted Critical
Publication of CN109388967B publication Critical patent/CN109388967B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

This application involves a kind of data processing method, terminal and computer readable storage mediums, comprising: detects the operation information of user;Judge whether the operation information meets default secret protection condition;When the operation information meets default secret protection condition, the privacy category of the operation information is determined;Determine privacy processing operation corresponding with the privacy category;Execute the privacy processing operation.Technical solution provided by the present application keeps the private data of user safer by the way that some softwares are performed corresponding processing with the leakage to prevent privacy of user data.

Description

A kind of data processing method, terminal and computer readable storage medium
Technical field
This application involves field of computer technology more particularly to a kind of data processing method, terminal and computer-readable deposit Storage media.
Background technique
With the rapid development of Internet technology, more and more people begin to use internet, APP (Application, Application software, present APP refer to the third party application of smart machine more) is also downloaded and used extensively by people.
When user uses APP, these application software will recognize that the interest of user is liked by the access record of user It is good, corresponding content is then pushed according to the hobby of user.This privacy information for allowing for user is leaked.
Existing some softwares can delete browsing record, but also only delete local data, and in server Data are not deleted, and application software still continual can push relevant content, are made troubles, are experienced bad to user.
Therefore, it is existing to solve that the present invention provides a kind of data processing method, terminal and computer readable storage mediums The deficiency of technology.
Summary of the invention
In order to solve the above-mentioned technical problem or it at least is partially solved above-mentioned technical problem, this application provides a kind of numbers According to processing method, terminal and computer readable storage medium, process operations to prevent privacy of user data by some privacies Leakage.
In view of this, in a first aspect, this application provides a kind of data processing methods, comprising:
Detect the operation information of user;
Judge whether the operation information meets default secret protection condition;
When the operation information meets default secret protection condition, the privacy category of the operation information is determined;
Determine privacy processing operation corresponding with the privacy category;
Execute the privacy processing operation.
Further, the operation information includes: the duration of the installation of application program and making after application program installation With number, frequency and duration;
It is described to judge whether the operation information meets default secret protection condition, comprising:
Whether the installation duration for judging application program is more than installation duration threshold value;If so, determining that the operation information is full Sufficient predetermined registration operation secret protection condition;
Alternatively,
Whether the access times for judging application program are more than access times threshold value;If so, determining that the operation information is full Sufficient predetermined registration operation secret protection condition;
Alternatively,
Whether the frequency of use for judging application program is more than frequency of use threshold value;If so, determining that the operation information is full Sufficient predetermined registration operation secret protection condition;
Alternatively,
Whether the use duration for judging application program is more than using duration threshold value;If so, determining that the operation information is full Sufficient predetermined registration operation secret protection condition.
Further, the privacy category includes: terminal using privacy category, and the determination is corresponding with the privacy category Privacy processing operation, comprising:
Judge whether application program belongs to off-loadable type;
If so, application program is unloaded, then reinstall.
Further, the operation information includes: the browse operation on terminal interface;
It is described to judge whether the operation information meets default secret protection condition, comprising:
Obtain the contents of object of the browse operation;
Judge whether the contents of object is located at preset content list;
When being located at preset content list, determination meets predetermined registration operation secret protection condition.
Further, the privacy category includes: interface browsing privacy category.
Further, determination privacy processing operation corresponding with the privacy category, comprising:
The operation object that detection user is clicked;
Random or selection is less than multiple objects interfereds of threshold value with the operation object degree of correlation on the page, complete on backstage At search;Alternatively,
Multiple requests for obtaining objects interfered are sent to server, but controls local application and does not receive what request returned As a result.
Further, the operation information includes: the location information acquisition operation of terminal;
It is described to judge whether the operation information meets default secret protection condition, comprising:
Judge whether the location information acquisition operation is legal position acquisition operation;
It is not legal position acquisition operation when location information acquisition operates, determines to meet and preset secret protection condition.
Further, the privacy category includes: location privacy classification,
Determination privacy processing operation corresponding with the privacy category, comprising:
Detection sends function relevant to position;
The corresponding control switch of the function is closed.
Second aspect, present invention also provides a kind of terminal, the terminal includes memory and processor;The memory It is stored with the computer program of data processing, the processor executes the computer program, to realize above-mentioned any one institute The data processing method stated.
The third aspect, present invention also provides a kind of computer readable storage medium, the computer readable storage medium It is stored with the computer program of data processing, the computer program can be executed by least one processor, to realize above-mentioned Data processing method described in meaning one.
Above-mentioned technical proposal provided by the embodiments of the present application has the advantages that compared with prior art
The application determines operation when meeting by judging whether the operation information of user meets default secret protection condition The privacy category of information is finally executed according to the corresponding privacy processing operation of privacy category.The present invention passes through to some soft Part performs corresponding processing the leakage to prevent privacy of user data, keeps the private data of user safer.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art Speech, without any creative labor, is also possible to obtain other drawings based on these drawings.
The hardware configuration signal of Fig. 1 each embodiment one optional mobile terminal to realize the present invention;
Fig. 2 is a kind of flow chart of data processing method provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of intelligent locating method provided by Embodiment 2 of the present invention;
Fig. 4 is a kind of flow chart for intelligent locating method that the embodiment of the present invention three provides;
Fig. 5 is the structural schematic diagram for the mobile terminal that another embodiment of the present invention provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the application, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
The mobile terminal of each embodiment of the present invention is realized in description with reference to the drawings.In subsequent description, use For indicate element such as " module ", " component " or " unit " suffix only for being conducive to explanation of the invention, itself There is no specific meanings.Therefore, " module " can be used mixedly with " component ".
Mobile terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as moving Phone, smart phone, laptop, digit broadcasting receiver, PDA (Personal Digital Assistant, a number Word assistant), PAD (Portable Android Device, tablet computer), PMP (Portable Media Player, it is portable Formula multimedia player), the mobile terminal of navigation device etc. and such as number TV, desktop computer etc. it is fixed eventually End.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that in addition to being used in particular for mobile purpose Element except, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
The hardware structural diagram of Fig. 1 mobile terminal of each embodiment to realize the present invention.
Mobile terminal 100 may include wireless communication unit 110, A/V (audio/video) input unit 120, user's input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power supply unit 190 Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups shown Part.More or fewer components can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more components, allows mobile terminal 100 and wireless communication system Or the radio communication between network.For example, wireless communication unit may include broadcasting reception module 111, mobile communication module 112, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel Relevant information.Broadcast channel may include satellite channel and/or terrestrial channel.Broadcast management server, which can be, to be generated and sent The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information And send it to the server of terminal.Broadcast singal may include TV broadcast singal, radio signals, data broadcasting Signal etc..Moreover, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Closing information can also provide via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 receives.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of digital multimedia broadcasting (DMB) Program guide (EPG), digital video broadcast-handheld (DVB-H) electronic service guidebooks (ESG) etc. form and exist.Broadcast Receiving module 111 can receive signal broadcast by using various types of broadcast systems.Particularly, broadcasting reception module 111 It can be wide by using such as multimedia broadcasting-ground (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video It broadcasts-holds (DVB-H), the Radio Data System of forward link media (Media FLO), received terrestrial digital broadcasting integrated service (ISDB-T) etc. digit broadcasting system receives digital broadcasting.Broadcasting reception module 111, which may be constructed such that, to be adapted to provide for extensively Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via the received broadcast singal of broadcasting reception module 111 and/ Or broadcast related information can store in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal may include that voice is logical Talk about signal, video calling signal or according to text and/or Multimedia Message transmission and/or received various types of data.
The Wi-Fi (Wireless Internet Access) of the support mobile terminal of wireless Internet module 113.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved in the module may include WLAN (Wireless LAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting short range communication.Some examples of short-range communication technology include indigo plant Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the location information of mobile terminal.Location information module Typical case be GPS (global positioning system).According to current technology, the calculating of location information module 115 is from three or more The range information and correct time information of more satellites and Information application triangulation for calculating, thus according to warp Degree, latitude and highly accurately calculate three-dimensional current location information.Currently, it is used for the method for calculating position and temporal information Three satellites and the error that calculated position and temporal information are corrected by using an other satellite.In addition, position Information module 115 can be by Continuous plus current location information in real time come calculating speed information.
A/V input unit 120 is for receiving audio or video signal.A/V input unit 120 may include 121 He of camera Microphone 122, camera 121 is to the static images obtained in video acquisition mode or image capture mode by image capture apparatus Or the image data of video is handled.Treated, and picture frame may be displayed on display unit 151.It is handled through camera 121 Picture frame afterwards can store in memory 160 (or other storage mediums) or be sent out via wireless communication unit 110 It send, two or more cameras 121 can be provided according to the construction of mobile terminal.Microphone 122 can telephone calling model, Sound (audio data) is received via microphone 122 in logging mode, speech recognition mode etc. operational mode, and can be incited somebody to action Such acoustic processing is audio data.Audio that treated (voice) data can be converted in the case where telephone calling model For the format output that can be sent to mobile communication base station via mobile communication module 112.Various types can be implemented in microphone 122 Noise eliminate (or inhibit) algorithm with eliminate noise that (or inhibition) generates during sending and receiving audio signal or Person's interference.
The order that user input unit 130 can be inputted according to user generates key input data to control each of mobile terminal Kind operation.User input unit 130 allows user to input various types of information, and may include keyboard, metal dome, touch Plate (for example, the sensitive component of detection due to the variation of resistance, pressure, capacitor etc. caused by being contacted), idler wheel, rocking bar etc. Deng.Particularly, when touch tablet is superimposed upon in the form of layer on display unit 151, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (for example, mobile terminal 100 opens or closes shape State), the position of mobile terminal 100, user is for the presence or absence of contact (that is, touch input) of mobile terminal 100, mobile terminal 100 orientation, the acceleration or deceleration movement of mobile terminal 100 and direction etc., and generate for controlling mobile terminal 100 The order of operation or signal.For example, sensing unit 140 can sense when mobile terminal 100 is embodied as sliding-type mobile phone The sliding-type phone is to open or close.In addition, sensing unit 140 be able to detect power supply unit 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 may include proximity sensor 141.
Interface unit 170 is used as mobile terminal 100 and connect at least one external device (ED).For example, external device (ED) can wrap Include wired or wireless headphone port, external power supply (or battery charger) port, wired or wireless data port, storage Card port, port, the port audio input/output (I/O), video i/o port, ear for connecting the device with identification module Generator terminal mouth etc..Identification module can be storage for verifying user using the various information of mobile terminal 100 and can wrap Include subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) etc..Know in addition, having The device (hereinafter referred to as " identification device ") of other module can take the form of smart card, and therefore, identification device can be via end Mouth or other attachment devices are connect with mobile terminal 100.Interface unit 170 can be used for receiving the input from external device (ED) (for example, data information, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 Or it can be used for transmitting data between mobile terminal and external device (ED).In addition, when mobile terminal 100 is connect with external base When, interface unit 170 may be used as allowing by its by electric power from pedestal provide to mobile terminal 100 path or can use Make the various command signals for allowing to input from pedestal and passes through its path for being transferred to mobile terminal.The various orders inputted from pedestal Signal or electric power may be used as whether mobile terminal for identification is accurately fitted within the signal on pedestal.
Output unit 150 is configured to provide output signal with vision, audio and/or tactile manner (for example, audio is believed Number, vision signal, alarm signal, vibration signal etc.).Output unit 150 may include display unit 151, audio output mould Block 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information handled in mobile terminal 100.For example, when mobile terminal 100 is in electricity When talking about call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file Downloading etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling mode Or when image capture mode, display unit 151 can show captured image and/or received image, show video or figure Picture and the UI or GUI of correlation function etc..
Meanwhile when display unit 151 and touch tablet in the form of layer it is superposed on one another to form touch screen when, display unit 151 may be used as input unit and output device.Display unit 151 may include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user to watch from outside, this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific Desired embodiment, mobile terminal 100 may include two or more display units (or other display devices), for example, moving Dynamic terminal may include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detecting touch Input pressure and touch input position and touch input area.
Audio output module 152 can mobile terminal be in call signal reception pattern, call mode, logging mode, It is when under the isotypes such as speech recognition mode, broadcast reception mode, wireless communication unit 110 is received or in memory 160 The audio data transducing audio signal of middle storage and to export be sound.Moreover, audio output module 152 can provide and movement The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that terminal 100 executes. Audio output module 152 may include loudspeaker, buzzer etc..
Alarm unit 153 can provide output, and event is notified to mobile terminal 100.Typical event can To include calling reception, message sink, key signals input, touch input etc..Other than audio or video output, alarm list Member 153 can provide output in different ways with the generation of notification event.For example, alarm unit 153 can be with the shape of vibration Formula provides output, when receiving calling, message or some other entrance communications (incoming communication), alarm Unit 153 can provide tactile output (that is, vibration) to notify to user.By providing such tactile output, even if When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153 The output of the generation of notification event can also be provided via display unit 151 or audio output module 152.
Memory 160 can store the software program etc. of the processing and control operation that are executed by controller 180, Huo Zheke Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And And memory 160 can store about the vibrations of various modes and audio signal exported when touching and being applied to touch screen Data.
Memory 160 may include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, more Media card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..Moreover, mobile terminal 100 can execute memory with by network connection The network storage device of 160 store function cooperates.
The overall operation of the usually control mobile terminal of controller 180.For example, controller 180 executes and voice communication, data Communication, video calling etc. relevant control and processing.In addition, controller 180 may include for reproducing (or playback) more matchmakers The multi-media module 181 of volume data, multi-media module 181 can construct in controller 180, or can be structured as and control Device 180 separates.Controller 180 can be with execution pattern identifying processing, by the handwriting input executed on the touchscreen or picture It draws input and is identified as character or image.
Power supply unit 190 receives external power or internal power under the control of controller 180 and provides operation each member Electric power appropriate needed for part and component.
Various embodiments described herein can be to use the calculating of such as computer software, hardware or any combination thereof Machine readable medium is implemented.Hardware is implemented, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), controller, microcontroller, microprocessor, is designed to execute function described herein processor At least one of electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180. For software implementation, the embodiment of such as process or function can with allow to execute the individual of at least one functions or operations Software module is implemented.Software code can by the software application (or program) write with any programming language appropriate Lai Implement, software code can store in memory 160 and be executed by controller 180.
So far, oneself is through describing mobile terminal according to its function.In the following, for the sake of brevity, will description such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc., which is used as, to be shown Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that using via frame or grouping send data it is all if any Line and wireless communication system and satellite-based communication system operate.
Based on above-mentioned mobile terminal hardware configuration, each embodiment of the method for the present invention is proposed.
Embodiment one
A kind of data processing method provided by one embodiment of the present invention, as shown in Figure 2, comprising:
S101 detects the operation information of user;
S102, judges whether the operation information meets default secret protection condition;
When the operation information meets default secret protection condition, S103 is executed, otherwise, terminates process.
S103 determines the privacy category of the operation information;
S104 determines privacy processing operation corresponding with the privacy category;
S105 executes the privacy processing operation.
In the embodiment of the present application, by judging whether the operation information of user meets default secret protection condition, when full The privacy category of operation information is determined when sufficient, is finally executed according to the corresponding privacy processing operation of privacy category.The present invention By the way that some equipment are performed corresponding processing with the leakage to prevent privacy of user data, pacify the private data of user more Entirely.
The operation information of user can be the application program installed in terminal, when some application program is mounted with one section Between, which will obtain some privacy informations of user, in order to guarantee the safety of private data, when installing one section Between after, need to detect some specifying informations of the application program.
In some embodiments of the present application, the operation information includes but is not limited to following classification: the peace of application program Access times, frequency and duration after duration and the application program installation of dress;
It is described to judge whether the operation information meets default secret protection condition, comprising:
Whether the installation duration for judging application program is more than installation duration threshold value;If so, determining that the operation information is full Sufficient predetermined registration operation secret protection condition.Wherein installation duration threshold value can be one month, half a year, 1 year or it is customized when It is long.Such as: customized 100 days are installation duration threshold value, when the installation duration of application program is more than 100 days, it is determined that when installation Length meets predetermined registration operation secret protection condition, and executes corresponding operation, such as deletes and reinstall.
Alternatively,
Whether the access times for judging application program are more than access times threshold value;If so, determining that the operation information is full Sufficient predetermined registration operation secret protection condition.Wherein access times threshold value can be 50 times, 100 times, 1000 times or customized time Number.Such as: customized 200 times be access times threshold value, when detect some application program operation number be more than 200 times, then It determines that access times meet predetermined registration operation secret protection condition, executes corresponding operation, such as delete and reinstall.
Alternatively,
Whether the frequency of use for judging application program is more than frequency of use threshold value;If so, determining that the operation information is full Sufficient predetermined registration operation secret protection condition.Wherein frequency of use threshold value can be twice daily, continuously one month or customized Number of days is daily all using the application program etc..Such as: it is all being used daily when detecting some application program continuous 20 days, then really Determine frequency of use and meet predetermined registration operation secret protection condition, executes corresponding operation, such as delete and reinstall.
Alternatively,
Whether the use duration for judging application program is more than using duration threshold value;If so, determining that the operation information is full Sufficient predetermined registration operation secret protection condition.Long threshold value can be 20 hours of continuous use or customized hour when used Number.Such as: when detecting that some application program continuous operation 500 is small, it is determined that meet predetermined registration operation privacy using duration and protect Guard strip part executes corresponding operation, such as deletes and reinstall.
Wherein, application program includes but is not limited to: QQ, wechat, video class (such as A video), camera-type (as beauty Yan Xiangji), Read class or other applications.
It is, first determine whether the operation information of application program meets the condition unloaded again, wherein operation information Including access times, frequency and the duration that uses every time after the installed duration of application program and application program installation Etc. information;If meeting the condition unloaded again, determine that operation information meets predetermined registration operation secret protection condition.
In some embodiments of the present application, privacy category includes: that terminal uses privacy category.
In some embodiments of the present application, determination privacy processing operation corresponding with the privacy category, comprising:
Judge whether application program belongs to off-loadable type;
If so, application program is unloaded, then reinstall.
Such as: in the movie reviews that the several terrors of certain video class application program are terrible when user is boring, but finish watching It is not desired to see again after brief introduction.This period, the application program will push always horrow movie, even if constantly blackening, shield also not It is effective, and can last for many day.This study for belonging to big data, big data study be no mistake, but people be in change, There are also the curiosities having a brainwave, and present big data, it is that a people likes that is hard to tell completely, still curious once in a while, are The privacy of user cannot be protected.At this moment then user can be reinstalled again by being offloaded to video application, so that it may To remove past browsing record.
In the embodiment of the present application, this simple behavior is reset by unloading, makes on application program band " the loss use recalled Family " or " new user " label used some data of the application program before can both having deleted, to protect privacy of user, and can To be given some special preferential treatments.
Embodiment two
The operation information of user can be some browse operations of user, some browser is commonly used in user, will Many historical viewings records are generated, some privacy informations of user is got, in order to guarantee the safety of private data, therefore makes Used time will carry out the operation of some protection privacies.
A kind of data processing method provided by one embodiment of the present invention, as shown in Figure 3, comprising:
S201 detects the browse operation on user terminal interface;
S202, judges whether the browse operation meets default secret protection condition;
When the browse operation meets default secret protection condition, S203 is executed, otherwise, terminates process.
S203 determines the privacy category of the browse operation;
S204 determines privacy processing operation corresponding with the privacy category;
S205 executes the privacy processing operation.
In the embodiment of the present application, whether default secret protection is met by the browse operation judged on user terminal interface Condition determines the privacy category of browse operation when meeting, and is finally held according to the corresponding privacy processing operation of privacy category Row.The present invention performs corresponding processing the leakage to prevent privacy of user data by the browsing to the page, makes the privacy of user Data are safer.
When user browses shopping website purchase thing, shopping website will record a large amount of recommendations one according to the browsing of user A little Related products can cause some interference to user in this way, invade the privacy of user, it is therefore desirable to which use is protected in some measures The safety of family private data.
It is described to judge whether the browse operation meets default secret protection condition in some embodiments of the present application, Include:
Obtain the contents of object of the browse operation;
Wherein, the object of browse operation can be website, such as shopping website;It is also possible to page pictures, such as article Exhibiting pictures;It can also be other elements with sale property, such as price tag etc..
Judge whether the contents of object is located at default distribution list;
When being located at default distribution list, determination meets predetermined registration operation secret protection condition.
In some embodiments of the present application, the privacy category includes: interface browsing privacy category.
In some embodiments of the present application, determination privacy processing operation corresponding with the privacy category, comprising:
The operation object that detection user is clicked;
Random or selection is less than multiple objects interfereds of threshold value with the operation object degree of correlation on the page, complete on backstage At search;Alternatively,
Multiple requests for obtaining objects interfered are sent to server, but controls local APP and does not receive the result that request returns.
In the embodiment of the present application, when browsing number of site or picture, the operation object of motor is wanted in addition to clicking Outside, some incoherent objects interfereds are clicked, also to stir up confusion;Or multiple acquisition objects interfereds are sent to server Request, but control that local APP do not receive that request returns as a result, to stir up confusion, allow used application software cannot Learn the hobby to user, the privacy of user is protected with this.
Such as: when user will search for A, user can be prompted with some incoherent B, C, D are searched for, use extraneous data Cover true intention data.It carries out some operations with violating itself practical intention, leaves error label, reduce the number that platform is collected According to authenticity and accuracy, make user draw a portrait matching degree reduce, prevent platform is from learning the hobby data to user.
Embodiment three
A kind of data processing method provided by one embodiment of the present invention, as shown in Figure 4, comprising:
S301 detects the location information acquisition operation of user terminal;
S302, judges whether the location information acquisition operation meets default secret protection condition;
When the location information, which acquires operation, meets default secret protection condition, S303 is executed, otherwise, terminates process.
S303 determines the privacy category of the browse operation;
S304 determines privacy processing operation corresponding with the privacy category;
S305 executes the privacy processing operation.
In the embodiment of the present application, acquire whether operation meets default privacy guarantor by judging the location information of user terminal Guard strip part determines the privacy category of location information acquisition operation when meeting, and is finally handled according to the corresponding privacy of privacy category Operation is executed.The present invention performs corresponding processing to prevent letting out for privacy of user data by the acquisition to location information Dew, keeps the private data of user safer.
User goes to somewhere, such as the places such as airport, and microblogging and wechat and other application can be found by waiting after getting home Occur the advertisements such as a lot of air tickets, travel bargain in program, but user did not carried out the relevant any search of tourism, it It is preceding relevant advertisement also do not occurred.This is that the private data of the position of user is leaked, it is therefore desirable to carry out some operations To protect the privacy information of user.
It is described to judge whether the location information acquisition operation meets default privacy and protect in some embodiments of the present application Guard strip part, comprising:
Judge whether the location information acquisition operation is legal position acquisition operation;
Wherein, be exactly if it is map, positioning etc. it is legal, if user open map software, and acquire location information, It is taken as illegal.
It is not legal position acquisition operation when location information acquisition operates, determines to meet and preset secret protection condition.
In some embodiments of the present application, the privacy category includes: location privacy classification.
In some embodiments of the present application, determination privacy processing operation corresponding with the privacy category, comprising:
Detection sends function relevant to position;
The corresponding control switch of the function is closed.
When going to certain places, close all nonessential positioning licenses, photo reads license, address list reading is permitted It can wait, not connect Wi-Fi of unknown origin even some Wi-Fi for seeming official, these application software cannot be positioned The position of user, therefore the demand of user cannot be learnt, corresponding information cannot be pushed, the privacy of user is protected with this.
It is, by closing corresponding application software, private data (including geographical location, address list, the phase of user are allowed Volume etc.) it is not acquired, to protect the personal secrets of user.
Example IV
The embodiment of the present invention provides a kind of mobile terminal, and the mobile terminal includes memory and processor;The storage Device is stored with the computer program of data processing, and the processor executes the computer program, to realize embodiment one as above The step of to any one of embodiment three the method.
For example, the processor executes the computer program, to realize following steps:
Detect the operation information of user;
Judge whether the operation information meets default secret protection condition;
When the operation information meets default secret protection condition, the privacy category of the operation information is determined;
Determine privacy processing operation corresponding with the privacy category;
Execute the privacy processing operation.
In the embodiment of the present application, by judging whether the operation information of user meets default secret protection condition, when full The privacy category of operation information is determined when sufficient, is finally executed according to the corresponding privacy processing operation of privacy category.The present invention By the way that some softwares are performed corresponding processing with the leakage to prevent privacy of user data, pacify the private data of user more Entirely.
Embodiment five
The embodiment of the present invention provides a kind of computer readable storage medium, and the computer-readable recording medium storage has number According to the computer program of processing, the computer program can be executed by least one processor, with realize embodiment one as above to The step of any one of embodiment three the method.
The embodiment of the present invention in specific implementation, can have corresponding technical effect refering to above-mentioned each embodiment.
Fig. 5 is the structural schematic diagram for the mobile terminal that another embodiment of the present invention provides.Mobile terminal shown in fig. 5 400 include: at least one processor 401, memory 402, at least one network interface 404 and other users interface 403.It is mobile Various components in terminal 400 are coupled by bus system 405.It is understood that bus system 405 is for realizing these groups Connection communication between part.Bus system 405 further includes power bus, control bus and state in addition to including data/address bus Signal bus.But for the sake of clear explanation, various buses are all designated as bus system 405 in Fig. 5.
Wherein, user interface 403 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 402 in the embodiment of the present invention can be volatile memory or nonvolatile memory, It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synch link DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).Memory 402 described herein is intended to include but is not limited to these and any other suitable type Memory.
In some embodiments, memory 402 stores following element, and unit or data structure can be performed, or Their subset of person or their superset: operating system 4021 and application program 4022.
Wherein, operating system 4021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 4022 includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 4022.
In embodiments of the present invention, by the program or instruction of calling memory 402 to store, specifically, can be application The program or instruction stored in program 4022, processor 401 are used to execute method and step provided by each method embodiment, such as Include:
Obtain initial exposure value corresponding to each camera in multiple cameras of image acquisition component;
According to initial exposure value corresponding to each camera, automatic exposure is carried out respectively to the multiple camera Convergence;
When any one camera restrains completion, the human face region that will identify that is transmitted to processor, obtains face figure Picture;
Intelligent positioning is carried out using the facial image.
The method that the embodiments of the present invention disclose can be applied in processor 401, or be realized by processor 401. Processor 401 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 401 or the instruction of software form.Above-mentioned processing Device 401 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software unit combination executes completion.Software unit can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at The step of memory 402, processor 401 reads the information in memory 402, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, the techniques described herein can be realized by executing the unit of function described herein.Software generation Code is storable in memory and is executed by processor.Memory can in the processor or portion realizes outside the processor.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the embodiment of the present invention is substantially The part of the part that contributes to existing technology or the technical solution can embody in the form of software products in other words Come, which is stored in a storage medium, including some instructions are used so that a computer equipment (can To be personal computer, server or the network equipment etc.) execute all or part of each embodiment the method for the present invention Step.And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program The medium of code.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Herein, the relational terms of such as " first " and " second " or the like are used merely to an entity or operation It is distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation, there are any this Actual relationship or sequence.
Through the above description of the embodiments, those skilled in the art can be understood that each reality of the present invention Applying method described in example can realize by means of software and necessary general hardware platform, naturally it is also possible to by hardware, But the former is more preferably embodiment in many cases.Based on this understanding, technical solution of the present invention is substantially in other words The part that contributes to existing technology can be embodied in the form of software products, which is stored in one In a storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be hand Machine, computer, server, air conditioner or network equipment etc.) execute method or implementation described in each embodiment of the present invention Method described in certain parts of example.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of data processing method characterized by comprising
Detect the operation information of user;
Judge whether the operation information meets default secret protection condition;
When the operation information meets default secret protection condition, the privacy category of the operation information is determined;
Determine privacy processing operation corresponding with the privacy category;
Execute the privacy processing operation.
2. the method according to claim 1, wherein the operation information include: the installation of application program when Access times, frequency and duration after the installation of long and application program;
It is described to judge whether the operation information meets default secret protection condition, comprising:
Whether the installation duration for judging application program is more than installation duration threshold value;If so, it is pre- to determine that the operation information meets If operating secret protection condition;
Alternatively,
Whether the access times for judging application program are more than access times threshold value;If so, it is pre- to determine that the operation information meets If operating secret protection condition;
Alternatively,
Whether the frequency of use for judging application program is more than frequency of use threshold value;If so, it is pre- to determine that the operation information meets If operating secret protection condition;
Alternatively,
Whether the use duration for judging application program is more than using duration threshold value;If so, it is pre- to determine that the operation information meets If operating secret protection condition.
3. according to the method described in claim 2, it is characterized in that, the privacy category includes: terminal using privacy category,
Determination privacy processing operation corresponding with the privacy category, comprising:
Judge whether application program belongs to off-loadable type;
If so, application program is unloaded, then reinstall.
4. the method according to claim 1, wherein the operation information includes: the browsing behaviour on terminal interface Make;
It is described to judge whether the operation information meets default secret protection condition, comprising:
Obtain the contents of object of the browse operation;
Judge whether the contents of object is located at preset content list;
When being located at preset content list, determination meets predetermined registration operation secret protection condition.
5. according to the method described in claim 4, it is characterized in that, the privacy category include: interface browsing privacy category,
Determination privacy processing operation corresponding with the privacy category, comprising:
The operation object that detection user is clicked;
Random or selection is less than multiple objects interfereds of threshold value with the operation object degree of correlation on the page, completes to search on backstage Rope;Alternatively,
Multiple requests for obtaining objects interfered are sent to server, but controls local application and does not receive the knot that request returns Fruit.
6. the method according to claim 1, wherein the operation information includes: the location information acquisition of terminal Operation;
It is described to judge whether the operation information meets default secret protection condition, comprising:
Judge whether the location information acquisition operation is legal position acquisition operation;
It is not legal position acquisition operation when location information acquisition operates, determines to meet and preset secret protection condition.
7. according to the method described in claim 6, it is characterized in that, the privacy category includes: location privacy classification.
8. the method according to the description of claim 7 is characterized in that determination privacy processing corresponding with the privacy category Operation, comprising:
Detection sends function relevant to position;
The corresponding control switch of the function is closed.
9. a kind of terminal, which is characterized in that the terminal includes memory and processor;The memory is stored with data processing Computer program, the processor executes the computer program, to realize number described in any one of claim 1-8 According to processing method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has data processing Computer program, the computer program can execute by least one processor, to realize as any one in claim 1-8 Data processing method described in.
CN201811182952.4A 2018-10-11 2018-10-11 Data processing method, terminal and computer readable storage medium Active CN109388967B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811182952.4A CN109388967B (en) 2018-10-11 2018-10-11 Data processing method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811182952.4A CN109388967B (en) 2018-10-11 2018-10-11 Data processing method, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109388967A true CN109388967A (en) 2019-02-26
CN109388967B CN109388967B (en) 2022-04-22

Family

ID=65427191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811182952.4A Active CN109388967B (en) 2018-10-11 2018-10-11 Data processing method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109388967B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918944A (en) * 2019-03-01 2019-06-21 维沃移动通信有限公司 A kind of information protecting method, device, mobile terminal and storage medium
CN110287731A (en) * 2019-06-28 2019-09-27 维沃移动通信有限公司 A kind of control method and terminal device of application program
CN111865961A (en) * 2020-07-15 2020-10-30 维沃移动通信有限公司 Data processing method and device and electronic equipment
CN112287359A (en) * 2019-07-22 2021-01-29 华为技术有限公司 Privacy protection method and device
CN113407956A (en) * 2021-05-31 2021-09-17 江铃汽车股份有限公司 Data control method and system, readable storage medium and vehicle
CN116669018A (en) * 2023-07-28 2023-08-29 陕西通信规划设计研究院有限公司 Data processing method and device based on Internet of things communication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120222083A1 (en) * 2011-02-28 2012-08-30 Nokia Corporation Method and apparatus for enforcing data privacy
CN103136472A (en) * 2011-11-29 2013-06-05 腾讯科技(深圳)有限公司 Method and mobile device of stopping application program to steal privacy
EP2827556A1 (en) * 2013-07-16 2015-01-21 Alcatel Lucent Method and system for content curation in internet networks
US8997077B1 (en) * 2009-09-11 2015-03-31 Symantec Corporation Systems and methods for remediating a defective uninstaller during an upgrade procedure of a product
CN107223253A (en) * 2016-09-05 2017-09-29 华为技术有限公司 Method and apparatus for sending searching request

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8997077B1 (en) * 2009-09-11 2015-03-31 Symantec Corporation Systems and methods for remediating a defective uninstaller during an upgrade procedure of a product
US20120222083A1 (en) * 2011-02-28 2012-08-30 Nokia Corporation Method and apparatus for enforcing data privacy
CN103136472A (en) * 2011-11-29 2013-06-05 腾讯科技(深圳)有限公司 Method and mobile device of stopping application program to steal privacy
EP2827556A1 (en) * 2013-07-16 2015-01-21 Alcatel Lucent Method and system for content curation in internet networks
CN107223253A (en) * 2016-09-05 2017-09-29 华为技术有限公司 Method and apparatus for sending searching request

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
不小平: "如何对抗"大数据杀熟"?数据分析师教你反套路!", 《HTTPS://WWW.SOHU.COM/A/230642087_161245》 *
爱思助手: "什么是「大数据杀熟」?| iPhone 用户如何防止被「杀熟」?", 《HTTPS://WWW.I4.CN/NEWS_DETAIL_22738.HTML》 *
种蘑菇的…: "如何对抗"大数据杀熟"?", 《知乎HTTPS://ZHUANLAN.ZHIHU.COM/P/36325777》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918944A (en) * 2019-03-01 2019-06-21 维沃移动通信有限公司 A kind of information protecting method, device, mobile terminal and storage medium
CN110287731A (en) * 2019-06-28 2019-09-27 维沃移动通信有限公司 A kind of control method and terminal device of application program
CN112287359A (en) * 2019-07-22 2021-01-29 华为技术有限公司 Privacy protection method and device
CN111865961A (en) * 2020-07-15 2020-10-30 维沃移动通信有限公司 Data processing method and device and electronic equipment
CN111865961B (en) * 2020-07-15 2023-04-07 维沃移动通信有限公司 Data processing method and device and electronic equipment
CN113407956A (en) * 2021-05-31 2021-09-17 江铃汽车股份有限公司 Data control method and system, readable storage medium and vehicle
CN116669018A (en) * 2023-07-28 2023-08-29 陕西通信规划设计研究院有限公司 Data processing method and device based on Internet of things communication
CN116669018B (en) * 2023-07-28 2023-10-13 陕西通信规划设计研究院有限公司 Data processing method and device based on Internet of things communication

Also Published As

Publication number Publication date
CN109388967B (en) 2022-04-22

Similar Documents

Publication Publication Date Title
CN109388967A (en) A kind of data processing method, terminal and computer readable storage medium
US9055214B2 (en) Electronic device and method of controlling the same
US9240826B2 (en) Electronic device and control method thereof
US20160343060A1 (en) Information providing system and mobile electronic device
CN103516780A (en) Mobile terminal, server, system and method for controlling the same
KR20130044770A (en) Searching method and mobile device using the method
CN106909851A (en) A kind of secure storage method of data and device
CN104991772B (en) Remote operation bootstrap technique and device
CN106547886A (en) Application program recommends method, device, terminal and server
US20140063317A1 (en) Mobile terminal
CN106156144A (en) Information-pushing method and device
CN109033263A (en) A kind of application recommended method and terminal
US20130110603A1 (en) Mobile terminal
CN105120054B (en) Information processing method and mobile terminal
CN104793864B (en) Method for controlling mobile terminal and device
CN106598538A (en) Method and system for updating instruction set
CN106991014A (en) A kind of method, device and mobile terminal for handling user's incoming event
CN105187621B (en) The method, apparatus and terminal of message notifying
CN107220109A (en) A kind of method and apparatus of interface display
CN104915103B (en) The method and mobile terminal of arranging desktop icons
CN106792644A (en) Mobile terminal, server and information processing method
CN106873766B (en) A kind of method and mobile terminal for realizing paging file control
CN104915299B (en) The date storage method and device of multi-memory card
CN106789600A (en) The sharing method and terminal of a kind of picture
CN109167418A (en) A kind of wireless charging edge power down process method, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant