CN111898159A - Risk prompting method and device, electronic equipment and readable storage medium - Google Patents

Risk prompting method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN111898159A
CN111898159A CN202010763588.1A CN202010763588A CN111898159A CN 111898159 A CN111898159 A CN 111898159A CN 202010763588 A CN202010763588 A CN 202010763588A CN 111898159 A CN111898159 A CN 111898159A
Authority
CN
China
Prior art keywords
risk
target
item
preset
items
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010763588.1A
Other languages
Chinese (zh)
Other versions
CN111898159B (en
Inventor
游紫云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202010763588.1A priority Critical patent/CN111898159B/en
Publication of CN111898159A publication Critical patent/CN111898159A/en
Application granted granted Critical
Publication of CN111898159B publication Critical patent/CN111898159B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Educational Administration (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a risk prompting method and device, electronic equipment and a readable storage medium, and belongs to the field of communication. The method comprises the following steps: receiving a first determination input for a target term; acquiring target content corresponding to the target clause; and comparing the target content with a preset risk item, and giving up responding to the first determination input under the condition that the target content comprises the preset risk item. According to the method and the device, under the condition that the target content corresponding to the target clause comprises the preset risk item, the response to the first determination input is abandoned, so that the situation that the user directly agrees to the target clause without knowing the privacy risk is avoided, and the safety of the user privacy data is improved.

Description

Risk prompting method and device, electronic equipment and readable storage medium
Technical Field
The application belongs to the field of communication, and particularly relates to a risk prompting method and device, electronic equipment and a readable storage medium.
Background
As the use scenes of electronic devices are gradually increased, more and more private information is involved in the electronic devices, such as: address book, photo, account password, geographic location, personal identification information, chat history, and the like. Therefore, in order to ensure the privacy security of users, various countries have come out of privacy protection regulations, such as: GDPR (General data protection regulation) of european union, network security law of china, and the like.
In response to the regulations of the privacy protection regulations, electronic devices, APP (Application, mobile phone software) manufacturers, and the like are modified according to the regulations of the privacy protection regulations, and inform users of details of collecting and using personal data of the users in a privacy statement manner and obtain consent.
Typically, the privacy statements are verbose and contain a large amount of arcane professional vocabulary. Thus, the user may agree directly to the privacy statement without being able to peruse the privacy statement in detail. This situation may cause the user to ignore possible non-compliance risks in the electronic device and APP, thereby posing a potential risk to the privacy of the user.
Disclosure of Invention
An object of the embodiments of the present application is to provide a risk prompting method, an apparatus, an electronic device, and a readable storage medium, which can give up responding to a first determination input when target content corresponding to a target clause includes a preset risk item, so as to prevent a user from directly agreeing to the target clause without knowing a privacy risk, thereby improving security of user privacy data.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a risk prompting method, where the method includes:
receiving a first determination input for a target term;
acquiring target content corresponding to the target clause;
and comparing the target content with a preset risk item, and giving up responding to the first determination input under the condition that the target content comprises the preset risk item.
In a second aspect, an embodiment of the present application provides an apparatus for risk notification, where the apparatus includes:
a first receiving module for receiving a first determination input for a target term;
the acquisition module is used for acquiring the target content corresponding to the target clause;
and the comparison module is used for comparing the target content with a preset risk item, and giving up responding to the first determination input under the condition that the target content comprises the preset risk item.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In the embodiment of the application, by receiving a first determination input aiming at a target clause, acquiring target content corresponding to the target clause, comparing the target content with a preset risk item, and giving up a response to the first determination input under the condition that the target content comprises the preset risk item, the risk condition of the target clause can be quickly determined according to the comparison result of the target content of the target clause and the preset risk item, so that a user is prevented from directly agreeing to the target clause under the condition that the risk condition is unknown, and the safety of user privacy data is improved.
Drawings
Fig. 1 is a flowchart illustrating steps of an embodiment of a risk prompting method according to an embodiment of the present application;
FIG. 2 is an exemplary diagram of a risk suggestion setting interface provided by an embodiment of the application;
FIG. 3 is an exemplary diagram of displaying different target areas in different colors according to an embodiment of the present application;
FIG. 4 is an exemplary diagram of a target area provided by an embodiment of the present application;
FIG. 5 is a diagram of an example of setting attention item information provided by an embodiment of the present application;
FIG. 6 is an exemplary diagram for highlighting attention item information provided by an embodiment of the application;
FIG. 7 is an exemplary diagram of an output risk suggestion interface provided by an embodiment of the application;
FIG. 8 is an exemplary diagram for displaying historical evaluation records provided by an embodiment of the present application;
FIG. 9 is an exemplary diagram of a query evaluation result provided by an embodiment of the present application;
FIG. 10 is a flowchart illustrating steps of an embodiment of a risk presentation apparatus according to an embodiment of the present disclosure;
fig. 11 is a block diagram of an electronic device according to an embodiment of the present application;
fig. 12 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The risk prompting method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
Method embodiment
Referring to fig. 1, an embodiment of the present application provides a risk prompting method, where the method includes:
step 101, receiving a first determination input aiming at a target clause;
102, acquiring target content corresponding to the target clause;
step 103, comparing the target content with a preset risk item, and giving up responding to the first determination input when the target content includes the preset risk item.
The application can be applied to electronic equipment, and the electronic equipment specifically includes but is not limited to: smart phones, tablet computers, electronic book readers, MP3(Moving Picture Experts Group Audio layer iii), MP4(Moving Picture Experts Group Audio layer iv), laptop portable computers, car-mounted computers, desktop computers, set-top boxes, smart televisions, wearable devices, and the like.
For convenience of description, the electronic device in the embodiment of the present application is exemplified by a smart phone, and it is understood that the embodiment of the present application does not limit the type of the electronic device.
The target clauses refer to files for showing and explaining conditions such as collection, use, processing and the like of private data of a user to the user, such as: user service agreements, privacy statements, contract terms, and the like. The target clauses comprise target contents, such as: the purpose for using the user privacy data, how the user privacy data is used. The user privacy data refers to data related to user privacy, which can be involved in the operation process of the electronic equipment, such as: user data such as identification cards, facial features, personal professions, bank accounts, communication records and content. In specific implementation, the electronic device needs to obtain the user privacy data to implement the corresponding function. Such as: the method comprises the steps of obtaining fingerprint data of a user to realize unlocking operation on the electronic equipment; for another example: by acquiring data such as the age, educational experience, wedding history and the like of the user, the preference of the user is positioned, so that accurate video recommendation is performed for the user.
The preset risk items are preset by the technical personnel in the field according to business needs. Optionally, the preset risk items have different risk levels.
An example of a preset risk item is provided for the present application, as in table 1.
TABLE 1
Preset risk item Risk rating
(1) Permanently storing user privacy data 5 points of
(2) The storage location is not clear 3 points of
(3) Authorizing the user privacy data to a third party 2 is divided into
(4) Non-data complaint channel 4 is divided into
Typically, when the target clause is popped up in the electronic device, a first determination input of the user for the target clause is also received, and the first determination input is used for agreeing with the target clause. When the electronic equipment receives the first determination input, target content corresponding to the target clause is obtained, the target content is compared with preset risk items, and when the target content comprises the preset risk items, the electronic equipment gives up responding to the first determination input. For example, if the target content, which includes the first preset risk item in table 1, is permanently stored in the target content, the target content is discarded in response to the first determination input, i.e., the target term is rejected.
The risk level may be represented by symbols A, B, c. For convenience of description, the risk levels in the embodiments of the present application are divided into 1-5, and the lower the score, the lower the risk, it is understood that the embodiments of the present application do not limit the expression of the risk levels. And the risk condition of the preset risk item can be known through the risk grade of the preset risk item.
In the embodiment of the application, by receiving a first determination input aiming at a target clause, acquiring target content corresponding to the target clause, comparing the target content with a preset risk item, and giving up a response to the first determination input under the condition that the target content comprises the preset risk item, the risk condition of the target clause can be quickly determined according to the comparison result of the target content of the target clause and the preset risk item, so that a user is prevented from directly agreeing to the target clause under the condition that the risk condition is unknown, and the safety of user privacy data is improved.
Optionally, the step 103 of comparing the target content with a preset risk item, and if the target content includes the preset risk item, abandoning to respond to the first determination input includes:
step S11, comparing the target content with preset risk items, and determining risk items contained in the target content, wherein the risk items correspond to target risk items, and the preset risk items comprise the target risk items;
and step S12, in the case that the risk items meet preset conditions, giving up responding to the first determination input.
The target content includes risk items, which indicate, for example, the information about how to save the user privacy data in the target content is: permanently storing a contact telephone of a user, wherein the target content comprises a first preset risk item in the table 1; the item information about the data complaint channel in the target content is as follows: data complaints can be made by xx means, not presented in table 1. Then by comparing the target content with the preset risk items, entry information can be determined: permanently storing the contact telephone of the user as a risk item, and determining a preset risk item: and permanently storing the user privacy data as a target risk item, and giving up responding to the first determination input under the condition that the risk item meets a preset condition.
Optionally, after comparing the target content with a preset risk item and determining a risk item included in the target content, the method further includes:
and determining the risk level corresponding to the risk item contained in the target content according to the risk level corresponding to the preset risk item.
For example, by comparing the target content with the preset risk items, the risk items are determined as follows: permanently storing the contact telephone of the user, and determining the target risk item as follows: and permanently storing the user privacy data, and determining that the risk grade corresponding to the target risk item is 5 points if the risk grade corresponding to the target risk item is 5 points.
Optionally, the foregoing responding to the first determination input in the case that the risk entry satisfies a preset condition includes:
under the condition that a first risk item exists in the risk items or the target risk level corresponding to the risk item is larger than a first preset value, giving up responding to the first determination input; the risk grade corresponding to the first risk item is larger than a second preset value, and the target risk grade is the mean value of the risk grades corresponding to at least two risk items under the condition that the number of the risk items is at least two.
For example, the entry information about how to save the user privacy data in the target content is: permanently storing a contact telephone of a user, wherein the target content corresponds to a first preset risk item in the table 1; the item information about the data complaint channel in the target content is as follows: data complaints can be made by xx means, not presented in table 1; the item information about data authorization in the target content is as follows: and authorizing the personal identity information of the user to a third party XX, wherein the target content corresponds to the third preset risk item in the table 1. Then by comparing the target content with the preset risk item, it may be determined that a risk item includes: permanently storing the user's contact phone and authorizing the user's personal identity information to third party XX, the target risk items include: the user privacy data is permanently stored as and authorized for third parties.
When a first risk item exists in the risk items and the risk level corresponding to the first risk item is greater than a second preset value, giving up responding to the first determination input, which is shown as follows: the first risk item is a risk item with a risk grade greater than 4 points, the second preset value is 4 points, and when the risk item comprises: when the contact call of the user is permanently stored, if the risk level of the risk item is 5 points and is greater than a second preset value, and if the risk item is a first risk item, the response to the first determination input is abandoned, or if the target risk level corresponding to the risk item is greater than the second preset value, the response to the first determination input is abandoned, for example: the risk items are: permanently storing a contact telephone of a user and authorizing personal identity information of the user to a third party XX, wherein the risk grades corresponding to the risk items are respectively 5 points and 2 points, the target risk grade is 3.5 points, the first preset value is 3 points, and the target risk grade is greater than the first preset value, and then giving up responding to the first determination input.
It should be noted that, the first preset value and the second preset value are set by a person skilled in the art as needed, and values of the first preset value and the second preset value are not limited in the present invention.
Optionally, after determining the risk items contained in the target content, the method further includes:
step S21, receiving a first input;
step S22, in response to the first input, displaying a risk item included in the target content in a target area; and the risk level corresponding to the risk item displayed in the target area corresponds to the target area.
The first input is used for controlling the electronic equipment to display risk items contained in the target content. In response to the first input, the electronic device can display a risk item contained in the target content in a target area.
The target area is used for carrying out hierarchical display on the risk items. For example, the risk item 1 is 3 points, the risk item 2 is 3 points, the risk item 3 is 5 points, the risk item 4 is 2 points, and the risk item 5 is 0 points, and at this time, the display result is: a first target area display risk item 3, a third target area display risk item 1 and risk item 2, a fourth target area display risk item 4, a sixth target area display risk item 5. According to the risk level, the risk items are displayed in a target area in a grading mode, so that a user can visually and quickly look up the risk condition of the risk items, and can accurately know the distribution information of the risk items with different risk levels in the target item.
Optionally, after the abandoning in response to the first determination input in step 103, the method further includes:
a step S31 of receiving a second determination input for the target clause;
step S32, in response to the second determination input, storing the risk item and displaying path information; wherein the path information is used to indicate that a path is withdrawn in response to the second determination input, the second determination input being used to accept a target term.
The second determination input is for continuing to agree to the target term when the electronic device abandons responding to the first determination input, and the electronic device is further capable of storing the risk entry and displaying path information in response to the second determination input, wherein the path information is used for indicating a path for canceling responding to the second determination input.
Optionally, the electronic device includes a risk prompt setting interface, and referring to fig. 2, an example of the risk prompt setting interface is shown. The risk prompt setting interface is configured in advance by a person skilled in the art, the invention is not limited, and by starting a risk prompt mode in the risk prompt setting interface, the electronic device can be controlled to execute the risk prompt method in the embodiment of the application when receiving the first determination input.
Optionally, before the receiving the first determination input for the target clause in step 101, the method further includes: and starting a risk prompt mode on the risk prompt setting interface.
As shown in fig. 2, the user may turn on the risk prompt mode through a switch button in the risk prompt setting interface.
The risk prompting mode is used for monitoring the first determination input, and when the electronic equipment receives the first determination input aiming at the target clause, the risk prompting mode triggers a risk prompting mechanism. The risk prompting mechanism is used for controlling the electronic device to implement the methods in step 102 and step 103.
Optionally, the target areas corresponding to different risk levels have different display parameters.
The display parameters include, but are not limited to, color, transparency, etc., such as: the target areas corresponding to the risk grades 1, 2, 3, 4 and 5 are displayed in red, orange, yellow, green and blue in a distinguishing way. Referring to fig. 3, an exemplary diagram showing different target areas in different colors is shown.
According to the embodiment of the application, the risk items contained in the target content are displayed in the target area, the risk level corresponding to the risk items displayed in the target area corresponds to the target area, and the target areas corresponding to different risk levels have different display parameters, so that the readability of the target clauses can be improved, and a user can know the risk level of the risk items more efficiently.
Optionally, when there is no risk item corresponding to the risk level in the target area, displaying a preset character in the target area.
Referring to fig. 4, an exemplary diagram of a target area is shown, wherein a first target area does not have a risk entry corresponding to a risk level, and at this time, the first target area displays a preset character "none". It should be noted that, the preset characters are not limited in the present application, and may be "none", or may be a blank space, etc.
According to the method and the device, the risk items are displayed through the target area, so that the user can quickly know the distribution condition of each risk item in the target clause. For example, the user may collectively review all risk items with a high risk rating, such as risk items with a 5-point risk rating, or ignore risk items with a low risk rating. Therefore, the method and the device for processing the target clauses enable the user to quickly know the risk condition of the target clauses without scrolling and looking over the full text of the target clauses from top to bottom.
Optionally, the target region is expanded in response to a second input to the target region.
It should be noted that the second input is set by a person skilled in the art as needed, and the application is not limited thereto. For example, the second input is a click operation, the risk level corresponding to the target area is 5 points, and the target area is expanded in response to the click operation of the user on the target area, so that the user can refer to all risk items with the risk level of 5 points in the target clause. Therefore, the risk items with the same risk level can be displayed to the user in a centralized mode in response to the second input of the display area, and the efficiency of understanding the target clauses by the user is improved.
In an optional embodiment of the present application, the displaying, in the target area, the risk items included in the target content in step S22 includes:
and step S41, retrieving preset attention item information in the risk items.
Step S42, highlighting the attention item information when it is determined that the risk item includes the preset attention item information.
Referring to FIG. 5, an exemplary diagram of setting focus entry information is shown. The preset attention item information may be preset by a user on a risk prompt setting interface, as shown in fig. 5, the user may open "attention item setting" of the risk prompt setting interface by clicking to set the attention item information. The preset attention item information includes, but is not limited to, a data collection list, a data storage address, a data storage time, a data related third party, a data subject execution, and the like.
And under the condition that the risk items contain the preset attention item information, the electronic equipment highlights the preset attention item information when the risk items are displayed in the target area. Therefore, the method and the device enable the user to quickly consult the preset attention item information.
Referring to FIG. 6, an exemplary diagram of highlighting focus item information is shown. And if the preset attention item information is the data storage time, highlighting the risk item related to the data storage time by the electronic equipment in a bold font.
Optionally, after the abandoning in response to the first determination input in step 103, the method further includes:
in response to a third input, outputting a risk suggestion interface according to the risk items and the risk levels of the risk items.
Referring to FIG. 7, an exemplary diagram of an output risk suggestion interface is shown. The risk suggestion interface is used for prompting the target risk level of the target clause to the user. The third input is set by one skilled in the art as desired and is not limited in this application. For example, the third input is a click operation on a "generate risk suggestion" button.
Optionally, after the abandoning in response to the first determination input in step 103, the method further includes:
step S51, the risk level of the risk item is taken as the evaluation result of the target clause for storage;
and step S52, responding to the query request of the evaluation result, and outputting the risk prompt interface.
For example, the evaluation result is saved in a historical evaluation record. And the user can check the risk level of the risk item of the target clause at any time by storing the evaluation result.
Optionally, before the responding to the query request for the evaluation result in step S52, the method includes:
step S61, in response to a fourth input, displaying a historical evaluation record;
step S62, determining a target evaluation record in the historical evaluation records;
referring to FIG. 8, an exemplary diagram showing historical evaluation records is shown. The user may display the historical evaluation record by a fourth input, such as clicking a "historical evaluation record" button, on the risk suggestion setting interface, where the historical evaluation record includes evaluation results of target terms of APP1, APP2, and APP 3.
Referring to FIG. 9, an exemplary diagram of query evaluation results is shown in which a user determines a target evaluation record among the historical evaluation records. For example, by clicking on the "APP 1" button, the target evaluation record is determined to be the evaluation record of AAP 1.
In the embodiment of the application, by receiving a first determination input aiming at a target clause, acquiring target content corresponding to the target clause, comparing the target content with a preset risk item, and giving up a response to the first determination input under the condition that the target content comprises the preset risk item, the risk condition of the target clause can be quickly determined according to the comparison result of the target content of the target clause and the preset risk item, so that a user is prevented from directly agreeing with the target clause under the condition that the risk condition is not known, the safety of user privacy data is improved, in addition, according to the risk level, risk items can be visually displayed in a target area, and the efficiency of the user in knowing the target clause is improved.
It should be noted that, in the risk prompting method provided in the embodiment of the present application, the execution main body may be a risk prompting device, or a control module in the risk prompting device, for executing the risk prompting method. In the embodiment of the present application, a risk prompting device is taken as an example to execute a risk prompting method, and a device for risk prompting provided in the embodiment of the present application is described.
Device embodiment
Referring to fig. 10, an embodiment of the present application provides a risk indicating device, including:
a first receiving module 1001 for receiving a first determination input for a target clause.
The obtaining module 1002 is configured to obtain target content corresponding to the target clause.
A comparison module 1003, configured to compare the target content with a preset risk item, and if the target content includes the preset risk item, abandon to respond to the first determination input.
Optionally, the comparing module 1003 includes:
and the risk item determining sub-module is used for comparing the target content with preset risk items and determining risk items contained in the target content, wherein the risk items correspond to the target risk items, and the preset risk items comprise the target risk items.
And the abandon response submodule is used for abandoning the response to the first determination input under the condition that the risk items meet the preset conditions.
Optionally, the apparatus further comprises:
and the risk grade determining module is used for determining the risk grade corresponding to the risk item contained in the target content according to the risk grade corresponding to the preset risk item.
The abandonment response submodule comprises:
the abandon response unit is used for abandoning the response to the first determination input under the condition that the first risk item exists in the risk items or the target risk level corresponding to the risk item is larger than a first preset value; the risk grade corresponding to the first risk item is larger than a second preset value, and the target risk grade is the mean value of the risk grades corresponding to at least two risk items under the condition that the number of the risk items is at least two.
Optionally, the apparatus further comprises:
and the second receiving module is used for receiving the first input.
The display module is used for responding to the first input and displaying the risk items contained in the target content in a target area; and the risk level corresponding to the risk item displayed in the target area corresponds to the target area.
Optionally, the apparatus further comprises:
a third receiving module for receiving a second determination input for the target clause.
A storage module, configured to store the risk entry and display path information in response to the second determination input; wherein the path information is to indicate a path to withdraw in response to the second determination input to accept a target term.
In the embodiment of the application, by receiving a first determination input aiming at a target clause, acquiring target content corresponding to the target clause, comparing the target content with a preset risk item, and giving up a response to the first determination input under the condition that the target content comprises the preset risk item, the risk condition of the target clause can be quickly determined according to the comparison result of the target content of the target clause and the preset risk item, so that a user is prevented from directly agreeing to the target clause under the condition that the risk condition is unknown, and the safety of user privacy data is improved.
The risk prompting device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a kiosk, and the like, and the embodiments of the present application are not particularly limited.
The risk prompting device in the embodiment of the application may be a device with an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The risk prompting device provided in the embodiment of the present application can implement each process implemented by the method embodiments of fig. 1 to 9, and is not described here again to avoid repetition.
Optionally, as shown in fig. 11, an electronic device 1100 is further provided in an embodiment of the present application, and includes a processor 1101, a memory 1102, and a program or an instruction that is stored in the memory 1102 and is executable on the processor 1101, and when the program or the instruction is executed by the processor 1101, the process of the risk indication method embodiment is implemented, and the same technical effect can be achieved, and details are not repeated here to avoid repetition.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 12 is a schematic hardware structure diagram of an electronic device implementing an embodiment of the present application.
The electronic device 1200 includes, but is not limited to: radio frequency unit 1201, network module 1202, audio output unit 1203, input unit 1204, sensors 1205, display unit 1206, user input unit 1207, interface unit 1208, memory 1209, and processor 1210.
Those skilled in the art will appreciate that the electronic device 1200 may further comprise a power source (e.g., a battery) for supplying power to the various components, and the power source may be logically connected to the processor 1210 via a power management system, so as to implement functions of managing charging, discharging, and power consumption via the power management system. The electronic device structure shown in fig. 12 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
The radio frequency unit 1201 is configured to receive a first determination input for a target item.
The processor 1210 is configured to obtain target content corresponding to the target clause, compare the target content with a preset risk item, and abandon the response to the first determination input if the target content includes the preset risk item.
It should be understood that, in the embodiment of the present application, the input Unit 1204 may include a Graphics Processing Unit (GPU) 12041 and a microphone 12042, and the graphics processing Unit 12041 processes image data of still pictures or videos obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 1206 may include a display panel 12061, and the display panel 12061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1207 includes a touch panel 12071 and other input devices 12072. A touch panel 12071, also referred to as a touch screen. The touch panel 12071 may include two parts of a touch detection device and a touch controller. Other input devices 12072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 1209 may be used to store software programs as well as various data, including but not limited to application programs and an operating system. Processor 1210 may integrate an application processor, which handles primarily the operating system, user interface, applications, etc., and a modem processor, which handles primarily wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 1210.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned risk prompting method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction, to implement each process of the above-mentioned risk prompting method embodiment, and can achieve the same technical effect, and in order to avoid repetition, the description is omitted here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (12)

1. A risk prompting method, characterized in that the method comprises:
receiving a first determination input for a target term;
acquiring target content corresponding to the target clause;
and comparing the target content with a preset risk item, and giving up responding to the first determination input under the condition that the target content comprises the preset risk item.
2. The method of claim 1, wherein comparing the target content with a preset risk item, and in the case that the target content includes a preset risk item, forgoing responding to the first determination input comprises:
comparing the target content with preset risk items, and determining risk items contained in the target content, wherein the risk items correspond to the target risk items, and the preset risk items comprise the target risk items;
and giving up responding to the first determination input in the case that the risk items meet preset conditions.
3. The method of claim 2, wherein the preset risk items have different risk levels, and after comparing the target content with the preset risk items and determining the risk items contained in the target content, the method further comprises:
determining a risk grade corresponding to a risk item contained in the target content according to a risk grade corresponding to the preset risk item;
the foregoing responding to the first determination input in the case where the risk entry satisfies a preset condition includes:
under the condition that a first risk item exists in the risk items or the target risk level corresponding to the risk item is larger than a first preset value, giving up responding to the first determination input; the risk grade corresponding to the first risk item is larger than a second preset value, and the target risk grade is the mean value of the risk grades corresponding to at least two risk items under the condition that the number of the risk items is at least two.
4. The method of claim 3, wherein after determining the risk items contained in the target content, the method further comprises:
receiving a first input;
displaying a risk item contained in the target content in a target area in response to the first input;
and the risk level corresponding to the risk item displayed in the target area corresponds to the target area.
5. The method of claim 1, wherein after said relinquishing in response to said first determination input, the method further comprises:
receiving a second determination input for the target term;
storing the risk entry and displaying path information in response to the second determination input; wherein the path information is to indicate a path to withdraw in response to the second determination input to accept a target term.
6. A risk suggestion device, characterized in that the device comprises:
a first receiving module for receiving a first determination input for a target term;
the acquisition module is used for acquiring the target content corresponding to the target clause;
and the comparison module is used for comparing the target content with a preset risk item, and giving up responding to the first determination input under the condition that the target content comprises the preset risk item.
7. The apparatus of claim 6, the comparison module, comprising:
a risk item determining sub-module, configured to compare the target content with a preset risk item, and determine a risk item included in the target content, where the risk item corresponds to a target risk item, and the preset risk item includes the target risk item;
and the abandon response submodule is used for abandoning the response to the first determination input under the condition that the risk items meet the preset conditions.
8. The apparatus of claim 7, further comprising:
a risk grade determining module, configured to determine a risk grade corresponding to a risk item included in the target content according to a risk grade corresponding to the preset risk item;
the abandonment response submodule comprises:
the abandon response unit is used for abandoning the response to the first determination input under the condition that the first risk item exists in the risk items or the target risk level corresponding to the risk item is larger than a first preset value; the risk grade corresponding to the first risk item is larger than a second preset value, and the target risk grade is the mean value of the risk grades corresponding to at least two risk items under the condition that the number of the risk items is at least two.
9. The apparatus of claim 8, further comprising:
the second receiving module is used for receiving the first input;
the display module is used for responding to the first input and displaying the risk items contained in the target content in a target area;
and the risk level corresponding to the risk item displayed in the target area corresponds to the target area.
10. The apparatus of claim 6, further comprising:
a third receiving module for receiving a second determination input for the target clause;
a storage module, configured to store the risk entry and display path information in response to the second determination input; wherein the path information is to indicate a path to withdraw in response to the second determination input to accept a target term.
11. An electronic device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the risk suggestion method according to any one of claims 1-5.
12. A readable storage medium, on which a program or instructions are stored, which program or instructions, when executed by a processor, carry out the steps of the risk-alerting method of any one of claims 1-5.
CN202010763588.1A 2020-07-31 2020-07-31 Risk prompting method, risk prompting device, electronic equipment and readable storage medium Active CN111898159B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010763588.1A CN111898159B (en) 2020-07-31 2020-07-31 Risk prompting method, risk prompting device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010763588.1A CN111898159B (en) 2020-07-31 2020-07-31 Risk prompting method, risk prompting device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN111898159A true CN111898159A (en) 2020-11-06
CN111898159B CN111898159B (en) 2024-07-12

Family

ID=73183193

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010763588.1A Active CN111898159B (en) 2020-07-31 2020-07-31 Risk prompting method, risk prompting device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN111898159B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022183490A1 (en) * 2021-03-05 2022-09-09 Paypal, Inc. Software process modification platform for compliance
CN115080923A (en) * 2022-07-22 2022-09-20 北京锘崴信息科技有限公司 Privacy clause analysis method and privacy clause analysis method of network financial product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104346566A (en) * 2013-07-31 2015-02-11 腾讯科技(深圳)有限公司 Method, device, terminal, server and system for detecting privacy authority risks
CN106686599A (en) * 2015-11-05 2017-05-17 阿里巴巴集团控股有限公司 Method and device for risk management of application information
CN109902288A (en) * 2019-01-17 2019-06-18 深圳壹账通智能科技有限公司 Intelligent clause analysis method, device, computer equipment and storage medium
CN110381204A (en) * 2019-07-16 2019-10-25 维沃移动通信有限公司 A kind of information display method and mobile terminal
US20200004938A1 (en) * 2016-06-10 2020-01-02 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
CN111372205A (en) * 2020-02-28 2020-07-03 维沃移动通信有限公司 Information prompting method and electronic equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104346566A (en) * 2013-07-31 2015-02-11 腾讯科技(深圳)有限公司 Method, device, terminal, server and system for detecting privacy authority risks
CN106686599A (en) * 2015-11-05 2017-05-17 阿里巴巴集团控股有限公司 Method and device for risk management of application information
US20200004938A1 (en) * 2016-06-10 2020-01-02 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
CN109902288A (en) * 2019-01-17 2019-06-18 深圳壹账通智能科技有限公司 Intelligent clause analysis method, device, computer equipment and storage medium
CN110381204A (en) * 2019-07-16 2019-10-25 维沃移动通信有限公司 A kind of information display method and mobile terminal
CN111372205A (en) * 2020-02-28 2020-07-03 维沃移动通信有限公司 Information prompting method and electronic equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022183490A1 (en) * 2021-03-05 2022-09-09 Paypal, Inc. Software process modification platform for compliance
US12014154B2 (en) 2021-03-05 2024-06-18 Paypal, Inc. Software process modification platform for compliance
CN115080923A (en) * 2022-07-22 2022-09-20 北京锘崴信息科技有限公司 Privacy clause analysis method and privacy clause analysis method of network financial product

Also Published As

Publication number Publication date
CN111898159B (en) 2024-07-12

Similar Documents

Publication Publication Date Title
US9754098B2 (en) Providing policy tips for data loss prevention in collaborative environments
US10564846B2 (en) Supplementing a virtual input keyboard
US20230237448A1 (en) Payment interface display method and apparatus and electronic device
CN106339380A (en) Method and device for recommending frequently asked question information
CN112099684A (en) Search display method and device and electronic equipment
CN111695151A (en) Application permission setting method and device, electronic equipment and readable storage medium
CN111898159A (en) Risk prompting method and device, electronic equipment and readable storage medium
CN112988006A (en) Display method, display device, electronic equipment and storage medium
CN112083854A (en) Application program running method and device
CN113918894A (en) Authority management method and authority management device
CN105353874A (en) Multimedia content sharing method and terminal
US12026275B2 (en) Systems and methods for semantic context enrichment and data masking
CN112199561A (en) Application search method and device
WO2023061267A1 (en) Personal information display method and apparatus, and device and storage medium
CN114564707A (en) Application authority management method and device and electronic equipment
CN113253904A (en) Display method, display device and electronic equipment
CN112148406A (en) Page switching method and device, electronic equipment and readable storage medium
CN112286613A (en) Interface display method and interface display device
CN112307273A (en) Information query method and device and electronic equipment
WO2015127495A1 (en) System and method for processing content on an enterprise content management system
CN112596646B (en) Information display method and device and electronic equipment
CN106951478B (en) Data processing method and device
CN117668322A (en) Enterprise ERP-based service association information calling method and device, electronic equipment and storage medium
CN113961516A (en) File display method and device and electronic equipment
EP3146449A1 (en) Method and system for providing personalized intelligent content data base and a personalized graphical user interface, gui

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant