WO2019196297A1 - User information control method and apparatus, and terminal device and storage medium - Google Patents
User information control method and apparatus, and terminal device and storage medium Download PDFInfo
- Publication number
- WO2019196297A1 WO2019196297A1 PCT/CN2018/101565 CN2018101565W WO2019196297A1 WO 2019196297 A1 WO2019196297 A1 WO 2019196297A1 CN 2018101565 W CN2018101565 W CN 2018101565W WO 2019196297 A1 WO2019196297 A1 WO 2019196297A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- time period
- application
- detection result
- authority
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the present invention relates to the field of computer application technologies, and in particular, to a user information control method, apparatus, terminal device, and computer readable storage medium.
- terminals such as smart phones have become an important part of people's daily work and life. People use their own terminal devices, or terminal devices carried by others to trigger various operations in the application, thereby realizing the application.
- the actions triggered are often related to user information in the app. For example, the use of user information is often followed, and as the operation progresses, the application also performs a record of the triggered operation to form user information corresponding to the triggered operation, and thus, the user will also be triggered. Update of information.
- the user information records the behaviors that people trigger in the application, and even the personal privacy information such as the account password used by people in the application.
- User information as a collection of personal privacy information must be limited to the user who generated the user information.
- the user information corresponding to different users is often mixed together, and cannot be Effective control of the corresponding user information for different users.
- Even if the account system is configured in the application, the user information is controlled for the configured account system.
- the user obtains the authority to operate the corresponding user information through the entered account password.
- the operation triggered by multiple users is for the account information corresponding to the account password, and the user change cannot be perceived.
- the inventor realizes that for a user to another user, in the application, the user information used in the application by the triggering operation is for the currently entered account password, two users. Sharing the same user information, it is impossible to accurately and effectively control the user information for the user. The user information needs to be solved with low controllability and cannot effectively protect the user's privacy defects.
- the present invention provides a user information control method, apparatus, terminal device and computer readable storage medium.
- a user information control method comprising:
- a user information control device comprising:
- An instruction receiving module configured to receive a triggered user operation instruction in the running application, where the user instruction is related to user information stored by the application;
- a permission control module configured to acquire an operation authority detection result corresponding to the authorized user feature for the user operation instruction
- an information control module configured to perform reading and displaying of user information related to the user operation instruction in the application according to the operation authority detection result.
- a terminal device comprising:
- a memory having stored thereon computer readable instructions that, when executed by the processor, implement a user information control method as previously described.
- a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements a user information control method as previously described.
- the user instruction that is triggered by the running application the user instruction is related to the user information stored by the application, and at this time, the user operation instruction is acquired to correspond to the authorized user feature during the time period.
- the operation permission detection result is finally able to execute the reading and displaying of the user information related to the user operation instruction in the application according to the operation authority detection result, thereby realizing the management and control of the user information based on the operation authority detection result, and the operation authority detection result corresponds to
- the time period is obtained by the authorized user feature, so that the operation permission detection result indicates the user authority of the user in the terminal system in the time period, and then the operation authority of the user in the running application is mapped, and then the related user is executed.
- the information reading and display are controlled by the operation permission detection result in the current time period, so that if the user does not have the operation authority in the current time period, the current user information reading and display limitation is inevitably caused. Therefore, it will effectively improve the controllability of user information, Very high controllability of user information, the user can ensure the protection of personal privacy. Thereby, based on the authorization of the terminal system, the difference processing between the users can be realized, and the user information realizes the isolation between the users, thereby eliminating the danger of exposure of the personal privacy carried by the user information.
- FIG. 1 is a schematic diagram of an implementation environment in accordance with the present invention, shown in accordance with an exemplary embodiment.
- FIG. 2 is a flowchart of a method for controlling user information according to an exemplary embodiment.
- FIG. 3 is a diagram showing details of a step of generating an operation authority detection result according to a configured time interval and an authorized user feature detecting whether a user operation is granted a user right in a foreground operation of an application according to an exemplary embodiment.
- step 250 is a flow chart depicting the details of step 250, illustrated in accordance with the corresponding embodiment of FIG. 2.
- FIG. 5 is a flowchart of a user information control method according to another exemplary embodiment.
- FIG. 6 is a block diagram of a user information control apparatus shown in an exemplary embodiment.
- FIG. 7 is a block diagram depicting details of a detection module, according to an exemplary embodiment.
- Figure 8 is a block diagram depicting details of an information control module, shown in accordance with the corresponding embodiment of Figure 6.
- FIG. 9 is a block diagram depicting details of a user information control apparatus, according to another exemplary embodiment.
- FIG. 10 is a schematic diagram of an apparatus, according to an exemplary embodiment.
- the user information control implemented by the present invention supports the user information control performed by each application for each user, and avoids other users in the operation response related to the user information performed by the application.
- the user information disclosure is exposed to the current user, and only the current user is granted user information generated or given by himself.
- the terminal device 110 is originally held by the user B, and triggers various operations on the executed application to achieve its own application use requirements.
- the user of the terminal device 110 is changed from the user B to the user A, for example, the user A and the user B are in the same place, and the terminal device 110 is used by the user A, the running application will also be The various operations triggered are performed under the control of the user A, including the operations related to the user information in the application.
- the user information presented in the application run by the terminal device is indistinguishable, and the user information that can be used is also indistinguishable.
- the execution of the operation related to the user information in the application run by the terminal device is that the user B is converted to the user A, that is, according to the The operation permission detection result corresponding to the authorized user feature in the current time period is performed, and the operation triggered by the user A is performed, so as to ensure that the execution of the operation to the user information is limited to the authorized user of the terminal system, and the unauthorized user of the terminal system is shielded from the user.
- the operation of the information is that the user B is converted to the user A, that is, according to the The operation permission detection result corresponding to the authorized user feature in the current time period is performed, and the operation triggered by the user A is performed, so as to ensure that the execution of the operation to the user information is limited to the authorized user of the terminal system, and the unauthorized user of the terminal system is shielded from the user.
- the user information control implemented by the present invention will be an auxiliary tool running in the application of the terminal device 110. Therefore, on the one hand, it can act as an auxiliary tool for the application running by the terminal device 110, and on the other hand, it can also be the terminal device 110.
- the function of running the application regardless of the manner in which it is implemented, is a program running in the terminal device 110.
- FIG. 2 is a flowchart of a method for controlling user information according to an exemplary embodiment.
- the user information control method in an exemplary embodiment, operates on the terminal device of the embodiment shown in FIG. 1. As shown in FIG. 2, the user information control method includes at least the following steps.
- Step 210 Receive a triggered user operation instruction in the running application, where the user operation instruction is related to the user information stored by the application.
- the application referred to is an application that is operated by the terminal device and stores user information for the implemented function.
- the application may be any of a browser application, a word memory application (back word application), and a course subscription application.
- the application in the terminal device runs, the application is triggered to operate the user, thereby generating a user operation instruction.
- the user operation instruction is received correspondingly, and the user operation instruction indicates the operation triggered by the user in the application, and the execution of the user operation instruction will change the corresponding user information, for example, The corresponding user information is read, updated, and the like.
- the user is the user who currently holds the terminal device and triggers the operation in the running application.
- the user referred to may be an authorized user in the terminal system on the one hand, or may be Guest users in the terminal system are not limited here.
- the triggered user operation instructions are generated by respective operations of accessing the internetwork, such as a click jump operation on a certain network link, thereby jumping into the network link.
- the click jump operation of the web link is a user operation instruction
- the browser application records the click jump operation of the web link to generate a corresponding history record, and the history record is the user in the application.
- User information A user operation instruction triggered by a user in an application is related to user information in the application, and therefore, the user operation instruction can be responded to in the application information by implementing the following process. On the one hand, it ensures the consistency of users, on the other hand, it will ensure the order and controllability of user information.
- step 210 includes receiving, in an application running in the terminal system and activated to the foreground, a corresponding user operation instruction generated by a user operation trigger.
- the user when the application operation is switched to the foreground, the user can trigger the user operation on the displayed interface. At this time, the user operation instruction is generated correspondingly, and the process or thread that implements the user information control for the application receives the user. Generated user action instructions.
- Step 230 Acquire an operation authority detection result corresponding to the authorized user feature in the time period for the user operation instruction.
- the system authorization is for the terminal system, and the authorized user in the terminal system, that is, the authorized user, is authorized by the system. Conversely, a user who is not authorized in the terminal system is a guest user.
- the operation permission detection result is used to indicate whether the current user can perform the user operation corresponding to the user operation instruction in the application run by the terminal device.
- the operation permission detection result has its own validity period, and the validity period is a period of time. In other words, during the running of the application, each time period has a corresponding operation permission detection result, but after the time period is exceeded, the operation permission detection result is invalid; and after the time period is exceeded, the next entry is entered.
- the time period also obtains the operation authority detection result of the entered time period as the user authority detection is performed.
- the operation permission detection result is authorized corresponding to the terminal system, that is, the user authorized by the terminal system is the authorized user, and the triggered operation can be performed in the running application.
- the operation permission detection result corresponding to the authorization of the terminal system is obtained by the user of the time period, and the user feature detection is performed according to the authorized user feature stored in the terminal system.
- the operation permission detection results of different time periods may be the same or different.
- the operation permission detection result of the time period of the user operation instruction is acquired.
- the time period refers to the time period during which the user operation of generating the user operation instruction is triggered, thereby controlling the reading or even updating of the user information by the triggered user operation.
- Step 250 Perform reading and displaying of user information related to the user operation instruction in the application according to the operation authority detection result.
- the reading and display of the user information is performed corresponding to the obtained operation authority detection result.
- the user information read and displayed includes user information stored by the user in the application, and the specific content of the user information is related to the application where the user is located and the user operation instruction triggered by the user. Specifically, when the operation permission detection result indicates that the current user obtains the authorization of the terminal system, the user information reading and displaying corresponding to the user operation instruction may be executed in the application to complete the execution of the user operation corresponding to the user operation instruction.
- a user of a browser application accesses the Internet through a browser application. After the operation permission command of the current time period is obtained, the operation permission detection result is corresponding to the user. If the operation authority detection result indicates that the authorization of the terminal system is obtained, the user is The user is authorized, so the user information is read and displayed for the user.
- user information can be a history.
- the user information provided by the application in the terminal device is effectively controlled.
- the user information may be the historical record illustrated in the foregoing, or may be an account password or may be Other personal information, especially personal privacy information, is not exemplified here.
- the obtaining of the user information in the application is authorized by the terminal system where the application is located, and for the user who is not authorized by the terminal system, for example, only the terminal device is borrowed occasionally but not the terminal device.
- the user in the process of borrowing the terminal device of another person, cannot obtain the user information of the application run by the other party in the terminal device, so that the user information has high security and personal privacy is protected.
- the user information control method further includes: in the foreground running of the application, detecting, according to the configured time interval and the authorized user feature, whether the user operation under the time period is granted the user right, and generating the operation authority. Test results.
- the ongoing user rights detection controls the user information
- the configured time interval is used to control the ongoing user rights detection, that is, the user rights detection is performed once every time interval.
- the operation authority detection result generated according to the configured time interval corresponds to the time period.
- the user right detection performed is performed on the one hand according to the configured time interval, and on the other hand, based on the authorized user characteristics stored in the terminal system.
- the configured time interval controls the time point at which the user right detection is performed; the authorized user feature is used to control which user has the user right.
- the running application is activated and switched to the foreground, the application waits for the user to trigger the user operation, regardless of whether the current usage triggers the user operation, according to the configured time interval as the time period, and detects whether the current user is in the time period.
- User rights are provided to provide available operational permission detection results for subsequent user actions that may occur during this time period.
- the application runs in the foreground, once the time interval is reached, the user characteristics collected by the current user are acquired, and the user operation under the time period is determined according to the consistency judgment result between the user feature and the authorized user feature. User permissions to generate corresponding action permission detection results.
- the user feature collection at the current time point and the corresponding user authority judgment are performed, and the operation authority detection result is generated for the corresponding time period and the current user.
- the operation permission detection result is provided for the implementation of the user information control, so that the user operation trigger of the user in the current time period can obtain the operation permission detection result matched with it, and is the received user.
- the execution of the operation instruction that is, the execution of the triggered user operation, implements the control of the user information, and the user is no longer free to obtain the user information.
- the entire process of the application operation is continuously confirmed whether the user obtains the user authorization, so as to ensure that the entire process of the application operation can realize the timely and accurate perception of the user change, thereby ensuring the whole process of the application operation.
- the effectiveness of security controls without any loopholes.
- FIG. 3 is a diagram showing details of a step of generating an operation authority detection result according to a configured time interval and an authorized user feature detecting whether a user operation is granted a user right in a foreground operation of an application according to an exemplary embodiment.
- the step of generating the operation authority detection result includes at least:
- Step 401 Read the authorized user feature from the terminal system according to the configured time interval, and obtain the user feature collected in real time.
- Step 403 Align the authorized user feature with the collected user feature, and check whether the user operation triggered under the time period corresponding to the current time interval is granted the user right.
- Step 405 When there is an authorized user feature consistent with the user feature, the operation permission detection result that the user right is granted in the time period is generated.
- Step 407 When the authorized user feature does not match the user feature, the operation permission detection result that the guest authority is granted in the time period is generated.
- the user feature is collected on the one hand, and the authorized user feature stored in the terminal system is read on the other hand.
- the instant collection of the user features refers to the collection of user features immediately after the configured time interval is reached to ensure that the currently obtained user features correspond to the current user.
- the terminal system has the right to read the authorized user feature to the application or the implementation of the user information control.
- the authorized user feature can be read only for one user or several users, and is not performed here. limited.
- the user corresponding to the user feature has the user right; if the user feature does not match all the authorized user features, the user corresponding to the user feature does not Has user rights and only has guest permissions.
- the corresponding generated operation permission detection result is used to indicate whether the user has the user right or the guest right in the current time period.
- the user feature may be a face feature, a fingerprint feature, or other biometric features such as a voiceprint feature.
- the stored authorized user features are the same biometric type as the user features. Using biometrics as the user characteristics used for user information control will effectively reduce the input cost that is required, and can greatly improve efficiency.
- the leakage of personal privacy can be handled by the exemplary embodiment as described above, and can be different according to different time periods.
- the user controls the user information and is transparent and non-perceived to the user, and does not cause any hindrance to its use in the application. While ensuring security, it is not due to the security threshold. Raise and create any obstacles.
- the user features used may be the same type, or different types of user features may be combined and used as needed, and are not limited herein.
- the step 230 includes: obtaining a operation authority detection result corresponding to the time period according to a time period corresponding to the triggering by the user operation instruction.
- each time period experienced has a corresponding operation authority detection result.
- a user operation instruction is generated.
- the operation permission detection result corresponding to the time period of the user operation is obtained, so as to determine how to control the user operation instruction. Reading and display of related user information.
- step 250 is a flow chart depicting the details of step 250, illustrated in accordance with the corresponding embodiment of FIG. 2.
- the step 250 includes at least the following steps.
- Step 251 When the operation authority detection result indicates that the user authority is granted during the time period when the user operation instruction is triggered, the related user information is read according to the user operation instruction.
- Step 253 Display the user information related to the user operation instruction in the application.
- the time period in which the user operation instruction is located refers to the time period corresponding to when the corresponding user operation is triggered. During this period of time, if the operation permission detection result indicates that the user authority is available, the time period during which the user operation is triggered is granted the user right, that is, the current user has the user authority, and can read and display the user information.
- the operation authority detection result also indicates that the current corresponding time period is specifically granted the authority of another user, that is, which authorized user corresponds to, and the user information reading and display performed thereby will also be performed for the authorized user, that is, Only the user information corresponding to this authorized user is read and displayed. Under the effect of the operation authority detection result, the user information of each authorized user is further controlled, and the user information of an authorized user will not be disclosed to other authorized users, thereby ensuring personal privacy.
- the account password of the corresponding authorized user is read, and the account password in the login page is automatically filled, Realize the reading and display of user information such as account password.
- the history record or the favorite record read display performed by the browser application whether the read display is performed according to the detected operation authority detection result, and reading which user is stored in the application is also read. History or collection history.
- step 250 further includes rejecting the reading and displaying of the user information related to the user operation in the application when the operation authority detection result indicates that the guest authority is granted during the time period when the operation instruction is triggered.
- the referent authority refers to the temporary permission that is not authorized in the application and is configured in the application. For the user who is granted the guest right, the user information stored in the application belongs to the authorized user, and is not opened to the user who is granted the guest permission under the control of the operation authority detection result. Therefore, the user who is granted the guest authority, the user information reading and display related to the user operation instruction will be rejected.
- the application will not update the corresponding user information for the user who is granted the guest permission, thereby saving the resources required for the application to run, and the targeted Implement the running and storage of the application.
- FIG. 5 is a flowchart of a user information control method according to another exemplary embodiment.
- a user information control method after step 250, as shown in FIG. 5, at least further includes: step 510, according to a time period during which a user operation instruction is triggered, and a jumped entry In the time period, the permission switching between the user right and the guest right is perceived by the corresponding operation permission detection result.
- step 530 the corresponding control of reading and displaying the user information is switched according to the perceived authority.
- the control program for implementing the user information in the terminal device can also be used to implement the user information control function in the application, for example, in the form of a plug-in, and by means of the terminal system. Open, authorized user feature read access for lightweight security control.
- the user information read display and update between the authorized users can be controlled, and the user information stored in the application for each authorized user can be A certain type of user information sharing is performed to flexibly share the required user information under the premise of ensuring security, thereby enhancing the convenience of the authorized user to use the application.
- the user information of a single or a specified number of authorized users may be opened, so that other authorized users can view the open user information. Therefore, for the application, the user portrait information can be generated based on the user information owned by the authorized users, and the user portrait information can be generated based on the shared user information, and the user portrait can be controlled to be constructed, and the targeted user is authorized. Implement personalized recommendations.
- FIG. 6 is a block diagram of a user information control apparatus shown in an exemplary embodiment.
- the user information control device includes but is not limited to: an instruction receiving module 710, an authority control module 730, and an information control module 750.
- the instruction receiving module 710 is configured to receive a triggered user operation instruction in the running application, where the user instruction is related to user information stored by the application.
- the permission control module 730 is configured to obtain, for the user operation instruction, an operation authority detection result corresponding to the authorized user feature.
- the information control module 750 is configured to perform reading and displaying of user information related to the user operation instruction in the application according to the operation authority detection result.
- the instruction receiving module 710 is further configured to: in an application running in the terminal system and activated to the foreground, receive a corresponding user operation instruction generated by a user operation trigger.
- the user information control device further includes a detection module.
- the detecting module is configured to generate an operation authority detection result according to the configured time interval and the authorized user feature to detect whether the user operation is granted the user right according to the configured time interval and the authorized user feature.
- FIG. 7 is a block diagram depicting details of a detection module, according to an exemplary embodiment.
- the detecting module 800 includes at least an obtaining unit 801, a comparing unit 803, and a result generating unit 805.
- the obtaining unit 801 is configured to read the authorized user feature from the terminal system according to the configured time interval, and obtain the user feature collected in real time.
- the comparing unit 803 is configured to compare the authorized user feature with the collected user feature, and detect whether the user operation triggered in the time period corresponding to the current time interval is granted the user right.
- the result generating unit 805 is configured to generate an operation authority detection result that the user right is granted in the time period when there is an authorized user feature that is consistent with the user feature.
- the result generating unit 805 is configured to generate an operation authority detection result that the user right is granted in the time period when there is an authorized user feature that is consistent with the user feature.
- the privilege control module 730 is further configured to acquire an operation authority detection result corresponding to the time period according to a time period corresponding to when the user operation instruction is triggered.
- FIG. 8 is a block diagram depicting details of an information control module, shown in accordance with the corresponding embodiment of Figure 6.
- the information control module 750 includes at least a reading unit 751 and a display unit 753.
- the reading unit 751 is configured to read related user information according to the user operation instruction when the operation authority detection result indicates that the user authority is granted during the time period when the user operation instruction is triggered.
- the display unit 753 is configured to perform display of user information related to the user operation instruction in the application.
- the information control module 750 further includes: rejecting the execution unit.
- the reject execution unit is configured to reject the reading and displaying of the user information related to the user operation in the application when the operation authority detection result indicates that the user right is granted during the time period when the user operation instruction is triggered.
- FIG. 9 is a block diagram depicting details of a user information control apparatus, according to another exemplary embodiment.
- the user information control device as shown in FIG. 9, further includes: a handover sensing module 910 and a handover control module 930.
- the switch perception module 910 is configured to perceive, according to the time period when the user operation instruction is triggered, and the time period that the jump is entered, the permission switching between the user right and the guest right is perceived by the corresponding operation permission detection result.
- the switching control module 930 is configured to switch the corresponding control of reading and displaying the user information according to the perceived authority.
- FIG. 10 is a schematic diagram of an apparatus, according to an exemplary embodiment.
- Device 1000 can be the smart device described above.
- apparatus 1000 can include one or more of the following components: processing component 1002, memory 1004, power component 1006, multimedia component 1008, audio component 1010, sensor component 1014, and communication component 1016.
- Processing component 1002 typically controls the overall operation of device 1000, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations, and the like. Processing component 1002 can include one or more processors 1018 to execute instructions to perform all or part of the steps of the methods described below. Moreover, processing component 1002 can include one or more modules for facilitating interaction between component 1002 and other components. For example, the processing component 1002 can include a multimedia module for facilitating interaction between the multimedia component 1008 and the processing component 1002.
- the memory 1004 is configured to store various types of data to support operation at the device 1000. Examples of such data include instructions for any application or method operating on device 1000.
- the memory 1004 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as SRAM (Static Random Access Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), EPROM (Erasable) Programmable Read Only Memory), PROM (Programmable Red-Only Memory), ROM (Read-Only Memory), magnetic memory, flash memory, magnetic disk or optical disk. Also stored in memory 1004 is one or more modules for the one or more modules to be configured to be executed by the one or more processors 1018 to perform all or part of the steps in the method shown below.
- Power component 1006 provides power to various components of device 1000. Power component 1006 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1000.
- the multimedia component 1008 includes a screen between the device 1000 and a user that provides an output interface.
- the screen can include an LCD (Liquid Crystal Display) and touch panel. If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the screen may also include an OLED (Organic Light Emitting Display).
- the audio component 1010 is configured to output and/or input an audio signal.
- the audio component 1010 includes a microphone that is configured to receive an external audio signal when the device 1000 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
- the received audio signal may be further stored in memory 1004 or transmitted via communication component 1016.
- the audio component 1010 also includes a speaker for outputting an audio signal.
- Sensor assembly 1014 includes one or more sensors for providing device 1000 with various aspects of state assessment. For example, sensor assembly 1014 can detect an open/closed state of device 1000, relative positioning of components, and sensor assembly 1014 can also detect changes in position of one component of device 1000 or device 1000 and temperature changes of device 1000.
- the sensor assembly 1014 can also include a magnetic sensor, a pressure sensor, or a temperature sensor.
- Communication component 1016 is configured to facilitate wired or wireless communication between device 1000 and other devices.
- the device 1000 can access a wireless network based on a communication standard, such as WiFi (Wireless-Fidelity).
- communication component 1016 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
- the communication component 1016 further includes NFC (Near Field) Communication) module to facilitate short-range communication.
- the NFC module can be based on Radio Frequency Identification technology, Infrared Data Association technology, Ultra Wideband technology, Bluetooth technology and other technologies to achieve.
- device 1000 may be implemented by one or more application specific integrated circuits (Application) Specific Integrated Circuit), digital signal processor, digital signal processing device, programmable logic device, field programmable gate array, controller, microcontroller, microprocessor or other electronic component implementation for performing the above method.
- Application Application Specific integrated circuits
- digital signal processor digital signal processing device
- programmable logic device programmable logic device
- field programmable gate array controller
- microcontroller microprocessor or other electronic component implementation for performing the above method.
- the present invention also provides a terminal device, the terminal device comprising:
- a memory having stored thereon computer readable instructions that, when executed by the processor, implement a user information control method as previously described.
- the present invention also provides a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements a user information control method as previously described.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Disclosed are a user information control method and apparatus, and a terminal device and a computer-readable storage medium. The method comprises: receiving a user operation instruction triggered in an operated application, wherein the user operation instruction relates to user information stored in the application; acquiring, for the user operation instruction, an operation permission detection result corresponding to an authorized user feature in a time period; and according to the operation permission detection result, executing reading and display of the user information related to the user operation instruction in the application. An operation permission detection result corresponds to a time period in which the result is located, and is obtained by an authorized user feature, then, an operation permission of a user in an operated application is mapped, subsequently, the executed reading and display of relevant user information is controlled by the operation permission detection result in the current time period, so that if the user does not have an operation permission in the current time period, the reading and display, which are carried out at present, of the user information are necessarily restricted, the user information controllability is effectively improved, and individual privacy is feasibly protected for the user
Description
本申请要求2018年4月9日递交、发明名称为“用户信息控制方法、装置和终端设备”的中国专利申请CN201810313089.5的优先权,在此通过引用将其全部内容合并于此。The present application claims priority to Chinese Patent Application No. CN201810313089.5, filed on Apr.
本发明涉及计算机应用技术领域,特别涉及一种用户信息控制方法、装置、终端设备及计算机可读存储介质。The present invention relates to the field of computer application technologies, and in particular, to a user information control method, apparatus, terminal device, and computer readable storage medium.
随着计算机以及互联网的发展,智能手机等终端已成为人们日常工作和生活的重要部分,人们使用自身携带的终端设备,或者他人所携带的终端设备触发应用中的各种操作,进而实现应用中的功能。所触发的操作往往与应用中的用户信息相关。例如,往往会随之而进行着用户信息的使用,并且随着操作的进行,应用中也相应进行着所触发操作的记录,以形成对应于所触发操作的用户信息,因此,也将引发用户信息的更新。With the development of computers and the Internet, terminals such as smart phones have become an important part of people's daily work and life. People use their own terminal devices, or terminal devices carried by others to trigger various operations in the application, thereby realizing the application. The function. The actions triggered are often related to user information in the app. For example, the use of user information is often followed, and as the operation progresses, the application also performs a record of the triggered operation to form user information corresponding to the triggered operation, and thus, the user will also be triggered. Update of information.
用户信息记录了人们在应用中触发的操作行为,甚至于人们在应用中使用中账号密码等多种个人隐私信息。用户信息作为个人隐私信息的集合,必然应当仅限于产生此用户信息的使用者,而在终端设备的使用者发生变换之时,往往不同使用者所对应的用户信息被混杂在一起,而并无法针对于不同使用者对相应用户信息执行有效管控。即便应用中配置了账户体系,且针对于所配置的账户体系进行着用户信息的管控。使用者通过所输入的账号密码获得操作相应用户信息的权限。一终端设备的应用运行中,针对于所输入的一账号密码,多个使用者所触发的操作是针对于此账号密码对应用户信息,而并无法感知所发生的使用者变换。The user information records the behaviors that people trigger in the application, and even the personal privacy information such as the account password used by people in the application. User information as a collection of personal privacy information must be limited to the user who generated the user information. When the user of the terminal device changes, the user information corresponding to different users is often mixed together, and cannot be Effective control of the corresponding user information for different users. Even if the account system is configured in the application, the user information is controlled for the configured account system. The user obtains the authority to operate the corresponding user information through the entered account password. In the application operation of a terminal device, for an input account password, the operation triggered by multiple users is for the account information corresponding to the account password, and the user change cannot be perceived.
发明人意识到,对于一使用者至另一使用者的变换而言,应用中,通过触发操作而在应用中使用的用户信息,都是针对于当前所输入的账户密码,两位使用者之间共用相同的用户信息,无法准确有效的针对于使用者进行用户信息管控。亟待解决用户信息可控性低,无法为使用者切实保护个人隐私的缺陷。The inventor realizes that for a user to another user, in the application, the user information used in the application by the triggering operation is for the currently entered account password, two users. Sharing the same user information, it is impossible to accurately and effectively control the user information for the user. The user information needs to be solved with low controllability and cannot effectively protect the user's privacy defects.
为了解决相关技术中存在的用户信息可控性低,无法为使用者切实保护个人隐私的技术问题,本发明提供了一种用户信息控制方法、装置、终端设备及计算机可读存储介质。In order to solve the technical problem that the user information in the related art has low controllability and cannot protect the privacy of the user, the present invention provides a user information control method, apparatus, terminal device and computer readable storage medium.
一种用户信息控制方法,所述方法包括:A user information control method, the method comprising:
接收所运行应用中被触发的用户操作指令,所述用户操作指令与所述应用存储的用户信息相关;Receiving a triggered user operation instruction in the running application, the user operation instruction being related to user information stored by the application;
为所述用户操作指令获取所在时间段下对应于授权用户特征的操作权限检测结果;Obtaining an operation authority detection result corresponding to the authorized user feature in the time period for the user operation instruction;
根据所述操作权限检测结果,执行所述应用中所述用户操作指令所相关用户信息的读取和显示。And reading and displaying the user information related to the user operation instruction in the application according to the operation authority detection result.
一种用户信息控制装置,所述装置包括:A user information control device, the device comprising:
指令接收模块,用于接收所运行应用中被触发的用户操作指令,所述用户指令与所述应用存储的用户信息相关;An instruction receiving module, configured to receive a triggered user operation instruction in the running application, where the user instruction is related to user information stored by the application;
权限控制模块,用于为所述用户操作指令获取对应于授权用户特征的操作权限检测结果;a permission control module, configured to acquire an operation authority detection result corresponding to the authorized user feature for the user operation instruction;
信息控制模块,用于根据所述操作权限检测结果,执行所述应用中所述用户操作指令所相关用户信息的读取和显示。And an information control module, configured to perform reading and displaying of user information related to the user operation instruction in the application according to the operation authority detection result.
一种终端设备,所述终端设备包括:A terminal device, the terminal device comprising:
处理器;processor;
存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,实现如前所述的用户信息控制方法。A memory having stored thereon computer readable instructions that, when executed by the processor, implement a user information control method as previously described.
一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时,实现如前所示的用户信息控制方法。A computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements a user information control method as previously described.
本发明的实施例提供的技术方案可以包括以下有益效果:The technical solutions provided by the embodiments of the present invention may include the following beneficial effects:
针对于终端设备所运行应用的一使用者,所运行应用被触发的用户指令,此用户指令与应用存储的用户信息相关,此时,将为用户操作指令获取所在时间段下对应于授权用户特征的操作权限检测结果,最后便能够根据操作权限检测结果执行应用中用户操作指令所相关用户信息的读取和显示,实现了用户信息基于操作权限检测结果的管控,这一操作权限检测结果对应于所在时间段,且由授权用户特征获得,使得操作权限检测结果指示所在时间段下使用者在终端系统的用户权限,进而映射了使用者在所运行应用中的操作权限,随后所执行的相关用户信息读取和显示受控于当前时间段下的操作权限检测结果,导致了如果使用者在当前时间段下并不具备操作权限,则必然造成当前所进行的用户信息读取和显示受限,因此,将有效提高了用户信息可控性,具备非常高的用户信息可控性,能够为使用者切实保护个人隐私。由此,基于所在终端系统的授权,得以实现使用者之间的区别处理,也用户信息实现了使用者之间的隔离,进而以此来消除用户信息所携带个人隐私的暴露危险。For a user running the application of the terminal device, the user instruction that is triggered by the running application, the user instruction is related to the user information stored by the application, and at this time, the user operation instruction is acquired to correspond to the authorized user feature during the time period. The operation permission detection result is finally able to execute the reading and displaying of the user information related to the user operation instruction in the application according to the operation authority detection result, thereby realizing the management and control of the user information based on the operation authority detection result, and the operation authority detection result corresponds to The time period is obtained by the authorized user feature, so that the operation permission detection result indicates the user authority of the user in the terminal system in the time period, and then the operation authority of the user in the running application is mapped, and then the related user is executed. The information reading and display are controlled by the operation permission detection result in the current time period, so that if the user does not have the operation authority in the current time period, the current user information reading and display limitation is inevitably caused. Therefore, it will effectively improve the controllability of user information, Very high controllability of user information, the user can ensure the protection of personal privacy. Thereby, based on the authorization of the terminal system, the difference processing between the users can be realized, and the user information realizes the isolation between the users, thereby eliminating the danger of exposure of the personal privacy carried by the user information.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性的,并不能限制本发明。The above general description and the following detailed description are merely exemplary and are not intended to limit the invention.
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并于说明书一起用于解释本发明的原理。The accompanying drawings, which are incorporated in and constitute in FIG
图1是根据一示例性实施例示出的本发明所涉及的实施环境的示意简图。1 is a schematic diagram of an implementation environment in accordance with the present invention, shown in accordance with an exemplary embodiment.
图2是根据一示例性实施例示出的一种用户信息控制方法的流程图。FIG. 2 is a flowchart of a method for controlling user information according to an exemplary embodiment.
图3是根据一示例性实施例示出的对在应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果步骤的细节进行描述的流程图。FIG. 3 is a diagram showing details of a step of generating an operation authority detection result according to a configured time interval and an authorized user feature detecting whether a user operation is granted a user right in a foreground operation of an application according to an exemplary embodiment. A flow chart describing the description.
图4是根据图2对应实施例示出的对步骤250的细节进行描述的流程图。4 is a flow chart depicting the details of step 250, illustrated in accordance with the corresponding embodiment of FIG. 2.
图5是根据另一示例性实施例示出的一种用户信息控制方法的流程图。FIG. 5 is a flowchart of a user information control method according to another exemplary embodiment.
图6是一示例性实施例示出的一种用户信息控制装置的框图。FIG. 6 is a block diagram of a user information control apparatus shown in an exemplary embodiment.
图7是根据一示例性实施例示出的对检测模块的细节进行描述的框图。FIG. 7 is a block diagram depicting details of a detection module, according to an exemplary embodiment.
图8是根据图6对应实施例示出的对信息控制模块的细节进行描述的框图。Figure 8 is a block diagram depicting details of an information control module, shown in accordance with the corresponding embodiment of Figure 6.
图9是根据另一示例性实施例示出的对一种用户信息控制装置的细节进行描述的框图。FIG. 9 is a block diagram depicting details of a user information control apparatus, according to another exemplary embodiment.
图10是根据一示例性实施例示出的一种装置的示意图。FIG. 10 is a schematic diagram of an apparatus, according to an exemplary embodiment.
这里将详细对示例性实施例进行说明。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。The exemplary embodiments will be described in detail herein. The following description refers to the same or similar elements in the different figures unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Instead, they are merely examples of devices and methods consistent with aspects of the invention as detailed in the appended claims.
图1是根据一示例性实施例示出的本发明所涉及的实施环境的示意简图。在一个示例性实施例中,本发明所实现的用户信息控制,将支持各应用针对于各使用者而进行的用户信息控制,在应用所进行的用户信息所相关操作响应中,避免其他使用者的用户信息暴露向当前使用者暴露,而仅向当前使用者授予其自身所产生或者赋予的用户信息。1 is a schematic diagram of an implementation environment in accordance with the present invention, shown in accordance with an exemplary embodiment. In an exemplary embodiment, the user information control implemented by the present invention supports the user information control performed by each application for each user, and avoids other users in the operation response related to the user information performed by the application. The user information disclosure is exposed to the current user, and only the current user is granted user information generated or given by himself.
具体而言,如图1所示的,终端设备110原本是由使用者B持有,且对所运行的应用触发各种操作,以达成自身的应用使用需求。随着终端设备110的使用者由使用者B变换为使用者A,例如,使用者A和使用者B在同一场所,且终端设备110交由使用者A使用,则所运行的应用也将是在使用者A的操控下执行所触发的各种操作,包括应用中用户信息所相关的操作。Specifically, as shown in FIG. 1, the terminal device 110 is originally held by the user B, and triggers various operations on the executed application to achieve its own application use requirements. As the user of the terminal device 110 is changed from the user B to the user A, for example, the user A and the user B are in the same place, and the terminal device 110 is used by the user A, the running application will also be The various operations triggered are performed under the control of the user A, including the operations related to the user information in the application.
此时,对于现有技术的实现而言,无论对于使用者A还是使用者B,终端设备所运行应用中呈现的用户信息是无差别的,进而所能够使用的用户信息也将是无差别的。而在本发明所涉及实施例的支持下,将使得终端设备所运行应用中,用户信息所相关操作的执行,是感知到了使用者B向使用者A的转换的,也就是说,将根据在当前时间段下对应于授权用户特征的操作权限检测结果,执行使用者A触发的操作,以此来保证操作向用户信息的执行仅限终端系统授权用户,而屏蔽了终端系统非授权用户对用户信息的操作。由此,将增强终端系统所存在个人隐私的安全性,即便多个使用者轮流使用同一终端设备也不会出现各自用户信息向他人泄露的局限性。本发明所实现的用户信息控制,将是运行于终端设备110中应用的辅助工具,因此,一方面,其可作用终端设备110所运行应用的辅助工具,另一方面也可以是终端设备110所运行应用的功能,无论是以何种方式实现,都是运行于终端设备110中的程序。At this time, for the implementation of the prior art, regardless of the user A or the user B, the user information presented in the application run by the terminal device is indistinguishable, and the user information that can be used is also indistinguishable. . With the support of the embodiment of the present invention, the execution of the operation related to the user information in the application run by the terminal device is that the user B is converted to the user A, that is, according to the The operation permission detection result corresponding to the authorized user feature in the current time period is performed, and the operation triggered by the user A is performed, so as to ensure that the execution of the operation to the user information is limited to the authorized user of the terminal system, and the unauthorized user of the terminal system is shielded from the user. The operation of the information. Thereby, the security of the personal privacy of the terminal system will be enhanced, and even if a plurality of users use the same terminal device in turn, there is no limitation that the respective user information is leaked to others. The user information control implemented by the present invention will be an auxiliary tool running in the application of the terminal device 110. Therefore, on the one hand, it can act as an auxiliary tool for the application running by the terminal device 110, and on the other hand, it can also be the terminal device 110. The function of running the application, regardless of the manner in which it is implemented, is a program running in the terminal device 110.
图2是根据一示例性实施例示出的一种用户信息控制方法的流程图。该用户信息控制方法,在一个示例性实施例中,运行于图1所示实施例的终端设备。如图2所示,该用户信息控制方法,至少包括以下步骤。FIG. 2 is a flowchart of a method for controlling user information according to an exemplary embodiment. The user information control method, in an exemplary embodiment, operates on the terminal device of the embodiment shown in FIG. 1. As shown in FIG. 2, the user information control method includes at least the following steps.
步骤210,接收所运行应用中被触发的用户操作指令,用户操作指令与应用存储的用户信息相关。Step 210: Receive a triggered user operation instruction in the running application, where the user operation instruction is related to the user information stored by the application.
其中,所指的应用是终端设备所运行的,且为所实现的功能存储着用户信息的应用。例如,该应用可以是浏览器应用、单词记忆应用(背单词应用)以及课程订阅应用等的任意一种。随着终端设备中应用的运行,应用被触发用户操作,进而由此而生成用户操作指令。对于应用中用户信息控制的实现而言,将相应接收到用户操作指令,用户操作指令指示了应用中被使用者触发的操作,用户操作指令的执行将引必须所对应用户信息的变化,例如,所对应用户信息的被读取、更新等。The application referred to is an application that is operated by the terminal device and stores user information for the implemented function. For example, the application may be any of a browser application, a word memory application (back word application), and a course subscription application. As the application in the terminal device runs, the application is triggered to operate the user, thereby generating a user operation instruction. For the implementation of the user information control in the application, the user operation instruction is received correspondingly, and the user operation instruction indicates the operation triggered by the user in the application, and the execution of the user operation instruction will change the corresponding user information, for example, The corresponding user information is read, updated, and the like.
使用者,是当前持有终端设备且在所运行应用中触发操作的用户,当然,至此应当说明的是,所指的用户,一方面可以是终端系统中的授权用户,另一方面也可以是终端系统中的访客用户,在此不进行限定。The user is the user who currently holds the terminal device and triggers the operation in the running application. Of course, it should be noted that the user referred to may be an authorized user in the terminal system on the one hand, or may be Guest users in the terminal system are not limited here.
例如,对于浏览器应用而言,所被触发的用户操作指令,即由访问互联网络的各自操作生成,比如,对某一网络链接的点击跳转操作,由此将跳转进入此网络链接所对应网页页面的过程,此网络链接的点击跳转操作即为用户操作指令,浏览器应用将记录此网络链接的点击跳转操作,生成相应历史记录,这一历史记录即为使用者在应用中的用户信息。一使用者在应用中触发的用户操作指令,是与自身在应用中的用户信息相关的,因此,也将通过下述过程的实现,而使得用户操作指令能够在自身的应用信息中响应,至此,一方面保证使用者的一致性,另一方面也将保证了用户信息有序性和可控性。For example, for a browser application, the triggered user operation instructions are generated by respective operations of accessing the internetwork, such as a click jump operation on a certain network link, thereby jumping into the network link. Corresponding to the process of the webpage page, the click jump operation of the web link is a user operation instruction, and the browser application records the click jump operation of the web link to generate a corresponding history record, and the history record is the user in the application. User information. A user operation instruction triggered by a user in an application is related to user information in the application, and therefore, the user operation instruction can be responded to in the application information by implementing the following process. On the one hand, it ensures the consistency of users, on the other hand, it will ensure the order and controllability of user information.
在一个示例性实施例中,步骤210包括:所在终端系统中运行且激活至前台的应用中,接收被用户操作触发生成的相应用户操作指令。In an exemplary embodiment, step 210 includes receiving, in an application running in the terminal system and activated to the foreground, a corresponding user operation instruction generated by a user operation trigger.
其中,应用运行被切换至前台时,使用者即可在所显示的界面触发用户操作,此时,相应生成用户操作指令,对于为应用实现用户信息控制的进程或者线程而言,将接收到所生成的用户操作指令。Wherein, when the application operation is switched to the foreground, the user can trigger the user operation on the displayed interface. At this time, the user operation instruction is generated correspondingly, and the process or thread that implements the user information control for the application receives the user. Generated user action instructions.
步骤230,为用户操作指令获取所在时间段下对应于授权用户特征的操作权限检测结果。Step 230: Acquire an operation authority detection result corresponding to the authorized user feature in the time period for the user operation instruction.
其中,系统授权是针对于所在终端系统而言的,在终端系统中获得授权的用户,即授权用户,是获得了系统授权的。反之,在终端系统中未获得授权的用户,则是访客用户。The system authorization is for the terminal system, and the authorized user in the terminal system, that is, the authorized user, is authorized by the system. Conversely, a user who is not authorized in the terminal system is a guest user.
操作权限检测结果,用于指示当前使用者在终端设备所运行应用中是否能够执行用户操作指令所对应的用户操作。操作权限检测结果有自身所对应的有效期,此有效期为一时间段。换而言之,在应用的运行过程中,每一时间段都有着相应的操作权限检测结果,但超出所在时间段之后此操作权限检测结果便失效;而超出所在时间段之后所进入的下一时间段,也随着是否被授予用户权限检测的进行而获得所进入时间段的操作权限检测结果。The operation permission detection result is used to indicate whether the current user can perform the user operation corresponding to the user operation instruction in the application run by the terminal device. The operation permission detection result has its own validity period, and the validity period is a period of time. In other words, during the running of the application, each time period has a corresponding operation permission detection result, but after the time period is exceeded, the operation permission detection result is invalid; and after the time period is exceeded, the next entry is entered. The time period also obtains the operation authority detection result of the entered time period as the user authority detection is performed.
操作权限检测结果是对应于所在终端系统授权的,即获得所在终端系统授权的使用者就是授权用户,就能够在所运行的应用中执行触发的操作。对应于所在终端系统授权的操作权限检测结果,是对所在时间段的使用者,根据终端系统所存储授权用户特征进行用户特征检测所获得的。不同时间段的操作权限检测结果可能相同,也可能存在着不同。应用的运行中,在接收到使用者触发生成的用户操作指令之后,便随之为此用户操作指令进行所在时间段的操作权限检测结果获取。所在时间段,是指触发生成用户操作指令的用户操作所在的时间段,以此来控制所触发用户操作对用户信息的读取甚至于更新。The operation permission detection result is authorized corresponding to the terminal system, that is, the user authorized by the terminal system is the authorized user, and the triggered operation can be performed in the running application. The operation permission detection result corresponding to the authorization of the terminal system is obtained by the user of the time period, and the user feature detection is performed according to the authorized user feature stored in the terminal system. The operation permission detection results of different time periods may be the same or different. During the running of the application, after receiving the user operation instruction generated by the user trigger, the operation permission detection result of the time period of the user operation instruction is acquired. The time period refers to the time period during which the user operation of generating the user operation instruction is triggered, thereby controlling the reading or even updating of the user information by the triggered user operation.
步骤250,根据操作权限检测结果,执行应用中用户操作指令所相关用户信息的读取和显示。Step 250: Perform reading and displaying of user information related to the user operation instruction in the application according to the operation authority detection result.
其中,在为用户操作指令获得了操作权限检测结果之后,对应于所获得的操作权限检测结果来执行用户信息的读取和显示。所读取和显示的用户信息包括了使用者在应用中存储的用户信息,用户信息的具体内容与所在的应用以及所触发生成的用户操作指令相关。具体的,在操作权限检测结果指示当前使用者获得所在终端系统授权时,即可在应用中执行对应于用户操作指令的用户信息读取和显示,以完成用户操作指令所对应用户操作的执行。Wherein, after the operation authority detection result is obtained for the user operation instruction, the reading and display of the user information is performed corresponding to the obtained operation authority detection result. The user information read and displayed includes user information stored by the user in the application, and the specific content of the user information is related to the application where the user is located and the user operation instruction triggered by the user. Specifically, when the operation permission detection result indicates that the current user obtains the authorization of the terminal system, the user information reading and displaying corresponding to the user operation instruction may be executed in the application to complete the execution of the user operation corresponding to the user operation instruction.
以浏览器应用为例,浏览器应用的使用者通过浏览器应用进行互联网络访问。为被触发的用户操作指令获得了当前所在时间段的操作权限检测结果之后,此操作权限检测结果是对应于使用者的,如果操作权限检测结果指示获得了所在终端系统授权,则说明使用者是授权用户,因此将为使用者进行用户信息的读取和显示。对于浏览器应用而言,用户信息可以是历史记录。Taking a browser application as an example, a user of a browser application accesses the Internet through a browser application. After the operation permission command of the current time period is obtained, the operation permission detection result is corresponding to the user. If the operation authority detection result indicates that the authorization of the terminal system is obtained, the user is The user is authorized, so the user information is read and displayed for the user. For browser applications, user information can be a history.
通过此示例性实施例,便为终端设备中应用所存在的用户信息提供了有效控制,用户信息,可以是前述所举例说明的历史记录,除此之外,也可以是账号密码,还可以是其它个人信息,特别是个人隐私信息,在此不一一举例。Through the exemplary embodiment, the user information provided by the application in the terminal device is effectively controlled. The user information may be the historical record illustrated in the foregoing, or may be an account password or may be Other personal information, especially personal privacy information, is not exemplified here.
通过此示例性实施例,将使得应用中用户信息的获得是应用所在终端系统授权进行的,对于并未获得所在终端系统授权的使用者,例如,仅仅偶尔借用终端设备而并非持有终端设备的使用者,在借用他人终端设备的过程中,并无法获得他人在终端设备所运行应用中的用户信息,使得用户信息具备高强度的安全性,个人隐私获得保护。Through this exemplary embodiment, the obtaining of the user information in the application is authorized by the terminal system where the application is located, and for the user who is not authorized by the terminal system, for example, only the terminal device is borrowed occasionally but not the terminal device. The user, in the process of borrowing the terminal device of another person, cannot obtain the user information of the application run by the other party in the terminal device, so that the user information has high security and personal privacy is protected.
在一个示例性实施例中,该用户信息控制方法,还包括:在应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果。In an exemplary embodiment, the user information control method further includes: in the foreground running of the application, detecting, according to the configured time interval and the authorized user feature, whether the user operation under the time period is granted the user right, and generating the operation authority. Test results.
其中,持续进行的用户权限检测对用户信息进行控制,所配置时间间隔用于控制持续进行的用户权限检测,即每一时间间隔都进行一次用户权限检测。通过所配置时间间隔在时间上的分隔,获得若干时间段,按照所配置时间间隔而生成的操作权限检测结果,便是所在时间段对应的。The ongoing user rights detection controls the user information, and the configured time interval is used to control the ongoing user rights detection, that is, the user rights detection is performed once every time interval. Through the separation of the configured time intervals in time, several time periods are obtained, and the operation authority detection result generated according to the configured time interval corresponds to the time period.
所进行的用户权限检测,一方面是按照所配置时间间隔进行的,另一方面,也是基于终端系统所存储的授权用户特征所进行的。所配置时间间隔,控制了用户权限检测执行的时间点;授权用户特征则用于控制哪一位使用者是具备用户权限。随着所运行应用被激活而切换至前台,此应用等待使用者触发用户操作,无论当前使用是否触发用户操作,都按照所配置时间间隔为所在时间段,检测当前使用者在这一时间段是否具备用户权限,以便于为随后在此时间段可能发生的用户操作提供可用的操作权限检测结果。The user right detection performed is performed on the one hand according to the configured time interval, and on the other hand, based on the authorized user characteristics stored in the terminal system. The configured time interval controls the time point at which the user right detection is performed; the authorized user feature is used to control which user has the user right. As the running application is activated and switched to the foreground, the application waits for the user to trigger the user operation, regardless of whether the current usage triggers the user operation, according to the configured time interval as the time period, and detects whether the current user is in the time period. User rights are provided to provide available operational permission detection results for subsequent user actions that may occur during this time period.
随着应用在前台的运行,一旦到达一时间间隔,便获取对当前使用者采集的用户特征,根据用户特征与授权用户特征之间的一致性判断结果确定所在时间段下的用户操作是否被授予用户权限,从而生成相应的操作权限检测结果。每一时间间隔的到达,都进行着当前时间点的用户特征采集以及相应的用户权限判断,进而为所对应时间段以及当前使用者生成操作权限检测结果。As the application runs in the foreground, once the time interval is reached, the user characteristics collected by the current user are acquired, and the user operation under the time period is determined according to the consistency judgment result between the user feature and the authorized user feature. User permissions to generate corresponding action permission detection results. At the arrival of each time interval, the user feature collection at the current time point and the corresponding user authority judgment are performed, and the operation authority detection result is generated for the corresponding time period and the current user.
通过此步骤的进行,将为用户信息控制的实现提供可用的操作权限检测结果,进而使得当前时间段下使用者的用户操作触发能够获得与之相配合的操作权限检测结果,为所接收的用户操作指令的执行,即所触发用户操作的执行实现用户信息的控制,对于使用者而言,将不再随意进行用户信息的获取。在所配置时间间隔的控制下,使得应用运行的全过程不断确认使用者是否获得用户授权,以保证应用运行的全过程能够实现使用者变化的及时准确感知,从而方能够保证应用运行的全过程中安全控制的有效性,而不存在任何漏洞。Through the implementation of this step, the operation permission detection result is provided for the implementation of the user information control, so that the user operation trigger of the user in the current time period can obtain the operation permission detection result matched with it, and is the received user. The execution of the operation instruction, that is, the execution of the triggered user operation, implements the control of the user information, and the user is no longer free to obtain the user information. Under the control of the configured time interval, the entire process of the application operation is continuously confirmed whether the user obtains the user authorization, so as to ensure that the entire process of the application operation can realize the timely and accurate perception of the user change, thereby ensuring the whole process of the application operation. The effectiveness of security controls without any loopholes.
图3是根据一示例性实施例示出的对在应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果步骤的细节进行描述的流程图。如图3所示的,在应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果步骤,至少包括:FIG. 3 is a diagram showing details of a step of generating an operation authority detection result according to a configured time interval and an authorized user feature detecting whether a user operation is granted a user right in a foreground operation of an application according to an exemplary embodiment. A flow chart describing the description. As shown in FIG. 3, in the foreground running of the application, according to the configured time interval and the authorized user feature, detecting whether the user operation is granted the user right during the time period, the step of generating the operation authority detection result includes at least:
步骤401,按照所配置时间间隔从所在终端系统读取授权用户特征,并获取即时采集的用户特征。Step 401: Read the authorized user feature from the terminal system according to the configured time interval, and obtain the user feature collected in real time.
步骤403,将授权用户特征与采集的用户特征进行比对,检测当前时间间隔对应的时间段下触发的用户操作是否被授予用户权限。Step 403: Align the authorized user feature with the collected user feature, and check whether the user operation triggered under the time period corresponding to the current time interval is granted the user right.
步骤405,存在与用户特征相一致的授权用户特征时,生成该时间段下用户权限被授予的操作权限检测结果。Step 405: When there is an authorized user feature consistent with the user feature, the operation permission detection result that the user right is granted in the time period is generated.
步骤407,授权用户特征与用户特征均不相一致时,生成该时间段下访客权限被授予的操作权限检测结果。Step 407: When the authorized user feature does not match the user feature, the operation permission detection result that the guest authority is granted in the time period is generated.
其中,应用的前台运行中,一旦到达指定的时间间隔,则一方面进行用户特征的采集,另一方面读取所在终端系统存储的授权用户特征。所指的用户特征即时采集,便是在到达所配置时间间隔之后立即进行用户特征的采集,以保证当前所获得的用户特征是对应于当前使用者的。所在终端系统向应用,或者用户信息控制的实现开放了读取授权用户特征的权限,所读取的授权用户特征,可以仅对应于一使用者,也可以对应于若干使用者,在此不进行限定。In the foreground operation of the application, once the specified time interval is reached, the user feature is collected on the one hand, and the authorized user feature stored in the terminal system is read on the other hand. The instant collection of the user features refers to the collection of user features immediately after the configured time interval is reached to ensure that the currently obtained user features correspond to the current user. The terminal system has the right to read the authorized user feature to the application or the implementation of the user information control. The authorized user feature can be read only for one user or several users, and is not performed here. limited.
如果用户特征是与一授权用户特征相一致的,则说明此用户特征对应的使用者是具备用户权限;如果用户特征与所有授权用户特征都不相一致,则说明此用户特征对应的使用者不具备用户权限,仅具备访客权限。所相应生成的操作权限检测结果便用于指示当前时间段下使用者是具备了用户权限,还是具备访客权限。If the user feature is consistent with an authorized user feature, the user corresponding to the user feature has the user right; if the user feature does not match all the authorized user features, the user corresponding to the user feature does not Has user rights and only has guest permissions. The corresponding generated operation permission detection result is used to indicate whether the user has the user right or the guest right in the current time period.
用户特征,可以是人脸特征,也可以是指纹特征,还可以是声纹特征等其它生物特征。所存储的授权用户特征,则是与用户特征对应于相同生物特征类型。以生物特征作为用户信息控制所使用的用户特征,将有效降低所需要耗费的输入成本,且能够极大的提高效率。The user feature may be a face feature, a fingerprint feature, or other biometric features such as a voiceprint feature. The stored authorized user features are the same biometric type as the user features. Using biometrics as the user characteristics used for user information control will effectively reduce the input cost that is required, and can greatly improve efficiency.
在此示例性实施例的作用下,即便在应用的运行过程中存在多人共用的情况,也能够通过如上所述的示例性实施例处理个人隐私的泄露问题,能够根据不同时间段下的不同使用者进行用户信息的控制,并且对于使用者而言都是透明无感知的,并不会对其在应用中的使用造成任何妨碍,在保障安全性的同时,也不会由于安全性门槛的提高而产生任何障碍。Under the action of this exemplary embodiment, even if there are multiple people sharing during the operation of the application, the leakage of personal privacy can be handled by the exemplary embodiment as described above, and can be different according to different time periods. The user controls the user information and is transparent and non-perceived to the user, and does not cause any hindrance to its use in the application. While ensuring security, it is not due to the security threshold. Raise and create any obstacles.
应当理解,在应用的启动阶段以及运行阶段,所使用的用户特征,可以始终是相同类型的,也可以是根据需要而组合使用不同类型的用户特征,在此不进行限定。It should be understood that, in the startup phase and the running phase of the application, the user features used may be the same type, or different types of user features may be combined and used as needed, and are not limited herein.
与之相对应的,在一个示例性实施例中,该步骤230包括:根据用户操作指令触发时对应的时间段,获取该时间段对应的操作权限检测结果。Correspondingly, in an exemplary embodiment, the step 230 includes: obtaining a operation authority detection result corresponding to the time period according to a time period corresponding to the triggering by the user operation instruction.
其中,如前所述的,随着应用在终端设备中的前台运行,所经历的每一时间段都有着对应的操作权限检测结果。随着前台运行的应用中用户操作的触发,生成了用户操作指令,对于这一用户操作指令,将获取用户操作所在时间段对应的操作权限检测结果,以便于确定如何控制这一用户操作指令所相关用户信息的读取和显示。As described above, as the application runs in the foreground of the terminal device, each time period experienced has a corresponding operation authority detection result. With the trigger of the user operation in the application running in the foreground, a user operation instruction is generated. For the user operation instruction, the operation permission detection result corresponding to the time period of the user operation is obtained, so as to determine how to control the user operation instruction. Reading and display of related user information.
图4是根据图2对应实施例示出的对步骤250的细节进行描述的流程图。在一个示例性实施例中,该步骤250,如图4所示,至少包括以下步骤。4 is a flow chart depicting the details of step 250, illustrated in accordance with the corresponding embodiment of FIG. 2. In an exemplary embodiment, the step 250, as shown in FIG. 4, includes at least the following steps.
步骤251,在操作权限检测结果指示触发用户操作指令所在时间段授予用户权限时,根据用户操作指令读取相关用户信息。Step 251: When the operation authority detection result indicates that the user authority is granted during the time period when the user operation instruction is triggered, the related user information is read according to the user operation instruction.
步骤253,进行应用中用户操作指令相关用户信息的显示。Step 253: Display the user information related to the user operation instruction in the application.
其中,用户操作指令所在时间段是指所对应用户操作被触发时对应的时间段。在此时间段下,如果操作权限检测结果指示具备用户权限,则说明触发用户操作所在时间段被授予了用户权限,即当前使用者是具备用户权限的,能够进行用户信息的读取和显示。操作权限检测结果还指示了当前所对应时间段具体授予了另一用户的权限,即对应于哪一授权用户,由此所进行的用户信息读取和显示也将针对于此授权用户进行,即仅读取这一授权用户所对应的用户信息,并显示。在操作权限检测结果的作用下,将进一步对各授权用户进行了用户信息的控制,对于一授权用户的用户信息,将不会向其他授权用户泄露,切实保障个人隐私。The time period in which the user operation instruction is located refers to the time period corresponding to when the corresponding user operation is triggered. During this period of time, if the operation permission detection result indicates that the user authority is available, the time period during which the user operation is triggered is granted the user right, that is, the current user has the user authority, and can read and display the user information. The operation authority detection result also indicates that the current corresponding time period is specifically granted the authority of another user, that is, which authorized user corresponds to, and the user information reading and display performed thereby will also be performed for the authorized user, that is, Only the user information corresponding to this authorized user is read and displayed. Under the effect of the operation authority detection result, the user information of each authorized user is further controlled, and the user information of an authorized user will not be disclosed to other authorized users, thereby ensuring personal privacy.
例如,在一应用所进行的登录页面跳转中,根据所检测的操作权限检测结果,将得以读取所对应授权用户的账号密码读取,且自动进行登录页面中账号密码的自动填充,以实现账号密码这一类用户信息的读取和显示。又例如,在浏览器应用所进行的历史记录或者收藏记录读取显示中,也将根据所检测的操作权限检测结果确定是否进行读取显示,以及读取显示哪一使用者在应用中存储的历史记录或者收藏记录。For example, in the login page jump performed by an application, according to the detected operation permission detection result, the account password of the corresponding authorized user is read, and the account password in the login page is automatically filled, Realize the reading and display of user information such as account password. For another example, in the history record or the favorite record read display performed by the browser application, whether the read display is performed according to the detected operation authority detection result, and reading which user is stored in the application is also read. History or collection history.
在一示例性实施例中,步骤250还包括:在操作权限检测结果指示触发操作指令所在时间段授予访客权限时,拒绝应用中用户操作所相关用户信息的读取和显示。In an exemplary embodiment, step 250 further includes rejecting the reading and displaying of the user information related to the user operation in the application when the operation authority detection result indicates that the guest authority is granted during the time period when the operation instruction is triggered.
其中,所指的访客权限,是指应用中并未获得授权,是应用中配置的临时权限。对于被授予访客权限的使用者,应用中存储的用户信息是归属于授权用户的,而在操作权限检测结果的控制下不会向被授予访客权限的使用者开放。故,被授予访客权限的使用者,其用户操作指令所相关的用户信息读取和显示将被拒绝执行。The referent authority refers to the temporary permission that is not authorized in the application and is configured in the application. For the user who is granted the guest right, the user information stored in the application belongs to the authorized user, and is not opened to the user who is granted the guest permission under the control of the operation authority detection result. Therefore, the user who is granted the guest authority, the user information reading and display related to the user operation instruction will be rejected.
与之相对应的,在一示例性实施例中,应用中也将不会针对被授予访客权限的使用者更新相应用户信息,以此来节省应用运行所需要耗费的资源中,有针对性的实现应用的运行和存储。Correspondingly, in an exemplary embodiment, the application will not update the corresponding user information for the user who is granted the guest permission, thereby saving the resources required for the application to run, and the targeted Implement the running and storage of the application.
图5是根据另一示例性实施例示出的一种用户信息控制方法的流程图。在另一示例性实施例中,一种用户信息控制方法,在步骤250之后,如图5所示的,至少还包括:步骤510,根据触发用户操作指令所在时间段,以及所跳转进入的时间段,由分别对应的操作权限检测结果感知得到用户权限和访客权限之间的权限切换。FIG. 5 is a flowchart of a user information control method according to another exemplary embodiment. In another exemplary embodiment, a user information control method, after step 250, as shown in FIG. 5, at least further includes: step 510, according to a time period during which a user operation instruction is triggered, and a jumped entry In the time period, the permission switching between the user right and the guest right is perceived by the corresponding operation permission detection result.
步骤530,根据感知的权限切换相应进行用户信息读取和显示的控制。In step 530, the corresponding control of reading and displaying the user information is switched according to the perceived authority.
如前所述的,在应用运行的全过程都为顺次跳转进入的时间段进行着是否获得系统授权的权限检测,一方面由此而确认所在时间段是否被授予用户权限,另一方面也由此而及时准确的感知所发生的使用者变换。应当理解,不同使用者之间,可能都拥有着用户权限,也可能分别对应于用户权限和访客权限。因此,所运行的应用在不同使用者之间的切换,往往存在着用户权限向访客权限的切换,或者访客权限向用户权限的切换,甚至于一授权用户向另一授权用户的切换。在由一时间段进入另一时间段时,根据操作权限检测结果来感知得到所发生的权限切换,甚至于授权用户之间的切换,由此来按照所感知的切换来执行用户信息的读取和显示,由此,来实现用户信息的精细化控制。应当理解,通过如上所述的用户信息控制,将使得授权用户所相关的所有用户信息,例如记录了其操作行为以及账号密码的信息,获得有效管控,在应用的运行中始终处于安全可控的状态。As mentioned above, in the whole process of the application running, whether the authorization of the system authorization is obtained for the time period of the sequential jump entry, on the one hand, it is confirmed whether the user time is granted during the time period, on the other hand, It is thus timely and accurate to perceive the user transformation that occurs. It should be understood that different users may have user rights, and may correspond to user rights and guest rights, respectively. Therefore, the switching of the running application between different users often involves the switching of user rights to the guest rights, or the switching of the guest rights to the user rights, and even the switching of an authorized user to another authorized user. When entering another time period from a time period, the generated authority switching is perceived according to the operation authority detection result, even the switching between the authorized users, thereby performing the reading of the user information according to the perceived switching. And display, thereby, to achieve fine control of user information. It should be understood that through the user information control as described above, all user information related to the authorized user, such as information recording its operation behavior and account password, is effectively controlled, and is always safe and controllable in the operation of the application. status.
如上所述的示例性实施例,将用于实现终端设备中用户信息的控制程序,也可用于实现应用中的用户信息控制功能,例如,以插件形式存在于应用中,并借助于终端系统所开放的授权用户特征读取权限而实现轻量级的安全控制。The control program for implementing the user information in the terminal device can also be used to implement the user information control function in the application, for example, in the form of a plug-in, and by means of the terminal system. Open, authorized user feature read access for lightweight security control.
如前所述的示例性实施例中,也在操作权限检测结果的控制下,得以控制各授权用户之间的用户信息读取显示以及更新,对于各授权用户在应用中存储的用户信息,可进行某一类别的用户信息共享,以在保证安全性的前提下也能够灵活共享所需要的用户信息,增强授权用户使用应用的便利性。此外,也可将单一或者指定某几个授权用户的用户信息开放权限,以使得其他授权用户能够查看开放的用户信息。由此,对于应用而言,能够基于授权用户各自所拥有的用户信息生成用户画像信息,也能够基于所共享的用户信息生成用户画像信息,可控的进行用户画像构建,有针对性为授权用户实现个性化推荐。In the exemplary embodiment as described above, under the control of the operation authority detection result, the user information read display and update between the authorized users can be controlled, and the user information stored in the application for each authorized user can be A certain type of user information sharing is performed to flexibly share the required user information under the premise of ensuring security, thereby enhancing the convenience of the authorized user to use the application. In addition, the user information of a single or a specified number of authorized users may be opened, so that other authorized users can view the open user information. Therefore, for the application, the user portrait information can be generated based on the user information owned by the authorized users, and the user portrait information can be generated based on the shared user information, and the user portrait can be controlled to be constructed, and the targeted user is authorized. Implement personalized recommendations.
下述为本发明装置实施例,可以用于执行本发明上述用户信息控制方法实施例。对于本发明装置实施例中未披露的细节,请参照本发明用户信息控制方法实施例。The following is an apparatus embodiment of the present invention, which can be used to implement the foregoing user information control method embodiment of the present invention. For details not disclosed in the embodiment of the device of the present invention, please refer to the embodiment of the user information control method of the present invention.
图6是一示例性实施例示出的一种用户信息控制装置的框图。该用户信息控制装置,如图6所示,包括但不限于:指令接收模块710、权限控制模块730和信息控制模块750。FIG. 6 is a block diagram of a user information control apparatus shown in an exemplary embodiment. The user information control device, as shown in FIG. 6, includes but is not limited to: an instruction receiving module 710, an authority control module 730, and an information control module 750.
指令接收模块710,用于接收所运行应用中被触发的用户操作指令,所述用户指令与所述应用存储的用户信息相关。The instruction receiving module 710 is configured to receive a triggered user operation instruction in the running application, where the user instruction is related to user information stored by the application.
权限控制模块730,用于为所述用户操作指令获取对应于授权用户特征的操作权限检测结果。The permission control module 730 is configured to obtain, for the user operation instruction, an operation authority detection result corresponding to the authorized user feature.
信息控制模块750,用于根据所述操作权限检测结果,执行所述应用中所述用户操作指令所相关用户信息的读取和显示。The information control module 750 is configured to perform reading and displaying of user information related to the user operation instruction in the application according to the operation authority detection result.
在一个示例性实施例中,指令接收模块710进一步用于所在终端系统中运行且激活至前台的应用中,接收被用户操作触发生成的相应用户操作指令。In an exemplary embodiment, the instruction receiving module 710 is further configured to: in an application running in the terminal system and activated to the foreground, receive a corresponding user operation instruction generated by a user operation trigger.
在另一个示例性实施例中,该用户信息控制装置还包括检测模块。该检测模块用于在所述应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果。In another exemplary embodiment, the user information control device further includes a detection module. The detecting module is configured to generate an operation authority detection result according to the configured time interval and the authorized user feature to detect whether the user operation is granted the user right according to the configured time interval and the authorized user feature.
图7是根据一示例性实施例示出的对检测模块的细节进行描述的框图。在一个示例性实施例中,该检测模块800,如图7所示,至少包括:获取单元801、比对单元803和结果生成单元805。FIG. 7 is a block diagram depicting details of a detection module, according to an exemplary embodiment. In an exemplary embodiment, the detecting module 800, as shown in FIG. 7, includes at least an obtaining unit 801, a comparing unit 803, and a result generating unit 805.
获取单元801,用于按照所配置时间间隔从所在终端系统读取授权用户特征,并获取即时采集的用户特征。The obtaining unit 801 is configured to read the authorized user feature from the terminal system according to the configured time interval, and obtain the user feature collected in real time.
比对单元803,用于将所述授权用户特征与所述采集的用户特征进行比对,检测当前时间间隔对应的时间段下触发的用户操作是否被授予用户权限。The comparing unit 803 is configured to compare the authorized user feature with the collected user feature, and detect whether the user operation triggered in the time period corresponding to the current time interval is granted the user right.
结果生成单元805,用于存在与所述用户特征相一致的授权用户特征时,生成所述时间段下用户权限被授予的操作权限检测结果。The result generating unit 805 is configured to generate an operation authority detection result that the user right is granted in the time period when there is an authorized user feature that is consistent with the user feature.
结果生成单元805,用于存在与所述用户特征相一致的授权用户特征时,生成所述时间段下用户权限被授予的操作权限检测结果。The result generating unit 805 is configured to generate an operation authority detection result that the user right is granted in the time period when there is an authorized user feature that is consistent with the user feature.
与之相对应的,在一个示例性实施例中,权限控制模块730进一步用于根据所述用户操作指令触发时对应的时间段,获取所述时间段对应的操作权限检测结果。Correspondingly, in an exemplary embodiment, the privilege control module 730 is further configured to acquire an operation authority detection result corresponding to the time period according to a time period corresponding to when the user operation instruction is triggered.
图8是根据图6对应实施例示出的对信息控制模块的细节进行描述的框图。该信息控制模块750,如图8所示,至少包括:读取单元751和显示单元753。Figure 8 is a block diagram depicting details of an information control module, shown in accordance with the corresponding embodiment of Figure 6. The information control module 750, as shown in FIG. 8, includes at least a reading unit 751 and a display unit 753.
读取单元751,用于在所述操作权限检测结果指示触发用户操作指令所在时间段授予用户权限时,根据所述用户操作指令读取相关用户信息。The reading unit 751 is configured to read related user information according to the user operation instruction when the operation authority detection result indicates that the user authority is granted during the time period when the user operation instruction is triggered.
显示单元753,用于进行所述应用中所述用户操作指令相关用户信息的显示。The display unit 753 is configured to perform display of user information related to the user operation instruction in the application.
进一步的,该信息控制模块750还包括:拒绝执行单元。该拒绝执行单元用于在所述操作权限检测结果指示触发用户操作指令所在时间段授予访客权限时,拒绝所述应用中用户操作所相关用户信息的读取和显示。Further, the information control module 750 further includes: rejecting the execution unit. The reject execution unit is configured to reject the reading and displaying of the user information related to the user operation in the application when the operation authority detection result indicates that the user right is granted during the time period when the user operation instruction is triggered.
图9是根据另一示例性实施例示出的对一种用户信息控制装置的细节进行描述的框图。该用户信息控制装置,如图9所示,还包括:切换感知模块910和切换控制模块930。FIG. 9 is a block diagram depicting details of a user information control apparatus, according to another exemplary embodiment. The user information control device, as shown in FIG. 9, further includes: a handover sensing module 910 and a handover control module 930.
切换感知模块910,用于根据触发所述用户操作指令所在时间段,以及所跳转进入的时间段,由所分别对应的操作权限检测结果感知得到用户权限和访客权限之间的权限切换。The switch perception module 910 is configured to perceive, according to the time period when the user operation instruction is triggered, and the time period that the jump is entered, the permission switching between the user right and the guest right is perceived by the corresponding operation permission detection result.
切换控制模块930,用于根据所感知的权限切换相应进行用户信息读取和显示的控制。The switching control module 930 is configured to switch the corresponding control of reading and displaying the user information according to the perceived authority.
图10是根据一示例性实施例示出的一种装置的示意图。装置1000可以是上述智能设备。如图10所示,装置1000可以包括以下一个或多个组件:处理组件1002,存储器1004,电源组件1006,多媒体组件1008,音频组件1010,传感器组件1014以及通信组件1016。FIG. 10 is a schematic diagram of an apparatus, according to an exemplary embodiment. Device 1000 can be the smart device described above. As shown in FIG. 10, apparatus 1000 can include one or more of the following components: processing component 1002, memory 1004, power component 1006, multimedia component 1008, audio component 1010, sensor component 1014, and communication component 1016.
处理组件1002通常控制装置1000的整体操作,诸如与显示,电话呼叫,数据通信,相机操作以及记录操作相关联的操作等。处理组件1002可以包括一个或多个处理器1018来执行指令,以完成下述的方法的全部或部分步骤。此外,处理组件1002可以包括一个或多个模块,用于便于处理组件1002和其他组件之间的交互。例如,处理组件1002可以包括多媒体模块,用于以方便多媒体组件1008和处理组件1002之间的交互。Processing component 1002 typically controls the overall operation of device 1000, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations, and the like. Processing component 1002 can include one or more processors 1018 to execute instructions to perform all or part of the steps of the methods described below. Moreover, processing component 1002 can include one or more modules for facilitating interaction between component 1002 and other components. For example, the processing component 1002 can include a multimedia module for facilitating interaction between the multimedia component 1008 and the processing component 1002.
存储器1004被配置为存储各种类型的数据以支持在装置1000的操作。这些数据的示例包括用于在装置1000上操作的任何应用程序或方法的指令。存储器1004可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如SRAM(Static Random Access Memory),EEPROM(Electrically Erasable Programmable Read-Only Memory),EPROM(Erasable
Programmable Read Only Memory),PROM(Programmable Red-Only Memory),ROM(Read-Only Memory),磁存储器,快闪存储器,磁盘或光盘。存储器1004中还存储有一个或多个模块,用于该一个或多个模块被配置成由该一个或多个处理器1018执行,以完成如下所示方法中的全部或者部分步骤。电源组件1006为装置1000的各种组件提供电力。电源组件1006可以包括电源管理系统,一个或多个电源,及其他与为装置1000生成、管理和分配电力相关联的组件。The memory 1004 is configured to store various types of data to support operation at the device 1000. Examples of such data include instructions for any application or method operating on device 1000. The memory 1004 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as SRAM (Static Random Access Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), EPROM (Erasable)
Programmable Read Only Memory), PROM (Programmable Red-Only Memory), ROM (Read-Only Memory), magnetic memory, flash memory, magnetic disk or optical disk. Also stored in memory 1004 is one or more modules for the one or more modules to be configured to be executed by the one or more processors 1018 to perform all or part of the steps in the method shown below. Power component 1006 provides power to various components of device 1000. Power component 1006 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1000.
多媒体组件1008包括在所述装置1000和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括LCD(Liquid
Crystal Display)和触摸面板。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。屏幕还可以包括OLED(Organic Light Emitting Display)。音频组件1010被配置为输出和/或输入音频信号。例如,音频组件1010包括一个麦克风(Microphone),当装置1000处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1004或经由通信组件1016发送。在一些实施例中,音频组件1010还包括一个扬声器,用于输出音频信号。传感器组件1014包括一个或多个传感器,用于为装置1000提供各个方面的状态评估。例如,传感器组件1014可以检测到装置1000的打开/关闭状态,组件的相对定位,传感器组件1014还可以检测装置1000或装置1000一个组件的位置改变以及装置1000的温度变化。在一些实施例中,该传感器组件1014还可以包括磁传感器,压力传感器或温度传感器。The multimedia component 1008 includes a screen between the device 1000 and a user that provides an output interface. In some embodiments, the screen can include an LCD (Liquid
Crystal Display) and touch panel. If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user. The touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation. The screen may also include an OLED (Organic Light Emitting Display). The audio component 1010 is configured to output and/or input an audio signal. For example, the audio component 1010 includes a microphone that is configured to receive an external audio signal when the device 1000 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may be further stored in memory 1004 or transmitted via communication component 1016. In some embodiments, the audio component 1010 also includes a speaker for outputting an audio signal. Sensor assembly 1014 includes one or more sensors for providing device 1000 with various aspects of state assessment. For example, sensor assembly 1014 can detect an open/closed state of device 1000, relative positioning of components, and sensor assembly 1014 can also detect changes in position of one component of device 1000 or device 1000 and temperature changes of device 1000. In some embodiments, the sensor assembly 1014 can also include a magnetic sensor, a pressure sensor, or a temperature sensor.
通信组件1016被配置为便于装置1000和其他设备之间有线或无线方式的通信。装置1000可以接入基于通信标准的无线网络,如WiFi(Wireless-Fidelity,无线保真)。在一个示例性实施例中,通信组件1016经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1016还包括NFC(Near Field
Communication)模块,用于以促进短程通信。例如,在NFC模块可基于Radio Frequency Identification技术,Infrared Data Association技术,
Ultra Wideband技术,蓝牙技术和其他技术来实现。Communication component 1016 is configured to facilitate wired or wireless communication between device 1000 and other devices. The device 1000 can access a wireless network based on a communication standard, such as WiFi (Wireless-Fidelity). In an exemplary embodiment, communication component 1016 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 1016 further includes NFC (Near Field)
Communication) module to facilitate short-range communication. For example, the NFC module can be based on Radio Frequency Identification technology, Infrared Data Association technology,
Ultra Wideband technology, Bluetooth technology and other technologies to achieve.
在示例性实施例中,装置1000可以被一个或多个应用专用集成电路(Application
Specific Integrated Circuit)、数字信号处理器、数字信号处理设备、可编程逻辑器件、现场可编程门阵列、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。In an exemplary embodiment, device 1000 may be implemented by one or more application specific integrated circuits (Application)
Specific Integrated Circuit), digital signal processor, digital signal processing device, programmable logic device, field programmable gate array, controller, microcontroller, microprocessor or other electronic component implementation for performing the above method.
本发明还提供一种终端设备,该终端设备包括:The present invention also provides a terminal device, the terminal device comprising:
处理器;processor;
存储器,该存储器上存储有计算机可读指令,该计算机可读指令被处理器执行时,实现如前所示的用户信息控制方法。A memory having stored thereon computer readable instructions that, when executed by the processor, implement a user information control method as previously described.
在一示例性实施例中,本发明还提供一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时,实现如前所示的用户信息控制方法。In an exemplary embodiment, the present invention also provides a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements a user information control method as previously described.
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围执行各种修改和改变。本发明的范围仅由所附的权利要求来限制。It is to be understood that the invention is not limited to the details of the details and The scope of the invention is limited only by the appended claims.
Claims (32)
- 一种用户信息控制方法,其特征在于,所述方法包括:A user information control method, the method comprising:接收所运行应用中被触发的用户操作指令,所述用户操作指令与所述应用存储的用户信息相关;Receiving a triggered user operation instruction in the running application, the user operation instruction being related to user information stored by the application;为所述用户操作指令获取所在时间段下对应于授权用户特征的操作权限检测结果;Obtaining an operation authority detection result corresponding to the authorized user feature in the time period for the user operation instruction;根据所述操作权限检测结果,执行所述应用中所述用户操作指令所相关用户信息的读取和显示。And reading and displaying the user information related to the user operation instruction in the application according to the operation authority detection result.
- 根据权利要求1所述的方法,其特征在于,所述接收所运行应用中被触发的用户操作指令,包括:所在终端系统中运行且激活至前台的应用中,接收被用户操作触发生成的相应用户操作指令。The method according to claim 1, wherein the receiving the user operation instruction triggered in the running application comprises: in an application running in the terminal system and activated to the foreground, receiving a corresponding trigger generated by the user operation User operation instructions.
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:在所述应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果。The method according to claim 1, wherein the method further comprises: detecting, in the foreground operation of the application, whether the user operation under the time period is granted the user right according to the configured time interval and the authorized user feature. , generate operation permission detection results.
- 根据权利要求3所述的方法,其特征在于,所述在所述应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果,包括:The method according to claim 3, wherein in the foreground running of the application, detecting whether the user operation under the time period is authorized to be granted according to the configured time interval and the authorized user feature, generating operation permission Test results, including:按照所配置时间间隔从所在终端系统读取授权用户特征,并获取即时采集的用户特征;Read authorized user features from the terminal system at the configured time interval, and obtain user characteristics acquired in real time;将所述授权用户特征与所述采集的用户特征进行比对,检测当前时间间隔对应的时间段下触发的用户操作是否被授予用户权限;Comparing the authorized user feature with the collected user feature, and detecting whether the user operation triggered in the time period corresponding to the current time interval is granted the user authority;存在与所述用户特征相一致的授权用户特征时,生成所述时间段下用户权限被授予的操作权限检测结果;When there is an authorized user feature consistent with the user feature, generating an operation permission detection result that the user right is granted in the time period;所述授权用户特征与所述用户特征均不相一致时,生成所述时间段下访客权限被授予的操作权限检测结果。When the authorized user feature does not match the user feature, the operation permission detection result that the guest authority is granted in the time period is generated.
- 根据权利要求4所述的方法,其特征在于,所述为所述用户操作指令获取所在时间段下对应于授权用户特征的操作权限检测结果,包括:根据所述用户操作指令触发时对应的时间段,获取所述时间段对应的操作权限检测结果。The method according to claim 4, wherein the obtaining, by the user operation instruction, an operation authority detection result corresponding to an authorized user feature during a time period, comprising: a time corresponding to triggering according to the user operation instruction The segment acquires an operation permission detection result corresponding to the time period.
- 根据权利要求1所述的方法,其特征在于,所述根据所述操作权限检测结果,执行所述应用中用户操作指令所相关用户信息的读取和显示,包括:The method according to claim 1, wherein the reading and displaying the user information related to the user operation instruction in the application according to the operation authority detection result comprises:在所述操作权限检测结果指示触发用户操作指令所在时间段授予用户权限时,根据所述用户操作指令读取相关用户信息;And when the operation authority detection result indicates that the user authority is granted during the time period when the user operation instruction is triggered, the related user information is read according to the user operation instruction;进行所述应用中所述用户操作指令相关用户信息的显示。Performing display of user information related to the user operation instruction in the application.
- 根据权利要求6所述的方法,其特征在于,所述根据所述操作权限检测结果,执行所述应用中用户操作指令所相关用户信息的读取和显示,还包括:在所述操作权限检测结果指示触发用户操作指令所在时间段授予访客权限时,拒绝所述应用中用户操作所相关用户信息的读取和显示。The method according to claim 6, wherein the reading and displaying the user information related to the user operation instruction in the application according to the operation authority detection result further comprises: detecting the operation authority When the result indicates that the user permission is triggered during the time period when the user operation instruction is triggered, the reading and display of the user information related to the user operation in the application are rejected.
- 根据权利要求1所述的方法,其特征在于,所述根据所述操作权限检测结果,执行所述应用中所述用户操作指令所相关用户信息的读取和显示之后,所述方法还包括:The method according to claim 1, wherein the method further comprises: after performing the reading and displaying of the user information related to the user operation instruction in the application according to the operation authority detection result, the method further comprises:根据触发所述用户操作指令所在时间段,以及所跳转进入的时间段,由对应的操作权限检测结果感知得到用户权限和访客权限之间的权限切换;According to the time period in which the user operation instruction is triggered, and the time period in which the jump is entered, the permission switching between the user authority and the guest authority is perceived by the corresponding operation authority detection result;根据所感知的权限切换相应进行用户信息读取和显示的控制。The corresponding control of reading and displaying user information is switched according to the perceived authority.
- 一种用户信息控制装置,其特征在于,所述装置包括:A user information control device, characterized in that the device comprises:指令接收模块,配置为接收所运行应用中被触发的用户操作指令,所述用户指令与所述应用存储的用户信息相关;An instruction receiving module, configured to receive a triggered user operation instruction in the running application, where the user instruction is related to user information stored by the application;权限控制模块,配置为为所述用户操作指令获取对应于授权用户特征的操作权限检测结果;The permission control module is configured to acquire an operation authority detection result corresponding to the authorized user feature for the user operation instruction;信息控制模块,配置为根据所述操作权限检测结果,执行所述应用中所述用户操作指令所相关用户信息的读取和显示。The information control module is configured to perform reading and displaying of user information related to the user operation instruction in the application according to the operation authority detection result.
- 根据权利要求9所述的装置,其特征在于,所述指令接收模块进一步配置为所在终端系统中运行且激活至前台的应用中,接收被用户操作触发生成的相应用户操作指令。The apparatus according to claim 9, wherein the instruction receiving module is further configured to be in an application running in the terminal system and activated to the foreground, and receive a corresponding user operation instruction generated by a user operation trigger.
- 根据权利要求9所述的装置,其特征在于,所述装置还包括:检测模块,配置为在所述应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果。The device according to claim 9, wherein the device further comprises: a detecting module configured to detect a user operation in a time period of the application according to the configured time interval and the authorized user feature during the foreground operation of the application. Whether the user right is granted, the operation permission detection result is generated.
- 根据权利要求11所述的装置,其特征在于,所述检测模块包括:The device according to claim 11, wherein the detecting module comprises:获取单元,配置为按照所配置时间间隔从所在终端系统读取授权用户特征,并获取即时采集的用户特征;The acquiring unit is configured to read the authorized user feature from the terminal system according to the configured time interval, and obtain the user feature collected in real time;比对单元,配置为将所述授权用户特征与所述采集的用户特征进行比对,检测当前时间间隔对应的时间段下触发的用户操作是否被授予用户权限;The comparison unit is configured to compare the authorized user feature with the collected user feature, and detect whether the user operation triggered in the time period corresponding to the current time interval is granted the user authority;结果生成单元,配置为存在与所述用户特征相一致的授权用户特征时,生成所述时间段下用户权限被授予的操作权限检测结果;a result generating unit configured to generate an operation permission detection result that the user right is granted in the time period when the authorized user feature is consistent with the user feature;所述结果生成单元还配置为所述授权用户特征与所述用户特征均不相一致时,生成所述时间段下访客权限被授予的操作权限检测结果。The result generating unit is further configured to: when the authorized user feature does not match the user feature, generate an operation permission detection result that is granted by the guest right in the time period.
- 根据权利要求12所述的装置,其特征在于,所述权限控制模块进一步配置为根据所述用户操作指令触发时对应的时间段,获取所述时间段对应的操作权限检测结果。The apparatus according to claim 12, wherein the authority control module is further configured to acquire an operation authority detection result corresponding to the time period according to a time period corresponding to the triggering of the user operation instruction.
- 根据权利要求9所述的装置,其特征在于,所述信息控制模块包括:The device according to claim 9, wherein the information control module comprises:读取单元,配置为在所述操作权限检测结果指示触发用户操作指令所在时间段授予用户权限时,根据所述用户操作指令读取相关用户信息;a reading unit configured to read related user information according to the user operation instruction when the operation authority detection result indicates that the user authority is granted during a time period when the user operation instruction is triggered;显示单元,配置为进行所述应用中所述用户操作指令相关用户信息的显示。And a display unit configured to perform display of user information related to the user operation instruction in the application.
- 根据权利要求14所述的装置,其特征在于,所述信息控制模块还包括:拒绝执行单元,配置为在所述操作权限检测结果指示触发用户操作指令所在时间段授予访客权限时,拒绝所述应用中用户操作所相关用户信息的读取和显示。The apparatus according to claim 14, wherein the information control module further comprises: a reject execution unit configured to reject the said user right when the operation authority detection result indicates that the user operation instruction is triggered during the time period when the user operation instruction is triggered The reading and display of user information related to user operations in the application.
- 根据权利要求9所述的装置,其特征在于,所述装置还包括:The device according to claim 9, wherein the device further comprises:切换感知模块,配置为根据触发所述用户操作指令所在时间段,以及所跳转进入的时间段,由对应的操作权限检测结果感知得到用户权限和访客权限之间的权限切换;The switching perception module is configured to: according to the time period during which the user operation instruction is triggered, and the time period that the jump is entered, the corresponding operation authority detection result senses that the authority switching between the user authority and the guest authority is obtained;切换控制模块,配置为根据所感知的权限切换相应进行用户信息读取和显示的控制。The switching control module is configured to switch the corresponding control of reading and displaying the user information according to the perceived authority.
- 一种终端设备,其特征在于,所述终端设备包括:A terminal device, the terminal device includes:处理器;processor;存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,实现以下步骤:a memory having stored thereon computer readable instructions that, when executed by the processor, implement the following steps:接收所运行应用中被触发的用户操作指令,所述用户操作指令与所述应用存储的用户信息相关;Receiving a triggered user operation instruction in the running application, the user operation instruction being related to user information stored by the application;为所述用户操作指令获取所在时间段下对应于授权用户特征的操作权限检测结果;Obtaining an operation authority detection result corresponding to the authorized user feature in the time period for the user operation instruction;根据所述操作权限检测结果,执行所述应用中所述用户操作指令所相关用户信息的读取和显示。And reading and displaying the user information related to the user operation instruction in the application according to the operation authority detection result.
- 根据权利要求17所述的设备,其特征在于,所述接收所运行应用中被触发的用户操作指令,包括:所在终端系统中运行且激活至前台的应用中,接收被用户操作触发生成的相应用户操作指令。The device according to claim 17, wherein the receiving the user operation instruction triggered in the running application comprises: in an application running in the terminal system and activated to the foreground, receiving a corresponding trigger generated by the user operation User operation instructions.
- 根据权利要求17所述的设备,其特征在于,还实现以下步骤:在所述应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果。The device according to claim 17, further comprising the step of: detecting, during the foreground running of the application, whether the user operation under the time period is granted the user right according to the configured time interval and the authorized user feature, Generate operation permission detection results.
- 根据权利要求19所述的设备,其特征在于,所述在所述应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果,包括:The device according to claim 19, wherein in the foreground running of the application, detecting whether the user operation under the time period is authorized by the user according to the configured time interval and the authorized user feature, generating operation permission Test results, including:按照所配置时间间隔从所在终端系统读取授权用户特征,并获取即时采集的用户特征;Read authorized user features from the terminal system at the configured time interval, and obtain user characteristics acquired in real time;将所述授权用户特征与所述采集的用户特征进行比对,检测当前时间间隔对应的时间段下触发的用户操作是否被授予用户权限;Comparing the authorized user feature with the collected user feature, and detecting whether the user operation triggered in the time period corresponding to the current time interval is granted the user authority;存在与所述用户特征相一致的授权用户特征时,生成所述时间段下用户权限被授予的操作权限检测结果;When there is an authorized user feature consistent with the user feature, generating an operation permission detection result that the user right is granted in the time period;所述授权用户特征与所述用户特征均不相一致时,生成所述时间段下访客权限被授予的操作权限检测结果。When the authorized user feature does not match the user feature, the operation permission detection result that the guest authority is granted in the time period is generated.
- 根据权利要求20所述的设备,其特征在于,所述为所述用户操作指令获取所在时间段下对应于授权用户特征的操作权限检测结果,包括:根据所述用户操作指令触发时对应的时间段,获取所述时间段对应的操作权限检测结果。The device according to claim 20, wherein the obtaining, by the user operation instruction, an operation authority detection result corresponding to an authorized user feature during a time period, comprising: a time corresponding to triggering according to the user operation instruction The segment acquires an operation permission detection result corresponding to the time period.
- 根据权利要求17所述的设备,其特征在于,所述根据所述操作权限检测结果,执行所述应用中用户操作指令所相关用户信息的读取和显示,包括:The device according to claim 17, wherein the reading and displaying the user information related to the user operation instruction in the application according to the operation authority detection result comprises:在所述操作权限检测结果指示触发用户操作指令所在时间段授予用户权限时,根据所述用户操作指令读取相关用户信息;And when the operation authority detection result indicates that the user authority is granted during the time period when the user operation instruction is triggered, the related user information is read according to the user operation instruction;进行所述应用中所述用户操作指令相关用户信息的显示。Performing display of user information related to the user operation instruction in the application.
- 根据权利要求22所述的设备,其特征在于,所述根据所述操作权限检测结果,执行所述应用中用户操作指令所相关用户信息的读取和显示,还包括:在所述操作权限检测结果指示触发用户操作指令所在时间段授予访客权限时,拒绝所述应用中用户操作所相关用户信息的读取和显示。The device according to claim 22, wherein the reading and displaying the user information related to the user operation instruction in the application according to the operation authority detection result further comprises: detecting the operation authority When the result indicates that the user permission is triggered during the time period when the user operation instruction is triggered, the reading and display of the user information related to the user operation in the application are rejected.
- 根据权利要求17所述的设备,其特征在于,所述根据所述操作权限检测结果,执行所述应用中所述用户操作指令所相关用户信息的读取和显示之后,还实现以下步骤:The device according to claim 17, wherein after performing the reading and displaying of the user information related to the user operation instruction in the application according to the operation authority detection result, the following steps are further implemented:根据触发所述用户操作指令所在时间段,以及所跳转进入的时间段,由对应的操作权限检测结果感知得到用户权限和访客权限之间的权限切换;According to the time period in which the user operation instruction is triggered, and the time period in which the jump is entered, the permission switching between the user authority and the guest authority is perceived by the corresponding operation authority detection result;根据所感知的权限切换相应进行用户信息读取和显示的控制。The corresponding control of reading and displaying user information is switched according to the perceived authority.
- 一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时,实现以下步骤:A computer readable storage medium having stored thereon a computer program, the computer program being executed by a processor, implementing the following steps:接收所运行应用中被触发的用户操作指令,所述用户操作指令与所述应用存储的用户信息相关;Receiving a triggered user operation instruction in the running application, the user operation instruction being related to user information stored by the application;为所述用户操作指令获取所在时间段下对应于授权用户特征的操作权限检测结果;Obtaining an operation authority detection result corresponding to the authorized user feature in the time period for the user operation instruction;根据所述操作权限检测结果,执行所述应用中所述用户操作指令所相关用户信息的读取和显示。And reading and displaying the user information related to the user operation instruction in the application according to the operation authority detection result.
- 根据权利要求25所述的介质,其特征在于,所述接收所运行应用中被触发的用户操作指令,包括:所在终端系统中运行且激活至前台的应用中,接收被用户操作触发生成的相应用户操作指令。The medium according to claim 25, wherein the receiving the user operation instruction triggered in the running application comprises: in an application running in the terminal system and activated to the foreground, receiving a corresponding trigger generated by the user operation User operation instructions.
- 根据权利要求25所述的介质,其特征在于,还实现以下步骤:在所述应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果。The medium according to claim 25, further comprising the step of: detecting, in the foreground operation of the application, whether the user operation under the time period is granted the user right according to the configured time interval and the authorized user feature, Generate operation permission detection results.
- 根据权利要求27所述的介质,其特征在于,所述在所述应用的前台运行中,根据所配置时间间隔和授权用户特征检测所在时间段下的用户操作是否被授予用户权限,生成操作权限检测结果,包括:The medium according to claim 27, wherein in the foreground running of the application, detecting whether the user operation under the time period is authorized to be granted according to the configured time interval and the authorized user feature, generating operation permission Test results, including:按照所配置时间间隔从所在终端系统读取授权用户特征,并获取即时采集的用户特征;Read authorized user features from the terminal system at the configured time interval, and obtain user characteristics acquired in real time;将所述授权用户特征与所述采集的用户特征进行比对,检测当前时间间隔对应的时间段下触发的用户操作是否被授予用户权限;Comparing the authorized user feature with the collected user feature, and detecting whether the user operation triggered in the time period corresponding to the current time interval is granted the user authority;存在与所述用户特征相一致的授权用户特征时,生成所述时间段下用户权限被授予的操作权限检测结果;When there is an authorized user feature consistent with the user feature, generating an operation permission detection result that the user right is granted in the time period;所述授权用户特征与所述用户特征均不相一致时,生成所述时间段下访客权限被授予的操作权限检测结果。When the authorized user feature does not match the user feature, the operation permission detection result that the guest authority is granted in the time period is generated.
- 根据权利要求28所述的介质,其特征在于,所述为所述用户操作指令获取所在时间段下对应于授权用户特征的操作权限检测结果,包括:根据所述用户操作指令触发时对应的时间段,获取所述时间段对应的操作权限检测结果。The medium according to claim 28, wherein the obtaining, by the user operation instruction, an operation authority detection result corresponding to an authorized user feature in a time period, comprising: a time corresponding to triggering according to the user operation instruction The segment acquires an operation permission detection result corresponding to the time period.
- 根据权利要求25所述的介质,其特征在于,所述根据所述操作权限检测结果,执行所述应用中用户操作指令所相关用户信息的读取和显示,包括:The medium according to claim 25, wherein the reading and displaying the user information related to the user operation instruction in the application according to the operation authority detection result comprises:在所述操作权限检测结果指示触发用户操作指令所在时间段授予用户权限时,根据所述用户操作指令读取相关用户信息;And when the operation authority detection result indicates that the user authority is granted during the time period when the user operation instruction is triggered, the related user information is read according to the user operation instruction;进行所述应用中所述用户操作指令相关用户信息的显示。Performing display of user information related to the user operation instruction in the application.
- 根据权利要求30所述的介质,其特征在于,所述根据所述操作权限检测结果,执行所述应用中用户操作指令所相关用户信息的读取和显示,还包括:在所述操作权限检测结果指示触发用户操作指令所在时间段授予访客权限时,拒绝所述应用中用户操作所相关用户信息的读取和显示。The medium according to claim 30, wherein the reading and displaying the user information related to the user operation instruction in the application according to the operation authority detection result further comprises: detecting the operation authority When the result indicates that the user permission is triggered during the time period when the user operation instruction is triggered, the reading and display of the user information related to the user operation in the application are rejected.
- 根据权利要求25所述的设备,其特征在于,所述根据所述操作权限检测结果,执行所述应用中所述用户操作指令所相关用户信息的读取和显示之后,还实现以下步骤:The device according to claim 25, wherein after the reading and displaying of the user information related to the user operation instruction in the application is performed according to the operation authority detection result, the following steps are further implemented:根据触发所述用户操作指令所在时间段,以及所跳转进入的时间段,由对应的操作权限检测结果感知得到用户权限和访客权限之间的权限切换;According to the time period in which the user operation instruction is triggered, and the time period in which the jump is entered, the permission switching between the user authority and the guest authority is perceived by the corresponding operation authority detection result;根据所感知的权限切换相应进行用户信息读取和显示的控制。The corresponding control of reading and displaying user information is switched according to the perceived authority.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810313089.5A CN108549822A (en) | 2018-04-09 | 2018-04-09 | User information control method, apparatus and terminal device |
CN201810313089.5 | 2018-04-09 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019196297A1 true WO2019196297A1 (en) | 2019-10-17 |
Family
ID=63514490
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/101565 WO2019196297A1 (en) | 2018-04-09 | 2018-08-21 | User information control method and apparatus, and terminal device and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108549822A (en) |
WO (1) | WO2019196297A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109992982A (en) * | 2019-04-11 | 2019-07-09 | 北京信息科技大学 | Big data access authorization methods, device and big data platform |
CN111324879A (en) * | 2020-02-18 | 2020-06-23 | 支付宝(杭州)信息技术有限公司 | Login state control method, device and equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106228053A (en) * | 2016-08-01 | 2016-12-14 | 深圳天珑无线科技有限公司 | Come fast decryption and identification by fingerprint authentication mode and protected note method and system |
CN106650368A (en) * | 2016-10-12 | 2017-05-10 | 珠海格力电器股份有限公司 | Encrypted information display method and device |
CN107169329A (en) * | 2017-05-24 | 2017-09-15 | 维沃移动通信有限公司 | A kind of method for protecting privacy, mobile terminal and computer-readable recording medium |
CN107391989A (en) * | 2017-07-10 | 2017-11-24 | 珠海市魅族科技有限公司 | Message treatment method, device, terminal and storage medium |
CN107437012A (en) * | 2016-05-27 | 2017-12-05 | 阿里巴巴集团控股有限公司 | The guard method of data and device |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104424403B (en) * | 2013-08-30 | 2018-07-03 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN103679001A (en) * | 2013-12-06 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for controlling behaviors of application program in mobile communication terminal |
CN107515709B (en) * | 2016-06-16 | 2021-09-10 | 苏宁易购集团股份有限公司 | Screen display method and device |
CN106250175A (en) * | 2016-07-21 | 2016-12-21 | 广东欧珀移动通信有限公司 | The upgrade method of a kind of application and terminal unit |
CN106789938B (en) * | 2016-11-30 | 2020-04-21 | 四川秘无痕科技有限责任公司 | Method for monitoring search trace of browser at mobile phone end in real time |
CN106909820B (en) * | 2017-01-20 | 2020-07-28 | 奇酷互联网络科技(深圳)有限公司 | Mobile terminal and fingerprint data processing method and device thereof |
-
2018
- 2018-04-09 CN CN201810313089.5A patent/CN108549822A/en active Pending
- 2018-08-21 WO PCT/CN2018/101565 patent/WO2019196297A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107437012A (en) * | 2016-05-27 | 2017-12-05 | 阿里巴巴集团控股有限公司 | The guard method of data and device |
CN106228053A (en) * | 2016-08-01 | 2016-12-14 | 深圳天珑无线科技有限公司 | Come fast decryption and identification by fingerprint authentication mode and protected note method and system |
CN106650368A (en) * | 2016-10-12 | 2017-05-10 | 珠海格力电器股份有限公司 | Encrypted information display method and device |
CN107169329A (en) * | 2017-05-24 | 2017-09-15 | 维沃移动通信有限公司 | A kind of method for protecting privacy, mobile terminal and computer-readable recording medium |
CN107391989A (en) * | 2017-07-10 | 2017-11-24 | 珠海市魅族科技有限公司 | Message treatment method, device, terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108549822A (en) | 2018-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9286482B1 (en) | Privacy control based on user recognition | |
US10114968B2 (en) | Proximity based content security | |
US9886598B2 (en) | Automatic adjustment of a display to obscure data | |
RU2666314C2 (en) | User terminal apparatus and corresponding control method | |
US20180144110A1 (en) | Multi-input user interaction and behavioral based authentication system for context aware applications | |
US20180357440A1 (en) | Personalized Meetings | |
KR102216653B1 (en) | Apparatas and method for conducting a communication of the fingerprint verification in an electronic device | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
WO2021018169A1 (en) | Privacy protection method for electronic device, and electronic device | |
US9495527B2 (en) | Function-level lock for mobile device security | |
AU2013245980A1 (en) | Location-based access control for portable electronic device | |
US9996687B1 (en) | Authentication management | |
US20190065876A1 (en) | Methods and devices for processing fingerprint information | |
WO2019056366A1 (en) | Method and apparatus for controlling terminal | |
TW201837780A (en) | Fingerprint recognition-based synchronous application starting method and device | |
KR102071530B1 (en) | Apparatas and method for proposing a response manual of occurring denial in an electronic device | |
WO2019196297A1 (en) | User information control method and apparatus, and terminal device and storage medium | |
WO2018093053A1 (en) | Electronic device and screen provision method of electronic device | |
WO2016059564A1 (en) | Partial access screen lock | |
WO2019196655A1 (en) | Mode switching method and apparatus, and computer-readable storage medium, and terminal | |
US20160306962A1 (en) | Device and method of requesting external device to execute task | |
CN113282364A (en) | Display method, display device and electronic equipment | |
WO2017105113A1 (en) | Server, electronic device, and method for processing image by electronic device | |
EP3662399B1 (en) | Electronic device and control method thereof | |
KR20180052695A (en) | Secure entry and exit of software modules protected by controlled encryption key management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18914509 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM1205A DATED 20.01.2021) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18914509 Country of ref document: EP Kind code of ref document: A1 |