WO2022179495A1 - 一种隐私风险反馈方法、装置及第一终端设备 - Google Patents

一种隐私风险反馈方法、装置及第一终端设备 Download PDF

Info

Publication number
WO2022179495A1
WO2022179495A1 PCT/CN2022/077256 CN2022077256W WO2022179495A1 WO 2022179495 A1 WO2022179495 A1 WO 2022179495A1 CN 2022077256 W CN2022077256 W CN 2022077256W WO 2022179495 A1 WO2022179495 A1 WO 2022179495A1
Authority
WO
WIPO (PCT)
Prior art keywords
privacy
application
terminal device
triggered
risk parameter
Prior art date
Application number
PCT/CN2022/077256
Other languages
English (en)
French (fr)
Inventor
王代斌
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022179495A1 publication Critical patent/WO2022179495A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a privacy risk feedback method, apparatus, and first terminal device.
  • the present application provides a privacy risk feedback method, device and first terminal device, which are helpful for users to accurately determine the privacy risk of an application program.
  • the present application provides a privacy risk feedback method, the method includes: a first terminal device acquiring a privacy information entry of an application; the first terminal device acquiring a privacy operation triggered by the application; the first terminal The device determines a privacy risk parameter of the application based on the privacy information entry and the triggered privacy operation, where the privacy risk parameter indicates the privacy risk of the application; the first terminal device outputs the privacy risk parameter of the application.
  • the first terminal device determines the privacy risk parameter of the application in combination with the privacy information entry and the triggered privacy operation obtained in real time, without displaying all privacy operation behaviors of the current application , it is clearer and easier to directly output the privacy risk parameters of the application. Therefore, based on the method described in the first aspect, it is beneficial for the user to accurately determine the privacy risk of the application.
  • the first terminal device determines the privacy risk parameter of the application based on the privacy information entry and the triggered privacy operation, including: the first terminal device determines the privacy risk parameter of the application based on the triggered privacy operation.
  • the weight value, the privacy information entry, and the triggered privacy operation determine the privacy risk parameter of the application. Based on this method, the privacy risk parameter of the application is determined by the weight value of the triggered privacy operation, which is beneficial for the user to accurately determine the privacy risk of the application.
  • the first terminal device determines the privacy risk parameter of the application based on the privacy information item and the triggered privacy operation, including: the first terminal device determines a model based on the privacy risk parameter, the The privacy information entry and the triggered privacy action determine the privacy risk parameter of the application. Based on this method, the privacy risk parameters of the application are determined through the privacy risk parameter determination model, which is beneficial for users to accurately determine the privacy risk of the application.
  • the method further includes: when the privacy risk parameter of the application program is less than a preset value, the first terminal device prompts the user that the application program has a privacy risk.
  • acquiring, by the first terminal device, the privacy information item of the application program includes: the first terminal device acquiring the privacy information item of the application program from the server or the second terminal device.
  • the privacy risk parameter is a score or a rating.
  • the present application provides a privacy risk feedback device, the device includes an acquisition unit, a determination unit and an output unit, wherein: the acquisition unit is used to acquire the privacy information entry of the application program; the acquisition unit is also used to Obtain the privacy operation triggered by the application; the determining unit is configured to determine the privacy risk parameter of the application based on the privacy information entry and the triggered privacy operation, where the privacy risk parameter indicates the privacy risk of the application; the The output unit is used to output the privacy risk parameters of the application.
  • the manner in which the determining unit determines the privacy risk parameter of the application based on the privacy information item and the triggered privacy operation is specifically: the determining unit is based on the weight value of the triggered privacy operation. , the privacy information entry, and the triggered privacy operation to determine the privacy risk parameter of the application.
  • the manner in which the determining unit determines the privacy risk parameter of the application based on the privacy information entry and the triggered privacy operation is specifically: the determining unit determines a model based on the privacy risk parameter, the privacy information The entry and the triggered privacy action determine the privacy risk parameters for the application.
  • the apparatus further includes a prompting unit configured to: when the privacy risk parameter of the application is less than a preset value, prompting the user that the application has a privacy risk.
  • the manner in which the acquiring unit acquires the privacy information item of the application program is specifically: the acquiring unit acquires the privacy information item of the application program from the server or the second terminal device.
  • the privacy risk parameter is a score or a rating.
  • an embodiment of the present application provides a first terminal device, where the first terminal device includes a memory and at least one processor; the memory is coupled to one or more processors, and stores computer program codes for storing computer program codes. It includes computer instructions, and when one or more processors execute the computer instructions, causes the first terminal device to perform the method described in the first aspect or any one of the possible implementation manners of the first aspect.
  • an embodiment of the present application provides a computer storage medium, including computer instructions, when the computer instructions are executed on the first terminal device, the first terminal device is made to execute any one of the first aspect or the first aspect. possible implementations of the method described.
  • embodiments of the present application provide a computer program product, which, when the computer program product runs on a computer, enables the computer to execute the method described in the first aspect or any possible implementation manner under the first aspect.
  • FIG. 1 is a schematic diagram of a system architecture provided by an embodiment of the present application.
  • FIG. 2 is a schematic structural diagram of a first terminal device 100 provided by an embodiment of the present application.
  • FIG. 3 is a block diagram of the software structure of the first terminal device 100 provided by the embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a privacy risk feedback provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of another privacy risk feedback provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of enabling application privacy risk monitoring provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a privacy risk parameter display provided by an embodiment of the present application.
  • FIG. 8 is a schematic diagram of application privacy operation information provided by an embodiment of the present application.
  • FIG. 9 is a schematic diagram of an application privacy access setting provided by an embodiment of the present application.
  • FIG. 10 is a schematic diagram of a privacy risk prompt provided by an embodiment of the present application.
  • FIG. 11 is a schematic diagram of a kind of push information provided by an embodiment of the present application.
  • 12 is a schematic diagram of prompt information for determining whether to disable an application program provided by an embodiment of the present application
  • FIG. 13 is a schematic flowchart of another privacy risk feedback provided by an embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of a privacy risk feedback device provided by an embodiment of the present application.
  • At least one (item) means one or more
  • plural means two or more
  • at least two (item) means two or three and three
  • “and/or” is used to describe the relationship of related objects, indicating that there can be three kinds of relationships, for example, “A and/or B” can mean: only A exists, only B exists, and both A and B exist three A case where A and B can be singular or plural.
  • the character “/” generally indicates that the associated objects are an “or” relationship.
  • At least one item(s) below” or similar expressions thereof refer to any combination of these items, including any combination of single item(s) or plural items(s).
  • At least one (a) of a, b or c can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c" ", where a, b, c can be single or multiple.
  • FIG. 1 is a schematic diagram of a system architecture provided by an embodiment of the present application.
  • the system architecture 10 includes a first terminal device 100 and a server 200 .
  • FIG. 1 takes the system architecture 10 including a first terminal device 100 and a server 200 as an example.
  • the system architecture 10 may further include multiple first terminal devices 100 and multiple servers 200, which are not limited in this embodiment of the present application.
  • the first terminal device 100 may be a mobile phone, a tablet computer, a remote control, or a wearable electronic device with a wireless communication function (such as a smart watch, AR glasses), and the like.
  • the server 200 may be an application market server or platform, and may analyze the privacy protocol of the application to obtain the privacy information entry of the application.
  • FIG. 2 is a schematic structural diagram of a first terminal device 100 provided by an embodiment of the present application.
  • the first terminal device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, Antenna 2, mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone jack 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen 194 , and a subscriber identification module (subscriber identification module, SIM) card interface 195 and the like.
  • SIM subscriber identification module
  • the sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
  • the structures illustrated in the embodiments of the present invention do not constitute a specific limitation on the first terminal device 100 .
  • the first terminal device 100 may include more or less components than shown, or combine some components, or separate some components, or arrange different components.
  • the illustrated components may be implemented in hardware, software, or a combination of software and hardware.
  • the processor 110 may include one or more processing units, for example, the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU) Wait. Wherein, different processing units may be independent devices, or may be integrated in one or more processors.
  • application processor application processor, AP
  • modem processor graphics processor
  • graphics processor graphics processor
  • ISP image signal processor
  • controller memory
  • video codec digital signal processor
  • DSP digital signal processor
  • NPU neural-network processing unit
  • the controller may be the nerve center and command center of the first terminal device 100 .
  • the controller can generate an operation control signal according to the instruction operation code and timing signal, and complete the control of fetching and executing instructions.
  • a memory may also be provided in the processor 110 for storing instructions and data.
  • the memory in processor 110 is cache memory. This memory may hold instructions or data that have just been used or recycled by the processor 110 . If the processor 110 needs to use the instruction or data again, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby increasing the efficiency of the system.
  • the processor 110 may include one or more interfaces.
  • the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous transceiver (universal asynchronous transmitter) receiver/transmitter, UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and / or universal serial bus (universal serial bus, USB) interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • PCM pulse code modulation
  • UART universal asynchronous transceiver
  • MIPI mobile industry processor interface
  • GPIO general-purpose input/output
  • SIM subscriber identity module
  • USB universal serial bus
  • the I2C interface is a bidirectional synchronous serial bus that includes a serial data line (SDA) and a serial clock line (SCL).
  • the processor 110 may contain multiple sets of I2C buses.
  • the processor 110 can be respectively coupled to the touch sensor 180K, the charger, the flash, the camera 193 and the like through different I2C bus interfaces.
  • the processor 110 may couple the touch sensor 180K through the I2C interface, so that the processor 110 communicates with the touch sensor 180K through the I2C bus interface, so as to realize the touch function of the first terminal device 100 .
  • the I2S interface can be used for audio communication.
  • the processor 110 may contain multiple sets of I2S buses.
  • the processor 110 may be coupled with the audio module 170 through an I2S bus to implement communication between the processor 110 and the audio module 170 .
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface, so as to realize the function of answering calls through a Bluetooth headset.
  • the PCM interface can also be used for audio communications, sampling, quantizing and encoding analog signals.
  • the audio module 170 and the wireless communication module 160 may communicate through a PCM interface.
  • the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to realize the function of answering calls through the Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
  • the UART interface is a universal serial data bus used for asynchronous communication.
  • the bus may be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
  • a UART interface is typically used to connect the processor 110 with the wireless communication module 160 .
  • the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to implement the Bluetooth function.
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface, so as to realize the function of playing music through the Bluetooth headset.
  • the MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 .
  • MIPI interfaces include camera serial interface (CSI), display serial interface (DSI), etc.
  • the processor 110 communicates with the camera 193 through a CSI interface to implement the shooting function of the first terminal device 100 .
  • the processor 110 communicates with the display screen 194 through the DSI interface to implement the display function of the first terminal device 100 .
  • the GPIO interface can be configured by software.
  • the GPIO interface can be configured as a control signal or as a data signal.
  • the GPIO interface may be used to connect the processor 110 with the camera 193, the display screen 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like.
  • the GPIO interface can also be configured as I2C interface, I2S interface, UART interface, MIPI interface, etc.
  • the USB interface 130 is an interface that conforms to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like.
  • the USB interface 130 can be used to connect a charger to charge the first terminal device 100, and can also be used to transmit data between the first terminal device 100 and peripheral devices. It can also be used to connect headphones to play audio through the headphones.
  • the interface can also be used to connect other electronic devices, such as AR devices.
  • the interface connection relationship between the modules illustrated in the embodiment of the present invention is only a schematic illustration, and does not constitute a structural limitation of the first terminal device 100 .
  • the first terminal device 100 may also adopt different interface connection manners in the foregoing embodiments, or a combination of multiple interface connection manners.
  • the charging management module 140 is used to receive charging input from the charger.
  • the charger may be a wireless charger or a wired charger.
  • the power management module 141 is used for connecting the battery 142 , the charging management module 140 and the processor 110 .
  • the power management module 141 receives input from the battery 142 and/or the charge management module 140, and supplies power to the processor 110, the internal memory 121, the external memory, the display screen 194, the camera 193, the wireless communication module 160, etc.
  • the power management module 141 may also be provided in the processor 110 .
  • the power management module 141 and the charging management module 140 may also be provided in the same device.
  • the wireless communication function of the first terminal device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modulation and demodulation processor, the baseband processor, and the like.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in the first terminal device 100 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
  • the antenna 1 can be multiplexed as a diversity antenna of the wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
  • the mobile communication module 150 may provide a wireless communication solution including 2G/3G/4G/5G and the like applied on the first terminal device 100 .
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA) and the like.
  • the mobile communication module 150 can receive electromagnetic waves from the antenna 1, filter and amplify the received electromagnetic waves, and transmit them to the modulation and demodulation processor for demodulation.
  • the mobile communication module 150 can also amplify the signal modulated by the modulation and demodulation processor, and then turn it into an electromagnetic wave for radiation through the antenna 1 .
  • at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 may be provided in the same device as at least part of the modules of the processor 110 .
  • the modem processor may include a modulator and a demodulator.
  • the modulator is used to modulate the low frequency baseband signal to be sent into a medium and high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low frequency baseband signal. Then the demodulator transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the low frequency baseband signal is processed by the baseband processor and passed to the application processor.
  • the application processor outputs sound signals through audio devices (not limited to the speaker 170A, the receiver 170B, etc.), or displays images or videos through the display screen 194 .
  • the modem processor may be a stand-alone device.
  • the modem processor may be independent of the processor 110, and may be provided in the same device as the mobile communication module 150 or other functional modules.
  • the wireless communication module 160 can provide applications on the first terminal device 100 including wireless local area networks (WLAN) (such as Wi-Fi networks), Bluetooth (bluetooth, BT), BLE broadcast, global navigation satellite system (global navigation satellite system). Navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions.
  • WLAN wireless local area networks
  • BT Bluetooth
  • BLE broadcast global navigation satellite system
  • GNSS global navigation satellite system
  • frequency modulation frequency modulation, FM
  • near field communication technology near field communication
  • NFC near field communication technology
  • infrared technology infrared, IR
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent
  • the antenna 1 of the first terminal device 100 is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the first terminal device 100 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code Division Multiple Access (WCDMA), Time Division Code Division Multiple Access (TD-SCDMA), Long Term Evolution (LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include global positioning system (global positioning system, GPS), global navigation satellite system (global navigation satellite system, GLONASS), Beidou navigation satellite system (beidou navigation satellite system, BDS), quasi-zenith satellite system (quasi -zenith satellite system, QZSS) and/or satellite based augmentation systems (SBAS).
  • global positioning system global positioning system, GPS
  • global navigation satellite system global navigation satellite system, GLONASS
  • Beidou navigation satellite system beidou navigation satellite system, BDS
  • quasi-zenith satellite system quadsi -zenith satellite system, QZSS
  • SBAS satellite based augmentation systems
  • the first terminal device 100 implements a display function through a GPU, a display screen 194, an application processor, and the like.
  • the GPU is a microprocessor for image processing, and is connected to the display screen 194 and the application processor.
  • the GPU is used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
  • Display screen 194 is used to display images, videos, and the like.
  • Display screen 194 includes a display panel.
  • the display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode or an active-matrix organic light-emitting diode (active-matrix organic light).
  • LED diode AMOLED
  • flexible light-emitting diode flexible light-emitting diode (flex light-emitting diode, FLED), Miniled, MicroLed, Micro-oLed, quantum dot light-emitting diode (quantum dot light emitting diodes, QLED) and so on.
  • the first terminal device 100 may include 1 or N display screens 194 , where N is a positive integer greater than 1.
  • the first terminal device 100 may implement a shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
  • the ISP is used to process the data fed back by the camera 193 .
  • the shutter is opened, the light is transmitted to the camera photosensitive element through the lens, the light signal is converted into an electrical signal, and the camera photosensitive element transmits the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye.
  • ISP can also perform algorithm optimization on image noise, brightness, and skin tone.
  • ISP can also optimize the exposure, color temperature and other parameters of the shooting scene.
  • the ISP may be provided in the camera 193 .
  • the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the optical signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal.
  • the ISP outputs the digital image signal to the DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other formats of image signals.
  • the first terminal device 100 may include 1 or N cameras 193 , where N is a positive integer greater than 1.
  • a digital signal processor is used to process digital signals, in addition to processing digital image signals, it can also process other digital signals. For example, when the first terminal device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy, and the like.
  • Video codecs are used to compress or decompress digital video.
  • the first terminal device 100 may support one or more video codecs.
  • the first terminal device 100 can play or record videos in multiple encoding formats, such as: moving picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, and so on.
  • MPEG moving picture experts group
  • the NPU is a neural-network (NN) computing processor.
  • NN neural-network
  • Applications such as intelligent cognition of the first terminal device 100 can be implemented through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, and the like.
  • the external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the first terminal device 100.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to realize the data storage function. For example to save files like music, video etc in external memory card.
  • Internal memory 121 may be used to store computer executable program code, which includes instructions.
  • the processor 110 executes various functional applications and data processing of the first terminal device 100 by executing the instructions stored in the internal memory 121 .
  • the internal memory 121 may include a storage program area and a storage data area.
  • the storage program area can store an operating system, an application program required for at least one function (such as a sound playback function, an image playback function, etc.), and the like.
  • the storage data area may store data (such as audio data, phone book, etc.) created during the use of the first terminal device 100 and the like.
  • the internal memory 121 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (UFS), and the like.
  • the first terminal device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playback, recording, etc.
  • the audio module 170 is used for converting digital audio information into analog audio signal output, and also for converting analog audio input into digital audio signal. Audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be provided in the processor 110 , or some functional modules of the audio module 170 may be provided in the processor 110 .
  • Speaker 170A also referred to as a "speaker" is used to convert audio electrical signals into sound signals.
  • the first terminal device 100 can listen to music through the speaker 170A, or listen to a hands-free call.
  • the receiver 170B also referred to as "earpiece" is used to convert audio electrical signals into sound signals.
  • the voice can be answered by placing the receiver 170B close to the human ear.
  • the microphone 170C also called “microphone” or “microphone” is used to convert sound signals into electrical signals.
  • the user can make a sound by approaching the microphone 170C through a human mouth, and input the sound signal into the microphone 170C.
  • the first terminal device 100 may be provided with at least one microphone 170C.
  • the first terminal device 100 may be provided with two microphones 170C, which may implement a noise reduction function in addition to collecting sound signals.
  • the first terminal device 100 may also be provided with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions.
  • the earphone jack 170D is used to connect wired earphones.
  • the earphone interface 170D may be the USB interface 130, or may be a 3.5mm open mobile terminal platform (OMTP) standard interface, a cellular telecommunications industry association of the USA (CTIA) standard interface.
  • OMTP open mobile terminal platform
  • CTIA cellular telecommunications industry association of the USA
  • the pressure sensor 180A is used to sense pressure signals, and can convert the pressure signals into electrical signals.
  • the pressure sensor 180A may be provided on the display screen 194 .
  • the gyro sensor 180B may be used to determine the motion attitude of the first terminal device 100 .
  • the angular velocity of the first terminal device 100 about three axes ie, x, y and z axes
  • the gyro sensor 180B can be used for image stabilization.
  • the gyro sensor 180B can also be used for navigation and somatosensory game scenarios.
  • the air pressure sensor 180C is used to measure air pressure.
  • the first terminal device 100 calculates the altitude through the air pressure value measured by the air pressure sensor 180C to assist in positioning and navigation.
  • the magnetic sensor 180D includes a Hall sensor.
  • the first terminal device 100 can use the magnetic sensor 180D to detect the opening and closing of the flip holster.
  • the acceleration sensor 180E can detect the magnitude of the acceleration of the first terminal device 100 in various directions (generally three axes). When the first terminal device 100 is stationary, the magnitude and direction of gravity can be detected. It can also be used to identify the posture of terminal devices, and can be used in applications such as horizontal and vertical screen switching, pedometers, etc.
  • the first terminal device 100 may measure the distance through infrared or laser. In some embodiments, when shooting a scene, the first terminal device 100 can use the distance sensor 180F to measure the distance to achieve fast focusing.
  • Proximity light sensor 180G may include, for example, light emitting diodes (LEDs) and light detectors, such as photodiodes.
  • the light emitting diodes may be infrared light emitting diodes.
  • the first terminal device 100 emits infrared light to the outside through the light emitting diode.
  • the first terminal device 100 uses a photodiode to detect infrared reflected light from nearby objects, so as to automatically turn off the screen to save power.
  • Proximity light sensor 180G can also be used in holster mode, pocket mode automatically unlocks and locks the screen.
  • the ambient light sensor 180L is used to sense ambient light brightness.
  • the first terminal device 100 can adaptively adjust the brightness of the display screen 194 according to the perceived ambient light brightness.
  • the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
  • the ambient light sensor 180L may also cooperate with the proximity light sensor 180G to detect whether the first terminal device 100 is in a pocket, so as to prevent accidental touch.
  • the fingerprint sensor 180H is used to collect fingerprints.
  • the first terminal device 100 can use the collected fingerprint characteristics to realize fingerprint unlocking, accessing application locks, taking photos with fingerprints, answering incoming calls with fingerprints, and the like.
  • the temperature sensor 180J is used to detect the temperature.
  • the first terminal device 100 uses the temperature detected by the temperature sensor 180J to execute the temperature processing strategy.
  • Touch sensor 180K also called “touch panel”.
  • the touch sensor 180K may be disposed on the display screen 194 , and the touch sensor 180K and the display screen 194 form a touch screen, also called a “touch screen”.
  • the touch sensor 180K is used to detect a touch operation on or near it.
  • the touch sensor can pass the detected touch operation to the application processor to determine the type of touch event.
  • Visual output related to touch operations may be provided through display screen 194 .
  • the touch sensor 180K may also be disposed on the surface of the first terminal device 100 , which is different from the position where the display screen 194 is located.
  • the bone conduction sensor 180M can acquire vibration signals. In some embodiments, the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human voice.
  • the keys 190 include a power-on key, a volume key, and the like. Keys 190 may be mechanical keys. It can also be a touch key.
  • the first terminal device 100 may receive key input, and generate key signal input related to user settings and function control of the first terminal device 100 .
  • Motor 191 can generate vibrating cues.
  • the motor 191 can be used for vibrating alerts for incoming calls, and can also be used for touch vibration feedback.
  • touch operations acting on different applications can correspond to different vibration feedback effects.
  • the motor 191 can also correspond to different vibration feedback effects for touch operations on different areas of the display screen 194 .
  • Different application scenarios for example: time reminder, receiving information, alarm clock, games, etc.
  • the touch vibration feedback effect can also support customization.
  • the indicator 192 can be an indicator light, which can be used to indicate the charging state, the change of the power, and can also be used to indicate a message, a missed call, a notification, and the like.
  • the SIM card interface 195 is used to connect a SIM card.
  • the SIM card can be connected to and separated from the first terminal device 100 by inserting into the SIM card interface 195 or pulling out from the SIM card interface 195 .
  • the first terminal device 100 may support 1 or N SIM card interfaces, where N is a positive integer greater than 1.
  • the SIM card interface 195 can support Nano SIM card, Micro SIM card, SIM card and so on. Multiple cards can be inserted into the same SIM card interface 195 at the same time. The types of the plurality of cards may be the same or different.
  • the SIM card interface 195 can also be compatible with different types of SIM cards.
  • the SIM card interface 195 is also compatible with external memory cards.
  • the first terminal device 100 interacts with the network through the SIM card to implement functions such as call and data communication.
  • the first terminal device 100 adopts an eSIM, that is, an embedded SIM card.
  • the eSIM card can be embedded in the first terminal device 100 and cannot be separated from the first terminal device 100 .
  • the software system of the first terminal device 100 may adopt a layered architecture, an event-driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture.
  • the embodiment of the present invention takes the Android system with a layered architecture as an example to exemplarily describe the software structure of the first terminal device 100 .
  • FIG. 3 is a software structural block diagram of the first terminal device 100 according to the embodiment of the present application.
  • the layered architecture divides the software into several layers, and each layer has a clear role and division of labor. Layers communicate with each other through software interfaces.
  • the Android system is divided into four layers, which are, from top to bottom, an application layer, an application framework layer, an Android runtime (Android runtime) and a system library, and a kernel layer.
  • the application layer can include a series of application packages. As shown in Figure 3, the application package can include applications such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, short message and so on.
  • applications such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, short message and so on.
  • the application framework layer provides an application programming interface (application programming interface, API) and a programming framework for applications in the application layer.
  • the application framework layer includes some predefined functions. As shown in Figure 3, the application framework layer may include window managers, content providers, view systems, telephony managers, resource managers, notification managers, and the like.
  • a window manager is used to manage window programs.
  • the window manager can get the size of the display screen, determine whether there is a status bar, lock the screen, take screenshots, etc.
  • Content providers are used to store and retrieve data and make these data accessible to applications.
  • the data may include video, images, audio, calls made and received, browsing history and bookmarks, phone book, etc.
  • the view system includes visual controls, such as controls for displaying text, controls for displaying pictures, and so on. View systems can be used to build applications.
  • a display interface can consist of one or more views.
  • the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
  • the telephony manager is used to provide the communication function of the first terminal device 100 .
  • the management of call status including connecting, hanging up, etc.).
  • the resource manager provides various resources for the application, such as localization strings, icons, pictures, layout files, video files and so on.
  • the notification manager enables applications to display notification information in the status bar, which can be used to convey notification-type messages, and can disappear automatically after a brief pause without user interaction. For example, the notification manager is used to notify download completion, message reminders, etc.
  • the notification manager can also display notifications in the status bar at the top of the system in the form of graphs or scroll bar text, such as notifications from applications running in the background, and notifications on the screen in the form of dialog windows. For example, text information is prompted in the status bar, a prompt sound is issued, the electronic device vibrates, and the indicator light flashes.
  • Android Runtime includes core libraries and a virtual machine. Android runtime is responsible for scheduling and management of the Android system.
  • the core library consists of two parts: one is the function functions that the java language needs to call, and the other is the core library of Android.
  • the application layer and the application framework layer run in virtual machines.
  • the virtual machine executes the java files of the application layer and the application framework layer as binary files.
  • the virtual machine is used to perform functions such as object lifecycle management, stack management, thread management, safety and exception management, and garbage collection.
  • a system library can include multiple functional modules. For example: surface manager (surface manager), media library (Media Libraries), 3D graphics processing library (eg: OpenGL ES), 2D graphics engine (eg: SGL), etc.
  • surface manager surface manager
  • media library Media Libraries
  • 3D graphics processing library eg: OpenGL ES
  • 2D graphics engine eg: SGL
  • the Surface Manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
  • the media library supports playback and recording of a variety of commonly used audio and video formats, as well as still image files.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, compositing, and layer processing.
  • 2D graphics engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least display drivers, camera drivers, audio drivers, and sensor drivers.
  • FIG. 4 is a schematic flowchart of a privacy risk feedback method provided by an embodiment of the present application.
  • the privacy risk feedback method includes the following steps 401 to 404 , and the execution subject of the method shown in FIG. 4 may be a first terminal device.
  • the execution body of the method shown in FIG. 4 may be a chip in the first terminal device.
  • FIG. 4 takes the first terminal device as an execution subject as an example for description. in:
  • the first terminal device acquires the privacy information entry of the application.
  • the privacy information items of the application program are obtained by analyzing the privacy protocol of the application program, wherein these privacy information items correspond to privacy operations.
  • an application's privacy agreement contains the contents of Table 1:
  • the privacy information items of the application program include address book, device information, location information, and the like.
  • analysis technology of the privacy protocol includes but is not limited to manual analysis, pattern matching, and natural language processing, which is not limited here.
  • the first terminal device needs to obtain the privacy information entry of the application again.
  • privacy operations can be classified more fine-grained according to certain attributes. Based on this method, it is convenient to determine the privacy risk parameter of the application program more accurately in the future.
  • the privacy operation includes processing the location information and processing the address book.
  • the privacy operation can be divided into reading the location information, writing the location information, reading the address book and writing the address book.
  • the first terminal device acquires the privacy operation triggered by the application.
  • the first terminal device acquires in real time the privacy operation triggered by the application
  • the triggered privacy operation may be an application programming interface (Application Programming Interface, API) call or the like.
  • API Application Programming Interface
  • the way of managing the triggered privacy operation API includes but is not limited to modifying the API interface or hooking the API, which is not limited here.
  • hooking is a technology that intercepts information, changes the program execution flow, and adds new functions. Based on this method, it is convenient to obtain the privacy operation triggered by the application, thereby facilitating the subsequent determination of the privacy risk parameter of the application.
  • the triggered privacy operation is a location information API call
  • the first terminal device modifies or hooks the location information API interface, so as to obtain the privacy operation of the location information API call, so as to facilitate subsequent calls based on the location information API.
  • the privacy action determines the privacy risk parameters for the application.
  • the first terminal device determines a privacy risk parameter of the application based on the privacy information entry and the triggered privacy operation.
  • the privacy risk parameter is used to indicate the privacy risk of the application program, and the so-called privacy risk may be that the application program abuses the user's unauthorized privacy information, and the like. Based on this method, by combining the privacy information entry and the triggered privacy operation acquired in real time, the privacy risk of the application can be accurately determined.
  • the privacy risk parameter may include, but is not limited to, a score or a grade, which is not limited herein.
  • the first terminal device outputs the privacy risk parameter of the application.
  • the first terminal device by outputting the privacy risk parameter of the application, the first terminal device is helpful for the user to accurately determine the privacy risk of the application.
  • the output privacy risk parameters of the application may be broadcast by sound or displayed on a display screen.
  • the first terminal device can display the privacy risk parameter of the application as 80 points by means of a display screen.
  • the output privacy risk parameter is level 6 (the total number of levels of privacy risk parameters is 10)
  • the first terminal device can broadcast the privacy risk parameter of the application as level 6 by sound.
  • the first terminal device determines the privacy risk parameter of the application in combination with the privacy information entry and the triggered privacy operation obtained in real time, without displaying all privacy operation behaviors of the current application, It is clearer and easier to output the privacy risk parameters of the application directly. It can be seen that, by implementing the method described in FIG. 4 , it is beneficial for the user to accurately determine the privacy risk of the application.
  • FIG. 5 is a schematic flowchart of another privacy risk feedback method provided by an embodiment of the present application.
  • the privacy risk feedback method includes the following steps 501 to 505 , and the execution subject of the method shown in FIG. 5 may be a first terminal device. Alternatively, the execution body of the method shown in FIG. 5 may be a chip in the first terminal device.
  • Step 501 is a specific implementation manner of the above-mentioned step 401 .
  • Step 503 is a specific implementation manner of the above-mentioned step 403 .
  • FIG. 5 takes the first terminal device as an execution subject as an example for description. in:
  • the first terminal device acquires the privacy information entry of the application from the server or the second terminal device.
  • the server may be a server or platform of the application market, which can analyze the privacy information items in the privacy protocol of the application program, and correspond these privacy information items with privacy operations (such as privacy-related API interfaces) .
  • privacy operations such as privacy-related API interfaces
  • an application is listed on the application market, and the privacy agreement of the application is uploaded to the application market.
  • the server of the application market analyzes the privacy protocol of the application, and obtains that the privacy information entries of the application are address book, device information, and location information, and corresponds these privacy information entries to the privacy-related API interfaces, as shown in Table 2 shown.
  • Privacy Information Item Privacy-related APIs address book getContactInfo() Device Information getIMEI() location information getLocation()
  • the first terminal device downloads the application and the privacy information item of the application from the server of the application market. It should be noted that the first terminal device may also download the privacy protocol of the application program at the same time.
  • the server of the application market analyzes the privacy information items in the privacy protocol of the application, and compares these privacy information items with the privacy operation correspond.
  • the first terminal device may also acquire the privacy information entry of the application from the second terminal device, and the privacy protocol of the called application on the first terminal device may be placed in the calling application on the second terminal device in the program's privacy agreement.
  • an application A is listed on the application market, and the privacy agreement of the application A is uploaded to the application market.
  • the server of the application market analyzes the privacy protocol of the application program A, obtains that the privacy information items of the application program are address book, device information, and location information, and corresponds these privacy information items to privacy-related API interfaces.
  • the second terminal device downloads the application program A and the privacy information item of the application program A from the server of the application market.
  • the application A is the calling application A on the second terminal device. Therefore, when the second terminal device communicates with the first terminal device for the first time, the privacy information entry of the called application A on the first terminal device needs to be passed, so that the first A terminal device can acquire the privacy information item of the application A from the second terminal device.
  • the second terminal device when the privacy protocol of the application is updated, the second terminal device needs to obtain the privacy information entry of the application again. In addition, when the second terminal device communicates with the first terminal device, the updated privacy information entry of the called application program on the first terminal device is also transmitted.
  • the first terminal device acquires the privacy operation triggered by the application.
  • step 502 and step 504 are the same as the specific implementation manner of the above-mentioned step 402 and step 404, and details are not described here.
  • the first terminal device determines a privacy risk parameter of the application based on the weight value of the triggered privacy operation, the privacy information entry, and the triggered privacy operation.
  • the privacy risk parameter of the application is a score
  • the first terminal device may adopt a weight-based privacy risk scoring method, as follows:
  • obtaining location information For example, suppose there are 4 types of privacy operations, namely obtaining location information, reading address book, obtaining time information, and modifying device information. There are 3 items of privacy information in this application, namely, obtaining location information, reading address book, and obtaining time information.
  • the application has triggered 4 privacy operations, namely, obtaining location information, reading address book, obtaining time information, and modifying device information.
  • the weight value of obtaining location information is 0.2
  • the weight value of reading address book is 0.3.
  • the weight value of obtaining time information is 0.2
  • the weight value of modifying device information is 0.3.
  • the privacy operation of obtaining location information belongs to both the privacy operation triggered by the application and the privacy information entry of the application, so the privacy operation of obtaining location information is recorded as 1 point;
  • the privacy operation belongs to both the privacy operation triggered by the application and the privacy information entry of the application, so the privacy operation of reading the address book is scored as 1 point;
  • the privacy operation of obtaining time information belongs to the privacy operation triggered by the application.
  • the operation also belongs to the privacy information entry of the application, so the privacy operation of the acquisition time is recorded as 1 point;
  • the privacy operation of modifying the device information belongs to the privacy operation triggered by the application, but not the privacy information entry of the application. Therefore, the privacy operation of modifying device information is recorded as -1 point.
  • the recorded score can also be set to any other value; for privacy operations in other situations, such as not belonging to In the case of the privacy operation triggered by the application but belonging to the privacy information item of the application, the recorded score can also be set to an arbitrary value, which is not limited here.
  • the first terminal device outputs the privacy risk parameter of the application.
  • the first terminal device by outputting the privacy risk parameter of the application, the first terminal device is helpful for the user to accurately determine the privacy risk of the application.
  • FIG. 6 shows a schematic diagram of enabling application privacy risk monitoring according to an embodiment of the present application.
  • the setting interface of the first terminal device includes an application privacy risk monitoring switch.
  • the first terminal device detects that the user clicks or swipes to the right of the application privacy risk monitoring switch, the first terminal device starts to perform steps 501 to 504 . Subsequently, when the first terminal device detects that the user clicks or swipes to the left of the application privacy risk monitoring switch again, the first terminal device stops executing steps 501 to 504 .
  • FIG. 7 shows a schematic diagram of displaying a privacy risk parameter according to an embodiment of the present application.
  • the privacy risk parameter of APP1 is 85
  • the privacy risk parameter of APP2 is 65
  • the privacy risk parameter of APP3 is 45.
  • the privacy risk parameters of each application include, but are not limited to, the use of a bar heat map for display.
  • FIG. 8 shows a schematic diagram of application privacy operation information according to an embodiment of the present application.
  • the interface is the privacy operation information of APP1, which includes detailed information of each privacy operation, such as whether to apply for a privacy agreement, whether the user authorizes it, and so on. Taking this interface as an example, you can see that there are acquisition of location information (declared in the privacy agreement), acquisition of device information (risky), identity information acquisition (risky, not yet triggered), etc.
  • FIG. 9 shows a schematic diagram of an application privacy access setting according to an embodiment of the present application.
  • the risky privacy operations of APP1 include obtaining device information, obtaining identity information, obtaining address book, and obtaining location information. The user can close the access to the private information by clicking or swiping to the left on the corresponding access switch of the privacy operation, thereby reducing the privacy risk of the application.
  • the first terminal device prompts the user that the application has a privacy risk.
  • the manner in which the first terminal device prompts the user that the application has a privacy risk may be a voice broadcast or a display screen prompt.
  • the privacy risk parameter of the application program determined at this time is 45 points
  • the privacy risk parameter of the application program is less than the preset value
  • the first terminal device prompts the user through a voice broadcast that the application program has Privacy Risk.
  • FIG. 10 shows a schematic diagram of a privacy risk prompt according to an embodiment of the present application. Assuming that the preset value is 60 points, the determined privacy risk parameter of the application “Music” at this time is 45 points, and the privacy risk parameter of the application “Music” is less than the preset value, and the first terminal device will pop up a prompt on the display screen. box, prompting users that the app "Music" poses a privacy risk.
  • FIG. 11 shows a schematic diagram of pushing information according to an embodiment of the present application.
  • the first terminal device determines that the application “Music” has a privacy risk
  • it initiates a push message to the user.
  • the application “Music” has a privacy risk, which is similar to the application “Music” and has a low privacy risk.
  • Recommended apps include: Listening to Sound, Tick-tock Music, etc.
  • the first terminal device may prompt the user whether to prohibit the use of the application when the number of times that the application program has a privacy risk exceeds the preset number of times to the user.
  • FIG. 12 shows a schematic diagram of prompt information for determining whether to disable an application according to an embodiment of the present application.
  • the first terminal device prompts the application "Music" to have a privacy risk for 9 times, and the preset number of times is 6.
  • the first terminal device prompts the user for the application.
  • the first terminal device pops up a prompt box on the display screen to prompt the user whether to disable the application "music".
  • the first terminal device combines the privacy information entry and the triggered privacy operation obtained in real time, and determines the privacy risk parameter of the application based on the weight value of the triggered privacy operation, and the user
  • the privacy risk parameters of the application can be viewed, and the user will be actively prompted in real time when the application has privacy risks. It can be seen that, by implementing the method described in FIG. 5 , it is beneficial for the user to accurately determine the privacy risk of the application.
  • FIG. 13 is a schematic flowchart of another privacy risk feedback method provided by an embodiment of the present application.
  • the privacy risk feedback method includes the following steps 1301 to 1305 , and the execution subject of the method shown in FIG. 13 may be a first terminal device. Alternatively, the execution body of the method shown in FIG. 13 may be a chip in the first terminal device.
  • Step 1301 is a specific implementation manner of the above-mentioned step 401 .
  • Step 1303 is a specific implementation manner of the above-mentioned step 403 .
  • FIG. 13 takes the first terminal device as an execution subject as an example for description. in:
  • the first terminal device acquires the privacy information entry of the application from the server or the second terminal device.
  • step 1301 , step 1302 , step 1304 and step 1305 is the same as the specific implementation manner of above-mentioned step 501 , step 502 , step 504 and step 505 , and will not be repeated here.
  • the first terminal device acquires the privacy operation triggered by the application.
  • the first terminal device determines the privacy risk parameter of the application based on the privacy risk parameter determination model, the privacy information entry, and the triggered privacy operation.
  • the privacy risk parameter of the application is a score
  • the first terminal device may adopt a privacy risk scoring method based on a machine learning model, as follows:
  • obtaining location information For example, suppose there are 4 types of privacy operations, namely obtaining location information, reading address book, obtaining time information, and modifying device information. There are 3 items of privacy information in this application, namely, obtaining location information, reading address book, and obtaining time information. The app has triggered 4 privacy operations, namely obtaining location information, reading address book, obtaining time information, and modifying device information.
  • the privacy operation of obtaining location information belongs to both the privacy operation triggered by the application and the privacy information entry of the application, so the privacy operation of obtaining location information is recorded as 1 point;
  • the privacy operation belongs to both the privacy operation triggered by the application and the privacy information entry of the application, so the privacy operation of reading the address book is scored as 1 point;
  • the privacy operation of obtaining time information belongs to the privacy operation triggered by the application.
  • the operation also belongs to the privacy information entry of the application, so the privacy operation of the acquisition time is recorded as 1 point;
  • the first terminal device outputs the privacy risk parameter of the application.
  • the first terminal device prompts the user that the application has a privacy risk.
  • the first terminal device determines the privacy risk parameters of the application based on the privacy risk parameter determination model based on the privacy information entry and the triggered privacy operation obtained in real time. You can view the privacy risk parameters of the program. When the application has privacy risks, it will also actively prompt the user in real time. It can be seen that, by implementing the method described in FIG. 13 , it is beneficial for the user to accurately determine the privacy risk of the application.
  • FIG. 14 shows a schematic structural diagram of a privacy risk feedback device according to an embodiment of the present application.
  • the apparatus shown in FIG. 14 may be used to execute part or all of the functions of the first terminal device in the method embodiments described in the foregoing FIG. 4 , FIG. 5 and FIG. 13 .
  • the device may also be a chip system.
  • the privacy risk feedback device 140 shown in FIG. 14 may include an acquisition unit 1401 , a determination unit 1402 and an output unit 1403 . in:
  • the obtaining unit 1401 is configured to obtain the privacy information entry of the application.
  • the obtaining unit 1401 is further configured to obtain the privacy operation triggered by the application.
  • the determining unit 1402 is configured to determine a privacy risk parameter of the application based on the privacy information entry and the triggered privacy operation, where the privacy risk parameter indicates the privacy risk of the application.
  • the output unit 1403 is configured to output the privacy risk parameter of the application.
  • the manner in which the determining unit 1402 determines the privacy risk parameter of the application based on the privacy information entry and the triggered privacy operation is specifically: the determining unit 1402 is based on the weight value of the triggered privacy operation. , the privacy information entry, and the triggered privacy operation to determine the privacy risk parameter of the application.
  • the manner in which the determining unit 1402 determines the privacy risk parameter of the application based on the privacy information entry and the triggered privacy operation is as follows: the determining unit 1402 determines the model based on the privacy risk parameter, the privacy information The entry and the triggered privacy action determine the privacy risk parameters for the application.
  • the device further includes a prompting unit configured to: when the privacy risk parameter of the application is less than a preset value, prompting the user that the application has a privacy risk.
  • the manner in which the obtaining unit 1403 obtains the privacy information item of the application program is specifically: the obtaining unit obtains the privacy information item of the application program from the server or the second terminal device.
  • the privacy risk parameter is a score or rating.
  • Embodiments of the present application also provide a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the computer or processor is run on a computer or a processor, the computer or the processor is made to execute any one of the above methods. or multiple steps.
  • Embodiments of the present application also provide a computer program product including instructions.
  • the computer program product when run on a computer or processor, causes the computer or processor to perform one or more steps of any of the above methods.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted over a computer-readable storage medium. The computer instructions can be sent from one website site, computer, server or data center to another website site, computer, server or data center for transmission.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVDs), or semiconductor media (eg, solid state disks (SSDs)), and the like.
  • the process can be completed by instructing the relevant hardware by a computer program, and the program can be stored in a computer-readable storage medium.
  • the program When the program is executed , which may include the processes of the foregoing method embodiments.
  • the aforementioned storage medium includes: ROM or random storage memory RAM, magnetic disk or optical disk and other mediums that can store program codes.

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephone Function (AREA)

Abstract

本申请公开了一种隐私风险反馈方法、装置及第一终端设备,该方法包括:第一终端设备获取应用程序的隐私信息条目;该第一终端设备获取该应用程序已触发的隐私操作;该第一终端设备基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数,该隐私风险参数指示该应用程序的隐私风险;该第一终端设备输出该应用程序的隐私风险参数。可见,基于本申请所描述的方法,有利于用户准确地确定应用程序的隐私风险。

Description

一种隐私风险反馈方法、装置及第一终端设备
本申请要求于2021年2月25日提交中国专利局、申请号为202110211606.X、申请名称为“一种隐私风险反馈方法、装置及第一终端设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种隐私风险反馈方法、装置及第一终端设备。
背景技术
目前,应用程序(Application,APP)滥用用户隐私的行为越来越多。随着用户更加关注自身的隐私数据,隐私保护已成为移动终端系统的一个卖点,各种移动终端系统均不断收紧隐私相关的权限。在终端设备下载应用程序并运行应用程序的过程中,如何裁定该应用程序是否滥用用户的隐私数据,保护用户的隐私数据,是当前关注的问题。
当前,某些移动终端系统提供有“照明弹”功能,即允许用户查看APP的敏感行为,按时间顺序列出当前应用程序所有的敏感行为,比如读取联系人、获取位置信息等。但这样的方式对于普通用户不易理解APP展示的所有行为序列,从而导致用户无法辨别应用程序的隐私风险。
发明内容
本申请提供了一种隐私风险反馈方法、装置及第一终端设备,有利于用户准确地确定应用程序的隐私风险。
第一方面,本申请提供了一种隐私风险反馈方法,该方法包括:第一终端设备获取应用程序的隐私信息条目;该第一终端设备获取该应用程序已触发的隐私操作;该第一终端设备基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数,该隐私风险参数指示该应用程序的隐私风险;该第一终端设备输出该应用程序的隐私风险参数。
在第一方面所描述的方法中,第一终端设备结合该隐私信息条目和实时获取到的该已触发的隐私操作对应用程序的隐私风险参数进行确定,无需陈列当前应用程序所有的隐私操作行为,直接输出该应用程序的隐私风险参数更加清晰简便。因此,基于第一方面所描述的方法,有利于用户准确地确定应用程序的隐私风险。
在一种可能的实现方式中,该第一终端设备基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数,包括:该第一终端设备基于该已触发的隐私操作的权重值、该隐私信息条目和该已触发的隐私操作,确定该应用程序的隐私风险参数。基于该方式,通过已触发的隐私操作的权重值对应用程序的隐私风险参数进行确定,有利于用户准确地确定应用程序的隐私风险。
在一种可能的实现方式中,该第一终端设备基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数,包括:该第一终端设备基于隐私风险参数确定模型、该隐私信息条目和该已触发的隐私操作,确定该应用程序的隐私风险参数。基于该方式,通过隐 私风险参数确定模型对应用程序的隐私风险参数进行确定,有利于用户准确地确定应用程序的隐私风险。
在一种可能的实现方式中,该方法还包括:当该应用程序的隐私风险参数小于预设值时,该第一终端设备向用户提示该应用程序具有隐私风险。
在一种可能的实现方式中,该第一终端设备获取应用程序的隐私信息条目,包括:该第一终端设备从服务器或第二终端设备获取该应用程序的隐私信息条目。
在一种可能的实现方式中,该隐私风险参数为分数或等级。
第二方面,本申请提供了一种隐私风险反馈装置,该装置包括获取单元、确定单元和输出单元,其中:该获取单元,用于获取应用程序的隐私信息条目;该获取单元,还用于获取该应用程序已触发的隐私操作;该确定单元,用于基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数,该隐私风险参数指示该应用程序的隐私风险;该输出单元,用于输出该应用程序的隐私风险参数。
在一种可能的实现方式中,该确定单元基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数的方式具体为:该确定单元基于该已触发的隐私操作的权重值、该隐私信息条目和该已触发的隐私操作,确定该应用程序的隐私风险参数。
在一种可能的实现方式中,该确定单元基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数的方式具体为:该确定单元基于隐私风险参数确定模型、该隐私信息条目和该已触发的隐私操作,确定该应用程序的隐私风险参数。
在一种可能的实现方式中,该装置还包括提示单元,该提示单元用于:当该应用程序的隐私风险参数小于预设值时,向用户提示该应用程序具有隐私风险。
在一种可能的实现方式中,该获取单元获取应用程序的隐私信息条目的方式具体为:该获取单元从服务器或第二终端设备获取该应用程序的隐私信息条目。
在一种可能的实现方式中,该隐私风险参数为分数或等级。
第三方面,本申请实施例提供了一种第一终端设备,第一终端设备包括存储器和至少一个处理器;存储器与一个或多个处理器耦合,存储用于存储计算机程序代码,计算机程序代码包括计算机指令,当一个或多个处理器执行计算机指令时,使得第一终端设备执行如第一方面或第一方面下的任意一种可能的实现方式所描述的方法。
第四方面,本申请实施例提供了一种计算机存储介质,包括计算机指令,当计算机指令在第一终端设备上运行时,使得第一终端设备执行如第一方面或第一方面下的任意一种可能的实现方式所描述的方法。
第五方面,本申请实施例提供一种计算机程序产品,当计算机程序产品在计算机上运行时,使得计算机执行如第一方面或第一方面下的任意一种可能的实现方式所描述的方法。
附图说明
图1是本申请实施例提供的一种系统架构的示意图;
图2是本申请实施例提供的第一终端设备100的结构示意图;
图3是本申请实施例提供的第一终端设备100的软件结构框图;
图4是本申请实施例提供的一种隐私风险反馈的流程示意图;
图5是本申请实施例提供的另一种隐私风险反馈的流程示意图;
图6是本申请实施例提供的一种开启应用程序隐私风险监测的示意图;
图7是本申请实施例提供的一种隐私风险参数展示的示意图;
图8是本申请实施例提供的一种应用程序隐私操作信息的示意图;
图9是本申请实施例提供的一种应用程序隐私访问设置的示意图;
图10是本申请实施例提供的一种隐私风险提示的示意图;
图11是本申请实施例提供的一种推送信息的示意图;
图12是本申请实施例提供的一种确定是否禁用应用程序的提示信息的示意图;
图13是本申请实施例提供的又一种隐私风险反馈的流程示意图;
图14是本申请实施例提供的一种隐私风险反馈装置的结构示意图。
具体实施方式
下面结合附图对本申请具体实施例作进一步的详细描述。
本申请的说明书、权利要求书及附图中的术语“第一”和“第二”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
在本申请中,“至少一个(项)”是指一个或者多个,“多个”是指两个或两个以上,“至少两个(项)”是指两个或三个及三个以上,“和/或”,用于描述关联对象的关联关系,表示可以存在三种关系,例如,“A和/或B”可以表示:只存在A,只存在B以及同时存在A和B三种情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b或c中的至少一项(个),可以表示:a,b,c,“a和b”,“a和c”,“b和c”,或“a和b和c”,其中a,b,c可以是单个,也可以是多个。
为了更好地理解本申请实施例,下面首先对本申请实施例涉及的系统架构进行介绍:
请参阅图1,图1是本申请实施例提供的一种系统架构的示意图。系统架构10包括第一终端设备100和服务器200。图1以系统架构10包括一个第一终端设备100和一个服务器200为例。当然系统架构10还可包括多个第一终端设备100和多个服务器200,本申请实施例不做限定。
其中,第一终端设备100可以为手机、平板电脑、遥控器或具备无线通讯功能的可穿戴电子设备(如智能手表、AR眼镜)等等。服务器200可以为应用市场服务器或平台,可以对应用程序的隐私协议进行分析得到应用程序的隐私信息条目。
下面对第一终端设备100的结构进行介绍。请参阅图2,图2是本申请实施例提供的第一终端设备100的结构示意图。
第一终端设备100可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A, 受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。
可以理解的是,本发明实施例示意的结构并不构成对第一终端设备100的具体限定。在本申请另一些实施例中,第一终端设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
其中,控制器可以是第一终端设备100的神经中枢和指挥中心。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。
I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根串行时钟线(derail clock line,SCL)。在一些实施例中,处理器110可以包含多组I2C总线。处理器110可以通过不同的I2C总线接口分别耦合触摸传感器180K,充电器,闪光灯,摄像头193等。例如:处理器110可以通过I2C接口耦合触摸传感器180K,使处理器110与触摸传感器180K通过I2C总线接口通信,实现第一终端设备100的触摸功能。
I2S接口可以用于音频通信。在一些实施例中,处理器110可以包含多组I2S总线。处理器110可以通过I2S总线与音频模块170耦合,实现处理器110与音频模块170之间的通信。在一些实施例中,音频模块170可以通过I2S接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。
PCM接口也可以用于音频通信,将模拟信号抽样,量化和编码。在一些实施例中,音频模块170与无线通信模块160可以通过PCM接口通信。在一些实施例中,音频模块170也可以通过PCM接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。所 述I2S接口和所述PCM接口都可以用于音频通信。
UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在串行通信与并行通信之间转换。在一些实施例中,UART接口通常被用于连接处理器110与无线通信模块160。例如:处理器110通过UART接口与无线通信模块160中的蓝牙模块通信,实现蓝牙功能。在一些实施例中,音频模块170可以通过UART接口向无线通信模块160传递音频信号,实现通过蓝牙耳机播放音乐的功能。
MIPI接口可以被用于连接处理器110与显示屏194,摄像头193等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI),显示屏串行接口(display serial interface,DSI)等。在一些实施例中,处理器110和摄像头193通过CSI接口通信,实现第一终端设备100的拍摄功能。处理器110和显示屏194通过DSI接口通信,实现第一终端设备100的显示功能。
GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据信号。在一些实施例中,GPIO接口可以用于连接处理器110与摄像头193,显示屏194,无线通信模块160,音频模块170,传感器模块180等。GPIO接口还可以被配置为I2C接口,I2S接口,UART接口,MIPI接口等。
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为第一终端设备100充电,也可以用于第一终端设备100与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他电子设备,例如AR设备等。
可以理解的是,本发明实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对第一终端设备100的结构限定。在本申请另一些实施例中,第一终端设备100也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,外部存储器,显示屏194,摄像头193,和无线通信模块160等供电在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。
第一终端设备100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。
天线1和天线2用于发射和接收电磁波信号。第一终端设备100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在第一终端设备100上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A,受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。
无线通信模块160可以提供应用在第一终端设备100上的包括无线局域网(wireless local area networks,WLAN)(如Wi-Fi网络),蓝牙(bluetooth,BT),BLE广播,全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,第一终端设备100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得第一终端设备100可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
第一终端设备100通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,第一终端设备100可以包括1个或N个显示屏194,N为大于1的正整数。
第一终端设备100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度,肤色进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,第一终端设备100可以包括1个或N个摄像头193,N为大于1的正整数。
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当第一终端设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。
视频编解码器用于对数字视频压缩或解压缩。第一终端设备100可以支持一种或多种视频编解码器。这样,第一终端设备100可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现第一终端设备100的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展第一终端设备100的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。
内部存储器121可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行第一终端设备100的各种功能应用以及数据处理。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)等。存储数据区可存储第一终端设备100使用过程中所创建的数据(比如音频数据,电话本等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。
第一终端设备100可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。第一终端设备100可以通过扬声器170A收听音乐,或收听免提通话。
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当第一终端设备100接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。第一终端设备100可以设置至少一个麦克风170C。在另一些实施例中,第一终端设备100可以设置两个麦克风170C,除了采集声音信号,还可以实现降噪功能。在另一些实施例中,第一终端设备100还可以设置三个,四个或更多麦克风170C,实现采集声音信号,降噪,还可 以识别声音来源,实现定向录音功能等。
耳机接口170D用于连接有线耳机。耳机接口170D可以是USB接口130,也可以是3.5mm的开放移动电子设备平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中,压力传感器180A可以设置于显示屏194。
陀螺仪传感器180B可以用于确定第一终端设备100的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定第一终端设备100围绕三个轴(即,x,y和z轴)的角速度。陀螺仪传感器180B可以用于拍摄防抖。陀螺仪传感器180B还可以用于导航,体感游戏场景。
气压传感器180C用于测量气压。在一些实施例中,第一终端设备100通过气压传感器180C测得的气压值计算海拔高度,辅助定位和导航。
磁传感器180D包括霍尔传感器。第一终端设备100可以利用磁传感器180D检测翻盖皮套的开合。
加速度传感器180E可检测第一终端设备100在各个方向上(一般为三轴)加速度的大小。当第一终端设备100静止时可检测出重力的大小及方向。还可以用于识别终端设备姿态,应用于横竖屏切换,计步器等应用。
距离传感器180F,用于测量距离。第一终端设备100可以通过红外或激光测量距离。在一些实施例中,拍摄场景,第一终端设备100可以利用距离传感器180F测距以实现快速对焦。
接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。第一终端设备100通过发光二极管向外发射红外光。第一终端设备100使用光电二极管检测来自附近物体的红外反射光,以便自动熄灭屏幕达到省电的目的。接近光传感器180G也可用于皮套模式,口袋模式自动解锁与锁屏。
环境光传感器180L用于感知环境光亮度。第一终端设备100可以根据感知的环境光亮度自适应调节显示屏194亮度。环境光传感器180L也可用于拍照时自动调节白平衡。环境光传感器180L还可以与接近光传感器180G配合,检测第一终端设备100是否在口袋里,以防误触。
指纹传感器180H用于采集指纹。第一终端设备100可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。
温度传感器180J用于检测温度。在一些实施例中,第一终端设备100利用温度传感器180J检测的温度,执行温度处理策略。
触摸传感器180K,也称“触控面板”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于第一终端设备100的表面,与显示屏194所处的位置不同。
骨传导传感器180M可以获取振动信号。在一些实施例中,骨传导传感器180M可以获取人体声部振动骨块的振动信号。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。第一终端设备100可以接收按键输入,产生与第一终端设备100的用户设置以及功能控制有关的键信号输入。
马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反 馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏194不同区域的触摸操作,马达191也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。
指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。
SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和第一终端设备100的接触和分离。第一终端设备100可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口195可以支持Nano SIM卡,Micro SIM卡,SIM卡等。同一个SIM卡接口195可以同时插入多张卡。所述多张卡的类型可以相同,也可以不同。SIM卡接口195也可以兼容不同类型的SIM卡。SIM卡接口195也可以兼容外部存储卡。第一终端设备100通过SIM卡和网络交互,实现通话以及数据通信等功能。在一些实施例中,第一终端设备100采用eSIM,即:嵌入式SIM卡。eSIM卡可以嵌在第一终端设备100中,不能和第一终端设备100分离。
第一终端设备100的软件系统可以采用分层架构,事件驱动架构,微核架构,微服务架构,或云架构。本发明实施例以分层架构的Android系统为例,示例性说明第一终端设备100的软件结构。图3是本申请实施例的第一终端设备100的软件结构框图。分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,以及内核层。
应用程序层可以包括一系列应用程序包。如图3所示,应用程序包可以包括相机,图库,日历,通话,地图,导航,WLAN,蓝牙,音乐,视频,短信息等应用程序。
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。如图3所示,应用程序框架层可以包括窗口管理器,内容提供器,视图系统,电话管理器,资源管理器,通知管理器等。
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。
内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。
电话管理器用于提供第一终端设备100的通信功能。例如通话状态的管理(包括接通,挂断等)。
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后 台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。
Android Runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。
核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。
应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(Media Libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。
2D图形引擎是2D绘图的绘图引擎。
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。
下面对本申请提供的隐私风险反馈方法及装置进一步进行介绍:
请参见图4,图4是本申请实施例提供的一种隐私风险反馈方法的流程示意图。如图4所示,该隐私风险反馈方法包括如下步骤401~步骤404,图4所示的方法执行主体可以为第一终端设备。或者,图4所示的方法执行主体可以为第一终端设备中的芯片。图4以第一终端设备为执行主体为例进行说明。其中:
401、第一终端设备获取应用程序的隐私信息条目。
本申请实施例中,该应用程序的隐私信息条目是通过分析应用程序的隐私协议所得,其中,这些隐私信息条目与隐私操作相对应。例如,一个应用程序的隐私协议包含表1的内容:
表1
Figure PCTCN2022077256-appb-000001
通过对上述隐私协议进行分析,可以获知该应用需要获取通讯录、设备信息、位置信息等信息,因此,该应用程序的隐私信息条目包括通讯录、设备信息、位置信息等。
需要说明的是,隐私协议的分析技术包括但不限于人工分析、模式匹配、自然语言处理, 在此不作限定。
在一种可能的实现中,当应用程序的隐私协议进行了更新时,第一终端设备需要重新获取应用程序的隐私信息条目。
在一种可能的实现中,隐私操作可以根据一定属性更细粒度地进行分类。基于该方式,便于后续能够更精确的确定该应用程序的隐私风险参数。
例如,该隐私操作包括处理位置信息和处理通讯录,根据读写属性,可以将该隐私操作分为读取位置信息、写入位置信息、读取通讯录和写入通讯录。
402、第一终端设备获取该应用程序已触发的隐私操作。
本申请实施例中,第一终端设备实时获取该应用程序已触发的隐私操作,该已触发的隐私操作可以为应用程序编程接口(Application Programming Interface,API)调用等。当已触发的隐私操作为API调用时,可以通过预先对已触发的隐私操作API打点以便获取已触发的隐私操作。其中,对已触发的隐私操作API打点的方式包括但不限于对API接口进行修改或API钩取,在此不作限定。所谓的钩取,是一种截取信息、更改程序执行流向、添加新功能的技术。基于该方式,便于获取该应用程序已触发的隐私操作,从而便于后续确定该应用程序的隐私风险参数。
例如,已触发的隐私操作为位置信息API调用,第一终端设备对该位置信息API接口进行修改或钩取,从而获取到该位置信息API调用的隐私操作,以便后续基于该位置信息API调用的隐私操作确定该应用程序的隐私风险参数。
403、第一终端设备基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数。
本申请实施例中,该隐私风险参数用于指示该应用程序的隐私风险,所谓的隐私风险可以是应用程序滥用用户未授权的隐私信息等。基于该方式,通过结合该隐私信息条目和实时获取到的该已触发的隐私操作,能够准确地确定应用程序的隐私风险。
在一种可能的实现中,该隐私风险参数可以为包括但不限于分数或等级,在此不作限定。
404、第一终端设备输出该应用程序的隐私风险参数。
本申请实施例中,第一终端设备通过输出该应用程序的隐私风险参数,有利于用户准确地确定应用程序的隐私风险。
在一种可能的实现中,输出的该应用程序的隐私风险参数可以通过声音播报或者通过显示屏展示。例如,当输出的隐私风险参数为80分时,第一终端设备可以通过显示屏的方式展示该应用程序的隐私风险参数为80分。又例如,当输出的隐私风险参数为6级(隐私风险参数的总级数为10级)时,第一终端设备可以通过声音的方式播报该应用程序的隐私风险参数为6级。
在图4所描述的方法中,第一终端设备结合该隐私信息条目和实时获取到的该已触发的隐私操作对应用程序的隐私风险参数进行确定,无需陈列当前应用程序所有的隐私操作行为,直接输出该应用程序的隐私风险参数更加清晰简便。可见,通过实施图4所描述的方法,有利于用户准确地确定应用程序的隐私风险。
请参见图5,图5是本申请实施例提供的另一种隐私风险反馈方法的流程示意图。如图5所示,该隐私风险反馈方法包括如下步骤501~步骤505,图5所示的方法执行主体可以为第一终端设备。或者,图5所示的方法执行主体可以为第一终端设备中的芯片。步骤501为上述步骤401的一种具体的实现方式。步骤503为上述步骤403的一种具体的实现方式。图5 以第一终端设备为执行主体为例进行说明。其中:
501、第一终端设备从服务器或第二终端设备获取应用程序的隐私信息条目。
本申请实施例中,该服务器可以是应用市场的服务器或平台,能够分析出该应用程序的隐私协议中的隐私信息条目,并将这些隐私信息条目与隐私操作(如隐私相关的API接口)对应。例如,一个应用程序上架到应用市场,以及将该应用程序的隐私协议上传至应用市场。该应用市场的服务器对该应用程序的隐私协议进行分析,得到该应用程序的隐私信息条目为通讯录、设备信息、位置信息,并将这些隐私信息条目与隐私相关的API接口对应,如表2所示。
表2
隐私信息条目 隐私相关的API接口
通讯录 getContactInfo()
设备信息 getIMEI()
位置信息 getLocation()
第一终端设备从应用市场的服务器下载该应用程序和该应用程序的隐私信息条目。需要说明的是,第一终端设备也可以同时对该应用程序的隐私协议进行下载。
在一种可能的实现中,在第一终端设备下载该应用程序的隐私协议之后,应用市场的服务器再分析出该应用程序的隐私协议中的隐私信息条目,并将这些隐私信息条目与隐私操作对应。
本申请实施例中,第一终端设备也可以从第二终端设备获取应用程序的隐私信息条目,该第一终端设备上的被调用应用程序的隐私协议可以放置于第二终端设备上的调用应用程序的隐私协议中。
例如,一个应用程序A上架到应用市场,以及将该应用程序A的隐私协议上传至应用市场。该应用市场的服务器对该应用程序A的隐私协议进行分析,得到该应用程序的隐私信息条目为通讯录、设备信息、位置信息,并将这些隐私信息条目与隐私相关的API接口对应。第二终端设备从应用市场的服务器下载该应用程序A和该应用程序A的隐私信息条目。该应用程序A是第二终端设备上的调用应用程序A,因此在第二终端设备与第一终端设备首次通信时,需要传递第一终端设备上被调用应用程序A的隐私信息条目,从而第一终端设备能够从第二终端设备获取应用程序A的隐私信息条目。
在一种可能的实现中,当应用程序的隐私协议进行了更新时,第二终端设备需要重新获取应用程序的隐私信息条目。另外,第二终端设备在与第一终端设备通信时,也要传递第一终端设备上被调用应用程序的更新后的隐私信息条目。
502、第一终端设备获取该应用程序已触发的隐私操作。
其中,步骤502和步骤504的具体实现方式与上述步骤402和步骤404的具体实现方式相同,在此不赘述。
503、第一终端设备基于该已触发的隐私操作的权重值、该隐私信息条目和该已触发的隐私操作,确定该应用程序的隐私风险参数。
本申请实施例中,该应用程序的隐私风险参数为分数,第一终端设备可以采用基于权重值的隐私风险评分方法,如下:
假设有m类隐私操作C={C 1,C 2,...,C m},k条隐私信息条目
Figure PCTCN2022077256-appb-000002
其中,P i∈C。n条应用程序α已触发的隐私操作
Figure PCTCN2022077256-appb-000003
其中,
Figure PCTCN2022077256-appb-000004
预先确定各 个隐私操作的权重值W={w 1,w 2,...,w m},其中,∑w i=1。对于应用程序α,根据k条隐私信息条目
Figure PCTCN2022077256-appb-000005
和已触发的隐私操作
Figure PCTCN2022077256-appb-000006
的分数由公式(1)所得:
Figure PCTCN2022077256-appb-000007
其中s i={1|C i∈P∩C i∈B,-1|else}   (1)
例如,假设有4类隐私操作,分别为获取位置信息、读取通讯录、获取时间信息和修改设备信息。该应用程序的隐私信息条目有3条,分别为获取位置信息、读取通讯录和获取时间信息。该应用程序已触发的隐私操作有4条,分别为获取位置信息、读取通讯录、获取时间信息和修改设备信息,其中获取位置信息的权重值为0.2,读取通讯录的权重值为0.3,获取时间信息的权重值为0.2,修改设备信息的权重值为0.3。通过上述公式(1),获取位置信息的隐私操作既属于该应用程序已触发的隐私操作也属于该应用程序的隐私信息条目,因此获取位置信息的隐私操作记为1分;读取通讯录的隐私操作既属于该应用程序已触发的隐私操作也属于该应用程序的隐私信息条目,因此读取通讯录的隐私操作记为1分;获取时间信息的隐私操作即属于该应用程序已触发的隐私操作,也属于该应用程序的隐私信息条目,因此获取时间的隐私操作记为1分;修改设备信息的隐私操作属于该应用程序已触发的隐私操作,但不属于该应用程序的隐私信息条目,因此修改设备信息的隐私操作记为-1分。利用这些隐私操作记录后的分数乘上对应的权重值,得到该应用程序的隐私风险参数,为0.4分。
需要说明的是,当隐私操作既属于该应用程序已触发的隐私操作也属于该应用程序的隐私信息条目时记录的分数也可以设定为其他任意值;对于其他情况的隐私操作,例如不属于该应用程序已触发的隐私操作但属于该应用程序的隐私信息条目的情况等,记录的分数也可以设定为任意值,在此不作限定。
504、第一终端设备输出该应用程序的隐私风险参数。
本申请实施例中,第一终端设备通过输出该应用程序的隐私风险参数,有利于用户准确地确定应用程序的隐私风险。
在一种可能的实现中,当第一终端设备检测到用户开启应用程序隐私风险监测的操作时,第一终端设备执行步骤501~步骤504。当第一终端设备检测到用户关闭设备控制开关的操作时,第一终端设备可以停止执行步骤501~步骤504。请参见图6,图6示出了本申请实施例的一种开启应用程序隐私风险监测的示意图。如图6所示,第一终端设备的设置界面中包括应用程序隐私风险监测开关。当第一终端设备检测到用户对应用程序隐私风险监测开关的点击或向右滑动操作时,第一终端设备开始执行步骤501~步骤504。后续,在第一终端设备又检测到用户对应用程序隐私风险监测开关的点击或向左滑动操作时,第一终端设备停止执行步骤501~步骤504。
在一种可能的实现中,在用户打开隐私风险参数展示相应的应用APP后(当然该APP也可以在用户打开后一直处于后台运行中),可以显示隐私风险参数展示的界面给用户,该界面包括应用程序列表和各个应用程序的隐私风险参数。请参见图7,图7示出了本申请实施例的一种隐私风险参数展示的示意图。如图7所示,APP1的隐私风险参数为85、APP2的隐私风险参数为65以及APP3的隐私风险参数为45。需要说明的是,各个应用程序的隐私风险参数包括但不限于使用柱状热度图进行展示。
在一种可能的实现中,在用户打开隐私风险参数展示相应的应用APP后,可以查看某个应用程序具体的隐私操作信息,便于用户更好地理解隐私风险。请参见图8,图8示出了本申请实施例的一种应用程序隐私操作信息的示意图。如图8所示,该界面是APP1的隐私操作信息,其中包括每个隐私操作的详细信息,例如隐私协议是否申请、用户是否授权等。以 该界面为例,可以看到有获取位置信息(隐私协议中已申明)、获取设备信息(存在风险)、获取身份信息(存在风险,目前尚未触发)等。
在一种可能的实现中,在用户打开隐私风险参数展示相应的应用APP后,可以对某个应用程序存在风险的隐私操作进行设置。请参见图9,图9示出了本申请实施例的一种应用程序隐私访问设置的示意图。如图9所示,APP1隐私访问设置界面中,APP1存在风险的隐私操作有获取设备信息、获取身份信息、获取通讯录和获取位置信息。用户可以通过对隐私操作相应的访问开关进行点击或向左滑动实现对该隐私信息访问的关闭,从而降低该应用程序的隐私风险。
505、当该应用程序的隐私风险参数小于预设值时,第一终端设备向用户提示该应用程序具有隐私风险。
本申请实施例中,第一终端设备向用户提示该应用程序具有隐私风险的方式可以是语音播报或显示屏提示。
例如,假设预设值为60分,此时确定的该应用程序的隐私风险参数为45分,该应用程序的隐私风险参数小于预设值,第一终端设备通过语音播报提示用户该应用程序具有隐私风险。
又例如,请参见图10,图10示出了本申请实施例的一种隐私风险提示的示意图。假设预设值为60分,此时确定的该应用程序“音乐”的隐私风险参数为45分,该应用程序“音乐”的隐私风险参数小于预设值,第一终端设备通过显示屏弹出提示框,提示用户该应用程序“音乐”存在隐私风险。
在一种可能的实现中,在第一终端设备确定应用程序存在隐私风险后,可以向用户推送与该应用程序功能相似的其他低隐私风险的应用程序,便于用户后续进行下载。请参见图11,图11示出了本申请实施例的一种推送信息的示意图。如图11所示,当第一终端设备确定应用程序“音乐”存在隐私风险后,向用户发起推送信息,例如应用程序“音乐”存在隐私风险,与应用程序“音乐”相似,且低隐私风险的应用程序推荐有:听声、滴答音乐等。
在一种可能的实现中,在预设周期内,第一终端设备向用户提示该应用程序具有隐私风险的次数超过预设次数时,可以向用户提示是否禁止使用该应用程序。请参见图12,图12示出了本申请实施例的一种确定是否禁用应用程序的提示信息的示意图。如图12所示,在1小时时间内,第一终端设备提示应用程序“音乐”存在隐私风险的次数达到9次,预设次数为6次,此时第一终端设备向用户提示该应用程序具有隐私风险的次数超过了预设次数,第一终端设备通过显示屏弹出提示框,提示用户是否禁用应用程序“音乐”。
在图5所描述的方法中,第一终端设备结合该隐私信息条目和实时获取到的该已触发的隐私操作,基于已触发的隐私操作的权重值对应用程序的隐私风险参数进行确定,用户可以对应用程序的隐私风险参数进行查看,当应用程序具有隐私风险时,也会实时主动提示用户。可见,通过实施图5所描述的方法,有利于用户准确地确定应用程序的隐私风险。
请参见图13,图13是本申请实施例提供的又一种隐私风险反馈方法的流程示意图。如图13所示,该隐私风险反馈方法包括如下步骤1301~步骤1305,图13所示的方法执行主体可以为第一终端设备。或者,图13所示的方法执行主体可以为第一终端设备中的芯片。步骤1301为上述步骤401的一种具体的实现方式。步骤1303为上述步骤403的一种具体的实现方式。图13以第一终端设备为执行主体为例进行说明。其中:
1301、第一终端设备从服务器或第二终端设备获取应用程序的隐私信息条目。
其中,步骤1301、步骤1302、步骤1304和步骤1305的具体实现方式与上述步骤501、步骤502、步骤504和步骤505的具体实现方式相同,在此不赘述。
1302、第一终端设备获取该应用程序已触发的隐私操作。
1303、第一终端设备基于隐私风险参数确定模型、该隐私信息条目和该已触发的隐私操作,确定该应用程序的隐私风险参数。
本申请实施例中,该应用程序的隐私风险参数为分数,第一终端设备可以采用基于机器学习模型的隐私风险评分方法,如下:
假设有m类隐私操作C={C 1,C 2,...,C m},k条隐私信息条目
Figure PCTCN2022077256-appb-000008
其中,P i∈C。n条应用程序α已触发的隐私操作
Figure PCTCN2022077256-appb-000009
其中,
Figure PCTCN2022077256-appb-000010
给定训练好的隐私风险参数确定模型y=f(x,σ),对于应用程序α,根据k条隐私信息条目
Figure PCTCN2022077256-appb-000011
和已触发的隐私操作
Figure PCTCN2022077256-appb-000012
的分数由公式(2)和公式(3)所得:
x={x i},其中x i={1|C i∈P∩C i∈B,-1|else}   (2)
Score=f(x,σ)  (3)
例如,假设有4类隐私操作,分别为获取位置信息、读取通讯录、获取时间信息和修改设备信息。该应用程序的隐私信息条目有3条,分别为获取位置信息、读取通讯录和获取时间信息。该应用程序已触发的隐私操作有4条,分别为获取位置信息、读取通讯录、获取时间信息和修改设备信息。通过上述公式(2),获取位置信息的隐私操作既属于该应用程序已触发的隐私操作也属于该应用程序的隐私信息条目,因此获取位置信息的隐私操作记为1分;读取通讯录的隐私操作既属于该应用程序已触发的隐私操作也属于该应用程序的隐私信息条目,因此读取通讯录的隐私操作记为1分;获取时间信息的隐私操作即属于该应用程序已触发的隐私操作,也属于该应用程序的隐私信息条目,因此获取时间的隐私操作记为1分;修改设备信息的隐私操作属于该应用程序已触发的隐私操作,但不属于该应用程序的隐私信息条目,因此修改设备信息的隐私操作记为-1分。因此x={1,1,1,-1},通过公式(3)中的隐私风险参数确定模型y=f(x,σ),得到该应用程序的隐私风险参数,为2.7分。
1304、第一终端设备输出该应用程序的隐私风险参数。
1305、当该应用程序的隐私风险参数小于预设值时,第一终端设备向用户提示该应用程序具有隐私风险。
在图13所描述的方法中,第一终端设备结合该隐私信息条目和实时获取到的该已触发的隐私操作,基于隐私风险参数确定模型对应用程序的隐私风险参数进行确定,用户可以对应用程序的隐私风险参数进行查看,当应用程序具有隐私风险时,也会实时主动提示用户。可见,通过实施图13所描述的方法,有利于用户准确地确定应用程序的隐私风险。
请参见图14,图14示出了本申请实施例的一种隐私风险反馈装置的结构示意图。图14所示的装置可以用于执行上述图4、图5和图13所描述的方法实施例中第一终端设备的部分或全部功能。其中,该装置还可以为芯片系统。图14所示的隐私风险反馈装置140,可以包括获取单元1401、确定单元1402和输出单元1403。其中:
该获取单元1401,用于获取应用程序的隐私信息条目。
该获取单元1401,还用于获取该应用程序已触发的隐私操作。
该确定单元1402,用于基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数,该隐私风险参数指示该应用程序的隐私风险。
该输出单元1403,用于输出该应用程序的隐私风险参数。
在一种实现方式中,该确定单元1402基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数的方式具体为:该确定单元1402基于该已触发的隐私操作的权重值、该隐私信息条目和该已触发的隐私操作,确定该应用程序的隐私风险参数。
在一种实现方式中,该确定单元1402基于该隐私信息条目和该已触发的隐私操作确定该应用程序的隐私风险参数的方式具体为:该确定单元1402基于隐私风险参数确定模型、该隐私信息条目和该已触发的隐私操作,确定该应用程序的隐私风险参数。
在一种实现方式中,该装置还包括提示单元,该提示单元用于:当该应用程序的隐私风险参数小于预设值时,向用户提示该应用程序具有隐私风险。
在一种实现方式中,该获取单元1403获取应用程序的隐私信息条目的方式具体为:该获取单元从服务器或第二终端设备获取该应用程序的隐私信息条目。
在一种实现方式中,该隐私风险参数为分数或等级。
本发明实施例和图4、图5和图13所示方法实施例基于同一构思,其带来的技术效果也相同,具体原理请参照图4、图5和图13所示实施例的描述,在此不赘述。
本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机或处理器上运行时,使得计算机或处理器执行上述任一个方法中的一个或多个步骤。
本申请实施例还提供了一种包含指令的计算机程序产品。当该计算机程序产品在计算机或处理器上运行时,使得计算机或处理器执行上述任一个方法中的一个或多个步骤。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者通过所述计算机可读存储介质进行传输。所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:ROM或随机存储记忆体RAM、磁碟或者光盘等各种可存储程序代码的介质。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
最后应说明的是:以上各实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述各实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。

Claims (19)

  1. 一种隐私风险反馈方法,其特征在于,所述方法包括:
    第一终端设备获取应用程序的隐私信息条目;
    所述第一终端设备获取所述应用程序已触发的隐私操作;
    所述第一终端设备基于所述隐私信息条目和所述已触发的隐私操作确定所述应用程序的隐私风险参数,所述隐私风险参数指示所述应用程序的隐私风险;
    所述第一终端设备输出所述应用程序的隐私风险参数。
  2. 根据权利要求1所述的方法,其特征在于,所述第一终端设备基于所述隐私信息条目和所述已触发的隐私操作确定所述应用程序的隐私风险参数,包括:
    所述第一终端设备基于所述已触发的隐私操作的权重值、所述隐私信息条目和所述已触发的隐私操作,确定所述应用程序的隐私风险参数。
  3. 根据权利要求1所述的方法,其特征在于,所述第一终端设备基于所述隐私信息条目和所述已触发的隐私操作确定所述应用程序的隐私风险参数,包括:
    所述第一终端设备基于隐私风险参数确定模型、所述隐私信息条目和所述已触发的隐私操作,确定所述应用程序的隐私风险参数。
  4. 根据权利要求1~3中任意一项所述的方法,其特征在于,所述方法还包括:
    当所述应用程序的隐私风险参数小于预设值时,所述第一终端设备向用户提示所述应用程序具有隐私风险。
  5. 根据权利要求1~4中任意一项所述的方法,其特征在于,所述第一终端设备获取应用程序的隐私信息条目,包括:
    所述第一终端设备从服务器或第二终端设备获取所述应用程序的隐私信息条目。
  6. 根据权利要求1~5中任意一项所述的方法,其特征在于,所述隐私风险参数为分数或等级。
  7. 一种隐私风险反馈装置,其特征在于,所述装置包括获取单元、确定单元和输出单元,其中:
    所述获取单元,用于获取应用程序的隐私信息条目;
    所述获取单元,还用于获取所述应用程序已触发的隐私操作;
    所述确定单元,用于基于所述隐私信息条目和所述已触发的隐私操作确定所述应用程序的隐私风险参数,所述隐私风险参数指示所述应用程序的隐私风险;
    所述输出单元,用于输出所述应用程序的隐私风险参数。
  8. 根据权利要求7所述的装置,其特征在于,所述确定单元具体用于:
    基于所述已触发的隐私操作的权重值、所述隐私信息条目和所述已触发的隐私操作,确 定所述应用程序的隐私风险参数。
  9. 根据权利要求7所述的装置,其特征在于,所述确定单元具体用于:
    基于隐私风险参数确定模型、所述隐私信息条目和所述已触发的隐私操作,确定所述应用程序的隐私风险参数。
  10. 根据权利要求7~9中任意一项所述的装置,其特征在于,所述装置还包括提示单元,所述提示单元用于:
    当所述应用程序的隐私风险参数小于预设值时,向用户提示所述应用程序具有隐私风险。
  11. 根据权利要求7~10中任意一项所述的装置,其特征在于,所述获取单元获取应用程序的隐私信息条目的方式具体为:
    从服务器或第二终端设备获取所述应用程序的隐私信息条目。
  12. 根据权利要求7~11中任意一项所述的装置,其特征在于,所述隐私风险参数为分数或等级。
  13. 一种第一终端设备,其特征在于,所述第一终端设备包括存储器和至少一个处理器;所述存储器与所述一个或多个处理器耦合,所述存储用于存储计算机程序代码,所述计算机程序代码包括计算机指令,当所述一个或多个处理器执行所述计算机指令时,使得所述第一终端设备执行以下操作:
    获取应用程序的隐私信息条目;
    获取所述应用程序已触发的隐私操作;
    基于所述隐私信息条目和所述已触发的隐私操作确定所述应用程序的隐私风险参数,所述隐私风险参数指示所述应用程序的隐私风险;
    输出所述应用程序的隐私风险参数。
  14. 根据权利要求13所述的第一终端设备,其特征在于,所述基于所述隐私信息条目和所述已触发的隐私操作确定所述应用程序的隐私风险参数,包括:
    基于所述已触发的隐私操作的权重值、所述隐私信息条目和所述已触发的隐私操作,确定所述应用程序的隐私风险参数。
  15. 根据权利要求13所述的第一终端设备,其特征在于,所述基于所述隐私信息条目和所述已触发的隐私操作确定所述应用程序的隐私风险参数,包括:
    基于隐私风险参数确定模型、所述隐私信息条目和所述已触发的隐私操作,确定所述应用程序的隐私风险参数。
  16. 根据权利要求13~15中任意一项所述的第一终端设备,其特征在于,所述第一终端设备还包括显示屏,当所述一个或多个处理器执行所述计算机指令时,使得所述第一终端设备还执行以下操作:
    当所述应用程序的隐私风险参数小于预设值时,向用户提示所述应用程序具有隐私风险。
  17. 根据权利要求13~16中任意一项所述的第一终端设备,其特征在于,所述获取应用程序的隐私信息条目,包括:
    从服务器或第二终端设备获取所述应用程序的隐私信息条目。
  18. 根据权利要求13~17中任意一项所述的第一终端设备,其特征在于,所述隐私风险参数为分数或等级。
  19. 一种计算机可读存储介质,其特征在于,所述计算机存储介质中存储有计算机可读指令,当所述计算机可读指令在通信装置上运行时,使得所述通信装置执行如权利要求1~6中任一项所述的方法。
PCT/CN2022/077256 2021-02-25 2022-02-22 一种隐私风险反馈方法、装置及第一终端设备 WO2022179495A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110211606.XA CN114971107A (zh) 2021-02-25 2021-02-25 一种隐私风险反馈方法、装置及第一终端设备
CN202110211606.X 2021-02-25

Publications (1)

Publication Number Publication Date
WO2022179495A1 true WO2022179495A1 (zh) 2022-09-01

Family

ID=82973328

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/077256 WO2022179495A1 (zh) 2021-02-25 2022-02-22 一种隐私风险反馈方法、装置及第一终端设备

Country Status (2)

Country Link
CN (1) CN114971107A (zh)
WO (1) WO2022179495A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116709339B (zh) * 2022-10-09 2024-07-12 荣耀终端有限公司 一种应用通知消息的检测方法及电子设备
CN118153110A (zh) * 2024-04-09 2024-06-07 荣耀终端有限公司 一种数据处理方法及相关装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130198849A1 (en) * 2012-01-30 2013-08-01 Nokia Corporation Method And Apparatus Providing Privacy Benchmarking For Mobile Application Development
WO2017086926A1 (en) * 2015-11-17 2017-05-26 Hewlett Packard Enterprise Development Lp Privacy risk assessments
CN109598146A (zh) * 2018-12-07 2019-04-09 百度在线网络技术(北京)有限公司 隐私风险评估方法和装置
CN109598127A (zh) * 2018-12-07 2019-04-09 百度在线网络技术(北京)有限公司 隐私风险评估方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130198849A1 (en) * 2012-01-30 2013-08-01 Nokia Corporation Method And Apparatus Providing Privacy Benchmarking For Mobile Application Development
WO2017086926A1 (en) * 2015-11-17 2017-05-26 Hewlett Packard Enterprise Development Lp Privacy risk assessments
CN109598146A (zh) * 2018-12-07 2019-04-09 百度在线网络技术(北京)有限公司 隐私风险评估方法和装置
CN109598127A (zh) * 2018-12-07 2019-04-09 百度在线网络技术(北京)有限公司 隐私风险评估方法和装置

Also Published As

Publication number Publication date
CN114971107A (zh) 2022-08-30

Similar Documents

Publication Publication Date Title
WO2020259452A1 (zh) 一种移动终端的全屏显示方法及设备
WO2021213164A1 (zh) 应用界面交互方法、电子设备和计算机可读存储介质
US11868463B2 (en) Method for managing application permission and electronic device
WO2021159746A1 (zh) 文件共享方法、系统及相关设备
WO2021013132A1 (zh) 输入方法及电子设备
WO2021115112A1 (zh) 安装包的下载方法、分发方法、终端设备、服务器及系统
WO2021253975A1 (zh) 应用程序的权限管理方法、装置和电子设备
CN109981885B (zh) 一种电子设备在来电时呈现视频的方法和电子设备
WO2021218429A1 (zh) 应用窗口的管理方法、终端设备及计算机可读存储介质
WO2022037726A1 (zh) 分屏显示方法和电子设备
WO2022160991A1 (zh) 权限控制方法和电子设备
US11889386B2 (en) Device searching method and electronic device
WO2022179495A1 (zh) 一种隐私风险反馈方法、装置及第一终端设备
WO2020107463A1 (zh) 一种电子设备的控制方法及电子设备
WO2022179275A1 (zh) 终端应用控制的方法、终端设备及芯片系统
CN113452945A (zh) 分享应用界面的方法、装置、电子设备及可读存储介质
WO2022143180A1 (zh) 协同显示方法、终端设备及计算机可读存储介质
WO2021238740A1 (zh) 一种截屏方法及电子设备
CN116048831B (zh) 一种目标信号处理方法和电子设备
WO2022242412A1 (zh) 杀应用的方法及相关设备
WO2022135195A1 (zh) 显示虚拟现实界面的方法、装置、设备和可读存储介质
WO2022007757A1 (zh) 跨设备声纹注册方法、电子设备及存储介质
CN114828098B (zh) 数据传输方法和电子设备
WO2020233581A1 (zh) 一种测量高度的方法和电子设备
CN113467821A (zh) 应用程序的修复方法、装置、设备及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22758859

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22758859

Country of ref document: EP

Kind code of ref document: A1