WO2023185953A1 - 网页访问方法及电子设备 - Google Patents

网页访问方法及电子设备 Download PDF

Info

Publication number
WO2023185953A1
WO2023185953A1 PCT/CN2023/084843 CN2023084843W WO2023185953A1 WO 2023185953 A1 WO2023185953 A1 WO 2023185953A1 CN 2023084843 W CN2023084843 W CN 2023084843W WO 2023185953 A1 WO2023185953 A1 WO 2023185953A1
Authority
WO
WIPO (PCT)
Prior art keywords
web page
data
user
privacy
electronic device
Prior art date
Application number
PCT/CN2023/084843
Other languages
English (en)
French (fr)
Inventor
陈颖
李超
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023185953A1 publication Critical patent/WO2023185953A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Definitions

  • the present application relates to the field of computer technology, and in particular, to a web page access method and electronic equipment.
  • Embodiments of the present application disclose a web page access method and electronic device, which can limit the user's browsing behavior obtained by the web page provider according to the user's privacy requirements, and effectively protect the user's privacy security.
  • this application provides a web page access method, which is applied to electronic devices.
  • the method includes: receiving a first search request; sending a first search request to the network device, where the first search request is used to request to obtain the first search request.
  • the web page of the website, the first search request includes first information, the first information is used to indicate the privacy level of the user behavior data that is allowed to be obtained; receiving the third message sent by the network device in response to the first search request message.
  • One data; displaying a first web page according to the first data, and the data displayed on the first web page is data that conforms to the privacy level of the user behavior data that is allowed to be obtained.
  • the above-mentioned privacy levels in order from high to low are: sensitive personal data (such as content input by users on web pages), high-impact personal data (such as click behavior), medium-impact personal data (such as exposure of web pages) time) and low-impact personal data (such as the dragging behavior of scroll bars in web pages).
  • the above-mentioned first information indicates the highest privacy level of user behavior data that is allowed to be obtained.
  • the privacy level indicated by the first information is sensitive personal data, which may indicate that the privacy level that is allowed to be obtained is lower than or equal to sensitive personal data.
  • User behavior data is sensitive personal data, which may indicate that the privacy level that is allowed to be obtained is lower than or equal to sensitive personal data.
  • the electronic device when requesting the network device to obtain a web page, can indicate through the first information the privacy level of the user behavior data that is allowed to be obtained (which can be referred to as the user's privacy requirements), and the electronic device can use the data returned by the network device to , displays web pages that meet the user's privacy requirements.
  • the user's privacy requirements the privacy level of the user behavior data that is allowed to be obtained
  • the electronic device can use the data returned by the network device to , displays web pages that meet the user's privacy requirements.
  • the provider of the webpage cannot obtain behavioral data that does not meet the user's privacy requirements, effectively protecting the user's privacy and security.
  • the method before displaying the first web page based on the first data, the method further includes: determining whether the first data is data that meets the privacy level; A data display of a first web page, including: when the first data is data that does not meet the privacy level, displaying the first web page according to the privacy level of the first data and the user behavior data that is allowed to be obtained. ; When the first data is data that meets the privacy level, display the first web page according to the first data.
  • displaying the first web page according to the privacy level of the first data and the user behavior data that is allowed to be obtained includes: adjusting the first data according to the privacy level, and adjusting the first data according to the privacy level.
  • the first data after the adjustment is used to display the first web page, and the display data of the first web page corresponds to the adjusted first data.
  • the display data of the first web page corresponds to the first data.
  • the electronic device can first determine whether the first data returned by the network device meets the user's privacy requirements. If it meets the user's privacy requirements, the electronic device can directly display the web page based on the first data. If it does not meet the user's privacy requirements, the electronic device can directly display the web page based on the first data. Adjust the web pages displayed. Even if the first data returned by the network device does not meet the user's privacy requirements, the user's privacy security can be further guaranteed through the electronic device.
  • the data displayed on the first web page does not include a first script
  • the first script is used to obtain the first behavior data
  • the first behavior data does not belong to the privacy level behavior. data.
  • the first web page when the data displayed by the first web page does not include the first script, the first web page may be a web page that is displayed normally and can be operated normally by the user.
  • the first webpage displayed by the electronic device does not include the first script. Therefore, when the user browses the first webpage, behavioral data that does not meet the user's privacy requirements will not be generated, and the first webpage meets the user's privacy requirements.
  • the first webpage can be a webpage that is displayed normally and can be operated normally by the user, which ensures the user's privacy and security while allowing the user to browse the webpage normally without affecting the user's experience.
  • the first web page does not include a first control
  • the script corresponding to the first control is used to obtain second behavior data
  • the second behavior data does not belong to the privacy level behavior. data.
  • the first web page does not include the first control, which can be understood as hiding such controls that "the user does not want to see", making the display more concise and clear, and improving the user's browsing experience.
  • the user browses the first web page, he cannot operate the first control. Therefore, behavioral data that does not meet the user's privacy requirements will not be generated.
  • the first web page complies with the user's privacy requirements, thereby effectively protecting the user's privacy security.
  • the method further includes: receiving a first user operation acting on a second control in the first web page, and a script corresponding to the second control is used to obtain third behavior data, so The third behavior data does not belong to the behavior data of the privacy level; display the first prompt information, wherein: the first prompt information indicates that the first user operation execution failed; or the first prompt information indicates that no collection The third behavior data.
  • the electronic device when the electronic device receives the first user operation, the script corresponding to the second control is triggered, the electronic device does not execute/prevents the execution of the script corresponding to the second control, and Display the first prompt information. It is understandable that even if the first data returned by the network device includes scripts for obtaining behavioral data that does not meet privacy requirements, the electronic device can prevent the execution of these scripts to further ensure the user's privacy security.
  • the electronic device when the electronic device receives the first user operation that acts on the second control, it can notify the user through the first prompt message that the first user operation failed to execute, or that behavioral data that does not meet the user's privacy requirements is not collected, so that Users perceive that behavioral data that does not meet privacy requirements are not obtained by the first web page, which improves user experience.
  • the method before receiving the first search request, the method further includes: receiving a second user operation; and in response to the second user operation, determining the privacy level of the user behavior data that is allowed to be obtained. .
  • users can set their own privacy requirements, which is more convenient to use.
  • the privacy requirements set by different users can be different, and the privacy requirements set by the same user in different scenarios can also be different.
  • This application can meet the different needs of different users, or the needs of the same user in different scenarios, with a wide range of usage scenarios and high product availability. .
  • the method further includes: closing the first web page; receiving a second search request; and sending the third search request to the network device.
  • Two search requests the second The search request is used to request to obtain the web page of the first URL; receive the second data sent by the network device in response to the second search request; and display the first web page according to the second data.
  • the second data is the first data.
  • the electronic device can request the network device to obtain the web page of the first web address again, and the web page displayed again by the electronic device can still be the first web page.
  • the behavioral data obtained by the network device about the user's browsing of the previously displayed first webpage complies with the user's privacy requirements, these behavioral data may not be sufficient to form a user profile of the user, and the network device cannot generate personalized information for the user.
  • Recommended content therefore, the web page displayed again by the electronic device does not include the personalized recommended content and can still be the first web page. Prevent web pages from displaying personalized recommended content (such as advertisements) that "users do not want to see" and improve user experience.
  • the first data includes second information
  • the second information is used to indicate the privacy level of the user behavior data obtained by the first web page.
  • the electronic device may determine whether the first data is data that meets the privacy level based on the second information. For example, when the privacy level indicated by the second information is lower than or equal to the When the privacy level indicated by the first information, the first data is data that conforms to the privacy level; when the privacy level indicated by the second information is higher than the privacy level indicated by the first information, the first data The data is data that does not meet the stated privacy level.
  • the electronic device can directly obtain the privacy level of the user behavior data obtained by the first web page based on the second information, without identifying the specific content in the first data to obtain the privacy level of the user behavior data obtained by the first web page.
  • this application provides a web page access method, which is applied to electronic devices.
  • the method includes: receiving a first search request; sending a first search request to the network device, where the first search request is used to request to obtain the first search request.
  • the web page of the URL the first search request includes first information, the first information is used to indicate the privacy level of the user behavior data that is allowed to be obtained; receiving the first message sent by the network device in response to the first search request Data; display a first web page according to the first data, the first web page includes first prompt information, the first prompt information indicates that the first web page will collect first behavior data, and the first behavior data does not User behavior data that falls within the stated privacy level.
  • the above-mentioned first information indicates the highest privacy level of user behavior data that is allowed to be obtained.
  • the privacy level indicated by the first information is sensitive personal data, which may indicate that the privacy level that is allowed to be obtained is lower than or equal to sensitive personal data.
  • User behavior data is sensitive personal data, which may indicate that the privacy level that is allowed to be obtained is lower than or equal to sensitive personal data.
  • the first data includes data for displaying the first prompt information. In other embodiments, the first data does not include data for displaying the first prompt information, and the first prompt information is where the electronic device is based on the privacy level and the first data. Added to the first web page mentioned above.
  • the electronic device when requesting the network device to obtain a web page, can indicate through the first information the privacy level of the user behavior data that is allowed to be obtained (which can be referred to as the user's privacy requirements), and the electronic device displays the data according to the data returned by the network device.
  • the first web page includes prompt information to inform the user that behavioral data that does not meet privacy requirements will be collected by the first web page.
  • the user can choose to perform user operations based on the prompt information. For example, failure to perform will trigger the acquisition of behavioral data that does not meet privacy requirements. user operations, thereby preventing the provider of the web page from obtaining behavioral data that does not meet the user's privacy requirements, effectively protecting the user's privacy and security.
  • the first data includes a first script
  • the first script is used to obtain the first behavior data.
  • the user can select the user operation to be performed based on the first prompt information. For example, failure to perform the operation will trigger the acquisition of inconsistencies.
  • User operations on behavioral data that meet privacy requirements prevent the provider of the web page from obtaining behavioral data that does not meet the user's privacy requirements, effectively protecting the user's privacy and security.
  • the method before displaying the first web page based on the first data, the method further includes: determining whether the first data is data that meets the privacy level; A data display of a first web page, including: when the first data is data that does not meet the privacy level, displaying the first web page according to the privacy level of the first data and the user behavior data that is allowed to be obtained. ; The method also includes: when the first data is data that meets the privacy level, displaying the first web page according to the first data.
  • displaying the first web page according to the privacy level of the first data and the user behavior data that is allowed to be obtained includes: adding a username to the first data according to the privacy level. Display the data of the first prompt information, and display the first web page according to the adjusted first data.
  • the electronic device can first determine whether the first data returned by the network device meets the user's privacy requirements. If it meets the user's privacy requirements, the electronic device can directly display the web page based on the first data. If it does not meet the user's privacy requirements, the electronic device can directly display the web page based on the first data. By adding the first prompt information to the displayed web page, even if the first data returned by the network device does not meet the user's privacy requirements, the user's privacy security can be further ensured through the electronic device.
  • the method further includes: receiving a first user operation acting on a first control in the first web page, and a script corresponding to the first control is used to obtain the second behavior data, so The second behavior data does not belong to the behavior data of the privacy level; display second prompt information, wherein: the second prompt information indicates that the first user operation failed to be executed; or the second prompt information indicates that no collection The second line of data.
  • the electronic device when the electronic device receives the first user operation, the script corresponding to the first control is triggered, the electronic device does not execute/prevents the execution of the script corresponding to the first control, and Display the second prompt information. It is understandable that even if the first data returned by the network device includes scripts for obtaining behavioral data that does not meet privacy requirements, the electronic device can prevent the execution of these scripts to further ensure the user's privacy security.
  • the electronic device when the electronic device receives the first user operation that acts on the first control, it can notify the user through the second prompt message that the first user operation failed to execute, or that behavioral data that does not meet the user's privacy requirements is not collected, so that Users perceive that behavioral data that does not meet privacy requirements are not obtained by the first web page, which improves user experience.
  • the method further includes: receiving a second user operation when displaying the first web page; and determining to allow the first web page to obtain the first behavior in response to the second user operation. data; receiving a first instruction, the first instruction indicating that a first script in the first web page is triggered, the first script being used to obtain the first behavior data; generating the first behavior data, and Send the first behavioral data to the network device.
  • the electronic device when the electronic device displays the first prompt information, it can determine whether to allow the first web page to obtain the first behavior data based on the received user operation. It can be understood that if the user's expectations are not met, the user's consent is further sought. .
  • the electronic device can generate the first behavior data and send it to the network device when the script for obtaining the first behavior data is triggered.
  • This application provides an interactive method that allows users to more flexibly choose the behavioral data allowed to be obtained.
  • the method before receiving the first search request, the method further includes: receiving a third user operation; and in response to the third user operation, determining the privacy level of the user behavior data that is allowed to be obtained. .
  • users can set their own privacy requirements, which is more convenient to use.
  • the privacy requirements set by different users can be different, and the privacy requirements set by the same user in different scenarios can also be different.
  • This application can meet the different needs of different users, or the needs of the same user in different scenarios, with a wide range of usage scenarios and high product availability. .
  • the method further includes: closing the first web page; receiving a second search request; and sending the first web page to the network device.
  • second search request the second The search request is used to request to obtain the web page of the first URL; receive the second data sent by the network device in response to the second search request; and display the first web page according to the second data.
  • the second data is the first data.
  • the electronic device can request the network device to obtain the web page of the first web address again, and the web page displayed again by the electronic device can still be the first web page.
  • the behavioral data obtained by the network device about the user's browsing of the previously displayed first webpage complies with the user's privacy requirements, these behavioral data may not be sufficient to form a user profile of the user, and the network device cannot generate personalized information for the user.
  • Recommended content therefore, the web page displayed again by the electronic device does not include the personalized recommended content and can still be the first web page. Prevent web pages from displaying personalized recommended content (such as advertisements) that "users do not want to see" and improve user experience.
  • the first data includes second information
  • the second information is used to indicate the privacy level of the user behavior data obtained by the first web page.
  • the electronic device may determine whether the first data is data that meets the privacy level based on the second information. For example, when the privacy level indicated by the second information is lower than or equal to the When the privacy level indicated by the first information, the first data is data that conforms to the privacy level; when the privacy level indicated by the second information is higher than the privacy level indicated by the first information, the first data The data is data that does not meet the stated privacy level.
  • the electronic device can directly obtain the privacy level of the user behavior data obtained by the first web page based on the second information, without identifying the specific content in the first data to obtain the privacy level of the user behavior data obtained by the first web page.
  • the application provides an electronic device, including a transceiver, a processor, and a memory.
  • the memory is used to store a computer program.
  • the processor calls the computer program to execute any possible method in any of the above aspects.
  • the web page access method in the implementation.
  • embodiments of the present application provide a computer storage medium.
  • the computer storage medium stores a computer program.
  • the computer program is executed by a processor, web page access in any possible implementation manner of any of the above aspects is implemented. method.
  • embodiments of the present application provide a computer program product.
  • the computer program product When the computer program product is run on an electronic device, it causes the electronic device to execute the web page access method in any possible implementation of any of the above aspects.
  • the present application provides an electronic device, including one or more functional modules; the one or more functional modules are used to execute the web page access method in any possible implementation of any of the above aspects.
  • embodiments of the present application provide an electronic device, which includes executing the method or device described in any embodiment of the present application.
  • the electronic device is, for example, a chip.
  • Figure 1 is a schematic flow chart of a web page access method provided by an embodiment of the present application.
  • Figure 2 is a schematic architectural diagram of a webpage access system provided by an embodiment of the present application.
  • Figure 3A is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
  • Figure 3B is a schematic diagram of the software architecture of an electronic device provided by an embodiment of the present application.
  • Figure 3C is a schematic diagram of the hardware structure of a server provided by an embodiment of the present application.
  • Figures 4A-4C are schematic user interface diagrams of a web page access process provided by embodiments of the present application.
  • Figure 4D is a schematic diagram of a user interface of a web page provided by an embodiment of the present application.
  • Figure 4E is a schematic diagram of the user interface of another web page provided by an embodiment of the present application.
  • Figure 4F is a schematic diagram of the user interface of another web page provided by an embodiment of the present application.
  • Figure 4G is a schematic diagram of a user interface of another web page provided by an embodiment of the present application.
  • Figure 4H is a schematic diagram of the user interface of another web page provided by an embodiment of the present application.
  • Figure 4I is a schematic diagram of the user interface of another web page provided by an embodiment of the present application.
  • Figure 5A is a schematic user interface diagram of another web page provided by an embodiment of the present application.
  • Figure 5B is a schematic diagram of a setting interface provided by an embodiment of the present application.
  • Figure 5C is a schematic diagram of another setting interface provided by an embodiment of the present application.
  • Figure 6 is a schematic flow chart of yet another web page access method provided by an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of yet another web page access method provided by an embodiment of the present application.
  • Figure 8 is a schematic flowchart of yet another web page access method provided by an embodiment of the present application.
  • Figure 1 exemplarily shows a schematic flow chart of a method for accessing a web page.
  • the method may include the following steps:
  • the user chooses to enter the incognito mode of the browser.
  • the user enters URL 1 in the address bar of the browser.
  • the browser requests the web page content provider to obtain the web page corresponding to URL 1.
  • the web content provider delivers web content 1 corresponding to URL 1 to the browser.
  • the browser renders and displays the web page 1 corresponding to the URL 1 based on the web page content 1 issued by the web content provider. If the web page content 1 includes a javascript (JS) script, the browser can interpret and execute the JS script.
  • JS javascript
  • the collection JS script embedded in web page 1 is triggered, and the JS script can be interpreted and executed by the browser.
  • the JS script is used to record (also referred to as generating or collecting) behavioral data of the user operation.
  • the collection JS script embedded in web page 1 may also be triggered, and the JS script can be interpreted and executed by the browser.
  • the JS script is, for example, used to record behavioral data such as the exposure time of the web page.
  • the upload JS script embedded in web page 1 can be interpreted and executed by the browser. This JS script is used to upload (subsequently also referred to as reporting or sending) the above recorded behavioral data to the web page content.
  • the browser clears behavioral data in the local memory, such as the user's browsing history, cookies, website data, information entered by the user in the form, and permissions granted by the user to the website.
  • the web content provider after the web content provider obtains the behavioral data in 6 above, it can A user portrait of the user is formed, which can be used by the web content provider to recommend personalized content (such as personalized advertisements) to the user.
  • personalized content such as personalized advertisements
  • the webpage 1 displayed by the browser may include personalized recommendation content for the user.
  • it may also include:
  • the user enters URL 1 in the browser's address bar.
  • the browser requests the web page content provider to obtain the web page corresponding to URL 1.
  • the web content provider forms personalized recommendation content for the user based on the background data (such as the behavioral data in 6 above).
  • the webpage content provider delivers webpage content 2 corresponding to URL 1 to the browser, and webpage content 2 includes the above personalized recommendation content.
  • the browser renders and displays web page 2 corresponding to URL 1 based on web page content 2 issued by the web page content provider. Web page 2 is different from web page 1. If web page content 2 includes JS script, the browser can interpret and execute the JS script.
  • the incognito mode may also be called a privacy (private) mode, a privacy protection (inprivate) mode, or other modes, and this application does not limit this.
  • the provider of the webpage/website may still obtain the user's behavioral data, such as clicking behavior and scroll bar dragging behavior. , the exposure time of web page content, the content input by users, etc., cannot effectively protect the privacy and security of users.
  • This application provides a webpage access method that can limit the user's behavioral data obtained by the webpage content provider according to the user's privacy requirements, and effectively protect the user's privacy and security.
  • user behavior data can be divided into multiple privacy levels.
  • the user's behavioral data can be classified from high to low according to the privacy level: sensitive personal data, high-impact personal data, medium-impact personal data, and low-impact personal data.
  • sensitive personal data is an important subset of personal data, which can be information involving the most private areas of the data subject, or data that may have a significant adverse impact on the data subject if disclosed, such as but not limited to including the user's information on the web page. Input content, etc.
  • High-impact personal data is data whose disclosure may cause serious adverse effects to individuals or organizations, such as but not limited to click behavior.
  • Medium-impact personal data is data whose disclosure may cause significant adverse effects to individuals or organizations, such as but not limited to the exposure time of web pages.
  • Low-impact personal data is data whose disclosure may cause limited adverse effects to an individual or organization, such as but not limited to scroll bar dragging behavior. It is not limited to this, it can also be divided into more or less privacy levels, or it can also be divided into other privacy levels, which is not limited in this application.
  • the following embodiments take the privacy-level behavioral data of the above example as an example.
  • the embodiment of the present application can be applied to a web page access system. Next, a web page access system 10 related to the embodiment of the present application will be introduced.
  • FIG. 2 exemplarily shows a schematic architectural diagram of a web page access system 10.
  • the web page access system 10 may include a user, an electronic device 100, a browser, a web page, and a web page content provider. in:
  • the user can use the electronic device 100 to access web pages through the browser on the electronic device 100 .
  • the electronic device 100 can be a mobile terminal such as a mobile phone, a tablet computer, a handheld computer, a personal digital assistant (Personal Digital Assistant, PDA), a smart home device such as a smart TV, a smart camera, a smart bracelet, a smart watch, or smart glasses.
  • PDA Personal Digital Assistant
  • a smart home device such as a smart TV, a smart camera, a smart bracelet, a smart watch, or smart glasses.
  • Wearable devices or other desktop, laptop, notebook computers, Ultra-mobile Personal Computer (UMPC), netbooks, smart screens and other devices.
  • UMPC Ultra-mobile Personal Computer
  • the embodiment of the present application does not place any special restrictions on the specific type of the electronic device 100 .
  • Electronic device 100 can run a browser.
  • This application does not limit the form in which the browser runs on the electronic device 100.
  • it may be a browser application, a browser applet, or other applications or applets that encapsulate the functions of the browser. Programs etc.
  • the electronic device 100 may request web content, services, and the like from a web content provider.
  • the browser can provide the function of accessing web pages (including displaying web pages). For example, the user can enter a URL in the address bar of the browser. The browser can request the web page corresponding to the URL from the web content provider based on the entered URL and render it. The web content returned by the web content provider is displayed to the user.
  • the browser can also be used to interpret and execute JavaScript (JS) scripts in web pages.
  • JS JavaScript
  • the browser can also provide working modes such as incognito mode.
  • Web pages are generated by web content providers, such as but not limited to, composed of hypertext markup language (html) and/or javascript (JS) scripts.
  • the web pages displayed by the browser may include, but are not limited to, multimedia resources such as text, icons, audio and video.
  • the webpage can collect user behavior data when accessing the webpage through JS scripts according to the requirements of the webpage content provider, such as click behavior, dragging behavior of the scroll bar, exposure duration of the webpage content, user input content and other data.
  • the webpage can report the collected user behavior data to the webpage content provider through a JS script according to the requirements of the webpage content provider.
  • Web content providers can generate web content.
  • Web content providers can embed JS scripts in web pages according to their own needs.
  • the JS scripts are used to collect user behavior data.
  • the user's behavior data is used by web content providers to recommend personalized content (such as personalized ads) to users.
  • the web content provider can deliver the generated web content to the browser when receiving a web page request from the browser.
  • the web content provider may include server 200.
  • the server 200 may be one server or a server cluster composed of multiple servers. Any server included in the server 200 may be a hardware server or a cloud server.
  • the electronic device 100 can connect and communicate with the server 200 through the Internet.
  • the Internet can include wired links and/or wireless links, and optionally network devices such as base stations, routers, and access points (APs).
  • Wired links For example, they include high definition multimedia interface (HDMI), universal serial bus (USB), coaxial cable, optical fiber, etc.
  • Wireless links include, for example, wireless local area networks (WLAN), Bluetooth and cellular communication networks, etc.
  • the electronic device 100 (for example, a browser running on the electronic device 100) can request web content and services from a web content provider. For example, the electronic device 100 sends a request message to the server 200 through the Internet, and the request message is used to request Web content and services, etc.
  • the webpage when a user accesses a webpage through a browser on the electronic device 100, the webpage can collect the user's behavior data through the browser, and report the behavior data to the webpage content provider through the browser (for example, specifically including: electronic Device 100 sends the behavioral data to server 200 via the Internet).
  • FIG. 3A exemplarily shows a schematic diagram of the hardware structure of an electronic device 100.
  • the electronic device 100 shown in FIG. 3A is only an example, and the electronic device 100 may have more or fewer components than shown in FIG. 3A , two or more components may be combined, or Can have different component configurations.
  • the various components shown in Figure 3A may be implemented in hardware, software, or a combination of hardware and software including one or more signal processing and/or application specific integrated circuits.
  • the electronic device 100 may include: a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2.
  • Mobile communication module 150 wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen 194, And subscriber identification module (subscriber identification module, SIM) card interface 195, etc.
  • the sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, and an air pressure sensor 180C. Magnetic sensor 180D, acceleration sensor 180E, distance sensor 180F, proximity light sensor 180G, fingerprint sensor 180H, temperature sensor 180J, touch sensor 180K, ambient light sensor 180L, bone conduction sensor 180M, etc.
  • the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the electronic device 100 .
  • the electronic device 100 may include more or fewer components than shown in the figures, or some components may be combined, some components may be separated, or some components may be arranged differently.
  • the components illustrated may be implemented in hardware, software, or a combination of software and hardware.
  • the processor 110 may include one or more processing units.
  • the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU) wait.
  • application processor application processor, AP
  • modem processor graphics processing unit
  • GPU graphics processing unit
  • image signal processor image signal processor
  • ISP image signal processor
  • controller memory
  • video codec digital signal processor
  • DSP digital signal processor
  • baseband processor baseband processor
  • NPU neural-network processing unit
  • different processing units can be independent devices or integrated in one or more processors.
  • the controller may be the nerve center and command center of the electronic device 100 .
  • the controller can generate operation control signals based on the instruction operation code and timing signals to complete the control of fetching and executing instructions.
  • the processor 110 may also be provided with a memory for storing instructions and data.
  • the memory in processor 110 is cache memory. This memory may hold instructions or data that have been recently used or recycled by processor 110 . If the processor 110 needs to use the instructions or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 110 is reduced, thus improving the efficiency of the system.
  • processor 110 may include one or more interfaces.
  • Interfaces may include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous receiver and transmitter (universal asynchronous receiver/transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and /or universal serial bus (USB) interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • UART universal asynchronous receiver and transmitter
  • MIPI mobile industry processor interface
  • GPIO general-purpose input/output
  • SIM subscriber identity module
  • USB universal serial bus
  • the I2C interface is a bidirectional synchronous serial bus, including a serial data line (SDA) and a serial clock line (SCL).
  • processor 110 may include multiple sets of I2C buses.
  • the processor 110 can separately couple the touch sensor 180K, charger, flash, camera 193, etc. through different I2C bus interfaces.
  • the processor 110 can be coupled to the touch sensor 180K through an I2C interface, so that the processor 110 and the touch sensor 180K communicate through the I2C bus interface to implement the touch function of the electronic device 100 .
  • the I2S interface can be used for audio communication.
  • processor 110 may include multiple sets of I2S buses.
  • the processor 110 can be coupled with the audio module 170 through the I2S bus to implement communication between the processor 110 and the audio module 170 .
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface to implement the function of answering calls through a Bluetooth headset.
  • the PCM interface can also be used for audio communications to sample, quantize and encode analog signals.
  • the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface.
  • the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface to implement the function of answering calls through a Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
  • the UART interface is a universal serial data bus used for asynchronous communication.
  • the bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
  • a UART interface is generally used to connect the processor 110 and the wireless communication module 160 .
  • the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to implement the Bluetooth function.
  • the audio module 170 may communicate via a UART interface to The wireless communication module 160 transmits audio signals to realize the function of playing music through the Bluetooth headset.
  • the MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 .
  • MIPI interfaces include camera serial interface (CSI), display serial interface (DSI), etc.
  • the processor 110 and the camera 193 communicate through the CSI interface to implement the shooting function of the electronic device 100 .
  • the processor 110 and the display screen 194 communicate through the DSI interface to implement the display function of the electronic device 100 .
  • the GPIO interface can be configured through software.
  • the GPIO interface can be configured as a control signal or as a data signal.
  • the GPIO interface can be used to connect the processor 110 with the camera 193, display screen 194, wireless communication module 160, audio module 170, sensor module 180, etc.
  • the GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
  • the USB interface 130 is an interface that complies with the USB standard specification, and may be a Mini USB interface, a Micro USB interface, a USB Type C interface, etc.
  • the USB interface 130 can be used to connect a charger to charge the electronic device 100, and can also be used to transmit data between the electronic device 100 and peripheral devices. It can also be used to connect headphones to play audio through them. This interface can also be used to connect other electronic devices, such as AR devices, etc.
  • the interface connection relationships between the modules illustrated in the embodiment of the present invention are only schematic illustrations and do not constitute a structural limitation of the electronic device 100 .
  • the electronic device 100 may also adopt different interface connection methods in the above embodiments, or a combination of multiple interface connection methods.
  • the charging management module 140 is used to receive charging input from the charger.
  • the charger can be a wireless charger or a wired charger.
  • the charging management module 140 may receive charging input from the wired charger through the USB interface 130 .
  • the charging management module 140 may receive wireless charging input through the wireless charging coil of the electronic device 100 . While the charging management module 140 charges the battery 142, it can also provide power to the electronic device through the power management module 141.
  • the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
  • the power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, internal memory 121, external memory, display screen 194, camera 193, wireless communication module 160, etc.
  • the power management module 141 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters.
  • the power management module 141 may also be provided in the processor 110 .
  • the power management module 141 and the charging management module 140 may also be provided in the same device.
  • the wireless communication function of the electronic device 100 can be implemented through the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor and the baseband processor.
  • the wireless communication function is used for communication between the electronic device 100 and the server 200, for example.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in electronic device 100 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization. For example: Antenna 1 can be reused as a diversity antenna for a wireless LAN. In other embodiments, antennas may be used in conjunction with tuning switches.
  • the mobile communication module 150 can provide solutions for wireless communication including 2G/3G/4G/5G applied on the electronic device 100 .
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), etc.
  • the mobile communication module 150 can receive electromagnetic waves through the antenna 1, perform filtering, amplification and other processing on the received electromagnetic waves, and transmit them to the modem processor for demodulation.
  • the mobile communication module 150 can also amplify the signal modulated by the modem processor and convert it into electromagnetic waves through the antenna 1 for radiation.
  • at least part of the functional modules of the mobile communication module 150 may be disposed in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
  • a modem processor may include a modulator and a demodulator.
  • the modulator is used to convert the low-frequency baseband signal to be sent Modulated into medium and high frequency signals.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
  • the demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the application processor outputs sound signals through audio devices (not limited to speaker 170A, receiver 170B, etc.), or displays images or videos through display screen 194.
  • the modem processor may be a stand-alone device.
  • the modem processor may be independent of the processor 110 and may be provided in the same device as the mobile communication module 150 or other functional modules.
  • the wireless communication module 160 can provide applications on the electronic device 100 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), Bluetooth (bluetooth, BT), and global navigation satellites.
  • WLAN wireless local area networks
  • System global navigation satellite system, GNSS
  • frequency modulation frequency modulation, FM
  • near field communication technology near field communication, NFC
  • infrared technology infrared, IR
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110, frequency modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
  • the antenna 1 of the electronic device 100 is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi) -zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the electronic device 100 implements display functions, such as displaying web content, through a GPU, a display screen 194, an application processor, and the like.
  • the GPU is an image processing microprocessor and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
  • the display screen 194 is used to display images, videos, etc.
  • Display 194 includes a display panel.
  • the display panel can use a liquid crystal display (LCD).
  • the display panel can also use organic light-emitting diode (OLED), active matrix organic light-emitting diode or active matrix organic light-emitting diode (active-matrix organic light emitting diode, AMOLED), flexible light-emitting diode (flex light-emitting diode, FLED), miniled, microled, micro-oled, quantum dot light emitting diode (quantum dot light emitting diode, QLED) and other manufacturing.
  • the electronic device 100 may include 1 or N display screens 194, where N is a positive integer greater than 1.
  • the electronic device 100 can implement the shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
  • the ISP is used to process the data fed back by the camera 193. For example, when taking a photo, the shutter is opened, the light is transmitted to the camera sensor through the lens, the optical signal is converted into an electrical signal, and the camera sensor passes the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise, brightness, etc. ISP can also control the shooting Scene exposure, color temperature and other parameters are optimized. In some embodiments, the ISP may be provided in the camera 193.
  • Camera 193 is used to capture still images or video.
  • the object passes through the lens to produce an optical image that is projected onto the photosensitive element.
  • the photosensitive element can be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the optical signal into an electrical signal, and then passes the electrical signal to the ISP to convert it into a digital image signal.
  • ISP outputs digital image signals to DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other format image signals.
  • the electronic device 100 may include 1 or N cameras 193, where N is a positive integer greater than 1.
  • Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy.
  • Video codecs are used to compress or decompress digital video.
  • Electronic device 100 may support one or more video codecs. In this way, the electronic device 100 can play or record videos in multiple encoding formats, such as moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
  • MPEG moving picture experts group
  • MPEG2 MPEG2, MPEG3, MPEG4, etc.
  • NPU is a neural network (NN) computing processor.
  • NN neural network
  • Intelligent cognitive applications of the electronic device 100 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, etc.
  • the external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the electronic device 100.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to implement the data storage function. Such as saving music, videos, etc. files in external memory card.
  • Internal memory 121 may be used to store computer executable program code, which includes instructions.
  • the processor 110 executes instructions stored in the internal memory 121 to execute various functional applications and data processing of the electronic device 100 .
  • the internal memory 121 may include a program storage area and a data storage area. Among them, the stored program area can store an operating system, at least one application program required for a function (such as a sound playback function, an image playback function, etc.).
  • the storage data area may store data created during use of the electronic device 100 (such as audio data, phone book, etc.).
  • the internal memory 121 may include high-speed random access memory, and may also include non-volatile memory, such as at least one disk storage device, flash memory device, universal flash storage (UFS), etc.
  • the electronic device 100 can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playback, recording, etc.
  • the audio module 170 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signals. Audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be provided in the processor 110 , or some functional modules of the audio module 170 may be provided in the processor 110 .
  • Speaker 170A also called “speaker” is used to convert audio electrical signals into sound signals.
  • the electronic device 100 can listen to music through the speaker 170A, or listen to hands-free calls.
  • Receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
  • the electronic device 100 answers a call or a voice message, the voice can be heard by bringing the receiver 170B close to the human ear.
  • Microphone 170C also called “microphone” or “microphone” is used to convert sound signals into electrical signals. When making a call or sending a voice message, the user can speak close to the microphone 170C with the human mouth and input the sound signal to the microphone 170C.
  • the electronic device 100 may be provided with at least one microphone 170C. In other embodiments, the electronic device 100 may be provided with two microphones 170C, which in addition to collecting sound signals, may also implement a noise reduction function. In other embodiments, the electronic device 100 can also be provided with three, four or more microphones 170C to collect sound signals, reduce noise, and also recognize sounds. source to implement directional recording function, etc.
  • the headphone interface 170D is used to connect wired headphones.
  • the headphone interface 170D may be a USB interface 130, or may be a 3.5mm open mobile terminal platform (OMTP) standard interface, or a Cellular Telecommunications Industry Association of the USA (CTIA) standard interface.
  • OMTP open mobile terminal platform
  • CTIA Cellular Telecommunications Industry Association of the USA
  • the pressure sensor 180A is used to sense pressure signals and can convert the pressure signals into electrical signals.
  • pressure sensor 180A may be disposed on display screen 194 .
  • pressure sensors 180A there are many types of pressure sensors 180A, such as resistive pressure sensors, inductive pressure sensors, capacitive pressure sensors, etc.
  • a capacitive pressure sensor may include at least two parallel plates of conductive material.
  • the electronic device 100 determines the intensity of the pressure based on the change in capacitance.
  • the electronic device 100 detects the intensity of the touch operation according to the pressure sensor 180A.
  • the electronic device 100 may also calculate the touched position based on the detection signal of the pressure sensor 180A.
  • touch operations acting on the same touch location but with different touch operation intensities may correspond to different operation instructions. For example: when a touch operation with a touch operation intensity less than the first pressure threshold is applied to the short message application icon, an instruction to view the short message is executed. When a touch operation with a touch operation intensity greater than or equal to the first pressure threshold is applied to the short message application icon, an instruction to create a new short message is executed.
  • the gyro sensor 180B may be used to determine the motion posture of the electronic device 100 .
  • the angular velocity of electronic device 100 about three axes ie, x, y, and z axes
  • the gyro sensor 180B can be used for image stabilization. For example, when the shutter is pressed, the gyro sensor 180B detects the angle at which the electronic device 100 shakes, calculates the distance that the lens module needs to compensate based on the angle, and allows the lens to offset the shake of the electronic device 100 through reverse movement to achieve anti-shake.
  • the gyro sensor 180B can also be used for navigation and somatosensory game scenes.
  • Air pressure sensor 180C is used to measure air pressure. In some embodiments, the electronic device 100 calculates the altitude through the air pressure value measured by the air pressure sensor 180C to assist positioning and navigation.
  • Magnetic sensor 180D includes a Hall sensor.
  • the electronic device 100 may utilize the magnetic sensor 180D to detect opening and closing of the flip holster.
  • the electronic device 100 may detect the opening and closing of the flip according to the magnetic sensor 180D. Then, based on the detected opening and closing status of the leather case or the opening and closing status of the flip cover, features such as automatic unlocking of the flip cover are set.
  • the acceleration sensor 180E can detect the acceleration of the electronic device 100 in various directions (generally three axes). When the electronic device 100 is stationary, the magnitude and direction of gravity can be detected. It can also be used to identify the posture of electronic devices and be used in horizontal and vertical screen switching, pedometer and other applications.
  • Distance sensor 180F for measuring distance.
  • Electronic device 100 can measure distance via infrared or laser. In some embodiments, when shooting a scene, the electronic device 100 may utilize the distance sensor 180F to measure distance to achieve fast focusing.
  • Proximity light sensor 180G may include, for example, a light emitting diode (LED) and a light detector, such as a photodiode.
  • the light emitting diode may be an infrared light emitting diode.
  • the electronic device 100 emits infrared light outwardly through the light emitting diode.
  • Electronic device 100 uses photodiodes to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device 100 . When insufficient reflected light is detected, the electronic device 100 may determine that there is no object near the electronic device 100 .
  • the electronic device 100 can use the proximity light sensor 180G to detect when the user holds the electronic device 100 close to the ear for talking, so as to automatically turn off the screen to save power.
  • the proximity light sensor 180G can also be used in holster mode, and pocket mode automatically unlocks and locks the screen.
  • the ambient light sensor 180L is used to sense ambient light brightness.
  • the electronic device 100 can adaptively adjust the brightness of the display screen 194 according to the perceived ambient light brightness.
  • the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
  • the ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the electronic device 100 is in the pocket to prevent accidental touching.
  • Fingerprint sensor 180H is used to collect fingerprints.
  • the electronic device 100 can utilize the collected fingerprint characteristics to achieve fingerprint unlocking. Access app lock, take photos with fingerprint, answer incoming calls with fingerprint, etc.
  • Temperature sensor 180J is used to detect temperature.
  • the electronic device 100 utilizes the temperature detected by the temperature sensor 180J to execute the temperature processing strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device 100 reduces the performance of a processor located near the temperature sensor 180J in order to reduce power consumption and implement thermal protection. In other embodiments, when the temperature is lower than another threshold, the electronic device 100 heats the battery 142 to prevent the low temperature from causing the electronic device 100 to shut down abnormally. In some other embodiments, when the temperature is lower than another threshold, the electronic device 100 performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
  • Touch sensor 180K also called “touch panel”.
  • the touch sensor 180K can be disposed on the display screen 194.
  • the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen”.
  • the touch sensor 180K is used to detect a touch operation on or near the touch sensor 180K.
  • the touch sensor can pass the detected touch operation to the application processor to determine the touch event type.
  • Visual output related to the touch operation may be provided through display screen 194 .
  • the touch sensor 180K may also be disposed on the surface of the electronic device 100 at a location different from that of the display screen 194 .
  • Bone conduction sensor 180M can acquire vibration signals.
  • the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human body's vocal part.
  • the bone conduction sensor 180M can also contact the human body's pulse and receive blood pressure beating signals.
  • the bone conduction sensor 180M can also be provided in an earphone and combined into a bone conduction earphone.
  • the audio module 170 can analyze the voice signal based on the vibration signal of the vocal vibrating bone obtained by the bone conduction sensor 180M to implement the voice function.
  • the application processor can analyze the heart rate information based on the blood pressure beating signal acquired by the bone conduction sensor 180M to implement the heart rate detection function.
  • the buttons 190 include a power button, a volume button, etc.
  • Key 190 may be a mechanical key. It can also be a touch button.
  • the electronic device 100 may receive key inputs and generate key signal inputs related to user settings and function control of the electronic device 100 .
  • the motor 191 can generate vibration prompts.
  • the motor 191 can be used for vibration prompts for incoming calls and can also be used for touch vibration feedback.
  • touch operations for different applications can correspond to different vibration feedback effects.
  • the motor 191 can also respond to different vibration feedback effects for touch operations in different areas of the display screen 194 .
  • Different application scenarios such as time reminders, receiving information, alarm clocks, games, etc.
  • the touch vibration feedback effect can also be customized.
  • the indicator 192 may be an indicator light, which may be used to indicate charging status, power changes, or may be used to indicate messages, missed calls, notifications, etc.
  • the SIM card interface 195 is used to connect a SIM card.
  • the SIM card can be connected to or separated from the electronic device 100 by inserting it into the SIM card interface 195 or pulling it out from the SIM card interface 195 .
  • the electronic device 100 can support 1 or N SIM card interfaces, where N is a positive integer greater than 1.
  • SIM card interface 195 can support Nano SIM card, Micro SIM card, SIM card, etc. Multiple cards can be inserted into the same SIM card interface 195 at the same time. The types of the plurality of cards may be the same or different.
  • the SIM card interface 195 is also compatible with different types of SIM cards.
  • the SIM card interface 195 is also compatible with external memory cards.
  • the electronic device 100 interacts with the network through the SIM card to implement functions such as calls and data communications.
  • the electronic device 100 uses an eSIM, that is, an embedded SIM card.
  • the eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100 .
  • the software system of the electronic device 100 may adopt a layered architecture, an event-driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture.
  • the layered architecture software system can be an Android system, a Huawei mobile services (HMS) system, or other software systems.
  • the embodiment of this application takes the Android system with a layered architecture as an example to illustrate the software structure of the electronic device 100 .
  • FIG. 3B exemplarily shows a schematic diagram of the software architecture of the electronic device 100 .
  • the layered architecture divides the software into several layers, and each layer has clear roles and division of labor.
  • the layers communicate through software interfaces.
  • the Android system is divided into four layers, from top to bottom: application layer, application framework layer, Android runtime and system libraries, and kernel layer.
  • the application layer can include a series of application packages.
  • the application package can include camera, calendar, music, gallery, short message, call, map, Bluetooth, browser and other applications.
  • the application package can also be replaced by other forms of software such as applets.
  • This application uses the browser as an independent application as an example for explanation. However, in specific implementation, other applications such as music, short messages, maps, etc. can also encapsulate the capabilities of the browser.
  • the browser in this application can be replaced by other Functional components of the browser within the application.
  • the application framework layer provides an application programming interface (API) and programming framework for applications in the application layer.
  • API application programming interface
  • the application framework layer includes some predefined functions.
  • the application framework layer can include a window manager, content provider, view system, phone manager, resource manager, notification manager, etc.
  • a window manager is used to manage window programs.
  • the window manager can obtain the display size, determine whether there is a status bar, lock the screen, capture the screen, etc.
  • Content providers are used to store and retrieve data and make this data accessible to applications.
  • Said data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
  • the view system includes visual controls, such as controls that display text, controls that display pictures, etc.
  • a view system can be used to build applications.
  • the display interface can be composed of one or more views.
  • a display interface including a text message notification icon may include a view for displaying text and a view for displaying pictures.
  • the phone manager is used to provide communication functions of the electronic device 100 .
  • call status management including connected, hung up, etc.
  • the resource manager provides various resources to applications, such as localized strings, icons, pictures, layout files, video files, etc.
  • the notification manager allows applications to display notification information in the status bar, which can be used to convey notification-type messages and can automatically disappear after a short stay without user interaction.
  • the notification manager is used to notify download completion, message reminders, etc.
  • the notification manager can also be notifications that appear in the status bar at the top of the system in the form of charts or scroll bar text, such as notifications for applications running in the background, or notifications that appear on the screen in the form of conversation windows. For example, text information is prompted in the status bar, a beep sounds, the electronic device vibrates, the indicator light flashes, etc.
  • Android runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system.
  • the core library contains two parts: one is the functional functions that need to be called by the Java language, and the other is the core library of Android.
  • the application layer and application framework layer run in virtual machines.
  • the virtual machine executes the java files of the application layer and application framework layer into binary files.
  • the virtual machine is used to perform object life cycle management, stack management, thread management, security and exception management, and garbage collection and other functions.
  • System libraries can include multiple functional modules. For example: surface manager (surface manager), media libraries (Media Libraries), 3D graphics processing libraries (for example: OpenGL ES), 2D graphics engines (for example: SGL), etc.
  • the surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications.
  • the media library supports playback and recording of a variety of commonly used audio and video formats, as well as static image files, etc.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, composition, and layer processing.
  • 2D Graphics Engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least display driver, camera driver, audio driver, and sensor driver.
  • the following exemplifies the workflow of the software and hardware of the electronic device 100 in conjunction with a web page access scenario.
  • the corresponding hardware interrupt is sent to the kernel layer.
  • the kernel layer processes touch operations into raw input events (including touch coordinates, timestamps of touch operations, and other information). Raw input events are stored in the kernel layer.
  • the application framework layer obtains the original input event from the kernel layer and identifies the control corresponding to the input event. Assume that the touch operation is a touch-click operation and the control corresponding to the click operation is the browser's access control.
  • the browser calls the interface of the application framework layer to obtain the URL corresponding to the URL entered by the user in the browser's address bar.
  • the web page content is then started by calling the kernel layer to start the display driver, and the acquired web page content is displayed on the display screen 194 .
  • FIG. 3C exemplarily shows a schematic diagram of the hardware structure of a server 200.
  • the server 200 may include one or more processors 201, communication interfaces 202, and memories 203.
  • the processors 201, the communication interfaces 202, and the memories 203 may be connected through a bus or other means.
  • the embodiment of the present application uses Take bus 204 connection as an example. in:
  • the processor 201 may be composed of one or more general-purpose processors, such as a CPU.
  • the processor 201 may be used to run relevant program codes of the device control method.
  • the communication interface 202 may be a wired interface (such as an Ethernet interface) or a wireless interface (such as a cellular network interface or using a wireless LAN interface) for communicating with other nodes. In this embodiment of the present application, the communication interface 202 may be specifically used to communicate with the electronic device 100 .
  • the memory 203 may include volatile memory (volatile memory), such as RAM; the memory may also include non-volatile memory (non-vlatile memory), such as ROM, flash memory (flash memory), HDD or solid state drive SSD. Memory 203 may also include a combination of the above types of memory.
  • volatile memory volatile memory
  • non-vlatile memory non-volatile memory
  • ROM read-only memory
  • flash memory flash memory
  • HDD solid state drive SSD.
  • Memory 203 may also include a combination of the above types of memory.
  • the memory 203 can be used to store a set of program codes, so that the processor 201 can call the program codes stored in the memory 203 to implement the server implementation method of the embodiment of the present application.
  • the memory 203 may also be a storage array, etc.
  • the server 200 may include multiple servers, such as a web server, a backend server, a download server, etc.
  • the hardware structure of these multiple servers may refer to the hardware structure of the server 200 shown in FIG. 3C.
  • server 200 shown in FIG. 3C is an implementation of an example of an embodiment of the present application. In actual applications, the server 200 may also include more or fewer components, which is not limited here.
  • 4A-4C exemplarily illustrate a user interface schematic diagram of a web page access process.
  • the electronic device 100 can display a desktop 410 , and the desktop 410 can display icons of one or more application programs (for example, a music icon, a gallery icon, an email icon, a video icon, an icon of this computer). icon, computer manager icon and browser icon 411, etc.).
  • a taskbar 412 is also displayed below the desktop 410 .
  • the task bar 412 may include a start menu, a search control, and one or more setting icons (for example, a sound setting icon, a time setting icon, etc.).
  • the task bar 412 can remain displayed at the bottom of the display area of the electronic device 100 when the application interface is switched, and can cover and display on the upper layer of the application interface.
  • the electronic device 100 can also display a pointer 413 , which is used to indicate the current position of the mouse to be operated on the interface displayed by the electronic device 100 .
  • the mouse may be located on the electronic device 100 or may be the electronic device 100 of external devices. The user can use the mouse to control the movement of the pointer 413 on the interface displayed on the electronic device 100, left-click, left-double-click, left-click and drag, right-click and other operations.
  • the electronic device 100 may receive user input (eg, a left mouse button click) toward the browser's icon 411 . In response to the input, the electronic device 100 may display the browser's user interface 420 as shown in FIG. 4B.
  • user input eg, a left mouse button click
  • user interface 420 may include an address bar 421 and access controls 422.
  • the address bar 421 is used to receive the URL input by the user.
  • the user can enter the URL in the address bar 421 through a keyboard.
  • the keyboard can be a virtual keyboard or a physical keyboard located on the electronic device 100 , or it can be an external device of the electronic device 100 .
  • the access control 422 can trigger access to the URL in the address bar 421.
  • the electronic device 100 may receive the user's input (eg, mouse) for the access control 422 Left click), in response to the input, the electronic device 100 may display a web page 430 as shown in FIG. 4C.
  • the electronic device 100 may display a web page 430 as shown in FIG. 4C.
  • the web page 430 may include an address bar 431, a scroll bar 432, a search bar 433, a login control 434, and multiple advertising columns (for example, an advertising column 435, an advertising column 436, an advertising column 437 in the form of a bay window, etc.) and multiple categories 438 (for example, the category of women's clothing/women's shoes/underwear, the category of men's clothing/men's shoes, the category of beauty/skin care/personal care 438A, etc.).
  • multiple advertising columns for example, an advertising column 435, an advertising column 436, an advertising column 437 in the form of a bay window, etc.
  • categories 438 for example, the category of women's clothing/women's shoes/underwear, the category of men's clothing/men's shoes, the category of beauty/skin care/personal care 438A, etc.
  • the address bar 431 may display the URL of the web page 430. For example, if the URL of the web page 430 is "gouwu.huawei.com", then the web page 430 is the homepage of the shopping website.
  • the electronic device 100 may receive user input for the scroll bar 432 (eg, hold down the left mouse button and drag downward), and display other content of the web page 430 in response to the input.
  • user input for the scroll bar 432 eg, hold down the left mouse button and drag downward
  • the search bar 433 may be used to receive keywords input by the user.
  • the web page 430 may also include a search control 433A.
  • the electronic device 100 may receive a user's input (for example, a left mouse button click) for the search control 433A, and in response to the input, query content related to the keywords in the search bar 433, and Display the queried content.
  • the electronic device 100 may receive user input (eg, left mouse button click) on the login control 434, and in response to the input, display the login interface of the current website (eg, a shopping website).
  • user input eg, left mouse button click
  • the advertising column 435 may display an advertisement of "Elegant Women's Clothing, Buy One Get One Free".
  • the electronic device 100 may receive the user's input (for example, a left click of the mouse) on the advertising column 435, and in response to the input, display the advertisement in the advertising column 435. Details of the ad.
  • the instructions for advertising column 436 are similar.
  • the advertisement column 437 in the form of a bay window can display advertisements for "popular games", and the advertisement column 437 can trigger the display of detailed content of the advertisement.
  • the advertisement column 437 may include a cancel control 437A for canceling display of the advertisement column 437.
  • the multiple categories 438 are explained by taking the "personal care” category in the beauty/skin care/personal care category 438A as an example.
  • the "beauty” category, "skin care” category and other categories are similar.
  • the electronic device 100 can receive the user's "personal care” category.
  • Input of the "Personal Care” category for example, left click of the mouse, in response to the input, the details of the "Personal Care” category are displayed.
  • the electronic device 100 may also display a pointer 439.
  • the pointer 439 When the pointer 439 is located in an area outside the operable control (eg, at position 1), the pointer 439 may be displayed in an arrow shape.
  • the pointer 439 When the pointer 439 is located in the area where the operable control is located, the pointer 439 may be displayed in the shape of a hand. For example, when the pointer 439 is located at position 2 in the area where the advertisement column 435 is located, the pointer 439 may be displayed in the shape of a hand.
  • Web page 430 can record the user's behavioral data during the browsing process through the browser (for example, the browser interprets and executes a JS script for collecting behavioral data, that is, a collection script), such as but not limited to including at least one of the following: left mouse button
  • a JS script for collecting behavioral data, that is, a collection script
  • left mouse button The behavior of holding down the scroll bar 432 for dragging, the exposure time of the web page 430, the keywords entered by the user in the search bar 433, and the left mouse button click on the search control 433A and the left mouse button click on the login control 434. Clicking behaviors such as left-clicking the advertisement column, left-clicking the category in the category 438, etc.
  • the webpage 430 can upload the above behavioral data to the webpage content provider of the webpage 430 through the browser (for example, the browser interprets and executes a JS script for reporting behavioral data to the webpage content provider, that is, a reporting script) (for example, an electronic device 100 sends the above behavioral data to the web server 200), so the user's privacy security is not effectively protected.
  • the browser interprets and executes a JS script for reporting behavioral data to the webpage content provider, that is, a reporting script
  • an electronic device 100 sends the above behavioral data to the web server 200
  • the web content provider of web page 430 can form a user profile of the user based on the obtained behavioral data, and recommend personalized content to the user based on the user profile.
  • the advertisement column in the web page 430 displayed by the electronic device 100 may display advertisements corresponding to the user's portrait. For example, when the user browses the web page 430 shown in Figure 4C, the left mouse button clicks on the beauty/skin care/personal care category 438A. The next time the user visits the web page 430, the advertisement column in the web page 430 displayed by the electronic device 100 can Display ads related to beauty/skin care/personal care.
  • This application provides a webpage access method that can prevent webpage content providers from obtaining behavioral data that does not meet the user's privacy requirements, thereby effectively protecting the user's privacy and security.
  • the web page 430 shown in Figure 4C returned by the web content provider does not include JS scripts for collecting and/or reporting behavioral data that does not meet the user's privacy requirements, and the user can browse the web page shown in Figure 4C normally.
  • Web page 430 web content providers cannot obtain behavioral data that does not meet the user's privacy requirements. In other words, while ensuring the privacy and security of users, users can browse the web normally without affecting the user experience.
  • the user can browse the web page 430 shown in Figure 4C normally.
  • the browser can check the JS script in web page 430.
  • the browser can interpret and execute the JS script that is used to collect and/or report the behavioral data that does not meet the user's privacy requirements.
  • the browser will not interpret the JS script that requires behavioral data (it can also be called blocking execution).
  • the browser can check whether the behavioral data 1 complies with the user's privacy requirements.
  • the web page 430 can interpret and execute the JS script for reporting the behavior data 1 through the browser to upload the behavior data 1 to the web content provider of the web page 430; if not, the browser will prevent the web page 430 from transmitting the behavior data 1 Web content provider uploaded to web page 430. Therefore, web content providers cannot obtain behavioral data that does not meet users' privacy requirements. While ensuring users' privacy and security, users can browse the web normally without affecting the user's experience.
  • the web content provider cannot obtain behavioral data that does not meet the user's privacy requirements, it may happen that the obtained behavioral data cannot form a user portrait of the user, and the web content provider cannot obtain the user's profile.
  • Recommend personalized content For example, when the user visits a shopping website next time, the homepage of the shopping website displayed by the electronic device 100 may be the same as before (webpage 430 shown in FIG. 4C ).
  • part of the content in the web page displayed by the electronic device 100 may be hidden.
  • the electronic device 100 may display the web page 440 shown in FIG. 4D .
  • the web page 440 is similar to the web page 430 shown in Figure 4C. The difference is that the web page 440 does not include an advertising column 435, an advertising column 436, and an advertising column 437 in the form of a bay window. It can also be understood as an advertising column 435, Advertisement column 436 and advertisement column 437 are hidden. Users cannot operate these hidden controls.
  • the web page displayed by the electronic device 100 may include prompt information to remind the user that the browsing behavior will be recorded by the web page.
  • the electronic device 100 displays the web page 450 shown in Figure 4E.
  • the web page 450 is similar to the web page 430 shown in FIG. 4C , except that the web page 450 also includes prompt information 451 .
  • the prompt information 451 may be determined based on the user's privacy requirements. For example, it is assumed that the user's privacy requirements include not allowing access to click behavior and user-input content. Therefore, the prompt information 451 displays related prompts about the click behavior and user-input content. : "This webpage will record the search terms you enter, click behavior and other behaviors, please operate with caution.” use The user can obtain through the prompt information 451 that the browsing behavior in the webpage will be recorded by the webpage. Therefore, the user may not perform browsing behavior that triggers the collection of behavioral data that does not meet his or her privacy requirements.
  • web page 450 is a web page that is displayed normally and can be operated normally by users. While ensuring the privacy and security of users, it allows users to obtain relatively complete web page content and improves user experience.
  • the electronic device 100 may also display a web page for the purpose of recording the user's behavioral data (for example, for making recommendations).
  • the electronic device 100 may also display corresponding prompt information near controls that trigger the collection of behavioral data that does not meet the user's privacy requirements.
  • the electronic device 100 may display prompt information near an advertisement column: "This Clicks on this control will be logged by the web page.”
  • the electronic device 100 displays corresponding prompt information. For example, when the pointer is located in an area where the search bar is located, the electronic device 100 The device 100 displays prompt information: "This web page will record the search terms you entered.”
  • the electronic device 100 may display prompt information. For specific examples, see FIG. 4F-FIG. 4G.
  • the electronic device 100 may receive user input (eg, left mouse button click) for the search bar 433 in the web page 430 shown in FIG. 4C, and in response to the input, display the web page 460 shown in FIG. 4F.
  • the web page 460 is similar to the web page 430 shown in Figure 4C.
  • the difference is that the web page 460 also includes prompt information 461.
  • the prompt information 461 can display "This web page will record the search terms you entered, please operate with caution.” .
  • the user can obtain through the prompt information 461 that the keywords entered in the search bar 433 will be recorded by the web page.
  • the user can choose whether to continue to enter the keywords in the search bar 433 according to his own needs.
  • the user does not enter keywords in the search bar 433. Therefore, the web page 460 cannot record the content entered by the user in the web page 460 through the browser, and the web content provider cannot obtain the key words that do not meet the user's privacy requirements. word.
  • the electronic device 100 may receive the user's input (for example, the left mouse button) for the search control 433A in the web page 430 shown in FIG. 4C click), in response to the input, web page 470 shown in Figure 4G is displayed.
  • the web page 470 is similar to the web page 430 shown in Figure 4C.
  • the difference is that the search bar 433 in the web page 470 can display keywords input by the user, such as "smartphone".
  • the web page 470 also includes prompt information 471.
  • the prompt information 471 may display "Continue to go. This web page will record this behavior. Do you want to continue?" The user can obtain through the prompt information 471 that the search behavior will be recorded by the web page, and therefore can choose whether to continue to perform the search behavior according to his own needs.
  • the prompt information 471 may also display a confirmation control 471A and a cancellation control 471B.
  • the electronic device 100 may receive user input (eg, left mouse button click) toward the confirmation control 471A, and in response to the input, display search results related to the keywords in the search bar 433.
  • the web page 470 can record the behavioral data of this search behavior through the browser, for example, the keywords entered by the user in the search bar 433 and the left mouse button click on the search control 433A.
  • the electronic device 100 may receive the user's input (for example, a left mouse click) on the cancel control 471B, and in response to the input, cancel the display of the prompt information 471, and the collection script corresponding to the search control 433A will not be Triggered, therefore, the web content provider cannot obtain the behavioral data of this search behavior.
  • the user's input for example, a left mouse click
  • the electronic device 100 may display a prompt message of "execution failure".
  • the electronic device 100 may receive the user's input (for example, the left mouse button) for the search control 433A in the web page 430 shown in FIG. 4C click), in response to this input, web page 480 shown in Figure 4H is displayed.
  • web page 480 is similar to web page 430 shown in Figure 4C. The difference is that web page 480 also includes prompt information 481.
  • the prompt information 481 can display "This operation does not meet privacy requirements and the execution failed." Moreover, for the above-mentioned user input (for example, left mouse button click) for the search control 433A in the web page 430 shown in FIG. 4C, the electronic device 100 will not perform a search operation (query and input in the search bar 433 in the web page 430). Keyword-related search results), the collection script corresponding to the search control 433A will not be executed. Therefore, the web content provider cannot obtain the behavioral data corresponding to the search operation (for example, including input content that does not meet the user's privacy requirements and click behavior).
  • control 1 that has little impact on the user experience can be hidden, and the control 2 that has a greater impact on the user experience can be an inoperable control.
  • Control 1 and control 2 are normally in operation.
  • the displayed web page (such as web page 430 shown in Figure 4C) may trigger the acquisition of behavioral data that does not meet the user's privacy requirements. For example, assuming that the user's privacy requirements include not allowing the click behavior to be obtained, the electronic device 100 may display the web page 490 shown in FIG. 4I.
  • the web page 490 is similar to the web page 430 shown in Figure 4C.
  • the web page 490 does not include an advertisement column 437 in the form of a bay window, which can also be understood as the advertisement column 437 being hidden.
  • the advertisement column 435 and the advertisement column 436 in the web page 490 are inoperable controls.
  • the advertisement column 435 in the web page 490 is used as an example for explanation.
  • the pointer 439 when the pointer 439 is located at position 2 in the area where the advertisement column 435 is located, the pointer 439 is displayed in an arrow shape, which is consistent with the display mode of the pointer 439 located in an area outside the operable controls shown in Figure 4C.
  • the electronic device 100 receives the user's input for the advertisement column 435, it will not trigger the display of the detailed content of the corresponding advertisement. That is to say, compared with the web page 430 shown in Figure 4C, in the web page 490, the advertising column 437 that has a smaller impact on the user experience can be hidden, and the advertising columns 435 and 436 that have a greater impact on the user experience can be disabled. Operating controls.
  • the display method of the pointer is not limited to the above example.
  • the pointer When the pointer is located in the area where the operable control is located, it can be displayed in the first way.
  • the pointer When the pointer is located in the inoperable area, it can be displayed in the second way.
  • the first way and the second way are the same or Differently, this application does not limit the specific contents of the first mode and the second mode.
  • the user's privacy requirements may be preset by the electronic device 100 .
  • the user's privacy requirements may be obtained by the electronic device 100 analyzing personal information such as the user's web page behavior log (for example, including browsing behaviors that the user is accustomed to performing). It is not limited to this.
  • the user's privacy requirements may be set by the user through the electronic device 100. For specific examples, see FIG. 5A-FIG. 5C.
  • the electronic device 100 After the electronic device 100 receives the URL entered by the user in the address bar 421 in the user interface 420 shown in FIG. 4B (for example, the URL of the shopping website "gouwu.huawei.com"), the electronic device 100 can receive the user's request in the user interface 420. In response to input to access control 422 (eg, a left mouse button click), electronic device 100 may display web page 510 as shown in FIG. 5A.
  • access control 422 eg, a left mouse button click
  • the web page 510 is similar to the web page 430 shown in Figure 4C.
  • the difference is that the web page 510 also includes prompt information 511.
  • the prompt information 511 can display the browsing behavior to be collected by the web page 510, and optionally the collected browsing behavior. Purpose of behavior. For example, assuming that the browsing behavior with the highest privacy level that needs to be collected on web page 510 is click behavior, the collected browsing behavior If the purpose of the behavior is to recommend personalized content, the prompt information 511 may display "This webpage attempts to collect click behavior and other behaviors for recommendation.”
  • the prompt information 511 may also display a permission control 511A and a prohibition control 511B.
  • the allow control 511A can be used to allow the web page 510 to collect and/or report the behavior data indicated by the prompt information 511.
  • the electronic device 100 can receive the user's input (for example, a left mouse button click) on the allow control 511A, and respond to the input , set the user's privacy requirements when accessing web page 510 to allow obtaining behavioral data with a privacy level equal to or lower than the click behavior.
  • the prohibition control 511B can be used to prohibit the web page 510 from collecting and/or reporting the behavior data indicated by the prompt information 511.
  • the electronic device 100 can receive the user's input (for example, left mouse button click) for the permission control 511A, and respond to the input , set the user's privacy requirements when accessing web page 510 to not allow obtaining behavioral data with a privacy level equal to or higher than the click behavior.
  • the user's input for example, left mouse button click
  • the electronic device 100 when the user performs a browsing behavior that triggers the collection of behavior data, the electronic device 100 can display prompt information similar to prompt information 511, and the behavior data indicated by the prompt information can be the browsing behavior.
  • Behavioral triggers collect behavioral data.
  • the electronic device 100 receives the user's search control 433A, login control 434, advertising column 435 (other advertising columns are similar) or beauty/skin care/personal care category 438A (other categories are similar) in the web page 430 shown in FIG. 4C ) is input (for example, left mouse click), prompt information 511 may be displayed.
  • the permission control in the prompt information can also be used to trigger the electronic device 100 to continue to perform the operation corresponding to the browsing behavior, and the prohibition control in the prompt information can also be used to trigger the electronic device 100 to cancel the execution of the operation corresponding to the browsing behavior. operate.
  • the electronic device 100 can display prompt information similar to prompt information 511 .
  • the permission control in the prompt information can also be used to allow the browser to execute the reporting script in the web page for uploading the behavioral data to the web content provider, and the prohibition control in the prompt information can also be used to prohibit browsing.
  • the server executes the reporting script. This application does not limit the specific method of triggering the display of information similar to prompt information 511.
  • the electronic device 100 can display the setting interface 520 of the browser.
  • the setting interface 520 can be used by the user to set privacy requirements when accessing web pages through the browser.
  • the setting interface 520 may include prompt information 521, and the prompt information 521 may display "the website will collect your browsing behavior when you visit the webpage, so as to achieve personalized recommendation of advertisements and other content.”
  • the setting interface 520 may also include a setting name 522, in which "the highest level of behavioral data allowed to be collected" may be displayed.
  • the setting name 522 includes multiple setting options, including, for example, setting option 523, setting option 524, setting option 525, and setting option 526, where any setting option corresponds to a privacy level of behavioral data.
  • the setting option 523 may include a setting name 523A and a setting switch 523B.
  • the setting name 523A may display a description of the behavioral data of the privacy level corresponding to the setting option 523.
  • the privacy The name of the level of behavioral data is "sensitive personal data” and the example is "data such as content entered into web pages”.
  • the setting switch 523B can be used to set the highest level of behavioral data allowed to be obtained to the "sensitive personal data" corresponding to the setting option 523, or to cancel the setting.
  • the setting interface 520 also includes a setting option 527.
  • the setting option 527 may include a setting name 527A and a setting switch 527B.
  • the setting name 527A may display "No collection of any behavioral data is allowed", and the setting switch 527B may be used to set Do not allow any behavioral data to be obtained when accessing web pages through this browser, or cancel this setting.
  • the setting switch 523B is in the on state, and the other The setting switch in the setting options is in the off state.
  • the electronic device 100 receives the user's input (for example, left mouse button click) on the setting switch 527B, in response to the input, the setting switch 527B is switched from the off state to the on state.
  • the setting switch 523B is switched from the on state to the off state, and the privacy requirement set by the user when accessing the web page through the browser is not to allow the acquisition of any behavioral data.
  • the electronic device 100 may display a user interface 530 of the browser.
  • the user interface 530 may include prompt information 531, and the prompt information 531 may display "incognito mode" to prompt that the browser has currently entered the incognito mode.
  • the user interface 530 may include instructions related to the "incognito mode".
  • the prompt information 532 may include information that the browser will not save in the "incognito mode” (for example, browsing history, cookies, website data, information entered in the form). , permissions granted to the website, etc.), the prompt information 533 may include organizations that may still obtain the user's behavioral data in "incognito mode" (for example, website providers, employers or schools, Internet service providers, etc.).
  • the user interface 530 may also include a settings option 534, which may include a setting name 534A and a setting switch 534B.
  • the setting name 534A may display the name of the setting (e.g., "Secure Access Function"), and a description of the setting (e.g., "Secure Access Function”). , "When this feature is turned on, the provider of the website is not allowed to collect any behavioral data").
  • the setting switch 534B can be used to set not allowing any behavioral data to be obtained in the incognito mode, or to cancel the setting. For example, setting the switch 534B in the user interface 530 to an on state may indicate that the privacy requirement set by the user in the incognito mode does not allow the acquisition of any behavioral data.
  • the electronic device 100 can display the user interface 530 shown in Figure 5C.
  • the user interface 530 may not include settings.
  • Option 534, or the setting switch 534B in the user interface 530 is in a closed state. The user can open the setting interface of the browser in the incognito mode, and set the privacy requirements in the incognito mode based on the setting interface.
  • the electronic device 100 can display the user interface 520 shown in Figure 5B, and the setting switch in the user interface 520 523B is in the on state, and the setting switches included in other setting options are in the off state, which can indicate that the highest level of behavioral data allowed to be obtained in the incognito mode set by the user is the "sensitive personal data" corresponding to setting option 523, that is to say,
  • the privacy requirements for users in incognito mode are to allow access to behavioral data with a privacy level equal to or lower than "sensitive personal data".
  • This application provides an interactive method that protects user privacy and security in web page access scenarios, making it more convenient for users to use and providing a better experience.
  • the web page access method involved in this application is introduced. This method can be applied to the web page access system 10 shown in FIG. 2 .
  • Figure 6 is a schematic flowchart of a web page access method provided by an embodiment of the present application. The method may include but is not limited to the following steps:
  • S100 The web content provider uses extended languages and/or extended scripts to generate web content.
  • S100 is an optional step.
  • a web page content provider uses extended HTML language and extended JavaScript (JS) script to generate web page content (which may also be called web page data), and the web page content is used by the browser to display the corresponding web page.
  • JS extended JavaScript
  • the web page content generated using the extended language may include first indication information, and the first indication information is used to indicate the privacy level of behavioral data obtained (including collected and reported) by the web page (this application may refer to the privacy level as level, category or type, etc.), optionally, the first indication information is used to indicate the highest privacy level of behavioral data obtained by the web page.
  • the first indication information is used to indicate the highest privacy level of behavioral data obtained by the web page.
  • pdLv1 is used to indicate the privacy level of the obtained behavioral data. When pdLv1 is placed within a tag in web page content, it can indicate that the content involved in the tag will obtain behavioral data with a privacy level lower than or equal to the privacy level indicated by pdLv1.
  • the privacy level of the behavioral data based on the above example (from high to low according to the privacy level is: sensitive personal data, high-impact personal data, medium-impact personal data and low-impact personal data), the value of pdLv1 can have the following five situations:
  • the pdLv1 value When the pdLv1 value is 4, it indicates that sensitive personal data (such as content entered by the user on the web page), optionally and behavioral data with a privacy level lower than sensitive personal data will be obtained;
  • pdLv1 When pdLv1 has a value of 3, it indicates that high-impact personal data (such as click behavior) and optionally behavioral data with a privacy level lower than high-impact personal data will be obtained;
  • the pdLv1 value When the pdLv1 value is 2, it indicates that medium-impact personal data (such as the exposure time of the web page) will be obtained, and optionally behavioral data with a privacy level lower than medium-impact personal data;
  • pdLv1 When pdLv1 has a value of 1, it indicates that low-impact personal data (such as the dragging behavior of the scroll bar) will be obtained, optionally and behavioral data with a privacy level lower than low-impact personal data;
  • the highest privacy level among the multiple privacy levels shall prevail, which means that behavioral data whose privacy level is lower than or equal to the highest privacy level will be obtained.
  • the first web page includes tag 1 and tag 2, pdLv1 with a value of 3 is placed in tag 1, and pdLv1 with a value of 4 is placed in tag 2. This can indicate that the first web page will obtain a privacy level equal to or lower than ( Behavioral data of sensitive personal data (indicated by pdLv1 with a value of 4).
  • the first web page generated using the extended language may include second indication information, and the second indication information is used to indicate the purpose of the first web page in obtaining behavioral data and/or the impact on the user.
  • the second indication information is used to indicate the purpose of the first web page in obtaining behavioral data and/or the impact on the user.
  • pdPurpose is used to indicate the purpose of obtaining behavioral data and/or the impact on the user.
  • the first web page generated using the extended script may include an extended collection script (also referred to as a collection interface), and the first web page may use the collection interface to collect (also referred to as generating) the user's behavioral data.
  • an extended collection script also referred to as a collection interface
  • the first web page may use the collection interface to collect (also referred to as generating) the user's behavioral data.
  • user behavior data is generated/collected through generatePd.
  • the first web page generated using the extended script may include an extended reporting script (also known as reporting interface), and the first web page may use the reporting interface to upload the user's behavior data (also known as sending or reporting ) to the web content provider of the first web page.
  • extended reporting script also known as reporting interface
  • the first web page may use the reporting interface to upload the user's behavior data (also known as sending or reporting ) to the web content provider of the first web page.
  • a web content provider may generate a web content using an extension language and/or an extension script.
  • the web content provider will return this kind of web content. Understandably, the content of such web pages may not meet the privacy requirements of some users.
  • the web content provider may use extension languages and/or extension scripts to generate multiple web content.
  • the corresponding webpage content can be returned according to the information indicating the user's privacy requirements carried by the request (ie, the third indication information in S101 below), that is, for Different users have different privacy requirements and return different web content.
  • the browser requests the web page content provider to obtain the web page content corresponding to the first URL (carrying third indication information indicating the privacy level of the behavioral data that is allowed to be obtained).
  • the browser in this application can be, but is not limited to, an independent application, an independent applet, a functional component packaged in other applications, a functional component packaged in other small programs, or other forms of software modules.
  • the browser requests the web content provider to obtain the web page content corresponding to the first URL, and the first URL is associated with the first search request.
  • the electronic device 100 receives the first search request, including: the electronic device 100 receives the first URL input by the user, and triggers a user operation to access the web page corresponding to the first URL.
  • the electronic device 100 displays the user interface 420 of the browser shown in FIG. 4B, it receives the URL entered by the user in the address bar 421 (for example, the URL of the shopping website "gouwu.huawei.com"), and then can receive the URL entered by the user in the address bar 421.
  • the access control 422 eg, left mouse button click
  • the browser requests the web content provider of the shopping website to obtain the home page of the shopping website.
  • the browser when the browser initiates a request to the web content provider, it may carry third indication information.
  • the third indication information is the header field carried in the request: X-Allowed-PersonalData-Lvl.
  • the third indication information is used to indicate the privacy level of the behavioral data that the user is allowed to obtain (also called collection and/or reporting).
  • the third indication information is used to indicate the highest privacy level of the behavioral data that the user is allowed to obtain. level.
  • the third indication information is used to indicate the user's privacy requirements.
  • the privacy level indicated by the third indication information may be determined according to the privacy requirements of the current user.
  • the user's privacy requirements may be set by the user through the electronic device 100.
  • the electronic device 100 may also be preset by the electronic device 100 .
  • it may be obtained by the electronic device 100 analyzing personal information such as the user's web page behavior (for example, including the browsing behavior the user is accustomed to performing), which is not limited in this application.
  • the third indication information is X-Allowed-PersonalData-Lvl.
  • the privacy level of behavioral data in the above example from high to low privacy level: sensitive personal data, high impact personal data, medium impact personal data and low impact personal data
  • the value of X-Allowed-PersonalData-Lvl There can be the following 5 situations:
  • X-Allowed-PersonalData-Lvl When the value of X-Allowed-PersonalData-Lvl is 4, it indicates that it is allowed to obtain sensitive personal data (such as content entered by the user on the web page), optionally and behavioral data with a privacy level lower than sensitive personal data;
  • X-Allowed-PersonalData-Lvl When the value of X-Allowed-PersonalData-Lvl is 3, it indicates that it is allowed to obtain high-impact personal data (such as click behavior), optionally and behavioral data with a privacy level lower than high-impact personal data;
  • X-Allowed-PersonalData-Lvl When the value of X-Allowed-PersonalData-Lvl is 2, it indicates that it is allowed to obtain medium-impact personal data (such as the exposure time of web pages), optionally and behavioral data with a privacy level lower than medium-impact personal data;
  • X-Allowed-PersonalData-Lvl When the value of X-Allowed-PersonalData-Lvl is 1, it indicates that low-impact personal data (such as the dragging behavior of the scroll bar) is allowed to be obtained, optionally and behavioral data with a privacy level lower than low-impact personal data;
  • S102 The webpage content provider sends the first webpage content to the browser.
  • the webpage content provider responds to the browser's request and sends the first webpage content corresponding to the first URL to the browser.
  • the first web page content may include the above-mentioned first indication information, and the browser may obtain the privacy level of behavioral data that the first web page content will trigger collection and reporting based on the first indication information.
  • the browser The privacy level of the behavioral data collected and/or reported may be obtained according to the first indication information, and the web page content corresponding to the first indication information triggers the collection and/or reporting.
  • the first web page content may include the above-mentioned second indication information, and the browser may obtain the first web page content according to the second indication information, which will trigger the collection and reporting of the purpose of the behavioral data and/or the impact on the user.
  • the browser may obtain according to the second indication information, and the web page content corresponding to the second indication information triggers the use of the collected and/or reported behavioral data.
  • the web content provider when it sends the first web content to the browser, it may carry fourth indication information.
  • the fourth indication information is the header field carried by the web content provider when returning the web content: X- Request-PersonalData-Lvl.
  • the fourth indication information is used to indicate the privacy level of the behavioral data that the web content provider wishes to obtain.
  • the fourth indication information is used to indicate the highest privacy level of the behavioral data that the web content provider wishes to obtain.
  • the fourth indication information is X-Request-PersonalData-Lvl, and the value of X-Request-PersonalData-Lvl can be 4, 3, 2, 1 or 0.
  • the specific description is the same as the above pdLv1, X-Allowed-PersonalData-Lvl The value examples of are similar and will not be repeated.
  • S103 The browser displays the first web page according to the content of the first web page.
  • the browser can render and display the first web page according to the content of the first web page.
  • the privacy level indicated by the fourth indication information carried when the web page content provider sends the first web page content to the browser is lower than or equal to the third indication carried by the browser when it initiates a request to the web page content provider.
  • the privacy level indicated by the first indication information included in the first web page content is lower than or equal to the privacy level indicated by the third indication information carried when the browser initiates a request to the web content provider.
  • the first web page is a normal web page that contains complete functions and does not contain additional prompt information.
  • the first web page is web page 430 shown in Figure 4C, and the complete web page content is displayed in web page 430 but is not displayed. There is additional prompt information, and the user can operate the controls in web page 430 normally.
  • the first web page content does not include a collection script for generating behavioral data that does not meet the user's privacy requirements, and a reporting script for reporting behavioral data that does not meet the user's privacy requirements. Therefore, the process of the user browsing the first webpage will not trigger the collection and reporting of behavioral data that does not meet the user's privacy requirements, ensuring the user's privacy security without the user being aware of it.
  • the first web page may not include the first information, and the first information is used to trigger the acquisition of behavioral data that does not meet the user's privacy requirements.
  • the user's privacy requirements indicated by the third indication information include not allowing the acquisition of high-impact personal data (taking click behavior as an example).
  • the first web page is the web page 440 shown in Figure 4D. Compared with the normal web page 430 shown in Figure 4C, in the web page 440, there are advertising columns 435, 436 and bay window form advertising columns 437 (these controls are the first information ) are hidden.
  • the first web page may include prompt information.
  • the prompt information is used to indicate that the first web page will obtain behavioral data that does not meet the user's privacy requirements.
  • the third instruction information instructs the user to allow access to behavioral data whose privacy level is lower than high-impact personal data, that is, the user is not allowed to access high-impact personal data (take click behavior as an example) and sensitive personal data (take the user input on the web page). content as an example).
  • the first web page is web page 450 shown in Figure 4E, Web page 450 includes prompt information 451: "This web page will record the search terms you enter, click behavior and other behaviors, please operate with caution.”
  • the prompt information is displayed.
  • the second information is used to trigger the acquisition of behavioral data that does not meet the user's privacy requirements.
  • the prompt information is used to indicate that the first web page will obtain behavioral data that does not meet the user's privacy requirements.
  • the prompt information is used to indicate that the first web page will obtain behavioral data triggered by the second information.
  • the prompt information is used to indicate that the first web page will obtain behavioral data triggered by the second information.
  • the prompt information is used to indicate that the currently performed operation does not meet the user's privacy requirements.
  • the user's privacy requirements indicated by the third indication information include not allowing the acquisition of high-impact personal data (taking click behavior as an example).
  • the electronic device 100 receives the user's input (for example, a left mouse click) on the search bar 433 in the web page 430 shown in Figure 4C, it displays the prompt information 461 in the web page 460 shown in Figure 4F: "This web page will Record the search terms you entered, please proceed with caution.”
  • the third instruction information instructs the user to allow access to behavioral data whose privacy level is lower than high-impact personal data, that is, the user is not allowed to access high-impact personal data (take click behavior as an example) and sensitive personal data (take the user input on the web page). content as an example).
  • the electronic device 100 After the electronic device 100 receives the keyword "smartphone" entered by the user in the search bar 433 included in the web page 430 shown in Figure 4C, if it receives the user's input for the search control 433A in the web page 430 shown in Figure 4C (for example, by clicking the left mouse button), the prompt information 471 in the web page 470 shown in Figure 4G can be displayed: “Continue to go, the web page will record this behavior, do you want to continue?" wherein "this behavior" can include the user Enter the keyword in the search bar 433 and click the search control 433A with the left mouse button.
  • the third information in the first web page may be non-operable information, which is operable information in a normal web page.
  • the third information is used to trigger the acquisition of information that does not meet the user's requirements. Behavioral Data for Privacy Requirements.
  • the electronic device 100 since the third information in the first web page is not operable, the electronic device 100 will not perform any operation when receiving the user's input for the third information in the first web page.
  • the user's privacy requirements indicated by the third indication information include not allowing the acquisition of high-impact personal data (taking click behavior as an example).
  • the first web page is the web page 490 shown in Figure 4I.
  • the advertisement column 435 and the advertisement column 436 are inoperable. Even if the electronic device 100 receives the user's input for the advertisement column 435 or the advertisement column 436, it will not trigger the display of the detailed content of the corresponding advertisement, that is, there will be no response.
  • the third information in the first web page is not operable, when the electronic device 100 receives the user's input for the third information in the first web page, prompt information is displayed, and the prompt information is used to indicate the currently performed operation. Execution failed.
  • the third instruction information instructs the user to allow access to behavioral data whose privacy level is lower than high-impact personal data, that is, the user is not allowed to access high-impact personal data (take click behavior as an example) and sensitive personal data (take the user input on the web page). content as an example).
  • the electronic device 100 After the electronic device 100 receives the keyword "smartphone" entered by the user in the search bar 433 included in the web page 430 shown in Figure 4C, if it receives the user's input for the search control 433A in the web page 430 shown in Figure 4C (for example, by clicking the left mouse button), the prompt information 481 in the web page 480 shown in Figure 4H can be displayed: "This operation does not meet the privacy requirements and the execution failed", and the electronic device 100 will not perform the search corresponding to this input. Operation (query search results related to the keyword entered in the search field 433 in the web page 430).
  • first information, second information, and third information may be controls in a web page.
  • S104 The browser executes the collection script in the first web page to generate user behavior data.
  • the user accesses the first web page
  • he or she can perform user operations such as dragging the scroll bar, clicking on controls, and entering keywords in the form.
  • the electronic device 100 receives a user operation, it can respond to the user operation and perform a corresponding operation.
  • the collection script embedded in the first web page can be triggered, and the browser can interpret and execute the collection script.
  • the collection script is used to collect /Generate behavioral data for this user operation. For example, when the browser displays the web page 430 shown in FIG.
  • the electronic device 100 receives the user's input for the advertisement column 435 in the web page 430 (for example, Click with the left mouse button), in response to the input, the detailed content of the advertisement corresponding to the advertisement column 435 is displayed.
  • the browser can interpret and execute the collection script corresponding to the advertisement column 435 in the web page 430 to collect click behavior on the advertisement column 435.
  • the collection script in the first web page can be automatically triggered without user operation triggering.
  • the browser when the browser displays the first web page, it may interpret and execute the collection script.
  • the order of S103 and S104 is not limited. For example, they may be executed simultaneously.
  • a collection script for collecting the exposure time of the web page is automatically triggered.
  • the first web page content does not include a collection script for generating behavioral data that does not comply with the user's privacy requirements, so the behavioral data generated in S104 all comply with the user's privacy requirements indicated by the third indication information.
  • S105 The browser executes the reporting script in the first web page to send the user's behavior data.
  • the browser may interpret and execute the reporting script in the first web page to send the collected user behavior data to the web content provider.
  • the electronic device 100 receives the user's input (for example, a left mouse click) on the advertisement column 435 in the web page 430, and responds to the input. , display the detailed content of the advertisement corresponding to the advertisement column 435.
  • the browser can interpret and execute the collection script corresponding to the advertisement column 435 in the web page 430 to collect click behavior on the advertisement column 435.
  • the browser can interpret and execute the reporting script corresponding to the advertisement column 435 in the web page 430, and send the collected click behavior on the advertisement column 435 to the web content provider.
  • the first web page content does not include a reporting script for reporting behavioral data that does not meet the user's privacy requirements, so the behavioral data reported in S105 all comply with the user's privacy requirements indicated by the third indication information.
  • the method also includes:
  • S106 The browser closes the first web page.
  • the browser closes the first web page.
  • S107 The browser requests the web page content provider to obtain the web page corresponding to the first URL.
  • the browser requests the web content provider to obtain web content corresponding to the first URL, and the first URL is associated with the second search request.
  • the web content provider cannot generate personalized recommendation content for the above-mentioned user, resulting in
  • the webpage content returned to the browser does not include personalized recommendation content.
  • the returned webpage content is still the first webpage content sent in S102, and the webpage content provider can perform S108.
  • S108 The webpage content provider sends the first webpage content to the browser.
  • S109 The browser displays the first web page according to the content of the first web page.
  • the browser may render and display the first web page according to the content of the first web page, that is, the web page currently displayed by the browser and the web page displayed by the browser when the user previously accessed the first web address (i.e., in S103 first web page), rather than a web page that includes personalized recommendation content for the above-mentioned users.
  • the existing network request can be extended (that is, it can carry third indication information), so that the browser can indicate the user's privacy requirements to the web content provider during the communication process, and the web content provider can return Web page content that meets the user's privacy requirements.
  • the returned web page content does not include JS scripts used to collect and/or report behavioral data that does not meet the user's privacy requirements, thereby effectively protecting the user's privacy requirements.
  • web content providers can selectively return different web content based on different privacy requirements, thereby meeting the different needs of different users, or the needs of the same user in different scenarios, with a wide range of usage scenarios and high product availability.
  • FIG. 7 is a schematic flowchart of yet another web page access method provided by an embodiment of the present application.
  • the method may include but is not limited to the following steps:
  • S200 The web content provider uses extended languages and/or extended scripts to generate web content.
  • the browser requests the web page content provider to obtain the web page content corresponding to the first URL (carrying third indication information indicating the privacy level of the behavioral data that is allowed to be obtained).
  • S202 The web page content provider sends the second web page content to the browser.
  • S200-S202 is similar to the description of S100-S102 in Figure 6. For details, please refer to the description of S100-S102 in Figure 6.
  • S203 The browser determines whether the content of the second web page meets the user's privacy requirements.
  • the web page content provider when the web page content provider sends the second web page content to the browser, it may carry the fourth indication information.
  • the browser can obtain the privacy level of the behavioral data that the web content provider wishes to obtain according to the fourth instruction information.
  • the browser determines whether the content of the second web page meets the user's privacy requirements, which may include: determining whether the privacy level indicated by the fourth indication information is lower than or equal to the privacy level of the behavioral data that the user is allowed to obtain. For example, when the privacy level indicated by the fourth indication information is lower than or equal to the privacy level of the behavioral data that the user is allowed to obtain, the browser may determine that the content of the second web page meets the user's privacy requirements.
  • the privacy level indicated by the fourth indication information is high, When the user allows the privacy level of behavioral data to be obtained, the browser may determine that the content of the second web page does not meet the user's privacy requirements.
  • the browser may determine whether the second webpage content meets the user's privacy requirements in combination with the fourth indication information and at least one of the first indication information, a collection script, and a reporting script included in the second webpage content.
  • the browser can determine whether the privacy level indicated by the first indication information is lower than or equal to the privacy level of behavioral data that the user is allowed to obtain, for example, when the privacy level indicated by the first indication information is higher than the behavioral data that the user is allowed to obtain. privacy level, the browser can determine that the content of the second web page does not meet the user's privacy requirements.
  • the browser may determine whether the second web page content includes a collection script for collecting behavioral data that does not meet the user's privacy requirements, for example, when the second web page content includes a collection script that is used to collect behavioral data that does not meet the user's privacy requirements.
  • the browser may determine that the content of the second web page does not meet the user's privacy requirements.
  • the browser can determine whether the second web page content includes a reporting script for reporting behavioral data that does not meet the user's privacy requirements. For example, when the second web page content includes a reporting script for reporting behavioral data that does not meet the user's privacy requirements. When using the reporting script, the browser can determine that the content of the second web page does not meet the user's privacy requirements.
  • the browser can obtain based on the content of the webpage that the content of the webpage includes a script that collects and reports behavioral data that does not meet the user's privacy requirements, thereby determining that the content of the webpage is inappropriate. Comply with users’ privacy requirements.
  • the browser may display the second webpage according to the second webpage content, that is, perform S204. In other embodiments, when the second webpage content does not meet the user's privacy requirements, the browser may display the adjusted second webpage according to the second webpage content and the user's privacy requirements, that is, perform S205.
  • the browser can render and display the second web page directly according to the content of the second web page.
  • the second web page content and the second web page please refer to the description of the first web page content and the first web page in S103 of FIG. 6 .
  • the browser can adjust the second webpage corresponding to the second webpage content according to the user's privacy requirements, and display the adjusted second webpage.
  • An example of the adjustment is shown below:
  • the browser can hide part of the content in the second webpage according to the user's privacy requirements. It can also be understood that the adjusted second webpage does not include the second webpage before the adjustment (that is, the content of the second webpage mentioned above).
  • the partial content in the corresponding second web page please refer to the description of "the first web page may not include the first information" in S103 of Figure 6 , wherein for the above-mentioned hidden partial content, please refer to the description of the first information.
  • the second web page adjusted by the browser may include the following content:
  • the browser can add additional prompt information to the second webpage according to the user's privacy requirements, which can also be understood as comparing the second webpage before adjustment (that is, the second webpage corresponding to the content of the second webpage).
  • web page the adjusted second web page also includes prompt information.
  • the first web page may include prompt information
  • the electronic device 100 receives the user's second information in the first web page in S103 of Figure 6 "When inputting, a prompt message will be displayed".
  • the browser can adjust the operable information in the second web page to inoperable information according to the user's privacy requirements. It can also be understood that the second web page before the adjustment (i.e., the content of the second web page mentioned above) The operable information 1 in the corresponding second web page) is inoperable information in the adjusted second web page.
  • the third information in the first web page may be inoperable" in S103 of Figure 6 "Operable information", where the above inoperable information can be found in the description of the third information.
  • S206 The browser executes the collection script in the second web page to collect/generate the user's behavior data.
  • the browser executes the collection script in the second web page. In other embodiments, after the browser executes S205, the browser executes the collection script in the adjusted second web page.
  • the description of the browser interpreting and executing the collection script can be found in the description of the browser interpreting and executing the collection script in S104 of Figure 6 .
  • S207 The browser does not allow the collection and/or reporting of behavioral data that does not meet the user's privacy requirements.
  • S207 is an optional step.
  • the browser may not execute the web page for collecting information that does not meet the user's requirements.
  • Scripts for collecting behavioral data that meet privacy requirements, and reporting scripts for reporting behavioral data that do not meet the user's privacy requirements can also be understood as preventing the execution of these collection scripts and reporting scripts.
  • the browser can check whether the behavioral data collected by the collection script meets the user's privacy requirements (for example, whether the privacy level of the collected behavioral data is higher than The privacy level of behavioral data a user is allowed to obtain). If it does not match, the browser will not interpret and execute the collection script.
  • the order of S206 and S207 is not limited. For example, assume that the user's privacy requirements include not allowing access to high-impact personal data (take click behavior as an example) and sensitive personal data (take the content entered by the user on a web page as an example).
  • Electronic equipment After receiving the keyword "smartphone" input by the user in the search bar 433 included in the web page 430 shown in Figure 4C, 100 can receive the user's input (for example, a mouse) for the search control 433A in the web page 430 shown in Figure 4C Left click), at this time, the collection script corresponding to the search control 433A can be triggered. However, the browser detects that the collection script will collect behavioral data that does not meet the user's privacy requirements (for example, keywords entered in the search bar 461 and click on the search control 461A), and therefore, the browser does not execute the collection script.
  • the user's input for example, a mouse
  • the collection script corresponding to the search control 433A can be triggered.
  • the browser detects that the collection script will collect behavioral data that does not meet the user's privacy requirements (for example, keywords entered in the search bar 461 and click on the search control 461A), and therefore, the browser does not execute the collection script.
  • the electronic device 100 will not respond to the input and perform a corresponding search operation (query for search results related to the keyword entered in the search field 433 in the web page 430), and the electronic device 100 may display the web page shown in FIG. 4H Prompt message 481 in 480: "This operation does not meet privacy requirements and the execution failed.”
  • S208 The browser executes the reporting script in the second webpage to send the user's behavior data to the webpage content provider.
  • the browser executes the reporting script in the second web page. In other embodiments, after the browser executes S205, the browser executes the reporting script in the adjusted second web page.
  • the browser executes the reporting script in the adjusted second web page. For instructions on how the browser interprets and executes the reporting script, please refer to the instructions on how the browser interprets and executes the reporting script in S105 of Figure 6 .
  • the browser can check whether the behavioral data reported by the reporting script meets the user's privacy requirements (for example, whether the privacy level of the reported behavioral data is higher than that of the user). The privacy level of behavioral data allowed to be obtained). If it does not match, the browser will not interpret and execute the reporting script.
  • the order of S207 and S208 is not limited.
  • the web page displayed by the browser includes a collection script 1 and a reporting script 1.
  • the reporting script 1 is used to report the behavioral data generated by the collection script 1 to the web content provider. .
  • the browser detects that the collection script 1 is used to collect behavioral data that does not meet the user's privacy requirements before the collection script 1 is executed, so the browser can directly not execute the collection script 1. Since the collection script 1 is not executed, the collection The behavior data corresponding to script 1 has not been generated, so reporting script 1 cannot report and collect the behavior data corresponding to script 1. For example, in the web page content of the S100 example in Figure 6 above, when the button identified as "btn_submit" is clicked, the function genAndReportData will be executed.
  • the browser does not execute the reporting script 1.
  • the content of the web page does not include information indicating the privacy level of the behavioral data collected by collection script 1.
  • the browser only obtains after executing collection script 1 that collection script 1 collects behavioral data that does not meet the user's privacy requirements, so it can Do not execute reporting script 1 to prevent reporting script 1 from reporting the behavioral data collected by collection script 1.
  • the browser may not execute S207.
  • the web page displayed by the browser meets the user's privacy requirements, including at least one of the following situations:
  • the web page displayed by the browser does not include the first information (for example, the first information is hidden).
  • the first information is used to trigger the acquisition of behavioral data that does not meet the user's privacy requirements. For details, see S103 in Figure 6.
  • the first web page does not include the first information. a description of the information;
  • the third information in the web page displayed by the browser is inoperable information.
  • the third information is used to trigger the acquisition of behavioral data that does not meet the user's privacy requirements.
  • the third information in the first web page can be Description of non-actionable information.
  • the browser may execute S207.
  • block Stop the execution of the triggered script that is, do not execute the triggered script.
  • the web pages displayed by the browser do not meet the user's privacy requirements, including any of the following situations:
  • the web page displayed by the browser is a normal web page that contains complete functions and does not contain additional prompt information
  • the web page displayed by the browser is a web page that contains complete functions and prompt information.
  • the first web page may include prompt information
  • the electronic device 100 receives the user's request for the second web page in the first web page" in S103 of Figure 6 "When entering information, a prompt message is displayed.”
  • the browser may execute S207, and when it is detected that the collection script and/or reporting script used to obtain behavioral data that does not meet the user's privacy requirements is triggered. When , prevent the triggered script from executing, that is, the triggered script will not be executed. For examples of web pages displayed by the browser that comply with the user's privacy requirements, see the above example of web pages displayed by the browser that comply with the user's privacy requirements.
  • the method also includes a process similar to S106-S109 in Figure 6.
  • the second webpage content may correspond to the first webpage content
  • the first webpage content may correspond to the first webpage content.
  • the web page may correspond to the web page displayed by the browser (ie, the second web page in S204 or the adjusted second web page in S205).
  • the user's privacy requirements described in S203-S208 may be the privacy requirements indicated by the third indication information.
  • the browser can re-acquire the user's privacy requirements. That is to say, the user's privacy requirements described in S203-S208 may not be the privacy requirements indicated by the third indication information, but the browser's privacy requirements. Privacy requirements for reacquisition.
  • the browser may first display the second web page according to the content of the second web page and display the prompt information.
  • the browser When the browser displays the above prompt information, it can receive the user operation, re-determine the user's privacy requirements based on the user operation, and then perform S203-S208. That is to say, when the web content returned by the web content provider may still trigger the collection and/or reporting of behavioral data that does not meet the user's privacy requirements, the electronic device 100 can display prompt information and determine whether to allow it based on the received user operation.
  • the collection and reporting of this behavioral data by the webpage can be understood as further seeking the user's consent to protect the user's privacy and security when the user's expectations are not met.
  • the privacy level indicated by the third indication information is medium-impact personal data (such as the exposure time of the web page, etc.), and the privacy level indicated by the fourth indication information is high-impact personal data (such as click behavior, etc.). Since the privacy level indicated by the fourth indication information is higher than the privacy level indicated by the third indication information, the browser can display the prompt information 511 in the web page 510 shown in FIG. 5A: "This web page attempts to collect click behaviors and other behaviors. Use "Recommended", and the prompt information 511 also displays a permission control 511A and a prohibition control 511B.
  • the electronic device 100 When the electronic device 100 receives the user's input (eg, left mouse button click) for the permission control 511A, it may be determined that the user's privacy requirements include the user's permission to obtain high-impact personal data, which is different from the privacy requirements indicated by the third indication information.
  • the electronic device 100 receives the user's input (for example, a left mouse click) on the prohibition control 511B, it can be determined that the user's privacy requirement is still the privacy requirement indicated by the third indication information, that is, the acquisition of a privacy level higher than medium is not allowed. Behavioral data affecting personal data.
  • the existing network request can be extended (that is, it can carry third indication information), allowing the browser to indicate the user's privacy requirements to the web content provider during the communication process.
  • the browser can parse the webpage content returned by the webpage content provider and choose whether to adjust the displayed webpage according to the user's privacy requirements. Even if the webpage content returned by the webpage content provider does not meet the user's privacy requirements, the browser can further ensure the user's privacy. Privacy and security.
  • the browser can detect whether the behavioral data meets the user's privacy requirements. When the behavioral data does not meet the user's privacy requirements, the browser can prevent the collection and reporting of the behavioral data. , even if the web page displayed by the browser may still collect and/or report behavioral data that does not meet the user's privacy requirements, the user's privacy security can be further ensured through the browser.
  • the user's privacy requirements do not allow any behavioral data to be obtained, for example, the user's settings Setting the browser to incognito mode does not allow obtaining any behavioral data. See Figure 8 for the specific process.
  • FIG. 8 is a schematic flowchart of yet another web page access method provided by an embodiment of the present application. The method includes but is not limited to the following steps:
  • S300 The web content provider uses extended languages and/or extended scripts to generate web content.
  • S300 is similar to S100 in Figure 6. For details, please refer to the description of S100 in Figure 6.
  • S301 The browser determines that the user's privacy requirements do not allow obtaining any behavioral data.
  • the browser determines that the user's privacy requirement is not to allow any behavioral data to be obtained.
  • the user may first enter the incognito mode.
  • the electronic device 100 may display a user interface representing entering the incognito mode.
  • the user interface is similar to the user interface 530 shown in FIG. 5C .
  • the user can set the setting switch 534B in the user interface 530 to an on state, and based on the user setting, the browser can determine that the user's privacy requirement does not allow the acquisition of any behavioral data.
  • the user may first enter the incognito mode.
  • the electronic device 100 may display a user interface representing entering the incognito mode.
  • the user interface is similar to the user interface 530 shown in FIG. 5C .
  • the user can open the setting interface of the browser, that is, the user interface 520 shown in Figure 5B.
  • the user can set the setting switch 527B in the user interface 520 to an on state.
  • the browser can determine the user's privacy requirements. No behavioral data is allowed to be obtained.
  • the electronic device 100 may also default to incognito mode and not allow acquisition of any behavioral data. This setting may be preset by the electronic device 100 or set by the user through the electronic device 100 .
  • the browser requests the web page content provider to obtain the web page corresponding to the first URL (carrying information indicating that acquisition of any behavioral data is not allowed).
  • S302 is similar to S101 in Figure 6. The difference is that when the browser initiates a request to the web content provider, it carries the third instruction information to indicate that it is not allowed to obtain any behavioral data.
  • the third instruction information is X-Allowed-PersonalData. -Lvl, and the value of X-Allowed-PersonalData-Lvl is 0.
  • S303 The web page content provider sends the third web page content to the browser.
  • S303 is similar to S102 in Figure 6. For details, please refer to the description of S102 in Figure 6.
  • S304 The browser displays the third web page according to the content of the third web page.
  • S304 is similar to S103 in FIG. 6 , for details, please refer to the description of S103 in FIG. 6 .
  • S304 is similar to S203-S205 in Figure 7.
  • S203-S205 for details, please refer to the description of S203-S205 in Figure 7.
  • S305 The browser executes the collection script in the third web page to collect/generate user behavior data.
  • S305 is an optional step.
  • the browser may execute S305.
  • the web page displayed by the browser does not meet the user's privacy requirements.
  • the web page displayed by the browser is a normal web page that contains complete functions and does not contain additional prompt information; or the web page displayed by the browser contains complete functions and contains prompt information.
  • the first web page may include prompt information
  • the electronic device 100 receives the user's input for the second information in the first web page" in S103 of Figure 6 .
  • S306 The browser does not allow the collection and/or reporting of behavioral data that does not meet the user's privacy requirements.
  • S306 is an optional step.
  • the browser may not execute the collection script in the third web page for collecting behavioral data that does not meet the user's privacy requirements, and/or for reporting Reporting scripts for behavioral data that do not meet the user's privacy requirements can also be understood as preventing the execution of these collection scripts and reporting scripts.
  • the browser can check whether the collection script collects Whether the collected behavioral data meets the user's privacy requirements (for example, whether the privacy level of the collected behavioral data is higher than the privacy level of the behavioral data that the user is allowed to obtain). If it does not match, the browser will not interpret and execute the collection script.
  • the order of S305 and S306 is not limited.
  • the browser can check whether the behavioral data reported by the reporting script meets the user's privacy requirements (for example, whether the privacy level of the reported behavioral data is higher than what the user allows to obtain). privacy level of behavioral data). If it does not match, the browser will not interpret and execute the reporting script.
  • the method also includes a process similar to S106-S109 in Figure 6.
  • the third webpage content may correspond to the first webpage content
  • the first webpage content may correspond to the first webpage content.
  • the web page can correspond to a third web page.
  • the browser can display prompt information to remind the user that behavioral data beyond the allowed range will be obtained by the web page, and determine whether to allow the third web page to obtain data that is not in line with the user based on the user's operation.
  • Behavioral data of privacy requirements as detailed in Figure 7.
  • the browser can re-obtain the user's privacy requirements. That is to say, the user's privacy requirements described in S203-S208 may not be indicated by the third instruction information. Privacy requirements, but the privacy requirements that the browser reacquires" are similar.
  • the third instruction information indicates that the user is not allowed to obtain any behavioral data
  • the browser displays the prompt information and receives the user operation
  • it is determined based on the user operation that the user allows the third web page to collect and report click behaviors. Therefore, subsequent actions can Execute the collection script for collecting click behavior and the reporting script for reporting click behavior.
  • the browser can be replaced by an electronic device 100 running the browser, and the web page content provider can also be replaced by a network device such as a server.
  • the embodiments of this application provide a web page access method that protects users' privacy and security through extended languages and/or extended scripts, so that web content providers can only obtain behavioral data that meets the user's privacy requirements, rather than indistinguishable data from web pages. It can effectively obtain the behavioral data of all users and effectively protect the privacy and security of users.
  • the methods provided by the embodiments of this application can be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, a network device, a user equipment, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another, e.g., the computer instructions may be transferred from a website, computer, server, or data center Transmit to another website, computer, server or data center through wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) means.
  • the readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated.
  • the available media can be magnetic media (for example, floppy disks, hard disks, tapes ), optical media (for example, digital video disc (DWD)), or semiconductor media (for example, solid state disk (SSD), etc.).
  • magnetic media for example, floppy disks, hard disks, tapes
  • optical media for example, digital video disc (DWD)
  • semiconductor media for example, solid state disk (SSD), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

提供了一种网页访问方法及电子设备,网页访问方法包括:电子设备接收第一搜索请求;向网络设备发送第一搜索请求,第一搜索请求用于请求获取第一网址的网页,第一搜索请求包括第一信息,第一信息用于指示允许获取的用户行为数据的隐私级别;接收网络设备响应于第一搜索请求消息发送的第一数据;根据第一数据显示第一网页;其中,第一网页显示的数据是符合允许获取的用户行为数据的隐私级别的数据,或者,第一网页包括指示第一网页会收集第一行为数据的第一提示信息,第一行为数据不属于隐私级别的用户行为数据。本申请能够限制网页提供商获取不符合用户的隐私要求的行为数据,有效保护用户的隐私安全。

Description

网页访问方法及电子设备
本申请要求于2022年03月31日提交中国专利局、申请号为202210334014.1、申请名称为“网页访问方法及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机技术领域,尤其涉及一种网页访问方法及电子设备。
背景技术
目前,用户可以使用浏览器的无痕模式来访问网页,在这种场景下,用户期望浏览行为不会被记录下来,以保护个人的隐私安全。无痕模式下,虽然浏览器不会在本地保存用户的浏览行为,但网页仍然会收集用户的浏览行为,例如,点击行为等,网页可能会将收集到的浏览行为上报给该网页的提供商,无法有效地保护用户的隐私安全。
发明内容
本申请实施例公开了一种网页访问方法及电子设备,能够根据用户的隐私要求,限制网页的提供商获取到的用户的浏览行为,有效地保护用户的隐私安全。
第一方面,本申请提供了一种网页访问方法,应用于电子设备,该方法包括:接收第一搜索请求;向网络设备发送第一搜索请求,所述第一搜索请求用于请求获取第一网址的网页,所述第一搜索请求包括第一信息,所述第一信息用于指示允许获取的用户行为数据的隐私级别;接收所述网络设备响应于所述第一搜索请求消息发送的第一数据;根据所述第一数据显示第一网页,所述第一网页显示的数据是符合所述允许获取的用户行为数据的隐私级别的数据。
在一些实施例中,上述隐私级别按照从高到低依次为:敏感个人数据(例如用户在网页中输入的内容)、高影响个人数据(例如点击行为)、中影响个人数据(例如网页的曝光时间)和低影响个人数据(例如网页中的滚动条的拖动行为)。
在一些实施例中,上述第一信息指示允许获取的用户行为数据的最高隐私级别,例如,第一信息指示的隐私级别为敏感个人数据,可以表征允许获取隐私级别低于或等于敏感个人数据的用户行为数据。
在上述方法中,电子设备可以在向网络设备请求获取网页时,通过第一信息表明允许获取的用户行为数据的隐私级别(可简称为用户的隐私要求),电子设备可以根据网络设备返回的数据,显示符合用户的隐私要求的网页。用户浏览该网页时,网页的提供商无法获取到不符合用户的隐私要求的行为数据,有效保护了用户的隐私安全。
在一种可能的实现方式中,所述根据所述第一数据显示第一网页之前,该方法还包括:判断所述第一数据是否为符合所述隐私级别的数据;所述根据所述第一数据显示第一网页,包括:当所述第一数据为不符合所述隐私级别的数据时,根据所述第一数据和所述允许获取的用户行为数据的隐私级别显示所述第一网页;当所述第一数据为符合所述隐私级别的数据时,根据所述第一数据显示所述第一网页。
在一些实施例中,所述根据所述第一数据和所述允许获取的用户行为数据的隐私级别显示所述第一网页,包括:根据所述隐私级别调整所述第一数据,并根据调整后的所述第一数据显示所述第一网页,所述第一网页的显示数据对应所述调整后的所述第一数据。在一些实施例中,当所述第一数据为符合所述隐私级别的数据时,所述第一网页的显示数据对应所述第一数据。
在上述方法中,电子设备可以先判断网络设备返回的第一数据是否符合用户的隐私要求,若符合,电子设备可以直接根据第一数据显示网页,若不符合,电子设备可以根据用户的隐私要求调整显示的网页。即使网络设备返回的第一数据不符合用户的隐私要求,也可以通过电子设备进一步保证用户的隐私安全。
在一种可能的实现方式中,所述第一网页显示的数据不包括第一脚本,所述第一脚本用于获取第一行为数据,所述第一行为数据不属于所述隐私级别的行为数据。
在一些实施例中,所述第一网页显示的数据不包括第一脚本时,所述第一网页可以为正常显示且用户可正常操作的网页。
在上述方法中,电子设备显示的第一网页不包括第一脚本,因此,用户浏览第一网页时,不会生成不符合用户的隐私要求的行为数据,第一网页符合用户的隐私要求。并且,第一网页可以为正常显示且用户可正常操作的网页,在保证用户的隐私安全的同时,让用户可以正常浏览网页,不影响用户的体验。
在一种可能的实现方式中,所述第一网页不包括第一控件,所述第一控件对应的脚本用于获取第二行为数据,所述第二行为数据不属于所述隐私级别的行为数据。
在上述方法中,第一网页不包括第一控件,可以理解为是将这种“用户不想看到的”控件隐藏,显示更加简洁明了,提升用户浏览体验。用户浏览第一网页时,无法操作第一控件,因此,不会生成不符合用户的隐私要求的行为数据,第一网页符合用户的隐私要求,从而有效保护了用户的隐私安全。
在一种可能的实现方式中,该方法还包括:接收作用于所述第一网页中的第二控件的第一用户操作,所述第二控件对应的脚本用于获取第三行为数据,所述第三行为数据不属于所述隐私级别的行为数据;显示第一提示信息,其中:所述第一提示信息指示所述第一用户操作执行失败;或,所述第一提示信息指示没有收集所述第三行为数据。
在一些实施例中,所述电子设备接收到所述第一用户操作时,所述第二控件对应的脚本被触发,所述电子设备不执行/阻止执行所述第二控件对应的脚本,并显示所述第一提示信息。可以理解地,即使网络设备返回的第一数据包括用于获取不符合隐私要求的行为数据的脚本,也可以通过电子设备阻止这些脚本的执行,进一步保证用户的隐私安全。
在上述方法中,电子设备接收到作用于第二控件的第一用户操作时,可以通过第一提示信息通知用户第一用户操作执行失败,或者没有收集不符合用户的隐私要求的行为数据,让用户感知到不符合隐私要求的行为数据未被第一网页获取到,提升用户体验。
在一种可能的实现方式中,所述接收第一搜索请求之前,该方法还包括:接收第二用户操作;响应于所述第二用户操作,确定所述允许获取的用户行为数据的隐私级别。
在上述方法中,用户可以自行设置隐私要求,使用更加方便。不同用户设置的隐私要求可以不同,同一用户在不同场景下设置的隐私要求也可以不同,本申请可以满足不同用户的不同需求,或者同一用户在不同场景下的需求,使用场景广泛,产品可用性高。
在一种可能的实现方式中,所述根据所述第一数据显示第一网页之后,该方法还包括:关闭所述第一网页;接收第二搜索请求;向所述网络设备发送所述第二搜索请求,所述第二 搜索请求用于请求获取所述第一网址的网页;接收所述网络设备响应于所述第二搜索请求发送的第二数据;根据所述第二数据显示所述第一网页。
在一些实施例中,所述第二数据为所述第一数据。
在上述方法中,电子设备关闭第一网址的第一网页后,可以向网络设备再次请求获取第一网址的网页,电子设备再次显示的网页可以仍为第一网页。例如,由于网络设备获取的用户浏览前一次显示的第一网页的行为数据是符合用户的隐私要求的,这些行为数据可能不足以形成该用户的用户画像,网络设备无法生成针对该用户的个性化推荐内容,因此,电子设备再次显示的网页不包括该个性化推荐内容,可以仍为第一网页。避免网页展示“用户不想看到的”个性化推荐内容(例如为广告),提升用户体验。
在一种可能的实现方式中,所述第一数据包括第二信息,所述第二信息用于指示所述第一网页获取的用户行为数据的隐私级别。
在一些实施例中,所述电子设备可以根据所述第二信息判断所述第一数据是否为符合所述隐私级别的数据,例如,当所述第二信息指示的隐私级别低于或等于所述第一信息指示的隐私级别时,所述第一数据为符合所述隐私级别的数据;当所述第二信息指示的隐私级别高于所述第一信息指示的隐私级别,所述第一数据为不符合所述隐私级别的数据。
在上述方法中,电子设备可以直接根据第二信息得到第一网页获取的用户行为数据的隐私级别,无需通过识别第一数据中的具体内容来得到第一网页获取的用户行为数据的隐私级别,减少处理资源,降低功耗。
第二方面,本申请提供了一种网页访问方法,应用于电子设备,该方法包括:接收第一搜索请求;向网络设备发送第一搜索请求,所述第一搜索请求用于请求获取第一网址的网页,所述第一搜索请求包括第一信息,所述第一信息用于指示允许获取的用户行为数据的隐私级别;接收所述网络设备响应于所述第一搜索请求发送的第一数据;根据所述第一数据显示第一网页,所述第一网页包括第一提示信息,所述第一提示信息指示所述第一网页会收集第一行为数据,所述第一行为数据不属于所述隐私级别的用户行为数据。
在一些实施例中,上述第一信息指示允许获取的用户行为数据的最高隐私级别,例如,第一信息指示的隐私级别为敏感个人数据,可以表征允许获取隐私级别低于或等于敏感个人数据的用户行为数据。
在一些实施例中,所述第一数据包括用于显示所述第一提示信息的数据。在另一些实施例中,所述第一数据不包括用于显示所述第一提示信息的数据,所述第一提示信息是所述电子设备根据所述隐私级别和所述第一数据在所述第一网页中添加的。
在上述方法中,电子设备可以在向网络设备请求获取网页时,通过第一信息表明允许获取的用户行为数据的隐私级别(可简称为用户的隐私要求),电子设备根据网络设备返回的数据显示的第一网页包括提示信息,以通知用户不符合隐私要求的行为数据会被第一网页收集,用户可以根据该提示信息选择执行的用户操作,例如不执行会触发获取不符合隐私要求的行为数据的用户操作,从而避免网页的提供商获取到不符合用户的隐私要求的行为数据,有效保护了用户的隐私安全。
在一种可能的实现方式中,所述第一数据包括第一脚本,所述第一脚本用于获取所述第一行为数据。
在上述方法中,即使网络设备返回的第一数据包括第一脚本,但由于显示的网页包括第一提示信息,用户可以根据第一提示信息选择执行的用户操作,例如不执行会触发获取不符 合隐私要求的行为数据的用户操作,从而避免网页的提供商获取到不符合用户的隐私要求的行为数据,有效保护了用户的隐私安全。
在一种可能的实现方式中,所述根据所述第一数据显示第一网页之前,该方法还包括:判断所述第一数据是否为符合所述隐私级别的数据;所述根据所述第一数据显示第一网页,包括:当所述第一数据为不符合所述隐私级别的数据时,根据所述第一数据和所述允许获取的用户行为数据的隐私级别显示所述第一网页;该方法还包括:当所述第一数据为符合所述隐私级别的数据时,根据所述第一数据显示所述第一网页。
在一些实施例中,所述根据所述第一数据和所述允许获取的用户行为数据的隐私级别显示所述第一网页,包括:根据所述隐私级别在所述第一数据中添加用于显示所述第一提示信息的数据,并根据调整后的所述第一数据显示所述第一网页。
在上述方法中,电子设备可以先判断网络设备返回的第一数据是否符合用户的隐私要求,若符合,电子设备可以直接根据第一数据显示网页,若不符合,电子设备可以根据用户的隐私要求在显示网页中添加第一提示信息,即使网络设备返回的第一数据不符合用户的隐私要求,也可以通过电子设备进一步保证用户的隐私安全。
在一种可能的实现方式中,该方法还包括:接收作用于所述第一网页中的第一控件的第一用户操作,所述第一控件对应的脚本用于获取第二行为数据,所述第二行为数据不属于所述隐私级别的行为数据;显示第二提示信息,其中:所述第二提示信息指示所述第一用户操作执行失败;或,所述第二提示信息指示没有收集所述第二行为数据。
在一些实施例中,所述电子设备接收到所述第一用户操作时,所述第一控件对应的脚本被触发,所述电子设备不执行/阻止执行所述第一控件对应的脚本,并显示所述第二提示信息。可以理解地,即使网络设备返回的第一数据包括用于获取不符合隐私要求的行为数据的脚本,也可以通过电子设备阻止这些脚本的执行,进一步保证用户的隐私安全。
在上述方法中,电子设备接收到作用于第一控件的第一用户操作时,可以通过第二提示信息通知用户第一用户操作执行失败,或者没有收集不符合用户的隐私要求的行为数据,让用户感知到不符合隐私要求的行为数据未被第一网页获取到,提升用户体验。
在一种可能的实现方式中,该方法还包括:显示所述第一网页时,接收第二用户操作;响应于所述第二用户操作,确定允许所述第一网页获取所述第一行为数据;接收第一指令,所述第一指令指示所述第一网页中的第一脚本被触发,所述第一脚本用于获取所述第一行为数据;生成所述第一行为数据,并向所述网络设备发送所述第一行为数据。
在上述方法中,电子设备显示第一提示信息时,可以根据接收到的用户操作判断是否允许第一网页获取第一行为数据,可以理解为是,在不满足用户预期时,进一步征求用户的同意。在用户同意第一网页获取第一行为数据的情况下,电子设备可以在用于获取第一行为数据的脚本被触发时,生成第一行为数据并发送给网络设备。本申请提供了一种交互方式,让用户可以更加灵活地选择允许获取的行为数据。
在一种可能的实现方式中,所述接收第一搜索请求之前,该方法还包括:接收第三用户操作;响应于所述第三用户操作,确定所述允许获取的用户行为数据的隐私级别。
在上述方法中,用户可以自行设置隐私要求,使用更加方便。不同用户设置的隐私要求可以不同,同一用户在不同场景下设置的隐私要求也可以不同,本申请可以满足不同用户的不同需求,或者同一用户在不同场景下的需求,使用场景广泛,产品可用性高。
在一种可能的实现方式中,所述根据所述第一数据显示第一网页之后,所述方法还包括:关闭所述第一网页;接收第二搜索请求;向所述网络设备发送所述第二搜索请求,所述第二 搜索请求用于请求获取所述第一网址的网页;接收所述网络设备响应于所述第二搜索请求发送的第二数据;根据所述第二数据显示所述第一网页。
在一些实施例中,所述第二数据为所述第一数据。
在上述方法中,电子设备关闭第一网址的第一网页后,可以向网络设备再次请求获取第一网址的网页,电子设备再次显示的网页可以仍为第一网页。例如,由于网络设备获取的用户浏览前一次显示的第一网页的行为数据是符合用户的隐私要求的,这些行为数据可能不足以形成该用户的用户画像,网络设备无法生成针对该用户的个性化推荐内容,因此,电子设备再次显示的网页不包括该个性化推荐内容,可以仍为第一网页。避免网页展示“用户不想看到的”个性化推荐内容(例如为广告),提升用户体验。
在一种可能的实现方式中,所述第一数据包括第二信息,所述第二信息用于指示所述第一网页获取的用户行为数据的隐私级别。
在一些实施例中,所述电子设备可以根据所述第二信息判断所述第一数据是否为符合所述隐私级别的数据,例如,当所述第二信息指示的隐私级别低于或等于所述第一信息指示的隐私级别时,所述第一数据为符合所述隐私级别的数据;当所述第二信息指示的隐私级别高于所述第一信息指示的隐私级别,所述第一数据为不符合所述隐私级别的数据。
在上述方法中,电子设备可以直接根据第二信息得到第一网页获取的用户行为数据的隐私级别,无需通过识别第一数据中的具体内容来得到第一网页获取的用户行为数据的隐私级别,减少处理资源,降低功耗。
第三方面,本申请提供了一种电子设备,包括收发器、处理器和存储器,上述存储器用于存储计算机程序,上述处理器调用上述计算机程序,用于执行上述任一方面任意一种可能的实现方式中的网页访问方法。
第四方面,本申请实施例提供了一种计算机存储介质,上述计算机存储介质存储有计算机程序,上述计算机程序被处理器执行时,实现上述任一方面任意一种可能的实现方式中的网页访问方法。
第五方面,本申请实施例提供了一种计算机程序产品,当该计算机程序产品在电子设备上运行时,使得该电子设备执行上述任一方面任意一种可能的实现方式中的网页访问方法。
第六方面,本申请提供了一种电子设备,包括一个或多个功能模块;该一个或多个功能模块用于执行上述任一方面任意一种可能的实现方式中的网页访问方法。
第七方面,本申请实施例提供一种电子设备,该电子设备包括执行本申请任一实施例所介绍的方法或装置。该电子设备例如为芯片。
附图说明
以下对本申请实施例用到的附图进行介绍。
图1是本申请实施例提供的一种网页访问方法的流程示意图;
图2是本申请实施例提供的一种网页访问系统的架构示意图;
图3A是本申请实施例提供的一种电子设备的硬件结构示意图;
图3B是本申请实施例提供的一种电子设备的软件架构示意图;
图3C是本申请实施例提供的一种服务器的硬件结构示意图;
图4A-图4C是本申请实施例提供的一种网页访问过程的用户界面示意图;
图4D是本申请实施例提供的一种网页的用户界面示意图;
图4E是本申请实施例提供的又一种网页的用户界面示意图;
图4F是本申请实施例提供的又一种网页的用户界面示意图;
图4G是本申请实施例提供的又一种网页的用户界面示意图;
图4H是本申请实施例提供的又一种网页的用户界面示意图;
图4I是本申请实施例提供的又一种网页的用户界面示意图;
图5A是本申请实施例提供的又一种网页的用户界面示意图;
图5B是本申请实施例提供的一种设置界面的示意图;
图5C是本申请实施例提供的又一种设置界面的示意图;
图6是本申请实施例提供的又一种网页访问方法的流程示意图;
图7是本申请实施例提供的又一种网页访问方法的流程示意图;
图8是本申请实施例提供的又一种网页访问方法的流程示意图。
具体实施方式
在本文中对本发明的描述中所使用的术语只是为了描述特定实施例的目的,而并非旨在作为对本发明的限制。如本在发明的说明书和所附权利要求书中所使用的那样,单数表达形式“一个”、“一种”、“所述”、“该”和“这一”旨在也包括复数表达形式,除非其上下文中明确地有相反指示。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
在一些网页访问的场景下,用户期望浏览行为不会被记录下来,以保护个人的隐私安全。目前,为了实现上述期望,用户可以使用浏览器的无痕模式来访问网页,具体流程可参见下图1。
图1示例性示出一种网页访问方法的流程示意图。该方法可以包括如下步骤:
1.用户使用电子设备上的浏览器时,选择进入浏览器的无痕模式。
2.用户在浏览器的地址栏中输入网址1。浏览器向网页内容提供商请求获取网址1对应的网页。
3.网页内容提供商向浏览器下发网址1对应的网页内容1。
4.浏览器根据网页内容提供商下发的网页内容1,渲染并显示网址1对应的网页1。若网页内容1包括javascript(JS)脚本,浏览器可以解释执行该JS脚本。
5.用户在访问网页1时,执行拖动滚动条、点击、输入搜索词(也可称为关键词)等用户操作。用户执行用户操作时,网页1内嵌入的收集JS脚本被触发,可以通过浏览器解释执行该JS脚本,该JS脚本用于记录(也可称为生成或收集)该用户操作的行为数据。不限于此,用户未执行用户操作时,网页1内嵌入的收集JS脚本也可能被触发,可以通过浏览器解释执行该JS脚本,该JS脚本例如用于记录网页的曝光时间等行为数据。
6.生成/记录上述行为数据之后,可以通过浏览器解释执行网页1内嵌入的上传JS脚本,该JS脚本用于将上述记录的行为数据上传(后续也可称为上报或者发送)到网页内容提供商的服务器。
7.用户关闭网页1,退出浏览器的无痕模式。
8.浏览器清空本地内存中的行为数据,例如,用户的浏览记录、cookie、网站数据、用户在表单中输入的信息和用户为网站授予的权限等数据。
在一些实施例中,网页内容提供商获取到上述6中的行为数据后,可以基于该行为数据 形成该用户的用户画像,该用户画像可以用于网页内容提供商为该用户推荐个性化内容(例如个性化广告)。例如,用户后续再访问网址1对应的网页时,浏览器显示的网页1可能包括针对该用户的个性化推荐内容,上述8之后还可以包括:
9.用户在浏览器的地址栏中输入网址1。浏览器向网页内容提供商请求获取网址1对应的网页。
10.网页内容提供商基于后台数据(例如上述6中的行为数据)形成针对该用户的个性化推荐内容。网页内容提供商向浏览器下发网址1对应的网页内容2,网页内容2包括上述个性化推荐内容。
11.浏览器根据网页内容提供商下发的网页内容2,渲染并显示网址1对应的网页2,网页2和网页1不同。若网页内容2包括JS脚本,浏览器可以解释执行该JS脚本。
本申请中,无痕模式也可以称为隐私(private)模式,隐私保护(inprivate)模式,或者其他模式,本申请对此不作限定。
可以理解地,即使用户通过无痕模式访问网页/网站,该网页/网站的提供商(即上述网页内容提供商)仍然可能获取到用户的行为数据,例如,点击行为、滚动条的拖动行为、网页内容的曝光时长、用户输入的内容等,无法有效地保护用户的隐私安全。
本申请提供了一种网页访问方法,能够根据用户的隐私要求,限制网页内容提供商获取到的用户的行为数据,有效地保护用户的隐私安全。
本申请中,可以将用户的行为数据划分为多个隐私级别。示例性地,用户的行为数据可以按照隐私级别从高到低依次分为:敏感个人数据、高影响个人数据、中影响个人数据和低影响个人数据。其中,敏感个人数据是个人数据的一个重要子集,可以是涉及数据主体最私密领域的信息,或者是一旦泄露可能会给数据主体造成重大不利影响的数据,例如但不限于包括用户在网页中输入的内容等。高影响个人数据是泄露可能会给个人或组织造成严重不利影响的数据,例如但不限于包括点击行为等。中影响个人数据是泄露可能会给个人或组织造成重大不利影响的数据,例如但不限于包括网页的曝光时间等。低影响个人数据是泄露可能会给个人或组织造成有限的不利影响的数据,例如但不限于包括滚动条的拖动行为等。不限于此,还可以划分为更多或更少的隐私级别,或者还可以划分为其他的隐私级别,本申请对此不作限定。
为了方便说明,以下实施例以上述示例的隐私级别的行为数据为例进行说明。
本申请实施例可以应用于网页访问系统,接下来介绍本申请实施例涉及的一种网页访问系统10。
图2示例性示出一种网页访问系统10的架构示意图。
如图2所示,网页访问系统10可以包括用户、电子设备100、浏览器、网页和网页内容提供商。其中:
用户可以使用电子设备100,通过电子设备100上的浏览器来访问网页。
本申请中,电子设备100可以是手机、平板电脑、手持计算机、个人数字助理(Personal Digital Assistant,PDA)等移动终端,智能电视、智能摄像头等智能家居设备,智能手环、智能手表、智能眼镜等可穿戴设备,或其他桌面型、膝上型、笔记本电脑、超级移动个人计算机(Ultra-mobile Personal Computer,UMPC)、上网本、智慧屏等设备。本申请实施例对电子设备100的具体类型不作特殊限制。
电子设备100可以运行浏览器。本申请对浏览器在电子设备100上运行的形式不作限定,例如可以是浏览器的应用程序、浏览器的小程序或其他封装了浏览器的功能的应用程序、小 程序等。电子设备100可以向网页内容提供商请求网页内容和服务等。
浏览器可以提供访问网页的功能(包括显示网页),例如,用户可以在浏览器中的地址栏输入网址,浏览器可以根据输入的网址,向网页内容提供商请求该网址对应的网页,并且渲染网页内容提供商返回的网页内容,展示给用户。浏览器还可以用于解释执行网页中的javascript(JS)脚本。浏览器还可以提供无痕模式等工作模式。
网页是由网页内容提供商生成的,例如但不限于是由超文本标记语言(hyper text markup language,html)和/或javascript(JS)脚本组成的。浏览器展示的网页可以但不限于包括文本、图标、音频视频等多媒体资源。在一些实施例中,网页可以根据网页内容提供商的要求,通过JS脚本收集用户访问该网页时的行为数据,例如,点击行为、滚动条的拖动行为、网页内容的曝光时长、用户输入的内容等数据。在一些实施例中,网页可以根据网页内容提供商的要求,通过JS脚本,将收集到的用户的行为数据上报给网页内容提供商。
网页内容提供商可以生成网页内容。网页内容提供商可以根据自身需求,在网页中嵌入JS脚本,该JS脚本用于收集用户的行为数据,用户的行为数据用于网页内容提供商为用户推荐个性化内容(例如个性化广告)。网页内容提供商可以在接收到浏览器的网页请求时,将生成的网页内容下发给浏览器。
网页内容提供商可以包括服务器200。其中,服务器200可以是一个服务器或者多个服务器构成的服务器集群。服务器200包括的任意一个服务器可以是硬件服务器,也可以是云服务器。
电子设备100可以通过互联网和服务器200连接和通信,互联网可以包括有线链路和/或无线链路,可选地以及基站、路由器、接入热点(access point,AP)等网络设备,有线链路例如包括高清多媒体接口(high definition multimedia interface,HDMI)、通用串行总线(universal serial bus,USB)、同轴电缆、光纤等,无线链路例如包括无线局域网(wireless local area networks,WLAN)、蓝牙和蜂窝通信网络等。电子设备100(例如,电子设备100上运行的浏览器)可以向网页内容提供商请求网页内容和服务等,例如具体包括:电子设备100通过互联网向服务器200发送请求消息,该请求消息用于请求网页内容和服务等。在一些实施例中,用户通过电子设备100上的浏览器访问网页时,网页可以借助浏览器收集用户的行为数据,并借助浏览器将该行为数据上报给网页内容提供商(例如具体包括:电子设备100通过互联网向服务器200发送该行为数据)。
接下来介绍本申请实施例中提供的示例性的电子设备100。
图3A示例性示出一种电子设备100的硬件结构示意图。
应理解的是,图3A所示电子设备100仅是一个范例,并且电子设备100可以具有比图3A中所示的更多的或者更少的部件,可以组合两个或多个的部件,或者可以具有不同的部件配置。图3A中所示出的各种部件可以在包括一个或多个信号处理和/或专用集成电路在内的硬件、软件、或硬件和软件的组合中实现。
电子设备100可以包括:处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C, 磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。
可以理解的是,本申请实施例示意的结构并不构成对电子设备100的具体限定。在本申请另一些实施例中,电子设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
其中,控制器可以是电子设备100的神经中枢和指挥中心。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。
I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根串行时钟线(serial clock line,SCL)。在一些实施例中,处理器110可以包含多组I2C总线。处理器110可以通过不同的I2C总线接口分别耦合触摸传感器180K,充电器,闪光灯,摄像头193等。例如:处理器110可以通过I2C接口耦合触摸传感器180K,使处理器110与触摸传感器180K通过I2C总线接口通信,实现电子设备100的触摸功能。
I2S接口可以用于音频通信。在一些实施例中,处理器110可以包含多组I2S总线。处理器110可以通过I2S总线与音频模块170耦合,实现处理器110与音频模块170之间的通信。在一些实施例中,音频模块170可以通过I2S接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。
PCM接口也可以用于音频通信,将模拟信号抽样,量化和编码。在一些实施例中,音频模块170与无线通信模块160可以通过PCM总线接口耦合。在一些实施例中,音频模块170也可以通过PCM接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。所述I2S接口和所述PCM接口都可以用于音频通信。
UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在串行通信与并行通信之间转换。在一些实施例中,UART接口通常被用于连接处理器110与无线通信模块160。例如:处理器110通过UART接口与无线通信模块160中的蓝牙模块通信,实现蓝牙功能。在一些实施例中,音频模块170可以通过UART接口向 无线通信模块160传递音频信号,实现通过蓝牙耳机播放音乐的功能。
MIPI接口可以被用于连接处理器110与显示屏194,摄像头193等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI),显示屏串行接口(display serial interface,DSI)等。在一些实施例中,处理器110和摄像头193通过CSI接口通信,实现电子设备100的拍摄功能。处理器110和显示屏194通过DSI接口通信,实现电子设备100的显示功能。
GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据信号。在一些实施例中,GPIO接口可以用于连接处理器110与摄像头193,显示屏194,无线通信模块160,音频模块170,传感器模块180等。GPIO接口还可以被配置为I2C接口,I2S接口,UART接口,MIPI接口等。
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为电子设备100充电,也可以用于电子设备100与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他电子设备,例如AR设备等。
可以理解的是,本发明实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对电子设备100的结构限定。在本申请另一些实施例中,电子设备100也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块140可以通过电子设备100的无线充电线圈接收无线充电输入。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为电子设备供电。
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,外部存储器,显示屏194,摄像头193,和无线通信模块160等供电。电源管理模块141还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。
电子设备100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。无线通信功能例如用于电子设备100和服务器200进行通信。
天线1和天线2用于发射和接收电磁波信号。电子设备100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在电子设备100上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号 调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A,受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。
无线通信模块160可以提供应用在电子设备100上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,电子设备100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备100可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
电子设备100通过GPU,显示屏194,以及应用处理器等实现显示功能,例如显示网页内容。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD)。显示屏面板还可以采用有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),miniled,microled,micro-oled,量子点发光二极管(quantum dot light emitting diodes,QLED)等制造。在一些实施例中,电子设备100可以包括1个或N个显示屏194,N为大于1的正整数。
电子设备100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度等进行算法优化。ISP还可以对拍摄 场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备100可以包括1个或N个摄像头193,N为大于1的正整数。
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当电子设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。
视频编解码器用于对数字视频压缩或解压缩。电子设备100可以支持一种或多种视频编解码器。这样,电子设备100可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备100的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备100的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。
内部存储器121可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行电子设备100的各种功能应用以及数据处理。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)等。存储数据区可存储电子设备100使用过程中所创建的数据(比如音频数据,电话本等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。
电子设备100可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。电子设备100可以通过扬声器170A收听音乐,或收听免提通话。
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当电子设备100接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。电子设备100可以设置至少一个麦克风170C。在另一些实施例中,电子设备100可以设置两个麦克风170C,除了采集声音信号,还可以实现降噪功能。在另一些实施例中,电子设备100还可以设置三个,四个或更多麦克风170C,实现采集声音信号,降噪,还可以识别声音 来源,实现定向录音功能等。
耳机接口170D用于连接有线耳机。耳机接口170D可以是USB接口130,也可以是3.5mm的开放移动电子设备平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中,压力传感器180A可以设置于显示屏194。压力传感器180A的种类很多,如电阻式压力传感器,电感式压力传感器,电容式压力传感器等。电容式压力传感器可以是包括至少两个具有导电材料的平行板。当有力作用于压力传感器180A,电极之间的电容改变。电子设备100根据电容的变化确定压力的强度。当有触摸操作作用于显示屏194,电子设备100根据压力传感器180A检测所述触摸操作强度。电子设备100也可以根据压力传感器180A的检测信号计算触摸的位置。在一些实施例中,作用于相同触摸位置,但不同触摸操作强度的触摸操作,可以对应不同的操作指令。例如:当有触摸操作强度小于第一压力阈值的触摸操作作用于短消息应用图标时,执行查看短消息的指令。当有触摸操作强度大于或等于第一压力阈值的触摸操作作用于短消息应用图标时,执行新建短消息的指令。
陀螺仪传感器180B可以用于确定电子设备100的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定电子设备100围绕三个轴(即,x,y和z轴)的角速度。陀螺仪传感器180B可以用于拍摄防抖。示例性的,当按下快门,陀螺仪传感器180B检测电子设备100抖动的角度,根据角度计算出镜头模组需要补偿的距离,让镜头通过反向运动抵消电子设备100的抖动,实现防抖。陀螺仪传感器180B还可以用于导航,体感游戏场景。
气压传感器180C用于测量气压。在一些实施例中,电子设备100通过气压传感器180C测得的气压值计算海拔高度,辅助定位和导航。
磁传感器180D包括霍尔传感器。电子设备100可以利用磁传感器180D检测翻盖皮套的开合。在一些实施例中,当电子设备100是翻盖机时,电子设备100可以根据磁传感器180D检测翻盖的开合。进而根据检测到的皮套的开合状态或翻盖的开合状态,设置翻盖自动解锁等特性。
加速度传感器180E可检测电子设备100在各个方向上(一般为三轴)加速度的大小。当电子设备100静止时可检测出重力的大小及方向。还可以用于识别电子设备姿态,应用于横竖屏切换,计步器等应用。
距离传感器180F,用于测量距离。电子设备100可以通过红外或激光测量距离。在一些实施例中,拍摄场景,电子设备100可以利用距离传感器180F测距以实现快速对焦。
接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。电子设备100通过发光二极管向外发射红外光。电子设备100使用光电二极管检测来自附近物体的红外反射光。当检测到充分的反射光时,可以确定电子设备100附近有物体。当检测到不充分的反射光时,电子设备100可以确定电子设备100附近没有物体。电子设备100可以利用接近光传感器180G检测用户手持电子设备100贴近耳朵通话,以便自动熄灭屏幕达到省电的目的。接近光传感器180G也可用于皮套模式,口袋模式自动解锁与锁屏。
环境光传感器180L用于感知环境光亮度。电子设备100可以根据感知的环境光亮度自适应调节显示屏194亮度。环境光传感器180L也可用于拍照时自动调节白平衡。环境光传感器180L还可以与接近光传感器180G配合,检测电子设备100是否在口袋里,以防误触。
指纹传感器180H用于采集指纹。电子设备100可以利用采集的指纹特性实现指纹解锁, 访问应用锁,指纹拍照,指纹接听来电等。
温度传感器180J用于检测温度。在一些实施例中,电子设备100利用温度传感器180J检测的温度,执行温度处理策略。例如,当温度传感器180J上报的温度超过阈值,电子设备100执行降低位于温度传感器180J附近的处理器的性能,以便降低功耗实施热保护。在另一些实施例中,当温度低于另一阈值时,电子设备100对电池142加热,以避免低温导致电子设备100异常关机。在其他一些实施例中,当温度低于又一阈值时,电子设备100对电池142的输出电压执行升压,以避免低温导致的异常关机。
触摸传感器180K,也称“触控面板”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于电子设备100的表面,与显示屏194所处的位置不同。
骨传导传感器180M可以获取振动信号。在一些实施例中,骨传导传感器180M可以获取人体声部振动骨块的振动信号。骨传导传感器180M也可以接触人体脉搏,接收血压跳动信号。在一些实施例中,骨传导传感器180M也可以设置于耳机中,结合成骨传导耳机。音频模块170可以基于所述骨传导传感器180M获取的声部振动骨块的振动信号,解析出语音信号,实现语音功能。应用处理器可以基于所述骨传导传感器180M获取的血压跳动信号解析心率信息,实现心率检测功能。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。电子设备100可以接收按键输入,产生与电子设备100的用户设置以及功能控制有关的键信号输入。
马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏194不同区域的触摸操作,马达191也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。
指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。
SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和电子设备100的接触和分离。电子设备100可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口195可以支持Nano SIM卡,Micro SIM卡,SIM卡等。同一个SIM卡接口195可以同时插入多张卡。所述多张卡的类型可以相同,也可以不同。SIM卡接口195也可以兼容不同类型的SIM卡。SIM卡接口195也可以兼容外部存储卡。电子设备100通过SIM卡和网络交互,实现通话以及数据通信等功能。在一些实施例中,电子设备100采用eSIM,即:嵌入式SIM卡。eSIM卡可以嵌在电子设备100中,不能和电子设备100分离。
电子设备100的软件系统可以采用分层架构,事件驱动架构,微核架构,微服务架构,或云架构。例如,分层架构的软件系统可以是安卓(Android)系统,也可以是华为移动服务(huawei mobile services,HMS)系统,或其它软件系统。本申请实施例以分层架构的Android系统为例,示例性说明电子设备100的软件结构。
图3B示例性示出一种电子设备100的软件架构示意图。
分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,以及内核层。
应用程序层可以包括一系列应用程序包。
如图3B所示,应用程序包可以包括相机,日历,音乐,图库,短信息,通话,地图,蓝牙,浏览器等应用程序。本申请中,应用程序包也可以替换为小程序等其他形式的软件。本申请以浏览器为独立的应用程序为例进行说明,但在具体实现中,音乐、短信息、地图等其他应用程序也可以封装有浏览器的能力,本申请中的浏览器可以替换为其他应用程序中的浏览器的功能组件。
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。
如图3B所示,应用程序框架层可以包括窗口管理器,内容提供器,视图系统,电话管理器,资源管理器,通知管理器等。
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。
内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。
电话管理器用于提供电子设备100的通信功能。例如通话状态的管理(包括接通,挂断等)。
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。
Android runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。
核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。
应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(Media Libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。
2D图形引擎是2D绘图的绘图引擎。
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。
下面结合网页访问场景,示例性说明电子设备100软件以及硬件的工作流程。
当触摸传感器180K接收到触摸操作,相应的硬件中断被发给内核层。内核层将触摸操作加工成原始输入事件(包括触摸坐标,触摸操作的时间戳等信息)。原始输入事件被存储在内核层。应用程序框架层从内核层获取原始输入事件,识别该输入事件所对应的控件。以该触摸操作是触摸单击操作,该单击操作所对应的控件为浏览器的访问控件为例,浏览器调用应用框架层的接口,获取用户在浏览器的地址栏中输入的网址对应的网页内容,进而通过调用内核层启动显示驱动,通过显示屏194显示获取到的网页内容。
接下来介绍本申请实施例中提供的示例性的服务器200。
图3C示例性示出了一种服务器200的硬件结构示意图。
如图3C所示,服务器200可以包括一个或多个处理器201、通信接口202、存储器203,其中处理器201、通信接口202、存储器203可通过总线或者其它方式连接,本申请实施例以通过总线204连接为例。其中:
处理器201可以由一个或者多个通用处理器构成,例如CPU。处理器201可用于运行设备控制方法的相关的程序代码。
通信接口202可以为有线接口(例如以太网接口)或无线接口(例如蜂窝网络接口或使用无线局域网接口),用于与其他节点进行通信。本申请实施例中,通信接口202具体可用于与电子设备100进行通信。
存储器203可以包括易失性存储器(volatile memory),例如RAM;存储器也可以包括非易失性存储器(non-vlatile memory),例如ROM、快闪存储器(flash memory)、HDD或固态硬盘SSD。存储器203还可以包括上述种类的存储器的组合。存储器203可用于存储一组程序代码,以便于处理器201调用存储器203中存储的程序代码以实现本申请实施例的在服务器的实现方法。在本申请实施例中,存储器203还可以是存储阵列,等等。
在一些实施例中,服务器200可以包括多个服务器,例如,网页服务器、后台服务器、下载服务器等,这多个服务器的硬件结构都可参照图3C所示的服务器200的硬件结构。
需要说明的,图3C所示的服务器200是本申请实施例示例的一种实现方式,实际应用中,服务器200还可以包括更多或更少的部件,这里不作限制。
下面介绍本申请实施例涉及的应用场景以及该场景下的用户界面实施例。
图4A-图4C示例性示出一种网页访问过程的用户界面示意图。
如图4A所示,电子设备100可以显示桌面410,桌面410中可以显示有一个或多个应用程序的图标(例如,音乐的图标、图库的图标、邮件的图标、视频的图标、此电脑的图标、电脑管家的图标和浏览器的图标411等)。桌面410下方还显示有任务栏412。任务栏412中可以包括开始菜单、搜索控件、一个或多个设置的图标(例如,声音设置的图标和时间设置的图标等)。其中,任务栏412可以在应用界面切换时,保持显示在电子设备100的显示区域中的底部,且覆盖显示在应用界面的上层。
如图4A所示,电子设备100还可以显示指针413,指针413用于指示鼠标当前在电子设备100显示的界面上待操作的位置。该鼠标可以位于电子设备100上,也可以是电子设备100 的外接设备。用户可以通过该鼠标控制指针413在电子设备100显示的界面上的移动、左键单击、左键双击、左键按住拖动、右键单击等操作。
在一些实施例中,电子设备100可以接收用户针对浏览器的图标411的输入(例如,鼠标左键单击)。响应于该输入,电子设备100可以显示如图4B所示的浏览器的用户界面420。
如图4B所示,用户界面420可以包括地址栏421和访问控件422。地址栏421用于接收用户输入的网址,其中,用户可以通过键盘在地址栏421中输入网址,该键盘可以是位于电子设备100上的虚拟键盘或实体键盘,也可以是电子设备100的外接设备。访问控件422可以触发访问地址栏421中的网址。
在一些实施例中,电子设备100接收到用户在地址栏421中输入的网址(例如,购物网站的网址“gouwu.huawei.com”)之后,可以接收用户针对访问控件422的输入(例如,鼠标左键单击),响应于该输入,电子设备100可以显示如图4C所示的网页430。
如图4C所示,网页430可以包括地址栏431、滚动条432、搜索栏433、登录控件434、多个广告栏(例如,广告栏435、广告栏436和飘窗形式的广告栏437等)和多个分类438(例如,女装/女鞋/内衣的分类、男装/男鞋的分类、美妆/护肤/个护的分类438A等等)。其中:
地址栏431中可以显示网页430的网址,例如,网页430的网址为“gouwu.huawei.com”,则网页430为购物网站的首页。
电子设备100可以接收用户针对滚动条432的输入(例如,鼠标左键按住往下拖动),响应于该输入,显示网页430的其他内容。
搜索栏433可以用于接收用户输入的关键词。网页430还可以包括搜索控件433A,电子设备100可以接收用户针对搜索控件433A的输入(例如,鼠标左键单击),响应于该输入,查询和搜索栏433中的关键词相关的内容,并显示查询到的内容。
电子设备100可以接收用户针对登录控件434的输入(例如,鼠标左键单击),响应于该输入,显示当前网站(例如购物网站)的登录界面。
广告栏435可以展示“气质女装,买一送一”的广告,电子设备100可以接收用户针对广告栏435的输入(例如,鼠标左键单击),响应于该输入,显示广告栏435中的广告的详细内容。广告栏436的说明类似。
飘窗形式的广告栏437可以展示“热门游戏”的广告,广告栏437可以触发显示该广告的详细内容。广告栏437可以包括取消控件437A,取消控件437A用于取消显示广告栏437。
多个分类438以美妆/护肤/个护的分类438A中的“个护”分类为例进行说明,“美妆”分类、“护肤”分类等其他分类类似,电子设备100可以接收用户针对“个护”分类的输入(例如,鼠标左键单击),响应于该输入,显示“个护”分类的详细内容。
可以理解地,上述滚动条432、搜索栏433、搜索控件433A、登录控件434、任意一个广告栏、多个分类438中的任意一个分类为用户可操作的控件。如图4C所示,电子设备100还可以显示指针439。当指针439位于可操作的控件以外的区域(例如位于位置1)时,指针439可以以箭头形状显示。当指针439位于可操作的控件所在的区域时,指针439可以以手的形状显示,例如,指针439位于广告栏435所在的区域中的位置2时,指针439以手的形状显示。
用户可以浏览图4C所示的网页430。网页430可以通过浏览器记录该浏览过程中用户的行为数据(例如,通过浏览器解释执行用于收集行为数据的JS脚本,即收集脚本),例如但不限于包括以下至少一项:鼠标左键按住滚动条432进行拖动的行为、网页430的曝光时间、搜索栏433中用户输入的关键词,以及鼠标左键点击搜索控件433A、鼠标左键点击登录控件 434、鼠标左键点击广告栏、鼠标左键点击分类438中的分类等点击行为。网页430可以通过浏览器将上述行为数据上传至网页430的网页内容提供商(例如,通过浏览器解释执行用于向网页内容提供商上报行为数据的JS脚本,即上报脚本)(例如,电子设备100向网页服务器200发送上述行为数据),这样用户的隐私安全没有得到有效保护。
网页430的网页内容提供商可以基于获取到的行为数据形成该用户的用户画像,并基于该用户画像为该用户推荐个性化内容。当该用户下一次访问网页430时,电子设备100显示的网页430中的广告栏可以展示和该用户画像对应的广告。例如,用户浏览图4C所示的网页430时,鼠标左键点击了美妆/护肤/个护的分类438A,该用户下一次访问网页430时,电子设备100显示的网页430中的广告栏可以展示和美妆/护肤/个护相关的广告。
本申请提供了一种网页访问方法,可以避免网页内容提供商获取到不符合用户的隐私要求的行为数据,从而有效保护用户的隐私安全。
在一些实施例中,网页内容提供商返回的图4C所示的网页430不包括用于收集和/或上报不符合用户的隐私要求的行为数据的JS脚本,用户可以正常浏览图4C所示的网页430,网页内容提供商也无法获取到不符合用户的隐私要求的行为数据。也就是说,在保证用户的隐私安全的同时,让用户可以正常浏览网页,不影响用户的体验感。
在另一些实施例中,用户可以正常浏览图4C所示的网页430。浏览器可以检查网页430中的JS脚本,对于用于收集和/或上报符合用户的隐私要求的行为数据的JS脚本,浏览器可以解释执行,对于用于收集和/或上报不符合用户的隐私要求的行为数据的JS脚本,浏览器不会解释执行(也可称为是阻止执行)。例如,用于收集该浏览过程中的行为数据1的JS脚本执行之后,浏览器可以检查行为数据1是否符合该用户的隐私要求。若符合,网页430可以通过浏览器解释执行用于上报行为数据1的JS脚本,以将行为数据1上传至网页430的网页内容提供商;若不符合,浏览器会阻止网页430将行为数据1上传至网页430的网页内容提供商。因此,网页内容提供商无法获取到不符合用户的隐私要求的行为数据,在保证用户的隐私安全的同时,让用户可以正常浏览网页,不影响用户的体验感。
可以理解地,由于网页内容提供商无法获取到不符合该用户的隐私要求的行为数据,因此可能出现获取到的行为数据无法形成该用户的用户画像的情况,从而网页内容提供商无法为该用户推荐个性化内容。例如,当该用户下一次访问购物网站时,电子设备100显示的购物网站的首页可能和之前(如图4C所示的网页430)一样。
在一些实施例中,电子设备100显示的网页中的部分内容可以被隐藏,例如,假设用户的隐私要求包括不允许获取点击行为,电子设备100可以显示图4D所示的网页440。如图4D所示,网页440和图4C所示的网页430类似,区别在于,网页440不包括广告栏435、广告栏436和飘窗形式的广告栏437,也可以理解为是广告栏435、广告栏436和广告栏437被隐藏。用户无法操作这些被隐藏的控件,因此,网页440中这些被隐藏的控件不会触发生成对应的点击行为,即这些被隐藏的控件对应的收集脚本不会被触发,从而网页内容提供商无法获取到不符合用户的隐私要求的点击广告栏行为。
在一些实施例中,电子设备100显示的网页可以包括提示信息,以提示用户浏览行为会被该网页记录,例如,电子设备100显示图4E所示的网页450。
如图4E所示,网页450和图4C所示的网页430类似,区别在于,网页450还包括提示信息451。提示信息451可以是根据用户的隐私要求确定的,例如,假设用户的隐私要求包括不允许获取点击行为和用户输入的内容,因此,提示信息451中显示有点击行为和用户输入的内容的相关提示:“该网页将记录您输入的搜索词、点击行为等行为,请谨慎操作”。用 户可以通过提示信息451获取到在该网页中的浏览行为会被该网页记录,因此,可以不执行会触发收集不符合自身的隐私要求的行为数据的浏览行为。这样,网页450中用于收集上述行为数据的收集脚本不会被触发,从而无法通过浏览器记录不符合该用户的隐私要求的行为数据,网页内容提供商也无法获取到不符合该用户的隐私要求的行为数据。可以理解地,用户可以根据自身的隐私要求,自行选择执行的浏览行为,灵活性强。并且,网页450是正常显示且用户可正常操作的网页,在保证用户的隐私安全的同时,让用户获取到较为完整的网页内容,提升用户体验感。
不限于图4E所示的示例,在另一些示例中,电子设备100还可以显示网页记录用户的行为数据的目的(例如用于进行推荐)。在另一些示例中,电子设备100也可以在会触发收集不符合用户的隐私要求的行为数据的控件附近,显示对应的提示信息,例如,电子设备100在广告栏的附近显示提示信息:“该网页将记录针对该控件的点击行为”。在另一些示例中,当指针位于会触发收集不符合用户的隐私要求的行为数据的控件所在的区域时,电子设备100显示对应的提示信息,例如,当指针位于搜索栏所在的区域时,电子设备100显示提示信息:“该网页将记录您输入的搜索词”。
在一些实施例中,当用户执行会触发收集行为数据的用户操作时,电子设备100可以显示提示信息,具体示例可参见图4F-图4G。
例如,假设用户的隐私要求包括不允许获取在网页中输入的内容。电子设备100可以接收用户针对图4C所示的网页430中的搜索栏433的输入(例如,鼠标左键单击),响应于该输入,显示图4F所示的网页460。如图4F所示,网页460和图4C所示的网页430类似,区别在于,网页460还包括提示信息461,提示信息461中可以显示“该网页将记录您输入的搜索词,请谨慎操作”。用户可以通过提示信息461获取到在搜索栏433中输入的关键词会被该网页记录,因此,可以根据自身需求选择是否继续在搜索栏433中输入关键词。在一些实施例中,用户不在搜索栏433中输入关键词,因此,网页460无法通过浏览器记录用户在网页460中输入的内容,网页内容提供商也无法获取到不符合用户的隐私要求的关键词。
例如,假设用户的隐私要求包括不允许获取点击行为和在网页中输入的内容。电子设备100接收到用户在图4C所示的网页430中的搜索栏433中输入的关键词之后,可以接收用户针对图4C所示的网页430中的搜索控件433A的输入(例如,鼠标左键单击),响应于该输入,显示图4G所示的网页470。如图4G所示,网页470和图4C所示的网页430类似,区别在于,网页470中的搜索栏433可以显示有用户输入的关键词,例如为“智能手机”。网页470还包括提示信息471,提示信息471中可以显示“继续前往,该网页将记录此次行为,是否继续”。用户可以通过提示信息471获取到此次搜索行为会被该网页记录,因此,可以根据自身需求选择是否继续执行此次搜索行为。提示信息471中还可以显示确认控件471A和取消控件471B。在一些实施例中,电子设备100可以接收用户针对确认控件471A的输入(例如,鼠标左键单击),响应于该输入,显示和搜索栏433中的关键词相关的搜索结果。网页470可以通过浏览器记录此次搜索行为的行为数据,例如,用户在搜索栏433中输入的关键词和鼠标左键点击搜索控件433A。在另一些实施例中,电子设备100可以接收用户针对取消控件471B的输入(例如,鼠标左键单击),响应于该输入,取消显示提示信息471,搜索控件433A对应的收集脚本不会被触发,从而,网页内容提供商无法获取到此次搜索行为的行为数据。
在一些实施例中,当用户执行会触发收集不符合隐私要求的行为数据的用户操作时,电子设备100可以显示“执行失败”的提示信息。
例如,假设用户的隐私要求包括不允许获取点击行为和在网页中输入的内容。电子设备100接收到用户在图4C所示的网页430中的搜索栏433中输入的关键词之后,可以接收用户针对图4C所示的网页430中的搜索控件433A的输入(例如,鼠标左键单击),响应于该输入,显示图4H所示的网页480。如图4H所示,网页480和图4C所示的网页430类似,区别在于,网页480还包括提示信息481,提示信息481中可以显示“该操作不符合隐私要求,执行失败”。并且,对于上述用户针对图4C所示的网页430中的搜索控件433A的输入(例如,鼠标左键单击),电子设备100不会执行搜索操作(查询和网页430中的搜索栏433中输入的关键词相关的搜索结果),搜索控件433A对应的收集脚本也不会被执行,因此,网页内容提供商无法获取到搜索操作对应的行为数据(例如包括不符合用户的隐私要求的输入内容和点击行为)。
在一些实施例中,电子设备100显示的网页中,对用户体验影响不大的控件1可以被隐藏,对用户体验影响较大的控件2可以为不可操作的控件,控件1和控件2在正常显示的网页(例如图4C所示的网页430)中会触发获取不符合用户的隐私要求的行为数据。例如,假设用户的隐私要求包括不允许获取点击行为,电子设备100可以显示图4I所示的网页490。
如图4I所示,网页490和图4C所示的网页430类似,区别在于,网页490不包括飘窗形式的广告栏437,也可理解为是广告栏437被隐藏。并且,网页490中的广告栏435和广告栏436为不可操作的控件,以网页490中的广告栏435为例进行说明。在网页490中,当指针439位于广告栏435所在的区域中的位置2时,指针439以箭头形状显示,即和图4C所示的位于可操作的控件以外的区域的指针439的显示方式一致,而不是图4C所示的网页430中位于可操作的广告栏435所在的区域(如位置2)中的指针439的显示方式(以手的形状显示)。即使电子设备100接收到用户针对广告栏435的输入,也不会触发显示对应的广告的详细内容。也就是说,相比图4C所示的网页430,在网页490中,对用户体验影响较小的广告栏437可以被隐藏,对用户体验影响较大的广告栏435和广告栏436可以为不可操作的控件。用户无法操作这些控件,因此这些控件不会触发生成对应的点击行为,即这些控件对应的收集脚本不会被触发,从而网页内容提供商无法获取到不符合用户的隐私要求的点击广告栏行为。在保证用户的隐私安全的同时,提升浏览网页的用户体验。
不限于上述示例的指针的显示方式,指针位于可操作的控件所在的区域时可以以第一方式显示,指针位于不可操作的区域时可以以第二方式显示,第一方式和第二方式相同或不同,本申请对第一方式和第二方式的具体内容不作限定。
在一些实施例中,用户的隐私要求可以是电子设备100预设的。在另一些实施例中,用户的隐私要求可以是电子设备100根据该用户的网页行为日志(例如包括用户习惯执行的浏览行为)等个人信息分析得到的。不限于此,在另一些实施例中,用户的隐私要求可以是用户通过电子设备100设置的,具体示例可参见图5A-图5C。
电子设备100接收到用户在图4B所示的用户界面420中的地址栏421中输入的网址(例如,购物网站的网址“gouwu.huawei.com”)之后,可以接收用户针对用户界面420中的访问控件422的输入(例如,鼠标左键单击),响应于该输入,电子设备100可以显示如图5A所示的网页510。
如图5A所示,网页510和图4C所示的网页430类似,区别在于,网页510还包括提示信息511,提示信息511中可以显示网页510需收集的浏览行为,可选地以及收集的浏览行为的用途。例如,假设网页510需收集的隐私级别最高的浏览行为为点击行为,收集的浏览 行为的用途为推荐个性化内容,则提示信息511中可以显示“该网页试图收集点击行为等行为,用于推荐”。提示信息511中还可以显示允许控件511A和禁止控件511B。允许控件511A可以用于允许网页510收集和/或上报提示信息511指示的行为数据,例如,电子设备100可以接收用户针对允许控件511A的输入(例如,鼠标左键单击),响应于该输入,设置在访问网页510时用户的隐私要求为允许获取隐私级别等于或低于点击行为的行为数据。禁止控件511B可以用于禁止网页510收集和/或上报提示信息511指示的行为数据,例如,电子设备100可以接收用户针对允许控件511A的输入(例如,鼠标左键单击),响应于该输入,设置在访问网页510时用户的隐私要求为不允许获取隐私级别等于或高于点击行为的行为数据。
不限于上述示例的情况,在另一些示例中,当用户执行会触发收集行为数据的浏览行为时,电子设备100可以显示类似提示信息511的提示信息,该提示信息指示的行为数据可以为该浏览行为触发收集的行为数据。例如,电子设备100接收到用户针对图4C所示的网页430中的搜索控件433A、登录控件434、广告栏435(其他广告栏类似)或美妆/护肤/个护的分类438A(其他分类类似)的输入(例如,鼠标左键点击)时,可以显示提示信息511。可选地,该提示信息中的允许控件还可以用于触发电子设备100继续执行该浏览行为对应的操作,该提示信息中的禁止控件还可以用于触发电子设备100取消执行该浏览行为对应的操作。在另一些示例中,用户执行会触发收集行为数据的浏览行为之后,也可以理解为是网页中用于收集该行为数据的收集脚本被执行之后,电子设备100可以显示类似提示信息511的提示信息。可选地,该提示信息中的允许控件还可以用于允许浏览器执行该网页中用于上传该行为数据给网页内容提供商的上报脚本,该提示信息中的禁止控件还可以用于禁止浏览器执行该上报脚本。本申请对触发显示类似提示信息511的信息的具体方式不作限定。
如图5B所示,电子设备100可以显示浏览器的设置界面520,设置界面520可以用于用户设置通过该浏览器访问网页时的隐私要求。设置界面520可以包括提示信息521,提示信息521中可以显示“网站将在您访问网页时收集您的浏览行为,从而实现个性化推荐广告等内容”。设置界面520还可以包括设置名称522,设置名称522中可以显示“允许收集的最高等级的行为数据”。设置名称522下包括多个设置选项,例如包括设置选项523、设置选项524、设置选项525和设置选项526,其中,任意一个设置选项对应一个隐私级别的行为数据。以设置选项523为例进行说明,其他设置选项类似,设置选项523可以包括设置名称523A和设置开关523B,设置名称523A中可以显示设置选项523对应的隐私级别的行为数据的说明,例如,该隐私级别的行为数据的名称“敏感个人数据”和示例“在网页中输入的内容等数据”。设置开关523B可以用于设置允许获取的最高等级的行为数据为设置选项523对应的“敏感个人数据”,或者取消该设置。例如,图5B所示的设置界面520中设置开关523B为开启状态,其他设置选项包括的设置开关为关闭状态,可以表征:用户设置通过该浏览器访问网页时允许获取的最高等级的行为数据为设置选项523对应的“敏感个人数据”,也就是说,通过该浏览器访问网页时用户的隐私要求为允许获取隐私级别等于或低于敏感个人数据”的行为数据。
如图5B所示,设置界面520还包括设置选项527,设置选项527可以包括设置名称527A和设置开关527B,设置名称527A中可以显示“不允许收集任何行为数据”,设置开关527B可以用于设置通过该浏览器访问网页时不允许获取任何行为数据,或者取消该设置。
可以理解地,设置界面520中的设置选项523、设置选项524、设置选项525、设置选项526和设置选项527中,最多一个设置选项中的设置开关为开启状态,其他设置选项中的设置开关均为关闭状态。例如,图5B所示的设置界面520中设置开关523B为开启状态,其他 设置选项中的设置开关为关闭状态,电子设备100接收到用户针对设置开关527B的输入(例如,鼠标左键单击)时,响应于该输入,将设置开关527B从关闭状态切换为开启状态,并将设置开关523B从开启状态切换为关闭状态,用户设置的通过该浏览器访问网页时的隐私要求为不允许获取任何行为数据。
如图5C所示,电子设备100可以显示浏览器的用户界面530。用户界面530可以包括提示信息531,提示信息531中可以显示“无痕模式”,用于提示当前已进入浏览器的无痕模式。用户界面530可以包括“无痕模式”的相关说明,例如,提示信息532可以包括“无痕模式”下浏览器不会保存的信息(例如,浏览记录、cookie、网站数据、表单中输入的信息、为网站授予的权限等),提示信息533可以包括“无痕模式”下仍然可能获取到用户的行为数据的组织(例如,网站的提供商、雇主或学校、互联网服务提供商等)。用户界面530还可以包括设置选项534,设置选项534可以包括设置名称534A和设置开关534B,设置名称534A中可以显示该设置的名称(例如,“安全访问功能”),以及该设置的说明(例如,“开启此功能后,不允许网站的提供商收集任何行为数据”)。设置开关534B可以用于设置无痕模式下不允许获取任何行为数据,或者取消该设置。例如,用户界面530中设置开关534B为开启状态,可以表征:用户设置的无痕模式下的隐私要求为不允许获取任何行为数据。
不限于图5C示例的情况,在另一些示例中,用户进入浏览器的无痕模式后,例如,电子设备100可以显示图5C所示的用户界面530,此时,用户界面530可以不包括设置选项534,或者用户界面530中的设置开关534B为关闭状态。用户可以在无痕模式下打开浏览器的设置界面,基于该设置界面设置无痕模式下的隐私要求,例如,电子设备100可以显示图5B所示的用户界面520,用户界面520中的设置开关523B为开启状态,其他设置选项包括的设置开关为关闭状态,可以表征:用户设置的无痕模式下允许获取的最高等级的行为数据为设置选项523对应的“敏感个人数据”,也就是说,无痕模式下用户的隐私要求为允许获取隐私级别等于或低于敏感个人数据”的行为数据。
本申请提供了一种网页访问场景下保护用户的隐私安全的交互方式,用户使用更加方便,体验感更好。
基于以上实施例介绍本申请涉及的网页访问方法。该方法可以应用于图2所示的网页访问系统10。
请参见图6,图6是本申请实施例提供的一种网页访问方法的流程示意图。该方法可以包括但不限于如下步骤:
S100:网页内容提供商使用扩展语言和/或扩展脚本生成网页内容。
在一些实施例中,S100为可选的步骤。
例如,网页内容提供商使用扩展的html语言和扩展的javascript(JS)脚本生成网页内容(也可称为网页数据),网页内容用于浏览器显示对应的网页。
在一些实施例中,使用扩展语言生成的网页内容可以包括第一指示信息,第一指示信息用于指示网页获取(包括收集和上报)的行为数据的隐私级别(本申请可以将隐私级别称为等级、类别或者类型等),可选地,第一指示信息用于指示网页获取的行为数据的最高隐私级别。例如,扩展的html中,通过pdLv1指示获取的行为数据的隐私级别。pdLv1放在网页内容中的标签内时,可以表征该标签涉及的内容会获取隐私级别低于或等于pdLv1指示的隐私级别的行为数据。
示例性地,基于上述示例的行为数据的隐私级别(按照隐私级别从高到低依次为:敏感 个人数据、高影响个人数据、中影响个人数据和低影响个人数据),pdLv1的取值可以有以下5种情况:
pdLv1取值为4时,指示会获取敏感个人数据(如用户在网页中输入的内容),可选地以及隐私级别低于敏感个人数据的行为数据;
pdLv1取值为3时,指示会获取高影响个人数据(如点击行为),可选地以及隐私级别低于高影响个人数据的行为数据;
pdLv1取值为2时,指示会获取中影响个人数据(如网页的曝光时间),可选地以及隐私级别低于中影响个人数据的行为数据;
pdLv1取值为1时,指示会获取低影响个人数据(如滚动条的拖动行为),可选地以及隐私级别低于低影响个人数据的行为数据;
pdLv1取值为0时,指示不会获取任何行为数据。
在一些实施例中,第一指示信息指示了多个隐私级别,则以这多个隐私级别中最高的隐私级别为准,即表征会获取隐私级别低于或等于该最高的隐私级别的行为数据。例如,第一网页包括标签1和标签2,取值为3的pdLv1放在标签1内,取值为4的pdLv1放在标签2内,可以表征第一网页会获取隐私级别等于或低于(取值为4的pdLv1指示的)敏感个人数据的行为数据。
在一些实施例中,使用扩展语言生成的第一网页可以包括第二指示信息,第二指示信息用于指示第一网页获取行为数据的用途和/或对用户的影响。例如,扩展的html中,通过pdPurpose指示获取行为数据的用途和/或对用户的影响。
在一些实施例中,使用扩展脚本生成的第一网页可以包括扩展的收集脚本(也可称为收集接口),第一网页可以使用收集接口收集(也可称为生成)用户的行为数据。例如,扩展的JS脚本中,通过generatePd生成/收集用户的行为数据。
在一些实施例中,使用扩展脚本生成的第一网页可以包括扩展的上报脚本(也可称为上报接口),第一网页可以使用上报接口将用户的行为数据上传(也可称为发送或者上报)至第一网页的网页内容提供商。
使用扩展语言和扩展脚本生成的网页内容的示例如下所示:

在一些实施例中,对于一个网址,网页内容提供商可以使用扩展语言和/或扩展脚本生成一种网页内容。当接收到用于获取该网址对应的网页内容的请求时,网页内容提供商均会返回这一种网页内容。可以理解地,这种网页内容很可能不符合部分用户的隐私要求。在另一些实施例中,对于一个网址,网页内容提供商可以使用扩展语言和/或扩展脚本生成多种网页内容。当接收到用于获取该网址对应的网页内容的请求时,可以根据该请求携带的指示用户的隐私要求的信息(即下述S101中的第三指示信息),返回对应的网页内容,即对于不同用户的不同隐私要求,返回不同的网页内容。
S101:浏览器向网页内容提供商请求获取第一网址对应的网页内容(携带指示允许获取的行为数据的隐私级别的第三指示信息)。
本申请中的浏览器可以但不限于是独立的应用程序、独立的小程序、封装在其他应用程序中的功能组件、封装在其他小程序中的功能组件或其他形式的软件模块。
在一些实施例中,电子设备100接收到第一搜索请求后,浏览器向网页内容提供商请求获取第一网址对应的网页内容,第一网址和第一搜索请求相关联。可选地,电子设备100接收第一搜索请求,包括:电子设备100接收用户输入的第一网址,以及用于触发访问第一网址对应的网页的用户操作。例如,电子设备100显示图4B所示的浏览器的用户界面420时,接收到用户在地址栏421中输入的网址(例如,购物网站的网址“gouwu.huawei.com”),然后可以接收用户针对访问控件422的输入(例如,鼠标左键单击),响应于该输入,浏览器向购物网站的网页内容提供商请求获取购物网站的首页。
在一些实施例中,浏览器向网页内容提供商发起请求时,可以携带第三指示信息,例如,第三指示信息是请求时携带的头部字段:X-Allowed-PersonalData-Lvl。其中,第三指示信息用于指示用户允许获取(也可称为收集和/或上报)的行为数据的隐私级别,可选地,第三指示信息用于指示用户允许获取的行为数据的最高隐私级别。可选地,第三指示信息用于指示用户的隐私要求。可选地,第三指示信息指示的隐私级别可以是根据当前用户的隐私要求确定的。
本申请中,用户的隐私要求可以是用户通过电子设备100设置的,具体示例可参见上图5B所示的实施例。不限于此,也可以是电子设备100预设的。或者也可以是电子设备100根据该用户的网页行为(例如包括用户习惯执行的浏览行为)等个人信息分析得到的,本申请对此不作限定。
示例性地,第三指示信息为X-Allowed-PersonalData-Lvl。基于上述示例的行为数据的隐私级别(按照隐私级别从高到低依次为:敏感个人数据、高影响个人数据、中影响个人数据和低影响个人数据),X-Allowed-PersonalData-Lvl的取值可以有以下5种情况:
X-Allowed-PersonalData-Lvl取值为4时,指示允许获取敏感个人数据(如用户在网页中输入的内容),可选地以及隐私级别低于敏感个人数据的行为数据;
X-Allowed-PersonalData-Lvl取值为3时,指示允许获取高影响个人数据(如点击行为),可选地以及隐私级别低于高影响个人数据的行为数据;
X-Allowed-PersonalData-Lvl取值为2时,指示允许获取中影响个人数据(如网页的曝光时间),可选地以及隐私级别低于中影响个人数据的行为数据;
X-Allowed-PersonalData-Lvl取值为1时,指示允许获取低影响个人数据(如滚动条的拖动行为),可选地以及隐私级别低于低影响个人数据的行为数据;
X-Allowed-PersonalData-Lvl取值为0时,指示不允许获取任何行为数据。
S102:网页内容提供商向浏览器发送第一网页内容。
在一些实施例中,网页内容提供商响应于浏览器的请求,向浏览器发送第一网址对应的第一网页内容。
在一些实施例中,第一网页内容可以包括上述第一指示信息,浏览器可以根据第一指示信息获取到第一网页内容会触发收集和上报的行为数据的隐私级别,可选地,浏览器可以根据第一指示信息获取到,和第一指示信息对应的网页内容触发收集和/或上报的行为数据的隐私级别。在一些实施例中,第一网页内容可以包括上述第二指示信息,浏览器可以根据第二指示信息获取到第一网页内容会触发收集和上报的行为数据的用途和/或对用户的影响,可选地,浏览器可以根据第二指示信息获取到,和第二指示信息对应的网页内容触发收集和/或上报的行为数据的用途。
在一些实施例中,网页内容提供商向浏览器发送第一网页内容时,可以携带第四指示信息,例如,第四指示信息是网页内容提供商返回网页内容时携带的头部字段:X-Request-PersonalData-Lvl。其中,第四指示信息用于指示网页内容提供商希望获取的行为数据的隐私级别,可选地,第四指示信息用于指示网页内容提供商希望获取的行为数据的最高隐私级别。例如,第四指示信息为X-Request-PersonalData-Lvl,X-Request-PersonalData-Lvl的取值可以为4、3、2、1或0,具体说明和上述pdLv1、X-Allowed-PersonalData-Lvl的取值示例类似,不再赘述。
S103:浏览器根据第一网页内容显示第一网页。
在一些实施例中,浏览器可以根据第一网页内容,渲染并显示第一网页。
在一些实施例中,网页内容提供商向浏览器发送第一网页内容时携带的第四指示信息指示的隐私级别,低于或等于,浏览器向网页内容提供商发起请求时携带的第三指示信息指示的隐私级别。在一些实施例中,第一网页内容包括的第一指示信息指示的隐私级别,低于或等于,浏览器向网页内容提供商发起请求时携带的第三指示信息指示的隐私级别。
在一些实施例中,第一网页是包含完整功能且不含额外的提示信息的正常网页,例如,第一网页为图4C所示的网页430,网页430中显示有完整的网页内容且未显示有额外的提示信息,并且,用户可正常操作网页430中的控件。可选地,第一网页内容不包括用于生成不符合用户的隐私要求的行为数据的收集脚本,以及用于上报不符合用户的隐私要求的行为数据的上报脚本。因此,用户浏览第一网页的过程中不会触发收集和上报不符合用户的隐私要求的行为数据,在用户无感的情况下保证了用户的隐私安全。
在一些实施例中,第一网页可以不包括第一信息,第一信息用于触发获取不符合用户的隐私要求的行为数据。例如,第三指示信息指示的用户的隐私要求包括不允许获取高影响个人数据(以点击行为为例说明)。第一网页为图4D所示的网页440,相比图4C所示的正常网页430,网页440中,广告栏435、广告栏436和飘窗形式的广告栏437(这些控件即为第一信息)均被隐藏。
在一些实施例中,第一网页可以包括提示信息,可选地,提示信息用于指示第一网页会获取不符合用户的隐私要求的行为数据。例如,第三指示信息指示用户允许获取隐私级别低于高影响个人数据的行为数据,即用户不允许获取高影响个人数据(以点击行为为例说明)和敏感个人数据(以用户在网页中输入的内容为例说明)。第一网页为图4E所示的网页450, 网页450包括提示信息451:“该网页将记录您输入的搜索词、点击行为等行为,请谨慎操作”。
在一些实施例中,电子设备100接收到用户针对第一网页中的第二信息的输入时,显示提示信息,可选地,第二信息用于触发获取不符合用户的隐私要求的行为数据。可选地,提示信息用于指示第一网页会获取不符合用户的隐私要求的行为数据,可选地,提示信息用于指示第一网页会获取第二信息触发获取的行为数据,可选地,提示信息用于指示当前执行的操作不符合用户的隐私要求。
例如,第三指示信息指示的用户的隐私要求包括不允许获取高影响个人数据(以点击行为为例说明)。电子设备100接收到用户针对图4C所示的网页430中的搜索栏433的输入(例如,鼠标左键单击)时,显示图4F所示的网页460中的提示信息461:“该网页将记录您输入的搜索词,请谨慎操作”。
例如,第三指示信息指示用户允许获取隐私级别低于高影响个人数据的行为数据,即用户不允许获取高影响个人数据(以点击行为为例说明)和敏感个人数据(以用户在网页中输入的内容为例说明)。电子设备100接收到用户在图4C所示的网页430包括的搜索栏433中输入的关键词“智能手机”之后,若接收到用户针对图4C所示的网页430中的搜索控件433A的输入(例如,鼠标左键单击),可以显示图4G所示的网页470中的提示信息471:“继续前往,该网页将记录此次行为,是否继续”,其中,“此次行为”可以包括用户在搜索栏433中输入的关键词和鼠标左键点击搜索控件433A。
在一些实施例中,第一网页中的第三信息可以是不可操作的信息,该第三信息在正常网页中为可操作的信息,可选地,第三信息用于触发获取不符合用户的隐私要求的行为数据。可选地,由于第一网页中的第三信息不可操作,因此,电子设备100接收到用户针对第一网页中的第三信息的输入时,不会执行任何操作。例如,第三指示信息指示的用户的隐私要求包括不允许获取高影响个人数据(以点击行为为例说明)。第一网页为图4I所示的网页490,相比图4C所示的正常网页430,网页490中,广告栏435和广告栏436(这些控件为第三信息)不可操作。即使电子设备100接收到用户针对广告栏435或广告栏436的输入,也不会触发显示对应的广告的详细内容,即无响应。
可选地,由于第一网页中的第三信息不可操作,因此,电子设备100接收到用户针对第一网页中的第三信息的输入时,显示提示信息,提示信息用于指示当前执行的操作执行失败。例如,第三指示信息指示用户允许获取隐私级别低于高影响个人数据的行为数据,即用户不允许获取高影响个人数据(以点击行为为例说明)和敏感个人数据(以用户在网页中输入的内容为例说明)。电子设备100接收到用户在图4C所示的网页430包括的搜索栏433中输入的关键词“智能手机”之后,若接收到用户针对图4C所示的网页430中的搜索控件433A的输入(例如,鼠标左键单击),可以显示图4H所示的网页480中的提示信息481:“该操作不符合隐私要求,执行失败”,并且,电子设备100不会执行和该输入对应的搜索操作(查询和网页430中的搜索栏433中输入的关键词相关的搜索结果)。
其中,上述第一信息、第二信息、第三信息可以是网页中的控件。
S104:浏览器执行第一网页中的收集脚本,以生成用户的行为数据。
在一些实施例中,用户在访问第一网页时,可以执行拖动滚动条、点击控件、在表单中输入关键词等用户操作。电子设备100接收到用户操作时,可以响应于用户操作,执行相应的操作,此时,第一网页内嵌入的收集脚本可以被触发,浏览器可以解释执行该收集脚本,该收集脚本用于收集/生成该用户操作的行为数据。例如,浏览器显示图4C所示的网页430(即第一网页)时,电子设备100接收到用户针对网页430中的广告栏435的输入(例如, 鼠标左键单击),响应于该输入,显示广告栏435对应的广告的详细内容。此时,浏览器可以解释执行网页430中广告栏435对应的收集脚本,以收集针对广告栏435的点击行为。
在另一些实施例中,无需用户操作触发,第一网页中的收集脚本可以自动被触发。可选地,浏览器显示第一网页时,可以解释执行收集脚本,这种情况下,S103和S104的顺序不作限定,例如可以是同时执行的。例如,浏览器显示第一网页时,用于收集网页的曝光时间的收集脚本自动被触发。
在一些实施例中,第一网页内容不包括用于生成不符合用户的隐私要求的行为数据的收集脚本,因此S104中生成的行为数据均符合第三指示信息指示的用户的隐私要求。
S105:浏览器执行第一网页中的上报脚本,以发送用户的行为数据。
在一些实施例中,浏览器可以解释执行第一网页中的上报脚本,以向网页内容提供商发送收集到的用户的行为数据。例如,浏览器显示图4C所示的网页430(即第一网页)时,电子设备100接收到用户针对网页430中的广告栏435的输入(例如,鼠标左键单击),响应于该输入,显示广告栏435对应的广告的详细内容。此时,浏览器可以解释执行网页430中广告栏435对应的收集脚本,以收集针对广告栏435的点击行为。该收集脚本执行后,浏览器可以解释执行网页430中广告栏435对应的上报脚本,将上述收集的针对广告栏435的点击行为发送给网页内容提供商。
在一些实施例中,第一网页内容不包括用于上报不符合用户的隐私要求的行为数据的上报脚本,因此S105中上报的行为数据均符合第三指示信息指示的用户的隐私要求。
在一种可能的实现方式中,该方法还包括:
S106:浏览器关闭第一网页。
在一些实施例中,电子设备100接收到用于关闭第一网页的用户操作时,浏览器关闭第一网页。
S107:浏览器向网页内容提供商请求获取第一网址对应的网页。
在一些实施例中,电子设备100接收到第二搜索请求后,浏览器向网页内容提供商请求获取第一网址对应的网页内容,第一网址和第二搜索请求相关联。
在一些实施例中,由于网页内容提供商的后台数据(例如S105中的行为数据)不足以形成上述用户的用户画像,因此,网页内容提供商无法为上述用户生成个性化的推荐内容,从而导致返回给浏览器的网页内容不包括个性化的推荐内容,例如,返回的网页内容仍然为S102中发送的第一网页内容,网页内容提供商可以执行S108。
S108:网页内容提供商向浏览器发送第一网页内容。
S109:浏览器根据第一网页内容显示第一网页。
在一些实施例中,浏览器可以根据第一网页内容,渲染并显示第一网页,也就是说,浏览器当前显示的网页和用户之前访问第一网址时浏览器显示的网页(即S103中的第一网页)一致,而非包括针对上述用户的个性化推荐内容的网页。
在图6所示的方法中,可以扩展已有的网络请求(即可以携带第三指示信息),让浏览器在通信过程中向网页内容提供商表明用户的隐私要求,网页内容提供商可以返回符合用户的隐私要求的网页内容,例如,返回的网页内容不包括用于收集和/或上报不符合用户的隐私要求的行为数据的JS脚本,从而有效保护用户的隐私要求。并且,网页内容提供商可以根据不同的隐私要求,选择性地返回不同的网页内容,从而满足不同用户的不同需求,或者同一用户在不同场景下的需求,使用场景广泛,产品可用性高。
请参见图7,图7是本申请实施例提供的又一种网页访问方法的流程示意图。该方法可以包括但不限于如下步骤:
S200:网页内容提供商使用扩展语言和/或扩展脚本生成网页内容。
S201:浏览器向网页内容提供商请求获取第一网址对应的网页内容(携带指示允许获取的行为数据的隐私级别的第三指示信息)。
S202:网页内容提供商向浏览器发送第二网页内容。
S200-S202的说明和图6的S100-S102的说明类似,具体可参见图6的S100-S102的说明。
S203:浏览器判断第二网页内容是否符合用户的隐私要求。
在一些实施例中,网页内容提供商向浏览器发送第二网页内容时,可以携带第四指示信息。浏览器可以根据第四指示信息获取到网页内容提供商希望获取的行为数据的隐私级别。浏览器判断第二网页内容是否符合用户的隐私要求,可以包括:判断第四指示信息指示的隐私级别是否低于或等于用户允许获取的行为数据的隐私级别。例如,当第四指示信息指示的隐私级别低于或等于用户允许获取的行为数据的隐私级别时,浏览器可以确定第二网页内容符合用户的隐私要求,当第四指示信息指示的隐私级别高于用户允许获取的行为数据的隐私级别时,浏览器可以确定第二网页内容不符合用户的隐私要求。
在一些实施例中,浏览器可以结合第四指示信息,以及第二网页内容包括的第一指示信息、收集脚本、上报脚本中至少一项,判断第二网页内容是否符合用户的隐私要求。可选地,浏览器可以判断第一指示信息指示的隐私级别是否低于或等于用户允许获取的行为数据的隐私级别,例如,当第一指示信息指示的隐私级别高于用户允许获取的行为数据的隐私级别时,浏览器可以确定第二网页内容不符合用户的隐私要求。可选地,浏览器可以判断第二网页内容是否包括用于收集不符合用户的隐私要求的行为数据的收集脚本,例如,当第二网页内容包括用于收集不符合用户的隐私要求的行为数据的收集脚本时,浏览器可以确定第二网页内容不符合用户的隐私要求。可选地,浏览器可以判断第二网页内容是否包括用于上报不符合用户的隐私要求的行为数据的上报脚本,例如,当第二网页内容包括用于上报不符合用户的隐私要求的行为数据的上报脚本时,浏览器可以确定第二网页内容不符合用户的隐私要求。
例如,上图6的S100示例的网页内容中,标识为“btn_submit”的按钮(button)被点击时,会执行函数genAndReportData。函数genAndReportData包括收集脚本(generatePd)和上报脚本(reportPd),并且还包括“lvl=3”,用于指示该收集脚本收集的行为数据和该上报脚本上报的行为数据均为高影响个人数据。假设用户的隐私要求包括不允许获取高影响个人数据,则浏览器可以根据该网页内容获取到该网页内容包括会收集和上报不符合用户的隐私要求的行为数据的脚本,从而确定该网页内容不符合用户的隐私要求。
在一些实施例中,当第二网页内容符合用户的隐私要求时,浏览器可以根据第二网页内容显示第二网页,即执行S204。在另一些实施例中,当第二网页内容不符合用户的隐私要求时,浏览器可以根据第二网页内容和用户的隐私要求显示调整后的第二网页,即执行S205。
S204:当第二网页内容符合用户的隐私要求时,浏览器根据第二网页内容显示第二网页。
在一些实施例中,浏览器可以直接根据第二网页内容,渲染并显示第二网页。其中,第二网页内容、第二网页的说明可参见图6的S103中第一网页内容、第一网页的说明。
S205:当第二网页内容不符合用户的隐私要求时,浏览器根据第二网页内容和用户的隐私要求显示调整后的第二网页。
在一些实施例中,当第二网页内容不符合用户的隐私要求时,浏览器可以根据用户的隐私要求调整第二网页内容对应的第二网页,并显示调整后的第二网页。调整示例如下所示:
在一些实施例中,浏览器可以根据用户的隐私要求隐藏第二网页中的部分内容,也可理解为是,调整后的第二网页不包括调整前的第二网页(即上述第二网页内容对应的第二网页)中的部分内容,具体说明可参见图6的S103中的“第一网页可以不包括第一信息”的说明,其中,上述隐藏的部分内容可参见第一信息的说明。
示例性地,浏览器调整后的第二网页可以包括以下内容:
在一些实施例中,浏览器可以根据用户的隐私要求在第二网页中添加额外的提示信息,也可理解为是,相比调整前的第二网页(即上述第二网页内容对应的第二网页),调整后的第二网页还包括提示信息,具体说明可参见图6的S103中的“第一网页可以包括提示信息”、“电子设备100接收到用户针对第一网页中的第二信息的输入时,显示提示信息”的说明。
在一些实施例中,浏览器可以根据用户的隐私要求将第二网页中可操作的信息调整为不可操作的信息,也可理解为是,在调整前的第二网页(即上述第二网页内容对应的第二网页)中的可操作的信息1,在调整后的第二网页中是不可操作的信息,具体说明可参见图6的S103中的“第一网页中的第三信息可以是不可操作的信息”的说明,其中,上述不可操作的信息可参见第三信息的说明。
S206:浏览器执行第二网页中的收集脚本,以收集/生成用户的行为数据。
在一些实施例中,浏览器执行S204之后,浏览器执行第二网页中的收集脚本。在另一些实施例中,浏览器执行S205之后,浏览器执行调整后的第二网页中的收集脚本。浏览器解释执行收集脚本的说明可参见图6的S104中浏览器解释执行收集脚本的说明。
S207:对于不符合用户的隐私要求的行为数据,浏览器不允许收集和/或上报。
在一些实施例中,S207为可选的步骤。
在一些实施例中,用户查看浏览器显示的网页(S204中的第二网页或S205中的调整后的第二网页)的过程中,浏览器可以不执行该网页中用于收集不符合用户的隐私要求的行为数据的收集脚本,和用于上报不符合用户的隐私要求的行为数据的上报脚本,也可理解为是阻止这些收集脚本和上报脚本执行。
在一些实施例中,浏览器显示的网页中的收集脚本被触发执行时,浏览器可以检查该收集脚本收集的行为数据是否符合用户的隐私要求(例如,收集的行为数据的隐私级别是否高于用户允许获取的行为数据的隐私级别)。若不符合,浏览器不解释执行该收集脚本。其中,S206和S207的顺序不作限定。例如,假设用户的隐私要求包括不允许获取高影响个人数据(以点击行为为例说明)和敏感个人数据(以用户在网页中输入的内容为例说明)。电子设备 100接收到用户在图4C所示的网页430包括的搜索栏433中输入的关键词“智能手机”之后,可以接收用户针对图4C所示的网页430中的搜索控件433A的输入(例如,鼠标左键单击),此时,搜索控件433A对应的收集脚本可以被触发。但是,浏览器检测到该收集脚本会收集不符合用户的隐私要求的行为数据(例如,在搜索栏461中输入的关键词和点击搜索控件461A),因此,浏览器不会执行该收集脚本。并且,电子设备100也不会响应于该输入,执行对应的搜索操作(查询和网页430中的搜索栏433中输入的关键词相关的搜索结果),电子设备100可以显示图4H所示的网页480中的提示信息481:“该操作不符合隐私要求,执行失败”。
S208:浏览器执行第二网页中的上报脚本,以向网页内容提供商发送用户的行为数据。
在一些实施例中,浏览器执行S204之后,浏览器执行第二网页中的上报脚本。在另一些实施例中,浏览器执行S205之后,浏览器执行调整后的第二网页中的上报脚本。浏览器解释执行上报脚本的说明可参见图6的S105中浏览器解释执行上报脚本的说明。
在一些实施例中,浏览器显示的网页中的上报脚本被触发时,浏览器可以检查该上报脚本上报的行为数据是否符合用户的隐私要求(例如,上报的行为数据的隐私级别是否高于用户允许获取的行为数据的隐私级别)。若不符合,浏览器不解释执行该上报脚本。其中,S207和S208的顺序不作限定。
接下来示例性示出S207的两种执行情况,以下示例中,假设浏览器显示的网页包括收集脚本1和上报脚本1,上报脚本1用于向网页内容提供商上报收集脚本1生成的行为数据。
在一种情况下,浏览器在收集脚本1执行之前就检测到收集脚本1用于收集不符合用户的隐私要求的行为数据,因此可以直接不执行收集脚本1,由于收集脚本1未执行,收集脚本1对应的行为数据也未生成,则上报脚本1无法上报收集脚本1对应的行为数据。例如,上图6的S100示例的网页内容中,标识为“btn_submit”的按钮(button)被点击时,会执行函数genAndReportData。函数genAndReportData包括收集脚本(generatePd)和上报脚本(reportPd),并且还包括“lvl=3”,用于指示该收集脚本收集的行为数据和该上报脚本上报的行为数据均为高影响个人数据。假设用户的隐私要求包括不允许获取高影响个人数据,浏览器可以根据该网页内容获取到该收集脚本收集的行为数据不符合用户的隐私要求,因此不会执行该收集脚本,这样该上报脚本也无法上报该收集脚本收集的行为数据。
在另一种情况下,浏览器在收集脚本1执行之后,不执行上报脚本1。例如,网页内容中不包括指示收集脚本1收集的行为数据的隐私级别的信息,浏览器在执行了收集脚本1后才获取到收集脚本1收集了不符合用户的隐私要求的行为数据,因此可以不执行上报脚本1,避免上报脚本1上报收集脚本1收集的行为数据。
在一些实施例中,浏览器显示的网页(S204中的第二网页或S205中的调整后的第二网页)符合用户的隐私要求时,浏览器可以不执行S207。其中,浏览器显示的网页符合用户的隐私要求例如包括以下至少一种情况:
浏览器显示的网页不包括第一信息(例如第一信息被隐藏),第一信息用于触发获取不符合用户的隐私要求的行为数据,具体可参见图6的S103中第一网页不包括第一信息的说明;
浏览器显示的网页中第三信息为不可操作的信息,第三信息用于触发获取不符合用户的隐私要求的行为数据,具体可参见图6的S103中第一网页中的第三信息可以是不可操作的信息的说明。
在另一些实施例中,浏览器显示的网页不符合用户的隐私要求时,浏览器可以执行S207,当检测到用于获取不符合用户的隐私要求的行为数据的收集脚本和/或上报脚本被触发时,阻 止被触发的脚本执行,即不执行被触发的脚本。其中,浏览器显示的网页不符合用户的隐私要求例如包括以下任意一种情况:
浏览器显示的网页是包含完整功能且不含额外的提示信息的正常网页;
浏览器显示的网页是包含完整功能且包含提示信息的网页,具体可参见图6的S103中的“第一网页可以包括提示信息”、“电子设备100接收到用户针对第一网页中的第二信息的输入时,显示提示信息”的说明。
在另一些实施例中,浏览器显示的网页符合用户的隐私要求时,浏览器可以执行S207,当检测到用于获取不符合用户的隐私要求的行为数据的收集脚本和/或上报脚本被触发时,阻止被触发的脚本执行,即不执行被触发的脚本。其中,浏览器显示的网页符合用户的隐私要求的示例,可参见上述浏览器显示的网页符合用户的隐私要求的示例。
在一种可能的实现方式中,该方法还包括类似图6的S106-S109的流程,具体可参见图6的S106-S109的说明,其中,第二网页内容可对应第一网页内容,第一网页可对应浏览器显示的网页(即S204中的第二网页或S205中的调整后的第二网页)。
在一些实施例中,S203-S208中所述的用户的隐私要求,可以为第三指示信息指示的隐私要求。在另一些实施例中,S201之后,浏览器可以重新获取用户的隐私要求,也就是说,S203-S208中所述的用户的隐私要求可以不是第三指示信息指示的隐私要求,而是浏览器重新获取的隐私要求。可选地,当第四指示信息指示的隐私级别高于第三指示信息指示的隐私级别时,浏览器可以先根据第二网页内容显示第二网页,并且显示提示信息。浏览器显示上述提示信息时,可以接收用户操作,根据该用户操作重新确定用户的隐私要求,然后执行S203-S208。也就是说,当网页内容提供商返回的网页内容仍然可能触发收集和/或上报不符合用户的隐私要求的行为数据时,电子设备100可以显示提示信息,并根据接收到的用户操作判断是否允许网页收集和上报该行为数据,可以理解为是,在不满足用户预期时,进一步征求用户的同意,以保护用户的隐私安全。
例如,第三指示信息指示的隐私级别为中影响个人数据(例如网页的曝光时间等),第四指示信息指示的隐私级别为高影响个人数据(例如点击行为等)。由于第四指示信息指示的隐私级别高于第三指示信息指示的隐私级别,因此,浏览器可以显示图5A所示的网页510中的提示信息511:“该网页试图收集点击行为等行为,用于推荐”,并且,提示信息511中还显示有允许控件511A和禁止控件511B。当电子设备100接收到用户针对允许控件511A的输入(例如,鼠标左键单击)时,可以确定用户的隐私要求包括用户允许获取高影响个人数据,和第三指示信息指示的隐私要求不同。当电子设备100接收到用户针对禁止控件511B的输入(例如,鼠标左键单击)时,可以确定用户的隐私要求仍然为第三指示信息指示的隐私要求,即不允许获取隐私级别高于中影响个人数据的行为数据。
在图7所示的方法中,可以扩展已有的网络请求(即可以携带第三指示信息),让浏览器在通信过程中向网页内容提供商表明用户的隐私要求。浏览器可以解析网页内容提供商返回的网页内容,根据用户的隐私要求选择是否调整显示的网页,即使网页内容提供商返回的网页内容不符合用户的隐私要求,也可以通过浏览器进一步保证用户的隐私安全。
并且,浏览器可以在网页尝试收集和/或上报用户的行为数据时,检测该行为数据是否符合用户的隐私要求,当该行为数据不满足用户的隐私要求时,可以阻止收集和上报该行为数据,即使浏览器显示的网页仍然可能收集和/或上报不满足用户的隐私要求的行为数据,也可以通过浏览器进一步保证用户的隐私安全。
在一种可能的实现方式中,用户的隐私要求为不允许获取任何行为数据,例如,用户设 置在浏览器的无痕模式下不允许获取任何行为数据,具体流程可参见图8。
图8是本申请实施例提供的又一种网页访问方法的流程示意图。该方法包括但不限于如下步骤:
S300:网页内容提供商使用扩展语言和/或扩展脚本生成网页内容。
S300和图6的S100类似,具体可参见图6的S100的说明。
S301:浏览器确定用户的隐私要求为不允许获取任何行为数据。
在一些实施例中,电子设备100接收到用于设置不允许获取任何行为数据的用户操作时,浏览器确定用户的隐私要求为不允许获取任何行为数据。
例如,用户可以先进入无痕模式,此时电子设备100可以显示表征进入无痕模式的用户界面,该用户界面和图5C所示的用户界面530类似。用户可以将用户界面530中的设置开关534B设置为开启状态,基于该用户设置,浏览器可以确定用户的隐私要求为不允许获取任何行为数据。
例如,用户可以先进入无痕模式,此时电子设备100可以显示表征进入无痕模式的用户界面,该用户界面和图5C所示的用户界面530类似。然后,用户可以打开浏览器的设置界面,即图5B所示的用户界面520,用户可以将用户界面520中的设置开关527B设置为开启状态,基于该用户设置,浏览器可以确定用户的隐私要求为不允许获取任何行为数据。
不限于此,在另一些示例中,电子设备100也可以默认无痕模式下不允许获取任何行为数据,该设置可以是电子设备100预设的,也可以是用户通过电子设备100设置的。
S302:浏览器向网页内容提供商请求获取第一网址对应的网页(携带指示不允许获取任何行为数据的信息)。
S302和图6的S101类似,区别在于,浏览器向网页内容提供商发起请求时,携带的第三指示信息用于指示不允许获取任何行为数据,例如,第三指示信息为X-Allowed-PersonalData-Lvl,且X-Allowed-PersonalData-Lvl的取值为0。
S303:网页内容提供商向浏览器发送第三网页内容。
S303和图6的S102类似,具体可参见图6的S102的说明。
S304:浏览器根据第三网页内容显示第三网页。
在一些实施例中,S304和图6的S103类似,具体可参见图6的S103的说明。在另一些实施例中,S304和图7的S203-S205类似,具体可参见图7的S203-S205的说明。
S305:浏览器执行第三网页中的收集脚本,以收集/生成用户的行为数据。
在一些实施例中,S305为可选的步骤。
在一些实施例中,浏览器显示的第三网页不符合用户的隐私要求时,浏览器可以执行S305。浏览器显示的网页不符合用户的隐私要求例如为:浏览器显示的网页是包含完整功能且不含额外的提示信息的正常网页;或者,浏览器显示的网页是包含完整功能且包含提示信息的网页,具体可参见图6的S103中的“第一网页可以包括提示信息”、“电子设备100接收到用户针对第一网页中的第二信息的输入时,显示提示信息”的说明。
S306:对于不符合用户的隐私要求的行为数据,浏览器不允许收集和/或上报。
在一些实施例中,S306为可选的步骤。
在一些实施例中,用户查看浏览器显示的第三网页的过程中,浏览器可以不执行第三网页中用于收集不符合用户的隐私要求的行为数据的收集脚本,和/或用于上报不符合用户的隐私要求的行为数据的上报脚本,也可理解为是阻止这些收集脚本和上报脚本执行。
在一些实施例中,第三网页中的收集脚本被触发执行时,浏览器可以检查该收集脚本收 集的行为数据是否符合用户的隐私要求(例如,收集的行为数据的隐私级别是否高于用户允许获取的行为数据的隐私级别)。若不符合,浏览器不解释执行该收集脚本。其中,S305和S306的顺序不作限定。
在一些实施例中,第三网页中的上报脚本被触发时,浏览器可以检查该上报脚本上报的行为数据是否符合用户的隐私要求(例如,上报的行为数据的隐私级别是否高于用户允许获取的行为数据的隐私级别)。若不符合,浏览器不解释执行该上报脚本。
其中,S306的示例可参见图7示例的S207的两种执行情况。
在一种可能的实现方式中,该方法还包括类似图6的S106-S109的流程,具体可参见图6的S106-S109的说明,其中,第三网页内容可对应第一网页内容,第一网页可对应第三网页。
不限于图8示例的情况,在另一些示例中,浏览器可以显示提示信息,以提示用户超出允许范围的行为数据会被该网页获取,并根据用户操作判断是否允许第三网页获取不符合用户的隐私要求的行为数据,具体说明和图7中“S201之后,浏览器可以重新获取用户的隐私要求,也就是说,S203-S208中所述的用户的隐私要求可以不是第三指示信息指示的隐私要求,而是浏览器重新获取的隐私要求”的说明类似。例如,虽然第三指示信息指示用户不允许获取任何行为数据,但浏览器显示提示信息后,接收到用户操作,基于该用户操作确定该用户允许第三网页收集和上报点击行为,因此,后续可以执行收集点击行为的收集脚本和上报点击行为的上报脚本。
在图8所示的方法中,用户访问网页时,网页内容提供商无法获取到该用户的任何行为数据,实现了“真正的无痕”,可以满足用户在某些特定场景下的特定需求。
上图6-图8所示的网页访问方法中,浏览器可以替换为运行浏览器的电子设备100,网页内容提供商也可以替换为服务器等网络设备。
本申请实施例通过扩展语言和/或扩展脚本提供了一种保护用户的隐私安全的网页访问方法,让网页内容提供商只能获取到符合用户的隐私要求的行为数据,而不是由网页无差别地获取所有用户的行为数据,有效保护用户的隐私安全。
本申请各实施例提供的方法中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、网络设备、用户设备或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机可以存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,数字视频光盘(digital video disc,DWD)、或者半导体介质(例如,固态硬盘(solid state disk,SSD)等。以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。

Claims (18)

  1. 一种网页访问方法,其特征在于,应用于电子设备,所述方法包括:
    接收第一搜索请求;
    向网络设备发送第一搜索请求,所述第一搜索请求用于请求获取第一网址的网页,所述第一搜索请求包括第一信息,所述第一信息用于指示允许获取的用户行为数据的隐私级别;
    接收所述网络设备响应于所述第一搜索请求消息发送的第一数据;
    根据所述第一数据显示第一网页,所述第一网页显示的数据是符合所述允许获取的用户行为数据的隐私级别的数据。
  2. 如权利要求1所述的方法,其特征在于,所述根据所述第一数据显示第一网页之前,所述方法还包括:
    判断所述第一数据是否为符合所述隐私级别的数据;
    所述根据所述第一数据显示第一网页,包括:
    当所述第一数据为不符合所述隐私级别的数据时,根据所述第一数据和所述允许获取的用户行为数据的隐私级别显示所述第一网页;
    当所述第一数据为符合所述隐私级别的数据时,根据所述第一数据显示所述第一网页。
  3. 如权利要求1或2所述的方法,其特征在于,所述第一网页显示的数据不包括第一脚本,所述第一脚本用于获取第一行为数据,所述第一行为数据不属于所述隐私级别的行为数据。
  4. 如权利要求1或2所述的方法,其特征在于,所述第一网页不包括第一控件,所述第一控件对应的脚本用于获取第二行为数据,所述第二行为数据不属于所述隐私级别的行为数据。
  5. 如权利要求1或2所述的方法,其特征在于,所述方法还包括:
    接收作用于所述第一网页中的第二控件的第一用户操作,所述第二控件对应的脚本用于获取第三行为数据,所述第三行为数据不属于所述隐私级别的行为数据;
    显示第一提示信息,其中:
    所述第一提示信息指示所述第一用户操作执行失败;或,
    所述第一提示信息指示没有收集所述第三行为数据。
  6. 如权利要求1或2所述的方法,其特征在于,所述接收第一搜索请求之前,所述方法还包括:
    接收第二用户操作;
    响应于所述第二用户操作,确定所述允许获取的用户行为数据的隐私级别。
  7. 如权利要求1或2所述的方法,其特征在于,所述根据所述第一数据显示第一网页之后,所述方法还包括:
    关闭所述第一网页;
    接收第二搜索请求;
    向所述网络设备发送所述第二搜索请求,所述第二搜索请求用于请求获取所述第一网址的网页;
    接收所述网络设备响应于所述第二搜索请求发送的第二数据;
    根据所述第二数据显示所述第一网页。
  8. 如权利要求1或2所述的方法,其特征在于,所述第一数据包括第二信息,所述第二信息用于指示所述第一网页获取的用户行为数据的隐私级别。
  9. 一种网页访问方法,其特征在于,应用于电子设备,所述方法包括:
    接收第一搜索请求;
    向网络设备发送第一搜索请求,所述第一搜索请求用于请求获取第一网址的网页,所述第一搜索请求包括第一信息,所述第一信息用于指示允许获取的用户行为数据的隐私级别;
    接收所述网络设备响应于所述第一搜索请求发送的第一数据;
    根据所述第一数据显示第一网页,所述第一网页包括第一提示信息,所述第一提示信息指示所述第一网页会收集第一行为数据,所述第一行为数据不属于所述隐私级别的用户行为数据。
  10. 如权利要求9所述的方法,其特征在于,所述第一数据包括第一脚本,所述第一脚本用于获取所述第一行为数据。
  11. 如权利要求9所述的方法,其特征在于,所述根据所述第一数据显示第一网页之前,所述方法还包括:
    判断所述第一数据是否为符合所述隐私级别的数据;
    所述根据所述第一数据显示第一网页,包括:
    当所述第一数据为不符合所述隐私级别的数据时,根据所述第一数据和所述允许获取的用户行为数据的隐私级别显示所述第一网页;
    所述方法还包括:
    当所述第一数据为符合所述隐私级别的数据时,根据所述第一数据显示所述第一网页。
  12. 如权利要求9-11任一项所述的方法,其特征在于,所述方法还包括:
    接收作用于所述第一网页中的第一控件的第一用户操作,所述第一控件对应的脚本用于获取第二行为数据,所述第二行为数据不属于所述隐私级别的行为数据;
    显示第二提示信息,其中:
    所述第二提示信息指示所述第一用户操作执行失败;或,
    所述第二提示信息指示没有收集所述第二行为数据。
  13. 如权利要求9-11任一项所述的方法,其特征在于,所述方法还包括:
    显示所述第一网页时,接收第二用户操作;
    响应于所述第二用户操作,确定允许所述第一网页获取所述第一行为数据;
    接收第一指令,所述第一指令指示所述第一网页中的第一脚本被触发,所述第一脚本用于获取所述第一行为数据;
    生成所述第一行为数据,并向所述网络设备发送所述第一行为数据。
  14. 如权利要求9-11任一项所述的方法,其特征在于,所述接收第一搜索请求之前,所述方法还包括:
    接收第三用户操作;
    响应于所述第三用户操作,确定所述允许获取的用户行为数据的隐私级别。
  15. 如权利要求9-11任一项所述的方法,其特征在于,所述根据所述第一数据显示第一网页之后,所述方法还包括:
    关闭所述第一网页;
    接收第二搜索请求;
    向所述网络设备发送所述第二搜索请求,所述第二搜索请求用于请求获取所述第一网址的网页;
    接收所述网络设备响应于所述第二搜索请求发送的第二数据;
    根据所述第二数据显示所述第一网页。
  16. 如权利要求9-11任一项所述的方法,其特征在于,所述第一数据包括第二信息,所述第二信息用于指示所述第一网页获取的用户行为数据的隐私级别。
  17. 一种电子设备,其特征在于,包括收发器、处理器和存储器,所述存储器用于存储计算机程序,所述处理器调用所述计算机程序,用于执行如权利要求1-16任一项所述的方法。
  18. 一种计算机存储介质,其特征在于,所述计算机存储介质存储有计算机程序,所述计算机程序被处理器执行时,实现权利要求1-16任一项所述的方法。
PCT/CN2023/084843 2022-03-31 2023-03-29 网页访问方法及电子设备 WO2023185953A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210334014.1A CN116932865A (zh) 2022-03-31 2022-03-31 网页访问方法及电子设备
CN202210334014.1 2022-03-31

Publications (1)

Publication Number Publication Date
WO2023185953A1 true WO2023185953A1 (zh) 2023-10-05

Family

ID=88199344

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/084843 WO2023185953A1 (zh) 2022-03-31 2023-03-29 网页访问方法及电子设备

Country Status (2)

Country Link
CN (1) CN116932865A (zh)
WO (1) WO2023185953A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140259158A1 (en) * 2013-03-11 2014-09-11 Bank Of America Corporation Risk Ranking Referential Links in Electronic Messages
CN105490993A (zh) * 2014-09-19 2016-04-13 腾讯科技(深圳)有限公司 在浏览器中防止Cookie跟踪的方法和装置
CN110826098A (zh) * 2019-10-30 2020-02-21 维沃移动通信有限公司 一种信息处理方法及电子设备
US20210160215A1 (en) * 2019-11-27 2021-05-27 Jpmorgan Chase Bank, N.A. Systems and methods for providing pre-emptive intercept warnings for online privacy or security

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140259158A1 (en) * 2013-03-11 2014-09-11 Bank Of America Corporation Risk Ranking Referential Links in Electronic Messages
CN105490993A (zh) * 2014-09-19 2016-04-13 腾讯科技(深圳)有限公司 在浏览器中防止Cookie跟踪的方法和装置
CN110826098A (zh) * 2019-10-30 2020-02-21 维沃移动通信有限公司 一种信息处理方法及电子设备
US20210160215A1 (en) * 2019-11-27 2021-05-27 Jpmorgan Chase Bank, N.A. Systems and methods for providing pre-emptive intercept warnings for online privacy or security

Also Published As

Publication number Publication date
CN116932865A (zh) 2023-10-24

Similar Documents

Publication Publication Date Title
KR102470275B1 (ko) 음성 제어 방법 및 전자 장치
CN109814766B (zh) 一种应用显示方法及电子设备
WO2021063343A1 (zh) 语音交互方法及装置
EP3893129A1 (en) Recommendation method based on user exercise state, and electronic device
WO2020134869A1 (zh) 电子设备的操作方法和电子设备
WO2021213164A1 (zh) 应用界面交互方法、电子设备和计算机可读存储介质
JP7348289B2 (ja) アプリケーション許可を管理する方法及び電子デバイス
WO2022068819A1 (zh) 一种界面显示方法及相关装置
WO2021253975A1 (zh) 应用程序的权限管理方法、装置和电子设备
WO2020107463A1 (zh) 一种电子设备的控制方法及电子设备
WO2022100222A1 (zh) 信息检索方法、装置、系统及存储介质
WO2021042991A1 (zh) 一种非侵入式交互方法及电子设备
WO2021104122A1 (zh) 呼叫需求响应方法、装置及电子设备
US20210385187A1 (en) Method and device for performing domain name resolution by sending key value to grs server
WO2021169370A1 (zh) 服务元素的跨设备分配方法、终端设备及存储介质
WO2022253158A1 (zh) 一种用户隐私保护方法及装置
WO2023273543A1 (zh) 一种文件夹管理方法及装置
WO2022160991A1 (zh) 权限控制方法和电子设备
EP4228233A1 (en) Method for adding operation sequence, electronic device, and system
WO2022222688A1 (zh) 一种窗口控制方法及其设备
WO2023185953A1 (zh) 网页访问方法及电子设备
WO2022100141A1 (zh) 插件管理方法、系统及装置
WO2022033355A1 (zh) 一种邮件处理方法及电子设备
CN112286596A (zh) 消息显示方法及电子设备
WO2024037360A1 (zh) 隐私保护方法及相关设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23778318

Country of ref document: EP

Kind code of ref document: A1