WO2024125020A1 - Data processing method, data sending method, electronic device, and storage medium - Google Patents

Data processing method, data sending method, electronic device, and storage medium Download PDF

Info

Publication number
WO2024125020A1
WO2024125020A1 PCT/CN2023/120041 CN2023120041W WO2024125020A1 WO 2024125020 A1 WO2024125020 A1 WO 2024125020A1 CN 2023120041 W CN2023120041 W CN 2023120041W WO 2024125020 A1 WO2024125020 A1 WO 2024125020A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
processed
privacy
processing
file
Prior art date
Application number
PCT/CN2023/120041
Other languages
French (fr)
Chinese (zh)
Inventor
潘万鹏
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024125020A1 publication Critical patent/WO2024125020A1/en

Links

Definitions

  • the present disclosure relates to the field of information security, and in particular to a data processing method, a data sending method, an electronic device, and a computer-readable storage medium.
  • a data processing method comprising: in response to a data selection instruction, providing at least one privacy processing strategy for data to be processed, wherein the data to be processed is the data corresponding to the data selection instruction; and when it is determined that privacy processing needs to be performed on the data to be processed, processing the data to be processed according to the selected privacy processing strategy to obtain processed data.
  • a data sending method comprising: receiving a data selection instruction; obtaining data to be sent according to the data processing method provided in the first aspect of the present disclosure; and sending the data to be sent.
  • an electronic device comprising: one or more processors; a memory on which one or more computer programs are stored, wherein the one or more computer programs are executed by the one or more processors so that the one or more A processor implements the above method provided by the present disclosure.
  • a computer-readable storage medium on which a computer program is stored.
  • the computer program is executed by a processor, so that the processor implements the above method provided by the present disclosure.
  • FIG1 is a flow chart of an implementation of a data processing method provided by the present disclosure
  • FIG2 is a flow chart of another embodiment of the data processing method provided by the present disclosure.
  • FIG3 is a partial flow chart of another embodiment of the data processing method provided by the present disclosure.
  • FIG4 is a flow chart of another embodiment of the data processing method provided by the present disclosure.
  • FIG5 is a schematic diagram of an implementation of a privacy policy list
  • FIG6 is a flow chart of an implementation of a data sending method provided by the present disclosure.
  • FIG7 is a schematic diagram of an embodiment of an electronic device provided by the present disclosure.
  • FIG8 is a schematic diagram of a computer-readable storage medium provided by the present disclosure.
  • FIG. 9 is a schematic diagram of modules of a terminal provided by the present disclosure.
  • the data processing method includes the following steps S110 to S120 .
  • step S110 in response to the data selection instruction, at least one privacy processing policy for the data to be processed is provided, wherein the data to be processed is the data corresponding to the data selection instruction.
  • step S120 if it is determined that the data to be processed needs to be privacy processed, the data to be processed is processed according to the selected privacy processing strategy to obtain processed data.
  • the data processing method when it is identified that the data is selected, at least one privacy processing strategy is actively provided to the user. If it is determined that privacy processing is required, the data to be processed is processed according to the privacy processing strategy to obtain processed data, and the processed data can be sent to the data recipient as the data to be sent.
  • the transmitted data has been privacy processed, reducing the risk of user privacy leakage.
  • the data processing method may include the following steps between step S110 and step S120: receiving a privacy-related instruction inputted through an input module; parsing the privacy-related instruction; and determining whether to perform privacy processing on the data to be processed according to the parsing result. Process data for privacy protection.
  • the user actively selects the need to perform privacy processing on the data to be processed and actively selects a privacy processing strategy. For example, when the user issues a data selection instruction, a configuration page for the privacy processing strategy is triggered and displayed. The user can select the privacy processing strategy and generate a selection instruction through an input module of the electronic device (for example, a keyboard, a mouse, a touch screen). For the electronic device executing the data processing method, after receiving the selection instruction generated by the user through the input module, it is determined that "it is determined that the data to be processed needs to be privacy processed".
  • the electronic device executing the data processing method identifies the data corresponding to the data selection instruction and determines whether privacy processing is required based on the identification result. For example, when the recognition result shows that the data to be processed carries privacy data, it is determined that the data to be processed needs to be privacy processed; at this time, the user does not need to select a privacy processing strategy; as another implementation method, the user can actively choose to perform privacy processing on the data to be processed, that is, the user first actively configures the privacy processing policy page (for example, enters a privacy processing instruction), and then when the user performs a data selection instruction, the electronic device selects a privacy processing strategy that matches the data according to the recognition result of the data. For example, the user can enter a privacy processing instruction through the electronic device, and as long as the electronic device recognizes the privacy processing instruction, it determines that the data to be processed needs to be privacy processed.
  • step S110 if no instruction of "no need to perform privacy processing on the data to be processed" is received within a predetermined time period, it is determined that "privacy processing is required for the data to be processed".
  • the predetermined time period may be between 2 seconds and 5 seconds.
  • "data" may be a file. Therefore, the data to be processed may be a file to be processed.
  • the types of user privacy carried in different types of files are different.
  • the user privacy carried in an audio file may be voiceprint information
  • the user privacy carried in an image file may be location information, biometric information (e.g., iris information, fingerprint information, etc.)
  • the user privacy carried in a video file may be location information, biometric information (e.g., iris information, voiceprint information, fingerprint information, etc.).
  • the privacy processing strategy is selected from at least one of the following privacy processing strategies: corresponding privacy processing policies; privacy processing policies corresponding to audio files; privacy processing policies corresponding to video files; and privacy processing policies corresponding to text files.
  • the privacy processing strategy corresponding to the image file includes hiding the location information and/or biometric information carried by the image; the privacy processing strategy corresponding to the audio file includes hiding the voiceprint information in the audio; the privacy processing strategy corresponding to the video file includes hiding the location information and/or biometric information in the video; the privacy processing strategy corresponding to the text file includes hiding the personal information in the text.
  • the personal information in the text information can be contact information (for example, mobile phone number, email address, ID number).
  • the electronic device executing the data processing method can automatically match the corresponding privacy processing strategy for the data corresponding to the data selection instruction.
  • the method before processing the data corresponding to the data selection instruction according to the selected privacy processing strategy, the method can also include the following steps S112 to S114.
  • step S112 the type of the data to be processed is identified.
  • step S114 the privacy processing policy corresponding to the identified type is used as the selected privacy processing policy.
  • the privacy processing policy corresponding to the picture is used as the selected privacy processing policy.
  • the location information and/or biometrics in the picture may be hidden.
  • the location information and/or biometrics may be coded.
  • the privacy processing policy corresponding to the audio file is used as the selected privacy processing policy.
  • the voiceprint information in the audio file can be hidden.
  • the voice in the audio can be processed by pitch change.
  • the privacy processing policy corresponding to the video file is used as the selected privacy processing policy.
  • the location information and/or biometric information in the video can be hidden.
  • the voice in the video can be changed in pitch, and the face in the video can be coded.
  • the privacy processing policy corresponding to the text file is used as the selected privacy processing policy.
  • the personal information in the text file can be hidden.
  • the personal information in the text file can be deleted or replaced with other characters (for example, X or *).
  • the data to be processed is processed according to the selected privacy processing strategy, including: when there are multiple numbers appearing continuously in the text file and the multiple numbers appearing continuously meet a predetermined format, replacing at least a part of the multiple numbers appearing continuously with specific characters; or deleting at least a part of the multiple numbers appearing continuously; and when there is text in the form of @ character plus website domain name in the text file, replacing at least a part of the characters before the @ character with specific characters; or deleting at least a part of the characters before the @ character.
  • the predetermined format may be any one or more of the following formats: landline number format, mobile phone number format, ID card number format.
  • the specific character may be “X” or “*”, etc., but the present disclosure is not limited thereto.
  • the data to be processed is processed according to the selected privacy processing strategy, including: determining whether there are multiple numbers appearing consecutively in the text; if there are multiple numbers appearing consecutively in the text, determining whether the multiple numbers appearing consecutively satisfy a predetermined format; and if the multiple numbers appearing consecutively satisfy the predetermined format, deleting at least a part of the multiple numbers appearing consecutively.
  • the processing of the data to be processed according to the selected privacy processing strategy includes: determining whether there is text in the form of the @ character plus the website domain name in the text; and when there is text in the form of the @ character plus the website domain name in the text, replacing at least a part of the characters before the @ character with specific characters.
  • the text contains the @ character plus the website domain name, it means that there is an email address in the text.
  • the above processing method can hide the email address in the text.
  • the user can set the information to be hidden.
  • the information to be hidden is matched in the text, the information can be directly hidden.
  • processing the data to be processed according to the selected privacy processing strategy includes: adding a predetermined background noise to the audio file to change the voiceprint information of the audio file.
  • the privacy processing strategy corresponding to the picture file includes hiding the location information carried by the picture file.
  • electronic devices with camera functions usually have positioning functions, so the pictures taken often carry the location information of the area where the electronic device is located.
  • the processing of the data to be processed according to the selected privacy processing strategy includes: extracting the location information carried in the picture file; and deleting the location information.
  • the location information may be longitude and latitude information
  • the electronic device can obtain the specific address of the image by matching the longitude and latitude information with some navigation software or map software.
  • the processing of the data to be processed according to the selected privacy processing strategy includes: extracting the longitude and latitude information carried in the image; and deleting the longitude and latitude information.
  • the image file may also carry biometric information.
  • processing the data to be processed according to the selected privacy processing strategy also includes: identifying the biometric information carried in the image file; and modifying the biometric information.
  • the biometric information may be blurred, coded, or watermarked.
  • the privacy processing strategy corresponding to the video includes hiding the location information and/or biometric information in the video file.
  • processing the data to be processed according to the selected privacy processing strategy includes: deleting the location information in the video file; and/or modifying the biometric information in the video file.
  • providing at least one privacy processing strategy for the data to be processed includes the following steps S121 to S123.
  • step S121 multiple privacy processing strategies are displayed.
  • step S122 a policy selection instruction is received.
  • step S123 the privacy processing policy corresponding to the policy selection instruction is used as the selected privacy processing policy.
  • a “policy selection instruction” is an instruction given by a user via an input device (eg, keyboard, mouse, touch screen).
  • the privacy processing policies can be displayed in the form of a list.
  • the above list can be displayed on the display screen of the electronic device, as shown in FIG5.
  • the list can be marked with "incognito mode", which means that if the user selects incognito mode, the selected files will be privacy processed.
  • the privacy processing policy can be issued by a server.
  • the privacy processing policy can be configured by a user. That is, as shown in FIG4 , before providing at least one privacy processing policy for the data to be processed in response to the data selection instruction, the method further includes the following step S102.
  • step S102 a plurality of privacy processing policies corresponding to a plurality of file types are preconfigured.
  • whether to perform privacy processing on the data to be processed can be determined by the user.
  • the data processing method further includes the following step S130.
  • step S130 the processed data is used as data to be sent.
  • the data processing method further includes the following step S140.
  • step S140 when it is determined that the data to be processed does not need to be privacy processed, the data corresponding to the data selection instruction is used as the data to be sent.
  • the original data (or original file) carrying private information is still as an embodiment, when data is sent, it needs to be stored in the electronic device and privacy processing is required.
  • a data sending method is provided. As shown in FIG. 6 , the data sending method includes the following steps S210 to S230 .
  • step S210 a data selection instruction is received.
  • step S220 the data to be sent is obtained according to the data processing method provided in the first aspect of the present disclosure.
  • step S230 the data to be sent is sent.
  • the data processed according to the selected privacy processing policy will be used as the data to be sent. If the user determines that the data to be processed does not need to be processed for privacy processing, the data to be processed will be sent directly.
  • At least one privacy processing strategy is actively provided to the user. If it is determined that privacy processing is required, the data to be processed is processed according to the privacy processing strategy to obtain processed data, and the processed data can be sent to the data recipient as the data to be sent.
  • the transmitted data has been privacy processed, reducing the risk of user privacy leakage.
  • an electronic device as shown in FIG7 , and the electronic device includes: one or more processors 101; a memory 102 on which one or more computer programs are stored, and the one or more computer programs are executed by the one or more processors, so that the one or more processors 101 implement the data processing method provided in the first aspect of the present disclosure and/or the data sending method provided in the second aspect of the present disclosure.
  • the electronic device may further include one or more I/O interfaces 103 connected between the processor and the memory and configured to implement information exchange between the processor and the memory.
  • the processor 101 is a device with data processing capabilities, including but not limited to a central processing unit (CPU), etc.
  • the memory 102 is a device with data storage capabilities, including but not limited to a random access memory (RAM, more specifically SDRAM, DDR, etc.), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), Flash memory (FLASH);
  • I/O interface (read-write interface) 103 is connected between the processor 101 and the memory 102, and can realize information interaction between the processor 101 and the memory 102, which includes but is not limited to a data bus (Bus) and the like.
  • Buss data bus
  • the processor 101 , the memory 102 , and the I/O interface 103 are connected to each other via a bus 104 , and further connected to other components of the computing device.
  • the electronic device may be any one of a mobile phone, a desktop computer, a tablet computer, and a laptop computer.
  • a computer-readable storage medium is provided, on which a computer program is stored, and the computer program is executed by a processor so that the processor implements the data processing method provided in the first aspect of the present disclosure and/or the data sending method provided in the second aspect of the present disclosure.
  • a terminal device As a fifth aspect of the present disclosure, a terminal device is provided. As shown in FIG. 9 , the terminal device includes a privacy protection main control module 510 , a privacy protection resource management submodule 520 , and a policy execution submodule 530 .
  • the privacy protection main control module 510 is configured to receive user instructions and send the user instructions to the privacy protection resource management submodule 520 .
  • the privacy protection resource management submodule 520 is configured to provide at least one privacy processing strategy for the data to be processed when it is determined that the user instruction is a data selection instruction.
  • the policy execution submodule 530 is configured to, when it is determined that the data to be processed needs to be privacy processed, process the data to be processed according to the selected privacy processing policy to obtain processed data.
  • the terminal device may further include a privacy protection policy configuration submodule 540, which is configured to configure corresponding privacy protection policies according to multiple data types.
  • the privacy protection main control module 510 provides a unified encapsulation interface to facilitate the privacy protection resource management submodule 520, the policy execution submodule 530, and the privacy protection policy configuration submodule 540 to complete the function of hiding user personal information.
  • modules/units in the above disclosed methods may be implemented as software, firmware, hardware, or a suitable combination thereof.
  • the division between modules/units does not necessarily correspond to the division of physical components; for example, a physical component may have multiple functions, or a function or step may be performed by several physical components in cooperation.
  • Some or all physical components may be implemented as software executed by a processor (such as a central processing unit, a digital signal processor, or a microprocessor), or implemented as hardware, or implemented as an integrated circuit, such as an application-specific integrated circuit.
  • a processor such as a central processing unit, a digital signal processor, or a microprocessor
  • Such software may be distributed on a computer-readable medium, which may include a computer storage medium (or non-transitory medium) and a communication medium (or temporary medium).
  • computer storage medium includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules, or other data).
  • Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cassettes, magnetic tapes, disk storage or other magnetic storage devices, or any other medium that can be used to store desired information and can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media.

Landscapes

  • Storage Device Security (AREA)

Abstract

The present disclosure provides a data processing method, comprising: in response to a data selection instruction, providing at least one privacy processing policy for data to be processed, wherein said data is data corresponding to the data selection instruction; and if it is determined that said data needs to undergo privacy processing, processing said data according to a selected privacy processing policy to obtain processed data. The present disclosure further provides a data sending method, an electronic device, and a computer readable storage medium.

Description

数据处理方法、数据发送方法、电子设备及存储介质Data processing method, data sending method, electronic device and storage medium
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请要求于2022年12月12日提交的中国专利申请NO.202211590624.4的优先权,该中国专利申请的内容通过引用的方式整体合并于此。This application claims priority to Chinese patent application No. 202211590624.4 filed on December 12, 2022, the contents of which are incorporated herein by reference in their entirety.
技术领域Technical Field
本公开涉及信息安全领域,具体涉及数据处理方法、数据发送方法、电子设备及计算机可读存储介质。The present disclosure relates to the field of information security, and in particular to a data processing method, a data sending method, an electronic device, and a computer-readable storage medium.
背景技术Background technique
随着互联网技术的发展,网上购物、网络聊天、发送电子邮件等已经是人们日常生活的一部分。随之而来的个人信息的泄露,也成为影响人们生活的一个重要问题。With the development of Internet technology, online shopping, online chatting, sending emails, etc. have become part of people's daily life. The leakage of personal information has also become an important issue affecting people's lives.
发明内容Summary of the invention
作为本公开的第一个方面,提供一种数据处理方法,包括:响应于数据选择指令,提供针对待处理数据的至少一个隐私处理策略,其中,所述待处理数据为所述数据选择指令所对应的数据;以及确定需要对所述待处理数据进行隐私处理,则根据被选定的隐私处理策略对所述待处理数据进行处理,得到处理后数据。As a first aspect of the present disclosure, a data processing method is provided, comprising: in response to a data selection instruction, providing at least one privacy processing strategy for data to be processed, wherein the data to be processed is the data corresponding to the data selection instruction; and when it is determined that privacy processing needs to be performed on the data to be processed, processing the data to be processed according to the selected privacy processing strategy to obtain processed data.
作为本公开的第二个方面,提供一种数据发送方法,包括:接收数据选择指令;根据本公开第一个方面所提供的数据处理方法获得待发送数据;发送所述待发送数据。As a second aspect of the present disclosure, a data sending method is provided, comprising: receiving a data selection instruction; obtaining data to be sent according to the data processing method provided in the first aspect of the present disclosure; and sending the data to be sent.
作为本公开的第三个方面,提供一种电子设备,包括:一个或多个处理器;存储器,其上存储有一个或多个计算机程序,所述一个或多个计算机程序被所述一个或多个处理器执行,使得所述一个或多 个处理器实现本公开所提供的上述方法。As a third aspect of the present disclosure, an electronic device is provided, comprising: one or more processors; a memory on which one or more computer programs are stored, wherein the one or more computer programs are executed by the one or more processors so that the one or more A processor implements the above method provided by the present disclosure.
作为本公开的第四个方面,提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行,使得所述处理器实现本公开所提供的上述方法。As a fourth aspect of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored. The computer program is executed by a processor, so that the processor implements the above method provided by the present disclosure.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是本公开所提供的数据处理方法的一种实施方式的流程示意图;FIG1 is a flow chart of an implementation of a data processing method provided by the present disclosure;
图2是本公开所提供的数据处理方法的另一种实施方式的流程示意图;FIG2 is a flow chart of another embodiment of the data processing method provided by the present disclosure;
图3是本公开所提供的数据处理方法的另一种实施方式的部分流程示意图;FIG3 is a partial flow chart of another embodiment of the data processing method provided by the present disclosure;
图4是本公开所提供的数据处理方法的另一种实施方式的流程示意图;FIG4 is a flow chart of another embodiment of the data processing method provided by the present disclosure;
图5是隐私策略列表的一种实施方式的示意图;FIG5 is a schematic diagram of an implementation of a privacy policy list;
图6是本公开所提供的数据发送方法的一种实施方式的流程图;FIG6 is a flow chart of an implementation of a data sending method provided by the present disclosure;
图7是本公开所提供的电子设备的一种实施方式的示意图;FIG7 is a schematic diagram of an embodiment of an electronic device provided by the present disclosure;
图8是本公开所提供的计算机可读存储介质的示意图;以及FIG8 is a schematic diagram of a computer-readable storage medium provided by the present disclosure; and
图9是本公开所提供的终端的模块示意图。FIG. 9 is a schematic diagram of modules of a terminal provided by the present disclosure.
具体实施方式Detailed ways
为使本领域的技术人员更好地理解本公开的技术方案,下面结合附图对本公开提供的数据处理方法、数据发送方法、电子设备、计算机可读存储介质进行详细描述。In order to enable those skilled in the art to better understand the technical solution of the present disclosure, the data processing method, data sending method, electronic device, and computer-readable storage medium provided by the present disclosure are described in detail below in conjunction with the accompanying drawings.
在下文中将参考附图更充分地描述示例实施例,但是所述示例实施例可以以不同形式来体现且不应当被解释为限于本文阐述的实施例。提供这些实施例的目的在于使本公开更加透彻和完整,并将使本领域技术人员充分理解本公开的范围。The exemplary embodiments will be described more fully below with reference to the accompanying drawings, but the exemplary embodiments may be embodied in different forms and should not be construed as being limited to the embodiments set forth herein. The purpose of providing these embodiments is to make the present disclosure more thorough and complete, and to enable those skilled in the art to fully understand the scope of the present disclosure.
在不冲突的情况下,本公开各实施例及实施例中的各特征可相互组合。 In the absence of conflict, the various embodiments of the present disclosure and the various features therein may be combined with each other.
如本文所使用的,术语“和/或”包括一个或多个相关列举条目的任何和所有组合。As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
本文所使用的术语仅用于描述特定实施例,且不意欲限制本公开。如本文所使用的,单数形式“一个”和“该”也意欲包括复数形式,除非上下文另外清楚指出。还将理解的是,当本说明书中使用术语“包括”和/或“由……制成”时,指定存在所述特征、整体、步骤、操作、元件和/或组件,但不排除存在或添加一个或多个其它特征、整体、步骤、操作、元件、组件和/或其群组。The terms used herein are only used to describe specific embodiments and are not intended to limit the present disclosure. As used herein, the singular forms "a", "an" and "the" are also intended to include the plural forms, unless the context clearly indicates otherwise. It will also be understood that when the terms "comprising" and/or "made of" are used in this specification, the presence of the features, wholes, steps, operations, elements and/or components is specified, but the presence or addition of one or more other features, wholes, steps, operations, elements, components and/or groups thereof is not excluded.
除非另外限定,否则本文所用的所有术语(包括技术和科学术语)的含义与本领域普通技术人员通常理解的含义相同。还将理解,诸如那些在常用字典中限定的那些术语应当被解释为具有与其在相关技术以及本公开的背景下的含义一致的含义,且将不解释为具有理想化或过度形式上的含义,除非本文明确如此限定。Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by those of ordinary skill in the art. It will also be understood that terms such as those defined in commonly used dictionaries should be interpreted as having a meaning consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted as having an idealized or overly formal meaning unless explicitly defined as such herein.
作为本公开的第一个方面,提供一种数据处理方法,如图1所示,所述数据处理方法包括如下步骤S110至S120。As a first aspect of the present disclosure, a data processing method is provided. As shown in FIG. 1 , the data processing method includes the following steps S110 to S120 .
在步骤S110中,响应于数据选择指令,提供针对待处理数据的至少一个隐私处理策略,其中,所述待处理数据为所述数据选择指令所对应的数据。In step S110, in response to the data selection instruction, at least one privacy processing policy for the data to be processed is provided, wherein the data to be processed is the data corresponding to the data selection instruction.
在步骤S120中,确定需要对所述待处理数据进行隐私处理,则根据被选定的隐私处理策略对所述待处理数据进行处理,得到处理后数据。In step S120, if it is determined that the data to be processed needs to be privacy processed, the data to be processed is processed according to the selected privacy processing strategy to obtain processed data.
在本公开所提供的数据处理方法中,当识别到数据被选择后,主动向用户提供至少一个隐私处理策略。如果确定需要进行隐私处理,则根据隐私处理策略对待处理数据进行处理,得到处理后的数据,可以将该处理后的数据作为待发送的数据发送给数据接收者。被传输的数据已经经过了隐私处理,降低了用户隐私泄露的风险。In the data processing method provided by the present disclosure, when it is identified that the data is selected, at least one privacy processing strategy is actively provided to the user. If it is determined that privacy processing is required, the data to be processed is processed according to the privacy processing strategy to obtain processed data, and the processed data can be sent to the data recipient as the data to be sent. The transmitted data has been privacy processed, reducing the risk of user privacy leakage.
在本公开中,对如何确定是否进行隐私处理不做特殊的确定。在一些实施例中,所述数据处理方法可以包括在步骤S 110和步骤S120之间进行的:接收通过输入模块输入的隐私相关指令;对所述隐私相关指令进行解析;以及根据解析结果确定是否需要对所述待处 理数据进行隐私处理。In the present disclosure, no special determination is made on how to determine whether to perform privacy processing. In some embodiments, the data processing method may include the following steps between step S110 and step S120: receiving a privacy-related instruction inputted through an input module; parsing the privacy-related instruction; and determining whether to perform privacy processing on the data to be processed according to the parsing result. Process data for privacy protection.
作为一种可选实施方式,用户主动选择需要对待处理数据进行隐私处理,并主动选择隐私处理策略,例如,当用户进行数据选择指令时,触发显示隐私处理策略的配置页面,用户可以通过电子设备的输入模块(例如,键盘、鼠标、触摸屏)选择隐私处理策略并生成选择指令,对于执行所述数据处理方法的电子设备而言,接收到用户通过输入模块生成的选择指令后,则判定为“确定需要对所述待处理数据进行隐私处理”;作为另一种可选实施方式,当用户进行数据选择指令时,执行数据处理方法的电子设备对该数据选择指令所对应的数据进行识别,根据识别结果确定是否需要进行隐私处理、并自动选择一个与待处理数据相匹配的隐私处理策略,例如,当识别结果表明待处理数据中携带有隐私数据时,则判定需要对待处理数据进行隐私处理;此时无需用户进行隐私处理策略的选择;作为另一种实施方式,可以由用户主动选择需要对待处理数据进行隐私处理,即,用户首先主动配置隐私处理策略页面(例如,输入隐私处理指令),然后当用户进行数据选择指令时,由电子设备来根据对数据的识别结果选择与之相匹配的隐私处理策略,例如,用户可以通过电子设备输入隐私处理指令,只要电子设备识别到该隐私处理指令,就判定需要对待处理数据进行隐私处理。As an optional implementation, the user actively selects the need to perform privacy processing on the data to be processed and actively selects a privacy processing strategy. For example, when the user issues a data selection instruction, a configuration page for the privacy processing strategy is triggered and displayed. The user can select the privacy processing strategy and generate a selection instruction through an input module of the electronic device (for example, a keyboard, a mouse, a touch screen). For the electronic device executing the data processing method, after receiving the selection instruction generated by the user through the input module, it is determined that "it is determined that the data to be processed needs to be privacy processed". As another optional implementation, when the user issues a data selection instruction, the electronic device executing the data processing method identifies the data corresponding to the data selection instruction and determines whether privacy processing is required based on the identification result. For example, when the recognition result shows that the data to be processed carries privacy data, it is determined that the data to be processed needs to be privacy processed; at this time, the user does not need to select a privacy processing strategy; as another implementation method, the user can actively choose to perform privacy processing on the data to be processed, that is, the user first actively configures the privacy processing policy page (for example, enters a privacy processing instruction), and then when the user performs a data selection instruction, the electronic device selects a privacy processing strategy that matches the data according to the recognition result of the data. For example, the user can enter a privacy processing instruction through the electronic device, and as long as the electronic device recognizes the privacy processing instruction, it determines that the data to be processed needs to be privacy processed.
作为另一种可选实施方式,在步骤S110之后,预定时间段内没有收到“不需要对待处理数据进行隐私处理”的指令,则判定为“需要对所述待处理数据进行隐私处理”。As another optional implementation, after step S110, if no instruction of "no need to perform privacy processing on the data to be processed" is received within a predetermined time period, it is determined that "privacy processing is required for the data to be processed".
所述预定时间段可以为2秒至5秒之间。The predetermined time period may be between 2 seconds and 5 seconds.
作为一种可选实施方式,“数据”可以是文件。因此,所述待处理数据可以为待处理文件。不同类型的文件中所携带的用户隐私的类型不同。例如,音频文件中携带的用户隐私可能是声纹信息;图片文件中携带的用户隐私可能是位置信息、生物识别信息(例如,虹膜信息、指纹信息等);视频文件中携带的用户隐私可能是位置信息、生物识别信息(例如,虹膜信息、声纹信息、指纹信息等)。相应地,所述隐私处理策略选自以下隐私处理策略中的至少一者:与图片文件 相对应的隐私处理策略;与音频文件相对应的隐私处理策略;与视频文件对应的隐私处理策略;以及与文本文件对应的隐私处理策略。As an optional implementation, "data" may be a file. Therefore, the data to be processed may be a file to be processed. The types of user privacy carried in different types of files are different. For example, the user privacy carried in an audio file may be voiceprint information; the user privacy carried in an image file may be location information, biometric information (e.g., iris information, fingerprint information, etc.); the user privacy carried in a video file may be location information, biometric information (e.g., iris information, voiceprint information, fingerprint information, etc.). Accordingly, the privacy processing strategy is selected from at least one of the following privacy processing strategies: corresponding privacy processing policies; privacy processing policies corresponding to audio files; privacy processing policies corresponding to video files; and privacy processing policies corresponding to text files.
所述与图片文件相对应的隐私处理策略包括隐藏所述图片所携带的位置信息和/或生物识别信息;所述与音频文件相对应的隐私处理策略包括隐藏所述音频中的声纹信息;所述与视频文件对应的隐私处理策略包括隐藏所述视频中的位置信息和/或生物识别信息;所述与文本文件对应的隐私处理策略包括隐藏所述文本中的个人信息。作为一种可选实施方式,文本信息中的个人信息可以是联系方式(例如,手机号码、邮箱地址、身份证号码)。The privacy processing strategy corresponding to the image file includes hiding the location information and/or biometric information carried by the image; the privacy processing strategy corresponding to the audio file includes hiding the voiceprint information in the audio; the privacy processing strategy corresponding to the video file includes hiding the location information and/or biometric information in the video; the privacy processing strategy corresponding to the text file includes hiding the personal information in the text. As an optional implementation, the personal information in the text information can be contact information (for example, mobile phone number, email address, ID number).
如上文中所述,可以由执行所述数据处理方法的电子设备为数据选择指令所对应的数据,自动匹配相应的隐私处理策略。如图2所示,在所述根据被选定的隐私处理策略对所述数据选择指令所对应的数据进行处理之前,所述方法还可以包括如下步骤S112至S114。As described above, the electronic device executing the data processing method can automatically match the corresponding privacy processing strategy for the data corresponding to the data selection instruction. As shown in FIG2 , before processing the data corresponding to the data selection instruction according to the selected privacy processing strategy, the method can also include the following steps S112 to S114.
在步骤S112中,识别所述待处理数据的类型。In step S112, the type of the data to be processed is identified.
在步骤S114中,将与识别出的类型相对应的隐私处理策略作为所述被选定的隐私处理策略。In step S114, the privacy processing policy corresponding to the identified type is used as the selected privacy processing policy.
例如,当识别出所述待处理文件为图片时,将图片相对应的隐私处理策略作为所述被选定的隐私处理策略。在步骤S120中,可以将图片中的位置信息和/或生物识别进行隐藏。在本公开中,对如何隐藏不做特殊的限定,例如,可以对位置信息和/或生物识别进行打码。For example, when the to-be-processed file is identified as a picture, the privacy processing policy corresponding to the picture is used as the selected privacy processing policy. In step S120, the location information and/or biometrics in the picture may be hidden. In the present disclosure, there is no particular limitation on how to hide, for example, the location information and/or biometrics may be coded.
例如,当识别出所述待处理文件为音频文件时,将音频文件相对应的隐私处理策略作为所述被选定的隐私处理策略。在步骤S120中,可以将音频文件中的声纹信息进行隐藏。在本公开中,对如何隐藏不做特殊的限定,例如,可以音频中的语音进行变调处理。For example, when the file to be processed is identified as an audio file, the privacy processing policy corresponding to the audio file is used as the selected privacy processing policy. In step S120, the voiceprint information in the audio file can be hidden. In the present disclosure, there is no special limitation on how to hide it, for example, the voice in the audio can be processed by pitch change.
例如,当识别出所述待处理文件为视频文件时,将视频文件相对应的隐私处理策略作为所述被选定的隐私处理策略。在步骤S120中,可以将视频中的位置信息和/或生物识别信息进行隐藏。在本公开中,对如何隐藏不做特殊的限定,例如,可以对视频中的语音进行变调处理、对视频中的人脸进行打码处理。 For example, when the file to be processed is identified as a video file, the privacy processing policy corresponding to the video file is used as the selected privacy processing policy. In step S120, the location information and/or biometric information in the video can be hidden. In the present disclosure, there is no special limitation on how to hide, for example, the voice in the video can be changed in pitch, and the face in the video can be coded.
例如,当识别出所述待处理文件为文本文件时,将文本文件相对应的隐私处理策略作为所述被选定的隐私处理策略。在步骤S120中,可以将文本文件中的个人信息进行隐藏。在本公开中,对如何隐藏不做特殊的限定,例如,可以对文本文件中的个人信息进行删除或者用其他字符(例如,X或者*)代替。For example, when the to-be-processed file is identified as a text file, the privacy processing policy corresponding to the text file is used as the selected privacy processing policy. In step S120, the personal information in the text file can be hidden. In the present disclosure, there is no special limitation on how to hide, for example, the personal information in the text file can be deleted or replaced with other characters (for example, X or *).
作为一种可选实施方式,在所述待处理文件为文本文件时,所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:在所述文本文件中存在连续出现的多个数字、且连续出现的多个数字满足预定格式的情况下,利用特定字符替代所述连续出现的多个数字中的至少一部分;或者,删除所述连续出现的多个数字中的至少一部分;以及在所述文本文件中存在@字符加网站域名形式的文本的情况下,利用特定字符替代所述@字符之前的至少一部分字符;或者,删除所述@字符之前的至少一部分字符。As an optional implementation, when the file to be processed is a text file, the data to be processed is processed according to the selected privacy processing strategy, including: when there are multiple numbers appearing continuously in the text file and the multiple numbers appearing continuously meet a predetermined format, replacing at least a part of the multiple numbers appearing continuously with specific characters; or deleting at least a part of the multiple numbers appearing continuously; and when there is text in the form of @ character plus website domain name in the text file, replacing at least a part of the characters before the @ character with specific characters; or deleting at least a part of the characters before the @ character.
作为一种可选实施方式,所述预定格式可以为以下格式中的任意一者或几者:座机号码格式、手机号码格式、身份证号格式。As an optional implementation, the predetermined format may be any one or more of the following formats: landline number format, mobile phone number format, ID card number format.
所述特定字符可以是“X”,也可以是“*”等,本公开并不限于此。The specific character may be “X” or “*”, etc., but the present disclosure is not limited thereto.
在一些实施例中,在所述待处理文件为文本时,所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:判断所述文本中是否存在连续出现的多个数字;在所述文本中存在连续出现的多个数字的情况下,判断连续出现的多个数字是否满足预定格式;以及在连续出现的多个数字满足所述预定格式的情况下,删除连续出现的多个数字中的至少一部分。In some embodiments, when the file to be processed is text, the data to be processed is processed according to the selected privacy processing strategy, including: determining whether there are multiple numbers appearing consecutively in the text; if there are multiple numbers appearing consecutively in the text, determining whether the multiple numbers appearing consecutively satisfy a predetermined format; and if the multiple numbers appearing consecutively satisfy the predetermined format, deleting at least a part of the multiple numbers appearing consecutively.
作为另一种可选实施方式,所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:判断所述文本中是否存在@字符加网站域名形式的文本;以及在所述文本中存在@字符加网站域名形式的文本的情况下,利用特定字符替代所述@字符之前的至少一部分字符。As another optional implementation, the processing of the data to be processed according to the selected privacy processing strategy includes: determining whether there is text in the form of the @ character plus the website domain name in the text; and when there is text in the form of the @ character plus the website domain name in the text, replacing at least a part of the characters before the @ character with specific characters.
如上文中所述,所述特定字符可以是“X”,也可以是“*”等,本公开并不限于此。 As described above, the specific character may be “X” or “*”, etc., but the present disclosure is not limited thereto.
如果文本中出现了@字符加网站域名形式的文本,说明文本中存在邮箱这种联系方式。通过上述处理方法可以隐藏文本中的邮箱。If the text contains the @ character plus the website domain name, it means that there is an email address in the text. The above processing method can hide the email address in the text.
在一些实施例中,用户可以自己设定需要被隐藏的信息。当在文本中匹配到需要隐藏的信息时,可以直接将该信息隐藏。In some embodiments, the user can set the information to be hidden. When the information to be hidden is matched in the text, the information can be directly hidden.
作为一种可选实施方式,在所述待处理文件为音频文件时,所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:向所述音频文件中添加预定底噪,以改变所述音频文件的声纹信息。As an optional implementation, when the file to be processed is an audio file, processing the data to be processed according to the selected privacy processing strategy includes: adding a predetermined background noise to the audio file to change the voiceprint information of the audio file.
作为一种可选实施方式,在所述待处理文件为图片文件时,所述与图片文件相对应的隐私处理策略包括隐藏所述图片文件所携带的位置信息。目前,具有拍照功能的电子设备通常都具有定位功能,因此,拍摄出的图片中往往携带有电子设备所在的地区的位置信息。相应地,所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:提取所述图片文件中携带的位置信息;以及删除所述位置信息。As an optional implementation, when the file to be processed is a picture file, the privacy processing strategy corresponding to the picture file includes hiding the location information carried by the picture file. At present, electronic devices with camera functions usually have positioning functions, so the pictures taken often carry the location information of the area where the electronic device is located. Accordingly, the processing of the data to be processed according to the selected privacy processing strategy includes: extracting the location information carried in the picture file; and deleting the location information.
作为一种可选实施方式,所述位置信息可以为经纬度信息,所述电子设备通过该经纬度信息,通过一些导航软件或者地图软件进行匹配,就能够获得图片的具体地址。在这种情况下,所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:提取所述图中携带的经纬度信息;以及删除所述经纬度信息。As an optional implementation, the location information may be longitude and latitude information, and the electronic device can obtain the specific address of the image by matching the longitude and latitude information with some navigation software or map software. In this case, the processing of the data to be processed according to the selected privacy processing strategy includes: extracting the longitude and latitude information carried in the image; and deleting the longitude and latitude information.
图片文件中还可能会携带有生物识别信息,在所述待处理数据为图片文件的情况下,所述根据被选定的隐私处理策略对所述待处理数据进行处理,还包括:识别所述图片文件中携带的生物识别信息;以及对所述生物识别信息进行修改处理。The image file may also carry biometric information. When the data to be processed is an image file, processing the data to be processed according to the selected privacy processing strategy also includes: identifying the biometric information carried in the image file; and modifying the biometric information.
在本公开中,对如何对生物识别信息进行修改处理不做特殊的限定。例如,可以对所述生物识别信息进行模糊化处理、或者打码处理,或者添加水印处理等。In the present disclosure, there is no particular limitation on how to modify the biometric information. For example, the biometric information may be blurred, coded, or watermarked.
所述与视频对应的隐私处理策略包括隐藏所述视频文件中的位置信息和/或生物识别信息,在所述待处理数据为视频文件的情况下,所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:删除所述视频文件中的位置信息;和/或对所述视频文件中的生物识别信息进行修改处理。 The privacy processing strategy corresponding to the video includes hiding the location information and/or biometric information in the video file. When the data to be processed is a video file, processing the data to be processed according to the selected privacy processing strategy includes: deleting the location information in the video file; and/or modifying the biometric information in the video file.
如上文中所述,可以由用户确定是否需要对待处理的数据进行隐私处理、以及采用何种因此处理策略对待处理数据进行处理。相应地,所述提供针对待处理数据的至少一个隐私处理策略,如图3所示,包括如下步骤S121至S123。As described above, the user may determine whether to perform privacy processing on the data to be processed and what processing strategy to adopt to process the data to be processed. Accordingly, providing at least one privacy processing strategy for the data to be processed, as shown in FIG3 , includes the following steps S121 to S123.
在步骤S121中,展示多个隐私处理策略。In step S121 , multiple privacy processing strategies are displayed.
在步骤S122中,接收策略选择指令。In step S122, a policy selection instruction is received.
在步骤S123中,将所述策略选择指令对应的隐私处理策略作为所述被选定的隐私处理策略。In step S123, the privacy processing policy corresponding to the policy selection instruction is used as the selected privacy processing policy.
在本公开中,“策略选择指令”是用户通过输入设备(例如,键盘、鼠标、触摸屏)。In the present disclosure, a “policy selection instruction” is an instruction given by a user via an input device (eg, keyboard, mouse, touch screen).
在本公开中,对如何展示多个隐私处理策略不做特殊的限定。例如,可以以列表的形式展示所述隐私处理策略。在本公开中,可以在电子设备的显示屏上显示上述列表,如图5所示。为了便于用户理解,列表上可以标明“无痕模式”,意思是,如果用户选择了无痕模式,就会对选定的文件进行隐私处理。In the present disclosure, there is no special limitation on how to display multiple privacy processing policies. For example, the privacy processing policies can be displayed in the form of a list. In the present disclosure, the above list can be displayed on the display screen of the electronic device, as shown in FIG5. In order to facilitate user understanding, the list can be marked with "incognito mode", which means that if the user selects incognito mode, the selected files will be privacy processed.
在本公开中,对如何获得隐私处理策略不做特殊的限定。例如,可以通过服务器下发隐私处理策略。再例如,可以由用户执行配置隐私处理策略。也就是说,如图4所示,在所述响应于数据选择指令,提供针对待处理数据的至少一个隐私处理策略之前,所述方法还包括如下步骤S102。In the present disclosure, there is no special limitation on how to obtain the privacy processing policy. For example, the privacy processing policy can be issued by a server. For another example, the privacy processing policy can be configured by a user. That is, as shown in FIG4 , before providing at least one privacy processing policy for the data to be processed in response to the data selection instruction, the method further includes the following step S102.
在步骤S102中,预先配置与多种文件类型相对应的多种隐私处理策略。In step S102, a plurality of privacy processing policies corresponding to a plurality of file types are preconfigured.
在本公开中,可以由用户确定是否对待处理数据进行隐私处理。In the present disclosure, whether to perform privacy processing on the data to be processed can be determined by the user.
用户确定需要对待处理数据进行隐私处理,则在获得处理后数据之后,所述数据处理方法还包括如下步骤S130。If the user determines that privacy processing needs to be performed on the data to be processed, then after obtaining the processed data, the data processing method further includes the following step S130.
在步骤S130中,将所述处理后数据作为待发送数据。In step S130, the processed data is used as data to be sent.
在一些实施例中,所述数据处理方法还包括如下步骤S140。In some embodiments, the data processing method further includes the following step S140.
在步骤S140中,在确定不对所述待处理数据做隐私处理的情况下,将所述数据选择指令对应的数据作为待发送数据。In step S140, when it is determined that the data to be processed does not need to be privacy processed, the data corresponding to the data selection instruction is used as the data to be sent.
需要指出的是,携带有隐私信息的原数据(或者原文件)仍然 存储在电子设备中,作为一个实施例,在发送数据时,需要对其进行隐私处理。It should be pointed out that the original data (or original file) carrying private information is still As an embodiment, when data is sent, it needs to be stored in the electronic device and privacy processing is required.
作为本公开的第二个方面,提供一种数据发送方法,如图6所示,所述数据发送方法包括如下步骤S210至S230。As a second aspect of the present disclosure, a data sending method is provided. As shown in FIG. 6 , the data sending method includes the following steps S210 to S230 .
在步骤S210中,接收数据选择指令。In step S210, a data selection instruction is received.
在步骤S220中,根据本公开第一个方面所提供的数据处理方法获得待发送数据。In step S220, the data to be sent is obtained according to the data processing method provided in the first aspect of the present disclosure.
在步骤S230中,发送所述待发送数据。In step S230, the data to be sent is sent.
如上文中所述,如果用户确定需要对待处理的数据进行隐私处理,则将根据选定的隐私处理策略处理后的数据作为待发送的数据。如果用户确定不需要对待处理的数据进行隐私处理,则直接发送待处理的数据。As described above, if the user determines that the data to be processed needs to be processed for privacy processing, the data processed according to the selected privacy processing policy will be used as the data to be sent. If the user determines that the data to be processed does not need to be processed for privacy processing, the data to be processed will be sent directly.
在本公开的实施方式中,当识别到数据被选择后,主动向用户提供至少一个隐私处理策略。如果确定需要进行隐私处理,则根据隐私处理策略对待处理数据进行处理,得到处理后的数据,可以将该处理后的数据作为待发送的数据发送给数据接收者。被传输的数据已经经过了隐私处理,降低了用户隐私泄露的风险。In the embodiments of the present disclosure, when it is identified that the data is selected, at least one privacy processing strategy is actively provided to the user. If it is determined that privacy processing is required, the data to be processed is processed according to the privacy processing strategy to obtain processed data, and the processed data can be sent to the data recipient as the data to be sent. The transmitted data has been privacy processed, reducing the risk of user privacy leakage.
作为本公开的第三个方面,提供一种电子设备,如图7所示,所述电子设备包括:一个或多个处理器101;存储器102,其上存储有一个或多个计算机程序,所述一个或多个计算机程序被所述一个或多个处理器执行,使得所述一个或多个处理器101实现本公开第一个方面所提供的数据处理方法和/或本公开第二个方面所提供的数据发送方法。As a third aspect of the present disclosure, an electronic device is provided, as shown in FIG7 , and the electronic device includes: one or more processors 101; a memory 102 on which one or more computer programs are stored, and the one or more computer programs are executed by the one or more processors, so that the one or more processors 101 implement the data processing method provided in the first aspect of the present disclosure and/or the data sending method provided in the second aspect of the present disclosure.
在一些实施例中,所述电子设备还可以包括一个或多个I/O接口103,连接在处理器与存储器之间,配置为实现处理器与存储器的信息交互。In some embodiments, the electronic device may further include one or more I/O interfaces 103 connected between the processor and the memory and configured to implement information exchange between the processor and the memory.
在一些实施例中,处理器101为具有数据处理能力的器件,其包括但不限于中央处理器(CPU)等;存储器102为具有数据存储能力的器件,其包括但不限于随机存取存储器(RAM,更具体如SDRAM、DDR等)、只读存储器(ROM)、带电可擦可编程只读存储器(EEPROM)、 闪存(FLASH);I/O接口(读写接口)103连接在处理器101与存储器102间,能实现处理器101与存储器102的信息交互,其包括但不限于数据总线(Bus)等。In some embodiments, the processor 101 is a device with data processing capabilities, including but not limited to a central processing unit (CPU), etc.; the memory 102 is a device with data storage capabilities, including but not limited to a random access memory (RAM, more specifically SDRAM, DDR, etc.), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), Flash memory (FLASH); I/O interface (read-write interface) 103 is connected between the processor 101 and the memory 102, and can realize information interaction between the processor 101 and the memory 102, which includes but is not limited to a data bus (Bus) and the like.
在一些实施例中,处理器101、存储器102和I/O接口103通过总线104相互连接,进而与计算设备的其它组件连接。In some embodiments, the processor 101 , the memory 102 , and the I/O interface 103 are connected to each other via a bus 104 , and further connected to other components of the computing device.
所述电子设备可以是手机、台式电脑、平板电脑、笔记本电脑中的任意一者。The electronic device may be any one of a mobile phone, a desktop computer, a tablet computer, and a laptop computer.
作为本公开的第四个方面,如图8所示,提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行,使得所述处理器实现本公开第一个方面所提供的数据处理方法和/或本公开第二个方面所提供的数据发送方法。As the fourth aspect of the present disclosure, as shown in Figure 8, a computer-readable storage medium is provided, on which a computer program is stored, and the computer program is executed by a processor so that the processor implements the data processing method provided in the first aspect of the present disclosure and/or the data sending method provided in the second aspect of the present disclosure.
作为本公开的第五个方面,提供一种终端设备,如图9所示,所述终端设备包括隐私保护主控模块510、隐私保护资源管理子模块520、策略执行子模块530。As a fifth aspect of the present disclosure, a terminal device is provided. As shown in FIG. 9 , the terminal device includes a privacy protection main control module 510 , a privacy protection resource management submodule 520 , and a policy execution submodule 530 .
该隐私保护主控模块510配置为接收用户指令,并将用户指令发送给隐私保护资源管理子模块520。The privacy protection main control module 510 is configured to receive user instructions and send the user instructions to the privacy protection resource management submodule 520 .
隐私保护资源管理子模块520配置为在确定出用户指令为数据选择指令的情况下,提供针对待处理数据的至少一个隐私处理策略。The privacy protection resource management submodule 520 is configured to provide at least one privacy processing strategy for the data to be processed when it is determined that the user instruction is a data selection instruction.
策略执行子模块530配置为在确定对所述待处理数据进行隐私处理的情况下,根据被选定的隐私处理策略对所述待处理数据进行处理,得到处理后数据。The policy execution submodule 530 is configured to, when it is determined that the data to be processed needs to be privacy processed, process the data to be processed according to the selected privacy processing policy to obtain processed data.
在一些实施例中,所述终端设备还可以包括隐私保护策略配置子模块540,该隐私保护策略配置子模块配置为根据多种数据类型配置相应的隐私保护策略。In some embodiments, the terminal device may further include a privacy protection policy configuration submodule 540, which is configured to configure corresponding privacy protection policies according to multiple data types.
在本公开中,隐私保护主控模块510提供统一封装接口,便于隐私保护资源管理子模块520、策略执行子模块530、以及隐私保护策略配置子模块540完成隐藏用户个人信息的功能。In the present disclosure, the privacy protection main control module 510 provides a unified encapsulation interface to facilitate the privacy protection resource management submodule 520, the policy execution submodule 530, and the privacy protection policy configuration submodule 540 to complete the function of hiding user personal information.
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能 模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些物理组件或所有物理组件可以被实施为由处理器(如中央处理器、数字信号处理器或微处理器)执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其它数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其它存储器技术、CD-ROM、数字多功能盘(DVD)或其它光盘存储、磁盒、磁带、磁盘存储或其它磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其它的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其它传输机制之类的调制数据信号中的其它数据,并且可包括任何信息递送介质。It will be understood by those skilled in the art that all or some of the steps, systems, and functional modules/units in the above disclosed methods may be implemented as software, firmware, hardware, or a suitable combination thereof. The division between modules/units does not necessarily correspond to the division of physical components; for example, a physical component may have multiple functions, or a function or step may be performed by several physical components in cooperation. Some or all physical components may be implemented as software executed by a processor (such as a central processing unit, a digital signal processor, or a microprocessor), or implemented as hardware, or implemented as an integrated circuit, such as an application-specific integrated circuit. Such software may be distributed on a computer-readable medium, which may include a computer storage medium (or non-transitory medium) and a communication medium (or temporary medium). As known to those of ordinary skill in the art, the term computer storage medium includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules, or other data). Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cassettes, magnetic tapes, disk storage or other magnetic storage devices, or any other medium that can be used to store desired information and can be accessed by a computer. Furthermore, it is well known to those skilled in the art that communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media.
本文已经公开了示例实施例,并且虽然采用了具体术语,但它们仅用于并仅应当被解释为一般说明性含义,并且不用于限制的目的。在一些实例中,对本领域技术人员显而易见的是,除非另外明确指出,否则可单独使用与特定实施例相结合描述的特征、特性和/或元素,或可与其它实施例相结合描述的特征、特性和/或元件组合使用。因此,本领域技术人员将理解,在不脱离由所附的权利要求阐明的本公开的范围的情况下,可进行各种形式和细节上的改变。 Example embodiments have been disclosed herein, and although specific terms are employed, they are used and should be interpreted only in a general illustrative sense and not for limiting purposes. In some instances, it will be apparent to those skilled in the art that, unless otherwise expressly noted, features, characteristics, and/or elements described in conjunction with a particular embodiment may be used alone or in combination with features, characteristics, and/or elements described in conjunction with other embodiments. Therefore, those skilled in the art will appreciate that various changes in form and detail may be made without departing from the scope of the present disclosure as set forth in the appended claims.

Claims (14)

  1. 一种数据处理方法,包括:A data processing method, comprising:
    响应于数据选择指令,提供针对待处理数据的至少一个隐私处理策略,其中,所述待处理数据为所述数据选择指令所对应的数据;以及In response to the data selection instruction, providing at least one privacy processing policy for the data to be processed, wherein the data to be processed is the data corresponding to the data selection instruction; and
    确定需要对所述待处理数据进行隐私处理,则根据被选定的隐私处理策略对所述待处理数据进行处理,得到处理后数据。If it is determined that the data to be processed needs to be privacy processed, the data to be processed is processed according to the selected privacy processing strategy to obtain processed data.
  2. 根据权利要求1所述的数据处理方法,其中,所述待处理数据为待处理文件,所述被选定的隐私处理策略与所述待处理文件的类型相关,所述方法还包括:The data processing method according to claim 1, wherein the data to be processed is a file to be processed, and the selected privacy processing policy is related to the type of the file to be processed, and the method further comprises:
    在所述根据被选定的隐私处理策略对所述待处理数据进行处理之前,识别所述待处理文件的类型;以及Before processing the data to be processed according to the selected privacy processing policy, identifying the type of the file to be processed; and
    将与识别出的待处理文件的类型相对应的隐私处理策略作为所述被选定的隐私处理策略。The privacy processing policy corresponding to the identified type of the to-be-processed file is used as the selected privacy processing policy.
  3. 根据权利要求1所述的数据处理方法,其中,所述提供针对待处理数据的至少一个隐私处理策略,包括:The data processing method according to claim 1, wherein providing at least one privacy processing strategy for the data to be processed comprises:
    展示多个隐私处理策略;Display multiple privacy handling strategies;
    接收策略选择指令;以及receiving a policy selection instruction; and
    将所述策略选择指令对应的隐私处理策略作为所述被选定的隐私处理策略。The privacy processing policy corresponding to the policy selection instruction is used as the selected privacy processing policy.
  4. 根据权利要求1至3中任意一项所述的数据处理方法,其中,所述隐私处理策略选自以下隐私处理策略中的至少一者:The data processing method according to any one of claims 1 to 3, wherein the privacy processing strategy is selected from at least one of the following privacy processing strategies:
    与图片文件相对应的隐私处理策略;The privacy handling policy corresponding to the image file;
    与音频文件相对应的隐私处理策略;The privacy policy corresponding to the audio file;
    与视频文件对应的隐私处理策略;以及The privacy policy corresponding to the video file; and
    与文本文件对应的隐私处理策略。 The privacy policy corresponding to the text file.
  5. 根据权利要求4所述的数据处理方法,其中,所述与文本文件对应的隐私处理策略包括隐藏所述文本中的个人信息,确定所述待处理数据为文本文件,则所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:The data processing method according to claim 4, wherein the privacy processing strategy corresponding to the text file includes hiding personal information in the text, and determining that the data to be processed is a text file, then processing the data to be processed according to the selected privacy processing strategy comprises:
    确定所述文本文件中存在连续出现的多个数字、且连续出现的多个数字满足预定格式,则利用特定字符替代所述连续出现的多个数字中的至少一部分;或者,删除所述连续出现的多个数字中的至少一部分;以及Determining that there are a plurality of numbers that appear continuously in the text file and the plurality of numbers that appear continuously meet a predetermined format, replacing at least a portion of the plurality of numbers that appear continuously with a specific character; or deleting at least a portion of the plurality of numbers that appear continuously; and
    确定所述文本文件中存在@字符加网站域名形式的文本,则利用特定字符替代所述@字符之前的至少一部分字符;或者,删除所述@字符之前的至少一部分字符。If it is determined that there is text in the form of an @ character plus a website domain name in the text file, at least a portion of the characters before the @ character are replaced with specific characters; or at least a portion of the characters before the @ character are deleted.
  6. 根据权利要求4所述的数据处理方法,其中,所述与音频文件相对应的隐私处理策略包括隐藏所述音频文件中的声纹信息,确定所述待处理数据为音频文件,则所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:The data processing method according to claim 4, wherein the privacy processing strategy corresponding to the audio file includes hiding the voiceprint information in the audio file, and determining that the data to be processed is an audio file, and processing the data to be processed according to the selected privacy processing strategy, comprises:
    向所述音频文件中添加预定底噪,以改变所述音频文件的声纹信息。A predetermined background noise is added to the audio file to change the voiceprint information of the audio file.
  7. 根据权利要求4所述的数据处理方法,其中,所述与图片文件相对应的隐私处理策略包括隐藏所述图片文件所携带的位置信息,确定所述待处理数据为图片文件,则所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:The data processing method according to claim 4, wherein the privacy processing strategy corresponding to the image file includes hiding the location information carried by the image file, and determining that the data to be processed is an image file, and then processing the data to be processed according to the selected privacy processing strategy, comprises:
    提取所述图片文件中携带的位置信息;以及Extracting location information contained in the image file; and
    删除所述位置信息。Delete the location information.
  8. 根据权利要求7所述的数据处理方法,其中,所述位置信息包括经纬度信息。 The data processing method according to claim 7, wherein the location information includes longitude and latitude information.
  9. 根据权利要求7所述的数据处理方法,其中,所述与图片文件相对应的隐私处理策略还包括隐藏所述图片文件所携带的生物识别信息,确定所述待处理数据为图片文件,则所述根据被选定的隐私处理策略对所述待处理数据进行处理,还包括:The data processing method according to claim 7, wherein the privacy processing strategy corresponding to the image file further includes hiding the biometric information carried by the image file, and determining that the data to be processed is an image file, and processing the data to be processed according to the selected privacy processing strategy, further includes:
    识别所述图片文件中携带的生物识别信息;以及Identifying biometric information contained in the image file; and
    对所述生物识别信息进行修改处理。The biometric identification information is modified.
  10. 根据权利要求4所述的数据处理方法,其中,所述与视频对应的隐私处理策略包括隐藏所述视频文件中的位置信息和/或生物识别信息,确定所述待处理数据为视频文件,则所述根据被选定的隐私处理策略对所述待处理数据进行处理,包括:The data processing method according to claim 4, wherein the privacy processing strategy corresponding to the video includes hiding the location information and/or biometric information in the video file, and determining that the data to be processed is a video file, and then processing the data to be processed according to the selected privacy processing strategy, comprises:
    删除所述视频文件中的位置信息;和/或Deleting the location information in the video file; and/or
    对所述视频文件中的生物识别信息进行修改处理。The biometric information in the video file is modified.
  11. 根据权利要求1至3中任意一项所述的数据处理方法,其中,所述数据处理方法还包括:The data processing method according to any one of claims 1 to 3, wherein the data processing method further comprises:
    在所述得到处理后数据之后,将所述处理后数据作为待发送数据;After obtaining the processed data, using the processed data as data to be sent;
    所述数据处理方法还包括:The data processing method further includes:
    确定不对所述待处理数据做隐私处理,则将所述数据选择指令对应的数据作为待发送数据。If it is determined that the data to be processed will not be subjected to privacy processing, the data corresponding to the data selection instruction will be used as the data to be sent.
  12. 一种数据发送方法,包括:A data sending method, comprising:
    接收数据选择指令;receiving a data selection instruction;
    根据权利要求1至11中任意一项所述的数据处理方法获得待发送数据;以及Obtaining data to be sent according to the data processing method according to any one of claims 1 to 11; and
    发送所述待发送数据。The data to be sent is sent.
  13. 一种电子设备,包括:An electronic device, comprising:
    一个或多个处理器; one or more processors;
    存储器,其上存储有一个或多个计算机程序,所述一个或多个计算机程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现权利要求1至12中任意一项所述的方法。A memory having one or more computer programs stored thereon, wherein the one or more computer programs are executed by the one or more processors so that the one or more processors implement the method according to any one of claims 1 to 12.
  14. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行,使得所述处理器实现根据权利要求1至12中任意一项所述的方法。 A computer-readable storage medium having a computer program stored thereon, wherein the computer program is executed by a processor so that the processor implements the method according to any one of claims 1 to 12.
PCT/CN2023/120041 2022-12-12 2023-09-20 Data processing method, data sending method, electronic device, and storage medium WO2024125020A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211590624.4A CN118194334A (en) 2022-12-12 2022-12-12 Data processing method, data transmitting method, device and medium
CN202211590624.4 2022-12-12

Publications (1)

Publication Number Publication Date
WO2024125020A1 true WO2024125020A1 (en) 2024-06-20

Family

ID=91398852

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/120041 WO2024125020A1 (en) 2022-12-12 2023-09-20 Data processing method, data sending method, electronic device, and storage medium

Country Status (2)

Country Link
CN (1) CN118194334A (en)
WO (1) WO2024125020A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160164915A1 (en) * 2014-12-09 2016-06-09 Xor Data Exchange, Inc Privacy policy rating system
CN108616652A (en) * 2018-03-29 2018-10-02 广东欧珀移动通信有限公司 Data guard method and device, terminal, computer readable storage medium
CN109388967A (en) * 2018-10-11 2019-02-26 努比亚技术有限公司 A kind of data processing method, terminal and computer readable storage medium
CN112597529A (en) * 2020-10-19 2021-04-02 珠海格力电器股份有限公司 Multimedia content processing method and device, storage medium and electronic equipment
CN112818390A (en) * 2021-01-26 2021-05-18 支付宝(杭州)信息技术有限公司 Data information publishing method, device and equipment based on privacy protection
CN114611141A (en) * 2022-03-10 2022-06-10 北京沃东天骏信息技术有限公司 Method and device for processing private information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160164915A1 (en) * 2014-12-09 2016-06-09 Xor Data Exchange, Inc Privacy policy rating system
CN108616652A (en) * 2018-03-29 2018-10-02 广东欧珀移动通信有限公司 Data guard method and device, terminal, computer readable storage medium
CN109388967A (en) * 2018-10-11 2019-02-26 努比亚技术有限公司 A kind of data processing method, terminal and computer readable storage medium
CN112597529A (en) * 2020-10-19 2021-04-02 珠海格力电器股份有限公司 Multimedia content processing method and device, storage medium and electronic equipment
CN112818390A (en) * 2021-01-26 2021-05-18 支付宝(杭州)信息技术有限公司 Data information publishing method, device and equipment based on privacy protection
CN114611141A (en) * 2022-03-10 2022-06-10 北京沃东天骏信息技术有限公司 Method and device for processing private information

Also Published As

Publication number Publication date
CN118194334A (en) 2024-06-14

Similar Documents

Publication Publication Date Title
US11381539B1 (en) Systems and methods for generating digital channel content
US11709823B2 (en) Real time visual validation of digital content using a distributed ledger
US8863008B2 (en) Automatic removal of sensitive information from a computer screen
CN107402696B (en) Editing data across users and devices using an action registry
US20180097812A1 (en) Developer based document collaboration
CN110785756A (en) Data content filter
US20200143012A1 (en) Digital rights management using a digital agent
US11640454B2 (en) System and apparatus for secure password recovery and identity verification
US11159551B2 (en) Sensitive data detection in communication data
US20160342449A1 (en) Data exchange across multiple computing devices through a proactive intelligent clipboard
US10893052B1 (en) Duress password for limited account access
US20180247075A1 (en) Configuring image as private within storage container
US11721116B2 (en) Managing camera actions
CN112534431A (en) Increasing security of cryptographically protected resources based on publicly available data
CN108829753A (en) A kind of information processing method and device
US11487890B2 (en) Third-party access of end-user device assets
US10057606B2 (en) Systems and methods for automated application of business rules using temporal metadata and content fingerprinting
US9892197B2 (en) Information removal from a network
US9430625B1 (en) Method and system for voice match based data access authorization
US9021389B1 (en) Systems and methods for end-user initiated data-loss-prevention content analysis
US20160261597A1 (en) Responsive actions and strategies in online reputation management with reputation shaping
WO2024125020A1 (en) Data processing method, data sending method, electronic device, and storage medium
US9424256B2 (en) Method and apparatus for performing type-aware change tracking in a document
US10162488B1 (en) Browser-based media scan
US11714872B2 (en) Efficiently accessing references to recently used resources