CN104360875B - Privacy mode starts method and apparatus - Google Patents
Privacy mode starts method and apparatus Download PDFInfo
- Publication number
- CN104360875B CN104360875B CN201410566960.4A CN201410566960A CN104360875B CN 104360875 B CN104360875 B CN 104360875B CN 201410566960 A CN201410566960 A CN 201410566960A CN 104360875 B CN104360875 B CN 104360875B
- Authority
- CN
- China
- Prior art keywords
- operation behavior
- preset
- privacy mode
- user
- behavior
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 230000006399 behavior Effects 0.000 claims description 353
- 230000000977 initiatory effect Effects 0.000 claims description 11
- 238000005516 engineering process Methods 0.000 abstract description 7
- 230000004913 activation Effects 0.000 description 13
- 238000004891 communication Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Landscapes
- Telephone Function (AREA)
Abstract
Start method and apparatus the disclosure is directed to a kind of privacy mode, belong to field of terminal technology.Methods described includes:According to the historical operation behavior of user, at least one predetermined registration operation behavior of privacy mode to be launched is determined;Obtain the current operation behavior of user;Based at least one described predetermined registration operation behavior and the current operation behavior, the startup of privacy mode is controlled.The present invention passes through the historical operation behavior according to user, it is determined that starting at least one predetermined registration operation behavior of privacy mode, according at least one predetermined registration operation behavior and the current operation behavior of user, the startup of privacy mode can be automatically controlled, privacy mode is manually booted without user, easy to operate, flexibility is strong.
Description
Technical Field
The disclosure relates to the technical field of terminals, and in particular to a privacy mode starting method and device.
Background
Many current terminals generate an operation record by default when a user performs an operation action, so that a subsequent user can view the operation record. However, other users can view the operation record on the terminal, which easily reveals the privacy of the user.
In order to protect the privacy of the user, the terminal may provide a privacy mode for canceling the generation of the operation record when the user performs the operation behavior. Therefore, when the user does not wish to keep the operation record, the privacy mode can be started before the operation behavior is executed, and when the user executes the operation behavior, the terminal does not generate the operation record, and other users cannot view the operation record.
In the process of implementing the invention, the inventor finds that the related technology has defects, such as: the terminal cancels the generation of the operation record only when the user starts the privacy mode before executing the operation behavior, and if the user forgets to start the privacy mode, the terminal generates the operation record, and the user needs to manually delete the operation record, so that the operation is complicated and the flexibility is poor.
Disclosure of Invention
In order to solve the problems in the related art, the present disclosure provides a privacy mode activation method and apparatus. The technical scheme is as follows:
according to a first aspect of embodiments of the present disclosure, there is provided a privacy mode starting method, the method including:
determining at least one preset operation behavior of a privacy mode to be started according to historical operation behaviors of a user;
acquiring the current operation behavior of a user;
controlling the starting of the privacy mode based on the at least one preset operation behavior and the current operation behavior.
In another embodiment, said controlling the initiation of the privacy mode based on said at least one preset operational behavior and said current operational behavior comprises:
judging whether the at least one preset operation behavior comprises the current operation behavior;
and when the at least one preset operation behavior comprises the current operation behavior, starting a privacy mode.
In another embodiment, the determining, according to the historical operation behaviors of the user, at least one preset operation behavior of the privacy mode to be started includes:
determining a preset operation behavior of the privacy mode to be started according to the operation behavior of the user deleting operation record; or,
and determining the preset operation behavior of the privacy mode to be started according to the operation behavior of the user for starting the privacy mode.
In another embodiment, the determining, according to the operation behavior of the user deleting operation record, the preset operation behavior of the privacy mode to be started includes:
counting the times of deleting the operation records of the operation behaviors by the user within a first preset time length for each operation behavior;
and when the number of times of deleting the operation record exceeds a first preset threshold value, taking the operation behavior as a preset operation behavior.
In another embodiment, the determining, according to the operation behavior of the user starting the privacy mode, the preset operation behavior of the to-be-started privacy mode includes:
counting the times of starting the privacy mode when the user executes the operation behavior within a second preset time length for each operation behavior;
and when the number of times of starting the privacy mode exceeds a second preset threshold value, taking the operation behavior as a preset operation behavior.
According to a second aspect of embodiments of the present disclosure, there is provided a privacy mode activation apparatus, the apparatus including:
the device comprises a preset behavior determining module, a privacy mode starting module and a control module, wherein the preset behavior determining module is used for determining at least one preset operation behavior of the privacy mode to be started according to the historical operation behavior of a user;
the operation behavior acquisition module is used for acquiring the current operation behavior of the user;
and the starting control module is used for controlling the starting of the privacy mode based on the at least one preset operation behavior and the current operation behavior.
In another embodiment, the start control module is configured to determine whether the at least one preset operation behavior includes the current operation behavior; and when the at least one preset operation behavior comprises the current operation behavior, starting a privacy mode.
In another embodiment, the preset behavior determination module includes:
the first determining unit is used for determining the preset operation behavior of the privacy mode to be started according to the operation behavior of the user deleting operation record; or,
and the second determining unit is used for determining the preset operation behavior of the privacy mode to be started according to the operation behavior of the user for starting the privacy mode.
In another embodiment, the first determining unit is configured to count, for each operation behavior, the number of times that the user deletes the operation record of the operation behavior within a first preset time period; and when the number of times of deleting the operation record exceeds a first preset threshold value, taking the operation behavior as a preset operation behavior.
In another embodiment, the second determining unit is configured to count, for each operation behavior, the number of times that the user starts the privacy mode when the operation behavior is executed within a second preset time period; and when the number of times of starting the privacy mode exceeds a second preset threshold value, taking the operation behavior as a preset operation behavior.
According to a third aspect of the embodiments of the present disclosure, there is provided a privacy mode activation apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
determining at least one preset operation behavior of a privacy mode to be started according to historical operation behaviors of a user;
acquiring the current operation behavior of a user;
controlling the starting of the privacy mode based on the at least one preset operation behavior and the current operation behavior.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the method and the device provided by the embodiment, at least one preset operation behavior of the privacy mode to be started is determined according to the historical operation behavior of the user, the starting of the privacy mode can be automatically controlled according to the at least one preset operation behavior and the current operation behavior of the user, the user does not need to manually start the privacy mode, and the method and the device are simple and convenient to operate and high in flexibility.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow diagram illustrating a privacy mode initiation method in accordance with an exemplary embodiment;
FIG. 2 is a flow diagram illustrating a privacy mode initiation method in accordance with an exemplary embodiment;
FIG. 3 is a block diagram illustrating a privacy mode initiation means in accordance with an exemplary embodiment;
fig. 4 is a block diagram illustrating an apparatus for privacy mode enablement, according to an example embodiment.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, the present disclosure is described in further detail below with reference to the embodiments and the accompanying drawings. The exemplary embodiments and descriptions of the present disclosure are provided herein for illustration of the present disclosure, but not for limitation of the present disclosure.
The embodiment of the disclosure provides a method and a device for starting a privacy mode, and the following describes the disclosure in detail with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a privacy mode activation method according to an exemplary embodiment, and the privacy mode activation method is used in a terminal, as shown in fig. 1, and includes the following steps:
in step 101, at least one preset operation behavior of the privacy mode to be started is determined according to the historical operation behavior of the user.
In step 102, the current operation behavior of the user is obtained.
In step 103, the activation of the privacy mode is controlled based on the at least one preset operation behavior and the current operation behavior.
According to the method provided by the embodiment, at least one preset operation behavior of the privacy mode to be started is determined according to the historical operation behaviors of the user, the starting of the privacy mode can be automatically controlled according to the at least one preset operation behavior and the current operation behavior of the user, the user does not need to manually start the privacy mode, and the method is simple and convenient to operate and high in flexibility.
In another embodiment, the controlling the activation of the privacy mode based on the at least one preset operational behavior and the current operational behavior comprises:
judging whether the at least one preset operation behavior comprises the current operation behavior;
and when the current operation behavior is included in the at least one preset operation behavior, starting a privacy mode.
In another embodiment, the determining at least one preset operation behavior of the privacy mode to be started according to the historical operation behaviors of the user includes:
determining a preset operation behavior of the privacy mode to be started according to the operation behavior of the user deleting operation record; or,
and determining the preset operation behavior of the privacy mode to be started according to the operation behavior of the user for starting the privacy mode.
In another embodiment, the determining, according to the operation behavior of the user deleting the operation record, the preset operation behavior of the privacy mode to be started includes:
counting the times of deleting the operation record of the operation behavior by the user within a first preset time length for each operation behavior;
and when the number of times of deleting the operation record exceeds a first preset threshold value, taking the operation behavior as a preset operation behavior.
In another embodiment, the determining, according to the operation behavior of the user starting the privacy mode, the preset operation behavior of the to-be-started privacy mode includes:
for each operation behavior, counting the times of starting the privacy mode when the user executes the operation behavior within a second preset time length;
and when the number of times of starting the privacy mode exceeds a second preset threshold value, taking the operation behavior as a preset operation behavior.
All the above-mentioned optional technical solutions can be combined arbitrarily to form the optional embodiments of the present invention, and are not described herein again.
Fig. 2 is a flowchart illustrating a privacy mode activation method according to an exemplary embodiment, and the privacy mode activation method is used in a terminal, as shown in fig. 2, and includes the following steps:
in step 201, the terminal determines at least one preset operation behavior of the privacy mode to be started according to the historical operation behavior of the user.
The historical operation behaviors of the user may include operation behaviors such as an operation behavior of accessing a website, an operation behavior of playing a video, and the like, and may also include a behavior of starting a privacy mode or a behavior of deleting an operation record corresponding to each operation behavior, which is not limited in this embodiment.
In this embodiment, the terminal may provide a privacy mode, and if the user starts the privacy mode, when the user performs an operation, the terminal cancels generation of the operation record, and prevents other users from viewing the operation record, so as to protect the privacy of the user, and when the user does not start the privacy mode, when the user performs an operation, the terminal generates the operation record of the operation, so that a subsequent user can view the operation record.
The preset operation behavior refers to an operation behavior of a to-be-started privacy mode, that is, the privacy mode is started each time the terminal acquires the preset operation behavior. The terminal can determine the operation behavior that the user wants to start the privacy mode according to the historical operation behavior of the user, the operation behavior that the user wants to start the privacy mode is taken as the preset operation behavior, and then the terminal can automatically start the privacy mode when the user executes the preset operation behavior subsequently, and the user does not need to manually start the privacy mode.
The terminal may determine the at least one preset operation behavior according to a behavior of deleting an operation record or starting a privacy mode by the user, that is, the step 201 may include at least one of the following steps (1) to (3):
(1) for each operation behavior, the terminal counts the times of deleting the operation record of the operation behavior by the user within a first preset time, and when the times of deleting the operation record exceeds a first preset threshold, the operation behavior is taken as a preset operation behavior.
For each operation behavior, on the premise that the privacy mode is not started, when the user executes the operation behavior, the terminal generates an operation record of the operation behavior, and if the user does not wish to keep the operation record, the operation record can be deleted. When the user frequently deletes the operation record of the operation behavior, which indicates that the user is likely to want to start the privacy mode each time the operation behavior is executed, the terminal may use the operation behavior as a preset operation behavior of the privacy mode to be started.
In order to determine the operation behavior of the user for frequently deleting the operation record, for each operation behavior, the terminal counts the number of times of deleting the operation record of the operation behavior by the user within a first preset time period, judges whether the number of times of deleting the operation record exceeds a first preset threshold, and when the number of times of deleting the operation record exceeds the first preset threshold, the terminal can consider that the user frequently deletes the operation record of the operation behavior, and then the terminal takes the operation behavior as the preset operation behavior. When the number of times of deleting the operation record does not exceed the first preset threshold, the terminal may continue to count the number of times of deleting the operation record by the user within the first preset duration, until the number of times of deleting the operation record exceeds the first preset threshold, the operation behavior is taken as the preset operation behavior, and the count of the number of times of deleting the operation record by the user may also be stopped, which is not limited in this embodiment.
The first preset time length and the first preset threshold may be determined by the terminal in advance by analyzing the number of times and frequency of deleting operation records of each user, which is not limited in this embodiment.
(2) For each operation behavior, the terminal counts the times of starting the privacy mode when the user executes the operation behavior within a second preset time, and when the times of starting the privacy mode exceed a second preset threshold, the operation behavior is taken as a preset operation behavior.
For each operational behavior, when the user does not wish to generate an operational record for the operational behavior, a privacy mode may be initiated in which the operational behavior is executed. When the user frequently starts the privacy mode while performing the operation behavior, indicating that the user is likely to want to start the privacy mode each time the operation behavior is performed, the terminal may regard the operation behavior as a preset operation behavior of the privacy mode to be started.
In order to determine the operation behavior that the user frequently starts the privacy mode, for each operation behavior, the terminal counts the number of times that the user starts the privacy mode when executing the operation behavior within the second preset time period, and when the number of times that the privacy mode is started exceeds the second preset threshold, the operation behavior is taken as the preset operation behavior. When the number of times of starting the privacy mode does not exceed the second preset threshold, the terminal may continue to count the number of times of starting the privacy mode when the user executes the operation behavior within the second preset duration, until the number of times of starting the privacy mode exceeds the second preset threshold, the operation behavior is taken as a preset operation behavior, or the number of times of starting the privacy mode when the user executes the operation behavior may be stopped from being counted, which is not limited in this embodiment.
The second preset time length and the second preset threshold may be determined by the terminal in advance by analyzing the number of times and the frequency that each user starts the privacy mode, which is not limited in this embodiment. The first preset time period and the second preset time period may be the same as or different from each other, and the first preset threshold and the second preset threshold may be the same as or different from each other, which is not limited in this embodiment.
(3) For each operation behavior, the terminal counts a first time of deleting the operation record of the operation behavior by the user in a preset time length and a second time of starting the privacy mode when the user executes the operation behavior, and when the sum of the first time and the second time exceeds a third preset threshold, the operation behavior is taken as the preset operation behavior.
For the same operation behavior, the user may start the privacy mode when executing the operation behavior, or may delete the operation record of the operation behavior after executing the operation behavior because the user forgets to start the privacy mode. At this time, the terminal may adopt the step (1) described above to determine whether the operation behavior is a preset operation behavior according to a behavior of the user deleting the operation record of the operation behavior, or adopt the step (2) described above to determine whether the operation behavior is a preset operation behavior according to a behavior of the user starting the privacy mode.
However, in order to more accurately measure the degree of expectation of the user for activating the privacy mode when the operation behavior is executed, the terminal may count a first number of times that the user deletes the operation record of the operation behavior within a third preset time period and a second number of times that the user activates the privacy mode when the operation behavior is executed, calculate a sum of the first number of times and the second number of times, determine whether the sum exceeds a third preset threshold, and when the sum exceeds the third preset threshold, regard the operation behavior as the preset operation behavior. The third preset time length and the third preset threshold may also be determined by the terminal in advance by analyzing the number of times and the frequency that each user starts the privacy mode, which is not limited in this embodiment.
As for the above steps (1) - (3), the terminal may perform only any one of the steps (1) - (3), or may perform the steps (1) - (3) at the same time, which is not limited in this embodiment. In addition, in this embodiment, only the steps (1) to (3) are taken as an example to describe the process of determining the preset operation behavior by the terminal, and in an actual application process, the terminal may also determine the preset operation behavior according to other historical operation behaviors, which is not limited in this embodiment.
In this embodiment, the terminal may determine multiple types of preset operation behaviors, so as to facilitate subsequent judgment of the current operation behavior of the user, the terminal may classify the determined at least one preset operation behavior in advance, when the terminal acquires the current operation behavior, the terminal may select at least one preset operation behavior of which the type is consistent with the type of the current operation behavior, and then control the starting of the privacy mode based on the selected at least one preset operation behavior.
In step 202, the terminal acquires the current operation behavior of the user.
For example, when the current operation behavior is an operation behavior of accessing a website, the terminal acquires the current operation behavior when acquiring a website address, and the current operation behavior includes the website address. When the current operation behavior is an operation behavior of playing a video, the terminal acquires the current operation behavior when starting to play the video, the current operation behavior comprises the video identifier, and the video identifier can be a video name or a video number and the like. When the current operation behavior is an operation behavior of opening a file, the terminal acquires the current operation behavior when opening the file, the current operation behavior comprises the file identification, and the file identification can be a file name or a file number and the like.
In step 203, the terminal determines whether the at least one preset operation behavior includes the current operation behavior, if so, performs step 204, and if not, performs step 205.
When the terminal acquires the current operation behavior of the user, judging whether the current operation behavior is included in the at least one preset operation behavior, when the current operation behavior is included in the at least one preset operation behavior, the current operation behavior is indicated to be the preset operation behavior, when the user executes the operation behavior, the terminal should start a privacy mode, when the current operation behavior is not included in the at least one preset operation behavior, the current operation behavior is indicated to be not the preset operation behavior, and when the user executes the operation behavior, the terminal does not need to start the privacy mode.
Taking the operation behavior of the access website as an example, the preset operation behavior of the access website determined by the terminal is as shown in table 1 below, when the user accesses the "website a", the terminal acquires the operation behavior of currently accessing the "website a", the terminal acquires the preset operation behavior of the access website, and determines that the current operation behavior is the preset operation behavior, and then the privacy mode is started. And when the user accesses the website C, the terminal acquires the operation behavior of the currently accessed website C, then the terminal acquires the preset operation behavior of the accessed website, and determines that the current operation behavior is not the preset operation behavior, then the privacy mode is not started, and the operation record of the user accessing the website C is generated.
TABLE 1
Preset operation behavior for accessing website |
Operational behavior to visit "Website A |
Operational behavior to visit "Website B |
In step 204, the terminal initiates the privacy mode and ends.
The terminal starts a privacy mode, so that when the user executes the operation behavior, the terminal cannot generate the operation record of the operation behavior, other users are prevented from checking the operation record, and the privacy of the user can be protected.
In step 205, the terminal generates an operation record during the operation performed by the user.
When the at least one preset operation behavior does not comprise the current operation behavior, the terminal does not start the privacy mode, and then the terminal generates the operation record of the operation behavior in the process of executing the operation behavior by the user. In the subsequent process, when the terminal acquires the action of deleting the operation record by the user, the operation record is deleted.
In the embodiment, the operation behavior of the user is monitored, the preset operation behavior of the privacy mode is determined to be automatically started when the preset operation behavior is executed next time, the generation of the operation record can be cancelled when the preset operation behavior is obtained next time, the operation records which the user does not want to be seen by other users are avoided from being generated, the privacy of the user can be protected, the privacy mode does not need to be manually started by the user, the operation is simple and convenient, and the flexibility is high.
According to the method provided by the embodiment, at least one preset operation behavior of the privacy mode to be started is determined according to the historical operation behavior of the user, the starting of the privacy mode can be automatically controlled according to the at least one preset operation behavior and the current operation behavior of the user, the user does not need to manually start the privacy mode, the privacy of the user can be protected, and the method is simple and convenient to operate and high in flexibility.
Fig. 3 is a block diagram illustrating a privacy mode activation apparatus according to an exemplary embodiment, and referring to fig. 3, the apparatus includes a preset behavior determination module 301, an operation behavior acquisition module 302, and an activation control module 303.
The preset behavior determining module 301 is configured to determine at least one preset operation behavior of the privacy mode to be started according to the historical operation behavior of the user;
the operation behavior obtaining module 302 is configured to obtain a current operation behavior of the user;
the initiation control module 303 is configured for controlling the initiation of the privacy mode based on the at least one preset operational behavior and the current operational behavior.
According to the device provided by the embodiment, at least one preset operation behavior of the privacy mode to be started is determined according to the historical operation behavior of the user, the starting of the privacy mode can be automatically controlled according to the at least one preset operation behavior and the current operation behavior of the user, the user does not need to manually start the privacy mode, the privacy of the user is protected, and the device is simple and convenient to operate and high in flexibility.
In another embodiment, the start control module 303 is configured to determine whether the at least one preset operation behavior includes the current operation behavior; and when the at least one preset operation behavior comprises the current operation behavior, starting a privacy mode.
In another embodiment, the preset behavior determination module 301 includes:
the first determining unit is configured to determine a preset operation behavior of the privacy mode to be started according to an operation behavior of the user deleting operation record; or,
the second determining unit is configured to determine a preset operation behavior of the privacy mode to be started according to an operation behavior of the user starting the privacy mode.
In another embodiment, the first determining unit is configured to count, for each operation behavior, the number of times that the user deletes the operation record of the operation behavior within a first preset time period; and when the number of times of deleting the operation record exceeds a first preset threshold value, taking the operation behavior as a preset operation behavior.
In another embodiment, the second determining unit is configured to count, for each operation behavior, the number of times that the user starts the privacy mode when the operation behavior is executed within a second preset time period; and when the number of times of starting the privacy mode exceeds a second preset threshold value, taking the operation behavior as a preset operation behavior.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
It should be noted that: the privacy mode activation apparatus provided in the foregoing embodiment is only illustrated by dividing the functional modules when the privacy mode is activated, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the terminal is divided into different functional modules to complete all or part of the functions described above. In addition, the privacy mode starting apparatus and the privacy mode starting method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments and are not described herein again.
Fig. 4 is a block diagram illustrating an apparatus 400 for privacy mode enablement, according to an example embodiment. For example, the apparatus 400 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 4, the apparatus 400 may include one or more of the following components: processing components 402, memory 404, power components 406, multimedia components 408, audio components 410, input/output (I/O) interfaces 412, sensor components 414, and communication components 416.
The processing component 402 generally controls overall operation of the apparatus 400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing element 402 may include one or more processors 420 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 402 can include one or more modules that facilitate interaction between the processing component 402 and other components. For example, the processing component 402 can include a multimedia module to facilitate interaction between the multimedia component 408 and the processing component 402.
The memory 404 is configured to store various types of data to support operations at the device 400. Examples of such data include instructions for any application or method operating on the device 400, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 404 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 406 provide power to the various components of device 400. Power components 406 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for apparatus 400.
The multimedia component 408 includes a screen that provides an output interface between the device 400 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 408 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 400 is in an operational mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 410 is configured to output and/or input audio signals. For example, audio component 410 includes a Microphone (MIC) configured to receive external audio signals when apparatus 400 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 404 or transmitted via the communication component 416. In some embodiments, audio component 410 also includes a speaker for outputting audio signals.
The I/O interface 412 provides an interface between the processing component 402 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 414 includes one or more sensors for providing various aspects of status assessment for the apparatus 400. For example, the sensor component 414 can detect the open/closed state of the device 400, the relative positioning of components, such as a display and keypad of the apparatus 400, the sensor component 414 can also detect a change in the position of the apparatus 400 or a component of the apparatus 400, the presence or absence of user contact with the apparatus 400, orientation or acceleration/deceleration of the apparatus 400, and a change in the temperature of the apparatus 400. The sensor assembly 414 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 414 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 414 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 416 is configured to facilitate wired or wireless communication between the apparatus 400 and other devices. The apparatus 400 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 416 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 416 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 404 comprising instructions, executable by the processor 420 of the apparatus 400 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium having instructions therein which, when executed by a processor of a terminal, enable the terminal to perform a privacy mode initiation method, the method comprising:
determining at least one preset operation behavior of a privacy mode to be started according to historical operation behaviors of a user;
acquiring the current operation behavior of a user;
and controlling the starting of the privacy mode based on the at least one preset operation behavior and the current operation behavior.
In another embodiment, the controlling the activation of the privacy mode based on the at least one preset operational behavior and the current operational behavior comprises:
judging whether the at least one preset operation behavior comprises the current operation behavior;
and when the current operation behavior is included in the at least one preset operation behavior, starting a privacy mode.
In another embodiment, the determining at least one preset operation behavior of the privacy mode to be started according to the historical operation behaviors of the user includes:
determining a preset operation behavior of the privacy mode to be started according to the operation behavior of the user deleting operation record; or,
and determining the preset operation behavior of the privacy mode to be started according to the operation behavior of the user for starting the privacy mode.
In another embodiment, the determining, according to the operation behavior of the user deleting the operation record, the preset operation behavior of the privacy mode to be started includes:
counting the times of deleting the operation record of the operation behavior by the user within a first preset time length for each operation behavior;
and when the number of times of deleting the operation record exceeds a first preset threshold value, taking the operation behavior as a preset operation behavior.
In another embodiment, the determining, according to the operation behavior of the user starting the privacy mode, the preset operation behavior of the to-be-started privacy mode includes:
for each operation behavior, counting the times of starting the privacy mode when the user executes the operation behavior within a second preset time length;
and when the number of times of starting the privacy mode exceeds a second preset threshold value, taking the operation behavior as a preset operation behavior.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.
Claims (9)
1. A privacy mode initiation method, the method comprising:
counting the times of deleting the operation records of the operation behaviors by the user within a first preset time length for each operation behavior;
when the number of times of deleting the operation record exceeds a first preset threshold value, taking the operation behavior as a preset operation behavior of a privacy mode to be started;
acquiring the current operation behavior of a user;
controlling the starting of the privacy mode based on at least one preset operation behavior and the current operation behavior.
2. The method of claim 1, wherein controlling the initiation of the privacy mode based on the at least one preset operational behavior and the current operational behavior comprises:
judging whether the at least one preset operation behavior comprises the current operation behavior;
and when the at least one preset operation behavior comprises the current operation behavior, starting a privacy mode.
3. The method of claim 1, further comprising:
and determining the preset operation behavior of the privacy mode to be started according to the operation behavior of the user for starting the privacy mode.
4. The method of claim 3, further comprising:
counting the times of starting the privacy mode when the user executes the operation behavior within a second preset time length for each operation behavior;
and when the number of times of starting the privacy mode exceeds a second preset threshold value, taking the operation behavior as a preset operation behavior.
5. A privacy mode initiation apparatus, the apparatus comprising:
the device comprises a preset behavior determining module, a privacy mode starting module and a control module, wherein the preset behavior determining module is used for determining at least one preset operation behavior of the privacy mode to be started according to the historical operation behavior of a user;
the operation behavior acquisition module is used for acquiring the current operation behavior of the user;
the starting control module is used for controlling the starting of the privacy mode based on the at least one preset operation behavior and the current operation behavior;
the preset behavior determination module comprises:
the first determining unit is used for counting the times of deleting the operation records of the operation behaviors by the user within a first preset time length for each operation behavior; and when the number of times of deleting the operation record exceeds a first preset threshold value, taking the operation behavior as a preset operation behavior.
6. The apparatus according to claim 5, wherein the start control module is configured to determine whether the at least one preset operation behavior includes the current operation behavior; and when the at least one preset operation behavior comprises the current operation behavior, starting a privacy mode.
7. The apparatus of claim 5, wherein the preset behavior determination module comprises:
and the second determining unit is used for determining the preset operation behavior of the privacy mode to be started according to the operation behavior of the user for starting the privacy mode.
8. The apparatus according to claim 7, wherein the second determining unit is configured to count, for each operation behavior, a number of times that the user starts the privacy mode when performing the operation behavior within a second preset time period; and when the number of times of starting the privacy mode exceeds a second preset threshold value, taking the operation behavior as a preset operation behavior.
9. A privacy mode initiation apparatus, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
counting the times of deleting the operation records of the operation behaviors by the user within a first preset time length for each operation behavior;
when the number of times of deleting the operation record exceeds a first preset threshold value, taking the operation behavior as a preset operation behavior of a privacy mode to be started;
acquiring the current operation behavior of a user;
controlling the starting of the privacy mode based on at least one preset operation behavior and the current operation behavior.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410566960.4A CN104360875B (en) | 2014-10-22 | 2014-10-22 | Privacy mode starts method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410566960.4A CN104360875B (en) | 2014-10-22 | 2014-10-22 | Privacy mode starts method and apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104360875A CN104360875A (en) | 2015-02-18 |
CN104360875B true CN104360875B (en) | 2017-09-12 |
Family
ID=52528139
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410566960.4A Active CN104360875B (en) | 2014-10-22 | 2014-10-22 | Privacy mode starts method and apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104360875B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104915445A (en) * | 2015-06-29 | 2015-09-16 | 百度在线网络技术(北京)有限公司 | Method and device for browsing page |
CN106469260A (en) * | 2015-08-20 | 2017-03-01 | 中兴通讯股份有限公司 | A kind of method and device accessing mobile terminal |
CN107465937A (en) * | 2017-06-30 | 2017-12-12 | 武汉斗鱼网络科技有限公司 | A kind of processing method, device and the electronic equipment of video-see record |
CN108076224B (en) * | 2017-12-21 | 2021-06-29 | Oppo广东移动通信有限公司 | Application control method, device, storage medium and mobile terminal |
CN109189488A (en) * | 2018-08-27 | 2019-01-11 | 优视科技新加坡有限公司 | A kind of fast control method, apparatus and equipment/terminal/server based on user behavior |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708141A (en) * | 2011-03-14 | 2012-10-03 | 国际商业机器公司 | System and method for in-private browsing |
CN103036768A (en) * | 2012-12-10 | 2013-04-10 | 北京小米科技有限责任公司 | Method for management application and device for management application |
CN103412901A (en) * | 2013-07-26 | 2013-11-27 | 北京奇虎科技有限公司 | Method and device for clearing historical records |
CN103795847A (en) * | 2012-10-31 | 2014-05-14 | 三星电子(中国)研发中心 | Method for applying traceless mode to communication terminal and communication terminal |
CN103955459A (en) * | 2013-10-10 | 2014-07-30 | 北京奇虎科技有限公司 | Method and device for loading webpage and browser |
CN103970544A (en) * | 2014-05-23 | 2014-08-06 | 小米科技有限责任公司 | Access trace handling method and device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120278139A1 (en) * | 2011-04-26 | 2012-11-01 | Microsoft Corporation | Changing consumer behavior with targeted offers |
EP2877935A4 (en) * | 2012-07-25 | 2016-01-20 | Aro Inc | Using mobile device data to create a storyline, model user routine and personality, and create customized recommendation agents |
-
2014
- 2014-10-22 CN CN201410566960.4A patent/CN104360875B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708141A (en) * | 2011-03-14 | 2012-10-03 | 国际商业机器公司 | System and method for in-private browsing |
CN103795847A (en) * | 2012-10-31 | 2014-05-14 | 三星电子(中国)研发中心 | Method for applying traceless mode to communication terminal and communication terminal |
CN103036768A (en) * | 2012-12-10 | 2013-04-10 | 北京小米科技有限责任公司 | Method for management application and device for management application |
CN103412901A (en) * | 2013-07-26 | 2013-11-27 | 北京奇虎科技有限公司 | Method and device for clearing historical records |
CN103955459A (en) * | 2013-10-10 | 2014-07-30 | 北京奇虎科技有限公司 | Method and device for loading webpage and browser |
CN103970544A (en) * | 2014-05-23 | 2014-08-06 | 小米科技有限责任公司 | Access trace handling method and device |
Also Published As
Publication number | Publication date |
---|---|
CN104360875A (en) | 2015-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10409684B2 (en) | Method, device and storage medium for cleaning memory | |
WO2017113660A1 (en) | Application program management method and device | |
US10292004B2 (en) | Method, device and medium for acquiring location information | |
CN109557999B (en) | Bright screen control method and device and storage medium | |
US20170060320A1 (en) | Method for controlling a mobile terminal using a side touch panel | |
WO2015188588A1 (en) | Application deletion prompting method and apparatus | |
US20170171321A1 (en) | Methods and devices for managing accounts | |
EP2981116A1 (en) | Method and apparatus for accessing wi-fi network and computer program product | |
US10313537B2 (en) | Method, apparatus and medium for sharing photo | |
CN104360875B (en) | Privacy mode starts method and apparatus | |
EP3163834A1 (en) | Method and device for equipment control | |
CN107491681B (en) | Fingerprint information processing method and device | |
CN105511739A (en) | Message prompting method and device | |
CN104850643B (en) | Picture comparison method and device | |
CN107171938B (en) | Method and device for shielding social friends | |
CN108984098B (en) | Information display control method and device based on social software | |
CN106570381B (en) | Fingerprint unlocking method and device | |
CN105786561B (en) | Method and device for calling process | |
CN107894909B (en) | Method, device and storage medium for limiting Activity starting | |
US20170147593A1 (en) | Contact managing method and apparatus, and storage medium | |
CN107832377B (en) | Image information display method, device and system, and storage medium | |
CN105824513A (en) | Message processing method and apparatus | |
CN107885464B (en) | Data storage method, device and computer readable storage medium | |
CN107357643B (en) | Application calling method and device and computer readable storage medium | |
CN105100135A (en) | Network sharing setting method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |