CN112311732A - Information processing method and device and electronic equipment - Google Patents

Information processing method and device and electronic equipment Download PDF

Info

Publication number
CN112311732A
CN112311732A CN201910691262.XA CN201910691262A CN112311732A CN 112311732 A CN112311732 A CN 112311732A CN 201910691262 A CN201910691262 A CN 201910691262A CN 112311732 A CN112311732 A CN 112311732A
Authority
CN
China
Prior art keywords
target
user
information
category
browsing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910691262.XA
Other languages
Chinese (zh)
Inventor
林苏芝
邢霁月
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910691262.XA priority Critical patent/CN112311732A/en
Publication of CN112311732A publication Critical patent/CN112311732A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application discloses an information processing method, an information processing device and electronic equipment, wherein the method comprises the following steps: determining target category information of a target object; determining whether the login user belongs to a target user; if yes, under the condition of providing target object information to the target user, the target object information of the target category related to the target user is subjected to browsing content protection processing. According to the embodiment of the application, the protection of the browsing content can be effectively realized.

Description

Information processing method and device and electronic equipment
Technical Field
The present application relates to the field of commodity object information processing technologies, and in particular, to an information processing method and apparatus, and an electronic device.
Background
With the development of the commodity object information service system, the commodity types available in the system can almost cover the aspects required by daily life of people. However, the commodity object information service system brings convenience to people and also faces the problem of network security protection of minors. This is because there may be some commodity information that is not suitable for being disclosed to minors in the system, for example, commodities of a game rechargeable type, commodities that may cause personal injury to minors such as pesticides and knives, commodities of an adult type, and the like.
In view of the above problems, the limitation of the age of the registered user may be implemented by real-name authentication of the registered user, that is, the registration of an account in the commodity object information service system by a minor may be prohibited, or the age of the registered user may be limited by a payment system in combination with a related payment system, so as to reduce the influence of the content on the minor. However, in practical applications, there are also often the following situations: the children at home may often use mobile terminal devices such as mobile phones of parents to access the commodity object information service system, and such a system is usually in a state of long-term login with the account numbers of the parents, so that the children have an opportunity to browse various information provided in the system, and even under the conditions of knowing associated payment passwords, opening password-free payment in advance and the like, the children can directly purchase commodities interested in the children, wherein dangerous commodities may be included, or commodities which have adverse effects on physical and mental development of minors may be included.
Therefore, how to implement network security protection more effectively while developing an information service system becomes a technical problem to be solved by those skilled in the art.
Disclosure of Invention
The application provides an information processing method, an information processing device and electronic equipment, which can effectively realize the safety protection of the contents browsed by a user.
The application provides the following scheme:
an information processing method comprising:
determining target category information of a target object;
determining whether the login user belongs to a target user;
if yes, under the condition of providing target object information to the target user, the target object information of the target category related to the target user is subjected to browsing content protection processing.
An information processing method comprising:
receiving an access request and submitting the access request to a server;
receiving information returned by the server, wherein the returned information comprises: under the condition that the login user is a target user, browsing the information after content protection processing is carried out on the target object information of the related target category;
and displaying the returned information.
An information processing method comprising:
determining whether at least one of the communication participants belongs to a target user;
if yes, under the condition of sending or receiving the message according to the message sending request or the message receiving request, the related messages of the preset categories are subjected to content protection processing.
A system security processing method comprises the following steps:
receiving a request to access a target system;
determining whether the login user is a target user;
if yes, the identity of the login user is confirmed whether the login user is the personal operation;
and determining whether the login user has the authority to access the target system or not according to the determination result.
An information processing apparatus comprising:
a category information determination unit for determining target category information of the target object;
the user judging unit is used for determining whether the login user belongs to the target user;
and if so, performing browsing content protection processing on the target object information of the target category involved in the target object information under the condition of providing the target object information to the target user.
An information processing apparatus comprising:
the request submitting unit is used for receiving the access request and submitting the access request to the server;
an information receiving unit, configured to receive information returned by the server, where the returned information includes: under the condition that the login user is a target user, browsing the information after content protection processing is carried out on the target object information of the related target category;
and the information display unit is used for displaying the returned information.
An information processing apparatus comprising:
a user determination unit for determining whether at least one of the communication participants belongs to a target user;
and the message content protection processing unit is used for performing content protection processing on the related preset type messages under the condition of sending or receiving a message according to a message sending request or a message receiving request if the message belongs to the target user.
A system security processing apparatus, comprising:
a request receiving unit for receiving a request for accessing a target system;
the user judging unit is used for determining whether the login user is a target user;
the identity confirmation unit is used for confirming the identity of the login user for personal operation if the login user is the target user;
and the permission determining unit is used for determining whether the login user has the permission to access the target system according to the determination result.
An electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
determining target category information of a target object;
determining whether the login user belongs to a target user;
if yes, under the condition of providing target object information to the target user, the target object information of the target category related to the target user is subjected to browsing content protection processing.
An electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
receiving an access request and submitting the access request to a server;
receiving information returned by the server, wherein the returned information comprises: under the condition that the login user is a target user, browsing the information after content protection processing is carried out on the target object information of the related target category;
and displaying the returned information.
An electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
determining whether at least one of the communication participants belongs to a target user;
if yes, under the condition of sending or receiving the message according to the message sending request or the message receiving request, the related messages of the preset categories are subjected to content protection processing.
An electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
receiving a request to access a target system;
determining whether the login user is a target user;
if yes, the identity of the login user is confirmed whether the login user is the personal operation;
and determining whether the login user has the authority to access the target system or not according to the determination result.
According to the specific embodiments provided herein, the present application discloses the following technical effects:
according to the embodiment of the application, a browsing content protection function can be provided for the target user, and in the process of responding to the access request, if the content related to the target category is found, the browsing content protection can be carried out. Therefore, the situation that minors check information which is not suitable for the minors to check in the process of using other terminal equipment can be avoided, and the protection of browsing contents is effectively realized.
Of course, it is not necessary for any product to achieve all of the above-described advantages at the same time for the practice of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a schematic diagram of a system architecture provided by an embodiment of the present application;
FIG. 2 is a flow chart of a first method provided by an embodiment of the present application;
3-1 through 3-4 are schematic diagrams of user interfaces provided by embodiments of the present application;
FIG. 4 is a flow chart of a second method provided by embodiments of the present application;
FIG. 5 is a flow chart of a third method provided by embodiments of the present application;
FIG. 6 is a flow chart of a fourth method provided by embodiments of the present application;
FIG. 7 is a schematic diagram of a first apparatus provided by an embodiment of the present application;
FIG. 8 is a schematic diagram of a second apparatus provided by an embodiment of the present application;
FIG. 9 is a schematic diagram of a third apparatus provided by an embodiment of the present application;
FIG. 10 is a schematic diagram of a fourth apparatus provided by an embodiment of the present application;
fig. 11 is a schematic diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments that can be derived from the embodiments given herein by a person of ordinary skill in the art are intended to be within the scope of the present disclosure.
In the embodiment of the application, a corresponding solution is provided for realizing the network security protection of minors in the commodity object information service system. In this solution, a determination may be made of the target user, which may specifically be the user of the family member for whom the minor is present. Since the terminal device such as a mobile phone of the target user may be used by the minor, when providing the product object information to the client associated with the target user, the discrimination may be performed, and if the product object information of the target category (specifically, the product object information category related to minor protection) is involved, the browsing protection processing may be performed. There may be various methods for determining the target user, and there may also be various methods for performing the browsing protection processing, which are described in detail below by specific embodiments.
First, from the perspective of system architecture, referring to fig. 1, the embodiment of the present application may relate to a client and a server provided by a commodity object information service system, where the client is mainly used for being installed on a terminal device of a user or interacting with a user at a front end in a form of a web page. In the embodiment of the present application, the server may also be used to store information of a specific target user, identify a target commodity object type, perform specific browsing protection processing, and the like.
Example one
In the first embodiment, an information processing method is provided from the perspective of the foregoing server, and referring to fig. 2, the method may specifically include:
s201: determining target category information of a target object;
the target category in the embodiment of the present application may specifically refer to a commodity object information category related to minor protection, and for example, may specifically include a game rechargeable commodity, or a commodity that may cause personal injury to minor, such as a pesticide and a cutter, or a commodity of a finished product class, and the like. In specific implementation, a list of target categories may be preset, or a keyword list, an image feature library, and the like may be set for determination.
For example, in practical applications, a commodity object information service system usually has a relatively standard commodity object category system, which includes a primary category, a secondary category, a tertiary category, and so on. The setting can be performed by designating a specific category as a target category, in this case, only a list composed of information such as a category name and a number of the target category needs to be saved at the server, and then the server can determine whether a certain commodity object belongs to the target category according to the list.
Or, alternatively, some commodity objects may not have obvious category identification when released, and at this time, may be classified into "other" categories, but still include contents unsuitable for young people to browse, and therefore, the determination may also be made in the form of keywords or the like. Specifically, a keyword table may be preset, and if such a keyword appears in the content such as the title or text of a certain commodity object, it may be determined that it belongs to a target category that requires special processing.
In addition, whether a certain commodity object belongs to a target class which needs special treatment or not can be judged in a picture feature recognition mode. Specifically, when a specific commodity object is released, besides text description information such as a title and text content, a picture information is usually carried, and specifically, the picture information may be a commodity diagram, a usage mode schematic diagram, and the like. Some merchants may intentionally obscure category information of the commodity objects when publishing the commodity objects, or hide some sensitive words in titles or texts, so that whether the commodity objects belong to categories needing special processing cannot be determined through category identification or keyword identification, but the real content attributes of the commodity objects can be reflected from pictures such as commodity pictures. Therefore, for this case, a product image feature library may be set in advance, in which a plurality of image features may be stored, so that it is possible to determine whether or not a product object belongs to a target category that requires special processing by recognizing the image features of the picture associated with the product object.
Of course, in a specific implementation, the determination may be performed in a manner of combining multiple manners, and in addition, the determination may also be performed in other more manners, which are not listed here.
S202: determining whether the login user belongs to a target user;
in the embodiment of the application, after receiving the access request of the user, the condition of the login user can be judged firstly. The login user may specifically refer to a user logged in when the current access request is initiated. For example, if a default is that a mobile phone of a user a logs in a server of an application with the account name of the user a, the user a is the current login user for the server, regardless of whether the user a is accessing the application by himself or whether a child of the user a, etc., uses the mobile phone of the user a to access the application. Therefore, if the child or the like of the user a accesses the application using the mobile phone of the user a without performing special processing, there is a possibility that content which is not suitable for the access by minors is displayed.
The specific manner for judging whether the login user belongs to the target user may be various, wherein the target user may specifically refer to a user who includes minors among the family members. Of course, in practical applications, in some systems that allow minors to register for accounts, the target user may also refer to the minors user himself. In particular, the minor user himself/herself can be identified based on information such as age in the real-name authentication information, whereas the minor user who is present in the family member cannot be identified by the information registered or real-name authentication. For this reason, the embodiments of the present application provide corresponding authentication schemes. Specifically, one implementation manner may be that, according to the historical behavior record of the current login user, it is determined whether an minors exists in the family members of the current login user, and if yes, the user is determined as the target user.
That is, if there are minors in a family member of a user, the minors can be usually reflected in the historical behavior record, and the server can usually record the historical behavior information of the user, so that it can be determined whether there are minors in a family member of a user by analyzing the historical behavior record. The historical behavior record may include a historical purchasing behavior record, a record of historical browsing, collecting, paying attention, and the like, among others. For example, if a user frequently purchases a commodity object in the category of children's clothing, toys, etc., the user may have minors at home.
The foregoing manner is a passive manner for the user, and in another manner of determining whether the current login user belongs to the target user, the determination may be actively performed by the user, and specifically, whether the current login user is the target user may be determined according to the browsing protection configuration information associated with the current login user. In specific implementation, an operation entry for performing browsing protection configuration may be provided for a user, and if the user needs to perform browsing content protection, the configuration may be performed through the entry. For example, as shown in FIG. 3-1, the above-described portal may be provided in a "settings" interface of an application, such as "child browsing protection," or the like. The user can enter a specific configuration interface by clicking the entrance. The specifically configured content may simply configure the browse content protection function to an on state. That is, the user may determine whether to start the browsing content protection function by himself, and for the server, whether the current login user belongs to the target user may be determined according to whether the user actively starts the above function. Or, in another way, a specific category that needs to be protected may also be configured, for example, as shown in fig. 3-2, after entering a specific configuration interface, a plurality of selectable categories may also be provided, where the selectable categories may include each target category described in the foregoing step S201, and when the user performs configuration, part or all of the categories may be selected, so as to implement personalized configuration for different users.
Of course, in practical applications, some users may not actively discover the browsing content protection function, and may prompt or suggest the user to perform configuration if necessary. Specifically, if it is found that the current login user is not associated with the browsing protection configuration information, it may be first determined whether an minors exists in the family members of the user according to the historical behavior record of the current login user, and if so, a configuration interface for performing browsing protection configuration may be provided to the minors, so as to receive the configuration information. For example, if a user finds that the current login user purchased a commodity object such as children's shoes, clothes, etc. (as shown in fig. 3-3), it can roughly determine that there may be minors in his family members, and therefore, a configuration interface can be provided. Or, the recommendation may be performed in combination with the content currently being browsed by the user, specifically, after it is determined that minors may exist in the home of the currently logged-in user, the information currently being browsed by the currently logged-in user may be further determined, and if the information of the commodity object of the target category is being browsed, a configuration interface for performing browsing protection configuration may be provided, and the like. In a specific implementation, before providing the configuration interface, the user may first provide suggestion information for opening the browsing protection to the current login user, and after receiving a response to approve opening, provide the configuration interface for performing the browsing protection configuration. For example, as shown in fig. 3-4, after discovering that a certain user may have a minor at home and is browsing the information of the object, a recommendation message may be first given, for example, a specific case may be "e.g., your cell phone is frequently used by your child, it is recommended that the child browsing protection is turned on to avoid touching a baby that is not suitable for the child", and so on. Meanwhile, operation options such as 'go to start' and the like which indicate agreement to configure can be provided, and after the operation options are operated, a specific configuration interface can be jumped to.
S203: if yes, when returning the commodity object information, the browsing content protection processing is carried out on the commodity object information of the target category related to the commodity object information.
After determining that the current login user belongs to the target user, performing special processing, wherein the specific special processing may be that when returning the commodity object information, performing browsing content protection processing on the commodity object information of the target category involved in the commodity object information. For example, in one mode, if the commodity object information related to the target category is found, the identity of whether the user asks himself or herself to check the current login user may be confirmed, and after the confirmation is successful, the commodity object information of the target category may be returned.
In a specific implementation, the above processing may be performed for a plurality of access requests, for example, when an access request submitted by a user is a search request for a certain keyword, if the keyword searched for by the user is found to relate to a target category, the identity of the user may be confirmed, whether the user is currently logged in is determined to be operating by the user himself, if so, the search result may be continuously returned, and if not, the return of the search result may be rejected, or the search result may be filtered, commodity object information of the related target category may be filtered, and the search result may be returned. Or, if the access request submitted by the user is to access a selected commodity object, category, theme, channel, etc., if the commodity object, category, theme, or channel relates to a commodity object of a target category, the identity of the user initiating the access may also be confirmed, and it is determined whether the user is the user who logs in currently, if so, the operation is allowed to continue, otherwise, the operation may be rejected, or the content may be filtered, etc.
In addition, in practical applications, the server may also actively recommend some commodity object information to the user, for example, an access request initiated by a certain user is an access request to a home page of a certain application, and the home page includes a block for displaying recommendation information, where the block is used for displaying the commodity object information that the server actively recommends to the user. In this embodiment of the application, when providing recommendation information of a commodity object to the currently logged-in user, if the recommendation information relates to commodity object information of a target category, the commodity object information of the target category may be removed from the recommendation information. That is, because the server side is the information actively recommended to the user, when providing the information, as long as the current login user is found to belong to the target user, the commodity object information of the target category can be directly removed, and whether the current login user is operating by himself or herself does not need to be judged any more, so as not to affect the user experience.
In summary, according to the embodiment of the application, a browsing content protection function can be provided for a target user, and in the process of responding to an access request, if the content related to the target category is found, the browsing content protection can be performed. Therefore, the situation that minors check information which is not suitable for the minors to check in the process of using other terminal equipment can be avoided, and the protection of browsing contents is effectively realized.
Example two
The second embodiment corresponds to the first embodiment, and provides a commodity object information processing method from the perspective of a client, with reference to fig. 4, where the method may specifically include:
s401: receiving an access request and submitting the access request to a server;
s402: receiving information returned by the server, wherein the returned information comprises: under the condition that the login user is a target user, browsing the information after content protection processing is carried out on the target object information of the related target category;
s403: and displaying the returned information.
For the parts of the second embodiment that are not described in detail, reference may be made to the descriptions of the first embodiment, and details are not repeated here.
EXAMPLE III
The first and second embodiments described above are directed to browsing protection processing performed in a process in which a user accesses a target object through a page such as Web or H5. In practical applications, besides some information that is not suitable for minor viewing when browsing Web, H5, etc., some information that is not suitable for minor viewing may be involved in using some communication-type applications (e.g., instant communication-type applications). Therefore, in the third embodiment of the present application, with respect to the above scenario, another information processing method is provided, and referring to fig. 5, the method may specifically include:
s501: determining whether at least one of the communication participants belongs to a target user;
in the embodiment of the present application, the specific target user may also refer to a user with a minor in a family member, or may also refer to a minor user.
S502: if yes, under the condition of sending or receiving the message according to the message sending request or the message receiving request, the related messages of the preset categories are subjected to content protection processing.
Specifically, the message may refer to a communication message, and in a more specific embodiment, may refer to an instant communication message. That is, it may be a message that the user sends or receives during use of the instant messaging class of application. For such an instant messaging message, the included messages of the preset category may specifically include: text, picture, voice, audio or video message containing preset sensitive information, etc. The specific sensitive information may be preset, and include specific keywords, or feature images, and the like.
Specifically, when content protection processing is performed on a preset type of message related to the message, if the current target user is a minor user, the sending or receiving of the preset type of message may be directly refused. And if the family member has a user of a minor, identity confirmation of whether the target user operates for the user can be carried out, and if the confirmation fails, the preset type of message is refused to be sent or received. Specifically, when the identity of the target user is confirmed whether the user operates the target user personally, the identity can be confirmed by face recognition and the like, and details are not described here.
In short, according to the third embodiment, during the process of sending or receiving the message by the user, content protection processing can be performed on the preset type of message that may be contained in the message, so that some minors are prevented from being affected by some information that is not suitable for the minors to view.
Example four
In the fourth embodiment, the judgment on whether the login user belongs to the target user may also be applied to a system security scenario related to system access rights and the like. That is, for some systems, if the login user himself makes an initiated access request, it may be generally considered as secure and access may be allowed, but if the login user logs in the system with the identity of a certain user a, but the operator who specifically initiates the access is another person, it may cause leakage of private information, or some information that is not suitable for the operator to view is displayed, and so on. Therefore, in the fourth embodiment, when the user needs to access a certain target system, it is also possible to determine whether the user is a login user, and further determine whether the login user has the right to access the system. The authentication of the user is realized through the method, the privacy data of the user can be protected, or the influence of some bad information on minors and the like can be avoided.
Specifically, referring to fig. 6, a fourth embodiment of the present application further provides a system security processing method, which may specifically include:
s601: receiving a request to access a target system;
the target system may be set according to specific requirements, for example, an information system, a database system, and the like.
S602: determining whether the login user is a target user;
in the fourth embodiment, regarding the target user, it may also be a user who includes minors in family members, or a user who often shares the same device with others, or the like. The specific determination method for the former may be as described in the foregoing first embodiment, and for the latter, it may be determined whether users with different behavior characteristics operate the same device through a record of user operation behaviors of the same device, so as to determine whether a user often shares the same device with others, and so on.
S603: if yes, the identity of the login user is confirmed whether the login user is the personal operation;
if the current login user is found to belong to the target user, it is proved that the related information recorded in the target system by the login user is leaked or is not suitable for others to view. Therefore, it is possible to first confirm whether or not the login user is a personal operation. The specific confirmation method may be as described in the first embodiment, including performing judgment on the face image, and the like.
S604: and determining whether the login user has the authority to access the target system or not according to the determination result.
After the confirmation of whether the login user is the user's own operation is completed, it can be determined whether the login user has the right to access the target system. For example, if the operation is a self-operation, the target system can be accessed, otherwise, the right of accessing the target system is not provided, and the like.
Corresponding to the first embodiment, an embodiment of the present application further provides an information processing apparatus, and referring to fig. 7, the apparatus may specifically include:
a category information determination unit 701 for determining target category information of a target object;
a user judgment unit 702, configured to determine whether a login user belongs to a target user;
if so, the protection processing unit 703 is configured to perform browsing content protection processing on the target object information of the target category involved in the target object information when the target object information is provided to the target user.
In a specific implementation, the target object may include: a commodity object; correspondingly, the object categories include: a commodity object information category relating to minor protection; the target user includes: among the family members, there are users who are minors.
In a specific implementation, the user determination unit may specifically be configured to:
and judging whether minors exist in family members of the current login user or not according to the historical behavior record of the current login user, and if yes, determining the user as a target user.
Or, in another mode, the user determination unit may be further configured to:
and determining whether the current login user is a target user or not according to the browsing protection configuration information associated with the current login user.
In a specific implementation, the apparatus may further include:
the judging unit is used for judging whether minors exist in family members of the user or not according to the historical behavior record of the current login user if the current login user is not associated with the browsing protection configuration information;
and the configuration interface providing unit is used for providing a configuration interface for browsing protection configuration if the configuration interface exists, and is used for receiving the configuration information.
Specifically, the configuration interface providing unit may be specifically configured to:
and if the minors exist in the family members of the user and the commodity object information of the target category is browsed currently, providing a configuration interface for browsing protection configuration.
In addition, when implemented specifically, the apparatus may further include:
and the suggestion information providing unit is used for providing suggestion information for opening the browsing protection for the current login user, and providing a configuration interface for carrying out the browsing protection configuration after receiving a response of agreeing to opening.
Wherein, the configuration information further includes: specified category information needing browsing protection;
in this case, the protection processing unit may specifically be configured to:
and if the returned commodity object information relates to the commodity object information of the specified category, performing browsing content protection processing.
In addition, the method can also comprise the following steps:
and the selectable category information providing unit is used for providing configuration operation options according to the target category after receiving the browsing protection configuration operation request so as to select the specified category from the target category.
Specifically, the protection processing unit may be specifically configured to:
and if the target object information of the target category is related, performing identity confirmation on whether the login user operates for the user, and if the confirmation fails, performing filtering processing on the target object information of the target category.
Alternatively, the protection processing unit may be configured to:
when providing recommendation information of a target object to the login user, if the recommendation information relates to target object information of a target category, the target object information of the target category is removed from the recommendation information.
Corresponding to the second embodiment, an embodiment of the present application further provides an information processing apparatus, and referring to fig. 8, the apparatus may include:
a request submitting unit 801, configured to receive an access request and submit the access request to a server;
an information receiving unit 802, configured to receive information returned by the server, where the returned information includes: under the condition that the login user is a target user, browsing the information after content protection processing is carried out on the target object information of the related target category;
an information displaying unit 803, configured to display the returned information.
Corresponding to the three phases of the embodiment, the embodiment of the present application further provides an information processing apparatus, referring to fig. 9, the apparatus may specifically include:
a user determination unit 901 for determining whether at least one of the communication participants belongs to a target user;
a message content protection processing unit 902, configured to, if the message belongs to the target user, perform content protection processing on the related message of the preset category in the case of sending or receiving the message according to the message sending request or the message receiving request.
Wherein the message comprises an instant messaging message.
The preset category of messages includes: text, picture, voice, audio or video message containing preset sensitive information.
In a specific implementation, the target user includes: minor users;
the message content protection processing unit may specifically be configured to:
refusing to send or receive the preset type of messages.
Or, the target user includes: a user of a minor exists among the family members;
the message content protection processing unit may specifically be configured to:
and confirming whether the target user is operated by the user, and if the confirmation fails, refusing to send or receive the preset type of message.
Corresponding to the fourth embodiment, an embodiment of the present application further provides a system security processing apparatus, and referring to fig. 10, the apparatus may include:
a request receiving unit 1001 for receiving a request to access a target system;
a user judgment unit 1002, configured to determine whether a login user is a target user;
an identity confirmation unit 1003, configured to, if the user is the target user, perform identity confirmation on whether the login user is a personal operation;
a permission determining unit 1004, configured to determine whether the login user has permission to access the target system according to the determination result.
In addition, an embodiment of the present application further provides an electronic device, including:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
determining target category information of a target object;
determining whether the login user belongs to a target user;
if yes, under the condition of providing target object information to the target user, the target object information of the target category related to the target user is subjected to browsing content protection processing.
And another electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
receiving an access request and submitting the access request to a server;
receiving information returned by the server, wherein the returned information comprises: under the condition that the login user is a target user, browsing the information after content protection processing is carried out on the target object information of the related target category;
and displaying the returned information.
And another electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
determining whether at least one of the communication participants belongs to a target user;
if yes, under the condition of sending or receiving the message according to the message sending request or the message receiving request, the related messages of the preset categories are subjected to content protection processing.
And another electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
receiving a request to access a target system;
determining whether the login user is a target user;
if yes, the identity of the login user is confirmed whether the login user is the personal operation;
and determining whether the login user has the authority to access the target system or not according to the determination result.
Where fig. 11 illustrates an architecture of an electronic device, for example, device 1100 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, an aircraft, and the like.
Referring to fig. 11, device 1100 may include one or more of the following components: processing component 1102, memory 1104, power component 1106, multimedia component 1108, audio component 1110, input/output (I/O) interface 1112, sensor component 1114, and communications component 1116.
The processing component 1102 generally controls the overall operation of the device 1100, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing element 1102 may include one or more processors 1120 to execute instructions to perform all or a portion of the steps of the methods provided by the disclosed subject matter. Further, the processing component 1102 may include one or more modules that facilitate interaction between the processing component 1102 and other components. For example, the processing component 1102 may include a multimedia module to facilitate interaction between the multimedia component 1108 and the processing component 1102.
The memory 1104 is configured to store various types of data to support operation at the device 1100. Examples of such data include instructions for any application or method operating on device 1100, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 1104 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
A power component 1106 provides power to the various components of the device 1100. The power components 1106 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the device 1100.
The multimedia component 1108 includes a screen that provides an output interface between the device 1100 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1108 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 1100 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 1110 is configured to output and/or input audio signals. For example, the audio component 1110 includes a Microphone (MIC) configured to receive external audio signals when the device 1100 is in operating modes, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 1104 or transmitted via the communication component 1116. In some embodiments, the audio assembly 1110 further includes a speaker for outputting audio signals.
The I/O interface 1112 provides an interface between the processing component 1102 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 1114 includes one or more sensors for providing various aspects of state assessment for the device 1100. For example, the sensor assembly 1114 may detect the open/closed state of the device 1100, the relative positioning of components, such as a display and keypad of the device 1100, the sensor assembly 1114 may also detect a change in the position of the device 1100 or a component of the device 1100, the presence or absence of user contact with the device 1100, orientation or acceleration/deceleration of the device 1100, and a change in the temperature of the device 1100. The sensor assembly 1114 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 1114 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1114 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1116 is configured to facilitate wired or wireless communication between the device 1100 and other devices. The device 1100 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1116 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 1116 also includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the device 1100 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 1104 comprising instructions, executable by the processor 1120 of the device 1100 to perform the methods provided by the disclosed aspects is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the system or system embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described system and system embodiments are only illustrative, wherein the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The information processing method, the information processing apparatus, and the electronic device provided by the present application are introduced in detail, and a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, the specific embodiments and the application range may be changed. In view of the above, the description should not be taken as limiting the application.

Claims (26)

1. An information processing method characterized by comprising:
determining target category information of a target object;
determining whether the login user belongs to a target user;
if yes, under the condition of providing target object information to the target user, the target object information of the target category related to the target user is subjected to browsing content protection processing.
2. The method of claim 1,
the target object includes: a commodity object;
the object categories include: a commodity object information category relating to minor protection;
the target user includes: among the family members, there are users who are minors.
3. The method of claim 2,
the determining whether the login user belongs to the target user includes:
and judging whether minors exist in family members of the login user or not according to the historical behavior record of the login user, and if yes, determining the user as a target user.
4. The method of claim 2,
the determining whether the login user belongs to the target user includes:
and determining whether the login user is a target user or not according to the browsing protection configuration information associated with the login user.
5. The method of claim 4, further comprising:
if the login user is not associated with the browsing protection configuration information, judging whether minors exist in family members of the user or not according to the historical behavior record of the login user;
and if so, providing a configuration interface for browsing protection configuration for receiving the configuration information.
6. The method of claim 5,
the providing of the configuration interface for the browsing protection configuration comprises:
and if the minors exist in the family members of the user and the commodity object information of the target category is browsed currently, providing a configuration interface for browsing protection configuration.
7. The method of claim 5,
before providing a configuration interface for browsing protection configuration, the method includes:
and providing suggestion information for opening the browsing protection for the current login user, and providing a configuration interface for carrying out the browsing protection configuration after receiving a response of agreeing to open.
8. The method of claim 4,
the configuration information further includes: specified category information needing browsing protection;
the process of protecting the browsing content of the commodity object information of the target category, which is related to the commodity object information, comprises the following steps:
and if the returned commodity object information relates to the commodity object information of the specified category, performing browsing content protection processing.
9. The method of claim 8, further comprising:
and after receiving a browsing protection configuration operation request, providing configuration operation options according to the target category so as to select a specified category from the target category.
10. The method according to any one of claims 1 to 9,
the process of protecting the browsing content of the target object information of the target category involved in the process comprises the following steps:
and if the target object information of the target category is related, performing identity confirmation on whether the login user operates for the user, and if the confirmation fails, performing filtering processing on the target object information of the target category.
11. The method according to any one of claims 1 to 9,
the process of protecting the browsing content of the target object information of the target category involved in the process comprises the following steps:
when providing recommendation information of a target object to the login user, if the recommendation information relates to target object information of a target category, the target object information of the target category is removed from the recommendation information.
12. An information processing method characterized by comprising:
receiving an access request and submitting the access request to a server;
receiving information returned by the server, wherein the returned information comprises: under the condition that the login user is a target user, browsing the information after content protection processing is carried out on the target object information of the related target category;
and displaying the returned information.
13. An information processing method characterized by comprising:
determining whether at least one of the communication participants belongs to a target user;
if yes, under the condition of sending or receiving the message according to the message sending request or the message receiving request, the related messages of the preset categories are subjected to content protection processing.
14. The method of claim 13,
the message comprises an instant messaging message.
15. The method of claim 14,
the preset category of messages includes: text, picture, voice, audio or video message containing preset sensitive information.
16. The method of claim 13,
the target user includes: minor users;
the content protection processing of the related preset type messages includes:
refusing to send or receive the preset type of messages.
17. The method of claim 13,
the target user includes: a user of a minor exists among the family members;
the content protection processing of the related preset type messages includes:
and confirming whether the target user is operated by the user, and if the confirmation fails, refusing to send or receive the preset type of message.
18. A system security processing method is characterized by comprising the following steps:
receiving a request to access a target system;
determining whether the login user is a target user;
if yes, the identity of the login user is confirmed whether the login user is the personal operation;
and determining whether the login user has the authority to access the target system or not according to the determination result.
19. An information processing apparatus characterized by comprising:
a category information determination unit for determining target category information of the target object;
the user judging unit is used for determining whether the login user belongs to the target user;
and if so, performing browsing content protection processing on the target object information of the target category involved in the target object information under the condition of providing the target object information to the target user.
20. An information processing apparatus characterized by comprising:
the request submitting unit is used for receiving the access request and submitting the access request to the server;
an information receiving unit, configured to receive information returned by the server, where the returned information includes: under the condition that the login user is a target user, browsing the information after content protection processing is carried out on the target object information of the related target category;
and the information display unit is used for displaying the returned information.
21. An information processing apparatus characterized by comprising:
a user determination unit for determining whether at least one of the communication participants belongs to a target user;
and the message content protection processing unit is used for performing content protection processing on the related preset type messages under the condition of sending or receiving a message according to a message sending request or a message receiving request if the message belongs to the target user.
22. A system security processing apparatus, comprising:
a request receiving unit for receiving a request for accessing a target system;
the user judging unit is used for determining whether the login user is a target user;
the identity confirmation unit is used for confirming the identity of the login user for personal operation if the login user is the target user;
and the permission determining unit is used for determining whether the login user has the permission to access the target system according to the determination result.
23. An electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
determining target category information of a target object;
determining whether the login user belongs to a target user;
if yes, under the condition of providing target object information to the target user, the target object information of the target category related to the target user is subjected to browsing content protection processing.
24. An electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
receiving an access request and submitting the access request to a server;
receiving information returned by the server, wherein the returned information comprises: under the condition that the login user is a target user, browsing the information after content protection processing is carried out on the target object information of the related target category;
and displaying the returned information.
25. An electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
determining whether at least one of the communication participants belongs to a target user;
if yes, under the condition of sending or receiving the message according to the message sending request or the message receiving request, the related messages of the preset categories are subjected to content protection processing.
26. An electronic device, comprising:
one or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read and executed by the one or more processors, perform operations comprising:
receiving a request to access a target system;
determining whether the login user is a target user;
if yes, the identity of the login user is confirmed whether the login user is the personal operation;
and determining whether the login user has the authority to access the target system or not according to the determination result.
CN201910691262.XA 2019-07-29 2019-07-29 Information processing method and device and electronic equipment Pending CN112311732A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910691262.XA CN112311732A (en) 2019-07-29 2019-07-29 Information processing method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910691262.XA CN112311732A (en) 2019-07-29 2019-07-29 Information processing method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN112311732A true CN112311732A (en) 2021-02-02

Family

ID=74328993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910691262.XA Pending CN112311732A (en) 2019-07-29 2019-07-29 Information processing method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112311732A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113111954A (en) * 2021-04-20 2021-07-13 网易(杭州)网络有限公司 User category judgment method and device, storage medium and server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072039A1 (en) * 2009-09-22 2011-03-24 Tayloe Denise G Systems, methods, and software applications for providing an identity and age-appropriate verification registry
CN102214286A (en) * 2010-04-08 2011-10-12 鸿富锦精密工业(深圳)有限公司 Network content restricted browsing control system and method
CN106096366A (en) * 2016-06-08 2016-11-09 北京奇虎科技有限公司 A kind of information processing method, device and equipment
CN108345604A (en) * 2017-01-22 2018-07-31 阿里巴巴集团控股有限公司 Data processing method, recommends method and relevant device at searching method
CN109151203A (en) * 2018-08-31 2019-01-04 维沃移动通信有限公司 A kind of information cuing method and mobile terminal
CN110060413A (en) * 2019-04-03 2019-07-26 秒针信息技术有限公司 Method for selling and device, the storage medium and electronic device of article

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072039A1 (en) * 2009-09-22 2011-03-24 Tayloe Denise G Systems, methods, and software applications for providing an identity and age-appropriate verification registry
CN102214286A (en) * 2010-04-08 2011-10-12 鸿富锦精密工业(深圳)有限公司 Network content restricted browsing control system and method
CN106096366A (en) * 2016-06-08 2016-11-09 北京奇虎科技有限公司 A kind of information processing method, device and equipment
CN108345604A (en) * 2017-01-22 2018-07-31 阿里巴巴集团控股有限公司 Data processing method, recommends method and relevant device at searching method
CN109151203A (en) * 2018-08-31 2019-01-04 维沃移动通信有限公司 A kind of information cuing method and mobile terminal
CN110060413A (en) * 2019-04-03 2019-07-26 秒针信息技术有限公司 Method for selling and device, the storage medium and electronic device of article

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113111954A (en) * 2021-04-20 2021-07-13 网易(杭州)网络有限公司 User category judgment method and device, storage medium and server

Similar Documents

Publication Publication Date Title
US10003599B2 (en) Method and terminal device for kid mode
CN106547904B (en) Cross-account information sharing method and device
CN105068976B (en) Ticket information display method and device
CN106096964B (en) Payment method and device
EP3226128B1 (en) Method and device for online payment
CN106471513B (en) Authority control method and device
WO2018049610A1 (en) Permission control method and device
CN110413169B (en) Information display method, device and medium
CN106372943A (en) Message processing method and device
CN106611112A (en) Application program safe processing method, device and equipment
CN106960026B (en) Search method, search engine and electronic equipment
CN112311732A (en) Information processing method and device and electronic equipment
CN111368329B (en) Message display method and device, electronic equipment and storage medium
US10972395B2 (en) Method and device for granting and acquiring qualification
WO2018049611A1 (en) Permission control method and device
CN110489155B (en) Data file management method, device, electronic equipment and medium
CN109743441B (en) Read-write permission setting method and device
WO2021027709A1 (en) Page sharing method and apparatus, and electronic device
CN113590979A (en) License plate and gift-based social contact method, device, server, client, terminal and storage medium
CN105763428A (en) Information fraud prevention method based on user historical data
CN106168967A (en) Webpage information collection method, webpage information protection device and mobile terminal
CN107133531B (en) Application lock use reminding method and device
CN113660203B (en) Anchor account processing method, device and system, electronic equipment and storage medium
CN110768995B (en) Security verification method, device, system and storage medium
CN108574704B (en) APP suite sending method and device and APP suite recommending method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination