Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An encryption recommendation method, device, and terminal

A recommendation method and terminal technology, applied in the Internet field, can solve problems such as reducing the efficiency of user privacy files or privacy software, and achieve the effect of effective recommendation

Active Publication Date: 2016-08-10
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practical applications, users need to manually select privacy files or privacy software for encryption, so when the number of files or software increases, it will inevitably reduce the efficiency of users in selecting privacy files or privacy software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption recommendation method, device, and terminal
  • An encryption recommendation method, device, and terminal
  • An encryption recommendation method, device, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] The embodiment of the present invention discloses an encryption recommendation method, device, and terminal, which can quickly and effectively recommend encryption-encryptable privacy files or privacy software for users. Each will be described in detail below.

[0034] see figure 1 , figure 1 It is a flow chart of an encryption recommendation method disclosed in an embodiment of the present invention. in, figure 1 The described encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of Internet technology, and discloses an encryption recommendation method, device, and terminal. The method includes: scanning user operations on terminal software, and updating the frequency of use of the software; according to the frequency of use of the software in the terminal, obtaining The commonly used software collection of the terminal; determine the recommended encrypted privacy software in the commonly used software collection according to the privacy weight and frequency of use of the software in the commonly used software collection; or include: scanning the user's use of the terminal software; judging the privacy of the software Whether the weight is greater than or equal to the preset privacy weight threshold; if the privacy weight of the software is greater than or equal to the preset privacy weight threshold, check whether the use of the software generates corresponding files in the software directory; The corresponding files are recommended as encrypted privacy files. Implementing the embodiments of the present invention can quickly and effectively recommend encrypted private files or private software to users.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an encrypted recommendation method, device, and terminal. Background technique [0002] During the use of mobile phones and computers, users can encrypt some privacy files (such as photos, videos, text messages, etc.) or privacy software (such as social software, SNS software, etc.) to prevent these privacy files or privacy software from being Others use, which can effectively prevent privacy leakage. In practical applications, users need to manually select private files or privacy software for encryption, so when the number of files or software increases, it will inevitably reduce the efficiency of users in selecting private files or privacy software. Contents of the invention [0003] The embodiment of the present invention discloses an encryption recommendation method, device, and terminal, which can quickly and effectively recommend encryption-encryptable privacy file...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F21/604G06F21/6245G06F21/60
Inventor 李丹华林如蓝
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products