Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting privacy of users

A user privacy and user technology, applied in the field of Internet social networking and communication, can solve problems such as increasing the possibility, reducing the willingness of the message sender to use, and being cumbersome.

Inactive Publication Date: 2016-12-14
黄宁
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] WeChat users can post dynamics including text, pictures and videos in the "Moments" for the corresponding contacts to view. The dynamics have no time limit and will not disappear automatically after the corresponding time limit, that is, under the default setting, After the news is released, it will be visible to all the contacts in the WeChat address book. All the contacts here include all the contacts in the WeChat address book when the news is released, and also include the contacts newly added to the WeChat address book after the news is released. People, there is a problem at this time: when the news is released, no matter whether the publisher has subjective intention or not, the contact person who can see the news at this point in time is specific, and the publisher is also aware of this, but As time changes, the range of contacts that can be seen in the news is blurred. For example, contacts who are newly added to the WeChat address book after the news is released can also see the news. At this time, a news release may appear The privacy of the author is exposed, because when the publisher publishes the news, he cannot accurately predict who the new contacts in the WeChat address book are after the news is released, and it is impossible to judge whether the news has exposed his privacy to the public. Contacts added in WeChat address book
In this case, the privacy of comments and replies is lower, and lower than that in WeChat, which is not conducive to protecting privacy
[0010] The news in WeChat Moments can exist for a long time and can be viewed by the corresponding user, unless the publisher actively deletes it or sets the news that can be selected as a "secret photo" to "Set as a secret photo", delete the news and " The operation of "Set as a secret photo" needs to be carried out one by one, and cannot be operated in batches, which is cumbersome, and not all forms of dynamics can be "set as a secret photo", so these designs have limitations in terms of privacy protection
[0011] Momo users’ postings can exist for a long time and be viewed by corresponding users, unless the publisher actively deletes them. The operation of deleting posts needs to be done one by one, and cannot be operated in batches, which is more cumbersome. Therefore, these designs are in terms of privacy protection has limitations
[0012] WeChat users can view or listen to the text, emoticons, and voice messages sent by WeChat users in private chats or group chats for a long time after they are received. This long-term service based on WeChat can theoretically be permanent, that is, when the message is sent Afterwards, both the sender and the receiver can permanently view or listen to the message, unless they choose to delete it, but this deletion operation will not affect the other party to view or listen to the message. The message can be viewed or listened to for a long time, increasing It increases the possibility of using these messages in various ways and for various purposes, and reduces the degree of privacy protection of the sender and receiver of the message and the people involved in the message; starting from a certain version of WeChat, the sender can be in the message Use the "Withdraw" function to withdraw the message within 2 minutes after sending. If the message is successfully withdrawn, neither the sender nor the receiver of the original message can view or listen to the message, which protects the sender and receiver of the message and the message to a certain extent. However, since the operation time limit is only 2 minutes, and each message must be operated separately, this increases the difficulty of successfully withdrawing the message and reduces the willingness of the message sender to withdraw the message in the actual operation process. There are significant limitations in terms of privacy protection
[0013] Momo users can view or listen to the text, emoticons, and voice messages for a long time after they are received in private chats or group chats. This situation is similar to that of WeChat, and its privacy protection disadvantages are similar to WeChat; Momo’s message withdrawal function is also similar to WeChat’s, and the time limit for the withdrawal operation is about 2 minutes. Its limitations in privacy protection are similar to WeChat’s; since a certain version, Momo has added the “burn after reading” function , the message sent by using this function has a time limit, which is a kind of protection for privacy, but in terms of specific operation, you must select this function item every time when using this function, and this function only works on a single message. If each message uses the "burn after reading" function, you must first choose to use this function once when sending each message, which reduces the willingness of the message sender to use it in actual operation and has a great impact on privacy protection. limitations, and this function only works on picture messages, which is also one of the limitations of this function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029]Embodiment 1: download and install the social and communication software described in the present invention on the client, client comprises mobile phone, panel computer, notebook computer and desktop computer, starts and registers account number, uses this account number as user identity after successful registration Login, the user interface of social and communication software includes stranger address book, social circle, regular address book, life circle, enter the stranger address book, you can use the location function to search for other nearby users who use the social and communication software, these users It is the contact in the stranger's address book. You can view the distance information of the contact in the stranger's address book. You cannot view the avatar and nickname information independently set by the contact in the stranger's address book. Identify the identities of the contacts, select one of the contacts, send messages to them for chatting, send t...

Embodiment 2

[0030] Embodiment 2: download and install the social and communication software described in the present invention on the client, client comprises mobile phone, panel computer, notebook computer and desktop computer, starts and registers account number, uses this account number as user identity after successful registration Log in, choose to import contacts from the mobile phone address book, other users of the social and communication software who have successfully imported several mutually stored mobile phone numbers are contacts in the regular address book, and the contacts in the regular address book imported from the mobile phone address book are displayed The avatar and nickname information, does not display the distance information; other steps are the same as in embodiment 1.

Embodiment 3

[0031] Embodiment 3: download and install the social and communication software described in the present invention on the client, client comprises mobile phone, panel computer, notebook computer and desktop computer, starts and registers account number, uses this account number as user identity after successful registration Log in, choose to import contacts from WeChat address book, and successfully import several other users of the social and communication software who are WeChat friends as contacts in the regular address book, and display the contacts in the regular address book imported from the WeChat address book The avatar and nickname information, does not display the distance information; other steps are the same as in embodiment 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of internet social and communication and discloses a method for protecting privacy of users. The method is characterized in that a user interface of social and communication software comprises a stranger address book, a social circle, a general address book and a life circle; autonomously arranged correlation information of contact persons in the stranger address book is not displayed; location information of the contact persons in the general address book is not displayed; dynamic concrete contents issued in the social circle and the life circle can be known and commented only after corresponding contact persons send applications and the applications are agreed by issuers, and if the issuers reply to the comments, a private chat mode is automatically switched to; the dynamic states issued by users automatically disappear after corresponding duration; messages issued when a private chat or group chat is carried out by the users automatically disappear under corresponding conditions; the distance information of the users participating in the group chat is not displayed, and the autonomously arranged correlation information of the corresponding users is not displayed; and the contact persons in the general address book can be imported from an external address book. Through application of the method, the privacy of the users can be effectively protected.

Description

technical field [0001] The invention relates to the field of social networking and communication on the Internet, in particular to a method for protecting user privacy. Background technique [0002] Currently, social networking and communication on the Internet are widely used, and consequently, there are many problems in protecting user privacy. [0003] According to the information released by Tencent "http: / / www.tencent.com / zh-cn / at / abouttencent.shtml, August 26, 2016; http: / / weixin.qq.com, August 26, 2016 ", WeChat is a "mobile social and communication service" provided by Tencent, and is a "mobile phone application used by more than 700 million people", "As of the fourth quarter of 2015,...the combined monthly active accounts of WeChat and WeChat reached 697 million .” According to the information published by Momo Technology “http: / / www.immomo.com / aboutus.html, August 26, 2016”, “‘Momo’ is a product launched by Momo Technology in August 2011. Location-based mobile so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04M1/725H04M1/2745
CPCH04M1/27453H04M1/72406H04M1/72454H04M1/72463H04L51/222H04L51/52
Inventor 黄宁
Owner 黄宁
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products