Information collection method and terminal

A terminal and collection card technology, applied in instruments, digital data authentication, electronic digital data processing, etc., can solve the problems of no private collection, information exposure, lack of exclusivity of portable electronic devices, etc., to improve user experience and ensure security and the effect of stealth

Inactive Publication Date: 2018-07-20
SHANGHAI IUV SOFTWARE DEV CO LTD
6 Cites 0 Cited by

AI-Extracted Technical Summary

Problems solved by technology

However, the collected information is always scattered in different applications, and it is difficult to manage information in a unified manner; and the collection method is single, and the collection information and viewing collection information are not specific (that is, there is no private collection dedicated to users), making users Lack of sense of exclusivity to one's own por...
View more

Method used

Different collection modes enjoyed by identity information, and only predetermined users can carry out private collection, which brings a sense of exclusiveness to users; and users can collect target information in a private collection mode to ensure the safety and security of target information collection. Concealment improves user experience.
[0129] Another example: when the terminal judges whether the identity information conforms to the preset identity information, it may be executed by a judging module on the terminal; the modules used in other steps executed by the terminal will not be repeated here. Different collection methods are enjoyed through different identity information, and only predetermined users can carry out private collection, which brings a sense of exclusivity to users; and users can use private collection methods to collect target information to ensure the security and privacy of target information collection and ...
View more

Abstract

The invention relates to the technical field of intelligent terminals, in particular to an information collection method and a terminal. The method comprises the steps of acquiring a collection operation of a user for target information through a display page of the target information; verifying identity information of the user when the collection operation is acquired, and further activating twocollection modes including the normal collection mode and the private collection mode when the identity information conforms to preset identity information; when the identity information does not conform to the preset identity information, only activating the normal collection mode. Different collection modes are available through the identity information, only the predetermined user can conduct private collection, and a sense of exclusiveness is brought to the user; the user can collect the target information through the private collection mode, the security and privacy of collecting the target information are ensured, and the user experience is improved.

Application Domain

Digital data authenticationInput/output processes for data processing

Technology Topic

Internet privacyCollection methods

Image

  • Information collection method and terminal
  • Information collection method and terminal
  • Information collection method and terminal

Examples

  • Experimental program(1)

Example Embodiment

[0062] Please refer to figure 1 (I.e. 100 shown in the figure), figure 1 Is a schematic flowchart of an information collection method provided according to some embodiments of the present application;
[0063] Such as figure 1 As shown, the embodiment of the present application provides an information collection method, which is applied to a terminal, and the method includes:
[0064] Step S101: Obtain the user's favorite operation for the target information on the display page of the target information;
[0065] Step S102: When the favorite operation is obtained, the user's identity information is further obtained;
[0066] Step S103: Determine whether the identity information meets preset identity information;
[0067] If the identity information meets the preset identity information, step S104 is entered: normal collection mode and private collection mode are activated;
[0068] If the identity information does not meet the preset identity information, step S105 is entered: only the normal collection mode is activated;
[0069] Step S106: Identify the collection mode triggered by the collection operation;
[0070] Step S107: Collect the target information based on the collection mode triggered by the collection operation;
[0071] Wherein, the collection mode includes: the normal collection mode and the private collection mode.
[0072] Different collection methods can be enjoyed through identity information, and only predetermined users can perform private collection, which brings users a sense of exclusivity; and users can use private collection methods to collect target information to ensure the security and privacy of target information collection. Improved user experience.
[0073] As an optional embodiment, the method for collecting the target information based on the collecting mode triggered by the collecting operation includes:
[0074] Collect the target information based on the normal collection method; or,
[0075] Collect the target information based on a private collection method.
[0076] Please refer to figure 2 (Ie 200 shown in the attached picture), figure 2 It is a schematic flowchart of a method for collecting the target information based on a normal collection method provided by some embodiments of the present application;
[0077] Such as figure 2 As shown, as an optional embodiment, the method for collecting the target information based on a normal collecting method includes:
[0078] Step S201: Obtain the target information;
[0079] Step S202: Generate an information collection card based on the target information;
[0080] Step S203: Set the access authority of the information collection card to public.
[0081] Please refer to image 3 (Ie 300 shown in the attached picture), image 3 Is a schematic flowchart of a method for collecting the target information based on a private collection method provided by some embodiments of the present application;
[0082] Such as image 3 As shown, as an optional embodiment, the method for collecting the target information based on a private collection method includes:
[0083] Step S301: Obtain the target information;
[0084] Step S302: Generate an information collection card based on the target information;
[0085] Step S303: Set the access authority of the information collection card as private.
[0086] As an optional embodiment, the method for identifying the collection mode triggered by the collection operation includes:
[0087] When the identity information matches the preset identity information, identifying the operation mode of the collection operation;
[0088] If the operation mode is the first operation mode, determining that the collection mode triggered by the collection operation is the normal collection mode;
[0089] If the operation mode is the second operation mode, it is determined that the collection mode triggered by the collection operation is the private collection mode.
[0090] The first operation mode and the second operation mode refer to the operating characteristics of the necessary collection operation performed by the user for collecting the target information; the first operation mode and the second operation mode are distinguished by the different operation characteristics of the collection operation, and further Trigger the corresponding collection method to collect target information;
[0091] For example, the first operation mode can be: click the answer button for the first preset number of times (for example, 1 time); it will trigger to collect the target information in the normal collection mode;
[0092] The second operation mode may be: continuously clicking the answer button for a second preset number of times (for example, 2 times), then it triggers to collect the target information in a private collection mode;
[0093] For another example, the first operation mode may be: drag the collection button in the first preset direction (for example, to the right), which triggers the collection of target information in a normal collection mode;
[0094] The second operation mode can be: drag the collection button in the second preset direction (for example: up or down or top right or bottom right), it will trigger to collect the target information in a private collection mode;
[0095] In another example, the first operation mode may be: dragging or clicking the answer button with a first preset number of fingers (for example, 1 finger), which triggers the collection of target information in a normal collection mode;
[0096] The second operation mode may be: dragging or clicking the favorite button with a second preset number of fingers (such as 2 or 3 or 4 or 5 fingers), which triggers the collection of target information in a private collection manner. Aims to distinguish different operation modes through the operating characteristics of different user operations, and then trigger the corresponding collection method to collect target information;
[0097] The operation method can also use other methods: such as tapping, rotating, shaking, knuckles, etc. to distinguish different user operations to distinguish different answering methods; the above methods can be combined, such as dragging the favorite button as the first operation method, click The favorite button is the second operation mode; here is no longer an example one by one, other similar methods or variations should be regarded as the protection scope of the technical solution of this application.
[0098] As an optional embodiment, the method for identifying the collection mode triggered by the collection operation includes:
[0099] When the identity information does not conform to the preset identity information, it is determined that the collection mode triggered by the collection operation is a normal collection mode.
[0100] As an optional embodiment, the method for generating an information collection card based on the target information includes:
[0101] Pop up a favorite window; the favorite window is used to interact with the user;
[0102] The interactive content includes: copy, cut, share, input feature information, modify feature information, save, delete, etc.
[0103] Further obtain the characteristic information of the target information and display it in the collection window; the characteristic information includes: one or more of the subject, keywords, tags, information classification, access link, and user notes of the target information;
[0104] An information collection card containing the target information and the characteristic information is formed.
[0105] As an optional embodiment, the method for setting the access authority of the information collection card to be private includes:
[0106] Based on the preset identity information, the information collection card is encrypted and/or hidden, so as to restrict the access authority of the information collection card.
[0107] As an optional embodiment, the method further includes:
[0108] Trigger pushing at least one information collection card to the user according to the predetermined push rule or the user's call operation;
[0109] Wherein, the retrieval operation includes: the user inputs characteristic information through a search window to find an information collection card that matches the characteristic information;
[0110] Or the user triggers the terminal to retrieve at least one information collection card through one or more of clicking, touching, sliding, shaking, and voice.
[0111] As an optional embodiment, the method for pushing at least one information collection card to the user includes:
[0112] Identify the access rights of each information collection card;
[0113] If there is at least one information collection card whose access authority is public, at least one information collection card whose access authority is public is directly pushed to the user;
[0114] If there is at least one information collection card whose access authority is private, obtain the user's identity information and verify whether the identity information meets the preset identity information;
[0115] When the identity information does not conform to the preset identity information, hide at least one information collection card whose access authority is private, and/or push to the user at least one information collection card whose access authority is encrypted in a predetermined manner;
[0116] When the identity information conforms to the preset identity information, the concealment or encryption of at least one information collection card whose access authority is private is released and pushed to the user.
[0117] In order to better implement the above technical solutions, the embodiments of the present application also provide a terminal, and the terminal is configured to perform the following operations:
[0118] On the target information display page, obtain the user's favorite operation for the target information;
[0119] When the collection operation is obtained, the user's identity information is obtained;
[0120] Determine whether the identity information meets preset identity information;
[0121] If the identity information meets the preset identity information, activate the normal collection mode and the private collection mode;
[0122] If the identity information does not meet the preset identity information, only the normal collection method is activated;
[0123] Identify the collection method triggered by the collection operation;
[0124] Collecting the target information based on the collecting method triggered by the collecting operation;
[0125] Wherein, the collection mode includes: the normal collection mode and the private collection mode.
[0126] Among them, it should be noted that the terminal in this application, when performing different operations, can be executed through different virtual modules or physical modes or a combination of virtual modules and physical modes; among the different virtual modules and/or physical modules Can be connected to transfer data, such as instructions, signals, etc.
[0127] For example, when the terminal performs the collection operation of obtaining the user for the target information, it may be executed by the operation obtaining module on the terminal;
[0128] For another example: when the terminal executes the acquisition of the user's identity information, it can be executed by the identity information acquisition module on the terminal;
[0129] For another example, when the terminal executes the judgment whether the identity information meets the preset identity information, it can be executed by the judgment module on the terminal; the modules used in other steps executed by the terminal will not be repeated here. Different collection methods can be enjoyed through different identification information, and only predetermined users can perform private collection, which brings users a sense of exclusivity; and users can use private collection methods to collect target information to ensure the security and privacy of target information collection It improves the user experience.
[0130] As an optional embodiment, when collecting the target information based on the collecting method triggered by the collecting operation, the terminal is configured to perform the following operations:
[0131] Collect the target information based on the normal collection method; or,
[0132] Collect the target information based on a private collection method.
[0133] As an optional embodiment, when collecting the target information based on the normal collecting method, the terminal is configured to perform the following operations:
[0134] Obtain the target information;
[0135] Generating an information collection card based on the target information;
[0136] And set the access authority of the information collection card to public.
[0137] As an optional embodiment, when collecting the target information based on a private collection method, the terminal is configured to perform the following operations:
[0138] Obtain the target information;
[0139] Generating an information collection card based on the target information;
[0140] And set the access authority of the information collection card as private.
[0141] As an optional embodiment, when identifying the collection mode triggered by the collection operation, the terminal is configured to perform the following operations:
[0142] When the identity information matches the preset identity information, identifying the operation mode of the collection operation;
[0143] If the operation mode is the first operation mode, determining that the collection mode triggered by the collection operation is the normal collection mode;
[0144] If the operation mode is the second operation mode, it is determined that the collection mode triggered by the collection operation is the private collection mode.
[0145] The first operation mode and the second operation mode refer to the operating characteristics of the necessary collection operation performed by the user for collecting the target information; the first operation mode and the second operation mode are distinguished by the different operation characteristics of the collection operation, and further Trigger the corresponding collection method to collect target information;
[0146] For example, the first operation mode can be: click the answer button for the first preset number of times (for example, 1 time); it will trigger to collect the target information in the normal collection mode;
[0147] The second operation mode may be: continuously clicking the answer button for a second preset number of times (for example, 2 times), then it triggers to collect the target information in a private collection mode;
[0148] For another example, the first operation mode may be: dragging the favorite button in the first preset direction (for example, to the right), the target information is triggered in the normal favorite manner;
[0149] The second operation mode can be: drag the collection button in the second preset direction (for example: up or down or top right or bottom right), it will trigger to collect the target information in a private collection mode;
[0150] In another example, the first operation mode may be: dragging or clicking the answer button with a first preset number of fingers (for example, 1 finger), which triggers the collection of target information in a normal collection mode;
[0151] The second operation mode may be: dragging or clicking the favorite button with a second preset number of fingers (such as 2 or 3 or 4 or 5 fingers), which triggers the collection of target information in a private collection manner. Aims to distinguish different operation modes through the operating characteristics of different user operations, and then trigger the corresponding collection method to collect target information;
[0152] The operation method can also use other methods: such as tapping, rotating, shaking, knuckles, etc. to distinguish different user operations to distinguish different answering methods; the above methods can be combined, such as dragging the favorite button as the first operation method, click The favorite button is the second operation mode; here is no longer an example one by one, other similar methods or variations should be regarded as the protection scope of the technical solution of this application.
[0153] As an optional embodiment, when identifying the collection mode triggered by the collection operation, the terminal is configured to perform the following operations:
[0154] When the identity information does not conform to the preset identity information, it is determined that the collection mode triggered by the collection operation is a normal collection mode.
[0155] As an optional embodiment, when generating an information collection card based on the target information, the terminal is configured to perform the following operations:
[0156] A favorite window pops up; the favorite window is used to interact with the user;
[0157] Further acquiring the characteristic information of the target information and displaying it in the collection window; the characteristic information includes: one or more of the subject, keywords, tags, information classification, access link, and user notes of the target information;
[0158] An information collection card containing the target information and the characteristic information is formed.
[0159] As an optional embodiment, when the access permission of the information collection card is set to private, the terminal is configured to perform the following operations:
[0160] Based on the preset identity information, the information collection card is encrypted and/or hidden, so as to restrict the access authority of the information collection card.
[0161] As an optional embodiment, the terminal is further configured to perform the following operations:
[0162] Trigger pushing at least one information collection card to the user according to the predetermined push rule or the user's call operation;
[0163] Wherein, the retrieval operation includes: the user inputs characteristic information through a search window to find an information collection card that matches the characteristic information;
[0164] Or the user triggers the terminal to retrieve at least one information collection card through one or more of clicking, touching, sliding, shaking, and voice.
[0165] As an optional embodiment, when pushing at least one information collection card to the user, the terminal is further configured to perform the following operations:
[0166] Identify the access rights of each information collection card separately;
[0167] If there is at least one information collection card whose access authority is public, at least one information collection card whose access authority is public is directly pushed to the user;
[0168] If there is at least one information collection card whose access authority is private, obtain the user's identity information and verify whether the identity information meets the preset identity information;
[0169] When the identity information does not conform to the preset identity information, hide at least one information collection card whose access authority is private, and/or push to the user at least one information collection card whose access authority is encrypted in a predetermined manner;
[0170] When the identity information conforms to the preset identity information, the concealment or encryption of at least one information collection card whose access authority is private is released and pushed to the user.
[0171] This application aims to protect an information collection method and terminal. By displaying the target information page, the user's collection operation for the target information is obtained; and when the collection operation is obtained, the user's identity information is verified, and further the identity information When it meets the preset identity information, activate the normal collection method and the private collection method; when the identity information does not meet the preset identity information, only activate the normal collection method; different collection methods that can be enjoyed through the identity information , And only predetermined users can collect privately, which brings users a sense of exclusiveness; and users can collect target information in private collection to ensure the security and privacy of target information collection and improve user experience.
[0172] It should be noted that the above-mentioned embodiments are only used as examples, and the present application is not limited to such examples, but various changes can be made.
[0173] It should be noted that in this specification, the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements not only includes those elements , And also include other elements not explicitly listed, or elements inherent to this process, method, article or equipment. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other same elements in the process, method, article, or equipment including the element.
[0174] Finally, it should be noted that the above series of processing not only includes processing executed in time series in the order described here, but also includes processing executed in parallel or separately, rather than in time sequence.
[0175] A person of ordinary skill in the art can understand that all or part of the processes in the methods of the foregoing embodiments can be implemented by a computer program instructing relevant hardware. The program can be stored in a computer-readable storage medium. At this time, it may include the procedures of the above-mentioned method embodiments. Wherein, the storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM), etc.
[0176] The above-disclosed are only some preferred embodiments of this application, and cannot be used to limit the scope of rights of this application. A person of ordinary skill in the art can understand all or part of the process of implementing the above-mentioned embodiments and make the following according to the claims of this application. Equivalent changes still fall within the scope of the invention.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Containerization test method and system for reinforcement learning model

PendingCN113535555AGuaranteed security and privacyEnsure fairness
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Quantum random number high-speed encryption device and encryption method for Internet of Vehicles

PendingCN114554479AImprove data encryption efficiencyGuaranteed security and privacy
Owner:杭州舜时科技有限公司

Portable showering device

PendingCN107893551AGuaranteed security and privacyeasy to carry
Owner:创能邦(北京)科技有限公司

Physical examination data transmission and storage method

PendingCN111107529AGuaranteed security and privacy
Owner:GUANGDONG HEALTH ONLINE INFORMATION TECH

Permission transfer method and system for digital key offline condition of trusted execution environment

PendingCN113965328AGuaranteed security and privacyProtect against man-in-the-middle and replay attacks
Owner:SHANGHAI JIAO TONG UNIV

Classification and recommendation of technical efficacy words

  • Guaranteed security and privacy
  • Improve user experience

Medical data sharing method and device based on block chain

ActiveCN108600227AImprove data sharing efficiencyGuaranteed security and privacy
Owner:ZHONGAN INFORMATION TECH SERVICES CO LTD +1

Method and device for locking and unlocking handheld equipment

InactiveCN101866409AGuaranteed security and privacyEasy to use and remember
Owner:ZTE CORP

Visible light both-way communication system

InactiveCN105049119AGuaranteed security and privacyeasy to use
Owner:SUZHOU LUXCOM PHOTOELECTRIC TECH

Application program control method and device and client-side

InactiveCN103413082AGuaranteed security and privacyImprove user experience
Owner:BEIJING CHEETAH MOBILE TECH CO LTD +4

Mobile police terminal capable of effectively guaranteeing data security and using method thereof

ActiveCN104579664AGuaranteed security and privacyensure safety
Owner:CHENGDU GUOHENG INFORMATION SECURITY TECH

Method, device and equipment for displaying multiple application windows on mobile terminal

InactiveCN102968243AImprove information acquisition efficiency and ease of operationImprove user experience
Owner:SHENZHEN YUNYINGGU TECH CO LTD

Content recommending method and device based on user characteristics

ActiveCN101957834AFacilitate the dissemination of informationImprove user experience
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products