Privacy security assessment method and device, computer equipment and readable storage medium

A privacy security and computer program technology, applied in the direction of digital data protection, etc., can solve problems such as different evaluation standards, inability to objectively reflect the privacy and security level of devices or applications, and inaccurate evaluation results of privacy and security of devices or applications. To achieve the effect of improving accuracy

Pending Publication Date: 2022-04-15
SHENZHEN TCL NEW-TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the increasing awareness of the importance of personal privacy information, many countries and regions have issued relevant regulations to regulate the use of users' personal privacy information by devices and applications. For the privacy risk assessment of devices or applications, the common way is to use Manual questionnaires are used to obtain user feedback data based on the use of equipment or applications, and determine the privacy and security assessment results of equipment or applications based on user feedback data. User feedback data is subjective, and different users have different evaluation standards , cannot objectively reflect the true privacy and security level of the device or application, resulting in inaccurate assessment results of the privacy and security of the device or application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy security assessment method and device, computer equipment and readable storage medium
  • Privacy security assessment method and device, computer equipment and readable storage medium
  • Privacy security assessment method and device, computer equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0045] Embodiments of the present application provide a privacy security assessment method, device, computer equipment, and computer-readable storage medium. The privacy security evaluation apparatus can be integrated in computer equipment, and the computer equipment can be a server or a terminal or other equipment.

[0046] Wherein, the terminal may include a mobile phone, a wearable smart device, a tablet computer, a notebook computer, a personal computer (PC, Personal Computer), and a vehicl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a privacy security assessment method and device, computer equipment and a readable storage medium. The method comprises the following steps: acquiring assessment interview data for a to-be-assessed object; performing privacy security detection on the to-be-evaluated object to obtain a privacy information set acquired by the to-be-evaluated object; performing data security detection on the to-be-evaluated object to obtain a security detection result of the to-be-evaluated object; and comparing the privacy information set and the security detection result with evaluation interview data to obtain a personal privacy influence evaluation result of the to-be-evaluated object. According to the scheme, the privacy security detection and the data security detection are performed on the to-be-evaluated object, and the detection result is compared with the evaluation interview data, so that the personal privacy influence evaluation result of the to-be-evaluated object is determined, the privacy security of the to-be-evaluated object can be automatically evaluated, and the evaluation efficiency of the privacy security of the to-be-evaluated object is improved. And the accuracy of privacy security evaluation is improved.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a privacy security assessment method, device, computer equipment and readable storage medium. Background technique [0002] With the increasing awareness of the importance of personal privacy information, many countries and regions have issued relevant regulations to regulate the use of users' personal privacy information by devices and applications. For the privacy risk assessment of devices or applications, the common way is to use Manual questionnaires are used to obtain user feedback data based on the use of equipment or applications, and determine the privacy and security assessment results of equipment or applications based on user feedback data. User feedback data is subjective, and different users have different evaluation standards , cannot objectively reflect the true privacy and security level of the device or application, resulting in inaccurate a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
Inventor 黎明德
Owner SHENZHEN TCL NEW-TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products