Method and device for protecting user behavior at operating terminal

A behavioral and user-based technology, applied in the field of communication, can solve problems such as manual deletion of data, and achieve the effect of flexible data protection

Inactive Publication Date: 2010-10-20
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method for protecting the user's operation terminal behavior, aiming at solving the problem of hiding the relevant application data and The data that has been generated by specific applications must be manually deleted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting user behavior at operating terminal
  • Method and device for protecting user behavior at operating terminal
  • Method and device for protecting user behavior at operating terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0017] In the embodiment of the present invention, a series of policy libraries are preset, including a preset or custom "trigger switching policy library" for switching to protection mode, a preset or custom "operation target policy library" for specific protected applications or behaviors " and the "handling plan policy library" that presets or customizes actions for protection and processing of specific applications or behaviors. Whether the current operation behavior or the application that the system is running is the preset operation behavior or application in the "Operation Target Policy Lib...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention, applicable to the technical field of communication, provides a method and a device for protecting the user behavior at an operating terminal. The method comprises the following steps: receiving an inputted instruction for entering an operating behavior protection mode, and controlling a terminal to enter the operating behavior protection mode according to the instruction, wherein the instruction for entering the operating behavior protection mode is particularly one instruction or the combination of various instructions preset in a triggering / switching strategy library for switching the terminal to the operating behavior protection mode; detecting the current operating behavior of a user or the application run by a system; and carrying out the corresponding protection treatment on the current operating behavior of the user of the application run by the system according to the treatment mode preset in the treatment scheme strategy library when the behavior or application preset in an operating target strategy library is operated by the user and run by the system. Accordingly, the invention can carry out the personalized data protection on the operating behavior of the user and various applications run by the system, thus ensuring higher expandability and flexibility.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a method and a device for protecting the behavior of a user operating a terminal. Background technique [0002] Existing terminals, such as mobile communication terminals, generally first set a specific contact in the address book as a private contact, and then perform related applications (such as information, call records, mail, etc.) according to the specific contact's phone number and email address. , Speed ​​Dial, etc.) data in the relevant phone number (or email address) information for private hiding. [0003] The existing technology mainly focuses on specific private contacts (phone numbers, email addresses), and hides the data of related applications by strongly associating phone numbers and email addresses. In addition, the data that has been generated by specific applications must be manually deleted. Guarantee user privacy. Contents of the inventi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/72448H04M1/72463
Inventor 郦伟强
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products