Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for protecting privacy information and mobile terminal

A private information and mobile terminal technology, applied in the field of authority control, can solve the problems of leaking mobile phone user privacy and personal private information, and achieve the effect of improving security and protecting personal private information

Inactive Publication Date: 2014-03-12
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These malicious applications run in the background covertly, and obtain private information of mobile phone users, such as text messages, contacts, call records, etc., without the user being aware of it; these malicious applications can run in the background and automatically obtain the user's private information information, and send the user's private information to an illegal provider (SP, Service Provider), so that the privacy of the mobile phone user will be leaked
[0004] It can be seen that due to the current lack of control over the function authority of the malicious application software in the mobile phone that involves the user's private information, the user has leaked personal privacy information without noticing it.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting privacy information and mobile terminal
  • Method for protecting privacy information and mobile terminal
  • Method for protecting privacy information and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The basic idea of ​​the present invention is: the mobile terminal generates a privacy information security control strategy according to the configuration file of the preset privacy information security control strategy; When it comes to the function of information, according to the authority use control policy of the function used in the privacy information security control policy, the authority of the function involving personal privacy information used by the application software is controlled.

[0033] Wherein, the privacy information security control strategy is, the specific functions that need to be controlled corresponding to the functions related to personal privacy information recorded by the mobile terminal under different trust levels, and the authority usage of the functions related to personal privacy information Control Strategy;

[0034] The authority use control policy is an authority control method for using any function involving personal privacy info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a method for protecting privacy information, including: a mobile terminal generating a privacy information security control policy according to a preset privacy information security control policy configuration file; when detecting that an application software uses a function involving personal privacy information defined in the privacy information security control policy, the mobile terminal controlling the right of the function involving personal privacy information used by the application software according to a right to use control policy of the function used in the privacy information security control policy. Also at the same time disclosed is a mobile terminal. The present invention can be applied to control the right of the invoke function involving user personal privacy information and thus protect the personal privacy information about the mobile terminal user.

Description

technical field [0001] The invention relates to the authority control technology in a mobile terminal, in particular to a method for protecting private information and a mobile terminal. Background technique [0002] Mobile terminals such as mobile phones have entered the era of intelligence, and various application software can be installed and run on mobile phones to improve the convenience of mobile phone users. [0003] At present, among the application software installed and running on mobile phones, there are more and more malicious application software implanted to maliciously steal user privacy information. These malicious applications run in the background covertly, and obtain private information of mobile phone users, such as text messages, contacts, call records, etc., without the user being aware of it; these malicious applications can run in the background and automatically obtain the user's private information information, and send the user's private informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/667H04M1/725H04M1/72463
CPCH04W12/02
Inventor 雷明剑王巍徐立锋古幼鹏钟声胡炜
Owner ZTE CORP