Mobile terminal privacy protection method and device

A privacy protection and mobile terminal technology, applied in the field of information identification, can solve the problems that identification methods cannot classify private content, etc., and achieve the effect of flexible access and flexible private content

Inactive Publication Date: 2013-01-30
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF3 Cites 89 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the above problems, the present invention provides a mobile terminal privacy protection method, which aims to solve the technical problem that the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal privacy protection method and device
  • Mobile terminal privacy protection method and device
  • Mobile terminal privacy protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] figure 1 The flow of the mobile terminal privacy protection method provided by the first embodiment of the present invention is shown, and only the parts related to the embodiment of the present invention are shown for convenience of description.

[0021] The mobile terminal privacy protection method provided in this embodiment includes the following steps:

[0022] Step S101, assigning corresponding access levels to the content requiring privacy protection according to requirements.

[0023] In real life, there are situations where different users can see the corresponding privacy protection content, such as the problem of family photos mentioned in the background technology above, users and their family members can see their own family photos, but the family members cannot see the user’s private photos. In order to achieve this purpose, in this step, it is necessary to assign a corresponding access level to each content that needs privacy protection, so that users wi...

Embodiment 2

[0030] figure 2 The flow of the mobile terminal privacy protection method provided by the second embodiment of the present invention is shown, and only the parts related to the embodiment of the present invention are shown for convenience of description.

[0031] The mobile terminal privacy protection method provided in this embodiment includes the following steps:

[0032] Step S201, assigning corresponding access levels to the content requiring privacy protection according to requirements.

[0033] This step is the same as step S101 in the first embodiment, and will not be repeated here.

[0034] Step S202, assigning a user account in the database to each user with the right to use the mobile terminal, and at the same time collect the user's biometric features and add them to the corresponding user account.

[0035] In the embodiment of the present invention, after setting the access level of the access content, it is necessary to establish a user account database, and es...

Embodiment 3

[0046] image 3 The structure of the mobile terminal privacy protection device provided by the third embodiment of the present invention is shown, and only the parts related to the embodiment of the present invention are shown for convenience of description.

[0047] The mobile terminal privacy protection device provided in this embodiment includes:

[0048] An access level setting unit 301, configured to assign a corresponding access level to the content requiring privacy protection according to requirements;

[0049] A database establishment unit 302, configured to establish a user account database, which includes biometric features of each user and corresponding access rights;

[0050] The content display processing unit 303 is configured to identify the biometric feature of the current user and obtain corresponding access rights by searching the database, and display content corresponding to the access level according to the access rights.

[0051] Each functional unit 3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the technical field of information identification, and provides a mobile terminal privacy protection method and device. The method comprises the following steps of: enduing a content needing privacy protection with a corresponding access level as required; establishing a user account database, wherein the database contains a biological feature of each user and a corresponding access authority; and identifying the biological feature of a current user, searching the database to obtain the corresponding access authority, and displaying the content of the corresponding access level according to the access authority. According to the technical scheme of the invention, the content needing privacy protection in a mobile terminal is endued with a corresponding access level, the access authority is distributed to each user having the access authority of the mobile terminal, and each user can watch the content of the corresponding level of the access authority, thereby realizing the flexible access to the privacy content.

Description

technical field [0001] The invention belongs to the technical field of information identification, and in particular relates to a mobile terminal privacy protection method and device. Background technique [0002] Biometric identification technologies, such as fingerprint identification and facial recognition, are widely used in the field of identification. For example, in computer power-on authentication, it is possible to verify whether the current user is a legitimate user by collecting fingerprints or facial images. The specific implementation process is as follows. When the computer is turned on, the user's fingerprint information or facial image information is used and stored. When the user turns on the computer and enters the login window, the user puts his finger on the computer's fingerprint collector, or the computer's camera automatically adopts the user's facial image information. By comparing the collected fingerprints or facial images with the pre-stored inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
Inventor 曾元清高尚秀
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products