Protection method and device for privacy data of application program

An application and privacy data technology, applied in the field of data processing, can solve the problems of application privacy data leakage, easy to crack passwords, restricting users' right to access applications, etc., to improve security, protect private data, and avoid data intrusion. Effects of compatibility issues

Active Publication Date: 2014-10-15
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] but, figure 1 The prior art shown has the following disadvantages: this method directly limits the user's right to access the application, although others cannot know the user privacy data of the application at the first time, but this method clearly prompts others: "This application There are secrets inside, but a password is required to access”, this clear prompt can lead to the motivation of others to crack the password, and the password can be easily cracked by using the existing password cracking technology, which will lead to the leakage of the user’s private data of the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and device for privacy data of application program
  • Protection method and device for privacy data of application program
  • Protection method and device for privacy data of application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 2 It shows the implementation flow of the application privacy data protection method provided by the first embodiment. The application scenario of this method is applied to a terminal device with a normal space, and the normal space includes a corresponding user interface and a data storage area. The process The details are as follows:

[0031] In step S201, a private space is created.

[0032] In practical applications, a private space creation button or a private space creation instruction can be set in advance, and after receiving the user’s click on the private space creation button or the private space creation instruction, start to create a private space, including creating a private space The corresponding logo, user interface and data storage area, etc.

[0033] Wherein, at least one private space is created, and the application programs installed in each private space may be the same or different.

[0034] It should be noted that, in order to protect...

Embodiment 2

[0062] image 3 It shows the implementation flow of the application program privacy data protection method provided by the second embodiment. The application scenario of the method is applied to a terminal device including a normal space and a private space, and the normal space and the private space both contain corresponding user Interface and data storage area, wherein the user interface of the private space is the same as the user interface of the normal space, the data storage area of ​​the private space is different from the data storage area of ​​the normal space, and the process is described in detail as follows

[0063]In step S301, when installing the application program, install the application program in the private space and the normal space respectively, and store the relevant data of the installed application program in the data storage area of ​​the private space and the normal space respectively. The data storage area, and the icon of the installed application...

Embodiment 3

[0079] Figure 4 The structure of the application program privacy data protection device provided by the third embodiment of the present invention is shown, and for the convenience of description, only the parts related to the embodiment of the present invention are shown.

[0080] The application program privacy data protection device is applied to a terminal device (such as a mobile phone, a tablet computer, a handheld computer, a computer, etc.) containing a normal space, and the normal space includes a corresponding user interface and a data storage area.

[0081] The application program privacy data protection device includes a space creation unit 41 , a first determination unit 42 and an application program installation unit 43 . Among them, the specific functions of each unit are as follows:

[0082] A space creating unit 41, configured to create a private space, including creating a user interface and a data storage area corresponding to the private space, the created...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applied to the technical field of data processing, and provides a protection method and a protection device for the privacy data of an application program. The method comprises the following steps of creating a privacy space, wherein the privacy space comprises a corresponding user interface and a data storage area, and the user interface of the created privacy space is the same as that of a normal space; when the application program is installed, judging whether the application program is installed in the normal space or not; if the application program is installed in the normal space, installing the application program in the privacy space; if the application program is not installed in the normal space, installing the application program in the privacy space and the normal space respectively. According to the method and the device, the privacy data of the application program in a user terminal can be protected without a trace.

Description

technical field [0001] The invention belongs to the technical field of data processing, and in particular relates to a method and device for protecting privacy data of application programs. Background technique [0002] With the improvement of processing capabilities of terminal devices (such as smart phones, tablet computers, etc.) and the development of information technology, more and more application programs (APPs) run on terminal devices. Especially social applications such as WeChat, Weibo, Momo, etc., have attracted a large number of users, and users are keen to use such applications for communication. [0003] In the process of using the application program, there is a lot of private data in the user data of the application program, such as data such as contact information and chat records. Therefore, the ensuing privacy protection issues are becoming more and more important. For example, when a user is using a mobile phone, if the screen of the user's mobile phon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/53G06F21/60G06F17/30G06F8/61G06F21/51G06F21/6245
Inventor 陈勇齐雪生
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products