Data protecting method and device
A data protection and data technology, applied in the field of information security, can solve the problems of reducing the data viewing efficiency in the terminal and increasing the user operation path, so as to reduce the operation path and improve the reading efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0027] First embodiment
[0028] The first embodiment of the present invention provides a data protection method, which can be executed by the above-mentioned mobile terminal 1 to protect data in the mobile terminal 1. Specific examples of the mobile terminal 1 include, but are not limited to, handheld computers, mobile phones, personal digital assistants or other similar computing devices.
[0029] The above-mentioned data protection method is described in detail below in conjunction with specific embodiments as follows:
[0030] figure 2 A flowchart of the data protection method provided in the first embodiment, the data protection method includes the following steps:
[0031] Step S1, when receiving a request from an application to read data, it is determined whether the data complies with a pre-created privacy rule;
[0032] Step S2, if the data conforms to the privacy rule, an interface for inputting verification information is displayed;
[0033] Step S3, receiving the input veri...
Example
[0059] Second embodiment
[0060] In order to improve the efficiency of judging whether the data conforms to the privacy rule in step S1 of the first embodiment, it is avoided that every time the data needs to be read, the created privacy rules must be checked one by one, so as to find the privacy rules that the data conforms to Or prove that the data does not comply with any privacy rules, see Image 6 As shown, the second embodiment of the present invention provides a data protection method. Compared with the data protection method of the first embodiment, the method further includes before the step S1:
[0061] In step S1.1, when data input is received, it is determined whether the data conforms to a certain privacy rule, and if so, the data is stored, and a mark corresponding to the conformed privacy rule is set for the data. For example, when a call is received, it is judged whether the call history of the caller complies with a certain privacy rule, and if so, the information...
Example
[0063] The third embodiment
[0064] According to the data protection method provided in the second embodiment to protect data, the user is required to enter correct verification information to allow the application to read the data, which can prevent people who do not have the right to access the data from accessing the data, but cannot prevent some users Unwanted applications, such as some malicious programs that steal user privacy, read the data.
[0065] To further solve the above problems and improve data security, please refer to Figure 7 , Figure 8 with Picture 9 As shown, the third embodiment of the present invention provides a data protection method. Compared with the data protection method of the second embodiment, before the step of allowing the application to read the data in step S4, the method further includes:
[0066] Step S4.1: It is judged whether the application has the read permission of the type of the data. If not, end the process, if yes, allow the applicat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap