Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection implementing method and device

A privacy protection and privacy data technology, applied in digital data protection, computer security devices, special data processing applications, etc., can solve problems such as cumbersome operations, inability to hide privacy data, inability to make calls and surf the Internet, and achieve automatic protection. Effect

Active Publication Date: 2015-02-25
HUAWEI DEVICE CO LTD
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing technology provides some privacy protection methods. For example, if the guest mode is set on the mobile terminal, after the user turns on the guest mode, some functions of the mobile terminal will be hidden, and calls and Internet access cannot be made, so the guest mode also blocks mobile Part of the basic functions of the terminal are relatively restrictive and need to be opened by the user; in addition, the existing technology also provides an application hiding method to set the application to be hidden in the mobile terminal. However, this is only for the application. It is impossible to hide the private data of the contacts stored in the mobile terminal; Specifying files to be encrypted, however, this prior art needs to set up different protection objects separately, the operation is cumbersome, and it is not possible to unify the different types of data of the specified contacts, such as call records, images, videos, recordings, etc. make quick settings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following description will be made in conjunction with the accompanying drawings and specific implementation manners.

[0037] see figure 1 , figure 1 It is a flow chart of an embodiment of the method for implementing privacy protection in this application. In this embodiment, implementing the privacy protection method includes the following steps:

[0038] Step S101: The mobile terminal obtains the data type of the target private data of the pre-protected target contact according to the user input instruction.

[0039] The mobile terminal stores a contact list locally, and provides an interface for setting privacy protection for different data types. When the user inputs an instruction to set privacy protection for at least one data type through the interface, the mobile terminal takes the contact selected by the user as the pre-protected target contact, and obtains the target contact of the target contact according to the instruction input by the user. The dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection implementing method and device. The method includes: according to a command entered by a user, acquiring the type of target privacy data of a target contact to be protected; according to feature data of the target contact, searching for target privacy data matching with the feature data and belonging to the data type; subjecting the target privacy data to privacy setting. The feature data is used for identifying the target privacy data of the target contact. In this way, the privacy protection implementing method and device allows the different types of privacy data of the target contacts to be self-protected, and operating is simple and convenient.

Description

technical field [0001] The present application relates to the technical field of computer security protection, in particular to a method and device for realizing privacy protection. Background technique [0002] As a communication tool, mobile terminals have become an indispensable part of people's daily life. The mobile terminal usually records the living situation of the user, especially the contact situation with surrounding friends. For some special contacts, the user may not want others to see information related to the contact on the mobile terminal, such as call records, short messages, images and videos. [0003] The existing technology provides some privacy protection methods. For example, if the guest mode is set on the mobile terminal, after the user turns on the guest mode, some functions of the mobile terminal will be hidden, and calls and Internet access cannot be made, so the guest mode also blocks mobile Part of the basic functions of the terminal are relat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/60
CPCG06F21/602G06F21/6245G06F16/43
Inventor 司马经华龙志明王细勇汪运斌
Owner HUAWEI DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products