Unlock instant, AI-driven research and patent intelligence for your innovation.

Data access method and terminal

A data access and terminal technology, used in digital data authentication, electrical digital data processing, instruments, etc., can solve the problems of cumbersome access to private content, inability to view and modify information, etc., to protect privacy, easy to remember, and ensure security. Effect

Active Publication Date: 2019-01-22
NUBIA TECHNOLOGY CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Nowadays, people pay more and more attention to the protection of private information. As an important tool in people's daily life, mobile phones store a lot of information closely related to users, including a lot of private information. People generally use passwords to protect these information. , when accessing private information, the user needs to enter a password, and only when the password is verified can the private information be viewed smoothly, otherwise, the information cannot be viewed and modified
[0003] However, if the user has a lot of private information, the user needs to set passwords for these private information, and memorizing and managing these passwords becomes a big burden for the user.
If users have to enter a password every time they access a piece of private information, it will become very cumbersome for users to access private content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method and terminal
  • Data access method and terminal
  • Data access method and terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0053] refer to figure 1 , the first embodiment of the data access method of the present invention includes:

[0054] Step 100: setting a privacy password according to the privacy level;

[0055] First, the user sets one or more privacy passwords on the terminal device, where each privacy password corresponds to a privacy level. When the privacy level increases for the first time, the higher the level, the higher the authority of the corresponding privacy password.

[0056] The terminal equipment can be mobile terminals such as mobile phones, tablet computers, notebook computers, etc., and can also be desktop computers or other fixed terminal equipment, as long as these terminal equipment include screens and password settings can be carried out in them, no longer here repeat.

[0057] Step 110: Setting a private information list; wherein the private information list includes access data corresponding to the privacy level;

[0058] Wherein, the access data specifically incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data access method. The method comprises the following steps: setting a private password according to a privacy level; setting a private information list, wherein the private information list comprises access data corresponding to the privacy level; associating the private password with the corresponding privacy information list. The invention further discloses a data access terminal. By adopting the method and the terminal, the privacy of a user can be protected, the trouble of frequent inputting of a password is avoided for the user, the user can remember the password conveniently, and the security of privacy is ensured.

Description

technical field [0001] The invention relates to the field of data access, in particular to a data access method and terminal. Background technique [0002] Nowadays, people pay more and more attention to the protection of private information. As an important tool in people's daily life, mobile phones store a lot of information closely related to users, including a lot of private information. People usually use passwords to protect these information. , when accessing private information, the user needs to enter a password, and only when the password is verified can the private information be viewed smoothly, otherwise, the information cannot be viewed and modified. [0003] However, if the user has a lot of private information, the user needs to set passwords for these private information respectively, and memorizing and managing these passwords becomes a big burden for the user. If the user has to input a password every time a piece of private information is accessed, it wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46
CPCG06F21/6209
Inventor 刘帅
Owner NUBIA TECHNOLOGY CO LTD