Unlock instant, AI-driven research and patent intelligence for your innovation.

An information management method and terminal equipment

A terminal device and information management technology, applied in the field of communication, can solve the problems of unable to unbind, unable to protect user privacy, and difficult for users to remember which applications are bound, so as to achieve the effect of protecting privacy and improving user experience

Active Publication Date: 2019-06-28
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When there are too many applications in use, it is difficult for the user to remember which applications are bound, and even if the user uninstalls the application, they cannot unbind
In this way, the user cannot effectively complete the corresponding operations for the application, the user experience cannot be improved, and the user's privacy cannot be protected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information management method and terminal equipment
  • An information management method and terminal equipment
  • An information management method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Such as image 3 As shown, the first embodiment of the present invention proposes an information management method, including:

[0031] Step 301: Obtain a login request for the first application; wherein, the login request includes at least a login account;

[0032] Step 302: Generate account binding information for the first application based on the login account in the login request;

[0033] Step 303: Detecting the first operation for the first application;

[0034] Step 304: Based on the account binding information of the first application, generate an unbinding request for the first application, and perform unbinding processing based on the unbinding request.

[0035] Here, the first application may be an application that needs to use a login account to log in to a corresponding server.

[0036] Wherein, the login account may be account information used by the user when registering the first application.

[0037] Obtaining the login request for the first applic...

Embodiment 2

[0053] Such as image 3 As shown, the first embodiment of the present invention proposes an information management method, including:

[0054] Step 301: Obtain a login request for the first application; wherein, the login request includes at least a login account;

[0055] Step 302: Generate account binding information for the first application based on the login account in the login request;

[0056] Step 303: Detecting the first operation for the first application;

[0057] Step 304: Based on the account binding information of the first application, generate an unbinding request for the first application, and perform unbinding processing based on the unbinding request.

[0058] Here, the first application may be an application that needs to use a login account to log in to a corresponding server.

[0059] Wherein, the login account may be account information used by the user when registering the first application.

[0060] Obtaining the login request for the first applic...

Embodiment 3

[0093] Such as image 3 As shown, the first embodiment of the present invention proposes an information management method, including:

[0094] Step 301: Obtain a login request for the first application; wherein, the login request includes at least a login account;

[0095] Step 302: Generate account binding information for the first application based on the login account in the login request;

[0096] Step 303: Detecting the first operation for the first application;

[0097] Step 304: Based on the account binding information of the first application, generate an unbinding request for the first application, and perform unbinding processing based on the unbinding request.

[0098] Here, the first application may be an application that needs to use a login account to log in to a corresponding server.

[0099] Wherein, the login account may be account information used by the user when registering the first application.

[0100] Obtaining the login request for the first applic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information management method and terminal equipment. The method comprises that a login request aimed at a first application is obtained; the login request comprises a login account at least; based on the login account in the login request, account binding information aimed at the first application is generated; a first operation aimed at the first application is detected; and based on the account binding information of the first application, a binding release request aimed at the first application is generated, and binding is released on the basis of the binding release request.

Description

technical field [0001] The invention relates to management technology in the field of communication, in particular to an information management method and terminal equipment. Background technique [0002] At present, almost all Internet applications need to bind some commonly used information when registering, such as mobile phone number or email address, etc., and the operation of unbinding is generally hidden and difficult to complete, which brings more serious problems to users' personal information and privacy. big risk. When there are too many apps in use, it is difficult for the user to remember which apps are bound, and even if the user uninstalls the apps, they cannot unbind them. In this way, the user cannot effectively complete the corresponding operation for the application, the user experience cannot be improved, and the privacy of the user cannot be protected. Contents of the invention [0003] In view of this, the main purpose of the present invention is to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0815H04L63/083H04L67/025
Inventor 管小鹏
Owner NUBIA TECHNOLOGY CO LTD