Unlock instant, AI-driven research and patent intelligence for your innovation.

A user data protection method and terminal

A user data and terminal technology, applied in the electronic field, can solve problems such as insufficient user data security, and achieve the effect of improving security

Active Publication Date: 2017-10-27
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above two ways to protect user data are not secure enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user data protection method and terminal
  • A user data protection method and terminal
  • A user data protection method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] Please refer to figure 1 , figure 1 It is a schematic flowchart of a user data protection method provided in the first embodiment of the present invention. As shown in the figure, the method in the embodiment of the present invention includes:

[0044] S101. When an operation instruction by a user on a terminal is detected, determine a domain environment in which the terminal is currently running.

[0045] In specific implementation, the syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a user data protection method. The method comprises: when an operation instruction of a user on a terminal is detected, determining a currently-running domain environment of the terminal; prompting, according to the currently-running domain environment, the user to perform data verification according to an operation process corresponding to the currently-running domain environment, and determining the data verification result; and when it is determined that the data verification result is that the verification is passed, entering a private mode of the terminal, user data in the private mode being in a hidden state in other working modes. Also disclosed is a user data protection terminal. By using embodiments of the present invention, the security of user data protection can be improved.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method for protecting user data and a terminal. Background technique [0002] With the rapid development of society, there are more and more user data, so the security of user data in the terminal is also higher and higher. In the existing technical solutions, the system can have multiple domains, and different domain environments can operate in isolation, and different user data can be stored in different domains. Multiple domains include security domains, and users can use different authority accounts to log in to different domains. Domain, and put important user data in the security domain, only the owner of the device has permission to enter, and users who log in with other accounts are guests, and visitors can only access data in other domains; or, users can set privacy in the terminal. mode, put important user data in private mode, the user data in private mode is no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/31G06F21/32
CPCG06F21/31G06F21/32G06F21/62
Inventor 刘东海许奕波吴殿清汪智勇
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD