Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for protecting user privacy and terminal

A user privacy and terminal technology, applied in the direction of internal/peripheral computer component protection, instruments, digital data authentication, etc., can solve the problems of poor user privacy protection, improve practicability and practicality, good privacy protection experience, and realize fast The effect of protection

Inactive Publication Date: 2016-03-30
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve the problem that the terminal has poor protection for user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting user privacy and terminal
  • Method for protecting user privacy and terminal
  • Method for protecting user privacy and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0046] The terminal in the embodiment of the present invention may include a smart phone (such as an Android phone, an iOS phone, a Windows Phone, etc.), a tablet computer, a handheld computer, a notebook computer, a mobile Internet device (MID, MobileInternetDevices) or a wearable device, etc., and the above-mentioned terminal only It is an example, not exhaustive, including but not limited to the above-mentioned terminals.

[0047] Please refer to figure 1 , is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for protecting user privacy and a terminal. The method comprises the steps that the current working state of the terminal is detected; if the terminal is currently in a using state or a bright screen state, whether other users are close to the terminal or not is monitored; if it is monitored that other users are close to the terminal, the terminal is controlled to enter a using stopping state or a dark screen state. By means of the method, the confidentiality and safety of the terminal for user privacy can be improved, and the user experience can be improved.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a method for protecting user privacy and a terminal. Background technique [0002] With the rapid development of smart terminals, smart terminals, such as mobile phones or tablet computers, can provide more and more help in life, work, entertainment and other aspects of users. In many scenarios or applications, the use of terminals will involve people's various information and privacy, such as private chat messages, financial information in banking applications, and so on. Especially in public places, when users use terminals, how to protect personal privacy safely and conveniently has become a problem that users are particularly concerned about. [0003] In the prior art, when a user uses a terminal, in order to protect privacy, he usually observes by himself, and when he finds someone close to watching his terminal screen, he quickly presses the shortcut lock screen ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/84G06F21/32G06F3/14
CPCG06F21/84G06F3/14G06F21/32G06F2221/2125
Inventor 黄宏用
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD