Privacy space processing method and privacy space processing device

An information processing device and privacy technology, which is applied in the field of network information security, can solve problems such as cumbersome system attribute setting process, user privacy information hidden setting, and user inconvenience, so as to improve business experience, simplify cumbersome operations, and improve security. Effect

Inactive Publication Date: 2016-04-06
BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since it can only be done with the help of software such as PC and iTunes, for an environment without a PC or with a PC but without software such as iTunes insta

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy space processing method and privacy space processing device
  • Privacy space processing method and privacy space processing device
  • Privacy space processing method and privacy space processing device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] The first embodiment is a method for processing privacy space.

[0025] figure 1 It is a schematic flowchart of a method for processing a privacy space provided by an embodiment of the present invention. See figure 1 , The process includes:

[0026] Step 101: Set the attribute to a hidden privacy zone, and set non-input access password information for the privacy zone, and construct a mapping table corresponding to the privacy zone and the non-input access password information;

[0027] In this step, the content in the privacy space includes but is not limited to: user's private information, applications, materials, pictures, videos, etc. Data files include but are not limited to: applications, pictures, etc.

[0028] The set privacy zone can be one, and in subsequent applications, all data files that need to be privacy protected are put into this privacy zone. In the embodiment of the present invention, in order to prevent other users from knowing all the data files that the...

Example Embodiment

[0119] The second embodiment is a privacy space processing device.

[0120] image 3 It is a schematic structural diagram of a privacy space processing device provided by an embodiment of the present invention. See image 3 , The device includes: a privacy zone setting module, a mapping table building module, a data file setting module, and an access authority control module, where:

[0121] Privacy zone setting module, used to set the attribute as a hidden privacy zone;

[0122] In the embodiment of the present invention, there are one or more privacy zones.

[0123] As an optional embodiment, storage path information for identifying the location of the privacy zone can also be set. Multiple privacy areas may correspond to the same storage path information, or may correspond to different storage path information, which can be specifically set according to the actual needs of the user.

[0124] A mapping table construction module, configured to set non-input access password informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy space processing method and a privacy space processing device, wherein the privacy space processing method mainly comprises the steps of setting a privacy area of which the attribute is concealed, setting non-input accessing password information for the privacy area, constructing a correspondence mapping table between the privacy area and the non-input accessing password information, selecting a data file and placing the data file into the set privacy area; monitoring and acquiring user operation information, determining a fact that the user operation information matches the non-input accessing password information in the constructed mapping table, displaying and accessing the privacy area which is mapped by the non-input accessing password information; and when a fact that the user cancels accessing of the data file in the privacy area is monitored, hiding the privacy area. The privacy space processing method and the privacy space processing device provided by the technical solution of the invention can further improve privacy space accessing safety.

Description

[0001] Technology category [0002] The invention relates to the technical field of network information security, in particular to a method for processing a private space and a corresponding private space processing device. Background technique [0003] Smart terminal equipment refers to equipment with multimedia functions, which can support audio, video, and data transmission. By adopting an open operating system, the corresponding application program (Application) is loaded by the launcher of the operating system to realize the corresponding application. function, providing a platform for application program operation and content services, so that a large number of value-added business applications, such as taxi, ordering, making friends, video, news, weather, traffic, commodities, application downloads, music and picture downloads, etc. can be based on this platform accomplish. [0004] With the development of communication technology, especially 3G and 4G communication te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 韩秦杨磊张霓张锦晓
Owner BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products