User information protection method and device

A user information and protection device technology, which is applied in the fields of digital data protection, generation of response errors, and error detection of data due to redundancy in operations, can solve problems such as poor user information protection methods, and achieve poor solutions. , the effect of flexible protection

Inactive Publication Date: 2016-05-11
ZTE CORP
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a user information protection method and device, which solves the problem that the existing user information protection methods are less effective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User information protection method and device
  • User information protection method and device
  • User information protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Looking at the development of software technology in recent years, many software companies have developed corresponding security models. Such as blacklist, password, iris, fingerprint, private contacts and so on. However, as people's requirements for information protection are refined, these functions appear to be relatively simple, and the existing technical solutions cannot meet the needs of users.

[0038] In order to solve the above problems, embodiments of the present invention provide a user information protection method and device. Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0039] First, Embodiment 1 of the present invention will be described with reference to the accompanying drawings.

[0040] The embodiment ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user information protection method and device, relates to the field of mobile communication, and solves the problem of poor effect of a traditional user information protection way. The method comprises the following steps: when a situation that a mobile terminal meets a condition of triggering a disguise mode is detected, extracting a preset disguise scheme; according to the disguise scheme, generating disguise information corresponding to the true information of the mobile terminal, wherein the disguise information is stored in a disguise information database; and using the disguise information database to replace a true information database which stores true information. The technical scheme provided by the invention is suitable for an intelligent mobile terminal and realizes the flexible protection of user information.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a user information protection method and device. Background technique [0002] With the development of current smart terminals, more and more people pay more and more attention to the privacy of user information. User information is continuously leaked through various channels, such as background upload, violent viewing, third-party software monitoring and so on. A large amount of user information is exposed, and personal privacy is violated. [0003] Looking at the development of software technology in recent years, many software companies have developed corresponding security models. Such as blacklist, password, iris, fingerprint, private contacts and so on. However, as people's requirements for information protection are refined, these functions appear to be relatively simple and crude. Contents of the invention [0004] The invention provides a user informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F11/14
Inventor 王梁磊
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products