A method for protecting privacy information of users and a terminal

A user privacy, user technology, applied in the field of communication, can solve problems such as privacy information leakage

Active Publication Date: 2016-11-16
THUNDER SOFTWARE TECH
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, when the smart phone is lent or lost by others, other people can freely access any information in the phone, and can also change some information, so there is a hidden danger of privacy information being leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for protecting privacy information of users and a terminal
  • A method for protecting privacy information of users and a terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0059] The embodiment of the present invention discloses a method and a terminal for protecting user's private information, so as to prevent other people from freely accessing the information in the terminal and modifying certain information, thereby protecting the private information of the user in the terminal from being leaked.

[0060] see figure 1 , a flow chart of a method for protecting user privacy information disclosed in an embodiment of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for protecting privacy information of users and a terminal. The method comprises the steps of setting different screen unlocking passwords for different using users of a terminal; by matching a screen unlocking password input by a user and the screen unlocking passwords corresponding to owner users and guest users, judging whether an operating system is switched to the owner user mode or guest user mode; when it is needed to switch the operating system from the owner user mode to the guest user mode, performing a first presetting operation including setting file reading / writing permission on related data generated when the operating system is in the owner user mode, hiding database files of to-be-protected applications, and backing up system setting data to encrypt the privacy information of a user. Therefore, when a terminal is operated by others, by performing the first operation, the others cannot visit information in the terminal and modify some information freely, so that the privacy information of a user in the terminal can be protected against leakage.

Description

technical field [0001] The present invention relates to the field of communication technology, and more specifically, to a method and terminal for protecting user privacy information. Background technique [0002] The Android operating system is widely used in smart phones due to its free, open and easy-to-operate features. At present, the functions of smart phones are already very complete. People no longer use them only as communication tools, but more often use smart phones to watch videos, play games, navigate, shop, chat and so on. [0003] When people use these functions of smart phones, many applications are usually set to automatically log in, for example: WeChat, QQ, Alipay, etc. Therefore, when the smart phone is lent or lost by other people, other people can access any information in the phone at will, and can also change some information, so there is a hidden danger of privacy information being leaked. Contents of the invention [0004] In view of this, the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04M1/725
CPCG06F21/6245H04M1/724
Inventor 肖雷万永川
Owner THUNDER SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products