Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protecting method for privacy information and mobile terminal of protecting method

A privacy information and mobile terminal technology, applied in the privacy information protection method and the field of mobile terminals, can solve threats to user property safety, infringement of user portrait rights and privacy rights, leakage, and even being used or published by people with ulterior motives, etc. To prevent the leakage of personal privacy, avoid material loss or mental loss, and protect privacy and property safety

Inactive Publication Date: 2017-01-04
VIVO MOBILE COMM CO LTD
View PDF8 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the mobile phone is lost or peeped by others, the above-mentioned private information may be leaked, or even used or posted on the Internet by people with ulterior motives, which may infringe on the user's portrait rights and privacy rights, or threaten the user's property security, and then cause serious damage to the user. Users bring irreparable material loss and spiritual loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protecting method for privacy information and mobile terminal of protecting method
  • Protecting method for privacy information and mobile terminal of protecting method
  • Protecting method for privacy information and mobile terminal of protecting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] Please refer to figure 1 , is a schematic flowchart of the first embodiment of the privacy information protection method of the present invention, the method is applied to a mobile terminal, including:

[0024] Step 11: Receive a multimedia file generation instruction input by the user.

[0025] In this step, the multimedia files include all user files that can be applied on the mobile terminal, such as pictures (including photos), audio, and video. The in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of mobile communication and provides a protecting method for privacy information and a mobile terminal of the protecting method. According to the protecting method, privacy information detection is carried out on a multimedia file input to the mobile terminal by a user, the privacy information is output in a secret mode, personal privacy in the multimedia file can be effectively prevented from being leaked, the privacy safety and property safety of the user are guaranteed, the material loss or the mind loss is avoided, and the user can use the mobile terminal more safely and relaxedly.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method for protecting private information and a mobile terminal thereof. Background technique [0002] In today's information society, the application of mobile terminals is becoming more and more extensive, and has an increasingly close relationship with the lives of ordinary people. When people use their mobile phones for information interaction and communication every day, they often have a large number of pictures, audio, and video files input into their mobile phones, which may include personal photos and videos that they do not want outsiders to see, or include in these files Personal private information, such as mobile phone numbers, ID card numbers, user names and passwords for various accounts, etc. Once the mobile phone is lost or peeped by others, the above-mentioned private information may be leaked, or even used or posted on the Internet by people with ulterior...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F2221/2125
Inventor 李璟王学明陈立志
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products