Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal and method for protecting user privacy information

A technology for user privacy and private information, which is applied in the field of information security of mobile terminals and can solve problems such as leakage of users' personal privacy information.

Inactive Publication Date: 2017-03-15
NUBIA TECHNOLOGY CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing methods of keeping secrets of users' personal privacy information are often operating methods such as setting lock screen passwords on mobile phones, setting Bomi folders, and recording encryption; however, when users are forced to hand over mobile phone unlocking passwords , which will result in the disclosure of users’ personal privacy information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and method for protecting user privacy information
  • Terminal and method for protecting user privacy information
  • Terminal and method for protecting user privacy information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] The method for protecting user privacy information provided by the present invention can be implemented on a terminal for protecting user privacy information, wherein the terminal can include mobile phones, smart phones, notebook computers, digital broadcast receivers, personal digital assistants (PDAs), Mobile terminals such as tablet computers (PAD), portable multimedia players (PMP), navigation devices, etc.

[0075] If the mobile terminal has an operating system, the operating system can be UNIX, Linux, Windows, Mac OSX, Android, Windows Phone, and the like.

[0076] Application software (Application, APP) is a third-party application program for smart terminals. Users can use various application software for office work, entertainment, and information acquisition. The formats include ipa, pxl, deb, apk, etc. Format.

[0077] image 3 It is a flow chart of Embodiment 1 of the method for protecting user privacy information in the present invention, as shown in im...

Embodiment 2

[0101] Figure 4 It is a flow chart of Embodiment 2 of the method for protecting user privacy information in the present invention, as shown in Figure 4 As shown, the method for protecting user privacy information provided by the embodiment of the present invention is applied on a mobile phone, and the method may include the following steps:

[0102] Step 401, judging whether the current user account status is the same user account status.

[0103] The mobile phone determines whether the current user account status is the same user account status, that is, determines whether the current user account status is the same user account status or two or more user account statuses, and if the current user account status is not the same user account status, then execute step 402 ; If the current user account status is the same user account status, execute step 403.

[0104] Step 402 , end the current task, and return to step 401 .

[0105] The mobile phone ends the current process...

Embodiment 3

[0126] Figure 7 It is a schematic structural diagram of a terminal embodiment for protecting user privacy information in the present invention, as shown in Figure 7 As shown, the terminal 07 for protecting user privacy information provided by the embodiment of the present invention includes: a setting module 71 and a loading module 72; wherein,

[0127] The setting module 71 is used to set the host mode and the unlock password of the host mode, at least one visitor mode and the unlock password of the corresponding visitor mode under the same user account status;

[0128] The loading module 72 is configured to load the owner data in the owner memory partition when the current unlock password is the unlock password of the owner mode, and when the current unlock password is the unlock password of the guest mode, Loading guest data in the guest memory partition;

[0129] Wherein, the owner memory partition is isolated from the guest memory partition; the owner data includes ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal for protecting user privacy information. The terminal comprises the steps of a setting module which is used for setting an owner mode, an unlocking cipher of the owner mode, at least one visitor mode and the corresponding unlocking cipher of the visitor mode in the same user account state; and a loading module which is used for loading owner data in an owner memory partition when the current unlocking cipher is the unlocking cipher of the owner mode, and loading the visitor data in a visitor memory partition when the current unlocking cipher is the unlocking cipher of the visitor mode, wherein the owner memory partition and the visitor memory partition are isolated, the owner data comprises applications installed by an owner and the privacy information of the owner, and the visitor data comprises the applications installed by a visitor and the privacy information of the visitor. The invention also discloses a method for protecting the user privacy information. Through application of the terminal and the method, the user personal privacy information can be effectively protected and the privacy is prevented from being leaked.

Description

technical field [0001] The invention relates to the technical field of information security of mobile terminals, in particular to a terminal and a method for protecting user privacy information. Background technique [0002] With the advancement of technology, the functions of mobile phones are becoming more and more powerful, and the functions are becoming more and more abundant. Personal privacy information of users is often saved on mobile phones, for example, including call records, contacts, text messages, photos and videos and other very sensitive privacy information. information. [0003] Existing methods of keeping secrets of users' personal privacy information are often operating methods such as setting lock screen passwords on mobile phones, setting Bomi folders, and recording encryption; however, when users are forced to hand over mobile phone unlocking passwords , which will result in the disclosure of users' personal privacy information. Contents of the inven...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/67H04M1/725
CPCH04M1/67H04M1/72448
Inventor 赵朋勃杜宏伟张淑燕
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products