Privacy application management method and device, mobile terminal

An application management and privacy technology, applied in computer security devices, electronic digital data processing, program/content distribution protection, etc., can solve problems such as information leakage of private applications that cannot be guaranteed

Active Publication Date: 2017-09-05
BEIJING ANYUNSHIJI TECH CO LTD
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the privacy application hidden in the above method can still be called by other non-privacy applications, and there is no guarantee that the information contained in the privacy application will not be truly leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy application management method and device, mobile terminal
  • Privacy application management method and device, mobile terminal
  • Privacy application management method and device, mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0062] refer to figure 1 , which shows a flow chart of the steps of an embodiment of a privacy application management method according to the present invention, which may specifically include the following steps:

[0063] Step 101: Receive an instruction to add each application to the privacy application service, so as to add each application information to the privacy application list; the privacy application service is registered...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a privacy application management method and a privacy application management device, a mobile terminal. The method includes steps of adding application information to a privacy application list; shielding the privacy application in the privacy application list specific to the application process which has not the authority of accessing the privacy application in the privacy application list; encrypting data written by the application process or decrypting the data read by the application process specific to the application process which has the authority of accessing the privacy application in the privacy application list when the management process of the privacy service system is under an opening state; sending a message of calling a notice sending interface to the privacy application; when the management flow of the privacy service system is closed, filtering the message. The method and the device have the beneficial effects of systematically managing private application and differentially protecting the privacy application and non-privacy application.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to a privacy application management method and device and a mobile terminal. Background technique [0002] With the rapid development of terminal equipment technology, when mobile terminal equipment completes daily work, consumption or entertainment tasks, there are applications developed corresponding to the systems applicable to each terminal, including some applications involving user privacy information. Essential applications, such as payment applications in mobile terminals. [0003] In practical applications, when the user's family or friends access the user's mobile terminal, they may inadvertently access the user's private information through some privacy applications, causing unnecessary losses to the user. [0004] Usually, there are some methods for protecting applications containing user privacy information in mobile terminals. For example, users can h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/121G06F21/602
Inventor 魏伟刚郭辉
Owner BEIJING ANYUNSHIJI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products