Check patentability & draft patents in minutes with Patsnap Eureka AI!

User data access control method, device and computer-readable storage medium

A technology for access control equipment and user data, applied in computer security devices, computing, digital data authentication, etc., can solve problems such as user privacy data leakage, and achieve the effect of avoiding leakage

Active Publication Date: 2020-05-01
宁波万德高科智能科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When many applications are started, the mobile phone system framework will pop up a prompt box according to the application permissions of the application, prompting the user whether to authorize the application to access its private data. If the user refuses to authorize the application, the application will automatically exit. If If the user chooses to authorize the application, the user's private data may be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User data access control method, device and computer-readable storage medium
  • User data access control method, device and computer-readable storage medium
  • User data access control method, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only to facilitate description of the present invention and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.

[0030] Terminals may be implemented in various forms. For example, the terminals described in the present invention may include mobile phones, tablet computers, notebook computers, palmtop computers, personal digital assistants (Personal Digital Assistant, PDA), portable media players (Portable Media Player, PMP), navigation devices, portable Mobile terminals such as wearable devices, smart bracelets, and pedometers, and fixed terminals such as digital TVs and desktop computers.

[0031] In the following description, a mobile terminal will be ta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user data access control method and equipment and a computer readable storage medium. The user data access control method comprises the following steps of: when an application applies an authority to access user data, obtaining an instruction indicting whether a user authorizes the application to access the user data; and when the user indicates to carry out pseudo authorization on the application, authorizing the application to access pseudo data different from the user data, and providing the pseudo data to the application instead of the pseudo data. According to the method disclosed by the invention, when the application applies the authority to access the user data, the user is allowed to carry out pseudo authorization except accepting or rejecting to carry out authority on the application; after the user carries out pseudo authorization, the user data is replaced by the pseudo data and the application is authorized to access the pseudo user data, so that the user data is prevented from leakage; and after the application obtains the authority, the application is continuously operated, so that the user can normally use the application.

Description

technical field [0001] The present invention relates to the field of mobile terminals, in particular to a user data access control method, device and computer-readable storage medium. Background technique [0002] Now, many rogue applications on the mobile phone platform have applied for permission to access user privacy data, but the functions provided by these applications to users do not use these privacy data, they just want to spy on user privacy. [0003] When many applications are started, the mobile phone system framework will pop up a prompt box according to the application permissions of the application, prompting the user whether to authorize the application to access its private data. If the user refuses to authorize the application, the application will automatically exit. If If the user chooses to authorize the application, the user's private data may be leaked. [0004] Therefore, a technical solution is needed to enable users to use applications without caus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/60
CPCG06F21/31G06F21/604G06F2221/2141
Inventor 李杰
Owner 宁波万德高科智能科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More