Method and system for controlling requests for sensitive data

A technology for sensitive data and data, applied in the field of network security, it can solve the problems of not being able to prompt users for private data, and application functions cannot be completed, so as to achieve the effect of protecting privacy from being leaked.

Active Publication Date: 2021-01-19
JINGZAN ADVERTISING SHANGHAI CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, neither of these two operating systems can prompt the user what private data the application has specifically requested, nor can it give the user the basic right to choose when calling
If some privacy data is not important to users, if some applications are rejected when calling these privacy data, many functions in the application cannot be completed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling requests for sensitive data
  • Method and system for controlling requests for sensitive data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the following embodiments specifically illustrate the method and system for controlling sensitive data requests of the present invention in conjunction with the accompanying drawings.

[0022] In this embodiment, the smart device 10 is a mobile phone. Of course, smart devices such as iPads and computers can also be used.

[0023] The method for controlling sensitive data requests includes: when an application program obtains sensitive data in the mobile phone 10, such as figure 1 As shown, an operation interface 30 appears on the display interface 20 of the application program, and the operation interface 30 displays sensitive data acquired by the application program. Sensitive data includes: image data, video data, audio data, user privacy data and device privacy data in text form. Among them, user privacy data refers to specific data bound...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for controlling sensitive data requests. When an application program needs to access sensitive data, the method can perform selection operation on the accessed sensitive data, selects sensitive data which cannot be accessed, and shields the sensitive data which cannot be accessed, so that the application program cannot obtain the sensitive data which is shielded. Thus, the application program can obtain some sensitive data in a selective manner, privacy of users is protected and is not leaked. The system is installed in an intelligent device, and protects privacy of users in the intelligent device from being leaked.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a method and system for controlling sensitive data requests. Background technique [0002] With the progress of the times, smart devices have affected everyone's life more and more deeply. Smart devices often store a large amount of our personal privacy information, and users are more worried about privacy leaks when using applications on smart devices. Therefore, the protection of personal privacy data is becoming more and more important. The current smart devices can only give a rough reminder of the access request for the protection of the user's private data. For example, a device running the Android operating system will list the application's request for private data access when the application is installed, and a device running the IOS operating system can give a prompt when requesting the user's privacy permission for the first time. However, neith...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725G06F3/0484H04L9/32
CPCG06F3/04845H04L9/32H04M1/72403H04M1/72454H04M1/72469
Inventor 汤奇峰严伟光
Owner JINGZAN ADVERTISING SHANGHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products