Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy information protecting method, mobile terminal and computer readable storage medium

A technology for privacy information and storage media, applied in the fields of privacy information protection, mobile terminals and computer-readable storage media, can solve problems such as leakage of user privacy data, and achieve the effect of tracking protection

Inactive Publication Date: 2018-03-23
NUBIA TECHNOLOGY CO LTD
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a privacy information protection method, aiming to solve the technical problem of leakage of user privacy data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy information protecting method, mobile terminal and computer readable storage medium
  • Privacy information protecting method, mobile terminal and computer readable storage medium
  • Privacy information protecting method, mobile terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0085] Based on the first embodiment, the second embodiment of the privacy information protection method of the present invention is proposed, refer to Figure 4 , in this embodiment, before step S200, the privacy information protection method further includes:

[0086] Step S400, marking the private data as privacy tainted data;

[0087] In this embodiment, when the private data is acquired, the private data is marked with a taint, and the marked private data is the private tainted data, and the process of the tainted mark is through the tainted information added to the private data, The private data can be uniquely identified and tracked through the taint information; specifically, when the private data is obtained, the first handle cursor of the private data is obtained, and the first handle cursor is the private data corresponding to the The handle cursor of the taint mark, wherein the handle cursor is used to uniquely identify a target resource, and the target resource p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy information protecting method. The method comprises the steps of obtaining privacy data of a user; performing stain marking on target data including the privacy data,wherein the marked target data is stain data; tracking a broadcast path of the stain data, wherein when it is detected that the stain data is subjected to inter-process broadcasting, sending a privacy disclosure prompt message. The invention further discloses a mobile terminal and a computer readable storage medium. User's privacy data can be obtained, and the user's privacy data is further tracked and protected by performing stain marking and broadcast path tracking on the privacy data.

Description

technical field [0001] The invention relates to the field of data communication, in particular to a privacy information protection method, a mobile terminal and a computer-readable storage medium. Background technique [0002] With the gradual popularization and development of big data, the leakage of user privacy data (address book, SMS data, email, etc., and user data stored in other third-party applications) has become more prominent. According to research, after testing 50 APPs randomly selected in the application market, it was found that 34% of the software had behaviors of leaking privacy. The traditional user data leakage detection mechanism usually matches the data transferred between applications with preset rules, and only when the rules match, it is considered that the privacy data leakage occurs; however, malicious applications are likely to cut and package the obtained user privacy data, etc. , has destroyed the characteristics contained in its data and then d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/606G06F21/6245
Inventor 王秀琳
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products