Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and terminal for protecting privacy

A technology to protect privacy and terminals, applied in digital data protection, instruments, digital data authentication, etc., can solve problems such as user privacy leakage

Active Publication Date: 2021-07-06
VIVO MOBILE COMM CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method and terminal for protecting privacy, so as to solve the problem of leakage of user's privacy when the terminal unlocks the screen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and terminal for protecting privacy
  • A method and terminal for protecting privacy
  • A method and terminal for protecting privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0017] It should be noted that " / " in this article means or, for example, A / B can mean A or B; "and / or" in this article is just an association relationship describing associated objects, indicating that there can be three A relationship, for example, A and / or B, can mean: A exists alone, A and B exist simultaneously, and B exists alone. "A plurality" means two or more than two.

[0018] It should be noted that, in the embodiments of the present invent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a privacy protection method and a terminal, which are applied in the technical field of terminals and can solve the problem of leakage of user's privacy when the terminal unlocks the screen. The solution includes: when the terminal is in a locked screen state, the terminal receives the input of the target password information; if the target password information matches the preset password information, the terminal unlocks the screen and displays the target interface, the target interface is the terminal interface except An interface other than the interface to be protected, or the target interface is an interface after blurring the interface to be protected, and the interface to be protected is the last interface displayed before the terminal locks the screen. This solution is specifically applied in the process of processing the interface displayed last before the terminal locks the screen when the terminal unlocks the screen.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of terminals, and in particular, to a privacy protection method and a terminal. Background technique [0002] With the development of communication technology, terminals such as mobile phones and tablet computers are becoming more and more intelligent to meet various needs of users. For example, the user has privacy protection requirements for the content in some application programs (such as payment applications, etc.) displayed on the terminal. [0003] Wherein, when the user controls the terminal to perform a screen unlocking operation in a public place, the terminal displays the page of the application function program running in the foreground, and the page may include the user's private content. In this way, the private content displayed on the terminal may be seen by others, thus causing the leakage of the user's private content. Contents of the invention [0004] Embodim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46G06F21/62G06F9/451
CPCG06F21/46G06F21/6245G06F9/451
Inventor 史振杰
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products