Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for protecting personal privacy

A personal privacy and privacy technology, applied in the field of mobile Internet, can solve the problem of insufficient personal privacy protection, and achieve the effect of strong control and authority binding, good compatibility, and protection of private data.

Pending Publication Date: 2019-03-05
ZTE CORP
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This article provides a method and system for protecting personal privacy, which can solve the problem of insufficient protection of personal privacy in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for protecting personal privacy
  • A method and system for protecting personal privacy
  • A method and system for protecting personal privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the object, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be further described in detail below in conjunction with specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other arbitrarily.

[0065] The inventor of the present application concludes that the rights management system in the related art adopts a black and white rights management method. In addition to denying and allowing access to privacy permissions, the inventor proposes to add "allow access to private data, but access to non-real data or virtual devices", and provide extended configuration so that users can choose how to access non-real data.

[0066] In addition, the operating systems of mobile terminals currently use a layered architecture, such as image 3 shown. The interface that or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for protecting personal privacy, relating to mobile Internet technology. The method for protecting the personal privacy provided herein includes after a mobile terminal receives and permits an application to apply for access to privacy data, if it is determined that access to untrue data is permitted according to a preset configuration, feeding back theconfigured untrue data to the application.

Description

technical field [0001] The invention relates to mobile Internet technology, in particular to a scheme for protecting personal privacy by using untrue information. Background technique [0002] With the development and prosperity of the mobile Internet, while smart terminals bring convenience to people's lives, they also expose many risks of leaking personal privacy. Many applications will request additional personal privacy permissions, such as reading text messages, contacts in the address book, call records, location information, turning on the microphone to obtain sound, turning on the camera to take pictures, and so on. After criminals obtain private information, they will sell it in illegal channels. Victims will receive advertisements, harassment, scam calls for no apparent reason. All mobile phone manufacturers and third-party security vendors have products to protect personal privacy. [0003] Currently, there are generally two solutions for protecting personal pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/44
CPCG06F21/44G06F21/604G06F21/6245G06F21/629G06F2221/2141
Inventor 李兴贺
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products