Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for preventing personal information leakage

A technology for information leakage and incidents, applied in digital data protection, internal/peripheral computer component protection, digital data authentication, etc. Avoid the effect of misuse

Active Publication Date: 2021-02-02
SHENZHEN EAGLESOUL TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The system records this operating habit as a comparison operation in the future, but the accuracy of this gesture is very low, and it is very easy to be observed and imitated. In addition, this gesture itself has no practical significance, it is just a present. There is only gesture verification in technology
As for the timing of activation verification, it is also a kind of implicit identity verification before the program starts, and there is no difference. It will be verified every time, which will bring inconvenience to the normal use of users.
[0009] To sum up, it can be known that in the prior art, for the protection method of sensitive personal information in the device, one is to artificially switch between the first state of normal use and the second state of restricted use, and the restrictive Use includes the reduction in the number of available programs, removal of programs that include sensitive information, and another kind of restricted use is to camouflage the interface, which simply cannot be used, or needs to be decrypted before use, or, corresponding to artificial switching, advance Preset a specific program, once such a program is triggered, the camouflaged interface will be automatically opened, and only through manual decryption can further use, which makes the implicit identity verification explicit, which is what the device owner does not want to see

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for preventing personal information leakage
  • A method and device for preventing personal information leakage
  • A method and device for preventing personal information leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the embodiments described here are only used to explain the present invention, not to limit the present invention. Various changes and modifications made by those skilled in the art without departing from the spirit of the present invention are within the scope of the independent claims and dependent claims of the present invention.

[0049] In this article, a program represents an application that includes sensitive personal information. The application includes multiple functions. The execution of these functions is called an event. The core event represents the execution of a function in the application to obtain personal sensitive information. In the prior art, the user generally needs to unlock the device when the device is started or when the screen saver is released, and the unlocking operation generally inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and device for preventing personal information leakage, especially a method and device for preventing personal information leakage in the field of Internet teaching. The method and device of the present invention do not perform identity verification when starting the program, but select After the core event is triggered, it is judged whether to execute the core event, canceling the identity verification every time the program is started, which improves the user experience. Personal information leakage does not occur when the device is released. Therefore, a series of judgments when the core event is triggered can effectively monitor and intercept personal information leakage.

Description

technical field [0001] The invention relates to the technical field of online education, in particular to a method and device for preventing personal information leakage during Internet online education. Background technique [0002] With the development of current communication technology and the popularization of intelligent equipment, the manufacturing cost of intelligent computing equipment such as smart phone, tablet computer and laptop computer has been generally reduced, and it has become an indispensable and important part in the daily life of most ordinary people. component. It is more and more common to use mobile devices for online learning and advanced studies. It has the characteristics of flexible learning location, personalized learning content, and private learning mode. With more and more social functions of learning programs, online learning programs are also becoming more and more popular. It also has functions such as instant online calls and communicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/84
CPCG06F21/31G06F21/60G06F21/84
Inventor 卢启伟杨宁刘佳
Owner SHENZHEN EAGLESOUL TECH CO LTD