Secret divulging prevention method, terminal and computer readable storage medium

A storage medium and computer technology, applied in computer security devices, calculations, special data processing applications, etc., can solve problems such as low user experience satisfaction and easy leakage of leaked files

Pending Publication Date: 2019-07-16
NUBIA TECHNOLOGY CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention lies in the fact that leaked files are easy to spread out in the prior art, resulting in lo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret divulging prevention method, terminal and computer readable storage medium
  • Secret divulging prevention method, terminal and computer readable storage medium
  • Secret divulging prevention method, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0069] In order to solve the problem in the prior art that secret-related files are easily circulated, resulting in low user experience satisfaction, this embodiment provides a method for preventing secret leakage. Specifically, see image 3 as shown, image 3 The basic flowchart of the method for preventing leakage provided by this embodiment, the method for preventing leakage includes:

[0070] S301. Pick up the file to be detected by the multimedia pick-up device in the terminal.

[0071] It should be noted that the terminal described in this embodiment may be as follows figure 1 The terminals shown can, of course, also be other terminals.

[0072] In this embodiment, the file is picked up by the multimedia picking device in the terminal, and then the picked up file is used as the file to be detected. Wherein, the multimedia pickup device includes but not limited to at least one of a camera, an audio pickup device, and the like. For audio pickup devices, this includes,...

no. 2 example

[0104] In order to better understand the present invention, this embodiment is described in combination with more specific examples, please refer to Image 6 as shown, Image 6 It is a detailed flow chart of the leak prevention method provided by the second embodiment of the present invention, the leak prevention method includes:

[0105] S601. Pick up the file to be detected by using the multimedia pick-up device in the terminal.

[0106] After the file is picked up by the multimedia pick-up device in the terminal, the file is taken as the file to be detected.

[0107] In this embodiment, the multimedia pick-up device includes a camera, that is, after taking a picture through the camera in the terminal, the taken picture is used as the picture to be detected. It should be noted that, in this embodiment, the multimedia pickup device is used as an example for description. In other embodiments, the camera may also be an audio pickup device or the like.

[0108] S602. Determin...

no. 3 example

[0140] This embodiment provides a terminal, please refer to Figure 7 As shown, the terminal provided in this embodiment includes a processor 701 , a memory 702 and a communication bus 703 .

[0141] Wherein, the communication bus 703 in this embodiment is used to realize connection and communication between the processor 701 and the memory 702;

[0142] The processor 701 is used to execute one or more programs stored in the memory 702, so as to realize the following steps:

[0143] Pick up the file to be detected by the multimedia pick-up device in the terminal;

[0144] Judging whether there is a preset secret-related object in the file to be detected;

[0145] If yes, the file to be detected is processed according to a preset leak prevention processing method.

[0146] In this embodiment, the file is picked up by the multimedia picking device in the terminal, and then the picked up file is used as the file to be detected. Wherein, the multimedia pickup device includes b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret divulging prevention method, a terminal and a computer readable storage medium. According to the method, a to-be-detected file is picked up through a multimedia pickupdevice in a terminal; whether a preset confidential object exists in the to-be-detected file or not is judged; if yes, the to-be-detected file is processed according to a preset anti-divulging processing mode. The defect that the user experience satisfaction degree is low due to the fact that confidential files are prone to flow out in the prior art is overcome. The invention further discloses the terminal and the computer readable storage medium, by implementing the scheme, when the file with the secret object is detected, the file can be processed, so that the file is prevented from being leaked, and the user experience is improved.

Description

technical field [0001] The present invention relates to the technical field of terminals, and more specifically, to a method for preventing leakage, a terminal, and a computer-readable storage medium. Background technique [0002] With the development of terminal technologies, terminals such as smart phones have become indispensable for people's work and life. During the user's use, some secret-related files may be stored on the terminal, but in the prior art, these secret-related files are not processed, so that the secret-related files are easily circulated, reducing the user experience. Contents of the invention [0003] The technical problem to be solved by the present invention lies in the problem that leaked files are easy to spread in the prior art, resulting in low user experience satisfaction. Aiming at this technical problem, a method for preventing leaks, a terminal and a computer-readable storage medium are provided. [0004] In order to solve the above techn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F17/27
CPCG06F21/6218G06F40/279
Inventor 单志亮
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products