Privacy protection method, device and equipment based on terminal equipment

A technology of privacy protection and terminal equipment, applied in the field of privacy protection, can solve problems such as the need to improve security, and achieve the effect of ensuring security and reliability

Pending Publication Date: 2020-07-28
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In related technologies, other users are prevented from obtaining private content by hiding application icons, but other users can open hidden applications through command line / debugging methods, and the security needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method, device and equipment based on terminal equipment
  • Privacy protection method, device and equipment based on terminal equipment
  • Privacy protection method, device and equipment based on terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Exemplary embodiments of the present application are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present application to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0026] figure 1 It is a schematic flowchart of a terminal device-based privacy protection method provided in the embodiment of this application, as shown in figure 1 As shown, the method includes:

[0027] Step 101, when the activation request of the terminal device is obtained, it is judged whether the activation request satisfies a preset privacy protection condi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy protection method, device and equipment based on terminal equipment, and the method comprises the steps: judging whether an opening request meets a preset privacy protection condition or not when the opening request of the terminal equipment is obtained; if the privacy protection condition is not met, controlling the terminal equipment to start and mount a preset universal application; and if the privacy protection condition is met, obtaining a target privacy application corresponding to the opening request, and controlling the terminal device to open and mounta preset general application and the target privacy application. Therefore, the requirement for privacy protection of the user is met, and the safety and reliability of privacy protection are guaranteed.

Description

technical field [0001] The present application relates to the technical field of terminal equipment, and in particular, to a privacy protection method, device and equipment based on terminal equipment. Background technique [0002] Terminal devices bring convenience to people's lives. When using terminal devices, there is often a need for privacy protection. For example, it is necessary to hide important meeting records to avoid accidental deletion by others, hide personal privacy information, etc. The privacy security protection of terminal devices has become a The future development trend of related industries. [0003] In related technologies, other users are prevented from obtaining private content by hiding application icons, but other users can open hidden applications through command line / debugging means, and the security needs to be improved. Contents of the invention [0004] This application aims to solve one of the technical problems in the related art at least...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 吴恒刚
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products