Mobile terminal privacy protection method and protection device and mobile terminal

A privacy protection and terminal equipment technology, applied in secure communication devices, digital data protection, computer security devices, etc., can solve problems such as applications that are easily detected by users and lack of privacy protection.

Pending Publication Date: 2021-04-02
HUAWEI TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the purpose of the embodiment of the present invention is to provide a mobile terminal privacy protection method, protection device and mobile terminal, which can solve the problems of being easily noticed by users when privacy is protected on mobile terminals and lack of privacy protection when using applications. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal privacy protection method and protection device and mobile terminal
  • Mobile terminal privacy protection method and protection device and mobile terminal
  • Mobile terminal privacy protection method and protection device and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0146] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0147] In the following detailed description, numerous specific details are set forth in order to provide a complete understanding of the present invention, but those skilled in the art will understand that the present invention may be practiced without these specific details. In other embodiments, well-known methods, procedures, components and circuits have not been described in detail so as not to unnecessarily obscure the embodiments.

[0148] The embodiments of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile terminal privacy protection method and protection device, and a mobile terminal. The method comprises acquiring an application startup instruction (101); actively acquiring biological characteristics of a user according to the application startup instruction (102); if the acquired user biological feature matches a preset biological feature, displaying an encrypted content list and a non-encrypted content list of the application (103), wherein the encrypted content list of the application program is generated according to the encrypted content in the applicationprogram, the non-encrypted content list of the application program is generated according to the non-encrypted content in the application program, and the encrypted content of the application programis the content which is not presented when the acquired biological characteristics of the user are not matched with the preset biological characteristics. According to the technical scheme, privacy onthe mobile terminal can be protected and is not easy to perceive.

Description

technical field [0001] The invention relates to the field of terminals, in particular to a mobile terminal privacy protection method, a protection device and a mobile terminal. Background technique [0002] With the development of technology and interpersonal communication, mobile terminals have become an important means for people to communicate. Mobile terminals are usually personal items, but due to factors such as interpersonal relationships, difficulty in refusing, or politeness, people cannot completely avoid mobile terminals being used by others. There are a lot of people's privacy on the mobile terminal, such as short messages, contacts, call records, photos, instant messaging messages, etc. People hope that the privacy of the mobile terminal can be protected when the mobile terminal is used by others. In order to solve the problem of privacy protection of mobile terminals, most mobile terminals are set with a privacy protection mode to ensure that in the privacy pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/36G06F21/60G06F21/62
CPCG06F21/32G06F21/602H04L9/3231
Inventor 李腾跃李自军朱浩颖
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products