Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection method, device, intelligent terminal and storage medium

An intelligent terminal and privacy protection technology, applied in computer security devices, instruments, digital data authentication, etc., can solve problems affecting user use, stop operation, downtime, etc., to improve user experience, ensure privacy, and improve system security. Effect

Pending Publication Date: 2021-04-02
TSINGHUA TONGFANG CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the operating system of the smart terminal, such as the Android system, when the application program installed in the smart terminal accesses the audio device, because this will involve the user's privacy information, the access right to the audio device is a dangerous right, and it needs to be authorized before it can be used. Use, that is, dynamic rights management, some users may refuse authorization for the purpose of privacy protection. At this time, the application will not be able to continue to run, such as downtime, stop running, etc., affecting the user's use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method, device, intelligent terminal and storage medium
  • Privacy protection method, device, intelligent terminal and storage medium
  • Privacy protection method, device, intelligent terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0048] see figure 1 , figure 1 It is a flowchart of a privacy protection method provided by an embodiment of the present application.

[0049] Such as figure 1 As shown, this embodiment provides a privacy protection method, which is applied to a smart terminal with a physical audio device. The smart terminal is provided with a virtual audio device. The method includes at least the following steps:

[0050] Step 11. Detect the access request of the application program in the smart terminal to the physical audio device.

[0051] Wherein, the physical audio device refers to an audio device in the form of hardware set on the smart terminal, such as a microphone. In the application, some functions need to rely on the physical audio device to realize, at this time, an access request to the physical audio device will be issued.

[0052] Step 12. After detecting the access request, obtain the permission information of the application program on the physical audio device recorded acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method, a device, an intelligent terminal and a storage medium. The method comprises the following steps: detecting an access request of an application program in the intelligent terminal to physical audio equipment; after the access request is detected, acquiring the authority information of the application program to the physical audio equipment recorded according to the authority setting operation of the user, wherein the authority information comprises a first flag bit and a corresponding flag value, and a second flag bit and a corresponding flag value; if the permission setting operation is an operation of refusing authorization, the value of the first flag bit is a first flag value, and the value of the second flag bit is a second flag value, the first mark value is used for representing that a user is authorized to an operating system of the intelligent terminal; and the second flag value is used for indicating that the virtual audioequipment is authorized to be accessed; if the value of the first flag bit is the first flag value and the value of the second flag bit is the second flag value, starting the virtual audio device to generate virtual information; and feeding back virtual information generated by the virtual audio device to the application to protect privacy information.

Description

technical field [0001] The present application relates to the technical field of smart terminals, and in particular to a privacy protection method, device, smart terminal and storage medium. Background technique [0002] In the operating system of the smart terminal, such as the Android system, when the application program installed in the smart terminal accesses the audio device, because this will involve the user's privacy information, the access right to the audio device is a dangerous right, and it needs to be authorized before it can be used. Use, that is, dynamic rights management, some users may refuse authorization for the purpose of privacy protection. At this time, the application will not be able to continue to run, such as downtime, stop running, etc., affecting the user's use. Contents of the invention [0003] The purpose of this application is to provide a privacy protection method, device, smart terminal and storage medium to solve the problems in related t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51G06F21/45
CPCG06F21/51G06F21/45G06F2221/2141
Inventor 刘锋陈渝武永卫李健航苗德行
Owner TSINGHUA TONGFANG CO LTD