Privacy protection method, device, intelligent terminal and storage medium
An intelligent terminal and privacy protection technology, applied in computer security devices, instruments, digital data authentication, etc., can solve problems affecting user use, stop operation, downtime, etc., to improve user experience, ensure privacy, and improve system security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0048] see figure 1 , figure 1 It is a flowchart of a privacy protection method provided by an embodiment of the present application.
[0049] Such as figure 1 As shown, this embodiment provides a privacy protection method, which is applied to a smart terminal with a physical audio device. The smart terminal is provided with a virtual audio device. The method includes at least the following steps:
[0050] Step 11. Detect the access request of the application program in the smart terminal to the physical audio device.
[0051] Wherein, the physical audio device refers to an audio device in the form of hardware set on the smart terminal, such as a microphone. In the application, some functions need to rely on the physical audio device to realize, at this time, an access request to the physical audio device will be issued.
[0052] Step 12. After detecting the access request, obtain the permission information of the application program on the physical audio device recorded acc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


