Privacy protection method, device, intelligent terminal and storage medium
An intelligent terminal and privacy protection technology, applied in computer security devices, instruments, digital data authentication, etc., can solve problems affecting user use, stop operation, downtime, etc., to improve user experience, ensure privacy, and improve system security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0048] see figure 1 , figure 1 It is a flowchart of a privacy protection method provided by an embodiment of the present application.
[0049] Such as figure 1 As shown, this embodiment provides a privacy protection method, which is applied to a smart terminal with a physical camera, and the smart terminal is provided with a virtual camera, and the method at least includes the following steps:
[0050] Step 11, detecting the access request of the application program in the smart terminal to the physical camera.
[0051]Wherein, the physical camera refers to a camera in the form of hardware set on the smart terminal. In the application, some functions need to be realized by relying on the physical camera. At this time, an access request to the physical camera will be issued.
[0052] Step 12. After detecting the access request, obtain the permission information of the application program to the physical camera according to the user permission setting operation record; the p...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


