Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection method, terminal and storage medium

A privacy protection and storage medium technology, applied in the field of permission management and control, it can solve problems such as security risks, applications are not allowed to access objects, privacy leakage, etc., so as to optimize access authorization, reduce security risks and privacy leakage risks, and improve access authorization. Effect

Pending Publication Date: 2021-07-09
SHANGHAI TRANSSION CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the user downloads and installs the application program at first, the application program can directly obtain the access authority of various data in the mobile device, so there are security risks and privacy leakage risks. At present, the application for application program access authority is usually only provided to the user. There are two options. The first option is to allow access to all access objects of a certain type or several types (such as location information, photo albums, media content, files, etc.), and the second option is to directly disallow all applications. Access to a certain type or several types of access objects (for example, when the user downloads and installs a certain application by mistake or thinks that the installed application is not safe, he can choose the second option), during the process of conceiving and implementing this application In the above, the inventors found at least the following problems: when an application is allowed to access all access objects of a certain type or several types, the user cannot specifically decide which access objects can be authorized to access and which cannot be authorized to access. Therefore, There are still security risks and privacy risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method, terminal and storage medium
  • Privacy protection method, terminal and storage medium
  • Privacy protection method, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0065] In order to clearly describe the privacy protection method provided by the first embodiment of this application, please refer to image 3 , Figure 4 and Figure 5 .

[0066] see image 3 , the first embodiment of the present application provides a privacy protection method applied to a terminal, including:

[0067] S11: Displaying the permission access interface.

[0068] In an alternative embodiment, see Figure 4 , in step S11, authorization selection options may be included in the rights access interface (for example Figure 4 Select Access option in ) and Authorize All options (such as Figure 4 in the Allow access to all photos option). It should be understood that the authorization access interface may include, but is not limited to, authorization selection options and all authorization options, for example, authorization disallowing options, access topics, and the like may also be included.

[0069] In an optional implementation manner, in step S11, the ...

no. 2 example

[0088] Figure 6 It is a schematic structural diagram of a terminal provided in the second embodiment of the present application. In order to clearly describe the terminal 1 provided by the second embodiment of the present application, please refer to Figure 6 .

[0089] The terminal 1 provided in the second embodiment of the present application includes: a processor A101 and a memory A201, wherein the processor A101 is used to execute the computer program A6 stored in the memory A201 to implement the privacy protection method described in the first embodiment step.

[0090] In an optional implementation manner, the terminal 1 provided in this embodiment may include at least one processor A101 and at least one memory A201. Wherein, at least one processor A101 may be called a processing unit A1, and at least one memory A201 may be called a storage unit A2. Specifically, the storage unit A2 stores a computer program A6, and when the computer program A6 is executed by the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of authority management and control, and particularly relates to a privacy protection method, a terminal and a computer readable storage medium, and the privacy protection method is applied to the terminal and comprises the following steps: displaying an authority access interface; and in response to triggering of selection control on the access object based on the permission access interface, determining a target access object so as to authorize the application program. Therefore, the selected access object can be refined through the permission access interface of the application program, so that the access object which can be authorized to the application program can be determined more clearly, and therefore, the access authorization of the application program can be better optimized, and the potential safety hazard and the privacy disclosure risk are further reduced.

Description

technical field [0001] The present application relates to the technical field of authority management and control, and in particular to a privacy protection method, a terminal, and a computer-readable storage medium. Background technique [0002] With the rapid development of the mobile Internet, the performance of mobile devices has been greatly improved, the processing speed is getting faster and faster, and the user experience is getting better and better. The mobile phone has become the most important connection link in people's daily life, and its functions are becoming more and more abundant. Diversification, specifically, the mobile device can download and install various application programs to realize various functions. After the initial user downloads and installs the application program, the application program can directly obtain access rights to various data in the mobile device, so there are potential security risks and privacy leakage risks. At present, the ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30G06F21/62G06F3/0481
CPCG06F3/0481G06F21/30G06F21/6245G06F2221/2141
Inventor 于佑全
Owner SHANGHAI TRANSSION CO LTD