Privacy protection method, terminal and storage medium
A privacy protection and storage medium technology, applied in the field of permission management and control, it can solve problems such as security risks, applications are not allowed to access objects, privacy leakage, etc., so as to optimize access authorization, reduce security risks and privacy leakage risks, and improve access authorization. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0065] In order to clearly describe the privacy protection method provided by the first embodiment of this application, please refer to image 3 , Figure 4 and Figure 5 .
[0066] see image 3 , the first embodiment of the present application provides a privacy protection method applied to a terminal, including:
[0067] S11: Displaying the permission access interface.
[0068] In an alternative embodiment, see Figure 4 , in step S11, authorization selection options may be included in the rights access interface (for example Figure 4 Select Access option in ) and Authorize All options (such as Figure 4 in the Allow access to all photos option). It should be understood that the authorization access interface may include, but is not limited to, authorization selection options and all authorization options, for example, authorization disallowing options, access topics, and the like may also be included.
[0069] In an optional implementation manner, in step S11, the ...
no. 2 example
[0088] Figure 6 It is a schematic structural diagram of a terminal provided in the second embodiment of the present application. In order to clearly describe the terminal 1 provided by the second embodiment of the present application, please refer to Figure 6 .
[0089] The terminal 1 provided in the second embodiment of the present application includes: a processor A101 and a memory A201, wherein the processor A101 is used to execute the computer program A6 stored in the memory A201 to implement the privacy protection method described in the first embodiment step.
[0090] In an optional implementation manner, the terminal 1 provided in this embodiment may include at least one processor A101 and at least one memory A201. Wherein, at least one processor A101 may be called a processing unit A1, and at least one memory A201 may be called a storage unit A2. Specifically, the storage unit A2 stores a computer program A6, and when the computer program A6 is executed by the pr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


