Privacy space processing method and privacy space processing device

An information processing device and privacy technology, which is applied in the field of network information security, can solve problems such as cumbersome system attribute setting process, user privacy information hidden setting, and user inconvenience, so as to improve business experience, simplify cumbersome operations, and improve security. Effect

Inactive Publication Date: 2016-04-06
BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since it can only be done with the help of software such as PC and iTunes, for an environment without a PC or with a PC but without software such as iTunes installed, it is impossible to set the user’s privacy information, and the system property setting process is also relatively cumbersome. The use of the inconvenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy space processing method and privacy space processing device
  • Privacy space processing method and privacy space processing device
  • Privacy space processing method and privacy space processing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] Embodiment 1. A method for processing a private space.

[0025] figure 1 is a schematic flowchart of a method for processing a private space provided by an embodiment of the present invention. see figure 1 , the process includes:

[0026] Step 101, setting the attribute as a hidden privacy area, setting non-input access password information for the privacy area, and constructing a mapping table corresponding to the privacy area and the non-input access password information;

[0027] In this step, the content in the private space includes but is not limited to: the user's private information, applications, materials, pictures, videos, etc. Data files include but are not limited to: applications, pictures, etc.

[0028] The set privacy area can be one, and in subsequent applications, all data files that need privacy protection are put into this privacy area. In the embodiment of the present invention, in order to prevent other users from knowing all the data files th...

Embodiment 2

[0119] Embodiment 2, a privacy space processing device.

[0120] image 3 It is a schematic structural diagram of a privacy space processing device provided by an embodiment of the present invention. see image 3 , the device includes: a privacy area setting module, a mapping table building module, a data file setting module and an access control module, wherein,

[0121] The privacy area setting module is used to set the property as a hidden privacy area;

[0122] In the embodiment of the present invention, one or more privacy areas are set.

[0123] As an optional embodiment, storage path information used to identify the location of the privacy area may also be set. Multiple privacy areas may correspond to the same storage path information, or may correspond to different storage path information, which may be set according to the actual needs of the user.

[0124] A mapping table construction module, configured to set non-input access password information for the privac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy space processing method and a privacy space processing device, wherein the privacy space processing method mainly comprises the steps of setting a privacy area of which the attribute is concealed, setting non-input accessing password information for the privacy area, constructing a correspondence mapping table between the privacy area and the non-input accessing password information, selecting a data file and placing the data file into the set privacy area; monitoring and acquiring user operation information, determining a fact that the user operation information matches the non-input accessing password information in the constructed mapping table, displaying and accessing the privacy area which is mapped by the non-input accessing password information; and when a fact that the user cancels accessing of the data file in the privacy area is monitored, hiding the privacy area. The privacy space processing method and the privacy space processing device provided by the technical solution of the invention can further improve privacy space accessing safety.

Description

[0001] Technology category [0002] The invention relates to the technical field of network information security, in particular to a method for processing a private space and a corresponding private space processing device. Background technique [0003] Smart terminal equipment refers to equipment with multimedia functions, which can support audio, video, and data transmission. By adopting an open operating system, the corresponding application program (Application) is loaded by the launcher of the operating system to realize the corresponding application. function, providing a platform for application program operation and content services, so that a large number of value-added business applications, such as taxi, ordering, making friends, video, news, weather, traffic, commodities, application downloads, music and picture downloads, etc. can be based on this platform accomplish. [0004] With the development of communication technology, especially 3G and 4G communication te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 韩秦杨磊张霓张锦晓
Owner BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products