Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An information protection method, device, mobile terminal and storage medium

A mobile terminal, information protection technology, applied in the direction of digital data protection, can solve problems such as abuse of authority and inability to guarantee information security, and achieve the effect of improving security

Active Publication Date: 2022-02-08
VIVO MOBILE COMM CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an information protection method to solve the problems that the user's information security cannot be guaranteed, privacy is at risk, and rights are abused

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information protection method, device, mobile terminal and storage medium
  • An information protection method, device, mobile terminal and storage medium
  • An information protection method, device, mobile terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] refer to figure 1 , which shows a flow chart of the steps of an information protection method provided in Embodiment 1 of the present invention, which may specifically include the following steps:

[0025] Step 101, acquire target information.

[0026] In the embodiment of the present invention, if the application requests information such as address book, calendar, geographic location, images captured by the camera, and audio collected by the microphone on the mobile terminal, authorization from the user is required. When an application requests target information, it first obtains the target information and conducts real-time analysis to determine whether the target information needs to be protected.

[0027] For example, by adding a data privacy sandbox to monitor the use of key devices such as cameras, microphones, and GPS chips at the bottom of the system, when the application requests the target information obtained by these key devices, first determine whether t...

Embodiment 2

[0037] refer to figure 2 , which shows a flow chart of the steps of an information protection method provided in Embodiment 2 of the present invention, which may specifically include the following steps:

[0038] Step 201, acquire target information.

[0039] In the embodiment of the present invention, for the specific implementation manner of this step, reference may be made to the description in the foregoing embodiments, and details are not described here.

[0040] Step 202, extracting target information features in the target information.

[0041] In the embodiment of the present invention, the preset information protection rules include preset information features, which provide identification standards for subsequent data analysis. The preset information features can be set in advance by the user, or can be downloaded from the network, or The preset information feature can be obtained in any other applicable manner, which is not limited in this embodiment of the prese...

Embodiment 3

[0064] refer to image 3 , which shows a flow chart of the steps of an information protection method provided in Embodiment 3 of the present invention, which may specifically include the following steps:

[0065] Step 301, acquire target information.

[0066] In the embodiment of the present invention, for the specific implementation manner of this step, reference may be made to the description in the foregoing embodiments, and details are not described here.

[0067] Step 302, identifying whether the feature image, or device information, or private information exists in the target information.

[0068] In the embodiment of the present invention, the preset information protection rules include at least one of characteristic images, device information, and privacy information. In the settings of the operating system, switches for the above various preset information protection rules can be added, and the user can choose Whether to open.

[0069] Among them, characteristic im...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide an information protection method and device. The method includes: acquiring target information, identifying a protection scheme for the target information when the target information needs to be protected according to preset information protection rules, determining a protection scheme for the target information, implementing the protection scheme, and realizing monitoring and analysis of the target information, and obtaining the target information by application after authorization is granted It is no longer unrestricted, and a corresponding protection plan is implemented for the target information that needs to be protected to avoid problems such as information security cannot be guaranteed, privacy is at risk, and permissions are abused by applications, and the security of information is improved.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to an information protection method, an information protection device, a mobile terminal, and a computer-readable storage medium. Background technique [0002] At present, when various applications are used or installed in a mobile terminal, users are required to grant permissions to the applications, for example, permission to call a camera, permission to record, permission to obtain a geographic location, and the like. Authorization can be mainly divided into always allow and this time allow. [0003] In actual use, if the user only chooses to allow this time when granting the permission, then the next time the app uses the permission again, a pop-up window will pop up to remind the user and wait for the user to authorize. If the user chooses to allow this time every time, It will pop up a window reminder every time, seriously affecting the user experience. Howe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
Inventor 齐好鑫
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products