CN103873668A - Method used for protecting user data of portable terminal and portable terminal - Google Patents

Method used for protecting user data of portable terminal and portable terminal Download PDF

Info

Publication number
CN103873668A
CN103873668A CN201210548493.3A CN201210548493A CN103873668A CN 103873668 A CN103873668 A CN 103873668A CN 201210548493 A CN201210548493 A CN 201210548493A CN 103873668 A CN103873668 A CN 103873668A
Authority
CN
China
Prior art keywords
user
password
input
portable terminal
operating environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210548493.3A
Other languages
Chinese (zh)
Inventor
张海霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics China R&D Center, Samsung Electronics Co Ltd filed Critical Samsung Electronics China R&D Center
Priority to CN201210548493.3A priority Critical patent/CN103873668A/en
Publication of CN103873668A publication Critical patent/CN103873668A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method used for protecting user data of a portable terminal and the portable terminal. The method comprises the following steps: receiving a password input by a user under the blocking state of the portable terminal; determining whether the password input by the user is one of at least one valid password; providing a user operation environment which corresponds to the password, input by the user, when the password input by the user is the valid password; maintaining the blocking state of the portable terminal when the password input by the user is not the valid password. According to technical scheme of the invention, the user data are protected mainly through different deblocking passwords, for example, mobile phone administrators and mobile phone visitors are distinguished through setting the different deblocking passwords, and therefore, right control is performed on privacy data and functions in the portable terminal. Meanwhile, the user can freely set data and functions which need to be protected.

Description

For the protection of method and the portable terminal of the user data of portable terminal
Technical field
The present invention relates to the data protection of portable terminal, more particularly, relate to a kind of method and portable terminal of the user data for the protection of portable terminal.
Background technology
In recent years, growing along with information, communication and semiconductor technology, the use of portable terminal is more and more universal.
At present, on the portable terminal of part (such as, commercial mobile phone) with visitor's pattern, user can start this pattern the private data of oneself is protected.But deactivation visitor pattern again in the time that people at one's side need to use mobile phone, need to spend the regular hour, and can make the other side very unhappy.Some time also not free going arrange, mobile phone is taken away by the other side.In addition, user can not freely arrange the data that need protection and function.In application market, the encryption software being seen everywhere, some need to open encryption software could arrive protected data, and some all requires to input password while needing the protected data of each use.
Need a kind of technology that can more effectively limit the access of data/application.
Summary of the invention
In order to solve the above-mentioned problems in the prior art, the invention provides a kind of password according to user's input provides the technical scheme of different user operating environment.
According to an aspect of the present invention, provide a kind of method of the user data for the protection of portable terminal, comprised the steps: under the blocking of described portable terminal, received the password of user's input; Determine whether the password that user inputs is a valid password at least one valid password; In the time determining that the password of user's input is valid password, the user operating environment corresponding with the password of user's input is provided, in the time determining that the password of user's input is not valid password, maintain the blocking of described portable terminal.
Preferably, provide the step of the user operating environment corresponding with the password of user input to comprise: in the time that the password of user's input is first password, to provide normal users operating environment; In the time that the password of user's input is the second password, provide restricted user's operating environment; Wherein, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of tentation data and/or application.
Preferably, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of predetermined data types.
Preferably, described scheduled operation comprises at least one in following operation: for the operation of visit data and application; For the scheduled operation of Update Table; For by the data mobile of described portable terminal or copy to the operation of other device.
Preferably, under described restricted user's operating environment, described tentation data and/or application are hidden.
Preferably, when under described restricted user environment, user input during with predetermined behaviour for described tentation data and/or application, shows the forbidden information of execution the described scheduled operation of refusal execution about described scheduled operation.
According to a further aspect in the invention, provide a kind of portable terminal with data protection function, having comprised: input unit, for receiving the password of user's input; Whether control unit is valid password for the password of determining user's input; Display unit, for showing the user interface corresponding with user's operating environment, wherein, in the time determining that the password of user's input is valid password, control unit control display unit shows the user interface corresponding to the user operating environment corresponding with the password of user's input.
Preferably, in the time that the password of user's input is first password, control unit control display unit shows the user interface corresponding with normal user's operating environment; In the time that the password of user's input is the second password, control unit control display unit shows the user interface corresponding with restricted user's operating environment, wherein, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of tentation data and/or application.
Preferably, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of predetermined data types.
Preferably, described scheduled operation comprises at least one in following operation: for the operation of visit data and application; For the scheduled operation of Update Table; For by the data mobile of described portable terminal or copy to the operation of other device.
Preferably, described tentation data and/or application are hidden and are presented in the user interface corresponding with restricted user's operating environment.
Preferably, when under described restricted user environment, while receiving with predetermined behaviour for described tentation data and/or application by input unit, control unit control display unit shows the forbidden information of execution about described scheduled operation, and refusal is carried out described scheduled operation.
According to technical scheme of the present invention; mainly by different unlocking pins, user data is protected; for example by being set, different unlocking pins distinguishes cell phone managing person and mobile phone visitor, thereby to the in addition control of authority of private data in portable terminal and function.Meanwhile, user can freely arrange needs protected data and function.
Brief description of the drawings
By the description of embodiment being carried out below in conjunction with accompanying drawing, these and/or other aspect of the present invention and advantage will become clear and be easier to be understood, wherein:
Fig. 1 illustrates the portable terminal according to exemplary embodiment of the present invention;
Fig. 2 is the flow chart illustrating according to the method for the user data for the protection of portable terminal of exemplary embodiment of the present invention.
Embodiment
Now the embodiment of the present invention is described in detail, its sample table shows in the accompanying drawings, and wherein, identical label represents same parts all the time.Below with reference to the accompanying drawings embodiment is described to explain the present invention.
Describe in detail according to the display unit of exemplary embodiment of the present invention and user interface supplying method thereof below in conjunction with accompanying drawing.
Fig. 1 illustrates the portable terminal 100 according to exemplary embodiment of the present invention.
With reference to Fig. 1, can comprise display unit 110, input unit 120 and control unit 130 according to the portable terminal 100 of exemplary embodiment of the present invention.
Show and there is the portable terminal of constructing shown in Fig. 1 in order not obscure inventive concept of the present invention, but portable terminal 100 also can comprise various other configurations, such as, there is the audio processing modules of microphone and loud speaker, for example, for receiving and (playing digital broadcasting, such as the mobile broadcast of DMB (DMB) or digital video broadcasting (DVB)) digital broadcasting module, for the camera model of taking, for store the memory cell of all types of programs that described portable terminal 100 carries out and process and data and for communicating (such as, Bluetooth communication) at least one communication module.
The description consistent with known features, function and operation in structure, function and the operation of all parts to described portable terminal 100 by omission in the following description, with the inventive concept of the present invention of avoiding confusion.
Display unit 110 is demonstration information under the control of control unit 130.At length say, display unit 110 can show the user interface that comprises various contents and project under the control of control unit 130.In addition, display unit 110 can also show wide range of information projects as known in the art.
Input unit 120 is for receive order and the data of the operation for controlling described portable terminal from outside (such as, user), such as alphanumeric data.For example, input unit 120 can receive the password of user's input.Under the blocking of described portable terminal 100, the password that user can input for blocking described in release by input unit 120.
Although, for convenience of description, display unit 110 and input unit 120 being described as to independently unit herein, display unit 110 and input unit 120 can be combined into touch-screen.
Control unit 130 is for controlling the integrated operation of portable terminal 100.
The password that control unit 130 can receive from user based on input unit 120 provides the user operating environment corresponding with described password.For example, control unit 130 can judge whether the password that input unit 120 receives under the blocking of portable terminal 100 is valid password, and here, valid password refers to the password for 100 blocking of unlock of portable terminal.When the password receiving when input unit 120 is not valid password, control unit 130 maintains the blocking of portable terminal 100.When the password receiving when input unit 120 is valid password, control unit 130 provides the user operating environment corresponding with described password.
Here, valid password is the password that user sets in advance, and can be divided into first password and the second password.Here, first password is corresponding to administrator's password, that is, user's operating environment corresponding with first password is the unrestricted user's operating environment of operation (following, to be called " normal users operating environment ").On the contrary, the second password is corresponding to passwords of visitors, that is, the user operating environment corresponding with the second password is user's operating environment (following, to be called " restricted user's operating environment ") that operation is restricted.
Under restricted user's operating environment, user's certain operations will be restricted.For example, operation operations such as (for example) editor, deletions that user attempts to revise legacy data is prohibited to carry out.
Selectively, under restricted user's operating environment, user will be restricted the access of protected data and application, that is, user cannot access predefined data and application.For example, when user is under restricted user's operating environment, for example, when (, coming by the selection of input unit 120) attempts to access these data and application, control unit 130 is controlled the information that display unit 110 shows that the data of selection and the access of application are forbidden.Selectively, under the user's operating environment being restricted, protected data and application are preset and are hidden by user, thereby therefore prevent the access of user for these data and application.For example, open photograph album, be shown as sky; Enter dialing interface and call, can point out and cannot use; Enter note interface, be recorded as sky.
Selectively, under restricted user's operating environment, user to data copy or move operation is prohibited, thereby prevent that user from copying or moving to other device by data from portable terminal 100.,, if user attempts to carry out copy operation, control unit 130 is controlled display unit 110 and is shown about the forbidden information of copy operation and forbid the execution of copy operation.
Control unit 130 is controlled display unit 110 and is shown the user interface corresponding with user's operating environment.
Below; 2 describe in detail according to the method for the user data for the protection of portable terminal of exemplary embodiment of the present invention by reference to the accompanying drawings; wherein, Fig. 2 is the flow chart illustrating according to the method for the user data for the protection of portable terminal of exemplary embodiment of the present invention.
As shown in Figure 2, in step 210, input unit 120, under the blocking of portable terminal 100, receives the password of user's input.
In step 220, control unit 130 determines whether the password that input unit 120 receives is valid password.As mentioned above, the valid password is here first password or the second password that user sets in advance.
If in step 220, control unit 130 determines that the password that input unit 120 receives is invalid password, and control unit 130 is controlled display unit 110 and shown the information about the password useless of input, and returns to the password of waiting for that user inputs.
Selectively, if when the password of the inferior input of user's N continuous (N is not less than 1 positive integer) is all invalid password, control unit 130 is controlled display unit 110 and is shown about the information that can not input password, and forbids that input unit 120 receives the password certain hour of user's input.Here, above-mentioned N and certain hour can be set in advance by user.
If in step 220, control unit 130 determines that the password that input unit 120 receives is valid password, and in step 230, control unit 130 determines that it is first password or the second password that input unit 120 receives password.
If in step 230, control unit 130 determines that the password that input unit 120 receives is first password, in step 240, control unit 130 is controlled portable terminal 100 normal users operating environment is provided, for example, control unit 130 is controlled the display unit 110 demonstration user interface corresponding with normal users operating environment.
If in step 230, control unit 130 determines that the password that input unit 120 receives is the second password, in step 250, control unit 130 is controlled portable terminal 100 restricted user's operating environment is provided, for example, control unit 130 is controlled the display unit 110 demonstration user interface corresponding with restricted user's operating environment.
According to an aspect of the present invention, under restricted user's operating environment, the scheduled operation of user for the data that set in advance and/or application of forbidding keeping straight on.
As example, under restricted user's operating environment, below at least one operation in operation is prohibited to carry out: 1) for the operation of visit data and application; 2) for the scheduled operation of Update Table, for example, editor, deletion and shearing etc.; 3) for by the data mobile of mancarried device or copy to the operation of other device.
When under restricted user's operating environment, while being prohibited for the operation of visit data and application, the above data of the user interface showing by display unit 110 and application are hidden, and therefore use the user of portable terminal cannot access described data and application.Selectively, when under restricted user's operating environment, while being prohibited for the operation of visit data and application, if user attempts to access described tentation data and application by input unit 110, control unit 130 control display unit show about disable access user attempt access data and the information of application.
For example, user can set in advance the operation for accessing tentation data and application that is operating as banning use of under restricted user's operating environment for predetermined photo, therefore in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user has inputted the input corresponding with operation for accessing described predetermined photo by input unit 120, control unit 130 is controlled display unit 110 and is shown the forbidden information of access about described predetermined photo, and refusal is carried out the access for described predetermined photo.
Selectively, user can set in advance the type of the data of the object of forbidding for the operation of visit data and application, for example, user can for example, set in advance for the type of image (, jpeg image) operation for accessing tentation data and application that is operating as banning use of under restricted user's operating environment.Therefore, in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user has inputted the input corresponding with operation for accessing this jpeg image by input unit 120 for jpeg image arbitrarily, control unit 130 is controlled display unit 110 and is shown the forbidden information of access about jpeg image, and refusal is carried out the access for this jpeg image.
When under restricted user's operating environment, (be for example used for the scheduled operation of Update Table, editor, delete and shear) while being prohibited, if user has carried out above-mentioned scheduled operation by input unit 110, control unit 130 is controlled display unit 110 and is shown about the forbidden information of the performed operation of user.
For example, user can set in advance the operation for Update Table that is operating as banning use of under restricted user's operating environment for text.Therefore, in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user has inputted the input corresponding with operation for revising text file by input unit 120, control unit 130 is controlled display unit 110 and is shown the forbidden information of amendment about text file, and refusal is carried out the amendment for text file.On the contrary, if user has inputted the operation for accessing text file by input unit 120,, owing to not being prohibited for the operation of accessing text file, therefore allow the access for text file.
Selectively, user can set in advance the type of the data of the object of forbidding for the operation of Update Table, for example, user can for example, set in advance for the type of image (, jpeg image) operation for Update Table that is operating as banning use of under restricted user's operating environment.Therefore, in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user has inputted the input corresponding with operation for revising this jpeg image by input unit 120 for jpeg image arbitrarily, control unit 130 is controlled display unit 110 and is shown the forbidden information of access about jpeg image, and refusal is carried out the amendment for this jpeg image.
When under restricted user's operating environment, when the data mobile of mancarried device or the operation that copies to other device are prohibited, if user has inputted the input for carrying out this operation by input unit 110, control unit 130 is controlled display unit 110 and is shown about the forbidden information of the performed operation of user.
For example, user can set in advance being operating as of banning use of under restricted user's operating environment for by the data mobile of mancarried device or copy to the operation of other device for pre-determined text file.Therefore, in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user has inputted and operation for described pre-determined text file being moved or copied to other device by input unit 120, control unit 130 control display unit 110 show about text file move or copy forbidden information, and refusal is carried out moving or copying for text file.On the contrary, if user has inputted the operation for accessing text file by input unit 120,, owing to not being prohibited for the operation of accessing text file, therefore allow the access for text file.
Selectively, user can set in advance the type of the data of the object of forbidding for operation mobile or that copy, for example, user can for example, set in advance for the type of image (, jpeg image) being operating as for operation mobile or that copy of banning use of under restricted user's operating environment.Therefore, in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user by input unit 120 for jpeg image arbitrarily inputted with for mobile or copy input corresponding to the operation of this jpeg image, control unit 130 is controlled display unit 110 and is shown the forbidden information of access about jpeg image, and refusal is carried out the amendment for this jpeg image.
According to an aspect of the present invention, mainly by different unlocking pins, user data is protected, for example, distinguished cell phone managing person and mobile phone visitor by different unlocking pins is set, thereby to the in addition control of authority of private data in portable terminal and function.Meanwhile, user can freely arrange needs protected data and function.
Although represented and described some embodiments of the present invention, it should be appreciated by those skilled in the art that in the case of not departing from by claim and equivalent thereof and limit the principle of the present invention and spirit of its scope, can modify to these embodiment.

Claims (12)

1. for the protection of a method for the user data of portable terminal, it is characterized in that comprising the steps:
Under the blocking of described portable terminal, receive the password of user's input;
Determine whether the password that user inputs is a valid password at least one valid password;
In the time determining that the password of user's input is valid password, the user operating environment corresponding with the password of user's input is provided,
In the time determining that the password of user's input is not valid password, maintain the blocking of described portable terminal.
2. method according to claim 1, is characterized in that, provides the step of the user operating environment corresponding with the password of user input to comprise:
In the time that the password of user's input is first password, provide normal users operating environment;
In the time that the password of user's input is the second password, provide restricted user's operating environment;
Wherein, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of tentation data and/or application.
3. method according to claim 2, is characterized in that, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of predetermined data types.
4. method according to claim 3, is characterized in that, described scheduled operation comprises at least one in following operation:
For the operation of visit data and application;
For the scheduled operation of Update Table;
For by the data mobile of described portable terminal or copy to the operation of other device.
5. method according to claim 2, is characterized in that, under described restricted user's operating environment, described tentation data and/or application are hidden.
6. method according to claim 2, it is characterized in that, when under described restricted user environment, user input during with predetermined behaviour for described tentation data and/or application, shows the forbidden information of execution the described scheduled operation of refusal execution about described scheduled operation.
7. there is a portable terminal for data protection function, it is characterized in that comprising:
Input unit, for receiving the password of user's input;
Whether control unit is valid password for the password of determining user's input;
Display unit, for showing the user interface corresponding with user's operating environment,
Wherein, in the time determining that the password of user's input is valid password, control unit control display unit shows the user interface corresponding to the user operating environment corresponding with the password of user's input.
8. portable terminal according to claim 7, wherein, in the time that the password of user's input is first password, control unit control display unit shows the user interface corresponding with normal user's operating environment;
In the time that the password of user's input is the second password, control unit control display unit shows the user interface corresponding with restricted user's operating environment,
Wherein, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of tentation data and/or application.
9. portable terminal according to claim 8, is characterized in that, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of predetermined data types.
10. portable terminal according to claim 9, is characterized in that, described scheduled operation comprises at least one in following operation:
For the operation of visit data and application;
For the scheduled operation of Update Table;
For by the data mobile of described portable terminal or copy to the operation of other device.
11. portable terminals according to claim 8, is characterized in that, described tentation data and/or application are hidden and are presented in the user interface corresponding with restricted user's operating environment.
12. portable terminals according to claim 8, it is characterized in that, when under described restricted user environment, while receiving with predetermined behaviour for described tentation data and/or application by input unit, control unit control display unit shows the forbidden information of execution about described scheduled operation, and refusal is carried out described scheduled operation.
CN201210548493.3A 2012-12-17 2012-12-17 Method used for protecting user data of portable terminal and portable terminal Pending CN103873668A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210548493.3A CN103873668A (en) 2012-12-17 2012-12-17 Method used for protecting user data of portable terminal and portable terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210548493.3A CN103873668A (en) 2012-12-17 2012-12-17 Method used for protecting user data of portable terminal and portable terminal

Publications (1)

Publication Number Publication Date
CN103873668A true CN103873668A (en) 2014-06-18

Family

ID=50911778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210548493.3A Pending CN103873668A (en) 2012-12-17 2012-12-17 Method used for protecting user data of portable terminal and portable terminal

Country Status (1)

Country Link
CN (1) CN103873668A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104361269A (en) * 2014-10-31 2015-02-18 中国联合网络通信集团有限公司 Access control method and device of access target in terminal
CN104615956A (en) * 2015-03-04 2015-05-13 浪潮集团有限公司 Method for distinguishing and encrypting storage devices
CN104700050A (en) * 2015-03-17 2015-06-10 上海天奕达电子科技有限公司 Mobile terminal safety positioning method and device
CN104869255A (en) * 2015-05-28 2015-08-26 广东欧珀移动通信有限公司 Application access method and device and mobile terminal
CN105049597A (en) * 2015-06-01 2015-11-11 惠州Tcl移动通信有限公司 Interaction method and system for entering visitor mode during picture browse of mobile terminal
CN105138874A (en) * 2015-08-24 2015-12-09 努比亚技术有限公司 Screen unlocking control device and method
CN105787309A (en) * 2014-12-24 2016-07-20 浪潮乐金数字移动通信有限公司 Unlocking method and device, and screen locking method and device
CN105827622A (en) * 2016-04-25 2016-08-03 乐视控股(北京)有限公司 Method and device for protecting user information
CN105844137A (en) * 2016-04-07 2016-08-10 上海斐讯数据通信技术有限公司 Device and method for identifying picture browsing operation permissions
CN105868648A (en) * 2016-03-28 2016-08-17 珠海格力电器股份有限公司 Mobile terminal and data processing method and device for visitor mode of mobile terminal
CN105975853A (en) * 2016-05-25 2016-09-28 宇龙计算机通信科技(深圳)有限公司 Safe operation scene setting method and device and terminal
CN112069539A (en) * 2020-09-05 2020-12-11 蔡春梅 Information protection method and artificial intelligence platform based on cloud computing and block chain service

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007288519A (en) * 2006-04-17 2007-11-01 Casio Hitachi Mobile Communications Co Ltd Media data processing device, media data processing method, and media data processing program
CN101815116A (en) * 2009-02-20 2010-08-25 中兴通讯股份有限公司 Mobile telephone method and device based on multi-user
CN102176712A (en) * 2011-02-14 2011-09-07 华为终端有限公司 Identity authentication method and data card

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007288519A (en) * 2006-04-17 2007-11-01 Casio Hitachi Mobile Communications Co Ltd Media data processing device, media data processing method, and media data processing program
CN101815116A (en) * 2009-02-20 2010-08-25 中兴通讯股份有限公司 Mobile telephone method and device based on multi-user
CN102176712A (en) * 2011-02-14 2011-09-07 华为终端有限公司 Identity authentication method and data card

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104361269A (en) * 2014-10-31 2015-02-18 中国联合网络通信集团有限公司 Access control method and device of access target in terminal
CN105787309A (en) * 2014-12-24 2016-07-20 浪潮乐金数字移动通信有限公司 Unlocking method and device, and screen locking method and device
CN104615956A (en) * 2015-03-04 2015-05-13 浪潮集团有限公司 Method for distinguishing and encrypting storage devices
CN104700050A (en) * 2015-03-17 2015-06-10 上海天奕达电子科技有限公司 Mobile terminal safety positioning method and device
CN104869255A (en) * 2015-05-28 2015-08-26 广东欧珀移动通信有限公司 Application access method and device and mobile terminal
CN105049597B (en) * 2015-06-01 2018-01-02 惠州Tcl移动通信有限公司 Into the exchange method and interactive system of guest mode when mobile terminal picture browses
CN105049597A (en) * 2015-06-01 2015-11-11 惠州Tcl移动通信有限公司 Interaction method and system for entering visitor mode during picture browse of mobile terminal
CN105138874B (en) * 2015-08-24 2018-05-08 努比亚技术有限公司 Unlocking screen control device and method
CN105138874A (en) * 2015-08-24 2015-12-09 努比亚技术有限公司 Screen unlocking control device and method
CN105868648A (en) * 2016-03-28 2016-08-17 珠海格力电器股份有限公司 Mobile terminal and data processing method and device for visitor mode of mobile terminal
CN105868648B (en) * 2016-03-28 2019-06-04 珠海格力电器股份有限公司 Mobile terminal and data processing method and device for mobile terminal guest mode
CN105844137A (en) * 2016-04-07 2016-08-10 上海斐讯数据通信技术有限公司 Device and method for identifying picture browsing operation permissions
CN105844137B (en) * 2016-04-07 2020-01-07 上海斐讯数据通信技术有限公司 Device and method for identifying picture browsing operation authority
CN105827622A (en) * 2016-04-25 2016-08-03 乐视控股(北京)有限公司 Method and device for protecting user information
CN105975853A (en) * 2016-05-25 2016-09-28 宇龙计算机通信科技(深圳)有限公司 Safe operation scene setting method and device and terminal
CN112069539A (en) * 2020-09-05 2020-12-11 蔡春梅 Information protection method and artificial intelligence platform based on cloud computing and block chain service
CN112069539B (en) * 2020-09-05 2021-10-29 蔡春梅 Information protection method and artificial intelligence platform based on cloud computing and block chain service

Similar Documents

Publication Publication Date Title
CN103873668A (en) Method used for protecting user data of portable terminal and portable terminal
CN107436784B (en) Floating window display method and device
CN102572092B (en) Mobile terminal and method of displaying information therein
EP2528310B1 (en) Mobile terminal and mode controlling method therein
RU2423734C2 (en) Mobile terminal, system and method of restricting access to information using said mobile terminal
JP2017518598A (en) Authority management method, apparatus, program, and recording medium
EP4080387A1 (en) Mobile terminal privacy protection method, protection apparatus, and mobile terminal
CN103955638A (en) Method and device for privacy protection
KR20120089986A (en) Mobile terminal and method for managing information thereof
CN102572091A (en) Mobile terminal and method of sharing information therein
TW201415245A (en) Mobile device child share
TW201401100A (en) Permission management method for applications, electronic device thereof, and computer readable medium
EP3229136A1 (en) Application calling management method and apparatus
CN105471956A (en) User safety control method of social network, social application tool and terminal
CN104283874A (en) Data authority control method and device based on cloud server
CN105323370A (en) Mobile terminal and method for controlling the same
CN102810139B (en) Secure data operation method and communication terminal
CN112784262A (en) Data access method, device, terminal and storage medium
US20150146071A1 (en) Mobile terminal and method for controlling the same
KR20120066894A (en) Method for protecting private information of mobile terminal
WO2021147430A1 (en) Information processing method and device, and storage medium
KR20100030820A (en) Portable terminal and image data reproducing method using the same
CN111209559B (en) Permission processing method and device of application program, storage medium and electronic equipment
KR101958777B1 (en) Controlling Method for Mobile Terminal
CN106066967A (en) Permission setting method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140618

RJ01 Rejection of invention patent application after publication