CN103873668A - Method used for protecting user data of portable terminal and portable terminal - Google Patents
Method used for protecting user data of portable terminal and portable terminal Download PDFInfo
- Publication number
- CN103873668A CN103873668A CN201210548493.3A CN201210548493A CN103873668A CN 103873668 A CN103873668 A CN 103873668A CN 201210548493 A CN201210548493 A CN 201210548493A CN 103873668 A CN103873668 A CN 103873668A
- Authority
- CN
- China
- Prior art keywords
- user
- password
- input
- portable terminal
- operating environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses a method used for protecting user data of a portable terminal and the portable terminal. The method comprises the following steps: receiving a password input by a user under the blocking state of the portable terminal; determining whether the password input by the user is one of at least one valid password; providing a user operation environment which corresponds to the password, input by the user, when the password input by the user is the valid password; maintaining the blocking state of the portable terminal when the password input by the user is not the valid password. According to technical scheme of the invention, the user data are protected mainly through different deblocking passwords, for example, mobile phone administrators and mobile phone visitors are distinguished through setting the different deblocking passwords, and therefore, right control is performed on privacy data and functions in the portable terminal. Meanwhile, the user can freely set data and functions which need to be protected.
Description
Technical field
The present invention relates to the data protection of portable terminal, more particularly, relate to a kind of method and portable terminal of the user data for the protection of portable terminal.
Background technology
In recent years, growing along with information, communication and semiconductor technology, the use of portable terminal is more and more universal.
At present, on the portable terminal of part (such as, commercial mobile phone) with visitor's pattern, user can start this pattern the private data of oneself is protected.But deactivation visitor pattern again in the time that people at one's side need to use mobile phone, need to spend the regular hour, and can make the other side very unhappy.Some time also not free going arrange, mobile phone is taken away by the other side.In addition, user can not freely arrange the data that need protection and function.In application market, the encryption software being seen everywhere, some need to open encryption software could arrive protected data, and some all requires to input password while needing the protected data of each use.
Need a kind of technology that can more effectively limit the access of data/application.
Summary of the invention
In order to solve the above-mentioned problems in the prior art, the invention provides a kind of password according to user's input provides the technical scheme of different user operating environment.
According to an aspect of the present invention, provide a kind of method of the user data for the protection of portable terminal, comprised the steps: under the blocking of described portable terminal, received the password of user's input; Determine whether the password that user inputs is a valid password at least one valid password; In the time determining that the password of user's input is valid password, the user operating environment corresponding with the password of user's input is provided, in the time determining that the password of user's input is not valid password, maintain the blocking of described portable terminal.
Preferably, provide the step of the user operating environment corresponding with the password of user input to comprise: in the time that the password of user's input is first password, to provide normal users operating environment; In the time that the password of user's input is the second password, provide restricted user's operating environment; Wherein, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of tentation data and/or application.
Preferably, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of predetermined data types.
Preferably, described scheduled operation comprises at least one in following operation: for the operation of visit data and application; For the scheduled operation of Update Table; For by the data mobile of described portable terminal or copy to the operation of other device.
Preferably, under described restricted user's operating environment, described tentation data and/or application are hidden.
Preferably, when under described restricted user environment, user input during with predetermined behaviour for described tentation data and/or application, shows the forbidden information of execution the described scheduled operation of refusal execution about described scheduled operation.
According to a further aspect in the invention, provide a kind of portable terminal with data protection function, having comprised: input unit, for receiving the password of user's input; Whether control unit is valid password for the password of determining user's input; Display unit, for showing the user interface corresponding with user's operating environment, wherein, in the time determining that the password of user's input is valid password, control unit control display unit shows the user interface corresponding to the user operating environment corresponding with the password of user's input.
Preferably, in the time that the password of user's input is first password, control unit control display unit shows the user interface corresponding with normal user's operating environment; In the time that the password of user's input is the second password, control unit control display unit shows the user interface corresponding with restricted user's operating environment, wherein, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of tentation data and/or application.
Preferably, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of predetermined data types.
Preferably, described scheduled operation comprises at least one in following operation: for the operation of visit data and application; For the scheduled operation of Update Table; For by the data mobile of described portable terminal or copy to the operation of other device.
Preferably, described tentation data and/or application are hidden and are presented in the user interface corresponding with restricted user's operating environment.
Preferably, when under described restricted user environment, while receiving with predetermined behaviour for described tentation data and/or application by input unit, control unit control display unit shows the forbidden information of execution about described scheduled operation, and refusal is carried out described scheduled operation.
According to technical scheme of the present invention; mainly by different unlocking pins, user data is protected; for example by being set, different unlocking pins distinguishes cell phone managing person and mobile phone visitor, thereby to the in addition control of authority of private data in portable terminal and function.Meanwhile, user can freely arrange needs protected data and function.
Brief description of the drawings
By the description of embodiment being carried out below in conjunction with accompanying drawing, these and/or other aspect of the present invention and advantage will become clear and be easier to be understood, wherein:
Fig. 1 illustrates the portable terminal according to exemplary embodiment of the present invention;
Fig. 2 is the flow chart illustrating according to the method for the user data for the protection of portable terminal of exemplary embodiment of the present invention.
Embodiment
Now the embodiment of the present invention is described in detail, its sample table shows in the accompanying drawings, and wherein, identical label represents same parts all the time.Below with reference to the accompanying drawings embodiment is described to explain the present invention.
Describe in detail according to the display unit of exemplary embodiment of the present invention and user interface supplying method thereof below in conjunction with accompanying drawing.
Fig. 1 illustrates the portable terminal 100 according to exemplary embodiment of the present invention.
With reference to Fig. 1, can comprise display unit 110, input unit 120 and control unit 130 according to the portable terminal 100 of exemplary embodiment of the present invention.
Show and there is the portable terminal of constructing shown in Fig. 1 in order not obscure inventive concept of the present invention, but portable terminal 100 also can comprise various other configurations, such as, there is the audio processing modules of microphone and loud speaker, for example, for receiving and (playing digital broadcasting, such as the mobile broadcast of DMB (DMB) or digital video broadcasting (DVB)) digital broadcasting module, for the camera model of taking, for store the memory cell of all types of programs that described portable terminal 100 carries out and process and data and for communicating (such as, Bluetooth communication) at least one communication module.
The description consistent with known features, function and operation in structure, function and the operation of all parts to described portable terminal 100 by omission in the following description, with the inventive concept of the present invention of avoiding confusion.
Although, for convenience of description, display unit 110 and input unit 120 being described as to independently unit herein, display unit 110 and input unit 120 can be combined into touch-screen.
The password that control unit 130 can receive from user based on input unit 120 provides the user operating environment corresponding with described password.For example, control unit 130 can judge whether the password that input unit 120 receives under the blocking of portable terminal 100 is valid password, and here, valid password refers to the password for 100 blocking of unlock of portable terminal.When the password receiving when input unit 120 is not valid password, control unit 130 maintains the blocking of portable terminal 100.When the password receiving when input unit 120 is valid password, control unit 130 provides the user operating environment corresponding with described password.
Here, valid password is the password that user sets in advance, and can be divided into first password and the second password.Here, first password is corresponding to administrator's password, that is, user's operating environment corresponding with first password is the unrestricted user's operating environment of operation (following, to be called " normal users operating environment ").On the contrary, the second password is corresponding to passwords of visitors, that is, the user operating environment corresponding with the second password is user's operating environment (following, to be called " restricted user's operating environment ") that operation is restricted.
Under restricted user's operating environment, user's certain operations will be restricted.For example, operation operations such as (for example) editor, deletions that user attempts to revise legacy data is prohibited to carry out.
Selectively, under restricted user's operating environment, user will be restricted the access of protected data and application, that is, user cannot access predefined data and application.For example, when user is under restricted user's operating environment, for example, when (, coming by the selection of input unit 120) attempts to access these data and application, control unit 130 is controlled the information that display unit 110 shows that the data of selection and the access of application are forbidden.Selectively, under the user's operating environment being restricted, protected data and application are preset and are hidden by user, thereby therefore prevent the access of user for these data and application.For example, open photograph album, be shown as sky; Enter dialing interface and call, can point out and cannot use; Enter note interface, be recorded as sky.
Selectively, under restricted user's operating environment, user to data copy or move operation is prohibited, thereby prevent that user from copying or moving to other device by data from portable terminal 100.,, if user attempts to carry out copy operation, control unit 130 is controlled display unit 110 and is shown about the forbidden information of copy operation and forbid the execution of copy operation.
Below; 2 describe in detail according to the method for the user data for the protection of portable terminal of exemplary embodiment of the present invention by reference to the accompanying drawings; wherein, Fig. 2 is the flow chart illustrating according to the method for the user data for the protection of portable terminal of exemplary embodiment of the present invention.
As shown in Figure 2, in step 210, input unit 120, under the blocking of portable terminal 100, receives the password of user's input.
In step 220, control unit 130 determines whether the password that input unit 120 receives is valid password.As mentioned above, the valid password is here first password or the second password that user sets in advance.
If in step 220, control unit 130 determines that the password that input unit 120 receives is invalid password, and control unit 130 is controlled display unit 110 and shown the information about the password useless of input, and returns to the password of waiting for that user inputs.
Selectively, if when the password of the inferior input of user's N continuous (N is not less than 1 positive integer) is all invalid password, control unit 130 is controlled display unit 110 and is shown about the information that can not input password, and forbids that input unit 120 receives the password certain hour of user's input.Here, above-mentioned N and certain hour can be set in advance by user.
If in step 220, control unit 130 determines that the password that input unit 120 receives is valid password, and in step 230, control unit 130 determines that it is first password or the second password that input unit 120 receives password.
If in step 230, control unit 130 determines that the password that input unit 120 receives is first password, in step 240, control unit 130 is controlled portable terminal 100 normal users operating environment is provided, for example, control unit 130 is controlled the display unit 110 demonstration user interface corresponding with normal users operating environment.
If in step 230, control unit 130 determines that the password that input unit 120 receives is the second password, in step 250, control unit 130 is controlled portable terminal 100 restricted user's operating environment is provided, for example, control unit 130 is controlled the display unit 110 demonstration user interface corresponding with restricted user's operating environment.
According to an aspect of the present invention, under restricted user's operating environment, the scheduled operation of user for the data that set in advance and/or application of forbidding keeping straight on.
As example, under restricted user's operating environment, below at least one operation in operation is prohibited to carry out: 1) for the operation of visit data and application; 2) for the scheduled operation of Update Table, for example, editor, deletion and shearing etc.; 3) for by the data mobile of mancarried device or copy to the operation of other device.
When under restricted user's operating environment, while being prohibited for the operation of visit data and application, the above data of the user interface showing by display unit 110 and application are hidden, and therefore use the user of portable terminal cannot access described data and application.Selectively, when under restricted user's operating environment, while being prohibited for the operation of visit data and application, if user attempts to access described tentation data and application by input unit 110, control unit 130 control display unit show about disable access user attempt access data and the information of application.
For example, user can set in advance the operation for accessing tentation data and application that is operating as banning use of under restricted user's operating environment for predetermined photo, therefore in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user has inputted the input corresponding with operation for accessing described predetermined photo by input unit 120, control unit 130 is controlled display unit 110 and is shown the forbidden information of access about described predetermined photo, and refusal is carried out the access for described predetermined photo.
Selectively, user can set in advance the type of the data of the object of forbidding for the operation of visit data and application, for example, user can for example, set in advance for the type of image (, jpeg image) operation for accessing tentation data and application that is operating as banning use of under restricted user's operating environment.Therefore, in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user has inputted the input corresponding with operation for accessing this jpeg image by input unit 120 for jpeg image arbitrarily, control unit 130 is controlled display unit 110 and is shown the forbidden information of access about jpeg image, and refusal is carried out the access for this jpeg image.
When under restricted user's operating environment, (be for example used for the scheduled operation of Update Table, editor, delete and shear) while being prohibited, if user has carried out above-mentioned scheduled operation by input unit 110, control unit 130 is controlled display unit 110 and is shown about the forbidden information of the performed operation of user.
For example, user can set in advance the operation for Update Table that is operating as banning use of under restricted user's operating environment for text.Therefore, in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user has inputted the input corresponding with operation for revising text file by input unit 120, control unit 130 is controlled display unit 110 and is shown the forbidden information of amendment about text file, and refusal is carried out the amendment for text file.On the contrary, if user has inputted the operation for accessing text file by input unit 120,, owing to not being prohibited for the operation of accessing text file, therefore allow the access for text file.
Selectively, user can set in advance the type of the data of the object of forbidding for the operation of Update Table, for example, user can for example, set in advance for the type of image (, jpeg image) operation for Update Table that is operating as banning use of under restricted user's operating environment.Therefore, in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user has inputted the input corresponding with operation for revising this jpeg image by input unit 120 for jpeg image arbitrarily, control unit 130 is controlled display unit 110 and is shown the forbidden information of access about jpeg image, and refusal is carried out the amendment for this jpeg image.
When under restricted user's operating environment, when the data mobile of mancarried device or the operation that copies to other device are prohibited, if user has inputted the input for carrying out this operation by input unit 110, control unit 130 is controlled display unit 110 and is shown about the forbidden information of the performed operation of user.
For example, user can set in advance being operating as of banning use of under restricted user's operating environment for by the data mobile of mancarried device or copy to the operation of other device for pre-determined text file.Therefore, in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user has inputted and operation for described pre-determined text file being moved or copied to other device by input unit 120, control unit 130 control display unit 110 show about text file move or copy forbidden information, and refusal is carried out moving or copying for text file.On the contrary, if user has inputted the operation for accessing text file by input unit 120,, owing to not being prohibited for the operation of accessing text file, therefore allow the access for text file.
Selectively, user can set in advance the type of the data of the object of forbidding for operation mobile or that copy, for example, user can for example, set in advance for the type of image (, jpeg image) being operating as for operation mobile or that copy of banning use of under restricted user's operating environment.Therefore, in the time that portable terminal 100 operates under restricted user's operating environment due to the input of the second password, if user by input unit 120 for jpeg image arbitrarily inputted with for mobile or copy input corresponding to the operation of this jpeg image, control unit 130 is controlled display unit 110 and is shown the forbidden information of access about jpeg image, and refusal is carried out the amendment for this jpeg image.
According to an aspect of the present invention, mainly by different unlocking pins, user data is protected, for example, distinguished cell phone managing person and mobile phone visitor by different unlocking pins is set, thereby to the in addition control of authority of private data in portable terminal and function.Meanwhile, user can freely arrange needs protected data and function.
Although represented and described some embodiments of the present invention, it should be appreciated by those skilled in the art that in the case of not departing from by claim and equivalent thereof and limit the principle of the present invention and spirit of its scope, can modify to these embodiment.
Claims (12)
1. for the protection of a method for the user data of portable terminal, it is characterized in that comprising the steps:
Under the blocking of described portable terminal, receive the password of user's input;
Determine whether the password that user inputs is a valid password at least one valid password;
In the time determining that the password of user's input is valid password, the user operating environment corresponding with the password of user's input is provided,
In the time determining that the password of user's input is not valid password, maintain the blocking of described portable terminal.
2. method according to claim 1, is characterized in that, provides the step of the user operating environment corresponding with the password of user input to comprise:
In the time that the password of user's input is first password, provide normal users operating environment;
In the time that the password of user's input is the second password, provide restricted user's operating environment;
Wherein, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of tentation data and/or application.
3. method according to claim 2, is characterized in that, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of predetermined data types.
4. method according to claim 3, is characterized in that, described scheduled operation comprises at least one in following operation:
For the operation of visit data and application;
For the scheduled operation of Update Table;
For by the data mobile of described portable terminal or copy to the operation of other device.
5. method according to claim 2, is characterized in that, under described restricted user's operating environment, described tentation data and/or application are hidden.
6. method according to claim 2, it is characterized in that, when under described restricted user environment, user input during with predetermined behaviour for described tentation data and/or application, shows the forbidden information of execution the described scheduled operation of refusal execution about described scheduled operation.
7. there is a portable terminal for data protection function, it is characterized in that comprising:
Input unit, for receiving the password of user's input;
Whether control unit is valid password for the password of determining user's input;
Display unit, for showing the user interface corresponding with user's operating environment,
Wherein, in the time determining that the password of user's input is valid password, control unit control display unit shows the user interface corresponding to the user operating environment corresponding with the password of user's input.
8. portable terminal according to claim 7, wherein, in the time that the password of user's input is first password, control unit control display unit shows the user interface corresponding with normal user's operating environment;
In the time that the password of user's input is the second password, control unit control display unit shows the user interface corresponding with restricted user's operating environment,
Wherein, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of tentation data and/or application.
9. portable terminal according to claim 8, is characterized in that, under described restricted user's operating environment, user is prohibited to carry out for the scheduled operation of predetermined data types.
10. portable terminal according to claim 9, is characterized in that, described scheduled operation comprises at least one in following operation:
For the operation of visit data and application;
For the scheduled operation of Update Table;
For by the data mobile of described portable terminal or copy to the operation of other device.
11. portable terminals according to claim 8, is characterized in that, described tentation data and/or application are hidden and are presented in the user interface corresponding with restricted user's operating environment.
12. portable terminals according to claim 8, it is characterized in that, when under described restricted user environment, while receiving with predetermined behaviour for described tentation data and/or application by input unit, control unit control display unit shows the forbidden information of execution about described scheduled operation, and refusal is carried out described scheduled operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210548493.3A CN103873668A (en) | 2012-12-17 | 2012-12-17 | Method used for protecting user data of portable terminal and portable terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210548493.3A CN103873668A (en) | 2012-12-17 | 2012-12-17 | Method used for protecting user data of portable terminal and portable terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103873668A true CN103873668A (en) | 2014-06-18 |
Family
ID=50911778
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210548493.3A Pending CN103873668A (en) | 2012-12-17 | 2012-12-17 | Method used for protecting user data of portable terminal and portable terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103873668A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104361269A (en) * | 2014-10-31 | 2015-02-18 | 中国联合网络通信集团有限公司 | Access control method and device of access target in terminal |
CN104615956A (en) * | 2015-03-04 | 2015-05-13 | 浪潮集团有限公司 | Method for distinguishing and encrypting storage devices |
CN104700050A (en) * | 2015-03-17 | 2015-06-10 | 上海天奕达电子科技有限公司 | Mobile terminal safety positioning method and device |
CN104869255A (en) * | 2015-05-28 | 2015-08-26 | 广东欧珀移动通信有限公司 | Application access method and device and mobile terminal |
CN105049597A (en) * | 2015-06-01 | 2015-11-11 | 惠州Tcl移动通信有限公司 | Interaction method and system for entering visitor mode during picture browse of mobile terminal |
CN105138874A (en) * | 2015-08-24 | 2015-12-09 | 努比亚技术有限公司 | Screen unlocking control device and method |
CN105787309A (en) * | 2014-12-24 | 2016-07-20 | 浪潮乐金数字移动通信有限公司 | Unlocking method and device, and screen locking method and device |
CN105827622A (en) * | 2016-04-25 | 2016-08-03 | 乐视控股(北京)有限公司 | Method and device for protecting user information |
CN105844137A (en) * | 2016-04-07 | 2016-08-10 | 上海斐讯数据通信技术有限公司 | Device and method for identifying picture browsing operation permissions |
CN105868648A (en) * | 2016-03-28 | 2016-08-17 | 珠海格力电器股份有限公司 | Mobile terminal and data processing method and device for visitor mode of mobile terminal |
CN105975853A (en) * | 2016-05-25 | 2016-09-28 | 宇龙计算机通信科技(深圳)有限公司 | Safe operation scene setting method and device and terminal |
CN112069539A (en) * | 2020-09-05 | 2020-12-11 | 蔡春梅 | Information protection method and artificial intelligence platform based on cloud computing and block chain service |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007288519A (en) * | 2006-04-17 | 2007-11-01 | Casio Hitachi Mobile Communications Co Ltd | Media data processing device, media data processing method, and media data processing program |
CN101815116A (en) * | 2009-02-20 | 2010-08-25 | 中兴通讯股份有限公司 | Mobile telephone method and device based on multi-user |
CN102176712A (en) * | 2011-02-14 | 2011-09-07 | 华为终端有限公司 | Identity authentication method and data card |
-
2012
- 2012-12-17 CN CN201210548493.3A patent/CN103873668A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007288519A (en) * | 2006-04-17 | 2007-11-01 | Casio Hitachi Mobile Communications Co Ltd | Media data processing device, media data processing method, and media data processing program |
CN101815116A (en) * | 2009-02-20 | 2010-08-25 | 中兴通讯股份有限公司 | Mobile telephone method and device based on multi-user |
CN102176712A (en) * | 2011-02-14 | 2011-09-07 | 华为终端有限公司 | Identity authentication method and data card |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104361269A (en) * | 2014-10-31 | 2015-02-18 | 中国联合网络通信集团有限公司 | Access control method and device of access target in terminal |
CN105787309A (en) * | 2014-12-24 | 2016-07-20 | 浪潮乐金数字移动通信有限公司 | Unlocking method and device, and screen locking method and device |
CN104615956A (en) * | 2015-03-04 | 2015-05-13 | 浪潮集团有限公司 | Method for distinguishing and encrypting storage devices |
CN104700050A (en) * | 2015-03-17 | 2015-06-10 | 上海天奕达电子科技有限公司 | Mobile terminal safety positioning method and device |
CN104869255A (en) * | 2015-05-28 | 2015-08-26 | 广东欧珀移动通信有限公司 | Application access method and device and mobile terminal |
CN105049597B (en) * | 2015-06-01 | 2018-01-02 | 惠州Tcl移动通信有限公司 | Into the exchange method and interactive system of guest mode when mobile terminal picture browses |
CN105049597A (en) * | 2015-06-01 | 2015-11-11 | 惠州Tcl移动通信有限公司 | Interaction method and system for entering visitor mode during picture browse of mobile terminal |
CN105138874B (en) * | 2015-08-24 | 2018-05-08 | 努比亚技术有限公司 | Unlocking screen control device and method |
CN105138874A (en) * | 2015-08-24 | 2015-12-09 | 努比亚技术有限公司 | Screen unlocking control device and method |
CN105868648A (en) * | 2016-03-28 | 2016-08-17 | 珠海格力电器股份有限公司 | Mobile terminal and data processing method and device for visitor mode of mobile terminal |
CN105868648B (en) * | 2016-03-28 | 2019-06-04 | 珠海格力电器股份有限公司 | Mobile terminal and data processing method and device for mobile terminal guest mode |
CN105844137A (en) * | 2016-04-07 | 2016-08-10 | 上海斐讯数据通信技术有限公司 | Device and method for identifying picture browsing operation permissions |
CN105844137B (en) * | 2016-04-07 | 2020-01-07 | 上海斐讯数据通信技术有限公司 | Device and method for identifying picture browsing operation authority |
CN105827622A (en) * | 2016-04-25 | 2016-08-03 | 乐视控股(北京)有限公司 | Method and device for protecting user information |
CN105975853A (en) * | 2016-05-25 | 2016-09-28 | 宇龙计算机通信科技(深圳)有限公司 | Safe operation scene setting method and device and terminal |
CN112069539A (en) * | 2020-09-05 | 2020-12-11 | 蔡春梅 | Information protection method and artificial intelligence platform based on cloud computing and block chain service |
CN112069539B (en) * | 2020-09-05 | 2021-10-29 | 蔡春梅 | Information protection method and artificial intelligence platform based on cloud computing and block chain service |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103873668A (en) | Method used for protecting user data of portable terminal and portable terminal | |
CN107436784B (en) | Floating window display method and device | |
CN102572092B (en) | Mobile terminal and method of displaying information therein | |
EP2528310B1 (en) | Mobile terminal and mode controlling method therein | |
RU2423734C2 (en) | Mobile terminal, system and method of restricting access to information using said mobile terminal | |
JP2017518598A (en) | Authority management method, apparatus, program, and recording medium | |
EP4080387A1 (en) | Mobile terminal privacy protection method, protection apparatus, and mobile terminal | |
CN103955638A (en) | Method and device for privacy protection | |
KR20120089986A (en) | Mobile terminal and method for managing information thereof | |
CN102572091A (en) | Mobile terminal and method of sharing information therein | |
TW201415245A (en) | Mobile device child share | |
TW201401100A (en) | Permission management method for applications, electronic device thereof, and computer readable medium | |
EP3229136A1 (en) | Application calling management method and apparatus | |
CN105471956A (en) | User safety control method of social network, social application tool and terminal | |
CN104283874A (en) | Data authority control method and device based on cloud server | |
CN105323370A (en) | Mobile terminal and method for controlling the same | |
CN102810139B (en) | Secure data operation method and communication terminal | |
CN112784262A (en) | Data access method, device, terminal and storage medium | |
US20150146071A1 (en) | Mobile terminal and method for controlling the same | |
KR20120066894A (en) | Method for protecting private information of mobile terminal | |
WO2021147430A1 (en) | Information processing method and device, and storage medium | |
KR20100030820A (en) | Portable terminal and image data reproducing method using the same | |
CN111209559B (en) | Permission processing method and device of application program, storage medium and electronic equipment | |
KR101958777B1 (en) | Controlling Method for Mobile Terminal | |
CN106066967A (en) | Permission setting method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140618 |
|
RJ01 | Rejection of invention patent application after publication |