CN116011020A - Processing method, intelligent terminal and storage medium - Google Patents

Processing method, intelligent terminal and storage medium Download PDF

Info

Publication number
CN116011020A
CN116011020A CN202310089437.6A CN202310089437A CN116011020A CN 116011020 A CN116011020 A CN 116011020A CN 202310089437 A CN202310089437 A CN 202310089437A CN 116011020 A CN116011020 A CN 116011020A
Authority
CN
China
Prior art keywords
application
intelligent terminal
privacy
target application
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310089437.6A
Other languages
Chinese (zh)
Inventor
刘迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN202310089437.6A priority Critical patent/CN116011020A/en
Publication of CN116011020A publication Critical patent/CN116011020A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The application discloses a processing method, an intelligent terminal and a storage medium, wherein the processing method comprises the following steps: acquiring an access request for a target application; detecting whether the target application accords with a first preset condition and/or whether the intelligent terminal accords with a second preset condition; and processing the privacy data in the target application according to a preset strategy when the target application meets the first preset condition and/or the intelligent terminal meets the second preset condition. The processing method provided by the embodiment of the application can automatically and effectively avoid private data leakage in the application, improves the data security and improves the user experience.

Description

Processing method, intelligent terminal and storage medium
Technical Field
The present disclosure relates to the field of terminal technologies, and in particular, to a processing method, an intelligent terminal, and a storage medium.
Background
The rapid popularization of the intelligent terminal brings more fun and convenience to the work and life of the user, for example, various applications in the intelligent terminal are used for communication chat, reading and the like.
In the process of designing and implementing the present application, the inventors found that at least the following problems exist: when the user borrows the intelligent terminal for other people, the private data is easy to be seen or used by other people, and the data safety and the user experience are affected.
The foregoing description is provided for general background information and does not necessarily constitute prior art.
Disclosure of Invention
The purpose of the application is to provide a processing method, an intelligent terminal and a storage medium, through the technical scheme of the application, private data leakage in the application can be automatically and effectively avoided, the data security is improved, and the user experience is improved.
The application provides a processing method, which comprises the following steps:
s1, acquiring an access request for a target application;
s2, detecting whether the target application accords with a first preset condition and/or whether the intelligent terminal accords with a second preset condition;
s3, when the target application meets the first preset condition and/or the intelligent terminal meets the second preset condition, processing the privacy data in the target application according to a preset strategy.
Optionally, the meeting the first preset condition includes at least one of the following:
the target application is a preset privacy application;
the target application is an application of a preset type.
Optionally, the meeting the second preset condition includes at least one of the following:
the intelligent terminal is in a preset mode;
the current user of the intelligent terminal is not a preset user;
The intelligent terminal is provided with at least one associated device;
the intelligent terminal is in a preset scene.
Optionally, the processing the private data in the target application according to a preset policy includes at least one of the following:
privacy protection processing is carried out on the privacy data in the target application;
and sending a prompt message to the associated equipment, and processing the privacy data in the target application based on the feedback information of the associated equipment.
Optionally, the privacy protection processing for the private data in the target application includes:
and privacy protection processing is carried out on the privacy data generated by the current user who is not the intelligent terminal and uses the target application.
Optionally, the privacy preserving process includes at least one of: limiting usage rights, hiding or encrypting processes, blurring or deleting processes.
Optionally, the method further comprises:
after a privacy setting instruction is detected, displaying a privacy setting interface, wherein the privacy setting interface comprises at least one application setting item;
and acquiring the application set by the user according to the application setting item, and setting the application as a privacy application needing privacy protection.
Optionally, the method further comprises:
in response to a data management operation on a target application, displaying a data management interface for the target application, wherein the data management interface comprises at least one deletion option, and each deletion option is used for deleting at least one type of data generated in the process of accessing the target application;
and acquiring a deleting option selection confirmation operation on the data management interface, and deleting the target type data corresponding to the selected deleting option.
The application also provides an intelligent terminal, comprising: the device comprises a memory and a processor, wherein the memory stores a computer program which realizes the steps of the processing method when being executed by the processor.
The present application also provides a storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of a processing method as described in any of the above.
The processing method, the intelligent terminal and the storage medium provided by the embodiment of the application, wherein the processing method comprises the following steps: acquiring an access request for a target application; detecting whether the target application accords with a first preset condition and/or whether the intelligent terminal accords with a second preset condition; and processing the privacy data in the target application according to a preset strategy when the target application meets the first preset condition and/or the intelligent terminal meets the second preset condition. Thus, the access request of the target application is obtained, when the target application meets the first preset condition and/or the intelligent terminal meets the second preset condition, the privacy data in the target application is processed according to the preset strategy, so that the privacy data leakage in the application can be automatically and effectively avoided, the data safety is improved, and the user experience is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application. In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a schematic hardware structure of a mobile terminal according to an embodiment of the present application;
fig. 2 is a schematic diagram of a communication network system according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of a processing method according to an embodiment of the present disclosure;
FIG. 4 is a second flow chart of the processing method according to the embodiment of the present application;
FIG. 5 is a schematic diagram of an interface of the intelligent terminal according to an embodiment of the present application;
fig. 6 is a second schematic interface diagram of the intelligent terminal in the embodiment of the application.
The realization, functional characteristics and advantages of the present application will be further described with reference to the embodiments, referring to the attached drawings. Specific embodiments thereof have been shown by way of example in the drawings and will herein be described in more detail. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the element defined by the phrase "comprising one … …" does not exclude the presence of additional identical elements in a process, method, article, or apparatus that comprises the element, and alternatively, elements having the same name in different embodiments of the present application may have the same meaning or may have different meanings, a particular meaning of which is to be determined by its interpretation in this particular embodiment or further in connection with the context of this particular embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context. Furthermore, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including" specify the presence of stated features, steps, operations, elements, components, items, categories, and/or groups, but do not preclude the presence, presence or addition of one or more other features, steps, operations, elements, components, items, categories, and/or groups. The terms "or" and/or "as used herein are to be construed as inclusive, or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a, A is as follows; b, a step of preparing a composite material; c, performing operation; a and B; a and C; b and C; A. b and C). An exception to this definition will occur only when a combination of elements, functions, steps or operations are in some way inherently mutually exclusive.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily occurring in sequence, but may be performed alternately or alternately with other steps or at least a portion of the other steps or stages.
It should be noted that, in this document, step numbers such as S1 and S2 are used for the purpose of more clearly and briefly describing the corresponding contents, and not to constitute a substantial limitation on the sequence, and those skilled in the art may perform S2 first and then S1 when implementing the present invention, which are all within the scope of protection of the present application.
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In the following description, suffixes such as "module", "component", or "unit" for representing elements are used only for facilitating the description of the present application, and are not of specific significance per se. Thus, "module," "component," or "unit" may be used in combination.
The intelligent terminal may be implemented in various forms. For example, the smart terminals described in the present application may include mobile terminals such as cell phones, tablet computers, notebook computers, palm computers, personal digital assistants (Personal Digital Assistant, PDA), portable media players (Portable Media Player, PMP), navigation devices, wearable devices, smart bracelets, pedometers, and stationary terminals such as digital TVs, desktop computers, and the like.
The following description will be given taking a mobile terminal as an example, and those skilled in the art will understand that the configuration according to the embodiment of the present application can be applied to a fixed type terminal in addition to elements particularly used for a moving purpose.
Referring to fig. 1, which is a schematic hardware structure of a mobile terminal implementing various embodiments of the present application, the mobile terminal 100 may include: an RF (Radio Frequency) unit 101, a wireless network module 102, an audio output unit 103, an a/V (audio/video) input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, and a power supply 111. Those skilled in the art will appreciate that the mobile terminal structure shown in fig. 1 is not limiting of the mobile terminal and that the mobile terminal may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The following describes the components of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be used for receiving and transmitting signals during the information receiving or communication process, specifically, after receiving downlink information of the base station, processing the downlink information by the processor 110; and, the uplink data is transmitted to the base station. Typically, the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Optionally, the radio frequency unit 101 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol including, but not limited to, GSM (Global System of Mobile communication, global system for mobile communications), GPRS (General Packet Radio Service ), CDMA2000 (Code Division Multiple Access, 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access ), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, time Division synchronous code Division multiple access), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency Division duplex long term evolution), TDD-LTE (Time Division Duplexing-Long Term Evolution, time Division duplex long term evolution), and 5G, among others.
The wireless network belongs to a short-distance wireless transmission technology, and the mobile terminal can help a user to send and receive e-mails, browse web pages, access streaming media and the like through the wireless network module 102, so that wireless broadband internet access is provided for the user. Although fig. 1 shows a wireless network module 102, it is to be understood that it is not an essential component of a mobile terminal and can be omitted entirely as desired within the scope of not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the wireless network module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a talk mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output (e.g., a call signal reception sound, a message reception sound, etc.) related to a specific function performed by the mobile terminal 100. The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive an audio or video signal. The a/V input unit 104 may include a graphics processor (Graphics Processing Unit, GPU) 1041 and a microphone 1042, the graphics processor 1041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphics processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the wireless network module 102. The microphone 1042 can receive sound (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, and the like, and can process such sound into audio data. The processed audio (voice) data may be converted into a format output that can be transmitted to the mobile communication base station via the radio frequency unit 101 in the case of a telephone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting the audio signal.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Optionally, the light sensor includes an ambient light sensor and a proximity sensor, optionally, the ambient light sensor may adjust the brightness of the display panel 1061 according to the brightness of ambient light, and the proximity sensor may turn off the display panel 1061 and/or the backlight when the mobile terminal 100 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the acceleration in all directions (generally three axes), and can detect the gravity and direction when stationary, and can be used for applications of recognizing the gesture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and knocking), and the like; as for other sensors such as fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc. that may also be configured in the mobile phone, the detailed description thereof will be omitted.
The display unit 106 is used to display information input by a user or information provided to the user. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the mobile terminal. Alternatively, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on the touch panel 1071 or thereabout by using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Optionally, the touch detection device detects the touch azimuth of the user, detects a signal brought by touch operation, and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into touch point coordinates, and sends the touch point coordinates to the processor 110, and can receive and execute commands sent from the processor 110. Alternatively, the touch panel 1071 may be implemented in various types of resistive, capacitive, infrared, surface acoustic wave, and the like. The user input unit 107 may include other input devices 1072 in addition to the touch panel 1071. Alternatively, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc., as specifically not limited herein.
Alternatively, the touch panel 1071 may overlay the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or thereabout, the touch panel 1071 is transferred to the processor 110 to determine or generate a type of touch event, and the processor 110 then provides a corresponding visual output on the display panel 1061 according to the type of touch event. Although in fig. 1, the touch panel 1071 and the display panel 1061 are two independent components for implementing the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 may be integrated with the display panel 1061 to implement the input and output functions of the mobile terminal, which is not limited herein.
The interface unit 108 serves as an interface through which at least one external device can be connected with the mobile terminal 100. For example, the external devices may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and an external device.
Memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, and alternatively, the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. Alternatively, the memory 109 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor and a modem processor, the application processor optionally handling mainly an operating system, a user interface, an application program, etc., the modem processor handling mainly wireless communication. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power source 111 (e.g., a battery) for supplying power to the respective components, and preferably, the power source 111 may be logically connected to the processor 110 through a power management system, so as to perform functions of managing charging, discharging, and power consumption management through the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described herein.
In order to facilitate understanding of the embodiments of the present application, a communication network system on which the mobile terminal of the present application is based will be described below.
Referring to fig. 2, fig. 2 is a schematic diagram of a communication network system provided in the embodiment of the present application, where the communication network system is an LTE system of a general mobile communication technology, and the LTE system includes a UE (User Equipment) 201, an e-UTRAN (Evolved UMTS Terrestrial Radio Access Network ) 202, an epc (Evolved Packet Core, evolved packet core) 203, and an IP service 204 of an operator that are sequentially connected in communication.
Alternatively, the UE201 may be the terminal 100 described above, which is not described here again.
The E-UTRAN202 includes eNodeB2021 and other eNodeB2022, etc. Alternatively, the eNodeB2021 may connect with other enodebs 2022 over a backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide access for the UE201 to the EPC 203.
EPC203 may include MME (Mobility Management Entity ) 2031, hss (Home Subscriber Server, home subscriber server) 2032, other MMEs 2033, SGW (Serving Gate Way) 2034, pgw (PDN Gate Way) 2035 and PCRF (Policy and Charging Rules Function, policy and tariff function entity) 2036, and so on. Optionally, MME2031 is a control node that handles signaling between UE201 and EPC203, providing bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location registers (not shown) and to hold user specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034 and PGW2035 may provide IP address allocation and other functions for UE201, PCRF2036 is a policy and charging control policy decision point for traffic data flows and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem ), or other IP services, etc.
Although the LTE system is described above as an example, it should be understood by those skilled in the art that the present application is not limited to LTE systems, but may be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, 5G, and future new network systems (e.g., 6G), etc.
Based on the above-mentioned mobile terminal hardware structure and communication network system, various embodiments of the present application are presented.
Referring to fig. 3, a processing method provided in an embodiment of the present application may be implemented by a processing apparatus provided in an embodiment of the present application, where the apparatus may be implemented in software and/or hardware, and in a specific application, the apparatus may be specifically an intelligent terminal or the like. The smart terminal may be implemented in various forms, and the smart terminal described in this embodiment may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palm computer, a personal digital assistant (Personal Digital Assistant, PDA), a portable media player (Portable Media Player, PMP), a wearable device, a smart bracelet, a pedometer, and the like. In this embodiment, taking an execution subject of the processing method as an intelligent terminal as an example, the processing method includes the following steps:
And S1, acquiring an access request for the target application.
Optionally, the intelligent terminal may determine whether to obtain the access request to the target application by detecting whether the icon or the shortcut entry of the target application is clicked, and if the icon of the target application is detected to be clicked, the request is indicated to obtain the access request to the target application. For example, assuming that the target application is a gallery application, if the intelligent terminal detects a click operation on an icon of the gallery application displayed on the desktop or the sharing interface, it is determined that an access request to the target application is acquired. Optionally, the target application may be any application in the intelligent terminal, and may also be an application set in the intelligent terminal.
And S2, detecting whether the target application accords with a first preset condition and/or whether the intelligent terminal accords with a second preset condition.
Optionally, after detecting the access request to the target application, the intelligent terminal detects whether the target application meets a first preset condition and/or whether the intelligent terminal meets a second preset condition, and then processes based on the detection result.
Optionally, the meeting the first preset condition may be set according to practical situations, for example, the meeting the first preset condition may include at least one of the following: the target application is a preset privacy application; the target application is an application of a preset type.
Optionally, the preset privacy application may be set according to an actual situation, for example, the preset privacy application may specifically include, but is not limited to, a call application, a short message application, an album application, a file application, and the like.
Alternatively, the preset type of application may be set according to actual situations, for example, the preset type of application may specifically include, but is not limited to, a game application, a video application, a shopping application, an instant messaging application, a payment application, and a financial application. Alternatively, the type of the application may be determined according to an attribute such as a name of the application, or may be obtained from a predefined type of the application.
Optionally, the intelligent terminal may also detect whether the target application meets a first preset condition and/or whether the intelligent terminal meets a second preset condition on the premise of starting the privacy protection function.
Optionally, the meeting the second preset condition may be set according to practical situations, for example, the meeting the second preset condition may include at least one of the following: the intelligent terminal is in a preset mode; the current user of the intelligent terminal is not a preset user; the intelligent terminal is provided with at least one associated device; the intelligent terminal is in a preset scene.
Optionally, the preset mode may be set according to actual situations, for example, may be set to a privacy protection mode, a lending mode, a security mode, a child mode, an elderly mode, or a game mode.
Optionally, the intelligent terminal may acquire information such as a face image, a fingerprint or a login account of a currently used user of the intelligent terminal, and determine whether the information such as the face image, the fingerprint or the login account of the currently used user of the intelligent terminal is matched with the information such as the face image, the fingerprint or the login account corresponding to the preset user, and if the information is not matched, it is indicated that the currently used user of the intelligent terminal is not the preset user. Optionally, the preset user may be specifically an owner of the intelligent terminal, or may be a user who uses the intelligent terminal frequently.
Optionally, the association device may include at least one of: the function-associated device, the account-associated device (e.g., different devices are registered with the same account), the user-associated device (e.g., different devices are registered with at least one piece of user information), the rights-associated device.
Alternatively, the preset scene may be set according to actual situations, for example, a payment scene, a game scene, and the like may be specific.
And step S3, when the target application meets the first preset condition and/or the intelligent terminal meets the second preset condition, processing the privacy data in the target application according to a preset strategy.
Optionally, when the intelligent terminal determines that the target application meets the first preset condition and/or the intelligent terminal meets the second preset condition, the intelligent terminal processes the privacy data in the target application according to a preset policy so as to protect the privacy data in the target application.
Optionally, the preset policy may be set according to actual situations, for example, hiding, shielding, etc. the privacy data. Optionally, the private data may include private information and/or a private function, where the private information is data that is not desired to be seen by others, and may specifically be a self-shot photo, a short message, a chat record, and so on; optionally, the privacy function refers to a function of an application program which is not expected to be seen or used by others, and specifically may be a function of paying for two-dimensional codes, transferring accounts, sharing and the like. Optionally, the privacy data may be set by the user according to actual needs, which is not described herein.
Optionally, the processing the private data in the target application according to a preset policy includes at least one of the following:
Privacy protection processing is carried out on the privacy data in the target application;
and sending a prompt message to the associated equipment, and processing the privacy data in the target application based on the feedback information of the associated equipment.
Optionally, the privacy protection process may be set according to practical situations, and may include at least one of the following: limiting usage rights, hiding or encrypting processes, blurring or deleting processes, etc.
Alternatively, the restricted use rights may be prohibited from viewing, prohibited from copying, prohibited from forwarding, and the like. For example, forwarding of photos, documents, etc. is prohibited. Alternatively, the hiding or encrypting process may be to not display the private data, to block the private data, to encrypt the private data, or the like. Optionally, the hiding or encrypting the private data in the target application may be hiding or encrypting a part of information and/or a part of functions in the target application.
Optionally, the privacy protection processing for the private data in the target application includes: and privacy protection processing is carried out on the privacy data generated by the current user who is not the intelligent terminal and uses the target application. Optionally, when the target application meets a first preset condition and/or the intelligent terminal meets a second preset condition, the intelligent terminal may record privacy data generated in the process of using the target application by a currently used user and distinguish the privacy data generated in the process of using the target application by a currently used user from privacy data generated in the process of using the target application by a non-currently used user, so that when the currently used user initiates an access request to the target application, privacy protection processing is performed on the privacy data generated by using the target application by the currently used user of the non-intelligent terminal, so that the currently used user cannot see or use the privacy data generated by using the target application by the currently used user of the non-intelligent terminal, and privacy protection processing is not performed on the privacy data generated by using the target application by using the currently used user of the intelligent terminal.
Optionally, the smart terminal may distinguish whether the privacy data corresponding to the target application belongs to the current user of the smart terminal based on whether the smart terminal is in the preset mode, that is, after the smart terminal is in the preset mode, the privacy data corresponding to the target application is generated by the current user of the smart terminal, and before the smart terminal is in the preset mode, the privacy data corresponding to the target application is generated by the current user of the smart terminal.
Optionally, the intelligent terminal can distinguish the user of the intelligent terminal through a face, fingerprint and other identification modes. In an exemplary embodiment, after the intelligent terminal starts the privacy protection function, the owner of the intelligent terminal borrows the intelligent terminal from others, at this time, the intelligent terminal determines all operations performed on the target application from the time when the privacy protection function is started as "non-owner operation", corresponding privacy data is generated by the current user of the intelligent terminal, and determines operations performed on the target application before the time when the privacy protection function is started as "owner operation", corresponding privacy data is generated by the owner of the intelligent terminal.
For example, taking the target application as a call application, during the period that the intelligent terminal starts the privacy protection function and is borrowed to the first, if the first opens the call application in the intelligent terminal, the interface of the call application may only display the call records generated by the first during use, and hide all call records generated by the intelligent terminal before the intelligent terminal is borrowed to the first.
Taking the target application as an album application as an example, if the album application in the intelligent terminal is opened by the intelligent terminal and the album is also used by the album during the period that the privacy protection function of the intelligent terminal is opened and the album is borrowed by the album, only the photos taken by the album are displayed in the album and the photos except the photos taken by the album are hidden.
Therefore, the privacy protection processing is carried out on the privacy data generated by the current user of the non-intelligent terminal by using the target application, so that the current user of the intelligent terminal cannot see or use the privacy data which needs to be protected in the target application, but only see or use the privacy data generated by using the target application, the data security is further improved, and the data processing flexibility is improved.
Optionally, the sending a prompt message to the associated device, and processing the privacy data in the target application based on the feedback information of the associated device may include: the intelligent terminal sends a prompt message to the associated equipment to prompt whether to allow the privacy data in the target application to be displayed, and if the feedback information of the associated equipment is that the privacy data in the target application is not allowed to be displayed, privacy protection processing is carried out on the privacy data in the target application; and if the feedback information of the associated equipment is that the privacy data in the target application is allowed to be displayed, the privacy protection processing is not carried out on the privacy data in the target application.
For example, taking the case that the target application is the payment application and it is assumed that an elderly person clicks an icon of the payment application displayed on a desktop of the intelligent terminal, the intelligent terminal may send a prompt message to a mobile phone of the associated device, that is, a son, to request to confirm whether to allow the private data in the payment application to be displayed, and if the feedback information from the associated device to the intelligent terminal is that the private data in the payment application is allowed to be displayed, the intelligent terminal may display functions such as a payment two-dimensional code and a transfer in the payment application.
Taking the example that the target application is a game application according to the first preset condition as an example, it is assumed that a student is clicking an icon of a game application in a parent's intelligent terminal, and if the intelligent terminal detects that the privacy protection function is started, functions such as purchase and payment in the game application are hidden.
Thus, the privacy data in the target application is processed based on the feedback information of the associated equipment, so that the data security is further improved, and the data processing flexibility is improved.
In summary, the processing method provided by the embodiment can automatically and effectively avoid private data leakage in application, improve data security and promote user experience.
Optionally, the method further comprises:
after a privacy setting instruction is detected, displaying a privacy setting interface, wherein the privacy setting interface comprises at least one application setting item;
and acquiring the application set by the user according to the application setting item, and setting the application as a privacy application needing privacy protection.
Optionally, the intelligent terminal may provide a privacy setting function for a user to select which applications are to be set as privacy applications requiring privacy protection, or to select which applications are not to be set as privacy applications requiring any more protection.
Optionally, after receiving the privacy setting instruction, the intelligent terminal may display a privacy setting interface including at least one application setting item, and obtain, based on an operation instruction input by a user at the privacy setting interface, an application set by the user according to the application setting item, so as to set the application as a privacy application that needs privacy protection.
Optionally, the application setting item may specifically include at least one of the following: an application name setting item and an application type setting item. Optionally, the privacy settings interface may also provide privacy data settings items for the user to select which data to set as privacy data.
Therefore, the user can conveniently set privacy application which needs privacy protection according to the requirements, and user experience is further improved.
Optionally, the method further comprises:
in response to a data management operation on a target application, displaying a data management interface for the target application, wherein the data management interface comprises at least one deletion option, and each deletion option is used for deleting at least one type of data generated in the process of accessing the target application;
and acquiring a deleting option selection confirmation operation on the data management interface, and deleting the target type data corresponding to the selected deleting option.
Optionally, when the current user of the intelligent terminal does not need to continue to use the intelligent terminal, the current user of the intelligent terminal may want to delete the data generated in the process of accessing the target application, so as to avoid the data from being seen or used by others, so as to ensure the privacy security of the data, or when the intelligent terminal exits the privacy protection function, such as exiting the preset mode, the preset user of the intelligent terminal may also want to delete the data, so as to save the storage space and reduce the data redundancy influence caused by the data, so that the intelligent terminal can display the data management interface for the target application when acquiring the data management operation for the target application, and the data management interface includes at least one deletion option.
Optionally, each deletion option is used for deleting at least one type of data generated in the process of accessing the target application, and may include a picture deletion option for deleting a picture, a log deletion option for deleting a log, an audio deletion option for deleting audio, and the like.
Optionally, after acquiring the delete option selection confirmation operation on the data management interface, the intelligent terminal deletes the target type data corresponding to the selected delete option. For example, if the intelligent terminal acquires the selection confirmation operation of the picture deletion option on the data management interface, deleting the picture contained in the data generated in the process of accessing the target application; or if the intelligent terminal acquires the selection confirmation operation of the audio deletion option on the data management interface, deleting the audio and the like contained in the data generated in the process of accessing the target application.
Alternatively, the selection confirmation operation may be specifically a touch operation, a voice operation, a space gesture operation, or the like.
Optionally, the data management interface may include a one-touch delete option for one-touch deletion to make one-touch deletion of all data generated during access to the target application.
Optionally, the data management operation on the target application may be triggered by the privacy setting interface, for example, when the target application identifier displayed by the privacy setting interface is triggered, the intelligent terminal may display the data management interface on the target application accordingly.
Therefore, the confirmation operation is selected according to the acquired deletion options on the data management interface, and corresponding types of data generated in the process of accessing the target application are deleted, so that the data can be effectively prevented from being seen or used by other people, the data safety is further improved, the storage space is saved, and the user experience is further improved.
Based on the same concept as the foregoing embodiments, the present embodiment describes the technical solution of the foregoing embodiments in detail by a specific example, and in this embodiment, the mode implemented by the foregoing processing method is referred to as a lending mode as an example.
In the related technology, the information of files or folders with different formats on the intelligent terminal can be encrypted, so that the encrypted files can replace content to be displayed or hidden to be invisible, and the purpose of protecting the privacy of a user is achieved; or, by utilizing the splitting function of the APP, the splitting of one APP can be established on the intelligent terminal, and different users can log in different APPs; alternatively, a privacy space function is created, and when the privacy space is opened, an independent system is fully initialized for use by the operator. However, the above method has the following disadvantages: the encryption processing of one or more APP cannot be realized in batches; the access authority of borrowing users of the intelligent terminal to historical data of privacy APP such as WeChat, QQ, camera and the like of the borrowed users cannot be controlled; the function of providing batch processing for related operations and/or generated data generated by a borrowing user of the intelligent terminal during borrowing is not provided; for the function of the privacy space, when a user deletes the privacy space, all relevant data can be deleted, and the data cannot be selectively stored.
In order to solve the above problems, referring to fig. 4, the main process of the processing method provided in this embodiment is as follows:
Step S10, in response to the setting of the lending mode, adding the APP to be locked during the lending.
Optionally, the user may set the lending mode in the intelligent terminal, including setting an account number password corresponding to the lending mode, and an APP to be locked during the lending.
Optionally, a switch of a lending mode is added in the setting module of the intelligent terminal, and then a lightweight configuration option is provided, so that a locking function during lending of a plurality of APP can be realized once, as shown in (a) of fig. 5.
Optionally, according to the triggering of the user, the intelligent terminal may provide a lightweight selection list for the user, which mainly includes a mode switch and a configuration submenu for adding a locked APP, and the user can open a lending mode through the mode switch, and the APP can be added through the submenu for adding the locked APP, so that when the intelligent terminal is lended, privacy security of historical data of the APPs can be ensured, as shown in (b) and (c) in fig. 5.
Step S20, when the intelligent terminal is borrowed, judging whether a borrowing mode is started, if yes, executing step S30, and/or otherwise executing step S60.
Optionally, when the intelligent terminal is borrowed, it is determined whether a lending mode is started, if yes, step S30 is executed, and/or if not, step S60 is executed.
Step S30, locking historical data in the APP added with the lock so as not to access the historical data.
Step S40, when using the locked APP, the relevant operations and/or the generated data are stored in a temporary or preset directory (e.g. a user set or selected directory).
Optionally, taking the camera APP as an example, when the intelligent terminal is borrowed and the lending mode is started, the borrowed user cannot access the relevant history data of the camera before the lending mode is started during the use of the intelligent terminal, and only can access the data such as photos and videos shot during the use, so that the privacy security of the borrowed user data is ensured.
Step S50, detecting whether the borrowed user chooses to delete the related operations and/or generated data during the lending after exiting the lending mode, if so, executing step S60, and/or otherwise, executing step S70.
Optionally, when the intelligent terminal returns to the borrowed user, the borrowed user exits the lending mode by inputting the account number and the password, and the interface is set to pop up a dialog box to remind the borrowed user whether to delete the relevant operation data during the lending period and receive the selection operation input by the borrowed user.
Step S60, deleting relevant operation and/or generated data of the locked APP according to user selection.
Alternatively, if the user selects the option "yes" in the dialog box, the intelligent terminal will jump to the locked APP list of the three-level interface, as shown in fig. 6. Optionally, when the locked APP list of the three-level interface is popped up, the user may choose whether to delete all relevant data during the lending process one by one APP, or delete part of the data in batch, or delete part of the data of a locked APP according to modules such as audio, video, log, etc. In this way, it may be decided by the borrowed user of the intelligent terminal whether to retain the data. In addition, for the borrowing user of the intelligent terminal, the borrowed user can be required to delete the relevant data during the borrowing period of the intelligent terminal, so that the data privacy security is ensured.
Step S70, processing is performed according to the original operation flow.
Optionally, when the user does not select to set the lending mode or the lending mode is not started when the intelligent terminal is lended, the intelligent terminal performs processing according to the original operation flow.
In summary, the processing method provided in the above embodiment has the following advantages: besides each APP, a public switch can be provided, so that locking functions for a plurality of APPs can be realized at one time, and the experience of a user is improved; during the lending period of the intelligent terminal, the privacy information of the borrowed user can be effectively guaranteed not to be snooped, and privacy anxiety of the user is effectively relieved; when the intelligent terminal returns to the borrowed user, when the user selects to exit the lending mode, a one-key/batch deleting function is provided, and the function can ensure that the operation data during lending cannot interfere the normal use data of the borrowed user and can also effectively ensure the safety of the related operation privacy data of the borrowed user.
The embodiment of the application also provides an intelligent terminal, which comprises: the device comprises a memory and a processor, wherein the memory stores a computer program which realizes the steps of the processing method according to any embodiment when being executed by the processor.
An embodiment of the present application further provides a storage medium, where a computer program is stored on the storage medium, where the computer program when executed by a processor implements the steps of the processing method according to any of the embodiments above.
The embodiments of the intelligent terminal and the storage medium provided in the embodiments of the present application may include all technical features of any one of the embodiments of the foregoing processing method, and the expansion and explanation contents of the description are substantially the same as those of each embodiment of the foregoing method, which are not repeated herein.
The present embodiments also provide a computer program product comprising computer program code which, when run on a computer, causes the computer to perform the processing method as described in the various possible embodiments above.
The embodiment of the application also provides a chip, which comprises a memory and a processor, wherein the memory is used for storing a computer program, and the processor is used for calling and running the computer program from the memory, so that a device provided with the chip executes the processing method described in the various possible embodiments.
It can be understood that the above scenario is merely an example, and does not constitute a limitation on the application scenario of the technical solution provided in the embodiments of the present application, and the technical solution of the present application may also be applied to other scenarios. For example, as one of ordinary skill in the art can know, with the evolution of the system architecture and the appearance of new service scenarios, the technical solutions provided in the embodiments of the present application are equally applicable to similar technical problems.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device of the embodiment of the application can be combined, divided and pruned according to actual needs.
In this application, the same or similar term concept, technical solution, and/or application scenario description will generally be described in detail only when first appearing, and when repeated later, for brevity, will not generally be repeated, and when understanding the content of the technical solution of the present application, etc., reference may be made to the previous related detailed description thereof for the same or similar term concept, technical solution, and/or application scenario description, etc., which are not described in detail later.
In this application, the descriptions of the embodiments are focused on, and the details or descriptions of one embodiment may be found in the related descriptions of other embodiments.
The technical features of the technical solutions of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the above embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the present application.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as above, including several instructions for causing a smart terminal (which may be a mobile phone, a computer, a server, a controlled terminal, or a network device, etc.) to perform the method of each embodiment of the present application.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). Computer readable storage media can be any available media that can be accessed by a computer or data storage devices, such as servers, data centers, etc., that contain an integration of one or more available media. Usable media may be magnetic media (e.g., floppy disks, storage disks, magnetic tape), optical media (e.g., DVD), or semiconductor media (e.g., solid State Disk (SSD)), among others.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.

Claims (10)

1. A method of processing comprising the steps of:
s1, acquiring an access request for a target application;
s2, detecting whether the target application accords with a first preset condition and/or whether the intelligent terminal accords with a second preset condition;
s3, when the target application meets the first preset condition and/or the intelligent terminal meets the second preset condition, processing the privacy data in the target application according to a preset strategy.
2. The method of claim 1, wherein the meeting the first preset condition comprises at least one of:
the target application is a preset privacy application;
the target application is an application of a preset type.
3. The method of claim 1, wherein the meeting the second preset condition comprises at least one of:
the intelligent terminal is in a preset mode;
The current user of the intelligent terminal is not a preset user;
the intelligent terminal is provided with at least one associated device;
the intelligent terminal is in a preset scene.
4. A method according to any one of claims 1 to 3, wherein said processing of private data in said target application according to a preset policy comprises at least one of:
privacy protection processing is carried out on the privacy data in the target application;
and sending a prompt message to the associated equipment, and processing the privacy data in the target application based on the feedback information of the associated equipment.
5. The method of claim 4, wherein the privacy preserving process for the private data in the target application comprises:
and privacy protection processing is carried out on the privacy data generated by the current user who is not the intelligent terminal and uses the target application.
6. The method of claim 4, wherein the privacy preserving process comprises at least one of: limiting usage rights, hiding or encrypting processes, blurring or deleting processes.
7. A method according to any one of claims 1 to 3, further comprising:
After a privacy setting instruction is detected, displaying a privacy setting interface, wherein the privacy setting interface comprises at least one application setting item;
and acquiring the application set by the user according to the application setting item, and setting the application as a privacy application needing privacy protection.
8. A method according to any one of claims 1 to 3, further comprising:
in response to a data management operation on a target application, displaying a data management interface for the target application, wherein the data management interface comprises at least one deletion option, and each deletion option is used for deleting at least one type of data generated in the process of accessing the target application;
and acquiring a deleting option selection confirmation operation on the data management interface, and deleting the target type data corresponding to the selected deleting option.
9. An intelligent terminal, characterized by comprising: memory, a processor, wherein the memory has stored thereon a computer program which, when executed by the processor, implements the steps of the processing method according to any of claims 1 to 8.
10. A storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the processing method according to any of claims 1 to 8.
CN202310089437.6A 2023-01-30 2023-01-30 Processing method, intelligent terminal and storage medium Pending CN116011020A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310089437.6A CN116011020A (en) 2023-01-30 2023-01-30 Processing method, intelligent terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310089437.6A CN116011020A (en) 2023-01-30 2023-01-30 Processing method, intelligent terminal and storage medium

Publications (1)

Publication Number Publication Date
CN116011020A true CN116011020A (en) 2023-04-25

Family

ID=86023200

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310089437.6A Pending CN116011020A (en) 2023-01-30 2023-01-30 Processing method, intelligent terminal and storage medium

Country Status (1)

Country Link
CN (1) CN116011020A (en)

Similar Documents

Publication Publication Date Title
CN109800602B (en) Privacy protection method, mobile terminal and computer readable storage medium
CN112162870A (en) File processing operation method, mobile terminal and storage medium
CN110062106B (en) Calling method of application program, mobile terminal and storage medium
CN112464208B (en) File access method, mobile terminal and computer readable storage medium
CN113094670A (en) Privacy protection method, terminal and storage medium
CN112163194A (en) Authorization method of application permission, mobile terminal and computer storage medium
CN109409081B (en) Permission setting method, mobile terminal and computer storage medium
CN116301380A (en) Display method, foldable device and storage medium
CN116302259A (en) Display method, intelligent terminal and storage medium
CN113325981B (en) Processing method, mobile terminal and storage medium
CN115617293A (en) Data processing method, source end screen projection equipment and storage medium
CN116011020A (en) Processing method, intelligent terminal and storage medium
CN112363988A (en) File sharing method, mobile terminal and storage medium
CN112434283A (en) Control method of mobile terminal, mobile terminal and storage medium
CN108243417B (en) WIFI connection-based user permission determination method, mobile terminal and storage medium
CN114125851B (en) Information processing method, mobile terminal and readable storage medium
CN117321592A (en) Processing method, mobile terminal and storage medium
CN109740374B (en) Hiding method, mobile terminal and computer readable storage medium
CN113852717B (en) Wallpaper module position migration method, equipment and computer readable storage medium
CN114936383A (en) Privacy protection method, mobile terminal and storage medium
CN110084015B (en) Unlocking control method, mobile terminal and computer readable storage medium
CN116561828A (en) Processing method, intelligent terminal and storage medium
CN116305087A (en) Application management method, intelligent terminal and storage medium
CN116980519A (en) Processing method, intelligent terminal and storage medium
CN116483606A (en) Processing method, intelligent terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication