WO2022161221A1 - 一种保护用户信息的方法、装置及存储介质 - Google Patents
一种保护用户信息的方法、装置及存储介质 Download PDFInfo
- Publication number
- WO2022161221A1 WO2022161221A1 PCT/CN2022/072610 CN2022072610W WO2022161221A1 WO 2022161221 A1 WO2022161221 A1 WO 2022161221A1 CN 2022072610 W CN2022072610 W CN 2022072610W WO 2022161221 A1 WO2022161221 A1 WO 2022161221A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- privacy protection
- protection mode
- preset
- terminal
- signal
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000011897 real-time detection Methods 0.000 claims 1
- 230000006870 function Effects 0.000 description 19
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 238000000844 transformation Methods 0.000 description 2
- QOSSAOTZNIDXMA-UHFFFAOYSA-N Dicylcohexylcarbodiimide Chemical compound C1CCCCC1N=C=NC1CCCCC1 QOSSAOTZNIDXMA-UHFFFAOYSA-N 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000000053 physical method Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
Definitions
- the present application relates to the field of intelligent terminals, and in particular, to a method, device and storage medium for protecting user information.
- the technical problem to be solved by this application is to provide a method, device and storage medium for protecting user information in view of the above-mentioned defects of the prior art, aiming to solve the problem that the camera or microphone on the smart terminal in the prior art has no measures to prevent the background Startup, there is a problem of user privacy and security leakage.
- an embodiment of the present application provides a method for protecting user information, wherein the method includes:
- a closing operation is performed on a preset component of the terminal according to the opening signal of the privacy protection mode; the preset component is a component for acquiring user information.
- the obtaining the turn-on signal of the privacy protection mode includes:
- an open signal of the privacy protection mode is generated based on the open state data of the privacy protection mode.
- the performing a closing operation on a preset component of the terminal according to the opening signal of the privacy protection mode includes:
- the connection between the preset part of the terminal and the power supply of the terminal is disconnected, so as to implement the closing operation on the preset part.
- disconnecting the connection between the preset component of the terminal and the power supply of the terminal includes:
- a disconnection operation is performed on the control switch according to the opening signal of the privacy protection mode, so as to disconnect the connection between the preset component and the power supply.
- the method further includes:
- a closing operation is performed on the control switch according to the closing signal of the privacy protection mode.
- an embodiment of the present application further provides an apparatus for protecting user information, wherein the apparatus includes:
- a closing module configured to perform a closing operation on a preset part of the terminal according to the open signal of the privacy protection mode; the preset part is a part for acquiring user information.
- the obtaining module includes:
- the menu state acquisition unit is used to acquire the state data of the function menu
- a switch state acquisition unit configured to acquire the state data of the privacy protection mode when the state data of the function menu is the open state data
- a switch signal generating unit configured to generate an open signal of the privacy protection mode based on the open state data of the privacy protection mode when the state data of the privacy protection mode is the open state data.
- the shutdown module includes:
- the disconnecting unit is configured to disconnect the connection between the preset part of the terminal and the power supply of the terminal according to the open signal of the privacy protection mode, so as to implement the closing operation on the preset part.
- the disconnecting unit includes:
- control switch connecting the preset component and the power source through a preset control switch
- the control unit is configured to perform a disconnection operation on the control switch according to an opening signal of the privacy protection mode, so as to disconnect the connection between the preset component and the power supply.
- an embodiment of the present application further provides a computer-readable storage medium on which a plurality of instructions are stored, wherein the instructions are suitable for being loaded and executed by a processor to implement any of the above Steps of a method of protecting user information.
- the present application discloses a method for protecting user information.
- the method includes: acquiring an opening signal of a privacy protection mode; performing a closing operation on a preset component of a terminal according to the opening signal of the privacy protection mode; the preset component is: Widget to get user information.
- a privacy protection mode is preset, and when the mode is turned on, the components on the terminal that may leak user information are immediately turned off, thereby avoiding the risk of user information being stolen and avoiding the invisible violation of user privacy. It solves the problem that the camera or the microphone on the smart terminal in the prior art has no measures to prevent the background startup, and there is a problem of leakage of user privacy and security.
- FIG. 1 is a schematic flowchart of a method for protecting user information provided by an embodiment of the present application.
- FIG. 2 is a schematic diagram of a power supply circuit of a camera and a microphone in a current smart terminal provided by an embodiment of the present application.
- FIG. 3 is a schematic diagram of a power supply circuit of a camera with a control switch and a microphone provided by an embodiment of the present application.
- FIG. 4 is a reference diagram of a function menu including an icon of a privacy protection mode provided by an embodiment of the present application.
- FIG. 5 is a schematic block diagram of an apparatus for protecting user information provided by an embodiment of the present application.
- FIG. 6 is a principle block diagram of a terminal provided by an embodiment of the present application.
- the cameras or microphones on the existing smart terminals do not have good measures to prevent background startup, and there is a risk that the cameras or microphones are forcibly turned on after being hijacked by rogue software. Once the camera or microphone is turned on without the user's knowledge, there will be a problem of user privacy and security leakage.
- the present application provides a method for protecting user information, as shown in FIG. 1 , the method includes the following steps:
- Step S100 acquiring an open signal of the privacy protection mode.
- this embodiment pre-sets a privacy protection mode on the Zhongneng terminal.
- the mode When the mode is turned on, the components on the terminal that may leak user information are immediately turned off, thereby avoiding the risk of user information being stolen. Avoid user privacy from being inadvertently violated.
- step S100 specifically includes the following steps:
- Step S110 acquiring status data of the function menu
- Step S120 when the state data of the function menu is the open state data, obtain the state data of the privacy protection mode
- Step S130 When the state data of the privacy protection mode is the open state data, generate an open signal of the privacy protection mode based on the open state data of the privacy protection mode.
- an option switch of the privacy protection mode is added in the function menu on the smart terminal in advance, and the user can conveniently select whether to enable the privacy protection mode through the option switch. .
- the user feels that the current network environment has the risk of revealing their private information, they can immediately pull down the function menu and turn on the privacy protection mode.
- the terminal when the terminal obtains the state data of the function menu as the open state data, it immediately determines that the user has opened the function menu, and then obtains the state data of the privacy protection mode as the open state data, it can quickly determine that the user has opened the privacy In the protection mode, the smart terminal will immediately generate an open signal of the privacy protection mode and send it to the controller inside the terminal.
- the method further includes the following steps:
- Step S200 Perform a closing operation on a preset component of the terminal according to the open signal of the privacy protection mode; the preset component is a component for acquiring user information.
- the intelligent terminal After the privacy protection mode is turned on, the intelligent terminal needs to timely turn off the components on the terminal that can obtain user information according to the turn-on signal of the privacy protection mode, so as to avoid the risk of user privacy leakage.
- step S200 specifically includes the following steps:
- Step S210 Disconnect the connection between the preset part of the terminal and the power supply of the terminal according to the open signal of the privacy protection mode, so as to implement the closing operation on the preset part.
- this embodiment uses a power-off physical method to completely shut down the components on the terminal that may leak user privacy information, thereby avoiding the risk of privacy leakage and preventing the user's privacy from being violated invisibly.
- the terminal obtains the turn-on signal of the privacy protection mode, it disconnects the connection between the preset part of the terminal and the power supply of the terminal according to the signal, so that the preset part cannot be powered by the power supply, and then Components that may leak user information are completely shut down.
- the user can set the components that will be powered off in the privacy protection mode, that is, the types of the preset components are not limited in this embodiment, as long as the user thinks that there may be a risk of privacy leakage
- the components of the smart terminal can be used as preset components.
- a component list associated with the user protection mode is preset, and the user can add components that have a risk of privacy leakage to the component list, such as camera components and microphone components on a smart terminal.
- the terminal When the terminal obtains the turn-on signal of the privacy protection mode, it calls the component list, and disconnects the components in the component list from the power supply, that is, performs a power-off operation, so as to achieve complete Avoid the risk of privacy leakage and avoid the purpose of invisibly infringing the privacy of users.
- step S200 specifically includes the following steps:
- Step S210 connecting the preset component and the power source through a preset control switch
- Step S220 Perform a disconnection operation on the control switch according to the open signal of the privacy protection mode, so as to disconnect the connection between the preset component and the power supply.
- Figure 2 is a circuit design diagram that is commonly used in smart terminals to supply power to cameras and microphones.
- the PMU is a power management unit
- the LDO is a 100mA low-dropout voltage regulator. It can be clearly seen from this figure.
- the cameras and microphones on smart terminals are usually in a state of continuous power supply. The reason is to meet the requirements that the cameras and microphones may work anytime and anywhere. However, there is a way to continuously supply power to components such as cameras and microphones that are prone to leaking user privacy. There is a great risk of leakage of user information, especially when the camera or microphone is turned on without the user's knowledge. Therefore, this embodiment improves the power supply circuit of the components in the smart terminal that are considered to be likely to leak user privacy.
- a control switch is pre-set on the power supply circuit between the preset component in the smart terminal and the power supply.
- the control switch is immediately controlled to turn off. open state, thereby disconnecting the power supply circuit between the preset component and the power supply.
- the preset components cannot work normally because they do not receive enough power, thereby avoiding the risk of user privacy leakage.
- the components that may leak privacy preset by the user are the camera component and the microphone component on the smart terminal, it is necessary to set a control switch 1 on the power supply circuit between the camera component and the power supply in advance.
- a control switch 2 is provided on the power supply circuit between the microphone part and the power supply.
- the terminal When the user turns on the privacy protection mode, the terminal will receive the turn-on signal of the privacy protection mode, and immediately generate a disconnection control instruction according to the signal, and then send the disconnection control instruction to the control switch 1 and The control switch 2.
- the control switch 1 and the control switch 2 When the control switch 1 and the control switch 2 receive the disconnection control command, they will immediately control themselves to change from the closed state to the disconnected state, thereby cutting off the power supply on the smart terminal to the camera part and the microphone part.
- Power supply when the camera part and the microphone part lose power supply, they cannot work normally, so even if the camera part or the microphone part is hijacked by rogue software, the camera part or the microphone part cannot be turned on normally, thus effectively avoiding user privacy. risk of leakage.
- a physical switch is used to implement a power-off operation for the components of the intelligent terminal that may leak user privacy, thereby completely avoiding the channel of stealing user privacy information
- the privacy protection mode can be turned off, thereby ensuring the normal operation of various components on the smart terminal.
- the user needs to turn off the privacy protection mode, he also needs to open the function menu first, and then see that the option switch corresponding to the privacy protection mode is on, indicating that the current smart terminal has turned on the privacy protection mode. Then click the option switch to make it change from a lighted state to a gray state.
- the option switch corresponding to the privacy protection mode becomes a gray state, it means that the current smart terminal has turned off the privacy protection mode.
- the process of turning off the privacy protection mode is specifically expressed at the terminal level as follows: when the smart terminal detects that the user clicks the option switch corresponding to the privacy protection mode, and detects that the privacy protection mode is on before the click, the smart terminal can determine the current status of the user. The purpose of the operation is to turn off the privacy protection mode. Then the smart terminal will generate the closing signal of the privacy protection mode, and send the closing signal of the privacy protection mode to the control switch, and the control switch will immediately control its own switch state by receiving the closing signal. The disconnected state is restored to the closed state, so that the preset component is restored from the power-off state to the normal power supply state, so as to restore the normal working state of the preset component.
- this embodiment since the user needs to open the function menu every time, and then turn on the privacy protection mode, the user's privacy can be protected in the current environment. In other words, the user needs to manually switch the privacy protection state frequently. It will bring great inconvenience to users. For example, when users are in a hurry to do something, they may forget to turn on the privacy protection mode, or some middle-aged and elderly users are not proficient in the use of smart terminals, and may not be able to manually switch the privacy protection mode skillfully. In order to solve the above problem, this embodiment also provides another way of acquiring an open signal of the privacy protection mode.
- a privacy protection area may be set on the smart terminal in advance, and when the smart terminal detects that it is currently located in the privacy protection area, the smart terminal automatically generates a signal for turning on the privacy protection mode, and sends a signal to the privacy protection mode in advance.
- the method does not require the user to manually and frequently switch the privacy protection mode, and can more effectively protect the user's private information while bringing convenience to the user.
- the privacy protection area can be areas such as bathrooms, bedrooms, and dressing rooms.
- the smart terminal will detect the user's current geographic location information in real time through positioning technologies such as GPS, and compare it with the boundary contour of the real geographic area corresponding to the previously determined privacy protection area.
- the intelligent terminal When it is displayed that it is located within the boundary outline of the real geographical area, it means that the user has entered the privacy protection area set by the user, and the intelligent terminal automatically generates an opening signal of the privacy protection mode immediately, and the privacy protection mode is automatically generated.
- the turn-on signal is sent to the control switch pre-configured on the terminal that connects the power supply and the preset components. After the control switch obtains the turn-on signal of the privacy protection mode, it will immediately control the opening and closing state of itself to change from the closed state to the closed state. In the disconnected state, the power supply of the components on the smart terminal that may leak the user's private information is cut off, so that these components cannot work normally, which avoids the situation that they are in the privacy protection area set by the user without the user's knowledge.
- the terminal will automatically generate a privacy protection mode closing signal, and control the control switch to return to the closed state , so as to restore the normal power supply to the preset component so that it can work normally.
- the privacy protection mode of the smart terminal may be automatically turned on regularly by setting a privacy protection time period.
- the user may need the application terminal to work during the day, so it is not suitable to set the privacy protection time during the day, but the night is generally the user's free time and is usually located at home. Therefore, the privacy protection time period may be set after the preset time point in the evening to another preset time point, for example, the privacy protection time period between 9:00 pm and 8:00 am the next day.
- the user needs to manually input a privacy protection time period in advance, and the terminal acquires and stores the privacy protection time period.
- the terminal usually has the function of networking, so it can obtain the current time information in real time, and then compare the current time information with the privacy protection time period preset by the user, when the current time reaches the privacy protection time period , automatically generate an opening signal of the privacy protection mode, and control the control switch to be disconnected, so as to realize the power off of the preset component, so that it cannot work normally.
- a shutdown signal of the privacy protection mode is automatically generated, and the control switch is controlled to be closed, so as to restore the power supply to the preset component and make it resume normal operation.
- a voice control terminal may also generate a signal for turning on the privacy protection mode.
- the voice information used by the user for turning on the privacy protection mode needs to be pre-recorded and stored in the voice library.
- the smart terminal acquires the voice information sent by the user next time, it will immediately retrieve the voice information in the voice database and the currently detected voice information of the user for semantic matching.
- the intelligent terminal determines that the voice information currently sent by the user is used to turn on the privacy protection mode, and immediately generates an opening signal of the privacy protection mode, and sends the opening signal to the connection.
- the control switch between the power supply and the preset part, so that the state of the control switch is converted to the off state, and then the circuit between the power supply and the preset part is disconnected, so that the preset part cannot be powered, so that the normal operation cannot be performed.
- the user can pre-store the voice information for turning off the privacy protection mode, so as to realize the turning off of the voice control privacy protection mode.
- the present application also provides a device for protecting user information, as shown in FIG. 5 , the device includes:
- Obtaining module 01 for obtaining the open signal of the privacy protection mode
- a closing module 02 configured to perform a closing operation on a preset component of the terminal according to the opening signal of the privacy protection mode; the preset component is a component for acquiring user information.
- the acquisition module 01 includes:
- the menu state acquisition unit 03 is used to acquire the state data of the function menu
- a switch state acquisition unit 04 configured to acquire the state data of the privacy protection mode when the state data of the function menu is the open state data
- the switch signal generating unit 05 is configured to generate an open signal of the privacy protection mode based on the open state data of the privacy protection mode when the state data of the privacy protection mode is the open state data.
- the closing module 02 includes:
- the disconnecting unit 06 is configured to disconnect the connection between the preset part of the terminal and the power supply of the terminal according to the open signal of the privacy protection mode, so as to implement the closing operation on the preset part.
- the disconnecting unit 06 includes:
- Control switch 07 connecting the preset component and the power source through a preset control switch
- the control unit 08 is configured to perform a disconnection operation on the control switch according to the open signal of the privacy protection mode, so as to disconnect the connection between the preset component and the power supply.
- the present application also provides an intelligent terminal, the principle block diagram of which may be as shown in FIG. 6 .
- the intelligent terminal includes a processor, a memory, a network interface and a display screen connected through a system bus.
- the processor of the intelligent terminal is used to provide computing and control capabilities.
- the memory of the intelligent terminal includes a non-volatile storage medium and an internal memory.
- the nonvolatile storage medium stores an operating system and a computer program.
- the internal memory provides an environment for the execution of the operating system and computer programs in the non-volatile storage medium.
- the network interface of the intelligent terminal is used for communicating with external terminals through network connection.
- the computer program when executed by a processor, implements a method of protecting user information.
- the display screen of the smart terminal may be a liquid crystal display screen or an electronic ink display screen.
- FIG. 6 is only a block diagram of a partial structure related to the solution of the present application, and does not constitute a limitation on the intelligent terminal to which the solution of the present application is applied. More or fewer components than shown in the figures may be included, or some components may be combined, or have a different arrangement of components.
- one or more programs are stored in the memory of the smart terminal, and are configured to be executed by the one or more processors, including for performing a method of protecting a user Instructions for the method of information.
- Nonvolatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
- Volatile memory may include random access memory (RAM) or external cache memory.
- RAM is available in various forms such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Road (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM) and so on.
- SRAM static RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDRSDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM synchronous chain Road (Synchlink) DRAM
- SLDRAM synchronous chain Road (Synchlink) DRAM
- Rambus direct RAM
- DRAM direct memory bus dynamic RAM
- RDRAM memory bus dynamic RAM
- the present application discloses a method for protecting user information, the method includes: acquiring an open signal of a privacy protection mode; performing a closing operation on a preset component of a terminal according to the open signal of the privacy protection mode;
- the preset component is a component for acquiring user information.
- a privacy protection mode is preset, and when the mode is turned on, the components on the terminal that may leak user information are immediately turned off, thereby avoiding the risk of user information being stolen and avoiding the invisible violation of user privacy. It solves the problem that the camera or the microphone on the smart terminal in the prior art has no measures to prevent the background startup, and there is a problem of leakage of user privacy and security.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- Studio Devices (AREA)
Abstract
本申请公开了一种保护用户信息的方法、装置及终端,该方法包括:获取隐私保护模式的打开信号;根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作。本申请通过预先设置一个隐私保护模式,当该模式打开时,立即关闭终端上可能泄露用户信息的部件,进而规避用户信息被窃取的风险,避免用户隐私被无形中侵犯。
Description
本申请要求申请日为2021年1月27日、申请号为CN202110111837.3、发明名称为“一种保护用户信息的方法、装置及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及智能终端领域,尤其涉及的是一种保护用户信息的方法、装置及存储介质。
随着电子技术的发展,带有摄像功能和语音功能的智能终端越来越普及,但是现有智能终端上的摄像头没有很好的措施防止后台启动,摄像头存在被流氓软件劫持后被强制打开的风险。
一旦摄像头或者麦克风在用户不知情的情况下被打开,那么就会存在用户隐私安全泄露的问题。因此,现有技术还有待改进和发展。
本申请要解决的技术问题在于,针对现有技术的上述缺陷,提供一种保护用户信息的方法、装置及存储介质,旨在解决现有技术中的智能终端上的摄像头或者麦克风没有措施防止后台启动,存在用户隐私安全泄露的问题。
本申请解决问题所采用的技术方案如下:
第一方面,本申请实施例提供一种保护用户信息的方法,其中,所述方法包括:
获取隐私保护模式的打开信号;
根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作;所述预设部件为获取用户信息的部件。
在一种实施方式中,所述获取隐私保护模式的打开信号包括:
获取功能菜单的状态数据;
当所述功能菜单的状态数据为打开状态数据时,获取隐私保护模式的状态数据;
当所述隐私保护模式的状态数据为打开状态数据时,基于所述隐私保护模式的打开状态数据生成隐私保护模式的打开信号。
在一种实施方式中,所述根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作包括:
根据所述隐私保护模式的打开信号,断开终端的预设部件与终端的电源之间的连接,以实现对所述预设部件执行关闭操作。
在一种实施方式中,所述根据所述隐私保护模式的打开信号,断开终端的预设部件与终端的电源之间的连接包括:
通过预设的控制开关连接所述预设部件和所述电源;
根据所述隐私保护模式的打开信号对所述控制开关执行断开操作,以实现断开所述预设部件与所述电源之间的连接。
在一种实施方式中,所述方法还包括:
获取隐私保护模式的关闭信号;
根据所述隐私保护模式的关闭信号对所述控制开关执行闭合操作。
第二方面,本申请实施例还提供一种保护用户信息的装置,其中,所述装置包括:
获取模块,用于获取隐私保护模式的打开信号;
关闭模块,用于根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作;所述预设部件为获取用户信息的部件。
在一种实施方式中,所述获取模块包括:
菜单状态获取单元,用于获取功能菜单的状态数据;
开关状态获取单元,用于当所述功能菜单的状态数据为打开状态数据时,获取隐私保护模式的状态数据;
开关信号生成单元,用于当所述隐私保护模式的状态数据为打开状态数据时,基于所述隐私保护模式的打开状态数据生成隐私保护模式的打开信号。
在一种实施方式中,所述关闭模块包括:
断开单元,用于根据所述隐私保护模式的打开信号,断开终端的预设部件与终端的电源之间的连接,以实现对所述预设部件执行关闭操作。
在一种实施方式中,所述断开单元包括:
控制开关,通过预设的控制开关连接所述预设部件和所述电源;
控制单元,用于根据所述隐私保护模式的打开信号对所述控制开关执行断开操作,以实现断开所述预设部件与所述电源之间的连接。
第三方面,本申请实施例还提供一种计算机可读存储介质,其上存储有多条指令,其特征在于,所述指令适用于由处理器加载并执行,以实现上述任一所述的一种保护用户信息的方法的步骤。
本申请公开了一种保护用户信息的方法,所述方法包括:获取隐私保护模式的打开信号;根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作;所述预设部件为获取用户信息的部件。本申请通过预先设置一个隐私保护模式,当该模式打开时,立即关闭终端上可能泄露用户信息的部件,进而规避用户信息被窃取的风险,避免用户隐私被无形中侵犯。解决现有技术中的智能终端上的摄像头或者麦克风没有措施防止后台启动,存在用户隐私安全泄露的问题。
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种保护用户信息的方法的流程示意图。
图2是本申请实施例提供的目前智能终端中摄像头和麦克风的供电线路示意图。
图3是本申请实施例提供的带有控制开关的摄像头和麦克风的供电线路示意图。
图4是本申请实施例提供的包含隐私保护模式的图标的功能菜单的参考图。
图5是本申请实施例提供的一种保护用户信息的装置的模块示意图。
图6是本申请实施例提供的终端的原理框图。
本申请的实施方式
为使本申请的目的、技术方案及优点更加清楚、明确,以下参照附图并举实施例对本申请进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
需要说明,若本申请实施例中有涉及方向性指示(诸如上、下、左、右、前、后……),则该方向性指示仅用于解释在某一特定姿态(如附图所示)下各部件之间的相对位置关系、运动情况等,如果该特定姿态发生改变时,则该方向性指示也相应地随之改变。
目前,网络隐私成为了一个全球性的重要议题。腾讯社会研究中心和DCCI互联网数据研究中心联合发布《网络隐私安全及网络欺诈行为研究分析报告(2018年上半年)》,通过对1144款手机APP获取用户隐私权限情况的统计显示,目前几乎所有手机APP都在获取用户隐私信息,“核心隐私权限”包括获取位置信息、读取手机号、读取短信记录、通话记录等;“重要隐私权限”包括打开摄像头、使用话筒录音、发送短信、发送彩信、拨打电话等;“普通隐私权限”则包括打开WiFi开关、打开蓝牙开关、获取设备信息等、打开数据网络等。值得注意的是,获取“打开摄像头”权限的APP比例达到89.9%,获取“使用话筒录音”权限的APP比例达到86.2%,因此这两个权限也是用户最为关注的与隐私信息相关的权限。
然而现有智能终端上的摄像头或者麦克风并没有很好的措施防止后台启动,摄像头或者麦克风存在被流氓软件劫持后被强制打开的风险。一旦摄像头或者麦克风在用户不知情的情况下被打开,那么就会存在用户隐私安全泄露的问题。
基于现有技术的上述缺陷,本申请提供一种保护用户信息的方法,如图1所示,所述方法包括如下步骤:
步骤S100、获取隐私保护模式的打开信号。
为了保护用户的隐私信息,本实施例通过预先在中能终端上设置了一个隐私保护模式,当该模式打开时,立即关闭终端上可能泄露用户信息的部件,进而规避用户信息被窃取的风险,避免用户隐私被无形中侵犯。
在一种实现方式中,所述步骤S100具体包括如下步骤:
步骤S110、获取功能菜单的状态数据;
步骤S120、当所述功能菜单的状态数据为打开状态数据时,获取隐私保护模式的状态数据;
步骤S130、当所述隐私保护模式的状态数据为打开状态数据时,基于所述隐私保护模式的打开状态数据生成隐私保护模式的打开信号。
为了获取隐私保护模式的打开信号,如图4所示,本实施例预先在智能终端上的功能菜单中加入了隐私保护模式的选项开关,用户可以方便地通过该选项开关选择是否开启隐私保护模式。当用户感觉当前网络环境有泄露自身隐私信息的风险,就可以立即下拉功能菜单并打开隐私保护模式。具体地,当终端获取到功能菜单的状态数据为打开状态数据的时候,立即判断用户打开了功能菜单,再通过获取到隐私保护模式的状态数据为打开状态数据,便可以快速判断用户打开了隐私保护模式,则智能终端将会立即生成隐私保护模式的打开信号,并发送至终端内部的控制器。
为了避免用户信息被窃取,如图1所示,所述方法还包括如下步骤:
步骤S200、根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作;所述预设部件为获取用户信息的部件。
当隐私保护模式被打开以后,智能终端需要根据所述隐私保护模式的打开信号及时地关闭终端上能够获取用户信息的部件,才能实现规避用户隐私泄露的风险的目的。
在一种实现方式中,所述步骤S200具体包括如下步骤:
步骤S210、根据所述隐私保护模式的打开信号,断开终端的预设部件与终端的电源之间的连接,以实现对所述预设部件执行关闭操作。
用户使用智能终端的目的是享受科技带来的便利,而不希望让智能终端沦为埋伏在身边的隐私泄露“黑洞”。相关部门为此指定了多个APP强制标准,禁止获取与其功能无关的权限,禁止私自开启隐私权限。然而,在实际应用中,设置权限的方式依然难以避免泄露用户的隐私,特别是很多APP必须开启摄像头、麦克风权限才可以使用,这让用户根本没有选择的自由和余地,只能要么不适用相关APP,要么必须授权该APP不必要的权限,甚至在豪不知情的情况下被动授权相关权限。为了保障用户的隐私安全,本实施例采用断电的物理方式彻底地关闭终端上可能泄露用户隐私信息的部件,从而达到规避隐私泄露的风险,避免用户的隐私被无形地侵犯的目的。具体地,当终端获取到所述隐私保护模式的打开信号的时候,即根据该信号断开终端的预设部件与终端的电源之间的连接,从而使得预设部件无法得到电源的供电,进而使有可能泄露用户信息的部件被彻底地关闭。
在一种实现方式中,用户可以自行设定在隐私保护模式下会被断电的部件,即本实施例中中不对预设部件的种类进行限定,只要是用户觉得的可能存在隐私泄露风险的智能终端的部件都可以作为预设部件。具体地,本实施例会预先设置一个与所述用户保护模式相关联的部件列表,用户可以自行将存在隐私泄露风险的部件加入该部件列表中,例如智能终端上的摄像头部件和麦克风部件。当终端获取到所述隐私保护模式的打开信号的时候,即调取该部件列表,并将所述部件列表内存在的部件与电源之间的连接断开,即执行断电操作,从而达到彻底规避隐私泄露的风险,避免用户的隐私被无形地侵犯的目的。
在一种实现方式中,所述步骤S200具体包括如下步骤:
步骤S210、通过预设的控制开关连接所述预设部件和所述电源;
步骤S220、根据所述隐私保护模式的打开信号对所述控制开关执行断开操作,以实现断开所述预设部件与所述电源之间的连接。
如图2所示,图2中是目前智能终端上常用对摄像头和麦克风进行供电的电路设计图,其中PMU是电源管理单元,LDO是100mA低压降稳压器,从该图上可以明显看出智能终端上的摄像头和麦克风通常都是处于持续供电的状态,原因是为了满足摄像头和麦克风随时随地可能工作的要求,然而这样对摄像头、麦克风这类容易泄露用户隐私的部件进行持续供电的方式存在极大的用户信息的泄露风险,特别是当摄像头或者麦克风在用户不知情的情况下被打开的时候。因此本实施例对智能终端中被视为可能泄露用户隐私的部件的供电电路进行了改进。具体地,本实施例首先在智能终端内的预设部件与电源之间的供电电路上预先设置了一个控制开关,当终端获取到隐私保护模式的打开信号时,立即控制所述控制开关呈断开状态,进而使得预设部件与电源之间的供电电路断开。当智能终端上的电源无法再为所述预设部件进行供电的时候,所述预设部件就会因为未得到足够的供电而无法正常工作,从而避免了用户隐私泄露的风险。举例说明,如图3所示,假设用户预先设置的可能泄露隐私的部件为智能终端上的摄像头部件和麦克风部件,需要预先在摄像头部件与电源之间的供电电路上设置一个控制开关1,在麦克风部件和电源之间的供电电路上设置一个控制开关2。当用户开启隐私保护模式的时候,终端将会接收到所述隐私保护模式的打开信号,并根据该信号立即生成断开控制指令,然后将所述断开控制指令发送至所述控制开关1以及所述控制开关2。当所述控制开关1和所述控制开关2接收到所述断开控制指令以后,将会立即控制自身由闭合状态转变为断开状态,进而实现切断智能终端上电源对摄像头部件与麦克风部件的供电,当摄像头部件与麦克风部件失去电源供电的时候,就无法正常工作,这样即使摄像头部件或者麦克风部件被流氓软件劫持,摄像头部件或者麦克风部件也无法被正常打开,从而有效地规避了用户隐私被泄露的风险。简言之,本实施例采取物理开关的方式实现对可能泄露用户隐私的智能终端的部件执行断电操作,从而彻底规避了程序后台窃取用户隐私信息的渠道。
在一种实现方式中,当用户觉得当前网络环境是足够安全的,或者当下无需对用户隐私进行保护的时候,就可以关闭隐私保护模式,从而保障智能终端上各个部件的正常工作。具体地,当用户需要关闭隐私保护模式的时候,同样需要先打开功能菜单,然后看到所述隐私保护模式对应的选项开关为点亮状态时,表示当前的智能终端已经开启了隐私保护模式,则点击该选项开关,使之由点亮状态变成灰暗状态,当所述隐私保护模式对应的选项开关变成灰暗状态时,则表示当前的智能终端已经关闭了隐私保护模式。关闭隐私保护模式的过程在终端的层面上具体表现为:当智能终端检测到用户点击隐私保护模式对应的选项开关,并检测到点击之前隐私保护模式为开启状态,则智能终端可以判断用户的当前操作目的是关闭隐私保护模式。然后智能终端将会生成所述隐私保护模式的关闭信号,并将所述隐私保护模式的关闭信号发送至所述控制开关,所述控制开关接收到该关闭信号,则立即控制自身的开关状态由断开状态恢复至闭合状态,使所述预设部件从断电状态恢复至正常供电状态,从而恢复所述预设部件的正常工作状态。
在一种实现方式中,由于每次都需要用户点开功能菜单,然后再打开隐私保护模式,才能实现在当前环境下对用户的隐私进行保护,换言之需要用户频繁地手动切换隐私保护状态,这将会给用户带来极大的不便利。例如,当用户着急做某件事情的时候,可能会忘记打开隐私保护模式,又或者部分中老年群体的用户对智能终端的使用并不熟练,可能没有办法熟练地手动切换隐私保护模式。为了解决上述问题,本实施例还提供另外一种获取隐私保护模式的打开信号的方式。在一种实现方式中,可以预先在智能终端上设置一个隐私保护区域,当智能终端检测到当前位于所述隐私保护区域内的时候,则智能终端自动生成隐私保护模式的打开信号,并对预先设置为有可能泄露用户隐私信息的相关部件执行断电操作,使这些部件由于未得到电源供电而无法正常工作,进而规避用户隐私被泄露的风险,使用户隐私得到更好的保障。该方法不需要用户手动频繁切换隐私保护模式,在为用户带来便利的同时还可以更加有效地保护用户的隐私信息。
举例说明,首先需要获取用户在可视化界面上输入的隐私保护区域数据,并在可视化界面上创建出隐私保护区域边界轮廓,然后将所述可视化界面上的隐私保护区域边界轮廓转换为地图层上的真实地理区域边界轮廓,从而完成预先在智能终端上设置用户所需的隐私保护区域数据,例如隐私保护区域可以为浴室、卧室、更衣室等区域。在实际应用中,智能终端将会通过GPS等定位技术实时检测用户当前的地理位置信息,并将其与之前确定的隐私保护区域对应的真实地理区域边界轮廓进行比较,当用户当前的地理位置信息显示其位于所述真实地理区域边界轮廓之内时,即表示用户当前已经进入了其设定的隐私保护区域,则智能终端立即自动生成隐私保护模式的打开信号,并将所述隐私保护模式的打开信号发送至预先在终端上设置的连接电源与预设部件的控制开关,所述控制开关获取到所述隐私保护模式的打开信号以后,将会立即控制自身的开闭状态由闭合状态转变为断开状态,从而切断智能终端上有可能泄漏用户的隐私信息的部件的供电,使这些部件无法正常地进行工作,也就避免了其在用户设置的隐私保护区域内且用户不知情的情况下监听或者偷拍用户的隐私信息。当用户当前的地理位置信息显示其已经离开所述隐私保护区域的时候,为了保障智能终端上各部件的正常运作,终端会自动生成隐私保护模式的关闭信号,并控制所述控制开关恢复闭合状态,以实现恢复对所述预设部件的正常供电,使之能够正常工作。
在一种实现方式中,还可以通过设置隐私保护时间段来实现定时自动开启智能终端的隐私保护模式。例如用户在白天有极大的可能需要应用终端进行工作,因此白天不适宜设置为隐私保护时间,然而晚上一般为用户的自由时间,且通常位于家里。因此可以将晚上预设时间点以后至另一预设时间点设置为隐私保护时间段,例如晚上九点至第二天早上八点之间为隐私保护时间段。具体地,用户需要提前手动输入一个隐私保护时间段,终端获取并存储该隐私保护时间段。在实际应用中,终端通常具有联网功能,因此可以实时获取当前的时间信息,然后将当前的时间信息与用户预先设置的隐私保护时间段进行比较,当当前的时间到达所述隐私保护时间段时,自动生成隐私保护模式的打开信号,并控制所述控制开关断开,以实现对所述预设部件的断电,使之无法正常工作。当当前的时间已经不在所述隐私保护时间段内时,则自动生成隐私保护模式的关闭信号,并控制所述控制开关闭合,以恢复对所述预设部件的供电,使之恢复正常工作。
在一种实现方式中,为了避免用户需要手动频繁切换隐私保护模式,同时可以随时随地开启隐私保护模式,本实施例还可以通过语音控制终端生成隐私保护模式的打开信号。具体地,本实施例需要预先录制用户用于打开隐私保护模式的语音信息并存储于语音库内。当智能终端下一次获取到用户发出的语音信息的时候,将立即调取所述语音库内的语音信息与当前检测到的用户的语音信息进行语义匹配,当匹配成功的字数达到用户当前发出的语音信息中的字数的预设比例阈值时,智能终端判断用户当前发出的语音信息是用于开启隐私保护模式,则立即生成所述隐私保护模式的打开信号,并将所述打开信号发送至连接电源与预设部件的控制开关,使所述控制开关的状态转换为断开状态,进而将电源与预设部件之间的电路断开,使所述预设部件无法得到供电,从而无法正常地工作。同理,用户可以预先存储用于关闭隐私保护模式的语音信息,从而实现语音控制隐私保护模式关闭。
基于上述实施例,本申请还提供了一种保护用户信息的装置,如图5所示,该装置包括:
获取模块01,用于获取隐私保护模式的打开信号;
关闭模块02,用于根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作;所述预设部件为获取用户信息的部件。
如图5所示,在一种实现方式中,所述获取模块01包括:
菜单状态获取单元03,用于获取功能菜单的状态数据;
开关状态获取单元04,用于当所述功能菜单的状态数据为打开状态数据时,获取隐私保护模式的状态数据;
开关信号生成单元05,用于当所述隐私保护模式的状态数据为打开状态数据时,基于所述隐私保护模式的打开状态数据生成隐私保护模式的打开信号。
如图5所示,在一种实现方式中,所述关闭模块02包括:
断开单元06,用于根据所述隐私保护模式的打开信号,断开终端的预设部件与终端的电源之间的连接,以实现对所述预设部件执行关闭操作。
如图5所示,在一种实现方式中,所述断开单元06包括:
控制开关07,通过预设的控制开关连接所述预设部件和所述电源;
控制单元08,用于根据所述隐私保护模式的打开信号对所述控制开关执行断开操作,以实现断开所述预设部件与所述电源之间的连接。
基于上述实施例,本申请还提供了一种智能终端,其原理框图可以如图6所示。该智能终端包括通过系统总线连接的处理器、存储器、网络接口、显示屏。其中,该智能终端的处理器用于提供计算和控制能力。该智能终端的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机程序。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该智能终端的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现一种保护用户信息的方法。该智能终端的显示屏可以是液晶显示屏或者电子墨水显示屏。
本领域技术人员可以理解,图6中示出的原理框图,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的智能终端的限定,具体的智能终端可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
在一种实现方式中,所述智能终端的存储器中存储有一个或者一个以上的程序,且经配置以由一个或者一个以上处理器执行所述一个或者一个以上程序包含用于进行一种保护用户信息的方法的指令。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink) DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
综上所述,本申请公开了一种保护用户信息的方法,所述方法包括:获取隐私保护模式的打开信号;根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作;所述预设部件为获取用户信息的部件。本申请通过预先设置一个隐私保护模式,当该模式打开时,立即关闭终端上可能泄露用户信息的部件,进而规避用户信息被窃取的风险,避免用户隐私被无形中侵犯。解决现有技术中的智能终端上的摄像头或者麦克风没有措施防止后台启动,存在用户隐私安全泄露的问题。
应当理解的是,本申请的应用不限于上述的举例,对本领域普通技术人员来说,可以根据上述说明加以改进或变换,所有这些改进和变换都应属于本申请所附权利要求的保护范围。
Claims (20)
- 一种保护用户信息的方法,其中,所述方法包括:获取隐私保护模式的打开信号;根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作;所述预设部件为获取用户信息的部件。
- 根据权利要求1所述的一种保护用户信息的方法,其中,所述获取隐私保护模式的打开信号包括:获取功能菜单的状态数据;当所述功能菜单的状态数据为打开状态数据时,获取隐私保护模式的状态数据;当所述隐私保护模式的状态数据为打开状态数据时,基于所述隐私保护模式的打开状态数据生成隐私保护模式的打开信号。
- 根据权利要求1所述的一种保护用户信息的方法,其中,所述根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作包括:根据所述隐私保护模式的打开信号,断开终端的预设部件与终端的电源之间的连接,以实现对所述预设部件执行关闭操作。
- 根据权利要求3所述的一种保护用户信息的方法,其中,所述根据所述隐私保护模式的打开信号,断开终端的预设部件与终端的电源之间的连接包括:通过预设的控制开关连接所述预设部件和所述电源;根据所述隐私保护模式的打开信号对所述控制开关执行断开操作,以实现断开所述预设部件与所述电源之间的连接。
- 根据权利要求4所述的一种保护用户信息的方法,其中,所述方法还包括:获取隐私保护模式的关闭信号;根据所述隐私保护模式的关闭信号对所述控制开关执行闭合操作。
- 根据权利要求3所述的一种保护用户信息的方法,其中,所述根据所述隐私保护模式的打开信号,断开终端的预设部件与终端的电源之间的连接包括:将所述终端上的目标部件添加到所述隐私保护模式对应的部件列表中;当所述终端获取到所述隐私保护模式的打开信号时,调取所述部件列表;将所述部件列表中的目标部件与所述终端的电源之间的连接断开。
- 根据权利要求5所述的一种保护用户信息的方法,其中,所述获取隐私保护模式的关闭信号包括:获取功能菜单的状态数据;当所述功能菜单的状态数据为关闭状态数据时,获取隐私保护模式的状态数据;当所述隐私保护模式的状态数据为关闭状态数据时,基于所述隐私保护模式的关闭状态数据生成隐私保护模式的关闭信号。
- 根据权利要求1所述的一种保护用户信息的方法,其中,所述获取隐私保护模式的打开信号包括:当检测到所述终端处于预设隐私保护区域内时,生成隐私保护模式的打开信号。
- 根据权利要求8所述的一种保护用户信息的方法,其中,所述方法还包括:获取输入的隐私保护区域数据;根据所述隐私保护区域数据,创建隐私保护区域边界轮廓;将所述隐私保护区域边界轮廓转换成地图层上的真实地理区域边界轮廓,得到预设隐私保护区域。
- 根据权利要求8所述的一种保护用户信息的方法,其中,所述当检测到所述终端处于预设隐私保护区域内时,生成隐私保护模式的打开信号包括:实时检测所述终端当前所处的地理位置信息;将所述地理位置信息与所述预设隐私保护区域对应的真实地理区域边界轮廓进行对比;当对比结果为所述地理位置信息位于所述真实地理区域边界轮廓内时,生成隐私保护模式的打开信号。
- 根据权利要求8所述的一种保护用户信息的方法,其中,所述方法还包括:当检测到所述终端不处于预设隐私保护区域内时,生成隐私保护模式的关闭信号;根据所述隐私保护模式的关闭信号对所述终端的预设部件执行启动操作。
- 根据权利要求1所述的一种保护用户信息的方法,其中,所述获取隐私保护模式的打开信号包括:当检测到当前时间处于预设隐私保护时间段时,生成隐私保护模式的打开信号。
- 根据权利要求12所述的一种保护用户信息的方法,其中,所述方法还包括:当检测到当前时间不处于所述预设隐私保护时间段时,生成隐私保护模式的关闭信号;根据所述隐私保护模式的关闭信号对所述终端的预设部件执行启动操作。
- 根据权利要求1所述的一种保护用户信息的方法,其中,所述获取隐私保护模式的打开信号包括:获取针对所述终端输入的语音信息;将所述语音信息与预设第一语音信息进行语义匹配,其中,所述预设第一语音信息用于打开隐私保护模式;当匹配成功的字数达到所述语音信息的预设比例阈值时,生成隐私保护模式的打开信号。
- 根据权利要求1所述的一种保护用户信息的方法,其中,所述方法还包括:获取针对所述终端输入的语音信息;将所述语音信息与预设第二语音信息进行语义匹配,其中,所述预设第二语音信息用于关闭隐私保护模式;当匹配结果满足预设条件时,生成隐私保护模式的关闭信号;根据所述隐私保护模式的关闭信号对所述终端的预设部件执行启动操作。
- 一种保护用户信息的装置,其中,所述装置包括:获取模块,用于获取隐私保护模式的打开信号;关闭模块,用于根据所述隐私保护模式的打开信号对终端的预设部件执行关闭操作;所述预设部件为获取用户信息的部件。
- 根据权利要求16所述的一种保护用户信息的装置,其中,所述获取模块包括:菜单状态获取单元,用于获取功能菜单的状态数据;开关状态获取单元,用于当所述功能菜单的状态数据为打开状态数据时,获取隐私保护模式的状态数据;开关信号生成单元,用于当所述隐私保护模式的状态数据为打开状态数据时,基于所述隐私保护模式的打开状态数据生成隐私保护模式的打开信号。
- 根据权利要求16所述的一种保护用户信息的装置,其中,所述关闭模块包括:断开单元,用于根据所述隐私保护模式的打开信号,断开终端的预设部件与终端的电源之间的连接,以实现对所述预设部件执行关闭操作。
- 根据权利要求18所述的一种保护用户信息的装置,其中,所述断开单元包括:控制开关,通过预设的控制开关连接所述预设部件和所述电源;控制单元,用于根据所述隐私保护模式的打开信号对所述控制开关执行断开操作,以实现断开所述预设部件与所述电源之间的连接。
- 一种计算机可读存储介质,其上存储有多条指令,其中, 所述指令适用于由处理器加载并执行,以实现上述权利要求1-15任一所述的一种保护用户信息的方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110111837.3A CN112887482A (zh) | 2021-01-27 | 2021-01-27 | 一种保护用户信息的方法、装置及存储介质 |
CN202110111837.3 | 2021-01-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022161221A1 true WO2022161221A1 (zh) | 2022-08-04 |
Family
ID=76052728
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/072610 WO2022161221A1 (zh) | 2021-01-27 | 2022-01-18 | 一种保护用户信息的方法、装置及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112887482A (zh) |
WO (1) | WO2022161221A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112887482A (zh) * | 2021-01-27 | 2021-06-01 | 惠州Tcl移动通信有限公司 | 一种保护用户信息的方法、装置及存储介质 |
CN114065291A (zh) * | 2021-11-23 | 2022-02-18 | 歌尔科技有限公司 | 隐私保护方法、装置、设备、存储介质及计算机程序产品 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108595984A (zh) * | 2018-04-26 | 2018-09-28 | 深圳市恒达移动互联科技有限公司 | 一种移动终端的控制方法及移动终端 |
CN111079134A (zh) * | 2019-12-17 | 2020-04-28 | 重庆擎华信息科技有限公司 | 一种全局控制权限的方法、装置、存储介质及电子设备 |
CN111917981A (zh) * | 2020-07-31 | 2020-11-10 | 平安信托有限责任公司 | 隐私保护方法、装置、设备及计算机可读存储介质 |
CN112887482A (zh) * | 2021-01-27 | 2021-06-01 | 惠州Tcl移动通信有限公司 | 一种保护用户信息的方法、装置及存储介质 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3119158A4 (en) * | 2014-03-31 | 2017-03-08 | Huawei Technologies Co. Ltd. | Privacy protection method and terminal device |
CN111753282A (zh) * | 2019-03-28 | 2020-10-09 | 奇酷互联网络科技(深圳)有限公司 | 控制摄像头的方法、可穿戴设备及计算机存储介质 |
-
2021
- 2021-01-27 CN CN202110111837.3A patent/CN112887482A/zh active Pending
-
2022
- 2022-01-18 WO PCT/CN2022/072610 patent/WO2022161221A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108595984A (zh) * | 2018-04-26 | 2018-09-28 | 深圳市恒达移动互联科技有限公司 | 一种移动终端的控制方法及移动终端 |
CN111079134A (zh) * | 2019-12-17 | 2020-04-28 | 重庆擎华信息科技有限公司 | 一种全局控制权限的方法、装置、存储介质及电子设备 |
CN111917981A (zh) * | 2020-07-31 | 2020-11-10 | 平安信托有限责任公司 | 隐私保护方法、装置、设备及计算机可读存储介质 |
CN112887482A (zh) * | 2021-01-27 | 2021-06-01 | 惠州Tcl移动通信有限公司 | 一种保护用户信息的方法、装置及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN112887482A (zh) | 2021-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022161221A1 (zh) | 一种保护用户信息的方法、装置及存储介质 | |
CN109936481B (zh) | 主从服务器切换方法、装置、电子设备及存储介质 | |
WO2017054158A1 (zh) | 一种语音控制的处理方法和装置 | |
JP2003099400A (ja) | セキュリティ管理装置及びセキュリティ管理方法並びにセキュリティ管理用プログラム | |
KR20130006992A (ko) | 이동 단말기 및 이것의 디스플레이 제어 방법 | |
CN107844342A (zh) | 应用程序保活的管控方法、装置及存储介质和移动终端 | |
TWI629891B (zh) | 一種適用於移動終端的私密資訊保護方法及系統 | |
CN105005740A (zh) | 终端应用的控制方法和系统 | |
WO2015131559A1 (zh) | 终端及其功能控制方法、装置和通信系统 | |
CN102868813A (zh) | 一种安全管理机制的实现方法及手机 | |
CN112784262A (zh) | 数据访问方法、装置、终端及存储介质 | |
CN105511922A (zh) | 控制应用程序启动的方法和装置 | |
CN110851057A (zh) | 配置bios的配置选项的方法和装置 | |
CN107783633B (zh) | 一种管理应用程序的方法、终端及计算机可读存储介质 | |
CN108267972B (zh) | 电子设备控制方法和装置 | |
US20190235884A1 (en) | Method and system for disabling non-deletable application in mobile terminal | |
CN109905389A (zh) | 移动终端控制方法、装置及计算机可读存储介质 | |
CN113015227B (zh) | 终端配置方法、装置及计算机可读存储介质 | |
CN111352862A (zh) | 一种密钥销毁方法、系统、密码卡及密码机 | |
CN110941321A (zh) | 电子设备的供电方法、装置及智能设备 | |
CN115686808A (zh) | 安卓系统的内存管理方法和系统、电子设备、存储介质 | |
CN105760796B (zh) | 应用安全处理方法及装置 | |
CN108196960A (zh) | 一种应用的管控方法、终端及存储介质 | |
CN105205353A (zh) | 一种信息处理方法和电子设备 | |
CN116954649A (zh) | 一种现场可更换单元的属性信息更新方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22745096 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22745096 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22745096 Country of ref document: EP Kind code of ref document: A1 |