CN111027092A - Terminal privacy protection method, terminal and computer storage medium - Google Patents
Terminal privacy protection method, terminal and computer storage medium Download PDFInfo
- Publication number
- CN111027092A CN111027092A CN201911135230.8A CN201911135230A CN111027092A CN 111027092 A CN111027092 A CN 111027092A CN 201911135230 A CN201911135230 A CN 201911135230A CN 111027092 A CN111027092 A CN 111027092A
- Authority
- CN
- China
- Prior art keywords
- privacy protection
- file
- rule
- target file
- unlocking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The application relates to a privacy protection method of a terminal, the terminal and a computer storage medium, wherein the privacy protection method of the terminal comprises the following steps: receiving operation information; matching the operation information with the privacy protection rule of the target file; and executing the privacy protection operation of the target file according to the matching result. According to the method and the device, privacy protection can be performed on the files in the terminal in a targeted mode.
Description
Technical Field
The application relates to the technical field of terminals, in particular to a privacy protection method of a terminal, the terminal and a computer storage medium.
Background
With the rapid development of mobile terminal technology, the functions of mobile terminals such as mobile phones and tablet computers are also improved, and the mobile terminals become one of the common tools in daily life and work.
The existing privacy protection mode of the mobile terminal is mainly realized by screen locking and application locking. The screen locking aims at the whole mobile phone, a user has the complete use right of the mobile phone after the screen is unlocked, and one mobile phone can have a plurality of users to know passwords or other unlocking modes, so that a mobile phone owner cannot really prohibit other users from using own private files. The application lock authenticates before entering a certain application, and only allows access to the application after the authentication is passed, so that privacy can be protected to some extent, but other users can still access a certain specific file through other means, for example, a shot photo can be found and used through a file manager (or other means), and the like. Therefore, the existing privacy protection mode cannot really protect the privacy of the files in the mobile phone in a targeted manner.
Disclosure of Invention
In view of the above technical problems, the present application provides a method for protecting privacy of a terminal, a terminal and a computer storage medium, which can specifically protect the privacy of a file in the terminal.
In order to solve the above technical problem, the present application provides a privacy protection method for a terminal, including:
receiving operation information;
matching the operation information with the privacy protection rule of the target file;
and executing the privacy protection operation of the target file according to the matching result.
Wherein the object file comprises at least one of: files, folders, applications.
The privacy protection rule comprises a locking rule and an unlocking rule, and the matching of the operation information and the privacy protection rule of the target file comprises the following steps:
acquiring the current privacy protection state of a target file;
when the current privacy protection state of the target file is a locked state, matching the operation information with an unlocking rule of the corresponding target file;
and when the current privacy protection state of the target file is an unlocking state, matching the operation information with the locking rule of the corresponding target file.
Wherein, the executing the privacy protection operation aiming at the corresponding target file according to the matching result comprises:
when the operation information is matched with the locking rule, executing privacy protection operation for locking the corresponding target file;
and when the operation information is matched with the unlocking rule, executing privacy protection operation for unlocking the corresponding target file.
Wherein the target file comprises at least two associated files.
Wherein the association relationship of the at least two association files comprises at least one of the following:
the file folder and a first file contained in the file folder; the file is corresponding to a second file contained/referenced by the file, a homogeneous file of the file and a file name contained by the file; and the user defines the associated file.
Wherein, before receiving the operation information, the method further comprises:
and setting a file association relation corresponding to the target file by the user.
The method comprises the following steps:
receiving setting information of a privacy protection rule;
and determining a target file according to the setting information and/or generating a corresponding privacy protection rule.
Wherein, the privacy protection rule includes locking rule and unblock rule, receive privacy protection rule's setting information, include:
when the locking rule and the unlocking rule are set, the privacy level is set, and the locking level of the locking rule and the unlocking level of the unlocking rule are set.
The present application also provides a terminal comprising a memory for storing at least one program instruction and a processor for loading and executing the at least one program instruction to implement the method for protecting privacy of a terminal as described above.
The present application further provides a computer storage medium having computer program instructions stored thereon; which when executed by a processor implement the privacy protection method of a terminal as described above.
As described above, the privacy protection method for a terminal, the terminal, and the computer storage medium according to the present invention have the following advantageous effects:
and receiving the operation information, matching the operation information with the privacy protection rule of the target file, and executing the privacy protection operation of the target file according to the matching result. By the method, privacy protection can be performed on the files in the terminal in a targeted mode.
Drawings
Fig. 1 is a flowchart illustrating a privacy protecting method of a terminal according to a first embodiment.
Fig. 2 is a flowchart illustrating a privacy protecting method of a terminal according to a second embodiment.
Fig. 3 is a flowchart illustrating a privacy protecting method of a terminal according to a third embodiment.
Fig. 4 is one of the structural diagrams of the terminal shown according to the fourth embodiment.
Fig. 5 is a second schematic structural diagram of the terminal shown in fig. 4.
Detailed Description
The following description of the embodiments of the present application is provided for illustrative purposes, and other advantages and capabilities of the present application will become apparent to those skilled in the art from the present disclosure.
In the following description, reference is made to the accompanying drawings that describe several embodiments of the application. It is to be understood that other embodiments may be utilized and that mechanical, structural, electrical, and operational changes may be made without departing from the spirit and scope of the present application. The following detailed description is not to be taken in a limiting sense, and the scope of embodiments of the present application is defined only by the claims of the issued patent. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
Although the terms first, second, etc. may be used herein to describe various elements in some instances, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
First embodiment
Fig. 1 is a flowchart illustrating a privacy protecting method of a terminal according to a first embodiment. Referring to fig. 1, the privacy protection method for a terminal of the present embodiment includes:
The operation information is information generated by the terminal receiving a user operation, such as an operation signal of pressing an entity key, a signal of clicking an interface, password information included when a password is input, fingerprint information included when a fingerprint is input, a face image included when a face is recognized, and the like.
And step 120, matching the operation information with the privacy protection rule of the target file.
The privacy protection rule defines a corresponding relationship between the operation information and the privacy protection operation of a target file in advance, the target file is a file in which the privacy protection rule is defined in advance, the target file includes but is not limited to files and folders in the terminal, the files can be pictures, documents, compressed packets, videos and the like, and one or more files can be placed in the folders.
In this embodiment, the privacy protection rule includes a locking rule, an unlocking rule, a freezing rule, and a unfreezing rule, and the privacy protection operation includes a locking operation unlocking operation, a freezing operation, and a unfreezing operation. The locking rule defines locking operation information of the target file in advance, for example, locking operation of a screen or locking by inputting a specific password, and the unlocking rule defines unlocking operation information of the target file in advance, for example, unlocking the screen, unlocking the password, unlocking a fingerprint, unlocking a face, and the like, and the unlocking can be performed by some special screen gestures, continuous key clicks, secret words (forms of voice recognition, question answering, and the like), multi-touch, continuous fingerprint clicks, and the like. The freezing rule defines the freezing operation information of the target file in advance, such as a specific fingerprint long-time pressing operation or inputting a specific password for locking, and the like, and the unfreezing rule defines the unfreezing operation information of the target file in advance, such as some special screen gestures, key continuous clicks, secret words (in the forms of voice recognition, question answering and the like), multi-point touch, fingerprint continuous clicks and the like.
In this embodiment, matching the operation information with the privacy protection rule of the target file includes:
acquiring the current privacy protection state of a target file;
when the current privacy protection state of the target file is a locked state, matching the operation information with the unlocking rule of the corresponding target file;
and when the current privacy protection state of the target file is an unlocking state, matching the operation information with the locking rule of the corresponding target file.
When the target file is in the locked state, the user cannot use and propagate the target file, the use refers to similar operations such as checking, copying and deleting the file, the propagation refers to similar operations such as sharing, uploading and downloading the file, and the user can input operation information to unlock the target file in the locked state. When the target file is in the unlocking state, the user can use and spread the target file, and in the unlocking state, the user can input operation information to lock. It can be understood that a file without predefined privacy protection rules is in neither an unlocked state nor a locked state, and is a non-target file.
For the collection that realizes operation information, the terminal can possess corresponding collection module, for example fingerprint module, camera module, touch module, button module etc. wherein, fingerprint module can be fingerprint module under the screen, and fingerprint module sets up in screen glass's below under the screen, mainly utilizes penetrating technologies such as ultrasonic wave, optics, can pierce through various different materials to gather the fingerprint information of screen top optional position department.
In another embodiment, the target file includes at least two associated files, that is, the target file and at least one other file have an association relationship therebetween, the files having the association relationship correspond to the same privacy protection rule, and the association relationship between the two associated files includes at least one of the following: the folder and a first file contained in the folder; a second file with which the file contains/references; files and their like; the file and the file corresponding to the file name contained in the file; and the user customizes the associated third file. Before the operation, the user may set a file association relationship corresponding to the target file, for example, set an association relationship between a folder and a subfile, an association relationship between a file and a file containing/referring, an association relationship between files of the same type, an association relationship between a file and a file corresponding to a file name contained in the file, or a file with a custom association.
And step 130, executing privacy protection operation of the target file according to the matching result.
In this embodiment, the privacy protection rule includes a locking rule and an unlocking rule, and when the privacy protection operation includes a locking operation and an unlocking operation, the privacy protection operation for the corresponding target file is executed according to a matching result, including:
when the operation information is matched with the locking rule, executing privacy protection operation for locking the corresponding target file;
and when the operation information is matched with the unlocking rule, executing privacy protection operation for unlocking the corresponding target file.
When the operation information input by the user is locking operation information, the terminal locks an unlocked target file, and otherwise, when the operation information input by the user is unlocking operation information, the terminal unlocks the locked target file. When the terminal has a plurality of target files, the same operation information can be matched with the privacy protection rules of one or more target files, and the execution objects of the privacy protection operation can be one or more according to the matching result of the operation information and the privacy protection rules. For example, a user sets a locking rule of a part or all of target files as screen locking, enters a privacy protection mode after pressing a power key to extinguish a screen and successfully lock the screen, the part or all of the target files are locked, exits from the privacy protection mode after the user sets an unlocking rule of the part or all of the target files as the same fingerprint unlocking, and unlocks the part or all of the target files after successfully identifying by using a specific fingerprint. For another example, if the user sets that both the locking rule and the unlocking rule of a certain target file are long-time fingerprint identification, the target file is unlocked by fingerprint identification when in the locked state, and the target file is locked by fingerprint identification when in the unlocked state.
In practical implementation, the privacy protection rule may not be limited to the locking rule and the unlocking rule, and may further include a usage rule, where the usage rule defines a usage right of the file in advance, and may, for example, enable viewing but disable editing and propagation, and the like, and when the received operation information does not match the usage rule, the privacy protection operation that does not respond to the operation information may be performed, for example, when the operation information of editing the target file is received, the privacy protection operation may not respond to the editing operation, and when the operation information of opening the target file is received, the target file is opened.
When the target file comprises at least two associated files, the privacy protection operation is executed on the at least two associated files simultaneously. Taking the encryption operation as an example, the file is encrypted, and the associated folder is also encrypted; the folder is encrypted, and the associated other subfile is also encrypted; the file is encrypted, and the file contained/referenced by the file is also encrypted, for example, the WORD contains the EXCEL table, and at the same time, the WORD is encrypted, and the relevant EXCEL table is also encrypted; files are encrypted, and associated like files are also encrypted, for example, if one bank application is encrypted, other bank applications of the same type are also encrypted, and if one game is encrypted, other like games are also encrypted; the file is encrypted, and the file corresponding to the file name contained in the file is also encrypted; the user sets the privacy-related files in advance, wherein one is encrypted, and the other is also encrypted.
The user can set the privacy protection rule for the file to be protected in advance. In this embodiment, the method for protecting privacy of a terminal further includes:
receiving setting information of a privacy protection rule;
and determining the target file according to the setting information and/or generating a corresponding privacy protection rule.
The privacy protection rule setting interface is, for example, an attribute interface of a file or a folder, and in the attribute interface, settings of a level, a type, and content of a lock are provided, for example, when an unlocking level of an unlocking rule selected by a user is high, a lock of a corresponding type is provided for the user to select, for example, a coded lock, a face recognition lock, and the like for setting specified type of coded content are provided, and after the user selects the type of the lock, the content of the lock, for example, the coded content, a face image, and the like, can be further set. When the locking rule and the unlocking rule are set, the locking grade of the locking rule and the unlocking grade of the unlocking rule can be prompted according to the privacy grade of the file, the higher the privacy grade of the file is, the higher the unlocking grade of the file is, the lower the locking grade of the file is, namely, the higher the privacy grade of the file is, the locking is easy to unlock, and therefore the file is prevented from being easily used and spread by other people.
After the privacy protection rule is set, the user can save the file by setting and confirming the operation, and the current file also becomes the target file. Through the privacy protection rule of setting specific files once, the user can open or close the privacy protection of a certain file through specific operation at any time and any place in the process of using the terminal, and the security is ensured and the convenience is provided at the same time.
The privacy protection method of the terminal receives the operation information, matches the operation information with the privacy protection rule of the target file, and executes privacy protection operation for the target file according to the matching result. Through the method, privacy protection can be performed on the files in the terminal in a targeted manner, the target files can be specifically prevented from being illegally acquired by other users, the protection has extremely strong pertinence, and the problem that single protection cannot be performed in the traditional locking process or a single file cannot be covered even if single protection is performed is solved. Moreover, the method and the device can ensure the safety and simultaneously have convenience, and improve the user experience through a simple, convenient and quick interactive process.
Second embodiment
Fig. 2 is a flowchart illustrating a privacy protecting method of a terminal according to a second embodiment. Referring to fig. 2, the privacy protection method for a terminal of the present embodiment includes:
and step 250, executing privacy protection operation aiming at the corresponding target file according to the matching result.
In step 210, the operation information is information generated by the terminal receiving a user operation, such as an operation signal of pressing an entity key, a signal of clicking an interface, password information included when a password is input, fingerprint information included when a fingerprint is input, a face image included when a face is recognized, and the like.
In step 220, it is determined whether the operation information is specifically directed to a target file according to the trigger position of the operation information, for example, if the operation information is a long-press file, it is determined that the operation information is directed to a target file, otherwise, if there is no file at the trigger position of the operation information, it is determined that the operation information is directed to all target files.
In step 230, the operation information is matched with the privacy protection rule of the target file at the trigger position of the operation information, and the process of matching the operation information with the privacy protection rule of the target file is described in detail in the first embodiment and is not described herein again.
In step 240, the operation information is respectively matched with the privacy protection rules of all the target files, and the process of matching the operation information with the privacy protection rule of each target file is described in the first embodiment and is not described herein again.
In step 250, the privacy protection rule includes, but is not limited to, a locking rule and an unlocking rule, and when the privacy protection operation includes a locking operation and an unlocking operation, the privacy protection operation for the corresponding target file is executed according to a matching result, including:
when the operation information is matched with the locking rule, executing privacy protection operation for locking the corresponding target file;
and when the operation information is matched with the unlocking rule, executing privacy protection operation for unlocking the corresponding target file.
When the operation information input by the user is locking operation information, the terminal locks an unlocked target file, otherwise, when the operation information input by the user is unlocking operation information, the terminal unlocks the locked target file, and one or more execution objects of the privacy protection operation can be selected according to the matching result of the operation information and the privacy protection rule. For example, a user sets a locking rule of a part or all of target files as screen locking, enters a privacy protection mode after pressing a power key to extinguish a screen and successfully lock the screen, the part or all of the target files are locked, exits from the privacy protection mode after the user sets an unlocking rule of the part or all of the target files as the same fingerprint unlocking, and unlocks the part or all of the target files after successfully identifying by using a specific fingerprint. By the mode, a user can operate one target file independently or in batches, unlocking can be performed before or during file use, and convenience is greatly improved.
The user can set the privacy protection rule for the file to be protected in advance. In this embodiment, the method for protecting privacy of a terminal further includes:
receiving setting information of a privacy protection rule;
and determining the target file according to the setting information and/or generating a corresponding privacy protection rule.
The privacy protection rule setting interface is, for example, an attribute interface of a file or a folder, and in the attribute interface, settings of a level, a type, and content of a lock are provided, for example, when an unlocking level of an unlocking rule selected by a user is high, a lock of a corresponding type is provided for the user to select, for example, a coded lock, a face recognition lock, and the like for setting specified type of coded content are provided, and after the user selects the type of the lock, the content of the lock, for example, the coded content, a face image, and the like, can be further set. When the locking rule and the unlocking rule are set, the locking grade of the locking rule and the unlocking grade of the unlocking rule can be prompted according to the privacy grade of the file, the higher the privacy grade of the file is, the higher the unlocking grade of the file is, the lower the locking grade of the file is, namely, the higher the privacy grade of the file is, the locking is easy to unlock, and therefore the file is prevented from being easily used and spread by other people.
The privacy protection method of the terminal receives the operation information, matches the operation information with the privacy protection rule of a target file if the operation information is directed to the target file, otherwise matches the operation information with the privacy protection rules of all the target files, and finally executes the privacy protection operation directed to the corresponding target file according to the matching result. Through the mode, privacy protection can be carried out on the file in the terminal in a targeted manner, convenience can be achieved while safety is guaranteed, and user experience is improved through a simple, convenient and quick interaction process.
Third embodiment
Fig. 3 is a flowchart illustrating a privacy protecting method of a terminal according to a third embodiment. Referring to fig. 3, the privacy protection method for a terminal of the present embodiment includes:
In step 310, the operation information is information generated when the terminal receives a user operation, such as an operation signal of pressing an entity key, a signal of clicking an interface, password information included when a password is input, fingerprint information included when a fingerprint is input, a face image included when a face is recognized, and the like.
In step 350, when the operation information does not match the unlocking rule, it is further determined whether the operation information is an operation of opening the target file, for example, when the user clicks the file, the operation information is an operation of opening the target file, otherwise, the operation information is not an operation of opening the target file.
In step 360, when the operation information is an operation of opening the target file, a verification period of a preset duration is reserved, for example, 5 seconds, and it is determined whether the operation information is received again within the preset duration.
In step 370, if the operation information is received again within the preset duration, matching the operation information received again with the unlocking rule of the corresponding target file, and unlocking the corresponding target file if the matching is consistent.
Through the method, the user can unlock the file in the process of using the file, and if the user accesses the target file without unlocking, the target file can be unlocked as long as the corresponding unlocking operation information is received in the verification period. In the verification period, the user may be prompted to perform an unlocking operation and display a corresponding unlocking interface, and for gesture unlocking, for example, if the screen is continuously clicked 5 times, no additional unlocking interface may be provided.
According to the privacy protection method of the terminal, for the privacy file in the locked state, the user can unlock the privacy file in the process of opening the privacy file, and the operation is simple.
Fourth embodiment
Fig. 4 is one of the structural diagrams of the terminal shown according to the fourth embodiment. Referring to fig. 4, the terminal 10 of the present embodiment includes a memory 102 and a processor 106, where the memory 102 is configured to store at least one program instruction, and the processor 106 is configured to implement the method for protecting privacy of a terminal by loading and executing the at least one program instruction.
Referring to fig. 4, in actual implementation, the terminal 10 includes a memory 102, a memory controller 104, one or more processors 106 (only one of which is shown), a peripheral interface 108, a radio frequency module 150, a positioning module 112, a camera module 114, an audio module 116, a screen 118, a key module 160, and a fingerprint module 170. These components communicate with each other via one or more communication buses/signal lines 122.
It will be appreciated that the configuration shown in FIG. 5 is merely illustrative and that terminal 10 may include more or fewer components than shown in FIG. 5 or may have a different configuration than shown in FIG. 5. The components shown in fig. 5 may be implemented in hardware, software, or a combination thereof.
The memory 102 may be used to store software programs and modules, such as program instructions/modules corresponding to the privacy protection method of the terminal in the embodiment of the present application, and the processor 106 executes various functional applications and data processing by running the software programs and modules stored in the storage controller 104, so as to implement the privacy protection method of the terminal described above.
The memory 102 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 102 may further include memory located remotely from the processor 106, which may be connected to the terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. Access to the memory 102 by the processor 106, and possibly other components, may be under the control of the memory controller 104.
In some embodiments, the peripheral interface 108, the processor 106, and the memory controller 104 may be implemented in a single chip. In other examples, they may be implemented separately from the individual chips.
The rf module 150 is used for receiving and transmitting electromagnetic waves, and implementing interconversion between the electromagnetic waves and electrical signals, so as to communicate with a communication network or other devices. Rf module 150 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and so forth. The rf module 150 may communicate with various networks such as the internet, an intranet, a wireless network, or with other devices via a wireless network. The wireless network may comprise a cellular telephone network, a wireless local area network, or a metropolitan area network. The Wireless network may use various Communication standards, protocols, and technologies, including, but not limited to, Global System for Mobile Communication (GSM), Enhanced Mobile Communication (Enhanced Data GSM Environment, EDGE), wideband Code division multiple Access (W-CDMA), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), bluetooth, Wireless Fidelity (WiFi) (e.g., Institute of Electrical and Electronics Engineers (IEEE) standards IEEE802.11 a, IEEE802.11b, IEEE802.1 g, and/or IEEE802.11 n), Voice over internet protocol (VoIP), world wide mail for internet, Wi-Max, and any other suitable protocols for short-range communications, and may even include those protocols that have not yet been developed.
The positioning module 112 is used for acquiring the current position of the terminal 10. Examples of the positioning module 112 include, but are not limited to, a global positioning satellite system (GPS), a wireless local area network-based positioning technology, or a mobile communication network-based positioning technology.
The camera module 114 is used to take a picture or video. The pictures or videos taken may be stored in the memory 102 and transmitted through the radio frequency module 150.
The screen 118 provides an output interface between the terminal 10 and the user. In particular, screen 118 displays video output to the user, the content of which may include text, graphics, video, and any combination thereof. Some of the output results are for some of the user interface objects. It is understood that the screen 118 may also include a touch screen. The touch screen provides both an output and an input interface between the terminal 10 and a user. In addition to displaying video output to users, touch screens also receive user input, such as user clicks, swipes, and other gesture operations, so that user interface objects respond to these user input. The technique of detecting user input may be based on resistive, capacitive, or any other possible touch detection technique. Specific examples of touch screen display units include, but are not limited to, liquid crystal displays or light emitting polymer displays.
The key module 160 also provides an interface for user input to the terminal 10, and the user can press different keys to cause the terminal 10 to perform different functions.
The present application further provides a computer storage medium having computer program instructions stored thereon; which when executed by a processor implement the privacy protection method of a terminal as described above.
In practical implementation, the computer storage medium is applied to the terminal shown in fig. 4 and 5 to purposely protect the privacy of the file in the terminal.
The above embodiments are merely illustrative of the principles and utilities of the present application and are not intended to limit the application. Any person skilled in the art can modify or change the above-described embodiments without departing from the spirit and scope of the present application. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical concepts disclosed in the present application shall be covered by the claims of the present application.
Claims (10)
1. A privacy protection method of a terminal, comprising:
receiving operation information;
matching the operation information with the privacy protection rule of the target file;
and executing the privacy protection operation of the target file according to the matching result.
2. The privacy protection method for the terminal according to claim 1, wherein the target file comprises at least one of: files, folders, applications.
3. The privacy protection method for the terminal according to claim 1 or 2, wherein the privacy protection rules include a locking rule and an unlocking rule, and the matching the operation information with the privacy protection rule of the target file includes:
acquiring the current privacy protection state of a target file;
when the current privacy protection state of the target file is a locked state, matching the operation information with an unlocking rule of the corresponding target file;
and when the current privacy protection state of the target file is an unlocking state, matching the operation information with the locking rule of the corresponding target file.
4. The privacy protection method of the terminal according to claim 3, wherein the performing the privacy protection operation for the corresponding target file according to the matching result comprises:
when the operation information is matched with the locking rule, executing privacy protection operation for locking the corresponding target file;
and when the operation information is matched with the unlocking rule, executing privacy protection operation for unlocking the corresponding target file.
5. The privacy protection method for the terminal according to any one of claims 1 to 4, wherein the target file comprises at least two associated files.
6. The privacy protection method for the terminal according to claim 5, wherein the association relationship between the at least two association files includes at least one of:
the file folder and a first file contained in the file folder; the file is corresponding to a second file contained/referenced by the file, a homogeneous file of the file and a file name contained by the file; and the user defines the associated file.
7. The privacy protection method for a terminal according to claim 5, wherein before receiving the operation information, the method further comprises:
and setting a file association relation corresponding to the target file by the user.
8. The privacy protection method for the terminal according to claim 1 or 2, wherein the method comprises:
receiving setting information of a privacy protection rule;
and determining a target file according to the setting information and/or generating a corresponding privacy protection rule.
9. The privacy protection method for a terminal according to claim 8, wherein the privacy protection rule includes a locking rule and an unlocking rule, and the receiving setting information of the privacy protection rule includes:
when the locking rule and the unlocking rule are set, the privacy level is set, and the locking level of the locking rule and the unlocking level of the unlocking rule are set.
10. A terminal, characterized in that it comprises a memory for storing at least one program instruction and a processor for implementing the privacy protection method of the terminal according to any one of claims 1 to 9 by loading and executing the at least one program instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911135230.8A CN111027092A (en) | 2019-11-19 | 2019-11-19 | Terminal privacy protection method, terminal and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911135230.8A CN111027092A (en) | 2019-11-19 | 2019-11-19 | Terminal privacy protection method, terminal and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111027092A true CN111027092A (en) | 2020-04-17 |
Family
ID=70200609
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911135230.8A Pending CN111027092A (en) | 2019-11-19 | 2019-11-19 | Terminal privacy protection method, terminal and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111027092A (en) |
-
2019
- 2019-11-19 CN CN201911135230.8A patent/CN111027092A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11394555B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
CN104700010B (en) | Personal information protection method and protection device | |
CN104008348B (en) | application control method, device and terminal | |
CN104933351B (en) | The treating method and apparatus of information security | |
CN103916233B (en) | A kind of information ciphering method and device | |
CN105590043B (en) | Identity verification method, device and system | |
CN108616652B (en) | Data protection method and device, terminal and computer readable storage medium | |
CN113158198B (en) | Access control method, device, terminal equipment and storage medium | |
CN104346560B (en) | A kind of safe verification method and device | |
CN108563932B (en) | Application control method and device, readable storage medium and terminal | |
CN106681717B (en) | Terminal application program management method and device and electronic equipment | |
CN108881103B (en) | Network access method and device | |
CN111563251B (en) | Encryption method and related device for private information in terminal equipment | |
CN108475304B (en) | Method and device for associating application program and biological characteristics and mobile terminal | |
CN110941821A (en) | Data processing method, device and storage medium | |
CN109039860A (en) | Send and show method and device, the identity authentication method and device of message | |
CN105577375A (en) | Identity authentication method and device | |
KR101633965B1 (en) | User security authentication system in internet and method thereof | |
CN107256367A (en) | A kind of information processing method and device, terminal device and computer-readable recording medium | |
CN110830262B (en) | Authorization management method and electronic equipment | |
WO2016145624A1 (en) | Information processing method and mobile terminal | |
CN106303085B (en) | Mobile terminal and method and device for secure call | |
CN105681261A (en) | Security authentication method and apparatus | |
JP6938579B2 (en) | Mobile device privacy protection methods and devices, as well as mobile devices | |
CN106453526A (en) | Mobile terminal and short message secrecy maintaining method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |