WO2018218806A1 - Terminal privacy protection method and system - Google Patents

Terminal privacy protection method and system Download PDF

Info

Publication number
WO2018218806A1
WO2018218806A1 PCT/CN2017/101602 CN2017101602W WO2018218806A1 WO 2018218806 A1 WO2018218806 A1 WO 2018218806A1 CN 2017101602 W CN2017101602 W CN 2017101602W WO 2018218806 A1 WO2018218806 A1 WO 2018218806A1
Authority
WO
WIPO (PCT)
Prior art keywords
video
picture
user
privacy protection
terminal
Prior art date
Application number
PCT/CN2017/101602
Other languages
French (fr)
Chinese (zh)
Inventor
李炜
Original Assignee
深圳市伊特利网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市伊特利网络科技有限公司 filed Critical 深圳市伊特利网络科技有限公司
Publication of WO2018218806A1 publication Critical patent/WO2018218806A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to the field of communications, and in particular, to a terminal privacy protection method and system.
  • Smartphones are common devices used by people every day. Pictures and videos in smartphones generally have privacy requirements. As long as the existing smartphones are unlocked, the copy of the pictures is not restricted, which makes the appearance of the Yanzhao Gate incident similar. User experience is low.
  • a terminal privacy protection method is provided, which solves the shortcoming of low user experience in the prior art.
  • a method for protecting a terminal privacy includes the following steps:
  • the method further includes:
  • the user is identified by the biometric module, such as recognition, allowing the user to modify the attributes of the picture and video.
  • the method further includes:
  • a second aspect provides a terminal privacy protection system, where the method includes:
  • a touch unit for determining a picture and a video selected by the user to be protected
  • a setting unit for setting the picture and video to a hidden mode
  • a control unit for setting the attributes of the picture and video to be non-copyable.
  • system further includes:
  • the control unit is configured to identify the user through the biometric module, such as the identification pass, and allow the user to modify the attributes of the picture and the video.
  • system further includes:
  • the control unit is configured to: if the copy request of the picture and the video is detected, trigger an alarm to record the copy time.
  • a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the terminal privacy protection method described above.
  • a terminal comprising one or more processors, a memory, a transceiver, and one or more programs, the one or more programs being stored in the memory and configured by the Executed by one or more processors, the program including instructions for performing the steps in the terminal privacy protection method described above.
  • the technical solution provided by the specific embodiment of the present invention determines a picture and a video selected by the user to be protected, sets the picture and the video to a hidden mode, and sets the attributes of the picture and the video to be non-copyable, so that the picture is selected according to the user selection. And the video is set to be non-copyable, which is convenient for the user.
  • FIG. 1 is a flowchart of a method for protecting a terminal privacy according to the present invention.
  • FIG. 2 is a structural diagram of a terminal privacy protection system provided by the present invention.
  • FIG. 3 is a schematic structural diagram of hardware of a terminal provided by the present invention.
  • FIG. 1 is a flowchart of a method for protecting a terminal privacy according to a first preferred embodiment of the present invention.
  • the method is implemented by a terminal.
  • the method is as shown in FIG. 1 , and includes the following steps:
  • Step S101 Determine a picture and a video selected by the user to be protected
  • Step S102 setting the picture and video to a hidden mode
  • Step S103 setting the attributes of the picture and the video to be non-copyable.
  • the technical solution provided by the specific embodiment of the present invention determines a picture and a video selected by the user to be protected, sets the picture and the video to a hidden mode, and sets the attributes of the picture and the video to be non-copyable, so that the picture is selected according to the user selection. And the video is set to be non-copyable, which is convenient for the user.
  • the method may further include:
  • the user is identified by the biometric module, such as recognition, allowing the user to modify the attributes of the picture and video.
  • the method may further include:
  • FIG. 2 is a terminal privacy protection system according to a second preferred embodiment of the present invention.
  • the system is as shown in FIG. 2, and includes:
  • the touch unit 201 is configured to determine a picture and a video selected by the user to be protected;
  • the setting unit 202 is configured to set the picture and the video to a hidden mode
  • the control unit 203 is configured to set the attributes of the picture and the video to be non-copyable.
  • the technical solution provided by the specific embodiment of the present invention determines a picture and a video selected by the user to be protected, sets the picture and the video to a hidden mode, and sets the attributes of the picture and the video to be non-copyable, so that the picture is selected according to the user selection. And the video is set to be non-copyable, which is convenient for the user.
  • the above system may further include:
  • the control unit 203 is configured to identify the user through the biometric module, such as the identification pass, and allow the user to modify the attributes of the picture and the video.
  • the above system may further include:
  • the control unit 203 is configured to: if the copy request of the picture and the video is detected, trigger an alarm to record the copy time.
  • a specific embodiment of the present invention further provides a computer readable storage medium having stored thereon a computer program, the program being implemented by the processor to implement the terminal privacy protection method.
  • a specific embodiment of the present invention further provides a terminal, as shown in FIG. 3, including one or more processors 302, a memory 301, a transceiver 303, and one or more programs, the one or more programs being stored in The memory is, and is configured to be executed by, the one or more processors, the program comprising instructions for performing the steps in the terminal privacy protection method described above.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
  • a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.

Abstract

A terminal privacy protection method and system. The method comprises the following steps: determining a picture and video which a user selects for protection (S101); setting the picture and video as a hidden mode (S102); and setting the attribute of the picture and video as non-copying (S103). The method has the advantage of high user experience.

Description

终端隐私保护方法及系统  Terminal privacy protection method and system 技术领域Technical field
本发明涉及通信领域,尤其涉及一种终端隐私保护方法及系统。The present invention relates to the field of communications, and in particular, to a terminal privacy protection method and system.
背景技术Background technique
智能手机属于人日常使用的常用设备,智能手机内的图片和视频一般均有隐私的要求,现有的智能手机只要解锁,其图片的拷贝并不受限制,这使得类似艳照门事件的出现,用户体验度低。Smartphones are common devices used by people every day. Pictures and videos in smartphones generally have privacy requirements. As long as the existing smartphones are unlocked, the copy of the pictures is not restricted, which makes the appearance of the Yanzhao Gate incident similar. User experience is low.
技术问题technical problem
提供一种终端隐私保护方法,其解决了现有技术用户体验度低的缺点。A terminal privacy protection method is provided, which solves the shortcoming of low user experience in the prior art.
技术解决方案Technical solution
一方面,提供一种终端隐私保护方法,所述方法包括如下步骤:In one aspect, a method for protecting a terminal privacy is provided, and the method includes the following steps:
确定用户选择的需要保护的图片和视频;Determine the pictures and videos that the user chooses to protect;
将该图片和视频设置为隐藏模式;Set the picture and video to hidden mode;
将该图片和视频的属性设置成不可拷贝。Set the properties of the image and video to be non-copyable.
可选的,所述方法还包括:Optionally, the method further includes:
通过生物识别模块对用户进行识别,如识别通过,允许用户对该图片和视频的属性修改。The user is identified by the biometric module, such as recognition, allowing the user to modify the attributes of the picture and video.
可选的,所述方法还包括:Optionally, the method further includes:
如检测到该图片和视频的拷贝请求,则触发告警,记录该拷贝时间。If a copy request for the picture and video is detected, an alarm is triggered to record the copy time.
第二方面,提供一种终端隐私保护系统,所述方法包括:A second aspect provides a terminal privacy protection system, where the method includes:
触控单元,用于确定用户选择的需要保护的图片和视频;a touch unit for determining a picture and a video selected by the user to be protected;
设置单元,用于将该图片和视频设置为隐藏模式;a setting unit for setting the picture and video to a hidden mode;
控制单元,用于将该图片和视频的属性设置成不可拷贝。A control unit for setting the attributes of the picture and video to be non-copyable.
可选的,所述系统还包括:Optionally, the system further includes:
控制单元,用于通过生物识别模块对用户进行识别,如识别通过,允许用户对该图片和视频的属性修改。The control unit is configured to identify the user through the biometric module, such as the identification pass, and allow the user to modify the attributes of the picture and the video.
可选的,所述系统还包括:Optionally, the system further includes:
控制单元,用于如检测到该图片和视频的拷贝请求,则触发告警,记录该拷贝时间。The control unit is configured to: if the copy request of the picture and the video is detected, trigger an alarm to record the copy time.
第三方面,提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现上述终端隐私保护方法。In a third aspect, a computer readable storage medium is provided having stored thereon a computer program that, when executed by a processor, implements the terminal privacy protection method described above.
第四方面,提供一种终端,包括一个或多个处理器、存储器、收发器,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述一个或多个处理器执行,所述程序包括用于执行上述终端隐私保护方法中的步骤的指令。In a fourth aspect, a terminal is provided, comprising one or more processors, a memory, a transceiver, and one or more programs, the one or more programs being stored in the memory and configured by the Executed by one or more processors, the program including instructions for performing the steps in the terminal privacy protection method described above.
有益效果Beneficial effect
本发明具体实施方式提供的技术方案确定用户选择的需要保护的图片和视频,将该图片和视频设置为隐藏模式,将该图片和视频的属性设置成不可拷贝,所以其具有依据用户选择将图片和视频设置成不可拷贝,方便用户的优点。The technical solution provided by the specific embodiment of the present invention determines a picture and a video selected by the user to be protected, sets the picture and the video to a hidden mode, and sets the attributes of the picture and the video to be non-copyable, so that the picture is selected according to the user selection. And the video is set to be non-copyable, which is convenient for the user.
附图说明DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.
图1为本发明提供的一种终端隐私保护方法的流程图。FIG. 1 is a flowchart of a method for protecting a terminal privacy according to the present invention.
图2为本发明提供的一种终端隐私保护系统的结构图。2 is a structural diagram of a terminal privacy protection system provided by the present invention.
图3为本发明提供的一种终端的硬件结构示意图。FIG. 3 is a schematic structural diagram of hardware of a terminal provided by the present invention.
本发明的实施方式Embodiments of the invention
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
参阅图1,图1为本发明第一较佳实施方式提供的一种终端隐私保护方法的流程图,该方法由终端来完成,该方法如图1所示,包括如下步骤:Referring to FIG. 1 , FIG. 1 is a flowchart of a method for protecting a terminal privacy according to a first preferred embodiment of the present invention. The method is implemented by a terminal. The method is as shown in FIG. 1 , and includes the following steps:
步骤S101、确定用户选择的需要保护的图片和视频;Step S101: Determine a picture and a video selected by the user to be protected;
步骤S102、将该图片和视频设置为隐藏模式;Step S102, setting the picture and video to a hidden mode;
步骤S103、将该图片和视频的属性设置成不可拷贝。Step S103, setting the attributes of the picture and the video to be non-copyable.
本发明具体实施方式提供的技术方案确定用户选择的需要保护的图片和视频,将该图片和视频设置为隐藏模式,将该图片和视频的属性设置成不可拷贝,所以其具有依据用户选择将图片和视频设置成不可拷贝,方便用户的优点。The technical solution provided by the specific embodiment of the present invention determines a picture and a video selected by the user to be protected, sets the picture and the video to a hidden mode, and sets the attributes of the picture and the video to be non-copyable, so that the picture is selected according to the user selection. And the video is set to be non-copyable, which is convenient for the user.
可选的,上述步骤S103之后还可以包括:Optionally, after the step S103, the method may further include:
通过生物识别模块对用户进行识别,如识别通过,允许用户对该图片和视频的属性修改。The user is identified by the biometric module, such as recognition, allowing the user to modify the attributes of the picture and video.
可选的,上述步骤S103之后还可以包括:Optionally, after the step S103, the method may further include:
如检测到该图片和视频的拷贝请求,则触发告警,记录该拷贝时间。If a copy request for the picture and video is detected, an alarm is triggered to record the copy time.
参阅图2,图2为本发明第二较佳实施方式提供的一种终端隐私保护系统,该系统如图2所示,包括:Referring to FIG. 2, FIG. 2 is a terminal privacy protection system according to a second preferred embodiment of the present invention. The system is as shown in FIG. 2, and includes:
触控单元201,用于确定用户选择的需要保护的图片和视频;The touch unit 201 is configured to determine a picture and a video selected by the user to be protected;
设置单元202,用于将该图片和视频设置为隐藏模式;The setting unit 202 is configured to set the picture and the video to a hidden mode;
控制单元203,用于将该图片和视频的属性设置成不可拷贝。The control unit 203 is configured to set the attributes of the picture and the video to be non-copyable.
本发明具体实施方式提供的技术方案确定用户选择的需要保护的图片和视频,将该图片和视频设置为隐藏模式,将该图片和视频的属性设置成不可拷贝,所以其具有依据用户选择将图片和视频设置成不可拷贝,方便用户的优点。The technical solution provided by the specific embodiment of the present invention determines a picture and a video selected by the user to be protected, sets the picture and the video to a hidden mode, and sets the attributes of the picture and the video to be non-copyable, so that the picture is selected according to the user selection. And the video is set to be non-copyable, which is convenient for the user.
可选的,上述系统还可以包括:Optionally, the above system may further include:
控制单元203,用于通过生物识别模块对用户进行识别,如识别通过,允许用户对该图片和视频的属性修改。The control unit 203 is configured to identify the user through the biometric module, such as the identification pass, and allow the user to modify the attributes of the picture and the video.
可选的,上述系统还可以包括:Optionally, the above system may further include:
控制单元203,用于如检测到该图片和视频的拷贝请求,则触发告警,记录该拷贝时间。The control unit 203 is configured to: if the copy request of the picture and the video is detected, trigger an alarm to record the copy time.
需要说明的是,对于前述的各方法实施方式或实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为根据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述实施方式或实施例均属于优选实施例,所涉及的动作和单元并不一定是本发明所必须的。It should be noted that, for the foregoing method embodiments or embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not subject to the described action sequence. Limitations, as certain steps may be performed in other sequences or concurrently in accordance with the present invention. In the following, those skilled in the art should also understand that the embodiments or examples described in the specification are preferred embodiments, and the actions and units involved are not necessarily required by the present invention.
本发明具体实施方式还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现上述终端隐私保护方法。A specific embodiment of the present invention further provides a computer readable storage medium having stored thereon a computer program, the program being implemented by the processor to implement the terminal privacy protection method.
本发明具体实施方式还提供一种终端,如图3所示,包括一个或多个处理器302、存储器301、收发器303,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述一个或多个处理器执行,所述程序包括用于执行上述终端隐私保护方法中的步骤的指令。A specific embodiment of the present invention further provides a terminal, as shown in FIG. 3, including one or more processors 302, a memory 301, a transceiver 303, and one or more programs, the one or more programs being stored in The memory is, and is configured to be executed by, the one or more processors, the program comprising instructions for performing the steps in the terminal privacy protection method described above.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are different, and the details that are not detailed in a certain embodiment can be referred to the related descriptions of other embodiments.
本发明实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。The steps in the method of the embodiment of the present invention may be sequentially adjusted, merged, and deleted according to actual needs.
本发明实施例装置中的单元可以根据实际需要进行合并、划分和删减。本领域的技术人员可以将本说明书中描述的不同实施例以及不同实施例的特征进行结合或组合。The units in the apparatus of the embodiment of the present invention may be combined, divided, and deleted according to actual needs. Those skilled in the art can combine or combine the different embodiments described in the specification and the features of the different embodiments.
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本发明可以用硬件实现,或固件实现,或它们的组合方式来实现。当使用软件实现时,可以将上述功能存储在计算机可读介质中或作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。此外。任何连接可以适当的成为计算机可读介质。例如,如果软件是使用同轴电缆、光纤光缆、双绞线、数字用户线(Digital Subscriber Line,DSL)或者诸如红外线、无线电和微波之类的无线技术从网站、服务器或者其他远程源传输的,那么同轴电缆、光纤光缆、双绞线、DSL或者诸如红外线、无线和微波之类的无线技术包括在所属介质的定影中。如本发明所使用的,盘(Disk)和碟(disc)包括压缩光碟(CD)、激光碟、光碟、数字通用光碟(DVD)、软盘和蓝光光碟,其中盘通常磁性的复制数据,而碟则用激光来光学的复制数据。上面的组合也应当包括在计算机可读介质的保护范围之内。Through the description of the above embodiments, those skilled in the art can clearly understand that the present invention can be implemented in hardware, firmware implementation, or a combination thereof. When implemented in software, the functions described above may be stored in or transmitted as one or more instructions or code on a computer readable medium. Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another. A storage medium may be any available media that can be accessed by a computer. Taking this as an example, but not limited to: the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium. For example, if the software is using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (Digital Subscriber Line, DSL) or wireless technology such as infrared, radio and microwave transmission from a website, server or other remote source, then coaxial cable, fiber optic cable, twisted pair, DSL or such as infrared, wireless and microwave Wireless technology is included in the fixing of the associated medium. As used in the present invention, a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.
总之,以上所述仅为本发明技术方案的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 In summary, the above description is only a preferred embodiment of the technical solution of the present invention, and is not intended to limit the scope of the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims (8)

  1. 一种终端隐私保护方法,其特征在于,所述方法包括如下步骤: A method for protecting a terminal privacy, characterized in that the method comprises the following steps:
    确定用户选择的需要保护的图片和视频;Determine the pictures and videos that the user chooses to protect;
    将该图片和视频设置为隐藏模式;Set the picture and video to hidden mode;
    将该图片和视频的属性设置成不可拷贝。Set the properties of the image and video to be non-copyable.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:
    通过生物识别模块对用户进行识别,如识别通过,允许用户对该图片和视频的属性修改。The user is identified by the biometric module, such as recognition, allowing the user to modify the attributes of the picture and video.
  3. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:
    如检测到该图片和视频的拷贝请求,则触发告警,记录该拷贝时间。If a copy request for the picture and video is detected, an alarm is triggered to record the copy time.
  4. 一种终端隐私保护系统,其特征在于,所述方法包括:A terminal privacy protection system, characterized in that the method comprises:
    触控单元,用于确定用户选择的需要保护的图片和视频;a touch unit for determining a picture and a video selected by the user to be protected;
    设置单元,用于将该图片和视频设置为隐藏模式;a setting unit for setting the picture and video to a hidden mode;
    控制单元,用于将该图片和视频的属性设置成不可拷贝。A control unit for setting the attributes of the picture and video to be non-copyable.
  5. 根据权利要求4所述的系统,其特征在于,The system of claim 4 wherein:
    所述控制单元,用于通过生物识别模块对用户进行识别,如识别通过,允许用户对该图片和视频的属性修改。The control unit is configured to identify the user through the biometric module, such as the identification pass, and allow the user to modify the attributes of the picture and the video.
  6. 根据权利要求4所述的系统,其特征在于, The system of claim 4 wherein:
    所述控制单元,用于如检测到该图片和视频的拷贝请求,则触发告警,记录该拷贝时间。The control unit is configured to: if the copy request of the picture and the video is detected, trigger an alarm to record the copy time.
  7. 一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如权利要求1-3任意一项所述的终端隐私保护方法。A computer readable storage medium having stored thereon a computer program, the program being executed by a processor to implement the terminal privacy protection method according to any one of claims 1-3.
  8. 一种终端,其特征在于,包括一个或多个处理器、存储器、收发器,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述一个或多个处理器执行,所述程序包括用于执行1-3任意一项所述的终端隐私保护方法中的步骤的指令。A terminal, comprising: one or more processors, a memory, a transceiver, and one or more programs, the one or more programs being stored in the memory and configured by the one Executing by a plurality of processors, the program comprising instructions for performing the steps in the terminal privacy protection method of any of 1-3.
PCT/CN2017/101602 2017-06-01 2017-09-13 Terminal privacy protection method and system WO2018218806A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710404138.1A CN107229875A (en) 2017-06-01 2017-06-01 Terminal method for secret protection and system
CN2017104041381 2017-06-01

Publications (1)

Publication Number Publication Date
WO2018218806A1 true WO2018218806A1 (en) 2018-12-06

Family

ID=59933583

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/101602 WO2018218806A1 (en) 2017-06-01 2017-09-13 Terminal privacy protection method and system

Country Status (2)

Country Link
CN (1) CN107229875A (en)
WO (1) WO2018218806A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992765A (en) * 2017-11-28 2018-05-04 珠海格力电器股份有限公司 A kind of picture hidden method and device
CN108595569B (en) * 2018-04-13 2020-10-23 Oppo广东移动通信有限公司 File path copying method, file path copying device and mobile terminal
CN111935435B (en) * 2020-07-28 2022-12-20 深圳市鼎盛光电有限公司 Video file encryption method and device, digital television equipment and storage medium
CN112926089B (en) * 2021-03-25 2023-03-17 支付宝(杭州)信息技术有限公司 Data risk prevention and control method, device and equipment based on privacy protection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080256647A1 (en) * 2004-10-13 2008-10-16 Electronics And Telecommunications Research Instit System and Method For Tracing Illegally Copied Contents on the Basis of Fingerprint
CN103177206A (en) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 Information privacy method and electronic terminal
CN103186761A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Fingerprint encryption method of private file and communication terminal
CN103533172A (en) * 2013-10-22 2014-01-22 陕西高新实业有限公司 Method for storing and managing photo information of mobile phone
CN105574423A (en) * 2014-10-09 2016-05-11 中兴通讯股份有限公司 Terminal device and file management method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462900A (en) * 2014-12-05 2015-03-25 来安县新元机电设备设计有限公司 Method and system for protecting private pictures in mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080256647A1 (en) * 2004-10-13 2008-10-16 Electronics And Telecommunications Research Instit System and Method For Tracing Illegally Copied Contents on the Basis of Fingerprint
CN103186761A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Fingerprint encryption method of private file and communication terminal
CN103177206A (en) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 Information privacy method and electronic terminal
CN103533172A (en) * 2013-10-22 2014-01-22 陕西高新实业有限公司 Method for storing and managing photo information of mobile phone
CN105574423A (en) * 2014-10-09 2016-05-11 中兴通讯股份有限公司 Terminal device and file management method thereof

Also Published As

Publication number Publication date
CN107229875A (en) 2017-10-03

Similar Documents

Publication Publication Date Title
WO2018218806A1 (en) Terminal privacy protection method and system
WO2018218808A1 (en) Short message information reading method and system
WO2018218807A1 (en) Information reading method and system of wechat
WO2018223550A1 (en) Terminal alarm clock setting method and system
WO2018227332A1 (en) Positioning-based terminal quick payment method and system
WO2018223552A1 (en) Terminal app rapid exiting method and system
WO2018032335A1 (en) Method and system for closing mobile phone applications
WO2018027557A1 (en) Wifi attendance record method and system in security
WO2018223341A1 (en) Terminal gesture-based game control method and system
WO2018209583A1 (en) Auxiliary positioning method and system
WO2018227376A1 (en) Method and system for controlling home camera based on terminal positioning
WO2018214055A1 (en) Method and system for implementing positioning in flight mode
WO2018205271A1 (en) Smart terminal biometric identification method and system
WO2018209584A1 (en) Positioning-based running route recording method and system
WO2018223344A1 (en) Method and system for location sharing when visiting relatives
WO2018227364A1 (en) Method and system for establishing terminal multicast group
WO2018227375A1 (en) Method and system for controlling smart home by means of terminal positioning
WO2018205272A1 (en) Terminal fingerprint identification application method and system
WO2018027698A1 (en) Head portrait tracking method and system for security video conference
WO2018209646A1 (en) Smart household monitoring method and system
WO2018209686A1 (en) Takeaway route planning method and system
WO2018152669A1 (en) Security control method and device for security monitoring
WO2018214021A1 (en) Method and system for sharing cross-platform destination
WO2018027570A1 (en) Method and system for transmitting video file of remote security video conference
WO2018165863A1 (en) Data classification method and apparatus in safety and protection monitoring

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17912191

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17912191

Country of ref document: EP

Kind code of ref document: A1