WO2018218806A1 - Procédé et système de protection de la confidentialité d'un terminal - Google Patents

Procédé et système de protection de la confidentialité d'un terminal Download PDF

Info

Publication number
WO2018218806A1
WO2018218806A1 PCT/CN2017/101602 CN2017101602W WO2018218806A1 WO 2018218806 A1 WO2018218806 A1 WO 2018218806A1 CN 2017101602 W CN2017101602 W CN 2017101602W WO 2018218806 A1 WO2018218806 A1 WO 2018218806A1
Authority
WO
WIPO (PCT)
Prior art keywords
video
picture
user
privacy protection
terminal
Prior art date
Application number
PCT/CN2017/101602
Other languages
English (en)
Chinese (zh)
Inventor
李炜
Original Assignee
深圳市伊特利网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市伊特利网络科技有限公司 filed Critical 深圳市伊特利网络科技有限公司
Publication of WO2018218806A1 publication Critical patent/WO2018218806A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to the field of communications, and in particular, to a terminal privacy protection method and system.
  • Smartphones are common devices used by people every day. Pictures and videos in smartphones generally have privacy requirements. As long as the existing smartphones are unlocked, the copy of the pictures is not restricted, which makes the appearance of the Yanzhao Gate incident similar. User experience is low.
  • a terminal privacy protection method is provided, which solves the shortcoming of low user experience in the prior art.
  • a method for protecting a terminal privacy includes the following steps:
  • the method further includes:
  • the user is identified by the biometric module, such as recognition, allowing the user to modify the attributes of the picture and video.
  • the method further includes:
  • a second aspect provides a terminal privacy protection system, where the method includes:
  • a touch unit for determining a picture and a video selected by the user to be protected
  • a setting unit for setting the picture and video to a hidden mode
  • a control unit for setting the attributes of the picture and video to be non-copyable.
  • system further includes:
  • the control unit is configured to identify the user through the biometric module, such as the identification pass, and allow the user to modify the attributes of the picture and the video.
  • system further includes:
  • the control unit is configured to: if the copy request of the picture and the video is detected, trigger an alarm to record the copy time.
  • a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the terminal privacy protection method described above.
  • a terminal comprising one or more processors, a memory, a transceiver, and one or more programs, the one or more programs being stored in the memory and configured by the Executed by one or more processors, the program including instructions for performing the steps in the terminal privacy protection method described above.
  • the technical solution provided by the specific embodiment of the present invention determines a picture and a video selected by the user to be protected, sets the picture and the video to a hidden mode, and sets the attributes of the picture and the video to be non-copyable, so that the picture is selected according to the user selection. And the video is set to be non-copyable, which is convenient for the user.
  • FIG. 1 is a flowchart of a method for protecting a terminal privacy according to the present invention.
  • FIG. 2 is a structural diagram of a terminal privacy protection system provided by the present invention.
  • FIG. 3 is a schematic structural diagram of hardware of a terminal provided by the present invention.
  • FIG. 1 is a flowchart of a method for protecting a terminal privacy according to a first preferred embodiment of the present invention.
  • the method is implemented by a terminal.
  • the method is as shown in FIG. 1 , and includes the following steps:
  • Step S101 Determine a picture and a video selected by the user to be protected
  • Step S102 setting the picture and video to a hidden mode
  • Step S103 setting the attributes of the picture and the video to be non-copyable.
  • the technical solution provided by the specific embodiment of the present invention determines a picture and a video selected by the user to be protected, sets the picture and the video to a hidden mode, and sets the attributes of the picture and the video to be non-copyable, so that the picture is selected according to the user selection. And the video is set to be non-copyable, which is convenient for the user.
  • the method may further include:
  • the user is identified by the biometric module, such as recognition, allowing the user to modify the attributes of the picture and video.
  • the method may further include:
  • FIG. 2 is a terminal privacy protection system according to a second preferred embodiment of the present invention.
  • the system is as shown in FIG. 2, and includes:
  • the touch unit 201 is configured to determine a picture and a video selected by the user to be protected;
  • the setting unit 202 is configured to set the picture and the video to a hidden mode
  • the control unit 203 is configured to set the attributes of the picture and the video to be non-copyable.
  • the technical solution provided by the specific embodiment of the present invention determines a picture and a video selected by the user to be protected, sets the picture and the video to a hidden mode, and sets the attributes of the picture and the video to be non-copyable, so that the picture is selected according to the user selection. And the video is set to be non-copyable, which is convenient for the user.
  • the above system may further include:
  • the control unit 203 is configured to identify the user through the biometric module, such as the identification pass, and allow the user to modify the attributes of the picture and the video.
  • the above system may further include:
  • the control unit 203 is configured to: if the copy request of the picture and the video is detected, trigger an alarm to record the copy time.
  • a specific embodiment of the present invention further provides a computer readable storage medium having stored thereon a computer program, the program being implemented by the processor to implement the terminal privacy protection method.
  • a specific embodiment of the present invention further provides a terminal, as shown in FIG. 3, including one or more processors 302, a memory 301, a transceiver 303, and one or more programs, the one or more programs being stored in The memory is, and is configured to be executed by, the one or more processors, the program comprising instructions for performing the steps in the terminal privacy protection method described above.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
  • a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un système et un procédé de protection de la confidentialité d'un terminal. Le procédé comprend les étapes suivantes consistant à : déterminer une image et une vidéo qu'un utilisateur sélectionne pour leur protection (S101); régler l'image et la vidéo en mode caché (S102); et régler l'attribut de l'image et de la vidéo en non-copie (S103). Le procédé présente l'avantage d'une grande expérience utilisateur.
PCT/CN2017/101602 2017-06-01 2017-09-13 Procédé et système de protection de la confidentialité d'un terminal WO2018218806A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2017104041381 2017-06-01
CN201710404138.1A CN107229875A (zh) 2017-06-01 2017-06-01 终端隐私保护方法及系统

Publications (1)

Publication Number Publication Date
WO2018218806A1 true WO2018218806A1 (fr) 2018-12-06

Family

ID=59933583

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/101602 WO2018218806A1 (fr) 2017-06-01 2017-09-13 Procédé et système de protection de la confidentialité d'un terminal

Country Status (2)

Country Link
CN (1) CN107229875A (fr)
WO (1) WO2018218806A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992765A (zh) * 2017-11-28 2018-05-04 珠海格力电器股份有限公司 一种图片隐藏方法及装置
CN108595569B (zh) * 2018-04-13 2020-10-23 Oppo广东移动通信有限公司 文件路径复制方法、文件路径复制装置及移动终端
CN111935435B (zh) * 2020-07-28 2022-12-20 深圳市鼎盛光电有限公司 视频文件的加密方法、装置、数字电视设备及存储介质
CN112926089B (zh) * 2021-03-25 2023-03-17 支付宝(杭州)信息技术有限公司 一种基于隐私保护的数据风险防控方法、装置及设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080256647A1 (en) * 2004-10-13 2008-10-16 Electronics And Telecommunications Research Instit System and Method For Tracing Illegally Copied Contents on the Basis of Fingerprint
CN103177206A (zh) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 一种信息保密方法及电子终端
CN103186761A (zh) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 私密文件的指纹加密方法及其通信终端
CN103533172A (zh) * 2013-10-22 2014-01-22 陕西高新实业有限公司 一种手机照片类信息存储管理方法
CN105574423A (zh) * 2014-10-09 2016-05-11 中兴通讯股份有限公司 一种终端设备及其文件管理方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462900A (zh) * 2014-12-05 2015-03-25 来安县新元机电设备设计有限公司 一种移动终端隐私图片保护的方法和系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080256647A1 (en) * 2004-10-13 2008-10-16 Electronics And Telecommunications Research Instit System and Method For Tracing Illegally Copied Contents on the Basis of Fingerprint
CN103186761A (zh) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 私密文件的指纹加密方法及其通信终端
CN103177206A (zh) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 一种信息保密方法及电子终端
CN103533172A (zh) * 2013-10-22 2014-01-22 陕西高新实业有限公司 一种手机照片类信息存储管理方法
CN105574423A (zh) * 2014-10-09 2016-05-11 中兴通讯股份有限公司 一种终端设备及其文件管理方法

Also Published As

Publication number Publication date
CN107229875A (zh) 2017-10-03

Similar Documents

Publication Publication Date Title
WO2018218806A1 (fr) Procédé et système de protection de la confidentialité d'un terminal
WO2018218808A1 (fr) Procédé et système de lecture d'informations de message court
WO2018218807A1 (fr) Procédé et système de lecture d'informations de wechat
WO2018223550A1 (fr) Procédé et système de réglage d'une horloge d'alarme de terminal
WO2018227332A1 (fr) Procédé et système de paiement rapide de terminal reposant sur le positionnement
WO2018223552A1 (fr) Procédé et système de sortie rapide d'application de terminal
WO2018027557A1 (fr) Procédé et système d'enregistrement de présence wi-fi en matière de sécurité
WO2018223341A1 (fr) Procédé et système de commande de jeu par interaction gestuelle avec un terminal
WO2018209583A1 (fr) Procédé et système de positionnement auxiliaire
WO2018227376A1 (fr) Procédé et système de commande d'une caméra domestique d'après un positionnement de terminal
WO2018214055A1 (fr) Procédé et système de mise en œuvre d'un positionnement en mode de vol
WO2018205271A1 (fr) Procédé et système d'identification biométrique de terminal intelligent
WO2018209584A1 (fr) Procédé et système d'enregistrement d'itinéraire de course fondés sur le positionnement
WO2018223344A1 (fr) Procédé et système de partage d'emplacement lors de la visite de proches
WO2018227364A1 (fr) Procédé et système d'établissement de groupe de multidiffusion de terminal
WO2018227375A1 (fr) Procédé et système de commande d'une maison intelligente par localisation de terminal
WO2018205272A1 (fr) Procédé et système d'application d'identification d'empreintes digitales de terminal
WO2018027698A1 (fr) Procédé et système de suivi de portrait de tête pour vidéoconférence de sécurité
WO2018209646A1 (fr) Procédé et système de surveillance de domicile intelligent
WO2018209686A1 (fr) Procédé et système de planification d'itinéraires de produits à emporter
WO2018152669A1 (fr) Procédé et dispositif de contrôle de sécurité permettant une surveillance de sécurité
WO2018214021A1 (fr) Procédé et système de partage de destination entre plateformes
WO2018027570A1 (fr) Procédé et système de transmission de fichier vidéo de vidéoconférence de sécurité à distance
WO2018165863A1 (fr) Procédé et appareil de classification de données en surveillance de sécurité et de protection
WO2018027697A1 (fr) Procédé et système destinés à appliquer un procédé de recherche de cible audio dans une visioconférence de sécurité

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17912191

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17912191

Country of ref document: EP

Kind code of ref document: A1