CN104318177A - Protection method and protection device for data of terminal equipment - Google Patents

Protection method and protection device for data of terminal equipment Download PDF

Info

Publication number
CN104318177A
CN104318177A CN201410594452.7A CN201410594452A CN104318177A CN 104318177 A CN104318177 A CN 104318177A CN 201410594452 A CN201410594452 A CN 201410594452A CN 104318177 A CN104318177 A CN 104318177A
Authority
CN
China
Prior art keywords
destination object
wearable device
terminal device
bound
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410594452.7A
Other languages
Chinese (zh)
Inventor
林锦滨
马坤
史大龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410594452.7A priority Critical patent/CN104318177A/en
Publication of CN104318177A publication Critical patent/CN104318177A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to a protection method and a protection device for data of terminal equipment, aiming to protect data of the terminal equipment safely and conveniently. The protection method includes making a target object available when bound wearable devices are detected within a preset range of the terminal equipment; making the target object unavailable when no bound wearable devices are detected within the preset range of the terminal equipment. According to the technical scheme, compared with the conventional data protection technology, the protection method and the protection device give a guarantee to security of the data easily and conveniently, prevent private data from being stolen, protect users' privacy and bring good experiences to users.

Description

The guard method of data and device in terminal device
Technical field
The disclosure relates to technical field of data processing, particularly relates to guard method and the device of data in terminal device.
Background technology
At present, in everyone terminal device, have a lot of private data, the someone in such as cell phone address book or Instant Messenger (IM) software, certain group in instant chat software or certain message, certain pictures in picture library, certain file etc. in mobile phone.In order to avoid these private datas are had access to by other people, adopt some data confidentiality measures at present; Such as, for some secret files, adopt password or nine lattice figure encryptions, but when user accesses at every turn, user needs input password or figure, and the password that will remember is too many, complex operation, Consumer's Experience is poor; For another example, for the APP of need to be keep secret, special encryption can be used should to be used for APP icon hiding, when user needs to access APP, being introduced into special encryption application is set to visible by this APP icon, and then access APP, but when user accesses at every turn, all need to enter special encryption application and operate, very inconvenient, and special encryption application is also easy to by other people access, thus reduces confidentiality, reduces data security.
Summary of the invention
For overcoming Problems existing in correlation technique, disclosure embodiment provides guard method and the device of data in terminal device, in order to protect the data in terminal device with realizing safe and convenient.
According to the first aspect of disclosure embodiment, the guard method of data in a kind of terminal device is provided, comprises:
When the wearable device bound being detected within the scope of the predeterminable range of terminal device, destination object is made to use;
When the wearable device bound described in not detecting within the scope of the predeterminable range at described terminal device, make described destination object unavailable;
Wherein, described destination object is the data in described terminal device, comprising: the application program in described terminal device, picture, video, audio frequency, log, contact person, chat record or other data contents.
In one embodiment, described when the wearable device bound being detected within the scope of the predeterminable range of terminal device, make destination object use, comprising:
When wearable device being detected within the scope of the predeterminable range at described terminal device, obtain the mark of the described wearable device that described wearable device sends;
Marking matched whether with the wearable device bound of the mark judging described wearable device;
When mark and the wearable device to have bound marking matched of described wearable device, described destination object is made to use.
In one embodiment, describedly make described destination object unavailable, comprising: hide described destination object, make described destination object invisible; Describedly make described destination object use, comprising: show described destination object, make described destination object visible; Or
Describedly make described destination object unavailable, comprising: present the destination object being in encrypted state, wherein, described in be in encrypted state destination object encrypt with preset-key; Describedly make described destination object use, comprising: present the destination object being in decrypted state.
In one embodiment, described when the wearable device bound being detected within the scope of the predeterminable range of terminal device, make destination object use, comprising:
When the wearable device bound being detected within the scope of the predeterminable range of described terminal device, the decruption key that the wearable device bound described in acquisition sends;
Utilize described decruption key to be decrypted the described destination object being in encrypted state, present the destination object being in decrypted state.
In one embodiment, before the decruption key that the wearable device bound described in described acquisition sends, described method also comprises:
The specific local data that arranges receiving user's input is the instruction needing object of protection;
The encryption key that the wearable device bound described in acquisition provides;
Utilize described encryption key to be encrypted the described object of protection that needs, described in generation, be in the destination object of encrypted state.
According to the second aspect of disclosure embodiment, the protective device of data in a kind of terminal device is provided, comprises:
First processing module, for when the wearable device bound being detected within the scope of the predeterminable range of terminal device, makes destination object use;
Second processing module, for when the wearable device bound described in not detecting within the scope of the predeterminable range at described terminal device, makes described destination object unavailable;
Wherein, described destination object is the data in described terminal device, comprising: the application program in described terminal device, picture, video, audio frequency, log, contact person, chat record or other data contents.
In one embodiment, described first processing module comprises:
Mark obtains submodule, for when wearable device being detected within the scope of the predeterminable range at described terminal device, obtains the mark of the described wearable device that described wearable device sends;
Judge submodule, for marking matched whether with the wearable device bound of mark judging described wearable device;
First process submodule, for the mark that judges described wearable device when described judgement submodule and bound wearable device marking matched time, make described destination object use.
In one embodiment, describedly make described destination object unavailable, comprising: hide described destination object, make described destination object invisible; Describedly make described destination object use, comprising: show described destination object, make described destination object visible; Or
Describedly make described destination object unavailable, comprising: present the destination object being in encrypted state, wherein, described in be in encrypted state destination object encrypt with preset-key; Describedly make described destination object use, comprising: present the destination object being in decrypted state.
In one embodiment, described first processing module, comprising:
Key obtains submodule, during for the wearable device bound being detected within the scope of the predeterminable range of described terminal device, and the decruption key that the wearable device bound described in acquisition sends;
Second process submodule, is decrypted the described destination object being in encrypted state for the decruption key utilizing described key to obtain submodule acquisition, presents the destination object being in decrypted state.
In one embodiment, described device also comprises:
Command reception module is the instruction needing object of protection for receiving the specific local data that arranges of user's input;
Key Acquisition Module, the encryption key that the wearable device for having bound described in obtaining provides;
Object generation module, the encryption key obtained for utilizing described Key Acquisition Module is encrypted the described object of protection that needs, and is in the destination object of encrypted state described in generation.
According to the third aspect of disclosure embodiment, the protective device of data in a kind of terminal device is provided, it is characterized in that, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
When the wearable device bound being detected within the scope of the predeterminable range of terminal device, destination object is made to use;
When the wearable device bound described in not detecting within the scope of the predeterminable range at described terminal device, make described destination object unavailable;
Wherein, described destination object is the data in described terminal device, comprising: the application program in described terminal device, picture, video, audio frequency, log, contact person, chat record or other data contents.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
The technical scheme that disclosure embodiment provides, user is not needed to perform input password or other manual encryption and decryption operation, as long as the position of the wearable device that control terminal has been bound, the destination object that just can realize easily in terminal device switches back and forth in visible and non-visible two states, that is: when user carries the wearable device bound away from terminal device, destination object in terminal device is invisible, user or other check fall short object per capita, protect the security of destination object; User carries the wearable device bound when being positioned at the predeterminable range scope of terminal device, and the destination object in terminal device is visible, and user can see destination object.Further, when terminal device is lost or when being used by other people, be not easy due to other people the wearable device bound, therefore, other people can't see destination object.Visible, said method compares current Data Protection Technologies, can ensure the security of data protection simply and easily, prevent private data to be stolen, and the privacy of protection user, Consumer's Experience is good.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in instructions and to form the part of this instructions, shows and meets embodiment of the present disclosure, and is used from instructions one and explains principle of the present disclosure.
Fig. 1 is the process flow diagram of the guard method of data in a kind of terminal device according to an exemplary embodiment.
Fig. 2 is the process flow diagram of the guard method of data in the terminal device according to an exemplary embodiment one.
Fig. 3 is the process flow diagram of the guard method of data in the terminal device according to an exemplary embodiment two.
Fig. 4 is the block diagram of the protective device of data in a kind of terminal device according to an exemplary embodiment.
Fig. 5 is the block diagram of the protective device of data in the another kind of terminal device according to an exemplary embodiment.
Fig. 6 is the block diagram of the protective device of data in another terminal device according to an exemplary embodiment.
Fig. 7 is the block diagram of the protective device of data in another terminal device according to an exemplary embodiment.
Fig. 8 is the block diagram being applicable to the protective device of data in terminal device according to an exemplary embodiment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
The wearable device of indication in disclosure embodiment, refers to it can being directly through, or is incorporated into the clothes of user or a kind of portable set of accessory.Wearable device is not only a kind of hardware device, and realize powerful function alternately by software support and data interaction, high in the clouds especially, wearable device will bring very large transformation to our life, perception.Wearable device is mainly with possessing part computing function, can connecting the existence of the portable accessory form of mobile phone and each Terminal Type, it is the watch class (comprising the products such as wrist-watch, wrist strap, bracelet) supported that the product form of main flow comprises with wrist, take pin as the shoes class (comprising wearable product on footwear, socks or other legs in the future) supported, take head as all kinds of non-mainstream product form such as the Glass class (comprising glasses, the helmet, headband etc.) supported, and intelligent clothing, school bag, crutch, accessories.
Disclosure embodiment provides the guard method of data in a kind of terminal device; can be used for terminal device as any equipment storing data or be provided with application program such as mobile phone, panel computer, desk-top computer, portable computers; the method is used for as needing protected data protection in terminal device; as shown in Figure 1, step S101-S102 is comprised:
In step S101, when the wearable device bound being detected within the scope of the predeterminable range of terminal device, destination object is made to use.
In step s 102, when the wearable device bound not detected within the scope of the predeterminable range of terminal device, make destination object unavailable.
Wherein, destination object is the data in terminal device, comprising: the application program in terminal device, picture, video, audio frequency, log, contact person, chat record or other data contents.Destination object can be that system pre-sets; Can be that user pre-sets according to the needs of oneself.Wherein, above-mentioned predeterminable range scope can be the concrete distance value that user sets, and also can be the maximum detection range of terminal device, and concrete which kind of value that adopts can be selected as required.
The said method that disclosure embodiment provides, user is not needed to perform input password or other manual encryption and decryption operation, as long as the position of the wearable device that control terminal has been bound, the destination object that just can realize easily in terminal device switches back and forth in visible and non-visible two states, that is: when user carries the wearable device bound away from terminal device, destination object in terminal device is invisible, user or other check fall short object per capita, protect the security of destination object; User carries the wearable device bound when being positioned at the predeterminable range scope of terminal device, and the destination object in terminal device is visible, and user can see destination object.Further, when terminal device is lost or when being used by other people, be not easy due to other people the wearable device bound, therefore, other people can't see destination object.Visible, said method compares current Data Protection Technologies, can ensure the security of data protection simply and easily, prevent private data to be stolen, and the privacy of protection user, Consumer's Experience is good.
In one embodiment, in above-mentioned steps make destination object can with or unavailablely may be embodied as with under type one or mode two:
Mode one, above-mentionedly make that destination object is unavailable can be: vanishing target object, makes destination object invisible; Such as, do not demonstrate destination object, make user can't see destination object; Now, make destination object can with being: display-object object, makes destination object visible.
Mode two, above-mentionedly make that destination object is unavailable can also be: present the destination object being in encrypted state, wherein, the destination object being in encrypted state is encrypted with preset-key; Now, make destination object can with being: to present the destination object being in decrypted state.Such as, preset-key can be the user of terminal device arrange key, also can be the key that terminal device system pre-sets; When making destination object available, adopt decruption key corresponding to preset-key to be decrypted the destination object being in encrypted state, acquisition is in the destination object of decrypted state and is shown.
In one embodiment, above-mentioned steps S101 can be embodied as steps A 1-A3: steps A 1, when wearable device being detected within the scope of the predeterminable range of terminal device, obtains the mark of the wearable device that wearable device sends.Steps A 2, marking matched whether with the wearable device bound of mark judging wearable device, perform steps A 3 upon a match; Steps A 4 is performed when not mating.Steps A 3, when mark and the wearable device to have bound marking matched of wearable device, destination object is made to use.The destination object that makes herein can with being embodied as aforementioned manner one or mode two.Steps A 4, when the mark of wearable device is not mated with the mark of the wearable device bound, keep make the disabled state of destination object.Make that destination object is unavailable is embodied as aforementioned manner one or mode two herein.Said method; as long as the wearable device bound of terminal device is moved within the scope of the predeterminable range of terminal device; destination object just can be made visible; and when the wearable device bound is not within the scope of the predeterminable range of terminal device; destination object is sightless; the method not only implementation procedure is simple and convenient, and can ensure the security of data protection, and Consumer's Experience is good.Refer to subsequent embodiment one.
In another embodiment, step S101 can be embodied as step B1-B2: step B1, when the wearable device bound being detected within the scope of the predeterminable range of terminal device, obtains the decruption key that the wearable device bound sends.Step B2, utilize decruption key to be decrypted the destination object being in encrypted state, present the destination object being in decrypted state.Said method, as long as the decruption key obtaining the wearable device transmission of having bound within the scope of the predeterminable range of terminal device, the destination object being in encrypted state just can be made to become decrypted state, and the destination object demonstrating decrypted state is checked for user; And when not obtaining the decruption key of the wearable device transmission of having bound within the scope of the predeterminable range of terminal device, destination object can keep encrypted state, and user cannot view destination object always; The method not only implementation procedure is simple and convenient, and can ensure the security of data protection, and Consumer's Experience is good.Refer to subsequent embodiment two.
In another embodiment, before execution step B1, also following steps C1-C3 can be performed: the specific local data that arranges of step C1, reception user input is the instruction needing object of protection.The encryption key that the wearable device that step C2, acquisition have been bound provides.Step C3, utilizing encryption key to be encrypted needing object of protection, generating the destination object being in encrypted state.Refer to subsequent embodiment two.In said method, which object user can arrange as required as above-mentioned destination object, can meet the individual demand of user, improves Consumer's Experience; Further, also achieve and all do not need user's manual operation to the encryption and decryption process of destination object, can not only ensure the security of data protection, and implementation procedure is simple and convenient, Consumer's Experience is good.
With specific embodiment, the said method that disclosure embodiment provides is described below.
Embodiment one
The present embodiment is a kind of, terminal device is mobile phone, user is in advance by one wearable device-bracelet and this handset binding, user's instant messaging chat record pre-set in mobile phone is destination object, destination object is made to use or unavailable employing aforementioned manner one, as shown in Figure 2, the present embodiment one comprises the steps:
In step s 201, when user carries bracelet away from mobile phone, mobile phone can't detect bracelet, and mobile phone is now hiding instant messaging chat record, and user can't see instant messaging chat record.
In step S202, when user wants the instant messaging chat record checked in mobile phone, user by bracelet near mobile phone, arrive mobile phone sensing range in.
In step S203, when mobile phone detects bracelet, obtain the bracelet mark that bracelet sends.
In step S204, marking matched whether with the bracelet bound of the bracelet mark that bracelet judges to get, performs step S205 upon a match; Step S206 is performed when not mating.
In step S205, when bracelet mark and the bracelet to have bound marking matched, demonstrate instant messaging chat record, thus make user can view instant messaging chat record.
In step S206, when bracelet mark is not mated with the mark of the bracelet bound, illustrates now near the bracelet of mobile phone be not the bracelet bound, the hiding instant messaging chat record of continuation.
Method in this enforcement one; only have and the bracelet bound of mobile phone is moved in the sensing range of mobile phone; instant messaging chat record just can be made visible; and when the bracelet bound is not in the sensing range of mobile phone; instant messaging chat record is sightless; the method can not only ensure the security of data protection, and implementation procedure is simple and convenient, and Consumer's Experience is good.
Embodiment two
In the present embodiment two, terminal device is mobile phone, user is in advance by one wearable device-bracelet and this handset binding, user's photos folder pre-set in mobile phone is destination object, destination object is made to use or unavailable employing aforementioned manner two, the encryption key that the preset-key used during encryption photos folder provides for binding bracelet, as shown in Figure 3, the present embodiment two comprises the steps:
In step S301, when user carries bracelet away from mobile phone, mobile phone can't detect bracelet, and mobile phone is now hiding photos folder, and user can't see photos folder.
In step s 302, when user wants the photos folder of checking in mobile phone, user by bracelet near mobile phone, arrive mobile phone sensing range in.
In step S303, mobile phone detects that the bracelet being positioned at its sensing range is the bracelet bound, and obtains the decruption key of the bracelet transmission of having bound.
In step s 304, bracelet utilizes the decruption key got to be decrypted the photos folder being in encrypted state, makes photos folder be in decrypted state, and afterwards, display is in the photos folder of decrypted state.
Wherein, if in step S303, when mobile phone detects that the bracelet being positioned at its sensing range is not the bracelet bound, then can continue the encrypted state keeping photos folder, process ends.
Method in this enforcement two; only have and the bracelet bound of mobile phone is moved in the sensing range of mobile phone; photos folder just can be made visible; and when the bracelet bound is not in the sensing range of mobile phone; photos folder is sightless; the method can not only ensure the security of data protection, and implementation procedure is simple and convenient, and Consumer's Experience is good.
Corresponding preceding method, disclosure embodiment provides the protective device of data in a kind of terminal device, and for terminal device, as shown in Figure 4, said apparatus comprises:
First processing module 41, for when the wearable device bound being detected within the scope of the predeterminable range of terminal device, makes destination object use;
Second processing module 42, for when the wearable device bound not detected within the scope of the predeterminable range of terminal device, makes destination object unavailable;
Wherein, destination object is the data in terminal device, comprising: the application program in terminal device, picture, video, audio frequency, log, contact person, chat record or other data contents.
In one embodiment, as shown in Figure 5, the first processing module 41 can comprise:
Mark obtains submodule 51, for when wearable device being detected within the scope of the predeterminable range of terminal device, obtains the mark of the wearable device that wearable device sends;
Judge submodule 52, for marking matched whether with the wearable device bound of mark judging wearable device;
First process submodule 53, for when judge the mark that submodule 52 judges wearable device and bound wearable device marking matched time, make destination object use.
In one embodiment, make destination object unavailable, comprising: vanishing target object, make destination object invisible; Make destination object use, comprising: display-object object, make destination object visible; Or
Make destination object unavailable, comprising: present the destination object being in encrypted state, wherein, the destination object being in encrypted state is encrypted with preset-key; Make destination object use, comprising: present the destination object being in decrypted state.
In one embodiment, as shown in Figure 6, the first processing module 41 can comprise:
Key obtains submodule 61, during for the wearable device bound being detected within the scope of the predeterminable range of terminal device, obtains the decruption key of the wearable device transmission of having bound;
Second process submodule 62, is decrypted the destination object being in encrypted state for the decruption key utilizing key to obtain submodule 61 acquisition, presents the destination object being in decrypted state.
In one embodiment, as shown in Figure 7, said apparatus also can comprise:
Command reception module 71 is the instruction needing object of protection for receiving the specific local data that arranges of user's input;
Key Acquisition Module 72, for obtaining the encryption key that the wearable device bound provides;
Object generation module 73, the encryption key obtained for utilizing Key Acquisition Module 72 is encrypted needing object of protection, generates the destination object being in encrypted state.
According to the third aspect of disclosure embodiment, the protective device of data in a kind of terminal device is provided, it is characterized in that, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, processor is configured to:
When the wearable device bound being detected within the scope of the predeterminable range of terminal device, destination object is made to use;
When the wearable device bound not detected within the scope of the predeterminable range of terminal device, make destination object unavailable;
Wherein, destination object is the data in terminal device, comprising: the application program in terminal device, picture, video, audio frequency, log, contact person, chat record or other data contents.
Fig. 8 is the block diagram of a kind of protective device 1200 for data in terminal device according to an exemplary embodiment, and this device is applicable to terminal device.Such as, device 1200 can be mobile phone, computing machine, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 8, device 1200 can comprise following one or more assembly: processing components 1202, storer 1204, power supply module 1206, multimedia groupware 1208, audio-frequency assembly 1210, the interface 1212 of I/O (I/O), sensor module 1214, and communications component 1216.
The integrated operation of the usual control device 1200 of processing components 1202, such as with display, call, data communication, camera operation and record operate the operation be associated.Treatment element 1202 can comprise one or more processor 1220 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 1202 can comprise one or more module, and what be convenient between processing components 1202 and other assemblies is mutual.Such as, processing element 1202 can comprise multi-media module, mutual with what facilitate between multimedia groupware 1208 and processing components 1202.
Storer 1204 is configured to store various types of data to be supported in the operation of equipment 1200.The example of these data comprises for any application program of operation on device 1200 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 1204 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
The various assemblies that electric power assembly 1206 is device 1200 provide electric power.Electric power assembly 1206 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 1200 and be associated.
Multimedia groupware 1208 is included in the screen providing an output interface between described device 1200 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 1208 comprises a front-facing camera and/or post-positioned pick-up head.When equipment 1200 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 1210 is configured to export and/or input audio signal.Such as, audio-frequency assembly 1210 comprises a microphone (MIC), and when device 1200 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal received can be stored in storer 1204 further or be sent via communications component 1216.In certain embodiments, audio-frequency assembly 1210 also comprises a loudspeaker, for output audio signal.
I/O interface 1212 is for providing interface between processing components 1202 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 1214 comprises one or more sensor, for providing the state estimation of various aspects for device 1200.Such as, sensor module 1214 can detect the opening/closing state of equipment 1200, the relative positioning of assembly, such as described assembly is display and the keypad of device 1200, the position of all right pick-up unit 1200 of sensor module 1214 or device 1200 assemblies changes, the presence or absence that user contacts with device 1200, the temperature variation of device 1200 orientation or acceleration/deceleration and device 1200.Sensor module 1214 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 1214 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 1214 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 1216 is configured to the communication being convenient to wired or wireless mode between device 1200 and other equipment.Device 1200 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communication component 1216 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communication component 1216 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1200 can be realized, for performing said method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the storer 1204 of instruction, above-mentioned instruction can perform said method by the processor 820 of device 1200.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
Those skilled in the art, at consideration instructions and after putting into practice disclosed herein disclosing, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Instructions and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (11)

1. the guard method of data in terminal device, is characterized in that, comprising:
When the wearable device bound being detected within the scope of the predeterminable range of terminal device, destination object is made to use;
When the wearable device bound described in not detecting within the scope of the predeterminable range at described terminal device, make described destination object unavailable;
Wherein, described destination object is the data in described terminal device, comprising: the application program in described terminal device, picture, video, audio frequency, log, contact person, chat record or other data contents.
2. the method for claim 1, is characterized in that,
Described when the wearable device bound being detected within the scope of the predeterminable range of terminal device, make destination object use, comprising:
When wearable device being detected within the scope of the predeterminable range at described terminal device, obtain the mark of the described wearable device that described wearable device sends;
Marking matched whether with the wearable device bound of the mark judging described wearable device;
When mark and the wearable device to have bound marking matched of described wearable device, described destination object is made to use.
3. method as claimed in claim 1 or 2, is characterized in that,
Describedly make described destination object unavailable, comprising: hide described destination object, make described destination object invisible; Describedly make described destination object use, comprising: show described destination object, make described destination object visible; Or
Describedly make described destination object unavailable, comprising: present the destination object being in encrypted state, wherein, described in be in encrypted state destination object encrypt with preset-key; Describedly make described destination object use, comprising: present the destination object being in decrypted state.
4. the method for claim 1, is characterized in that, described when the wearable device bound being detected within the scope of the predeterminable range of terminal device, makes destination object use, comprising:
When the wearable device bound being detected within the scope of the predeterminable range of described terminal device, the decruption key that the wearable device bound described in acquisition sends;
Utilize described decruption key to be decrypted the described destination object being in encrypted state, present the destination object being in decrypted state.
5. method as claimed in claim 4, is characterized in that, before the decruption key that the wearable device bound described in described acquisition sends, described method also comprises:
The specific local data that arranges receiving user's input is the instruction needing object of protection;
The encryption key that the wearable device bound described in acquisition provides;
Utilize described encryption key to be encrypted the described object of protection that needs, described in generation, be in the destination object of encrypted state.
6. the protective device of data in terminal device, is characterized in that, comprising:
First processing module, for when the wearable device bound being detected within the scope of the predeterminable range of terminal device, makes destination object use;
Second processing module, for when the wearable device bound described in not detecting within the scope of the predeterminable range at described terminal device, makes described destination object unavailable;
Wherein, described destination object is the data in described terminal device, comprising: the application program in described terminal device, picture, video, audio frequency, log, contact person, chat record or other data contents.
7. device as claimed in claim 6, is characterized in that,
Described first processing module comprises:
Mark obtains submodule, for when wearable device being detected within the scope of the predeterminable range at described terminal device, obtains the mark of the described wearable device that described wearable device sends;
Judge submodule, for marking matched whether with the wearable device bound of mark judging described wearable device;
First process submodule, for the mark that judges described wearable device when described judgement submodule and bound wearable device marking matched time, make described destination object use.
8. device as claimed in claims 6 or 7, is characterized in that,
Describedly make described destination object unavailable, comprising: hide described destination object, make described destination object invisible; Describedly make described destination object use, comprising: show described destination object, make described destination object visible; Or
Describedly make described destination object unavailable, comprising: present the destination object being in encrypted state, wherein, described in be in encrypted state destination object encrypt with preset-key; Describedly make described destination object use, comprising: present the destination object being in decrypted state.
9. device as claimed in claim 6, is characterized in that,
Described first processing module, comprising:
Key obtains submodule, during for the wearable device bound being detected within the scope of the predeterminable range of described terminal device, and the decruption key that the wearable device bound described in acquisition sends;
Second process submodule, is decrypted the described destination object being in encrypted state for the decruption key utilizing described key to obtain submodule acquisition, presents the destination object being in decrypted state.
10. device as claimed in claim 9, it is characterized in that, described device also comprises:
Command reception module is the instruction needing object of protection for receiving the specific local data that arranges of user's input;
Key Acquisition Module, the encryption key that the wearable device for having bound described in obtaining provides;
Object generation module, the encryption key obtained for utilizing described Key Acquisition Module is encrypted the described object of protection that needs, and is in the destination object of encrypted state described in generation.
The protective device of data in 11. 1 kinds of terminal devices, is characterized in that, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
When the wearable device bound being detected within the scope of the predeterminable range of terminal device, destination object is made to use;
When the wearable device bound described in not detecting within the scope of the predeterminable range at described terminal device, make described destination object unavailable;
Wherein, described destination object is the data in described terminal device, comprising: the application program in described terminal device, picture, video, audio frequency, log, contact person, chat record or other data contents.
CN201410594452.7A 2014-10-29 2014-10-29 Protection method and protection device for data of terminal equipment Pending CN104318177A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410594452.7A CN104318177A (en) 2014-10-29 2014-10-29 Protection method and protection device for data of terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410594452.7A CN104318177A (en) 2014-10-29 2014-10-29 Protection method and protection device for data of terminal equipment

Publications (1)

Publication Number Publication Date
CN104318177A true CN104318177A (en) 2015-01-28

Family

ID=52373408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410594452.7A Pending CN104318177A (en) 2014-10-29 2014-10-29 Protection method and protection device for data of terminal equipment

Country Status (1)

Country Link
CN (1) CN104318177A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105159105A (en) * 2015-08-13 2015-12-16 小米科技有限责任公司 Work method and device of intelligent electric appliance
CN105188016A (en) * 2015-08-11 2015-12-23 努比亚技术有限公司 Terminal privacy protection system and method
CN105430178A (en) * 2015-11-05 2016-03-23 上海斐讯数据通信技术有限公司 Wristband, mobile terminal and security information processing method and system thereof, and communication system
CN105787316A (en) * 2016-02-29 2016-07-20 联想(北京)有限公司 Information processing method and electronic device
CN105912942A (en) * 2016-06-13 2016-08-31 惠州Tcl移动通信有限公司 Mobile terminal image encryption and decryption processing method and system based on NFC
WO2016145890A1 (en) * 2015-09-22 2016-09-22 中兴通讯股份有限公司 Method and device of processing incoming call of terminal
WO2016165216A1 (en) * 2015-04-16 2016-10-20 中兴通讯股份有限公司 Method and device for switching terminal working environment and computer storage medium
CN106096341A (en) * 2016-06-15 2016-11-09 宇龙计算机通信科技(深圳)有限公司 A kind of data control method and device
WO2016177201A1 (en) * 2015-10-20 2016-11-10 中兴通讯股份有限公司 Method, terminal and wearable device for controlling privacy data
CN106293399A (en) * 2016-08-11 2017-01-04 北京小米移动软件有限公司 Control the method and device of mobile terminal
CN110929251A (en) * 2019-10-28 2020-03-27 维沃移动通信有限公司 Content control method and terminal equipment
CN111143586A (en) * 2019-08-09 2020-05-12 华为技术有限公司 Picture processing method and related device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102957787A (en) * 2011-08-24 2013-03-06 晨讯科技(沈阳)有限公司 Cellphone data protecting method
CN102955917A (en) * 2011-08-29 2013-03-06 联想(北京)有限公司 Method, device and equipment for protecting data
CN103164661A (en) * 2013-01-30 2013-06-19 北京忆捷信通科技有限公司 Device and method used for managing data in terminal
CN103473514A (en) * 2013-09-06 2013-12-25 宇龙计算机通信科技(深圳)有限公司 Data storage access method and device
CN103678993A (en) * 2013-11-26 2014-03-26 小米科技有限责任公司 Method and device controlling terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102957787A (en) * 2011-08-24 2013-03-06 晨讯科技(沈阳)有限公司 Cellphone data protecting method
CN102955917A (en) * 2011-08-29 2013-03-06 联想(北京)有限公司 Method, device and equipment for protecting data
CN103164661A (en) * 2013-01-30 2013-06-19 北京忆捷信通科技有限公司 Device and method used for managing data in terminal
CN103473514A (en) * 2013-09-06 2013-12-25 宇龙计算机通信科技(深圳)有限公司 Data storage access method and device
CN103678993A (en) * 2013-11-26 2014-03-26 小米科技有限责任公司 Method and device controlling terminal

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016165216A1 (en) * 2015-04-16 2016-10-20 中兴通讯股份有限公司 Method and device for switching terminal working environment and computer storage medium
CN106156576A (en) * 2015-04-16 2016-11-23 中兴通讯股份有限公司 Terminal works environment changing method and device
CN105188016A (en) * 2015-08-11 2015-12-23 努比亚技术有限公司 Terminal privacy protection system and method
CN105159105A (en) * 2015-08-13 2015-12-16 小米科技有限责任公司 Work method and device of intelligent electric appliance
CN106550103A (en) * 2015-09-22 2017-03-29 中兴通讯股份有限公司 The processing method and processing device of terminal caller
WO2016145890A1 (en) * 2015-09-22 2016-09-22 中兴通讯股份有限公司 Method and device of processing incoming call of terminal
CN106603805A (en) * 2015-10-20 2017-04-26 中兴通讯股份有限公司 Method of controlling private data, terminal, and wearable device
WO2016177201A1 (en) * 2015-10-20 2016-11-10 中兴通讯股份有限公司 Method, terminal and wearable device for controlling privacy data
CN105430178A (en) * 2015-11-05 2016-03-23 上海斐讯数据通信技术有限公司 Wristband, mobile terminal and security information processing method and system thereof, and communication system
CN105787316A (en) * 2016-02-29 2016-07-20 联想(北京)有限公司 Information processing method and electronic device
CN105912942A (en) * 2016-06-13 2016-08-31 惠州Tcl移动通信有限公司 Mobile terminal image encryption and decryption processing method and system based on NFC
CN106096341A (en) * 2016-06-15 2016-11-09 宇龙计算机通信科技(深圳)有限公司 A kind of data control method and device
CN106293399A (en) * 2016-08-11 2017-01-04 北京小米移动软件有限公司 Control the method and device of mobile terminal
CN111143586A (en) * 2019-08-09 2020-05-12 华为技术有限公司 Picture processing method and related device
CN111143586B (en) * 2019-08-09 2023-09-08 华为技术有限公司 Picture processing method and related device
CN110929251A (en) * 2019-10-28 2020-03-27 维沃移动通信有限公司 Content control method and terminal equipment

Similar Documents

Publication Publication Date Title
CN104318177A (en) Protection method and protection device for data of terminal equipment
EP3001640B1 (en) Secure information exchange methods and wearable device
CN103916233B (en) A kind of information ciphering method and device
KR101733072B1 (en) Method and apparatus for processing surveillance video, program and recording medium
CN104219058B (en) Authentication, identification authorization method and device
CN104852911B (en) Safe verification method, apparatus and system
WO2016050037A1 (en) Operation authorization method and device
CN108964903B (en) Password storage method and device
CN106453052B (en) Message interaction method and device
CN104125055A (en) Encryption and decryption method and electronic device
CN103914634A (en) Image encryption method, image encryption device and electronic device
CN104834878A (en) Terminal information display method and device
CN104715337A (en) Attendance method, and attendance management method and device
CN110765434A (en) Identity authentication method and device, electronic equipment and storage medium
CN105468767A (en) Method and device for acquiring calling card information
WO2020233218A1 (en) Information encryption method, information decryption method, and terminal
CN105471814A (en) Account number management method and account number management device
CN103914541A (en) Information search method and device
CN105117101A (en) Application display method and apparatus
CN105306716A (en) Data processing method, device and system
CN105681365B (en) Method and apparatus for file transmission
CN106060098A (en) Processing method, processing device and processing system for verification codes
CN104182697B (en) File encrypting method and device
WO2016145624A1 (en) Information processing method and mobile terminal
CN105681261A (en) Security authentication method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150128

RJ01 Rejection of invention patent application after publication