Invention content
The application can join target mainly solving the technical problems that a kind of realization method for secret protection of offer and device
It is that the different types of private data of people is voluntarily protected, and simple to operate.
In order to solve the above technical problems, the application first aspect provides a kind of realization method for secret protection, the method packet
It includes:According to user input instruction, the data type of the target private data of pre- protection object contact person is obtained;According to the target
The characteristic of contact person, search match with the characteristic and belong to the target private data of the data type, wherein
The characteristic is identifying the target private data of the object contact person;Secrecy is carried out to the target private data to set
It sets.
With reference to first aspect, in the first possible embodiment of first aspect of the embodiment of the present invention, the characteristic
According to type include the name of object contact person, face feature, voiceprint at least one.
The first possible embodiment with reference to first aspect, second of possible reality of first aspect of the embodiment of the present invention
It applies in mode, the characteristic according to the object contact person, search matches with the characteristic and belongs to the number
According to type target private data the step of before, further include:Obtain the characteristic of the object contact person, wherein described
Characteristic acquires and is stored in local in advance;Or according to user input instruction, the spy of object contact person described in instantaneous acquiring
Levy data.
Second of possible embodiment with reference to first aspect, the third possible reality of first aspect of the embodiment of the present invention
It applies in mode, described according to user input instruction, the step of characteristic of object contact person described in instantaneous acquiring includes:Work as institute
When the type for stating characteristic includes face feature, the personal images by obtaining the object contact person are gone forward side by side the inspection of pedestrian's face
It surveys, to obtain the face feature of the object contact person from the personal images as characteristic, when the characteristic
Type when including voiceprint, then acquire the voiceprint of the object contact person as characteristic;When the characteristic
According to type include name when, acquire the name information of the object contact person as characteristic.
First with reference to first aspect is to any possible embodiment of third, and the of first aspect of the embodiment of the present invention
In four kinds of possible embodiments, described search matches with the characteristic and belongs to the target privacy number of the data type
According to the step of specifically include:When the name that the classification of the characteristic is the object contact person, and the data type category
When text information class, the name comprising the object contact person is searched in local and belongs to the word letter of the data type
Breath is used as the target private data;It is and described when the face feature that the classification of the characteristic is the object contact person
When data type belongs to image class, using face recognition technology, is searched in local containing the face feature and belong to described
The image data of data type is as the target private data;When the classification of the characteristic is the object contact person
Voiceprint, the and when data type belongs to audio class, using sound groove recognition technology in e, in local search contain the vocal print
Information and belong to the audio related data of the data type as the target private data.
With reference to first aspect or first to fourth any possible embodiment of first aspect, the embodiment of the present invention
In 5th kind of possible embodiment of one side, described the step of carrying out secrecy setting to the target private data, specifically wraps
It includes:The target private data is encrypted, hidden or is isolated.
With reference to first aspect or first to the 5th any possible embodiment of first aspect, the embodiment of the present invention
In 6th kind of possible embodiment of one side, the method further includes:If detecting new deposit data and the feature
Data Matching and belong to the data type, then carries out secrecy setting using the data as target private data.
With reference to first aspect or first to the 6th any possible embodiment of first aspect, the embodiment of the present invention
In 7th kind of possible embodiment of one side, the method further includes:If the encrypted message for receiving user is default close
Code information, then show the target private data;And/or if the recovery private data for receiving user instructs, and verification is used
The encrypted message at family is preset password information, then cancelling the secrecy to the target private data is arranged.
In order to solve the above-mentioned technical problem, the application second aspect provides a kind of realization privacy protection device, described device
There is the information of object contact person, described device includes acquisition module, search module and protection module;The acquisition module is used for
According to user input instruction, the data type of the target private data of pre- protection object contact person is obtained, and by the data class
Type is sent to described search module;Described search module is used for according to the characteristic of the object contact person, search with it is described
Characteristic matches and belongs to the target private data of the data type, and the target private data is sent to the guarantor
Protect module, wherein the characteristic is identifying the target private data of the object contact person;The protection module is used for
Secrecy setting is carried out to the target private data.
In conjunction with second aspect, in the first possible embodiment of second aspect of the embodiment of the present invention, the characteristic
According to type include the name of object contact person, face feature, voiceprint at least one.
In conjunction with the first possible embodiment of second aspect, second of second aspect of the embodiment of the present invention is possible
In embodiment, search module includes acquiring unit, and the acquiring unit is used to obtain the characteristic of the object contact person,
Wherein, the characteristic acquires and is stored in local in advance;Or according to user input instruction, target connection described in instantaneous acquiring
It is the characteristic of people.
In conjunction with second of possible embodiment of second aspect, the third of second aspect of the embodiment of the present invention is possible
In embodiment, the acquiring unit passes through acquisition also particularly useful for when the type of the characteristic includes face feature
The personal images of the object contact person simultaneously carry out Face datection, to obtain the object contact person from the personal images
Face feature then acquires the object contact person as characteristic when the type of the characteristic includes voiceprint
Voiceprint as characteristic;When the type of the characteristic includes name, the surname of the object contact person is acquired
Name information is as characteristic.
In conjunction with second aspect or second aspect first to any possible embodiment of third, the embodiment of the present invention
In 4th kind of possible embodiment of two aspects, described search module includes name search unit, face's search unit and sound
Line search unit;The name search unit is used for when the name that the classification of the characteristic is the object contact person, and
When the data type belongs to text information class, the name comprising the object contact person is searched in local and belongs to the number
According to the text information of type as the target private data;Face's search unit is used for the classification when the characteristic
For the face feature of the object contact person, and when the data type belongs to image class, using face recognition technology, in local
Middle search contains the face feature and belongs to the image data of the data type as the target private data;The sound
Line search unit is used for when the voiceprint that the classification of the characteristic is the object contact person, and the data type category
When audio class, using sound groove recognition technology in e, is searched for containing the voiceprint in local and belong to the data type
Audio related data is as the target private data.
In conjunction with second aspect or first to fourth any possible embodiment of second aspect, the embodiment of the present invention
In 5th kind of possible embodiment of two aspects, the protection module is specifically used for adding the target private data
Close, hiding or isolation.
In conjunction with second aspect or first to the 5th any possible embodiment of second aspect, the embodiment of the present invention
In 6th kind of possible embodiment of two aspects, described device further includes detection module, and the detection module is for detecting
When being matched to new deposit data with the characteristic and belonging to the data type, using the data as target private data
Secrecy setting is carried out, and the protection module is sent to using the data as target private data, to be carried out to the data
Secrecy setting.
In conjunction with second aspect or first to the 6th any possible embodiment of second aspect, the embodiment of the present invention
In 7th kind of possible embodiment of two aspects, described device further includes display module, and the display module is for receiving
When the encrypted message of user is preset password information, the target private data is shown;And/or described device further includes restoring mould
Block, the recovery module is used in the recovery private data instruction for receiving user, and the encrypted message for verifying user is default
When encrypted message, the secrecy is cancelled to the target private data and is arranged
In order to solve the above-mentioned technical problem, the application third aspect provides a kind of mobile terminal, and the mobile terminal is at least
Including processor, first memory, second memory and bus, the processor is stored with described first respectively by bus
Device, second memory connection, wherein the first memory is used to store the computer instruction that the processor executes, described
Second memory is for storing object contact person information;
The processor is used to execute the computer instruction of first memory storage, with according to user input instruction,
The data type for obtaining the target private data of pre- protection object contact person, according to the characteristic of the object contact person, from
Search matches with the characteristic and belongs to the target private data of the data type in second memory, and to the mesh
Mark private data carries out secrecy setting, wherein the characteristic is identifying the target private data of the object contact person.
In conjunction with the third aspect, in the first possible embodiment of the third aspect of the embodiment of the present invention, the characteristic
According to type include the name of object contact person, face feature, voiceprint at least one.
In conjunction with a kind of possible embodiment of the third aspect, second of possible reality of the third aspect of the embodiment of the present invention
It applies in mode, the processor is additionally operable to execute the computer instruction of the first memory, to be obtained from second memory
The characteristic of the object contact person, wherein the characteristic acquires and is stored in local in advance;Or it is defeated according to user
Enter instruction, acquires the characteristic of the object contact person from second memory immediately.
In conjunction with second of embodiment of the third aspect, the third possible embodiment party of the third aspect of the embodiment of the present invention
In formula, the processor is additionally operable to execute the computer instruction of the first memory, with when the type packet of the characteristic
When including face feature, by obtaining the personal images of the object contact person and carrying out Face datection, with from the personal images
The middle face feature for obtaining the object contact person is as characteristic, when the type of the characteristic includes voiceprint
When, then the voiceprint of the object contact person is acquired as characteristic;When the type of the characteristic includes name,
The name information of the object contact person is acquired as characteristic.
In conjunction with the third aspect first to any possible embodiment of third, the 4th kind of third aspect present invention can
In the embodiment of energy, the processor is additionally operable to execute the computer instruction of the first memory, to work as the characteristic
According to classification be the object contact person name, and the data type be text information when, searched in second memory
Including the name of the object contact person and belonging to the text information of the data type as the target private data;Work as institute
State characteristic classification be the object contact person face feature, and the data type be image data when, utilize people
Face identification technology searches for the image data conduct for containing the face feature and belonging to the data type in second memory
The target private data;When the voiceprint that the classification of the characteristic is the object contact person, and the data class
When type is audio data, using sound groove recognition technology in e, is searched in second memory containing the voiceprint and belong to described
The audio related data of data type is as the target private data.
In conjunction with the third aspect or first to fourth any possible embodiment of the third aspect, third party of the present invention
In the 5th kind of possible embodiment in face, the processor is additionally operable to execute the computer instruction of the first memory, with
The target private data is encrypted, hidden or is isolated.
In conjunction with the third aspect or first to the 5th any possible embodiment of the third aspect, third party of the present invention
In the 6th kind of possible embodiment in face, the processor is additionally operable to execute the computer instruction of the first memory, with
Detecting that second memory is newly stored in data and matched with the characteristic and when belonging to the data type, by the data
Secrecy setting is carried out as target private data.
In conjunction with the third aspect or first to the 6th any possible embodiment of the third aspect, third party of the present invention
In the 7th kind of possible embodiment in face, the processor is additionally operable to execute the computer instruction of the first memory, with
When the encrypted message for receiving user is preset password information, the target private data is shown;And/or receiving user's
When the encrypted message for restoring private data instruction, and verifying user is preset password information, the target private data is cancelled
The secrecy setting.
Through the above scheme, the personal characteristics of the application combining target contact person, by the individual for obtaining object contact person
Feature, and be identified using personal characteristics identification technology, the target private data of the object contact person is searched out, is realized
To the automatic protection of the target private data of object contact person, moreover, by the different personal characteristics of contact person, it can be achieved that same
When search out different types of private data and make secrecy setting, it is simple to operate.
Specific implementation mode
It is illustrated below in conjunction with the accompanying drawings with specific embodiment.
Referring to Fig. 1, Fig. 1 is the flow chart that the application realizes one embodiment of method for secret protection.In present embodiment,
Realize that method for secret protection includes the following steps:
Step S101:Mobile terminal obtains the target private data of pre- protection object contact person according to user input instruction
Data type.
List of being related is being locally stored in mobile terminal, and is provided with and is connect to different types of data setting secret protection
Mouthful.When user is inputted by the interface and the instruction of secret protection is arranged at least one data type, mobile terminal will be used
The contact person that family is chosen, according to instruction input by user, obtains the object contact person as pre- protection object contact person
Data type of target private data, such as image type, text information type, audio types, video type etc..
Step S102:Mobile terminal is searched for and is matched with the characteristic according to the characteristic of the object contact person
And belong to the target private data of the data type, wherein the characteristic is identifying the mesh of the object contact person
Mark private data.
After the data type for obtaining target private data, the characteristic of acquisition for mobile terminal object contact person, for example,
Name, face feature, voiceprint of object contact person etc. are identifying the target private data of the object contact person.Its
In, the characteristic of the object contact person can be to acquire and be stored in local in advance, alternatively, believing immediately from object contact person
The characteristic acquired in breath.
Mobile terminal is searched out to match and belong to the characteristic in local and be obtained according to the characteristic got
The target private data of the data type taken.For example, the data type of acquisition for mobile terminal is image, then join according at least to target
It is the face feature and/or name of people, searches out in the face feature comprising object contact person and/or title and contacted comprising target
The image of people's name is as target private data.
Step S103:Mobile terminal carries out secrecy setting to the target private data.
The target private data searched out is carried out secrecy setting by mobile terminal, for example, using data encryption technology, hiding
Technology or isolation technology setting privacy maintain secrecy, so that mobile terminal is obtaining password authentification or entering the system of higher level
When, just show the target private data.
In present embodiment, mobile terminal carries before the target private data to searching out executes secret protection to user
For password, interface is set.After the good password of user setting, the password that is set described in acquisition for mobile terminal as reference default
Encrypted message.When user needs to check target private data, mobile terminal carries out password authentification, if it is determined that input by user
Encrypted message is consistent with the preset password information, then password authentification passes through, to user's display target private data, otherwise, no
It shows.Wherein, encrypted message used by the application can be preset characters string, preset pattern, finger print information, iris letter
Breath, voiceprint etc. arbitrarily can be used as the information of identification.Correspondingly, password authentification can be used corresponding identification technology such as fingerprint and know
Not, iris recognition technology etc..
Referring to Fig. 2, Fig. 2 is the flow chart that the application realizes another embodiment of method for secret protection.Present embodiment
In, realize that method for secret protection includes the following steps:
Step S201:Mobile terminal obtains the target private data of pre- protection object contact person according to user input instruction
Data type.
Mobile terminal is provided with the interface for different types of data being arranged secret protection.It is inputted by the interface in user
When the instruction of secret protection is arranged at least one data type, the contact person that mobile terminal chooses user is as pre- protection mesh
Contact person is marked, and according to instruction input by user, obtains the data type of the target private data of the object contact person, such as
Image type, text information type, audio types, video type etc..
Specifically, mobile terminal is provided with the interface for different types of data being arranged secret protection in man-machine interface, such as wraps
It includes and secret protection is arranged to the communication information, image information, acoustic information, video information, all information etc..Accordingly, it is obtaining
To it is input by user to object contact person setting the communication information protect instruction when, acquisition for mobile terminal message registration, short message etc.
Data type of the text information type as target private data.It is input by user to object contact person setting image getting
When the instruction of information protection, data type of the acquisition for mobile terminal image type as target private data.Getting user
When the instruction of input protected to object contact person setting acoustic information, acquisition for mobile terminal audio types are as target privacy number
According to data type.When getting the instruction input by user protected to object contact person setting video information, mobile terminal
Obtain the data type of image and audio types as target private data.Input by user object contact person is set getting
When setting the instruction of all information protections, i.e., to all information related with the object contact person in local, such as message registration, short
Breath, memorandum, calendar, image, audio, video etc. carry out secret protection, all text informations of acquisition for mobile terminal, image, sound
Data type of the frequency type as target private data.
Step S202:The characteristic of object contact person described in acquisition for mobile terminal.
Mobile terminal is provided with the interface of the characteristic of acquisition object contact person in advance, is set by the interface in user
When setting advance acquisition characteristics data, mobile terminal acquires the name of object contact person, face spy from the information of object contact person
Sign, voiceprint it is at least one to identify the private data of object contact person, and as characteristic be stored in it is mobile eventually
In the preset path at end.Whether mobile terminal judges pre- in the preset path when obtaining user's input secret protection instruction
There is the characteristic, if so, then mobile terminal directly acquires the characteristic to prestore, if it is not, mobile
The characteristic of object contact person described in terminal-pair carries out instantaneous acquiring.Certainly, in other embodiments, mobile terminal also may be used
It is set as, when obtaining user's input secret protection instruction, directly adopting the characteristic of the object contact person immediately
Collection.
Mobile terminal is acquired the characteristic of the object contact person and is specifically described, mobile terminal acquisition
The name of object contact person, face-image, voiceprint at least one as characteristic, wherein the characteristic of acquisition
With target private data type matching, to identify the target private data.For example, if the data type includes word letter
Type is ceased, then at least acquisition object contact person name is as characteristic, if the data type includes image class, at least
The face feature of acquisition object contact person at least obtains mesh as characteristic if the data type includes audio class
The voiceprint of contact person is marked as characteristic.Certainly, mobile whole if the data type is image class or audio class
End can also acquire the name of object contact person as characteristic, so that it includes the object contact person name to search out title
Image class or audio related data.It should be noted that in other embodiments, the feature data types of the acquisition also can be by
User is configured by the interface that mobile terminal provides, therefore the application is not especially limited the acquisition of feature data types.
Further specifically, when being acquired characteristic, if the type of the characteristic of required acquisition includes surname
Name, then mobile terminal acquires the name information of the object contact person as characteristic from contact list information.
If the feature data types of required acquisition include face feature, mobile terminal is obtained from contact list information
It takes the personal images of object contact person and carries out Face datection, if the personal images can accurately obtain face characteristic,
Characteristic of the face characteristic as object contact person is obtained from the personal images.If personal images cannot be obtained accurately
The personal images of object contact person can not be got in face characteristic or contact list information, mobile terminal then prompts user
Face-image failure is obtained, i.e. mobile terminal can not carry out secret protection according to face feature.In other optimal enforcement examples, move
Dynamic terminal from contact list information when obtaining the failure of contact person's face feature, from the third party's communication software being locally stored
In contact data, such as third party's social network services(Social Networking Services, abbreviation SNS), microblogging,
Wechat obtains the face characteristic of the object contact person.Alternatively, network acquisition, which can also be used, in mobile terminal is stored in remote service
The face characteristic of object contact person in device.In addition, when mobile terminal obtains face characteristic failure through the above way, can also carry
Show that user takes pictures to the object contact person using camera, or prompt user schemes the face of the object contact person
As being uploaded under local preset path, mobile terminal after the completion of user uploads, go forward side by side from preset path by acquisition face image
Row identification is to obtain face feature.Therefore the specific steps for acquiring face characteristic to mobile terminal at this do not define.
If the feature data types of required acquisition include voiceprint, mobile terminal monitors making a return journey for object contact person
Electricity judges whether the call meets preset voiceprint extraction condition when user and object contact person converse next time,
For example, call environment level of noise whether is less than default level of noise or whether the duration of call is more than preset duration value, if so,
Then meet voiceprint extraction condition.The default voiceprint extraction condition can be configured by user or is arranged by system default.
When the call meets preset voiceprint extraction condition, mobile terminal acquires the voiceprint of object contact person as characteristic
According to, and cease listening for the incoming/sending call of object contact person.It is described call do not meet default voiceprint extraction condition when, mobile terminal after
The continuous incoming/sending call for monitoring object contact person, and when user and object contact person are conversed next time, judge that the call is
It is no to meet preset voiceprint extraction condition, when the call listened to meets the voiceprint extraction condition, mobile terminal acquisition
The voiceprint of object contact person ceases listening for the incoming/sending call of the object contact person as characteristic.It needs to illustrate
Be, before mobile terminal collects object contact person voiceprint, mobile terminal can not according to the voiceprint of contact person into
Row secret protection.Certainly, in other embodiments, mobile terminal prompts user to utilize wheat in user setting secret protection
The voice-input devices such as gram wind obtain the sound of object contact person, to acquire the voiceprint of object contact person.Alternatively, mobile whole
End prompt user will only include that the audio file of sound of object contact person is uploaded under local preset path, mobile terminal with
After the completion of family uploads, from the voiceprint obtained in preset path in audio file.
Step S203:When the name that the classification of the characteristic is object contact person, and the data type belongs to text
When word info class, mobile terminal searches for the name comprising object contact person in local and belongs to the word letter of the data type
Breath is used as target private data.
For example, when the target private data that user protects in advance is the communication information, i.e. acquisition for mobile terminal object contact person
Name goes out in title or content the communication information for including object contact person name, Tathagata in local search as characteristic
It is recorded from the message registration and short message of object contact person etc., using as target private data.
Step S204:When the face feature that the classification of the characteristic is the object contact person, and the data class
When type belongs to image class, mobile terminal utilizes face recognition technology, is searched for containing the face feature in local and belongs to institute
The image data of data type is stated as the target private data.
For example, when the target private data that user protects in advance is image, the face of acquisition for mobile terminal object contact person
Feature is as characteristic, using face recognition technology, goes out the image of the face feature containing object contact person in local search
Data, using as target private data.
Wherein, recognition of face is to compare the technology that face visual signature information carries out identity discriminating using analysis.Specifically, it moves
Dynamic terminal-pair local image carries out Face datection, wherein mobile terminal is using reference template method, face rule method, sample study
The one of which of method, complexion model method, sub-face of feature method etc. in summary several carries out Face datection.Mobile terminal is examined
It measures using feature vector method, face line template etc. that the face detected and mobile terminal is collected after the face in image
Contact person's face feature carries out face comparison, if the face detected is matched with contact person's face feature, it is determined that institute
It is target private data to state image.
Above-mentioned human face detection tech is illustrated:1)Reference template method:Mobile terminal designs one or several marks first
Then the template of quasi- face calculates the matching degree between the sample and standard form of test acquisition, and is judged by threshold value
With the presence or absence of face;2)Face rule method:Since there is face certain structure distribution feature, mobile terminal to extract these features
Corresponding rule is generated to judge whether test sample includes face;3)Sample learning method:Use artificial god in pattern-recognition
Method through network, mobile terminal is by opposite as sample sets and non-face as the study of sample sets generates grader;4)Colour of skin mould
Type method:Mobile terminal is distributed the rule of Relatively centralized to be detected according to the looks colour of skin in color space;5)Sub-face of feature
Method:All image surface set are considered as an image surface subspace by mobile terminal, and based on detection sample and its projection between sub-aperture
The distance between judge whether image surface.Since face detection is the prior art, specific implementation please refers to related face
Portion's identification technology data, does not elaborate herein.
Step S205:When the voiceprint that the classification of the characteristic is the object contact person, and the data class
When type belongs to audio class, mobile terminal utilizes sound groove recognition technology in e, is searched for containing the voiceprint in local and belongs to institute
The audio data of data type is stated as target private data.
For example, when the target private data that user protects in advance is acoustic information, acquisition for mobile terminal object contact person
Voiceprint utilizes sound groove recognition technology in e, goes out containing the object contact person in local search as characteristic, mobile terminal
The audio data of voiceprint, using as target private data.
Specifically, Application on Voiceprint Recognition refers to according to human physiology is spoken in reflection in speech waveform and behavioural characteristic is that speaker is peculiar
Speech parameter, speaker is identified according to the speech parameter.The sound in audio in acquisition for mobile terminal local, extraction
Vocal print feature compares the vocal print feature with the contact person's voiceprint acquired before, if the vocal print feature and contact person
Voiceprint matches, then using the audio data as private data.Since sound groove recognition technology in e is the prior art, specific implementation
Related sound groove recognition technology in e data is please referred to, is not elaborated herein.
Step S206:Mobile terminal is encrypted, hides or is isolated to the target private data.
Mobile terminal is matched to what is searched out with the characteristic got, and the target for belonging to pre- protection data type is hidden
Private data carry out data encryption, hide or be isolated, to carry out privacy secrecy setting to target private data.Optimally, mobile
Terminal shows the target private data, and prompt the user whether after searching out target private data in man-machine interface
Secret protection is carried out, when getting determining secret protection instruction input by user, mobile terminal selects user to carry out privacy
The target private data of secrecy carries out secret protection.In present embodiment, mobile terminal uses general standard encryption algorithms, such as
Target private data is encrypted in the AES128/256 realizations of international standard symmetric encipherment algorithm so that target private data is in
Can not read states, and when obtaining password authentification, mobile terminal normally shows the target private data.
In another embodiment, mobile terminal carries out secret protection using concealing technology to target private data.Specifically,
The target private data searched out is moved to from original storing directory in default file folder by mobile terminal, and to described pre-
If permission is arranged in file or mobile terminal directly carries out the target private data searched out under original storing directory
Priority assignation so that permission cannot be pressed from both sides or be directly arranged to all applications in mobile terminal to the default file of the setting permission
Target private data access, and guard mode is presented on man-machine interface is shown, needs to check the target in user
When private data, carry out password authentification, and password authentification by when, mobile terminal temporarily obtains permission to show the target
Private data.
Alternatively, isolation technology can also be used in mobile terminal carries out secret protection to target private data.Specifically, mobile terminal
Partial memory area domain is isolated, and the target private data searched out is moved to the storage of isolation from original storing directory
Region, wherein the storage region of isolation is the region that cannot access of application in system, user when checking the storage region,
Need password authentification.When mobile terminal is multisystem such as double OS systems, also target private data can be isolated to security level
In high system environments.Mobile terminal can not access the target privacy in high-level system when in low security level system
Data, when entering high security level system environments, the normal display target private data of mobile terminal.
It should be noted that mobile terminal can select above-mentioned secret protection mode by system default, privacy can be also provided
Interface is arranged in protected mode, for user's selecting to secret protection mode.In addition, the application mobile terminal is hidden to target
The mode that private data carry out secret protection is also not limited to above-mentioned data encryption, hides and be isolated, other protection sides also can be used
Formula is not construed as limiting secret protection mode at this.
Step S207:If detecting that new deposit data match with the characteristic and belong to the data type,
The data are carried out secrecy setting by mobile terminal.
Mobile terminal to target private data during carrying out secret protection, if detecting that mobile terminal is locally newly deposited
Enter data, is then judged whether to match with the characteristic of object contact person to being newly stored in data, and it is hidden whether to belong to target
The data type of private data, if being newly stored in data and the contact feature Data Matching and belonging to the data type,
Data encryption is carried out using the data as target private data, hides or is isolated.
For example, mobile terminal hides the communication information of object contact person according to user input instruction.Mobile terminal exists
During carrying out secret protection, if there is new message registration or short message record, then pass through the characteristic of object contact person
Such as name, judge the message registration either short message record whether from the object contact person or the short message content whether
Including object contact person name, if it is, the message registration or short message record are hidden.In addition, not fetched having
If mobile terminal judges that the missed call or unread short messages are contacted from the target when electric either unread short messages
People, then mobile terminal man-machine interface prompt user have missed call or unread short messages when, do not show the caller or come
Letter person, and when passing through password authentification, mobile terminal shows the information of missed call or the content of unread short messages.
Step S208:If the encrypted message for receiving user is preset password information, mobile terminal shows the target
Private data.
When in secret protection state, the abnormal display target private data of mobile terminal.Mobile terminal is arranged
Have the interface for checking the target private data, in user by the interface to check target private data when, mobile terminal
Preset interface for password input is provided a user, is the close of user preset in the encrypted message that verification user inputs at the interface
When code information, then password authentification passes through, and mobile terminal shows the private data.
Step S209:If receiving the recovery private data instruction of user, and the encrypted message for verifying user is default
Encrypted message, then mobile terminal is to the target private data cancellation secrecy setting.
When carrying out secret protection to object contact person, mobile terminal is provided with restores private data to object contact person
Interface.If user restores private data instruction in the interface input for restoring private data, mobile terminal is carried to user
For interface for password input, believe for preset password getting encrypted message input by user and verifying the encrypted message of the acquisition
When breath, mobile terminal is cancelled the secrecy to target private data and is arranged.For example, to by the target privacy number of carry out data encryption
According to then mobile terminal permanently decrypts the target private data, so that all with can be directly viewable the privacy number per family
According to.To the target private data for being hidden or being isolated, mobile terminal being hidden to the target private data or
When isolation, the original storing path of the target private data is identified.When executing private data recovery, mobile terminal will be described
Target private data is respectively moved to the path preserved originally under preset path according to the storing path of mark.
The personal characteristics of present embodiment combining target contact person by obtaining the personal characteristics of object contact person, and is adopted
It is identified with personal characteristics identification technology, searches out the target private data of the object contact person, realized and target is joined
It is the automatic protection of the target private data of people, moreover, by the different personal characteristics of contact person, it can be achieved that simultaneously scanning for out
Different types of private data simultaneously makes secrecy setting, simple to operate.
Referring to Fig. 3, Fig. 3 is the structural schematic diagram that the application realizes one embodiment of privacy protection device.This embodiment party
In formula, realize that privacy protection device has the information of object contact person, including acquisition module 310, search module 320 and protection mould
Block 330.Wherein,
Acquisition module 310 is used to obtain the target private data of pre- protection object contact person according to user input instruction
Data type, and the data type is sent to described search module 320.
In present embodiment, realize that list of being related is locally stored in privacy protection device, and be provided with to different data
The interface of secret protection is arranged in type.It is inputted by the interface in user and secret protection is arranged at least one data type
When instruction, the contact person that acquisition module 310 chooses user protects object contact person as pre-, and according to finger input by user
It enables, obtains the data type of the target private data of the object contact person, such as image type, text information type, audio
Type, video type etc..
Search module 320 is used for according to the characteristic of the object contact person, search matched with the characteristic and
Belong to the target private data of the data type, and the target private data be sent to the protection module 330,
In, the characteristic is identifying the target private data of the object contact person.
After the data type for obtaining target private data, search module 320 obtains the characteristic of object contact person, example
Such as, name, face feature, voiceprint of object contact person etc. are identifying the target private data of the object contact person.
Wherein, the characteristic of the object contact person can be to acquire and be stored in local in advance, alternatively, immediately from object contact person
The characteristic acquired in information.
Search module 320 searches out in local according to the characteristic got and matches and belong to the characteristic
In the target private data of the data type of acquisition.For example, the data type that search module 320 obtains is image, then at least root
According to the face feature and/or name of object contact person, searches out in face feature and/or title comprising object contact person and include
The image of object contact person name is as target private data.
Protection module 330 to the target private data for carrying out secrecy setting.The mesh that protection module 330 will search out
Mark private data carries out secrecy setting, for example, maintained secrecy using data encryption technology, concealing technology or isolation technology setting privacy,
So that described realize that privacy protection device when obtaining password authentification or entering the system of higher level, just shows the target
Private data.
In present embodiment, protection module 330 is before the target private data to searching out executes secret protection, to user
Password is provided, interface is set.After the good password of user setting, protection module 330 obtains the password set as reference
Preset password information.When user needs to check target private data, protection module 330 carries out password authentification, is judging user
When the encrypted message of input is consistent with the preset password information, then password authentification passes through, and protection module 330 shows mesh to user
Otherwise mark private data is not shown.Wherein, encrypted message used by the application can be preset characters string, default figure
Shape, finger print information, iris information, voiceprint etc. arbitrarily can be used as the information of identification.Correspondingly, correspondence can be used in password authentification
Identification technology such as fingerprint recognition, iris recognition technology etc..
Referring to Fig. 4, Fig. 4 is the structural schematic diagram that the application realizes another embodiment of privacy protection device.This implementation
In mode, realize that privacy protection device has object contact person information, including acquisition module 410, search module 420, protection mould
Block 430, detection module 440, display module 450 and recovery module 460.Wherein, search module 420 includes name search unit
421, face's search unit 422, vocal print search unit 423 and acquiring unit 424.
Acquisition module 410 is used to obtain the target private data of pre- protection object contact person according to user input instruction
Data type, and the data type is sent to search module 420.
Acquisition module 410 is provided with the interface for different types of data being arranged secret protection.Pass through the interface in user
When inputting the instruction to the setting secret protection of at least one data type, the contact person that 410 user of acquisition module chooses is as pre-
Object contact person is protected, and according to instruction input by user, obtains the data class of the target private data of the object contact person
Type, such as image type, text information type, audio types, video type etc..
Specifically, described to realize that privacy protection device is provided with the interface for different types of data being arranged secret protection, such as
Including secret protection is arranged to the communication information, image information, acoustic information, video information, all information etc..Accordingly, it is obtaining
When getting the instruction input by user protected to the object contact person setting communication information, acquisition module 410 obtains message registration, short
The data types of the text informations type as target private data such as letter.It is input by user to object contact person setting getting
When the instruction of image information protection, acquisition module 410 obtains data type of the image type as target private data.It is obtaining
To when the instruction input by user protected to object contact person setting acoustic information, acquisition module 410 obtains audio types conduct
The data type of target private data.Getting the instruction input by user protected to object contact person setting video information
When, acquisition module 410 obtains the data type of image and audio types as target private data.It is input by user getting
When the instruction of all information protections is arranged to object contact person, i.e., to all letters related with the object contact person in local
Breath, such as message registration, short breath, memorandum, calendar, image, audio, video carry out secret protection, and acquisition module 410 obtains institute
There is the data type of text information, image, audio types as target private data.
Acquiring unit 424 is used to obtain the characteristic of the object contact person, and the characteristic is sent to institute
State name search unit 421, face's search unit 422 or vocal print search unit 423.
The interface realized privacy protection device and be provided with the characteristic of acquisition object contact person in advance is logical in user
When crossing the advance acquisition characteristics data of interface setting, acquiring unit 424 acquires target contact from the information of object contact person
The name of people, face feature, voiceprint it is at least one to identify the private data of object contact person, and as characteristic
According to being stored in preset path.When obtaining user's input secret protection instruction, acquiring unit 424 judges in the preset path
The characteristic whether is prestored, and when prestoring the characteristic of the object contact person, directly acquires described prestore
Characteristic;In the characteristic of the object contact person that do not prestore, to the characteristic of the object contact person
According to progress instantaneous acquiring.Certainly, in other embodiments, acquiring unit can also be used for referring in acquisition user's input secret protection
When enabling, instantaneous acquiring directly is carried out to the characteristic of the object contact person.
Acquiring unit 424 is acquired the characteristic of the object contact person and is specifically described, acquiring unit
The 424 acquisition names of object contact persons, face-image, voiceprint at least one as characteristic, wherein the spy of acquisition
Data and target private data type matching are levied, to identify the target private data.For example, including text in the data type
When word information type, at least acquisition object contact person name is as characteristic, when the data type includes image class, until
The face feature of acquisition object contact person at least obtains mesh as characteristic when the data type includes audio class less
The voiceprint of contact person is marked as characteristic.Certainly, it when the data type is image class or audio class, obtains single
Member 424 can also acquire the name of object contact person as characteristic, so that it includes the object contact person surname to search out title
The image class or audio related data of name.It should be noted that in other embodiments, the feature data types of the acquisition
It can be configured by the interface that the realization privacy protection device provides by user, therefore the application adopts feature data types
Collection is not especially limited.
During acquiring unit 424 is acquired, when the type of the characteristic of required acquisition includes name, obtain single
Member 424 acquires the name information of the object contact person as characteristic from contact list information.
When the feature data types of required acquisition include face feature, acquiring unit 424 is from contact list information
It obtains the personal images of object contact person and carries out Face datection, when the personal images accurately can obtain face characteristic,
Characteristic of the face characteristic as object contact person is obtained from the personal images.People cannot be accurately obtained in personal images
When can not get the personal images of object contact person in face feature or contact list information, the prompt of acquiring unit 424 is used
Family obtains face-image failure, that is, realizes that privacy protection device can not carry out secret protection according to face feature.In other optimizations
In embodiment, acquiring unit from contact list information when obtaining the failure of contact person's face feature, from the third being locally stored
In the contact data of square communication software, such as third party SNS, microblogging, wechat, the face characteristic of the object contact person is obtained.
Alternatively, network, which can also be used, in acquiring unit obtains the face characteristic for being stored in the object contact person in remote server.In addition, obtaining
When unit being taken to obtain face characteristic failure through the above way, also user can be prompted to be clapped object contact person using camera
According to, or prompting user that the face image of object contact person is uploaded under local preset path, acquiring unit is uploaded in user
After the completion, face image is obtained from preset path and is identified to obtain face feature.Therefore acquiring unit is acquired at this
The specific steps of face characteristic do not define.
When the feature data types of required acquisition include voiceprint, acquiring unit 424 monitors coming for object contact person
Electricity is removed, when user and object contact person converse next time, judges whether the call meets preset voiceprint extraction item
Part, for example, call environment level of noise whether is less than default level of noise or whether the duration of call is more than preset duration value, if
It is then to meet voiceprint extraction condition.The default voiceprint extraction condition can be configured by user or is arranged by system default.
When the call meets preset voiceprint extraction condition, acquiring unit 424 acquires the voiceprint of object contact person as special
Data are levied, and cease listening for the incoming/sending call of object contact person.When the call does not meet default voiceprint extraction condition, obtain single
Member 424 continues to monitor the incoming/sending call of object contact person, and when user and the object contact person are conversed next time, judges
Whether the call meets preset voiceprint extraction condition, when the call listened to meets the voiceprint extraction condition, obtains
It takes unit 424 to acquire the voiceprint of the object contact person as characteristic, and ceases listening for the object contact person
Incoming/sending call.It should be noted that before acquiring unit 424 collects object contact person voiceprint, protection module 430 can not
Secret protection is carried out according to the voiceprint of contact person.Certainly, in other embodiments, acquiring unit is in user setting privacy
When protection, user is prompted to obtain the sound of object contact person using voice-input devices such as microphones, to acquire object contact person
Voiceprint.Alternatively, acquiring unit prompts user that the audio file of the sound only comprising object contact person is uploaded to local
Under preset path, acquiring unit is after the completion of user uploads, from the voiceprint obtained in preset path in audio file.
Name search unit 421 is used for when the name that the classification of the characteristic is object contact person, and the data
When type belongs to text information class, searches for the name comprising object contact person in local and belong to the word of the data type
Information is as target private data.For example, when the target private data that user protects in advance is the communication information, i.e. acquiring unit
424 obtain object contact person name as characteristic, and name search unit 421, which goes out in local search in title or content, to be wrapped
The communication information of the name containing object contact person, such as the message registration from object contact person and short message record, using as target
Private data.
Face's search unit 422 is used for when the face feature that the classification of the characteristic is the object contact person, and
When the data type belongs to image class, using face recognition technology, searches for containing the face feature and belong in local
The image data of the data type is as the target private data.For example, when the target private data that user protects in advance is
When image, acquiring unit 424 obtains the face feature of object contact person as characteristic, and face's search unit 422 utilizes people
Face identification technology goes out the image data of the face feature containing object contact person in local search, using as target private data.
Wherein, recognition of face is to compare the technology that face visual signature information carries out identity discriminating using analysis.Specifically, face
Portion's search unit 422 carries out Face datection to local image, wherein face's search unit 422 is using reference template method, face rule
Then the one of which of method, sample learning method, complexion model method, sub-face of feature method etc. or in summary several carry out face inspection
It surveys.Face's search unit 422 detects the people that will be detected using feature vector method, face line template etc. after the face in image
Face carries out face comparison with 424 collected contact person's face feature of acquiring unit, if the face detected is contacted with described
Face characteristic matching, it is determined that described image is private data.Since face detection is the prior art, specific implementation
Related face detection data is please referred to, is not elaborated herein.
Vocal print search unit 423 is used for when the voiceprint that the classification of the characteristic is the object contact person, and
When the data type belongs to audio class, using sound groove recognition technology in e, searches for containing the voiceprint and belong in local
The audio data of the data type is as target private data.For example, when the target private data that user protects in advance is sound
When information, acquiring unit 424 obtains the voiceprint of object contact person as characteristic, and vocal print search unit 423 utilizes sound
Line identification technology goes out the audio data containing the object contact person voiceprint in local search, using as target privacy number
According to.
Specifically, Application on Voiceprint Recognition refers to according to human physiology is spoken in reflection in speech waveform and behavioural characteristic is that speaker is peculiar
Speech parameter, speaker is identified according to the speech parameter.Vocal print search unit 423 obtains the sound in the audio in local
Sound, extract vocal print feature, which is compared with the contact person's voiceprint acquired before, if the vocal print feature and
Contact person's voiceprint matches, then using the audio data as private data.
Protection module 430 is for being encrypted, hiding or being isolated to the target private data.
Protection module 430 is matched to what is searched out with the characteristic of acquisition, and belongs to the target of pre- protection data type
Private data carries out data encryption, hides or be isolated, to carry out privacy secrecy setting to target private data.Optimally, it protects
Module 430 is protected after searching out target private data, shows the target private data, and prompts the user whether to carry out privacy
Protection, when getting user's input secret protection instruction, protection module 430 selects the target for carrying out privacy secrecy hidden user
Private data carry out secret protection.In present embodiment, protection module 430 uses general standard encryption algorithms, such as international standard
Target private data is encrypted in symmetric encipherment algorithm AES128/256 realizations so that target private data is in unreadable shape
State normally shows private data when obtaining password authentification.
In another embodiment, protection module carries out secret protection using concealing technology to target private data.Specifically,
The target private data searched out is moved to from original storing directory in default file folder by protection module, and to described pre-
If permission is arranged in file or protection module directly carries out the target private data searched out under original storing directory
Priority assignation so that described to realize that all applications in privacy protection device be to the default file folder of the setting permission or straight
The target private data for connecing setting permission accesses, and target privacy digital display is shown as guard mode, needs to check institute in user
When stating target private data, carry out password authentification, and password authentification by when, temporarily obtain permission to show that the target is hidden
Private data.
Alternatively, isolation technology can also be used in protection module carries out secret protection to target private data.Specifically, protection module
Partial memory area domain is isolated, and the target private data searched out is moved to the storage of isolation from original storing directory
Region, wherein the storage region of isolation is the region that the application in the realization privacy protection device system cannot access, user
When checking the storage region, password authentification is needed.When the realization privacy protection device is multisystem such as double OS systems,
Target private data can be isolated in the high system environments of security level.Under low security level system environments, the realization
All applications of privacy protection device can not access the target private data in high-level system, enter high security level system ring
When border, normal display target private data.
It should be noted that protection module can select above-mentioned secret protection mode by system default, privacy can be also provided
Interface is arranged in protected mode, for user's selecting to secret protection mode.In addition, the application protection module is to privacy number
It is also not limited to above-mentioned data encryption according to the mode for carrying out secret protection, hides and is isolated, other protected modes also can be used,
This is not construed as limiting secret protection mode.
Detection module 440 is used to detect that newly deposit data match with the characteristic and belong to the data type
When, secrecy setting is carried out using the data as target private data, institute is sent to using the data as target private data
State protection module 430.
During carrying out secret protection to target private data, when detecting local new deposit data, detection module
440 pairs of new deposit data are judged whether to match with the characteristic of object contact person, and whether belong to target private data
Data type, matched with the characteristic in newly deposit data and when belonging to the data type, detection module 440 is by institute
Data are stated to carry out data encryption as target private data, hide or be isolated.
For example, the realization privacy protection device can communicate, and target contact is hidden according to user input instruction
The communication information of people.During carrying out secret protection, when having new message registration or short message records, detection module 440
By the characteristic such as name of object contact person, judge whether the message registration or short message record come from the contact person,
Either the short message content whether comprising object contact person name message registration or short message record from object contact person or
When short message content includes object contact person name, the message registration or short message record are hidden by detection module 440.Separately
Outside, if detection module 440 judges that the missed call or unread short messages come when there is missed call either unread short messages
From object contact person, then when detection module 440 prompts user to have missed call or unread short messages, do not show the caller or
Letter person, and when passing through password authentification, detection module 440 shows the information of missed call or the content of unread short messages.
Display module 450 is used to, when the encrypted message for receiving user is preset password information, show the target privacy
Data.
When in secret protection state, the abnormal display target private data of display module 450.The realization is hidden
Private protective device is provided with the interface for checking the target private data, in user by the interface to check target privacy number
According to when, display module 450 provides a user preset interface for password input, in the message in cipher that is inputted at the interface of verification user
When breath is the encrypted message of user preset, then password authentification passes through, and display module 450 shows the target private data.
Recovery module 460 is used in the recovery private data instruction for receiving user, and the encrypted message for verifying user is
When preset password information, the secrecy is cancelled to the target private data and is arranged.
When carrying out secret protection to object contact person, the realization privacy protection device is provided with extensive to object contact person
The interface of multiple private data.In user when the interface input for restoring private data restores private data instruction, restore mould
Block 460 provides a user interface for password input, is getting encrypted message input by user and is verifying the message in cipher of the acquisition
When breath is preset password information, recovery module 460 is cancelled the secrecy to target private data and is arranged.For example, to by into line number
According to encrypted private data, then recovery module 460 permanently decrypts the target private data, so that all use per family may be used
It is directly viewable the private data.To the private data for being hidden or being isolated, protection module 430 is to the target privacy
When data are hidden or are isolated, the original storing path of the private data is identified.When executing private data recovery, restore
The target private data is respectively moved to the road preserved originally by module 460 under preset path according to the storing path of mark
Diameter.
Referring to Fig. 5, Fig. 5 is the structural schematic diagram that the application realizes privacy protection device a further embodiment.This implementation
In mode, the realization privacy protection device is mobile terminal, including processor 510, first memory 520 and second memory
530.Wherein, processor 510 passes through bus(As shown)It is connect respectively with first memory 520 and second memory 530.Its
In, the first memory 520 is used to store the computer instruction that the processor executes, and the second memory 530 is used for
Storing contact information.
Processor 510 executes the computer instruction that first memory 520 stores, according to user input instruction, to obtain pre-
The data type of the target private data of object contact person is protected to be deposited from second according to the characteristic of the object contact person
Search matches with the characteristic and belongs to the target private data of the data type in reservoir 530, and to the target
Private data carries out secrecy setting, wherein the characteristic is identifying the target private data of the object contact person.
Specifically, first, second memory 530 is stored with contacts list, and is provided with and different types of data is arranged
The interface of secret protection.When user is inputted by the interface and the instruction of secret protection is arranged at least one data type,
The contact person that processor 510 chooses user is as pre- protection object contact person, and according to instruction input by user, described in acquisition
The data type of the target private data of object contact person, such as image type, text information type, audio types, video class
Type etc..
After the data type for obtaining target private data, processor 510 obtains target contact from second memory 530
The characteristic of people, for example, the name of object contact person, face feature, voiceprint etc. are identifying the object contact person
Target private data.Wherein, the characteristic of the object contact person can be to acquire in advance and be stored in second memory
530, alternatively, from second memory 530 store object contact person information in instantaneous acquiring the characteristic.
Wherein, during being acquired, when the type of the characteristic of required acquisition includes name, processor 510 is from connection
It is that the name information of the object contact person is acquired in list information as characteristic.
When the feature data types of required acquisition include face feature, processor 510 is obtained from contact list information
It takes the personal images of object contact person and carries out Face datection, when the personal images accurately can obtain face characteristic, from
Characteristic of the face characteristic as object contact person is obtained in the personal images.Face cannot be accurately obtained in personal images
When can not get the personal images of object contact person in feature or contact list information, processor 510 prompts user to obtain
It takes face-image to fail, that is, realizes that privacy protection device can not carry out secret protection according to face feature.In other optimal enforcements
In example, processor from contact list information when obtaining the failure of contact person's face feature, from the third of second memory storage
In the contact data of square communication software, such as third party SNS, microblogging, wechat, the face characteristic of the object contact person is obtained.
Alternatively, network, which can also be used, in processor obtains the face characteristic for being stored in the object contact person in remote server.In addition, processing
When device obtains face characteristic failure through the above way, also user can be prompted to take pictures to object contact person using camera,
Or the face image of object contact person is uploaded under the preset path of second memory by prompt user, processor is on user
After the completion of biography, face image is obtained from preset path and is identified to obtain face feature.Therefore processor is acquired at this
The specific steps of face characteristic do not define.
When the feature data types of required acquisition include voiceprint, processor 510 monitors making a return journey for object contact person
Electricity judges whether the call meets preset voiceprint extraction condition when user and object contact person converse next time,
For example, call environment level of noise whether is less than default level of noise or whether the duration of call is more than preset duration value, if so,
Then meet voiceprint extraction condition.The default voiceprint extraction condition can be configured by user or is arranged by system default.
When the call meets preset voiceprint extraction condition, processor 510 acquires the voiceprint of object contact person as characteristic
According to, and cease listening for the incoming/sending call of object contact person.When the call does not meet default voiceprint extraction condition, processor 510
Continue the incoming/sending call of monitoring object contact person, and when user and the object contact person are conversed next time, described in judgement
Whether call meets preset voiceprint extraction condition, when the call listened to meets the voiceprint extraction condition, processor
The voiceprint of the 510 acquisition object contact persons ceases listening for the incoming/sending call of the object contact person as characteristic.
It should be noted that before collecting object contact person voiceprint, processor 510 can not be according to the voiceprint of contact person
Carry out secret protection.Certainly, in other embodiments, processor prompts user to utilize wheat in user setting secret protection
The voice-input devices such as gram wind obtain the sound of object contact person, to acquire the voiceprint of object contact person.Alternatively, processor
The audio file of sound only comprising object contact person is uploaded under the preset path of second memory by prompt user, processor
After the completion of user uploads, from the voiceprint obtained in preset path in audio file.
Processor 510 searches out and the characteristic according to the characteristic got in second memory 530
Match and belong to the target private data of the data type of acquisition.For example, the data type that processor 510 obtains is image, then extremely
Few face feature and/or name according to object contact person searches out in the face feature comprising object contact person and/or title
Including the image of object contact person name is as target private data.
Specifically, when the name that the classification of the characteristic is object contact person, and the data type belongs to word letter
When ceasing class, the name comprising object contact person is searched out in second memory 530 and belongs to the word letter of the data type
Breath is used as target private data.
When the face feature that the classification of the characteristic is the object contact person, and the data type belongs to image
When class, using face recognition technology, is searched out in second memory 530 containing the face feature and belong to the data class
The image data of type is as the target private data.
When the voiceprint that the classification of the characteristic is the object contact person, and the data type belongs to audio
When class, using sound groove recognition technology in e, is searched out in second memory 530 containing the voiceprint and belong to the data class
The audio data of type is as target private data.
The target private data searched out is carried out secrecy setting by processor 510, for example, using data encryption technology, hidden
Tibetan technology or isolation technology setting privacy maintain secrecy, so that the realization privacy protection device is obtaining password authentification or entering more
When high level system, the target private data is just shown.
Optimally, to searching out target private data execute secret protection before, the realization privacy protection device to
User provides password and interface is arranged, and after user sets password by input equipment, it is good that processor 510 obtains user setting
The preset password information of password as reference, so that realization privacy protection device ability display target after by password authentification
Private data.Wherein, encrypted message used by the application can be preset characters string, preset pattern, finger print information, iris letter
Breath, voiceprint etc. arbitrarily can be used as the information of identification.Correspondingly, password authentification can be used corresponding identification technology such as fingerprint and know
Not, iris recognition technology etc..
Further, processor 510 shows the target after second memory 530 searches out target private data
Private data, and prompt the user whether to carry out secret protection, when getting secret protection instruction input by user, processor
510 couples of users select the target private data for carrying out privacy secrecy to carry out secret protection.
In present embodiment, processor 510 uses general standard encryption algorithms, such as international standard symmetric encipherment algorithm
AES128/256 realize target private data be encrypted so that target private data be in can not read states, obtaining password
When verification, the normal display target private data of realization privacy protection device.In another embodiment, processor can be used
Concealing technology carries out secret protection to target private data.Specifically, processor deposits the target private data searched out from second
The original storing directory of reservoir is moved in the default file folder of second memory, and to the default file sandwiched power of setting
Limit or processor directly carry out priority assignation to the target private data searched out under original storing directory so that institute
It states and realizes that all applications of privacy protection device cannot be to the default file folder of the setting permission or the mesh of direct setting permission
Mark private data accesses, and guard mode is presented in display, when user needs to check target private data, carries out close
Code verification, and password authentification by when, the realization privacy protection device temporarily obtains permission with display target private data.
Alternatively, isolation technology can also be used in processor carries out secret protection to target private data.Specifically, processor is in second memory
In isolate partial memory area domain, and the target private data searched out is moved under the original storing directory of second memory
To the storage region of isolation, wherein the storage region of isolation, which is the application in the realization privacy protection device, to be accessed
Region, user need password authentification when checking the storage region.It is such as double OS of multisystem in the realization privacy protection device
When system, target private data can be also isolated in the high system environments of security level.
It should be noted that processor can select above-mentioned secret protection mode by system default, privacy guarantor can be also provided
Interface is arranged in shield mode, for user's selecting to secret protection mode.In addition, the application processor to private data into
The mode of row secret protection is also not limited to above-mentioned data encryption, hides and be isolated, other protected modes also can be used, right at this
Secret protection mode is not construed as limiting.
Ground is advanced optimized, processor 510 is when detecting the newly deposit data of the second memory 530, described in judgement
Whether data match with the characteristic and belong to the data type, match and belong to the characteristic in the data
When the data type, secret protection is carried out using the data as target private data.
Further, processor 510 is preset password in the encrypted message of default input interface input in verification user
When information, the target private data is shown.The realization privacy protection device, which is provided with, checks the target private data
Interface, processor 510 are judging user when the encrypted message that the interface inputs is the encrypted message of user preset, then password
It is verified, processor 510 makes the realization privacy protection device show the target private data.
Processor 510 is also receiving recovery private data instruction input by user, and gets password input by user
Information and when being verified as preset password information, cancels the secrecy setting to the target private data.To object contact person
Carry out secret protection when, it is described realize privacy protection device be provided with to object contact person restore private data interface, with
When private data instruction is restored in family by the interface input for restoring private data, processor 510 makes the shifting realization privacy
Protective device provides a user interface for password input, and processor 510 gets and obtained described in encrypted message input by user and verification
When the encrypted message taken is preset password information, the target private data is restored to unprotected state.
The application realizes that privacy protection device is the mobile terminal that can be communicated, such as mobile phone, tablet computer.But at it
In his embodiment, the realization privacy protection device is alternatively the equipment with store function, is not limited thereto.
Through the above scheme, the personal characteristics of the application combining target contact person, by the individual for obtaining object contact person
Feature, and be identified using personal characteristics identification technology, the target private data of the object contact person is searched out, is realized
To the automatic protection of the target private data of object contact person, moreover, by the different personal characteristics of contact person, it can be achieved that same
When search out different types of target private data and make protection, even if need protect numerous types of data, such as with contact
When the related all message of people, corresponds to different data types without user and be configured protection respectively, it is simple to operate.
In several embodiments provided herein, it should be understood that disclosed system, device and method can
To realize by another way.For example, device embodiments described above are only schematical, for example, the mould
The division of block or unit, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, for example (,) it is multiple
Unit or component can be combined or can be integrated into another system, or some features can be ignored or not executed.It is another
Point, shown or discussed mutual coupling, direct-coupling or communication connection can be by some interfaces, device or
The INDIRECT COUPLING of unit or communication connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize present embodiment scheme
Purpose.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, also may be used
It, can also be during two or more units be integrated in one unit to be that each unit physically exists alone.It is above-mentioned integrated
The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can be stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment(Can be personal computer, server or the network equipment etc.)Or processor(processor)It is each to execute the application
The all or part of step of embodiment the method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory
(ROM, Read-Only Memory), random access memory(RAM, Random Access Memory), magnetic disc or CD
Etc. the various media that can store program code.