CN104376011B - Realize method for secret protection and device - Google Patents

Realize method for secret protection and device Download PDF

Info

Publication number
CN104376011B
CN104376011B CN201310354236.0A CN201310354236A CN104376011B CN 104376011 B CN104376011 B CN 104376011B CN 201310354236 A CN201310354236 A CN 201310354236A CN 104376011 B CN104376011 B CN 104376011B
Authority
CN
China
Prior art keywords
data
contact person
characteristic
object contact
private data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310354236.0A
Other languages
Chinese (zh)
Other versions
CN104376011A (en
Inventor
司马经华
龙志明
王细勇
汪运斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Co Ltd
Original Assignee
Huawei Device Dongguan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Dongguan Co Ltd filed Critical Huawei Device Dongguan Co Ltd
Priority to CN201810820632.0A priority Critical patent/CN109040439B/en
Priority to CN201810819697.3A priority patent/CN109117665A/en
Priority to CN201310354236.0A priority patent/CN104376011B/en
Publication of CN104376011A publication Critical patent/CN104376011A/en
Application granted granted Critical
Publication of CN104376011B publication Critical patent/CN104376011B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/43Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • Collating Specific Patterns (AREA)
  • Telephone Function (AREA)

Abstract

This application discloses a kind of realization method for secret protection and devices, wherein the method includes:According to user input instruction, the data type of the target private data of pre- protection object contact person is obtained;According to the characteristic of the object contact person, search matches with the characteristic and belongs to the target private data of the data type, wherein the characteristic is identifying the target private data of the object contact person;Secrecy setting is carried out to the target private data.By the above-mentioned means, the application can voluntarily protect the different types of private data of object contact person, and it is simple to operate.

Description

Realize method for secret protection and device
Technical field
This application involves computer safety protective technical fields, more particularly to a kind of realization method for secret protection and dress It sets.
Background technology
Mobile terminal has been indispensable part in people's daily life as means of communication.In mobile terminal usually The living condition of user is had recorded, especially with the contact situation of periphery friend.For some special contact persons, user may Be not intended to be seen information related with the contact person on mobile terminals by other people, for example, message registration, short message, image and Video etc..
The method that the prior art provides some protection privacies is opened for example, guest mode is arranged in mobile terminal in user After opening guest mode, the partial function of mobile terminal is then hidden, and can not be conversed and be surfed the Internet, therefore guest mode also shields The basic function of the part of mobile terminal, has larger restricted, and user is needed voluntarily to open;In addition, the prior art Also providing can be set as hiding by application program in the terminal using hidden method, however, this is just for application program, nothing Method is hidden the private data for contact person that mobile terminal stores;In the case, the prior art additionally provides one The application of kind security guard, can be hidden the message registration of designated contact, short message, can also be carried out to some specified files Encryption, however, the prior art needs are configured different protected objects respectively, it is cumbersome, unification can not be carried out To the different types of data of designated contact, for example, message registration, image, video, recording etc., are quickly arranged.
Invention content
The application can join target mainly solving the technical problems that a kind of realization method for secret protection of offer and device It is that the different types of private data of people is voluntarily protected, and simple to operate.
In order to solve the above technical problems, the application first aspect provides a kind of realization method for secret protection, the method packet It includes:According to user input instruction, the data type of the target private data of pre- protection object contact person is obtained;According to the target The characteristic of contact person, search match with the characteristic and belong to the target private data of the data type, wherein The characteristic is identifying the target private data of the object contact person;Secrecy is carried out to the target private data to set It sets.
With reference to first aspect, in the first possible embodiment of first aspect of the embodiment of the present invention, the characteristic According to type include the name of object contact person, face feature, voiceprint at least one.
The first possible embodiment with reference to first aspect, second of possible reality of first aspect of the embodiment of the present invention It applies in mode, the characteristic according to the object contact person, search matches with the characteristic and belongs to the number According to type target private data the step of before, further include:Obtain the characteristic of the object contact person, wherein described Characteristic acquires and is stored in local in advance;Or according to user input instruction, the spy of object contact person described in instantaneous acquiring Levy data.
Second of possible embodiment with reference to first aspect, the third possible reality of first aspect of the embodiment of the present invention It applies in mode, described according to user input instruction, the step of characteristic of object contact person described in instantaneous acquiring includes:Work as institute When the type for stating characteristic includes face feature, the personal images by obtaining the object contact person are gone forward side by side the inspection of pedestrian's face It surveys, to obtain the face feature of the object contact person from the personal images as characteristic, when the characteristic Type when including voiceprint, then acquire the voiceprint of the object contact person as characteristic;When the characteristic According to type include name when, acquire the name information of the object contact person as characteristic.
First with reference to first aspect is to any possible embodiment of third, and the of first aspect of the embodiment of the present invention In four kinds of possible embodiments, described search matches with the characteristic and belongs to the target privacy number of the data type According to the step of specifically include:When the name that the classification of the characteristic is the object contact person, and the data type category When text information class, the name comprising the object contact person is searched in local and belongs to the word letter of the data type Breath is used as the target private data;It is and described when the face feature that the classification of the characteristic is the object contact person When data type belongs to image class, using face recognition technology, is searched in local containing the face feature and belong to described The image data of data type is as the target private data;When the classification of the characteristic is the object contact person Voiceprint, the and when data type belongs to audio class, using sound groove recognition technology in e, in local search contain the vocal print Information and belong to the audio related data of the data type as the target private data.
With reference to first aspect or first to fourth any possible embodiment of first aspect, the embodiment of the present invention In 5th kind of possible embodiment of one side, described the step of carrying out secrecy setting to the target private data, specifically wraps It includes:The target private data is encrypted, hidden or is isolated.
With reference to first aspect or first to the 5th any possible embodiment of first aspect, the embodiment of the present invention In 6th kind of possible embodiment of one side, the method further includes:If detecting new deposit data and the feature Data Matching and belong to the data type, then carries out secrecy setting using the data as target private data.
With reference to first aspect or first to the 6th any possible embodiment of first aspect, the embodiment of the present invention In 7th kind of possible embodiment of one side, the method further includes:If the encrypted message for receiving user is default close Code information, then show the target private data;And/or if the recovery private data for receiving user instructs, and verification is used The encrypted message at family is preset password information, then cancelling the secrecy to the target private data is arranged.
In order to solve the above-mentioned technical problem, the application second aspect provides a kind of realization privacy protection device, described device There is the information of object contact person, described device includes acquisition module, search module and protection module;The acquisition module is used for According to user input instruction, the data type of the target private data of pre- protection object contact person is obtained, and by the data class Type is sent to described search module;Described search module is used for according to the characteristic of the object contact person, search with it is described Characteristic matches and belongs to the target private data of the data type, and the target private data is sent to the guarantor Protect module, wherein the characteristic is identifying the target private data of the object contact person;The protection module is used for Secrecy setting is carried out to the target private data.
In conjunction with second aspect, in the first possible embodiment of second aspect of the embodiment of the present invention, the characteristic According to type include the name of object contact person, face feature, voiceprint at least one.
In conjunction with the first possible embodiment of second aspect, second of second aspect of the embodiment of the present invention is possible In embodiment, search module includes acquiring unit, and the acquiring unit is used to obtain the characteristic of the object contact person, Wherein, the characteristic acquires and is stored in local in advance;Or according to user input instruction, target connection described in instantaneous acquiring It is the characteristic of people.
In conjunction with second of possible embodiment of second aspect, the third of second aspect of the embodiment of the present invention is possible In embodiment, the acquiring unit passes through acquisition also particularly useful for when the type of the characteristic includes face feature The personal images of the object contact person simultaneously carry out Face datection, to obtain the object contact person from the personal images Face feature then acquires the object contact person as characteristic when the type of the characteristic includes voiceprint Voiceprint as characteristic;When the type of the characteristic includes name, the surname of the object contact person is acquired Name information is as characteristic.
In conjunction with second aspect or second aspect first to any possible embodiment of third, the embodiment of the present invention In 4th kind of possible embodiment of two aspects, described search module includes name search unit, face's search unit and sound Line search unit;The name search unit is used for when the name that the classification of the characteristic is the object contact person, and When the data type belongs to text information class, the name comprising the object contact person is searched in local and belongs to the number According to the text information of type as the target private data;Face's search unit is used for the classification when the characteristic For the face feature of the object contact person, and when the data type belongs to image class, using face recognition technology, in local Middle search contains the face feature and belongs to the image data of the data type as the target private data;The sound Line search unit is used for when the voiceprint that the classification of the characteristic is the object contact person, and the data type category When audio class, using sound groove recognition technology in e, is searched for containing the voiceprint in local and belong to the data type Audio related data is as the target private data.
In conjunction with second aspect or first to fourth any possible embodiment of second aspect, the embodiment of the present invention In 5th kind of possible embodiment of two aspects, the protection module is specifically used for adding the target private data Close, hiding or isolation.
In conjunction with second aspect or first to the 5th any possible embodiment of second aspect, the embodiment of the present invention In 6th kind of possible embodiment of two aspects, described device further includes detection module, and the detection module is for detecting When being matched to new deposit data with the characteristic and belonging to the data type, using the data as target private data Secrecy setting is carried out, and the protection module is sent to using the data as target private data, to be carried out to the data Secrecy setting.
In conjunction with second aspect or first to the 6th any possible embodiment of second aspect, the embodiment of the present invention In 7th kind of possible embodiment of two aspects, described device further includes display module, and the display module is for receiving When the encrypted message of user is preset password information, the target private data is shown;And/or described device further includes restoring mould Block, the recovery module is used in the recovery private data instruction for receiving user, and the encrypted message for verifying user is default When encrypted message, the secrecy is cancelled to the target private data and is arranged
In order to solve the above-mentioned technical problem, the application third aspect provides a kind of mobile terminal, and the mobile terminal is at least Including processor, first memory, second memory and bus, the processor is stored with described first respectively by bus Device, second memory connection, wherein the first memory is used to store the computer instruction that the processor executes, described Second memory is for storing object contact person information;
The processor is used to execute the computer instruction of first memory storage, with according to user input instruction, The data type for obtaining the target private data of pre- protection object contact person, according to the characteristic of the object contact person, from Search matches with the characteristic and belongs to the target private data of the data type in second memory, and to the mesh Mark private data carries out secrecy setting, wherein the characteristic is identifying the target private data of the object contact person.
In conjunction with the third aspect, in the first possible embodiment of the third aspect of the embodiment of the present invention, the characteristic According to type include the name of object contact person, face feature, voiceprint at least one.
In conjunction with a kind of possible embodiment of the third aspect, second of possible reality of the third aspect of the embodiment of the present invention It applies in mode, the processor is additionally operable to execute the computer instruction of the first memory, to be obtained from second memory The characteristic of the object contact person, wherein the characteristic acquires and is stored in local in advance;Or it is defeated according to user Enter instruction, acquires the characteristic of the object contact person from second memory immediately.
In conjunction with second of embodiment of the third aspect, the third possible embodiment party of the third aspect of the embodiment of the present invention In formula, the processor is additionally operable to execute the computer instruction of the first memory, with when the type packet of the characteristic When including face feature, by obtaining the personal images of the object contact person and carrying out Face datection, with from the personal images The middle face feature for obtaining the object contact person is as characteristic, when the type of the characteristic includes voiceprint When, then the voiceprint of the object contact person is acquired as characteristic;When the type of the characteristic includes name, The name information of the object contact person is acquired as characteristic.
In conjunction with the third aspect first to any possible embodiment of third, the 4th kind of third aspect present invention can In the embodiment of energy, the processor is additionally operable to execute the computer instruction of the first memory, to work as the characteristic According to classification be the object contact person name, and the data type be text information when, searched in second memory Including the name of the object contact person and belonging to the text information of the data type as the target private data;Work as institute State characteristic classification be the object contact person face feature, and the data type be image data when, utilize people Face identification technology searches for the image data conduct for containing the face feature and belonging to the data type in second memory The target private data;When the voiceprint that the classification of the characteristic is the object contact person, and the data class When type is audio data, using sound groove recognition technology in e, is searched in second memory containing the voiceprint and belong to described The audio related data of data type is as the target private data.
In conjunction with the third aspect or first to fourth any possible embodiment of the third aspect, third party of the present invention In the 5th kind of possible embodiment in face, the processor is additionally operable to execute the computer instruction of the first memory, with The target private data is encrypted, hidden or is isolated.
In conjunction with the third aspect or first to the 5th any possible embodiment of the third aspect, third party of the present invention In the 6th kind of possible embodiment in face, the processor is additionally operable to execute the computer instruction of the first memory, with Detecting that second memory is newly stored in data and matched with the characteristic and when belonging to the data type, by the data Secrecy setting is carried out as target private data.
In conjunction with the third aspect or first to the 6th any possible embodiment of the third aspect, third party of the present invention In the 7th kind of possible embodiment in face, the processor is additionally operable to execute the computer instruction of the first memory, with When the encrypted message for receiving user is preset password information, the target private data is shown;And/or receiving user's When the encrypted message for restoring private data instruction, and verifying user is preset password information, the target private data is cancelled The secrecy setting.
Through the above scheme, the personal characteristics of the application combining target contact person, by the individual for obtaining object contact person Feature, and be identified using personal characteristics identification technology, the target private data of the object contact person is searched out, is realized To the automatic protection of the target private data of object contact person, moreover, by the different personal characteristics of contact person, it can be achieved that same When search out different types of private data and make secrecy setting, it is simple to operate.
Description of the drawings
Fig. 1 is the flow chart that the application realizes one embodiment of method for secret protection;
Fig. 2 is the flow chart that the application realizes another embodiment of method for secret protection;
Fig. 3 is the structural schematic diagram that the application realizes one embodiment of privacy protection device;
Fig. 4 is the structural schematic diagram that the application realizes another embodiment of privacy protection device;
Fig. 5 is the structural schematic diagram that the application realizes privacy protection device a further embodiment.
Specific implementation mode
It is illustrated below in conjunction with the accompanying drawings with specific embodiment.
Referring to Fig. 1, Fig. 1 is the flow chart that the application realizes one embodiment of method for secret protection.In present embodiment, Realize that method for secret protection includes the following steps:
Step S101:Mobile terminal obtains the target private data of pre- protection object contact person according to user input instruction Data type.
List of being related is being locally stored in mobile terminal, and is provided with and is connect to different types of data setting secret protection Mouthful.When user is inputted by the interface and the instruction of secret protection is arranged at least one data type, mobile terminal will be used The contact person that family is chosen, according to instruction input by user, obtains the object contact person as pre- protection object contact person Data type of target private data, such as image type, text information type, audio types, video type etc..
Step S102:Mobile terminal is searched for and is matched with the characteristic according to the characteristic of the object contact person And belong to the target private data of the data type, wherein the characteristic is identifying the mesh of the object contact person Mark private data.
After the data type for obtaining target private data, the characteristic of acquisition for mobile terminal object contact person, for example, Name, face feature, voiceprint of object contact person etc. are identifying the target private data of the object contact person.Its In, the characteristic of the object contact person can be to acquire and be stored in local in advance, alternatively, believing immediately from object contact person The characteristic acquired in breath.
Mobile terminal is searched out to match and belong to the characteristic in local and be obtained according to the characteristic got The target private data of the data type taken.For example, the data type of acquisition for mobile terminal is image, then join according at least to target It is the face feature and/or name of people, searches out in the face feature comprising object contact person and/or title and contacted comprising target The image of people's name is as target private data.
Step S103:Mobile terminal carries out secrecy setting to the target private data.
The target private data searched out is carried out secrecy setting by mobile terminal, for example, using data encryption technology, hiding Technology or isolation technology setting privacy maintain secrecy, so that mobile terminal is obtaining password authentification or entering the system of higher level When, just show the target private data.
In present embodiment, mobile terminal carries before the target private data to searching out executes secret protection to user For password, interface is set.After the good password of user setting, the password that is set described in acquisition for mobile terminal as reference default Encrypted message.When user needs to check target private data, mobile terminal carries out password authentification, if it is determined that input by user Encrypted message is consistent with the preset password information, then password authentification passes through, to user's display target private data, otherwise, no It shows.Wherein, encrypted message used by the application can be preset characters string, preset pattern, finger print information, iris letter Breath, voiceprint etc. arbitrarily can be used as the information of identification.Correspondingly, password authentification can be used corresponding identification technology such as fingerprint and know Not, iris recognition technology etc..
Referring to Fig. 2, Fig. 2 is the flow chart that the application realizes another embodiment of method for secret protection.Present embodiment In, realize that method for secret protection includes the following steps:
Step S201:Mobile terminal obtains the target private data of pre- protection object contact person according to user input instruction Data type.
Mobile terminal is provided with the interface for different types of data being arranged secret protection.It is inputted by the interface in user When the instruction of secret protection is arranged at least one data type, the contact person that mobile terminal chooses user is as pre- protection mesh Contact person is marked, and according to instruction input by user, obtains the data type of the target private data of the object contact person, such as Image type, text information type, audio types, video type etc..
Specifically, mobile terminal is provided with the interface for different types of data being arranged secret protection in man-machine interface, such as wraps It includes and secret protection is arranged to the communication information, image information, acoustic information, video information, all information etc..Accordingly, it is obtaining To it is input by user to object contact person setting the communication information protect instruction when, acquisition for mobile terminal message registration, short message etc. Data type of the text information type as target private data.It is input by user to object contact person setting image getting When the instruction of information protection, data type of the acquisition for mobile terminal image type as target private data.Getting user When the instruction of input protected to object contact person setting acoustic information, acquisition for mobile terminal audio types are as target privacy number According to data type.When getting the instruction input by user protected to object contact person setting video information, mobile terminal Obtain the data type of image and audio types as target private data.Input by user object contact person is set getting When setting the instruction of all information protections, i.e., to all information related with the object contact person in local, such as message registration, short Breath, memorandum, calendar, image, audio, video etc. carry out secret protection, all text informations of acquisition for mobile terminal, image, sound Data type of the frequency type as target private data.
Step S202:The characteristic of object contact person described in acquisition for mobile terminal.
Mobile terminal is provided with the interface of the characteristic of acquisition object contact person in advance, is set by the interface in user When setting advance acquisition characteristics data, mobile terminal acquires the name of object contact person, face spy from the information of object contact person Sign, voiceprint it is at least one to identify the private data of object contact person, and as characteristic be stored in it is mobile eventually In the preset path at end.Whether mobile terminal judges pre- in the preset path when obtaining user's input secret protection instruction There is the characteristic, if so, then mobile terminal directly acquires the characteristic to prestore, if it is not, mobile The characteristic of object contact person described in terminal-pair carries out instantaneous acquiring.Certainly, in other embodiments, mobile terminal also may be used It is set as, when obtaining user's input secret protection instruction, directly adopting the characteristic of the object contact person immediately Collection.
Mobile terminal is acquired the characteristic of the object contact person and is specifically described, mobile terminal acquisition The name of object contact person, face-image, voiceprint at least one as characteristic, wherein the characteristic of acquisition With target private data type matching, to identify the target private data.For example, if the data type includes word letter Type is ceased, then at least acquisition object contact person name is as characteristic, if the data type includes image class, at least The face feature of acquisition object contact person at least obtains mesh as characteristic if the data type includes audio class The voiceprint of contact person is marked as characteristic.Certainly, mobile whole if the data type is image class or audio class End can also acquire the name of object contact person as characteristic, so that it includes the object contact person name to search out title Image class or audio related data.It should be noted that in other embodiments, the feature data types of the acquisition also can be by User is configured by the interface that mobile terminal provides, therefore the application is not especially limited the acquisition of feature data types.
Further specifically, when being acquired characteristic, if the type of the characteristic of required acquisition includes surname Name, then mobile terminal acquires the name information of the object contact person as characteristic from contact list information.
If the feature data types of required acquisition include face feature, mobile terminal is obtained from contact list information It takes the personal images of object contact person and carries out Face datection, if the personal images can accurately obtain face characteristic, Characteristic of the face characteristic as object contact person is obtained from the personal images.If personal images cannot be obtained accurately The personal images of object contact person can not be got in face characteristic or contact list information, mobile terminal then prompts user Face-image failure is obtained, i.e. mobile terminal can not carry out secret protection according to face feature.In other optimal enforcement examples, move Dynamic terminal from contact list information when obtaining the failure of contact person's face feature, from the third party's communication software being locally stored In contact data, such as third party's social network services(Social Networking Services, abbreviation SNS), microblogging, Wechat obtains the face characteristic of the object contact person.Alternatively, network acquisition, which can also be used, in mobile terminal is stored in remote service The face characteristic of object contact person in device.In addition, when mobile terminal obtains face characteristic failure through the above way, can also carry Show that user takes pictures to the object contact person using camera, or prompt user schemes the face of the object contact person As being uploaded under local preset path, mobile terminal after the completion of user uploads, go forward side by side from preset path by acquisition face image Row identification is to obtain face feature.Therefore the specific steps for acquiring face characteristic to mobile terminal at this do not define.
If the feature data types of required acquisition include voiceprint, mobile terminal monitors making a return journey for object contact person Electricity judges whether the call meets preset voiceprint extraction condition when user and object contact person converse next time, For example, call environment level of noise whether is less than default level of noise or whether the duration of call is more than preset duration value, if so, Then meet voiceprint extraction condition.The default voiceprint extraction condition can be configured by user or is arranged by system default. When the call meets preset voiceprint extraction condition, mobile terminal acquires the voiceprint of object contact person as characteristic According to, and cease listening for the incoming/sending call of object contact person.It is described call do not meet default voiceprint extraction condition when, mobile terminal after The continuous incoming/sending call for monitoring object contact person, and when user and object contact person are conversed next time, judge that the call is It is no to meet preset voiceprint extraction condition, when the call listened to meets the voiceprint extraction condition, mobile terminal acquisition The voiceprint of object contact person ceases listening for the incoming/sending call of the object contact person as characteristic.It needs to illustrate Be, before mobile terminal collects object contact person voiceprint, mobile terminal can not according to the voiceprint of contact person into Row secret protection.Certainly, in other embodiments, mobile terminal prompts user to utilize wheat in user setting secret protection The voice-input devices such as gram wind obtain the sound of object contact person, to acquire the voiceprint of object contact person.Alternatively, mobile whole End prompt user will only include that the audio file of sound of object contact person is uploaded under local preset path, mobile terminal with After the completion of family uploads, from the voiceprint obtained in preset path in audio file.
Step S203:When the name that the classification of the characteristic is object contact person, and the data type belongs to text When word info class, mobile terminal searches for the name comprising object contact person in local and belongs to the word letter of the data type Breath is used as target private data.
For example, when the target private data that user protects in advance is the communication information, i.e. acquisition for mobile terminal object contact person Name goes out in title or content the communication information for including object contact person name, Tathagata in local search as characteristic It is recorded from the message registration and short message of object contact person etc., using as target private data.
Step S204:When the face feature that the classification of the characteristic is the object contact person, and the data class When type belongs to image class, mobile terminal utilizes face recognition technology, is searched for containing the face feature in local and belongs to institute The image data of data type is stated as the target private data.
For example, when the target private data that user protects in advance is image, the face of acquisition for mobile terminal object contact person Feature is as characteristic, using face recognition technology, goes out the image of the face feature containing object contact person in local search Data, using as target private data.
Wherein, recognition of face is to compare the technology that face visual signature information carries out identity discriminating using analysis.Specifically, it moves Dynamic terminal-pair local image carries out Face datection, wherein mobile terminal is using reference template method, face rule method, sample study The one of which of method, complexion model method, sub-face of feature method etc. in summary several carries out Face datection.Mobile terminal is examined It measures using feature vector method, face line template etc. that the face detected and mobile terminal is collected after the face in image Contact person's face feature carries out face comparison, if the face detected is matched with contact person's face feature, it is determined that institute It is target private data to state image.
Above-mentioned human face detection tech is illustrated:1)Reference template method:Mobile terminal designs one or several marks first Then the template of quasi- face calculates the matching degree between the sample and standard form of test acquisition, and is judged by threshold value With the presence or absence of face;2)Face rule method:Since there is face certain structure distribution feature, mobile terminal to extract these features Corresponding rule is generated to judge whether test sample includes face;3)Sample learning method:Use artificial god in pattern-recognition Method through network, mobile terminal is by opposite as sample sets and non-face as the study of sample sets generates grader;4)Colour of skin mould Type method:Mobile terminal is distributed the rule of Relatively centralized to be detected according to the looks colour of skin in color space;5)Sub-face of feature Method:All image surface set are considered as an image surface subspace by mobile terminal, and based on detection sample and its projection between sub-aperture The distance between judge whether image surface.Since face detection is the prior art, specific implementation please refers to related face Portion's identification technology data, does not elaborate herein.
Step S205:When the voiceprint that the classification of the characteristic is the object contact person, and the data class When type belongs to audio class, mobile terminal utilizes sound groove recognition technology in e, is searched for containing the voiceprint in local and belongs to institute The audio data of data type is stated as target private data.
For example, when the target private data that user protects in advance is acoustic information, acquisition for mobile terminal object contact person Voiceprint utilizes sound groove recognition technology in e, goes out containing the object contact person in local search as characteristic, mobile terminal The audio data of voiceprint, using as target private data.
Specifically, Application on Voiceprint Recognition refers to according to human physiology is spoken in reflection in speech waveform and behavioural characteristic is that speaker is peculiar Speech parameter, speaker is identified according to the speech parameter.The sound in audio in acquisition for mobile terminal local, extraction Vocal print feature compares the vocal print feature with the contact person's voiceprint acquired before, if the vocal print feature and contact person Voiceprint matches, then using the audio data as private data.Since sound groove recognition technology in e is the prior art, specific implementation Related sound groove recognition technology in e data is please referred to, is not elaborated herein.
Step S206:Mobile terminal is encrypted, hides or is isolated to the target private data.
Mobile terminal is matched to what is searched out with the characteristic got, and the target for belonging to pre- protection data type is hidden Private data carry out data encryption, hide or be isolated, to carry out privacy secrecy setting to target private data.Optimally, mobile Terminal shows the target private data, and prompt the user whether after searching out target private data in man-machine interface Secret protection is carried out, when getting determining secret protection instruction input by user, mobile terminal selects user to carry out privacy The target private data of secrecy carries out secret protection.In present embodiment, mobile terminal uses general standard encryption algorithms, such as Target private data is encrypted in the AES128/256 realizations of international standard symmetric encipherment algorithm so that target private data is in Can not read states, and when obtaining password authentification, mobile terminal normally shows the target private data.
In another embodiment, mobile terminal carries out secret protection using concealing technology to target private data.Specifically, The target private data searched out is moved to from original storing directory in default file folder by mobile terminal, and to described pre- If permission is arranged in file or mobile terminal directly carries out the target private data searched out under original storing directory Priority assignation so that permission cannot be pressed from both sides or be directly arranged to all applications in mobile terminal to the default file of the setting permission Target private data access, and guard mode is presented on man-machine interface is shown, needs to check the target in user When private data, carry out password authentification, and password authentification by when, mobile terminal temporarily obtains permission to show the target Private data.
Alternatively, isolation technology can also be used in mobile terminal carries out secret protection to target private data.Specifically, mobile terminal Partial memory area domain is isolated, and the target private data searched out is moved to the storage of isolation from original storing directory Region, wherein the storage region of isolation is the region that cannot access of application in system, user when checking the storage region, Need password authentification.When mobile terminal is multisystem such as double OS systems, also target private data can be isolated to security level In high system environments.Mobile terminal can not access the target privacy in high-level system when in low security level system Data, when entering high security level system environments, the normal display target private data of mobile terminal.
It should be noted that mobile terminal can select above-mentioned secret protection mode by system default, privacy can be also provided Interface is arranged in protected mode, for user's selecting to secret protection mode.In addition, the application mobile terminal is hidden to target The mode that private data carry out secret protection is also not limited to above-mentioned data encryption, hides and be isolated, other protection sides also can be used Formula is not construed as limiting secret protection mode at this.
Step S207:If detecting that new deposit data match with the characteristic and belong to the data type, The data are carried out secrecy setting by mobile terminal.
Mobile terminal to target private data during carrying out secret protection, if detecting that mobile terminal is locally newly deposited Enter data, is then judged whether to match with the characteristic of object contact person to being newly stored in data, and it is hidden whether to belong to target The data type of private data, if being newly stored in data and the contact feature Data Matching and belonging to the data type, Data encryption is carried out using the data as target private data, hides or is isolated.
For example, mobile terminal hides the communication information of object contact person according to user input instruction.Mobile terminal exists During carrying out secret protection, if there is new message registration or short message record, then pass through the characteristic of object contact person Such as name, judge the message registration either short message record whether from the object contact person or the short message content whether Including object contact person name, if it is, the message registration or short message record are hidden.In addition, not fetched having If mobile terminal judges that the missed call or unread short messages are contacted from the target when electric either unread short messages People, then mobile terminal man-machine interface prompt user have missed call or unread short messages when, do not show the caller or come Letter person, and when passing through password authentification, mobile terminal shows the information of missed call or the content of unread short messages.
Step S208:If the encrypted message for receiving user is preset password information, mobile terminal shows the target Private data.
When in secret protection state, the abnormal display target private data of mobile terminal.Mobile terminal is arranged Have the interface for checking the target private data, in user by the interface to check target private data when, mobile terminal Preset interface for password input is provided a user, is the close of user preset in the encrypted message that verification user inputs at the interface When code information, then password authentification passes through, and mobile terminal shows the private data.
Step S209:If receiving the recovery private data instruction of user, and the encrypted message for verifying user is default Encrypted message, then mobile terminal is to the target private data cancellation secrecy setting.
When carrying out secret protection to object contact person, mobile terminal is provided with restores private data to object contact person Interface.If user restores private data instruction in the interface input for restoring private data, mobile terminal is carried to user For interface for password input, believe for preset password getting encrypted message input by user and verifying the encrypted message of the acquisition When breath, mobile terminal is cancelled the secrecy to target private data and is arranged.For example, to by the target privacy number of carry out data encryption According to then mobile terminal permanently decrypts the target private data, so that all with can be directly viewable the privacy number per family According to.To the target private data for being hidden or being isolated, mobile terminal being hidden to the target private data or When isolation, the original storing path of the target private data is identified.When executing private data recovery, mobile terminal will be described Target private data is respectively moved to the path preserved originally under preset path according to the storing path of mark.
The personal characteristics of present embodiment combining target contact person by obtaining the personal characteristics of object contact person, and is adopted It is identified with personal characteristics identification technology, searches out the target private data of the object contact person, realized and target is joined It is the automatic protection of the target private data of people, moreover, by the different personal characteristics of contact person, it can be achieved that simultaneously scanning for out Different types of private data simultaneously makes secrecy setting, simple to operate.
Referring to Fig. 3, Fig. 3 is the structural schematic diagram that the application realizes one embodiment of privacy protection device.This embodiment party In formula, realize that privacy protection device has the information of object contact person, including acquisition module 310, search module 320 and protection mould Block 330.Wherein,
Acquisition module 310 is used to obtain the target private data of pre- protection object contact person according to user input instruction Data type, and the data type is sent to described search module 320.
In present embodiment, realize that list of being related is locally stored in privacy protection device, and be provided with to different data The interface of secret protection is arranged in type.It is inputted by the interface in user and secret protection is arranged at least one data type When instruction, the contact person that acquisition module 310 chooses user protects object contact person as pre-, and according to finger input by user It enables, obtains the data type of the target private data of the object contact person, such as image type, text information type, audio Type, video type etc..
Search module 320 is used for according to the characteristic of the object contact person, search matched with the characteristic and Belong to the target private data of the data type, and the target private data be sent to the protection module 330, In, the characteristic is identifying the target private data of the object contact person.
After the data type for obtaining target private data, search module 320 obtains the characteristic of object contact person, example Such as, name, face feature, voiceprint of object contact person etc. are identifying the target private data of the object contact person. Wherein, the characteristic of the object contact person can be to acquire and be stored in local in advance, alternatively, immediately from object contact person The characteristic acquired in information.
Search module 320 searches out in local according to the characteristic got and matches and belong to the characteristic In the target private data of the data type of acquisition.For example, the data type that search module 320 obtains is image, then at least root According to the face feature and/or name of object contact person, searches out in face feature and/or title comprising object contact person and include The image of object contact person name is as target private data.
Protection module 330 to the target private data for carrying out secrecy setting.The mesh that protection module 330 will search out Mark private data carries out secrecy setting, for example, maintained secrecy using data encryption technology, concealing technology or isolation technology setting privacy, So that described realize that privacy protection device when obtaining password authentification or entering the system of higher level, just shows the target Private data.
In present embodiment, protection module 330 is before the target private data to searching out executes secret protection, to user Password is provided, interface is set.After the good password of user setting, protection module 330 obtains the password set as reference Preset password information.When user needs to check target private data, protection module 330 carries out password authentification, is judging user When the encrypted message of input is consistent with the preset password information, then password authentification passes through, and protection module 330 shows mesh to user Otherwise mark private data is not shown.Wherein, encrypted message used by the application can be preset characters string, default figure Shape, finger print information, iris information, voiceprint etc. arbitrarily can be used as the information of identification.Correspondingly, correspondence can be used in password authentification Identification technology such as fingerprint recognition, iris recognition technology etc..
Referring to Fig. 4, Fig. 4 is the structural schematic diagram that the application realizes another embodiment of privacy protection device.This implementation In mode, realize that privacy protection device has object contact person information, including acquisition module 410, search module 420, protection mould Block 430, detection module 440, display module 450 and recovery module 460.Wherein, search module 420 includes name search unit 421, face's search unit 422, vocal print search unit 423 and acquiring unit 424.
Acquisition module 410 is used to obtain the target private data of pre- protection object contact person according to user input instruction Data type, and the data type is sent to search module 420.
Acquisition module 410 is provided with the interface for different types of data being arranged secret protection.Pass through the interface in user When inputting the instruction to the setting secret protection of at least one data type, the contact person that 410 user of acquisition module chooses is as pre- Object contact person is protected, and according to instruction input by user, obtains the data class of the target private data of the object contact person Type, such as image type, text information type, audio types, video type etc..
Specifically, described to realize that privacy protection device is provided with the interface for different types of data being arranged secret protection, such as Including secret protection is arranged to the communication information, image information, acoustic information, video information, all information etc..Accordingly, it is obtaining When getting the instruction input by user protected to the object contact person setting communication information, acquisition module 410 obtains message registration, short The data types of the text informations type as target private data such as letter.It is input by user to object contact person setting getting When the instruction of image information protection, acquisition module 410 obtains data type of the image type as target private data.It is obtaining To when the instruction input by user protected to object contact person setting acoustic information, acquisition module 410 obtains audio types conduct The data type of target private data.Getting the instruction input by user protected to object contact person setting video information When, acquisition module 410 obtains the data type of image and audio types as target private data.It is input by user getting When the instruction of all information protections is arranged to object contact person, i.e., to all letters related with the object contact person in local Breath, such as message registration, short breath, memorandum, calendar, image, audio, video carry out secret protection, and acquisition module 410 obtains institute There is the data type of text information, image, audio types as target private data.
Acquiring unit 424 is used to obtain the characteristic of the object contact person, and the characteristic is sent to institute State name search unit 421, face's search unit 422 or vocal print search unit 423.
The interface realized privacy protection device and be provided with the characteristic of acquisition object contact person in advance is logical in user When crossing the advance acquisition characteristics data of interface setting, acquiring unit 424 acquires target contact from the information of object contact person The name of people, face feature, voiceprint it is at least one to identify the private data of object contact person, and as characteristic According to being stored in preset path.When obtaining user's input secret protection instruction, acquiring unit 424 judges in the preset path The characteristic whether is prestored, and when prestoring the characteristic of the object contact person, directly acquires described prestore Characteristic;In the characteristic of the object contact person that do not prestore, to the characteristic of the object contact person According to progress instantaneous acquiring.Certainly, in other embodiments, acquiring unit can also be used for referring in acquisition user's input secret protection When enabling, instantaneous acquiring directly is carried out to the characteristic of the object contact person.
Acquiring unit 424 is acquired the characteristic of the object contact person and is specifically described, acquiring unit The 424 acquisition names of object contact persons, face-image, voiceprint at least one as characteristic, wherein the spy of acquisition Data and target private data type matching are levied, to identify the target private data.For example, including text in the data type When word information type, at least acquisition object contact person name is as characteristic, when the data type includes image class, until The face feature of acquisition object contact person at least obtains mesh as characteristic when the data type includes audio class less The voiceprint of contact person is marked as characteristic.Certainly, it when the data type is image class or audio class, obtains single Member 424 can also acquire the name of object contact person as characteristic, so that it includes the object contact person surname to search out title The image class or audio related data of name.It should be noted that in other embodiments, the feature data types of the acquisition It can be configured by the interface that the realization privacy protection device provides by user, therefore the application adopts feature data types Collection is not especially limited.
During acquiring unit 424 is acquired, when the type of the characteristic of required acquisition includes name, obtain single Member 424 acquires the name information of the object contact person as characteristic from contact list information.
When the feature data types of required acquisition include face feature, acquiring unit 424 is from contact list information It obtains the personal images of object contact person and carries out Face datection, when the personal images accurately can obtain face characteristic, Characteristic of the face characteristic as object contact person is obtained from the personal images.People cannot be accurately obtained in personal images When can not get the personal images of object contact person in face feature or contact list information, the prompt of acquiring unit 424 is used Family obtains face-image failure, that is, realizes that privacy protection device can not carry out secret protection according to face feature.In other optimizations In embodiment, acquiring unit from contact list information when obtaining the failure of contact person's face feature, from the third being locally stored In the contact data of square communication software, such as third party SNS, microblogging, wechat, the face characteristic of the object contact person is obtained. Alternatively, network, which can also be used, in acquiring unit obtains the face characteristic for being stored in the object contact person in remote server.In addition, obtaining When unit being taken to obtain face characteristic failure through the above way, also user can be prompted to be clapped object contact person using camera According to, or prompting user that the face image of object contact person is uploaded under local preset path, acquiring unit is uploaded in user After the completion, face image is obtained from preset path and is identified to obtain face feature.Therefore acquiring unit is acquired at this The specific steps of face characteristic do not define.
When the feature data types of required acquisition include voiceprint, acquiring unit 424 monitors coming for object contact person Electricity is removed, when user and object contact person converse next time, judges whether the call meets preset voiceprint extraction item Part, for example, call environment level of noise whether is less than default level of noise or whether the duration of call is more than preset duration value, if It is then to meet voiceprint extraction condition.The default voiceprint extraction condition can be configured by user or is arranged by system default. When the call meets preset voiceprint extraction condition, acquiring unit 424 acquires the voiceprint of object contact person as special Data are levied, and cease listening for the incoming/sending call of object contact person.When the call does not meet default voiceprint extraction condition, obtain single Member 424 continues to monitor the incoming/sending call of object contact person, and when user and the object contact person are conversed next time, judges Whether the call meets preset voiceprint extraction condition, when the call listened to meets the voiceprint extraction condition, obtains It takes unit 424 to acquire the voiceprint of the object contact person as characteristic, and ceases listening for the object contact person Incoming/sending call.It should be noted that before acquiring unit 424 collects object contact person voiceprint, protection module 430 can not Secret protection is carried out according to the voiceprint of contact person.Certainly, in other embodiments, acquiring unit is in user setting privacy When protection, user is prompted to obtain the sound of object contact person using voice-input devices such as microphones, to acquire object contact person Voiceprint.Alternatively, acquiring unit prompts user that the audio file of the sound only comprising object contact person is uploaded to local Under preset path, acquiring unit is after the completion of user uploads, from the voiceprint obtained in preset path in audio file.
Name search unit 421 is used for when the name that the classification of the characteristic is object contact person, and the data When type belongs to text information class, searches for the name comprising object contact person in local and belong to the word of the data type Information is as target private data.For example, when the target private data that user protects in advance is the communication information, i.e. acquiring unit 424 obtain object contact person name as characteristic, and name search unit 421, which goes out in local search in title or content, to be wrapped The communication information of the name containing object contact person, such as the message registration from object contact person and short message record, using as target Private data.
Face's search unit 422 is used for when the face feature that the classification of the characteristic is the object contact person, and When the data type belongs to image class, using face recognition technology, searches for containing the face feature and belong in local The image data of the data type is as the target private data.For example, when the target private data that user protects in advance is When image, acquiring unit 424 obtains the face feature of object contact person as characteristic, and face's search unit 422 utilizes people Face identification technology goes out the image data of the face feature containing object contact person in local search, using as target private data.
Wherein, recognition of face is to compare the technology that face visual signature information carries out identity discriminating using analysis.Specifically, face Portion's search unit 422 carries out Face datection to local image, wherein face's search unit 422 is using reference template method, face rule Then the one of which of method, sample learning method, complexion model method, sub-face of feature method etc. or in summary several carry out face inspection It surveys.Face's search unit 422 detects the people that will be detected using feature vector method, face line template etc. after the face in image Face carries out face comparison with 424 collected contact person's face feature of acquiring unit, if the face detected is contacted with described Face characteristic matching, it is determined that described image is private data.Since face detection is the prior art, specific implementation Related face detection data is please referred to, is not elaborated herein.
Vocal print search unit 423 is used for when the voiceprint that the classification of the characteristic is the object contact person, and When the data type belongs to audio class, using sound groove recognition technology in e, searches for containing the voiceprint and belong in local The audio data of the data type is as target private data.For example, when the target private data that user protects in advance is sound When information, acquiring unit 424 obtains the voiceprint of object contact person as characteristic, and vocal print search unit 423 utilizes sound Line identification technology goes out the audio data containing the object contact person voiceprint in local search, using as target privacy number According to.
Specifically, Application on Voiceprint Recognition refers to according to human physiology is spoken in reflection in speech waveform and behavioural characteristic is that speaker is peculiar Speech parameter, speaker is identified according to the speech parameter.Vocal print search unit 423 obtains the sound in the audio in local Sound, extract vocal print feature, which is compared with the contact person's voiceprint acquired before, if the vocal print feature and Contact person's voiceprint matches, then using the audio data as private data.
Protection module 430 is for being encrypted, hiding or being isolated to the target private data.
Protection module 430 is matched to what is searched out with the characteristic of acquisition, and belongs to the target of pre- protection data type Private data carries out data encryption, hides or be isolated, to carry out privacy secrecy setting to target private data.Optimally, it protects Module 430 is protected after searching out target private data, shows the target private data, and prompts the user whether to carry out privacy Protection, when getting user's input secret protection instruction, protection module 430 selects the target for carrying out privacy secrecy hidden user Private data carry out secret protection.In present embodiment, protection module 430 uses general standard encryption algorithms, such as international standard Target private data is encrypted in symmetric encipherment algorithm AES128/256 realizations so that target private data is in unreadable shape State normally shows private data when obtaining password authentification.
In another embodiment, protection module carries out secret protection using concealing technology to target private data.Specifically, The target private data searched out is moved to from original storing directory in default file folder by protection module, and to described pre- If permission is arranged in file or protection module directly carries out the target private data searched out under original storing directory Priority assignation so that described to realize that all applications in privacy protection device be to the default file folder of the setting permission or straight The target private data for connecing setting permission accesses, and target privacy digital display is shown as guard mode, needs to check institute in user When stating target private data, carry out password authentification, and password authentification by when, temporarily obtain permission to show that the target is hidden Private data.
Alternatively, isolation technology can also be used in protection module carries out secret protection to target private data.Specifically, protection module Partial memory area domain is isolated, and the target private data searched out is moved to the storage of isolation from original storing directory Region, wherein the storage region of isolation is the region that the application in the realization privacy protection device system cannot access, user When checking the storage region, password authentification is needed.When the realization privacy protection device is multisystem such as double OS systems, Target private data can be isolated in the high system environments of security level.Under low security level system environments, the realization All applications of privacy protection device can not access the target private data in high-level system, enter high security level system ring When border, normal display target private data.
It should be noted that protection module can select above-mentioned secret protection mode by system default, privacy can be also provided Interface is arranged in protected mode, for user's selecting to secret protection mode.In addition, the application protection module is to privacy number It is also not limited to above-mentioned data encryption according to the mode for carrying out secret protection, hides and is isolated, other protected modes also can be used, This is not construed as limiting secret protection mode.
Detection module 440 is used to detect that newly deposit data match with the characteristic and belong to the data type When, secrecy setting is carried out using the data as target private data, institute is sent to using the data as target private data State protection module 430.
During carrying out secret protection to target private data, when detecting local new deposit data, detection module 440 pairs of new deposit data are judged whether to match with the characteristic of object contact person, and whether belong to target private data Data type, matched with the characteristic in newly deposit data and when belonging to the data type, detection module 440 is by institute Data are stated to carry out data encryption as target private data, hide or be isolated.
For example, the realization privacy protection device can communicate, and target contact is hidden according to user input instruction The communication information of people.During carrying out secret protection, when having new message registration or short message records, detection module 440 By the characteristic such as name of object contact person, judge whether the message registration or short message record come from the contact person, Either the short message content whether comprising object contact person name message registration or short message record from object contact person or When short message content includes object contact person name, the message registration or short message record are hidden by detection module 440.Separately Outside, if detection module 440 judges that the missed call or unread short messages come when there is missed call either unread short messages From object contact person, then when detection module 440 prompts user to have missed call or unread short messages, do not show the caller or Letter person, and when passing through password authentification, detection module 440 shows the information of missed call or the content of unread short messages.
Display module 450 is used to, when the encrypted message for receiving user is preset password information, show the target privacy Data.
When in secret protection state, the abnormal display target private data of display module 450.The realization is hidden Private protective device is provided with the interface for checking the target private data, in user by the interface to check target privacy number According to when, display module 450 provides a user preset interface for password input, in the message in cipher that is inputted at the interface of verification user When breath is the encrypted message of user preset, then password authentification passes through, and display module 450 shows the target private data.
Recovery module 460 is used in the recovery private data instruction for receiving user, and the encrypted message for verifying user is When preset password information, the secrecy is cancelled to the target private data and is arranged.
When carrying out secret protection to object contact person, the realization privacy protection device is provided with extensive to object contact person The interface of multiple private data.In user when the interface input for restoring private data restores private data instruction, restore mould Block 460 provides a user interface for password input, is getting encrypted message input by user and is verifying the message in cipher of the acquisition When breath is preset password information, recovery module 460 is cancelled the secrecy to target private data and is arranged.For example, to by into line number According to encrypted private data, then recovery module 460 permanently decrypts the target private data, so that all use per family may be used It is directly viewable the private data.To the private data for being hidden or being isolated, protection module 430 is to the target privacy When data are hidden or are isolated, the original storing path of the private data is identified.When executing private data recovery, restore The target private data is respectively moved to the road preserved originally by module 460 under preset path according to the storing path of mark Diameter.
Referring to Fig. 5, Fig. 5 is the structural schematic diagram that the application realizes privacy protection device a further embodiment.This implementation In mode, the realization privacy protection device is mobile terminal, including processor 510, first memory 520 and second memory 530.Wherein, processor 510 passes through bus(As shown)It is connect respectively with first memory 520 and second memory 530.Its In, the first memory 520 is used to store the computer instruction that the processor executes, and the second memory 530 is used for Storing contact information.
Processor 510 executes the computer instruction that first memory 520 stores, according to user input instruction, to obtain pre- The data type of the target private data of object contact person is protected to be deposited from second according to the characteristic of the object contact person Search matches with the characteristic and belongs to the target private data of the data type in reservoir 530, and to the target Private data carries out secrecy setting, wherein the characteristic is identifying the target private data of the object contact person.
Specifically, first, second memory 530 is stored with contacts list, and is provided with and different types of data is arranged The interface of secret protection.When user is inputted by the interface and the instruction of secret protection is arranged at least one data type, The contact person that processor 510 chooses user is as pre- protection object contact person, and according to instruction input by user, described in acquisition The data type of the target private data of object contact person, such as image type, text information type, audio types, video class Type etc..
After the data type for obtaining target private data, processor 510 obtains target contact from second memory 530 The characteristic of people, for example, the name of object contact person, face feature, voiceprint etc. are identifying the object contact person Target private data.Wherein, the characteristic of the object contact person can be to acquire in advance and be stored in second memory 530, alternatively, from second memory 530 store object contact person information in instantaneous acquiring the characteristic.
Wherein, during being acquired, when the type of the characteristic of required acquisition includes name, processor 510 is from connection It is that the name information of the object contact person is acquired in list information as characteristic.
When the feature data types of required acquisition include face feature, processor 510 is obtained from contact list information It takes the personal images of object contact person and carries out Face datection, when the personal images accurately can obtain face characteristic, from Characteristic of the face characteristic as object contact person is obtained in the personal images.Face cannot be accurately obtained in personal images When can not get the personal images of object contact person in feature or contact list information, processor 510 prompts user to obtain It takes face-image to fail, that is, realizes that privacy protection device can not carry out secret protection according to face feature.In other optimal enforcements In example, processor from contact list information when obtaining the failure of contact person's face feature, from the third of second memory storage In the contact data of square communication software, such as third party SNS, microblogging, wechat, the face characteristic of the object contact person is obtained. Alternatively, network, which can also be used, in processor obtains the face characteristic for being stored in the object contact person in remote server.In addition, processing When device obtains face characteristic failure through the above way, also user can be prompted to take pictures to object contact person using camera, Or the face image of object contact person is uploaded under the preset path of second memory by prompt user, processor is on user After the completion of biography, face image is obtained from preset path and is identified to obtain face feature.Therefore processor is acquired at this The specific steps of face characteristic do not define.
When the feature data types of required acquisition include voiceprint, processor 510 monitors making a return journey for object contact person Electricity judges whether the call meets preset voiceprint extraction condition when user and object contact person converse next time, For example, call environment level of noise whether is less than default level of noise or whether the duration of call is more than preset duration value, if so, Then meet voiceprint extraction condition.The default voiceprint extraction condition can be configured by user or is arranged by system default. When the call meets preset voiceprint extraction condition, processor 510 acquires the voiceprint of object contact person as characteristic According to, and cease listening for the incoming/sending call of object contact person.When the call does not meet default voiceprint extraction condition, processor 510 Continue the incoming/sending call of monitoring object contact person, and when user and the object contact person are conversed next time, described in judgement Whether call meets preset voiceprint extraction condition, when the call listened to meets the voiceprint extraction condition, processor The voiceprint of the 510 acquisition object contact persons ceases listening for the incoming/sending call of the object contact person as characteristic. It should be noted that before collecting object contact person voiceprint, processor 510 can not be according to the voiceprint of contact person Carry out secret protection.Certainly, in other embodiments, processor prompts user to utilize wheat in user setting secret protection The voice-input devices such as gram wind obtain the sound of object contact person, to acquire the voiceprint of object contact person.Alternatively, processor The audio file of sound only comprising object contact person is uploaded under the preset path of second memory by prompt user, processor After the completion of user uploads, from the voiceprint obtained in preset path in audio file.
Processor 510 searches out and the characteristic according to the characteristic got in second memory 530 Match and belong to the target private data of the data type of acquisition.For example, the data type that processor 510 obtains is image, then extremely Few face feature and/or name according to object contact person searches out in the face feature comprising object contact person and/or title Including the image of object contact person name is as target private data.
Specifically, when the name that the classification of the characteristic is object contact person, and the data type belongs to word letter When ceasing class, the name comprising object contact person is searched out in second memory 530 and belongs to the word letter of the data type Breath is used as target private data.
When the face feature that the classification of the characteristic is the object contact person, and the data type belongs to image When class, using face recognition technology, is searched out in second memory 530 containing the face feature and belong to the data class The image data of type is as the target private data.
When the voiceprint that the classification of the characteristic is the object contact person, and the data type belongs to audio When class, using sound groove recognition technology in e, is searched out in second memory 530 containing the voiceprint and belong to the data class The audio data of type is as target private data.
The target private data searched out is carried out secrecy setting by processor 510, for example, using data encryption technology, hidden Tibetan technology or isolation technology setting privacy maintain secrecy, so that the realization privacy protection device is obtaining password authentification or entering more When high level system, the target private data is just shown.
Optimally, to searching out target private data execute secret protection before, the realization privacy protection device to User provides password and interface is arranged, and after user sets password by input equipment, it is good that processor 510 obtains user setting The preset password information of password as reference, so that realization privacy protection device ability display target after by password authentification Private data.Wherein, encrypted message used by the application can be preset characters string, preset pattern, finger print information, iris letter Breath, voiceprint etc. arbitrarily can be used as the information of identification.Correspondingly, password authentification can be used corresponding identification technology such as fingerprint and know Not, iris recognition technology etc..
Further, processor 510 shows the target after second memory 530 searches out target private data Private data, and prompt the user whether to carry out secret protection, when getting secret protection instruction input by user, processor 510 couples of users select the target private data for carrying out privacy secrecy to carry out secret protection.
In present embodiment, processor 510 uses general standard encryption algorithms, such as international standard symmetric encipherment algorithm AES128/256 realize target private data be encrypted so that target private data be in can not read states, obtaining password When verification, the normal display target private data of realization privacy protection device.In another embodiment, processor can be used Concealing technology carries out secret protection to target private data.Specifically, processor deposits the target private data searched out from second The original storing directory of reservoir is moved in the default file folder of second memory, and to the default file sandwiched power of setting Limit or processor directly carry out priority assignation to the target private data searched out under original storing directory so that institute It states and realizes that all applications of privacy protection device cannot be to the default file folder of the setting permission or the mesh of direct setting permission Mark private data accesses, and guard mode is presented in display, when user needs to check target private data, carries out close Code verification, and password authentification by when, the realization privacy protection device temporarily obtains permission with display target private data. Alternatively, isolation technology can also be used in processor carries out secret protection to target private data.Specifically, processor is in second memory In isolate partial memory area domain, and the target private data searched out is moved under the original storing directory of second memory To the storage region of isolation, wherein the storage region of isolation, which is the application in the realization privacy protection device, to be accessed Region, user need password authentification when checking the storage region.It is such as double OS of multisystem in the realization privacy protection device When system, target private data can be also isolated in the high system environments of security level.
It should be noted that processor can select above-mentioned secret protection mode by system default, privacy guarantor can be also provided Interface is arranged in shield mode, for user's selecting to secret protection mode.In addition, the application processor to private data into The mode of row secret protection is also not limited to above-mentioned data encryption, hides and be isolated, other protected modes also can be used, right at this Secret protection mode is not construed as limiting.
Ground is advanced optimized, processor 510 is when detecting the newly deposit data of the second memory 530, described in judgement Whether data match with the characteristic and belong to the data type, match and belong to the characteristic in the data When the data type, secret protection is carried out using the data as target private data.
Further, processor 510 is preset password in the encrypted message of default input interface input in verification user When information, the target private data is shown.The realization privacy protection device, which is provided with, checks the target private data Interface, processor 510 are judging user when the encrypted message that the interface inputs is the encrypted message of user preset, then password It is verified, processor 510 makes the realization privacy protection device show the target private data.
Processor 510 is also receiving recovery private data instruction input by user, and gets password input by user Information and when being verified as preset password information, cancels the secrecy setting to the target private data.To object contact person Carry out secret protection when, it is described realize privacy protection device be provided with to object contact person restore private data interface, with When private data instruction is restored in family by the interface input for restoring private data, processor 510 makes the shifting realization privacy Protective device provides a user interface for password input, and processor 510 gets and obtained described in encrypted message input by user and verification When the encrypted message taken is preset password information, the target private data is restored to unprotected state.
The application realizes that privacy protection device is the mobile terminal that can be communicated, such as mobile phone, tablet computer.But at it In his embodiment, the realization privacy protection device is alternatively the equipment with store function, is not limited thereto.
Through the above scheme, the personal characteristics of the application combining target contact person, by the individual for obtaining object contact person Feature, and be identified using personal characteristics identification technology, the target private data of the object contact person is searched out, is realized To the automatic protection of the target private data of object contact person, moreover, by the different personal characteristics of contact person, it can be achieved that same When search out different types of target private data and make protection, even if need protect numerous types of data, such as with contact When the related all message of people, corresponds to different data types without user and be configured protection respectively, it is simple to operate.
In several embodiments provided herein, it should be understood that disclosed system, device and method can To realize by another way.For example, device embodiments described above are only schematical, for example, the mould The division of block or unit, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, for example (,) it is multiple Unit or component can be combined or can be integrated into another system, or some features can be ignored or not executed.It is another Point, shown or discussed mutual coupling, direct-coupling or communication connection can be by some interfaces, device or The INDIRECT COUPLING of unit or communication connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize present embodiment scheme Purpose.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, also may be used It, can also be during two or more units be integrated in one unit to be that each unit physically exists alone.It is above-mentioned integrated The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can be stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment(Can be personal computer, server or the network equipment etc.)Or processor(processor)It is each to execute the application The all or part of step of embodiment the method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory(RAM, Random Access Memory), magnetic disc or CD Etc. the various media that can store program code.

Claims (12)

1. a kind of method for realizing secret protection, which is characterized in that the method includes:
According to user input instruction, the data type of the target private data of pre- protection object contact person is obtained, wherein the number It is divided according to image type, text information type or audio types according to type;
According to the characteristic of the object contact person, search matches with the characteristic and belongs to the mesh of the data type Mark private data, wherein the characteristic is identifying the target private data of the object contact person;
Secrecy setting is carried out to the target private data;
Wherein, the type of the characteristic includes at least one of the name of object contact person, face feature, voiceprint;
Described search is matched with the characteristic and is specifically included the step of belonging to the target private data of the data type:
When the name that the classification of the characteristic is the object contact person, and the data type belongs to text information class When, the name comprising the object contact person is searched in local and belongs to the text information of the data type as the mesh Mark private data;
When the face feature that the classification of the characteristic is the object contact person, and the data type belongs to image class When, using face recognition technology, the image data of the data type is searched for containing the face feature and belonged in local As the target private data;
When the voiceprint that the classification of the characteristic is the object contact person, and the data type belongs to audio class When, using sound groove recognition technology in e, the audio data of the data type is searched for containing the voiceprint and belonged in local As the target private data.
2. according to the method described in claim 1, it is characterized in that, the characteristic according to the object contact person, is searched Before the step of rope matches with the characteristic and belongs to the target private data of the data type, further include:
Obtain the characteristic of the object contact person, wherein the characteristic acquires and is stored in local in advance;Or root According to user input instruction, the characteristic of object contact person described in instantaneous acquiring.
3. according to the method described in claim 2, it is characterized in that, described according to user input instruction, mesh described in instantaneous acquiring Mark contact person characteristic the step of include:
When the type of the characteristic includes face feature, by the personal images and the progress that obtain the object contact person Face datection, to obtain the face feature of the object contact person from the personal images as characteristic, as the spy When the type for levying data includes voiceprint, then the voiceprint of the object contact person is acquired as characteristic;When described When the type of characteristic includes name, the name information of the object contact person is acquired as characteristic.
4. according to the method described in claim 1, it is characterized in that, described carry out secrecy setting to the target private data Step specifically includes:
The target private data is encrypted, hidden or is isolated.
5. according to the method described in claim 1, it is characterized in that, the method further includes:
If detecting that new deposit data match with the characteristic and belong to the data type, using the data as Target private data carries out secrecy setting.
6. according to the method described in claim 1, it is characterized in that, the method further includes:
If the encrypted message for receiving user is preset password information, the target private data is shown;
And/or if the recovery private data for receiving user instructs, and the encrypted message for verifying user is preset password information, Then cancel the secrecy to the target private data to be arranged.
7. a kind of device for realizing secret protection, which is characterized in that described device has the information of object contact person, the dress It sets including acquisition module, search module and protection module;
The acquisition module is used to obtain the data of the target private data of pre- protection object contact person according to user input instruction Type, and the data type is sent to described search module, wherein the data type is believed according to image type, word It ceases type or audio types divides;
Described search module is used for the characteristic according to the object contact person, and search matches and belongs to the characteristic The target private data of the data type, and the target private data is sent to the protection module, wherein the spy Data are levied to identify the target private data of the object contact person;
The protection module to the target private data for carrying out secrecy setting;
Wherein, the type of the characteristic includes at least one of the name of object contact person, face feature, voiceprint;
Described search module includes name search unit, face's search unit and vocal print search unit;
The name search unit is used for when the name that the classification of the characteristic is the object contact person, and the data When type belongs to text information class, the name comprising the object contact person is searched in local and belongs to the data type Text information is as the target private data;
The classification that face's search unit is used to work as the characteristic is the face feature of the object contact person, and described When data type belongs to image class, using face recognition technology, is searched in local containing the face feature and belong to described The image data of data type is as the target private data;
The classification that the vocal print search unit is used to work as the characteristic is the voiceprint of the object contact person, and described When data type belongs to audio class, using sound groove recognition technology in e, is searched in local containing the voiceprint and belong to described The audio related data of data type is as the target private data.
8. device according to claim 7, which is characterized in that described search module includes acquiring unit, and the acquisition is single Characteristic of the member for obtaining the object contact person, wherein the characteristic acquires and is stored in local in advance;Or According to user input instruction, the characteristic of object contact person described in instantaneous acquiring.
9. device according to claim 8, which is characterized in that the acquiring unit is specifically used for when the characteristic When type includes face feature, by obtaining the personal images of the object contact person and carrying out Face datection, with from described The face feature of the object contact person is obtained in people's image as characteristic, when the type of the characteristic includes vocal print When information, then the voiceprint of the object contact person is acquired as characteristic;When the type of the characteristic includes surname When name, the name information of the object contact person is acquired as characteristic.
10. device according to claim 7, which is characterized in that the protection module is specifically used for the target privacy Data are encrypted, hide or are isolated.
11. device according to claim 7, which is characterized in that described device further includes detection module,
The detection module is used to detect that new deposit data match with the characteristic and when belonging to the data type, Secrecy setting is carried out using the data as target private data, and is sent to using the data as target private data described Protection module, to carry out secrecy setting to the data.
12. device according to claim 7, which is characterized in that described device further includes display module, the display module For when the encrypted message for receiving user is preset password information, showing the target private data;
And/or described device further includes recovery module, the recovery module in the recovery private data for receiving user for referring to When the encrypted message for enabling, and verifying user is preset password information, the secrecy is cancelled to the target private data and is arranged.
CN201310354236.0A 2013-08-14 2013-08-14 Realize method for secret protection and device Active CN104376011B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201810820632.0A CN109040439B (en) 2013-08-14 2013-08-14 Method and device for realizing privacy protection
CN201810819697.3A CN109117665A (en) 2013-08-14 2013-08-14 Realize method for secret protection and device
CN201310354236.0A CN104376011B (en) 2013-08-14 2013-08-14 Realize method for secret protection and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310354236.0A CN104376011B (en) 2013-08-14 2013-08-14 Realize method for secret protection and device

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN201810820632.0A Division CN109040439B (en) 2013-08-14 2013-08-14 Method and device for realizing privacy protection
CN201810819697.3A Division CN109117665A (en) 2013-08-14 2013-08-14 Realize method for secret protection and device

Publications (2)

Publication Number Publication Date
CN104376011A CN104376011A (en) 2015-02-25
CN104376011B true CN104376011B (en) 2018-08-17

Family

ID=52554929

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201810819697.3A Withdrawn CN109117665A (en) 2013-08-14 2013-08-14 Realize method for secret protection and device
CN201810820632.0A Active CN109040439B (en) 2013-08-14 2013-08-14 Method and device for realizing privacy protection
CN201310354236.0A Active CN104376011B (en) 2013-08-14 2013-08-14 Realize method for secret protection and device

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN201810819697.3A Withdrawn CN109117665A (en) 2013-08-14 2013-08-14 Realize method for secret protection and device
CN201810820632.0A Active CN109040439B (en) 2013-08-14 2013-08-14 Method and device for realizing privacy protection

Country Status (1)

Country Link
CN (3) CN109117665A (en)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106156636A (en) * 2015-03-24 2016-11-23 中兴通讯股份有限公司 A kind of method and apparatus of private information management
CN105160261A (en) * 2015-04-30 2015-12-16 北京车音网科技有限公司 File encryption and decryption method and device
CN105138885B (en) * 2015-08-22 2018-06-26 北京创鑫旅程网络技术有限公司 The method and electronic equipment of a kind of file encryption
CN106919849A (en) * 2015-12-24 2017-07-04 北京三星通信技术研究有限公司 Method for secret protection and device
CN105893865A (en) * 2015-12-31 2016-08-24 乐视移动智能信息技术(北京)有限公司 File processing method and device
CN107103245B (en) * 2016-02-23 2022-08-02 中兴通讯股份有限公司 File authority management method and device
CN106066967A (en) * 2016-05-26 2016-11-02 北京金山安全软件有限公司 Permission setting method and device
CN106778132B (en) * 2016-11-30 2019-08-13 Oppo广东移动通信有限公司 Control method, device and the mobile terminal of file process
CN106603913A (en) * 2016-12-12 2017-04-26 于平 Landscape photographing system
CN107315937A (en) * 2017-06-08 2017-11-03 努比亚技术有限公司 A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN107465810B (en) * 2017-07-11 2020-07-21 Oppo广东移动通信有限公司 Data control method and related product
CN107590465A (en) * 2017-09-14 2018-01-16 维沃移动通信有限公司 A kind of image processing method and mobile terminal
CN108206892B (en) * 2017-12-29 2021-04-09 努比亚技术有限公司 Method and device for protecting privacy of contact person, mobile terminal and storage medium
CN108345800A (en) * 2018-02-08 2018-07-31 王四春 The discovery of private data and sorting technique in a kind of cross-border electric business commercial affairs big data
CN109543424A (en) * 2018-11-05 2019-03-29 东软集团股份有限公司 Data-privacy guard method, device, system and storage medium
CN109784089A (en) * 2018-12-19 2019-05-21 平安普惠企业管理有限公司 Guard method, device, storage medium and the electronic equipment of customer information
CN109616114B (en) * 2018-12-29 2021-09-17 思必驰科技股份有限公司 System, configuration method and eavesdropping prevention method for preventing eavesdropping of intelligent terminal voice
CN110059498B (en) * 2019-03-21 2021-07-23 中国科学院计算技术研究所 Privacy control automatic setting method and system for social network
CN110298191A (en) * 2019-06-03 2019-10-01 Oppo广东移动通信有限公司 Information processing method and Related product
CN110414271A (en) * 2019-08-02 2019-11-05 Oppo(重庆)智能科技有限公司 A kind of private data guard method, device and computer readable storage medium
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment
CN112231758B (en) * 2020-11-03 2023-11-17 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN112528326B (en) * 2020-12-09 2024-01-02 维沃移动通信有限公司 Information processing method and device and electronic equipment
CN113378135B (en) * 2021-06-08 2023-08-25 华中科技大学 Method for inquiring and verifying privacy data of computer
CN114003880A (en) * 2021-10-27 2022-02-01 北京琥珀创想科技有限公司 Privacy protection method and system
CN115114667A (en) * 2022-08-26 2022-09-27 广州万协通信息技术有限公司 Privacy information processing and classifying method and device for security chip

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102915350A (en) * 2012-09-29 2013-02-06 北京小米科技有限责任公司 Method, device and equipment for searching contact information
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304453A (en) * 2008-06-17 2008-11-12 宇龙计算机通信科技(深圳)有限公司 Mobile terminal as well as method and system for data privacy
CN101483861A (en) * 2008-12-17 2009-07-15 北京亿企通信息技术有限公司 Method for mobile phone information safety protection
JP5429280B2 (en) * 2009-03-24 2014-02-26 日本電気株式会社 Data processing apparatus, computer program thereof, and data processing method
CN102006358A (en) * 2010-11-02 2011-04-06 深圳市金立通信设备有限公司 Mobile phone private communication management system and method
KR101714534B1 (en) * 2010-12-06 2017-03-09 삼성전자주식회사 Method and apparatus for providing privacy protecting function in mobile terminal
CN102594555B (en) * 2011-01-17 2015-04-29 华为技术有限公司 Security protection method for data, entity on network side and communication terminal
CN103164441B (en) * 2011-12-14 2017-09-19 富泰华工业(深圳)有限公司 Based on electronic installation and method of the face feature value to picture classification
WO2013111913A2 (en) * 2012-01-27 2013-08-01 Nec Corporation Privacy issues in m2m
CN102819726B (en) * 2012-06-27 2016-08-24 宇龙计算机通信科技(深圳)有限公司 photo processing system and method for mobile terminal
CN107274916B (en) * 2012-12-05 2021-08-20 北京三星通信技术研究有限公司 Method and device for operating audio/video file based on voiceprint information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102915350A (en) * 2012-09-29 2013-02-06 北京小米科技有限责任公司 Method, device and equipment for searching contact information
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal

Also Published As

Publication number Publication date
CN109117665A (en) 2019-01-01
CN109040439B (en) 2021-01-12
CN109040439A (en) 2018-12-18
CN104376011A (en) 2015-02-25

Similar Documents

Publication Publication Date Title
CN104376011B (en) Realize method for secret protection and device
Lu et al. Lippass: Lip reading-based user authentication on smartphones leveraging acoustic signals
CN109255211B (en) Mobile security countermeasure
Price Rethinking privacy: Fourth amendment papers and the third-party doctrine
Gomez-Barrero et al. Biometrics in the era of COVID-19: challenges and opportunities
Finn et al. Seven types of privacy
Farahany Searching secrets
Narain et al. Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning
US20220094550A1 (en) User movement and behavioral tracking for security and suspicious activities
Zeng et al. Responsible facial recognition and beyond
CN103678977A (en) Method and electronic device for protecting information security
US10242214B2 (en) Dynamic change in plurality of security layers based on projected risk
Pell You can't always get what you want: how will law enforcement get what it needs in a post-CALEA, Cybsecurity-Centric Encryption Era
Bustard The impact of EU privacy legislation on biometric system deployment: Protecting citizens but constraining applications
Ringrose et al. Watch where you walk: law enforcement surveillance and protester privacy
CN106940764A (en) A kind of user authentication method and terminal device
CN110088758A (en) Server apparatus, approaches to IM, information processing equipment, information processing method and program
Kannavara et al. Topics in biometric human-machine interaction security
Snijder Biometrics, surveillance and privacy
CN106357413A (en) Method for encrypting numbers with fingerprint and mobile terminal
Sabater Biometrics as password alternative
Toli et al. Provoking security: Spoofing attacks against crypto-biometric systems
CN110287730A (en) Private file processing method and relevant device
CN107992762A (en) Information is classified and the method, apparatus and terminal of display information
US11868493B2 (en) Work-from-home agent security compliance

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20171106

Address after: Metro Songshan Lake high tech Industrial Development Zone, Guangdong Province, Dongguan City Road 523808 No. 2 South Factory (1) project B2 -5 production workshop

Applicant after: HUAWEI terminal (Dongguan) Co., Ltd.

Address before: 518100 Longgang District, Guangdong, Bantian HUAWEI base B District, building 2, building No.

Applicant before: Huawei Device Co., Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 523808 Southern Factory Building (Phase I) Project B2 Production Plant-5, New Town Avenue, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee after: Huawei Device Co., Ltd.

Address before: 523808 Southern Factory Building (Phase I) Project B2 Production Plant-5, New Town Avenue, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee before: HUAWEI terminal (Dongguan) Co., Ltd.

CP01 Change in the name or title of a patent holder