CN104598784A - Information processing method and electronic device - Google Patents

Information processing method and electronic device Download PDF

Info

Publication number
CN104598784A
CN104598784A CN201410836979.6A CN201410836979A CN104598784A CN 104598784 A CN104598784 A CN 104598784A CN 201410836979 A CN201410836979 A CN 201410836979A CN 104598784 A CN104598784 A CN 104598784A
Authority
CN
China
Prior art keywords
information
electronic equipment
identification module
intelligent identification
storage space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410836979.6A
Other languages
Chinese (zh)
Inventor
王震中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201410836979.6A priority Critical patent/CN104598784A/en
Publication of CN104598784A publication Critical patent/CN104598784A/en
Pending legal-status Critical Current

Links

Abstract

The embodiment of the invention discloses an information processing method which is applied to an electronic device. At least one intelligent identification module can be arranged in the electronic device. User identity information of the electronic device is stored in the intelligent identification modules and used for identity authentication of the electronic device when the electronic device has access to a communication network. The method comprises the steps that when a first command is received, whether the intelligent identification module exists is detected, and a first detection result is generated, wherein the first command is used for controlling the electronic device to conduct data operation on a first memory space in the electronic device; according to the first detection result, the first command is executed or omitted. The invention further discloses the electronic device. The safety of private information can be improved, and the risk of private information leakage is reduced.

Description

A kind of information processing method and electronic equipment
Technical field
The present invention relates to the information processing technology, be specifically related to a kind of information processing method and electronic equipment.
Background technology
In recent years, the user's private information stored in frequent generating electronic equipment is if I.D., bank card password etc. are by the event of leaking.Wherein, electronic equipment such as the mobile phone that leakage of information occurs only adopts software privacy method to carry out security protection as arranged Crypted password to private information usually, but set Crypted password is easy to be cracked, and security is not high.How to improve and technical matters urgently to be resolved hurrily is become to the security protection of private information.
Summary of the invention
For solving the technical matters of existing existence, the embodiment of the present invention is to provide a kind of information processing method and electronic equipment, can improve the security of private information, reduces the risk that private information leaks, and promotes Consumer's Experience.
The technical scheme of the embodiment of the present invention is achieved in that
Embodiments provide a kind of information processing method, be applied in an electronic equipment, in described electronic equipment, at least one intelligent identification module can be set; Described intelligent identification module stores the subscriber identity information of described electronic equipment, and described subscriber identity information is used for the identity verify of described electronic equipment when connecting communication network; Described method comprises:
When receiving the first instruction, detecting described intelligent identification module and whether existing, and generating the first testing result;
Wherein, described first instruction carries out data manipulation for controlling first storage space of described electronic equipment to its inside;
According to described first testing result, perform or ignore described first instruction.
In such scheme, described method comprises:
When described first testing result characterize described intelligent identification module exist time, respond described first instruction, first storage space is opened, and controls described electronic equipment and the first data is write to described first storage space or read the first data from described first storage space or delete the first data described first storage space.
In such scheme, described method also comprises:
When described first testing result characterize described intelligent identification module do not exist time, do not respond described first instruction.
In such scheme, when described first testing result characterize described intelligent identification module exist time, described method also comprises:
Obtain the first information, the described first information is used for the first authentication information of characterizing consumer input;
Obtain the subscriber identity information in described intelligent identification module;
Judge whether the first information mates with described subscriber identity information;
When being judged as the first information and described subscriber identity information matches, perform described first instruction.
In such scheme, described method also comprises:
The first information and described subscriber identity information are carried out similarity comparison, obtains the first comparison result;
Judge described first comparison result whether first predetermined condition;
When described first comparison result first predetermined condition, be judged as that the described first information and described subscriber identity information match.
The embodiment of the present invention additionally provides a kind of electronic equipment, can arrange at least one intelligent identification module in described electronic equipment; Described intelligent identification module stores the subscriber identity information of described electronic equipment, and described subscriber identity information is used for the identity verify of described electronic equipment when connecting communication network; Described electronic equipment comprises:
Whether the first detecting unit, for when receiving the first instruction, detecting described intelligent identification module and existing, and generating the first testing result; Wherein, described first instruction carries out data manipulation for controlling first storage space of described electronic equipment to its inside;
First processing unit, for according to described first testing result, performs or ignores described first instruction.
In such scheme, described first processing unit, also for:
When described first testing result characterize described intelligent identification module exist time, respond described first instruction, first storage space is opened, and controls described electronic equipment and the first data is write to described first storage space or read the first data from described first storage space or delete the first data described first storage space.
In such scheme, described first processing unit, also for:
When described first testing result characterize described intelligent identification module do not exist time, do not respond described first instruction.
In such scheme, described electronic equipment also comprises the second processing unit, for:
When determine the first testing result that described first detecting unit generates characterize described intelligent identification module exist time, obtain the first information, the described first information is used for the first authentication information of characterizing consumer input;
Obtain the subscriber identity information in described intelligent identification module;
Judge whether the first information mates with described subscriber identity information;
When being judged as the first information and described subscriber identity information matches, trigger the first processing unit;
Accordingly, described first processing unit, for performing described first instruction.
In such scheme, described second processing unit, also for:
The first information and described subscriber identity information are carried out similarity comparison, obtains the first comparison result;
Judge described first comparison result whether first predetermined condition;
When described first comparison result first predetermined condition, be judged as that the described first information and described subscriber identity information match.
The information processing method that the embodiment of the present invention provides and electronic equipment, wherein, described method is applied in an electronic equipment, can arrange at least one intelligent identification module in described electronic equipment; Described intelligent identification module stores the subscriber identity information of described electronic equipment, and described subscriber identity information is used for the identity verify of described electronic equipment when connecting communication network; Whether described method comprises: when receiving the first instruction, detect described intelligent identification module and exist, and generate the first testing result; Wherein, described first instruction carries out data manipulation for controlling first storage space of described electronic equipment to its inside; According to described first testing result, perform or ignore described first instruction.As can be seen here, according to whether being inserted with intelligent identification module, determine whether to operate the data of the first storage space, by this physical entity of intelligent identification module itself as the key opening the first storage space, the security of private information can be improved, reduce the risk that private information leaks, promote Consumer's Experience.
Accompanying drawing explanation
Fig. 1 is the realization flow schematic diagram of the first embodiment of information processing method provided by the invention;
Fig. 2 is the realization flow schematic diagram of the second embodiment of information processing method provided by the invention;
Fig. 3 is the composition structural representation of the first embodiment of electronic equipment provided by the invention;
Fig. 4 is the composition structural representation of the second embodiment of electronic equipment provided by the invention.
Embodiment
Below in conjunction with accompanying drawing to a preferred embodiment of the present invention will be described in detail, should be appreciated that following illustrated preferred embodiment is only for instruction and explanation of the present invention, is not intended to limit the present invention.
In the following embodiment of information processing method provided by the invention and electronic equipment, involved electronic equipment includes but not limited to: all kinds such as industrial control computer, personal computer computing machine, integral computer, panel computer, mobile phone, electronic reader etc.The object of the preferred electronic equipment of the embodiment of the present invention is mobile phone.
Embodiment of the method one
First embodiment of information processing method provided by the invention, is applied in an electronic equipment, can arranges at least one intelligent identification module in described electronic equipment; Described intelligent identification module stores the subscriber identity information of described electronic equipment, and described subscriber identity information is used for the identity verify of described electronic equipment when connecting communication network.Wherein, described intelligent identification module can be one of them kind following: subscriber identification card (SIM, Subscriber Identity Module), universal subscriber identity card (USIM, UniversalSubscriber Identity Module), removable Subscriber Identity Module (RUIM, Removable User IdentityModule) or common user identification card (UIM, Universal Subscriber Identity Module).Wherein, described subscriber identity information can international mobile subscriber identity (IMSI, International Mobile Subscriber Identification Number) in the intelligent identification module that is inserted with of electronic equipment, the text password, fingerprint, speech cipher etc. that also can pre-set for user.
Fig. 1 is the realization flow schematic diagram of the first embodiment of information processing method provided by the invention; As shown in Figure 1, described method comprises:
Whether step 101: when receiving the first instruction, detect described intelligent identification module and exist, and generate the first testing result; Wherein, described first instruction carries out data manipulation for controlling first storage space of described electronic equipment to its inside;
Here, described first instruction can for detecting the instruction of user to the first operation of described electronic equipment, described first operation can for the touch control operation of the function key pre-set or voice operating, and the function of described first function key carries out the deletion of data, interpolation or reading etc. for making first storage space of electronic equipment to its inside.Described first storage space is pre-configured, for storing the private information of user as information such as ID (identity number) card information, bank card number, individual register account number and passwords.Considering in real life the possibility having user and the data in the electronic equipment of just start are processed, so described first instruction can be also start-up command, when start-up command being detected, thinking that user has the purpose of the data of amendment first storage space.In addition, consider safety in utilization, a sense cycle can be pre-set, when sense cycle arrives, generate the first instruction, whether be inserted with intelligent identification module with detected electrons equipment.
Wherein, detect the signal that is inserted with on the interface of intelligent identification module, when to detect this signal be the first predetermined value as 1 time, determine that current electronic device has been inserted with intelligent identification module and has currently there is intelligent identification module; When detection signal be the second predetermined value as 0 time, determine that current electronic device is not inserted with intelligent identification module and currently there is not intelligent identification module.
Step 102: according to described first testing result, performs or ignores described first instruction.
Here, consider the security of personal information, first storage space is in closed condition under normal circumstances, when detecting that current electronic device is inserted with intelligent identification module, respond described first instruction, open the first storage space, the first data such as the private information stored in first storage space is read, delete or write private information to the first storage space, such as read the private information that the user stored in the first storage space wants to check, or delete the private information that the user stored in the first storage space does not want to retain, or private information to the first storage space that write user specifies.When detecting that current electronic device is not inserted with intelligent identification module, electronic equipment shielding first instruction, to ignore the operation to the private information in the first storage space, now the first storage space is still in closed condition.Generally, in the present embodiment, the first storage space storing private information is equivalent to door, and intelligent identification module inherently opens this key as an object entity, if there is no this key, the first storage space cannot be opened, more cannot the data in the first storage space be obtained.
Preferably, when described first testing result is not inserted with intelligent identification module for characterizing described electronic equipment, described electronic equipment generates the second instruction, and performs the second instruction, and described second instruction is for deleting the instruction of the data in described first storage space.Further, consider that electronic equipment exists the possibility of losing, when detect be not inserted with intelligent identification module time, be reduce the risk of leakage of private information, need to delete the data in the first storage space.
Preferably, consider the importance that private information backs up, when storing the private information of the first storage space, described private information can be sent in advance at the second storage space being used for storing or backing up private information that server, specifically cloud server are opened up by described electronic equipment, and this second storage space is set to closed condition usually.When after the request receiving described electronic equipment, server, specifically cloud server obtain the subscriber identity information of described electronic equipment as IMSI, when identifying user identity information is effective SIM card by the SIM card that such as this IMSI is corresponding, open the second storage space, electronic device uploading data to the second storage space, to upgrade the data in the second storage space; Or, the data backed up are obtained from the second storage space.
As can be seen here, in the embodiment of the present invention, whether detected electrons equipment is inserted with intelligent identification module, being detected as when being inserted with intelligent identification module, opening the storage space for storing private information, to operate the data in storage space; Otherwise, close storage space, to shield the renewal rewards theory to private information.In the present embodiment, consider that intelligent identification module itself has a specificity IMSI as corresponding in each SIM card, depending on the key that this object entity of intelligent identification module is electronic equipment execution amendment private data function, improve the security of private information, reduce private information by the risk of leaking, promote Consumer's Experience.
Embodiment of the method two
Second embodiment of information processing method provided by the invention, is applied in an electronic equipment, can arranges at least one intelligent identification module in described electronic equipment; Described intelligent identification module stores the subscriber identity information of described electronic equipment, and described subscriber identity information is used for the identity verify of described electronic equipment when connecting communication network.Wherein, described intelligent identification module can be one of them kind following: subscriber identification card (SIM, Subscriber Identity Module), universal subscriber identity card (USIM, UniversalSubscriber Identity Module), removable Subscriber Identity Module (RUIM, Removable User IdentityModule) or common user identification card (UIM, Universal Subscriber Identity Module).Wherein, described subscriber identity information can international mobile subscriber identity (IMSI, International Mobile Subscriber Identification Number) in the intelligent identification module that is inserted with of electronic equipment, the text password, fingerprint, speech cipher etc. that also can pre-set for user.
Fig. 2 is the realization flow schematic diagram of the second embodiment of information processing method provided by the invention; As shown in Figure 2, described method comprises:
Whether step 201: when receiving the first instruction, detect described intelligent identification module and exist, and generate the first testing result; Wherein, described first instruction carries out data manipulation for controlling first storage space of described electronic equipment to its inside;
Here, described first instruction can for detecting the instruction of user to the first operation of described electronic equipment, described first operation can for the touch control operation of the function key pre-set or voice operating, and the function of described first function key carries out the deletion of data, interpolation or reading etc. for making first storage space of electronic equipment to its inside.Described first storage space is pre-configured, for storing the private information of user as information such as ID (identity number) card information, bank card number, individual register account number and passwords.Considering in real life the possibility having user and the data in the electronic equipment of just start are processed, so described first instruction can be also start-up command, when start-up command being detected, thinking that user has the purpose of the data of amendment first storage space.In addition, consider safety in utilization, a sense cycle can be pre-set, when sense cycle arrives, generate the first instruction, whether be inserted with intelligent identification module with detected electrons equipment.
Wherein, detect the signal that is inserted with on the interface of intelligent identification module, when to detect this signal be the first predetermined value as 1 time, determine that current electronic device has been inserted with intelligent identification module and has currently there is intelligent identification module; When detection signal be the second predetermined value as 0 time, determine that current electronic device is not inserted with intelligent identification module and currently there is not intelligent identification module.
Step 202: when described first testing result characterize described intelligent identification module exist time, obtain the first information, the described first information be used for characterizing consumer input the first authentication information;
Here, consider the security of personal information, the first storage space is in closed condition under normal circumstances, when detecting that current electronic device is inserted with intelligent identification module, identifies the finger-print cipher that the first authentication information of user's input pre-sets as user; Wherein, the described first information is fingerprint; In addition, the described first information text password, speech cipher etc. that can also pre-set for user.When electronic equipment detects that user is provided with encrypted message, this encrypted message is stored in intelligent identification module by electronic equipment.
Step 203: obtain the subscriber identity information in described intelligent identification module;
Here, described electronic equipment reads in the finger-print cipher that intelligent identification module stores.
Step 204: judge whether the first information mates with described subscriber identity information;
Here, the first information and described subscriber identity information are carried out similarity comparison, obtains the first comparison result; Judge described first comparison result whether first predetermined condition; When described first comparison result first predetermined condition, be judged as that the described first information and described subscriber identity information match.Concrete, the finger print information of the current input of user detected and the finger print information of reading are carried out the comparison of fingerprint characteristic by described electronic equipment, obtain the first similarity, when the first similarity higher than a predetermined value as 70% time, determine that the finger print information of the current input of user is consistent with read finger print information, the user with described finger print information is the owner of validated user as this electronic equipment.
Step 205: when being judged as the first information and described subscriber identity information matches, performs described first instruction.
Here, when being judged as the first information and described subscriber identity information matches, such as, when determining that the finger print information of the current input of user is consistent with read finger print information, determine that the current user wanting to process private information is validated user, described first instruction of described electronic equipment response, open the first storage space, read the private information that the user stored in the first storage space wants to check, or delete the private information that the user stored in the first storage space does not want to retain, or private information to the first storage space that write user specifies.
Preferably, when described first testing result is not inserted with intelligent identification module for characterizing described electronic equipment, described electronic equipment generates the second instruction, and performs the second instruction, and described second instruction is for deleting the instruction of the data in described first storage space.Further, consider that electronic equipment exists the possibility of losing, when detect be not inserted with intelligent identification module time, be reduce the risk of leakage of private information, need to delete the data in the first storage space.
Preferably, consider the importance that private information backs up, when storing the private information of the first storage space, described private information can be sent in advance at the second storage space being used for storing or backing up private information that server, specifically cloud server are opened up by described electronic equipment, and this second storage space is set to closed condition usually.When after the request receiving described electronic equipment, server, specifically cloud server obtains the IMSI of described electronic equipment, after the SIM card that this IMSI of checking is corresponding is effective SIM card, can again authentication of users input the first authentication information as user input when login cloud server the login password that uses, or login username and password, when cloud server verifies that the first authentication information is legal, determine that the user is validated user, allow the login of electronic equipment, open the second storage space, electronic device uploading data to the second storage space, to upgrade the data in the second storage space, and/or, the data backed up are obtained from the second storage space.
As can be seen here, in the present embodiment, detect electronic equipment be inserted with intelligent identification module and authentication of users input subscriber identity information legal after, the storage space for storing private information can be opened, achieve the double protection to storage space, improve the security of private information, reduce the risk that private information leaks, improve Consumer's Experience.
Electronic equipment embodiment one
First embodiment of electronic equipment provided by the invention, can arrange at least one intelligent identification module in described electronic equipment; Described intelligent identification module stores the subscriber identity information of described electronic equipment, and described subscriber identity information is used for the identity verify of described electronic equipment when connecting communication network.Wherein, described intelligent identification module can be one of them kind following: subscriber identification card (SIM, Subscriber IdentityModule), universal subscriber identity card (USIM, Universal Subscriber Identity Module), removable Subscriber Identity Module (RUIM, Removable User Identity Module) or common user identification card (UIM, Universal Subscriber Identity Module).Wherein, described subscriber identity information can international mobile subscriber identity (IMSI, InternationalMobile Subscriber Identification Number) in the intelligent identification module that is inserted with of electronic equipment, the text password, fingerprint, speech cipher etc. that also can pre-set for user.
Fig. 3 is the composition structural representation of the first embodiment of electronic equipment provided by the invention; As shown in Figure 3, described electronic equipment comprises: the first detecting unit 301, first processing unit 302; Wherein,
Whether the first detecting unit 301, for when receiving the first instruction, detecting described intelligent identification module and existing, and generating the first testing result; Wherein, described first instruction carries out data manipulation for controlling first storage space of described electronic equipment to its inside;
Here, described first instruction can be that the first detecting unit 301 detects the instruction of user to the first operation of described electronic equipment, described first operation can for the touch control operation of the function key pre-set or voice operating, and the function of described first function key carries out the deletion of data, interpolation or reading etc. for making first storage space of electronic equipment to its inside.Described first storage space is pre-configured, for storing the private information of user as information such as ID (identity number) card information, bank card number, individual register account number and passwords.Consider in real life the possibility having user and the data in the electronic equipment of just start are processed, so described first instruction also can be start-up command, when the first detecting unit 301 detects start-up command, think that user has the purpose of the data of amendment first storage space.In addition, consider safety in utilization, a sense cycle can be pre-set, when the first detecting unit 301 sense cycle arrives, generate the first instruction, whether be inserted with intelligent identification module with detected electrons equipment.
Wherein, the first detecting unit 301 detects the signal be inserted with on the interface of intelligent identification module, when to detect this signal be the first predetermined value as 1 time, determine that current electronic device has been inserted with intelligent identification module and has currently there is intelligent identification module; When detection signal be the second predetermined value as 0 time, the first detecting unit 301 determines that current electronic device is not inserted with intelligent identification module and currently there is not intelligent identification module.
First processing unit 302, for according to described first testing result, performs or ignores described first instruction.
Here, consider the security of personal information, first storage space is in closed condition under normal circumstances, when the testing result that the first detecting unit 301 generates for characterize current be inserted with intelligent identification module time, first processing unit 302 responds described first instruction, open the first storage space, the first data such as the private information stored in first storage space is read, delete or write private information to the first storage space, such as the first processing unit 302 reads the private information that the user stored in the first storage space wants to check, or delete the private information that the user stored in the first storage space does not want to retain, or private information to the first storage space that write user specifies.When the testing result that the first detecting unit 301 generates is not inserted with intelligent identification module for characterizing, electronic equipment, specifically the first processing unit 302 shield the first instruction, to ignore the operation to the private information in the first storage space, now the first storage space is still in closed condition.Generally, in the present embodiment, the first storage space storing private information is equivalent to door, and intelligent identification module inherently opens this key as an object entity, if there is no this key, the first storage space cannot be opened, more cannot the data in the first storage space be obtained.
Preferably, when described first testing result that the first detecting unit 301 generates is not inserted with intelligent identification module for characterizing described electronic equipment, described electronic equipment, specifically the first processing unit 302 generate the second instruction, and performing the second instruction, described second instruction is for deleting the instruction of the data in described first storage space.Further, consider that electronic equipment exists the possibility of losing, when described first testing result that the first detecting unit 301 generates is not inserted with intelligent identification module for characterizing, for reducing the risk of leakage of private information, the first processing unit 302 is deleted the data in the first storage space.
Preferably, consider the importance that private information backs up, when storing the private information of the first storage space, described private information can be sent in advance at the second storage space being used for storing or backing up private information that server, specifically cloud server are opened up by described electronic equipment, specifically the first transmitting element (not illustrating in Fig. 3), and this second storage space is set to closed condition usually.When after the request receiving described electronic equipment, specifically described first transmitting element, server, specifically cloud server obtain the subscriber identity information of described electronic equipment as IMSI, when identifying user identity information is effective SIM card by the SIM card that such as this IMSI is corresponding, open the second storage space, electronic device uploading data to the second storage space, to upgrade the data in the second storage space; Or, the data backed up are obtained from the second storage space.
As can be seen here, in the embodiment of the present invention, whether detected electrons equipment is inserted with intelligent identification module, being detected as when being inserted with intelligent identification module, opening the storage space for storing private information, to operate the data in storage space; Otherwise, close storage space, to shield the renewal rewards theory to private information.In the present embodiment, consider that intelligent identification module itself has a specificity IMSI as corresponding in each SIM card, depending on the key that this object entity of intelligent identification module is electronic equipment execution amendment private data function, improve the security of private information, reduce private information by the risk of leaking, promote Consumer's Experience.
Electronic equipment embodiment two
Second embodiment of electronic equipment provided by the invention, can arrange at least one intelligent identification module in described electronic equipment; Described intelligent identification module stores the subscriber identity information of described electronic equipment, and described subscriber identity information is used for the identity verify of described electronic equipment when connecting communication network.Wherein, described intelligent identification module can be one of them kind following: subscriber identification card (SIM, Subscriber IdentityModule), universal subscriber identity card (USIM, Universal Subscriber Identity Module), removable Subscriber Identity Module (RUIM, Removable User Identity Module) or common user identification card (UIM, Universal Subscriber Identity Module).Wherein, described subscriber identity information can international mobile subscriber identity (IMSI, InternationalMobile Subscriber Identification Number) in the intelligent identification module that is inserted with of electronic equipment, the text password, fingerprint, speech cipher etc. that also can pre-set for user.
Fig. 4 is the composition structural representation of the second embodiment of electronic equipment provided by the invention; As shown in Figure 4, described electronic equipment comprises: the first detecting unit 401, second processing unit 402, first processing unit 403; Wherein,
Whether the first detecting unit 401, for when receiving the first instruction, detecting described intelligent identification module and existing, and generating the first testing result; Wherein, described first instruction carries out data manipulation for controlling first storage space of described electronic equipment to its inside;
Here, described first instruction can be that the first detecting unit 401 detects the instruction of user to the first operation of described electronic equipment, described first operation can for the touch control operation of the function key pre-set or voice operating, and the function of described first function key carries out the deletion of data, interpolation or reading etc. for making first storage space of electronic equipment to its inside.Described first storage space is pre-configured, for storing the private information of user as information such as ID (identity number) card information, bank card number, individual register account number and passwords.Consider in real life the possibility having user and the data in the electronic equipment of just start are processed, so described first instruction also can be start-up command, when the first detecting unit 401 detects start-up command, think that user has the purpose of the data of amendment first storage space.In addition, consider safety in utilization, a sense cycle can be pre-set, when the first detecting unit 401 sense cycle arrives, generate the first instruction, whether be inserted with intelligent identification module with detected electrons equipment.
Wherein, the first detecting unit 401 detects the signal be inserted with on the interface of intelligent identification module, when to detect this signal be the first predetermined value as 1 time, determine that current electronic device has been inserted with intelligent identification module and has currently there is intelligent identification module; When detection signal be the second predetermined value as 0 time, the first detecting unit 401 determines that current electronic device is not inserted with intelligent identification module and currently there is not intelligent identification module.
Second processing unit 402, for when determine the first testing result that described first detecting unit 401 generates characterize described intelligent identification module exist time, obtain the first information, the described first information is used for the first authentication information of characterizing consumer input; Obtain the subscriber identity information in described intelligent identification module; Judge whether the first information mates with described subscriber identity information; When being judged as the first information and described subscriber identity information matches, trigger the first processing unit 403;
Accordingly, described first processing unit 403, for performing described first instruction.
Here, consider the security of personal information, first storage space is in closed condition under normal circumstances, when the testing result that the first detecting unit 401 generates is inserted with intelligent identification module for sign, described electronic equipment, specifically the second processing unit 402 identify the finger-print cipher that the first authentication information that user inputs pre-sets as user; Wherein, the described first information is fingerprint; In addition, the described first information text password, speech cipher etc. that can also pre-set for user.Described electronic equipment, specifically the second processing unit 402 read in the subscriber identity information that intelligent identification module stores, and the first information and described subscriber identity information are carried out similarity comparison, obtains the first comparison result; Judge described first comparison result whether first predetermined condition; When described first comparison result first predetermined condition, be judged as that the described first information and described subscriber identity information match.Concrete, the finger print information of the current input of user detected and the finger print information of reading are carried out the comparison of fingerprint characteristic by described electronic equipment, specifically the second processing unit 402, obtain the first similarity, when the first similarity higher than a predetermined value as 70% time, determine that the finger print information of the current input of user is consistent with read finger print information, the user with described finger print information is the owner of validated user as this electronic equipment.When determining the current user wanting to process private information for validated user, second processing unit 402 triggers the first processing unit 403, respond described first instruction, first processing unit 403 opens the first storage space, read the private information that the user stored in the first storage space wants to check, or delete the private information that the user stored in the first storage space does not want to retain, or private information to the first storage space that write user specifies.
Preferably, when the first testing result that the first detecting unit 401 generates is not inserted with intelligent identification module for characterizing described electronic equipment, described electronic equipment, specifically the first processing unit 403 generate the second instruction, and performing the second instruction, described second instruction is for deleting the instruction of the data in described first storage space.Further, consider electronic equipment exist lose possibility, when the first detecting unit 401 detect be not inserted with intelligent identification module time, the first processing unit 403 is deleted the data in the first storage space.
Preferably, consider the importance that private information backs up, when storing the private information of the first storage space, described private information can be sent in advance at the second storage space being used for storing or backing up private information that server, specifically cloud server are opened up by described electronic equipment, specifically the first transmitting element (not illustrating in Fig. 4), and this second storage space is set to closed condition usually.When receiving described electronic equipment, after the request that specifically described first transmitting element sends, server, specifically cloud server obtains the IMSI of described electronic equipment, after the SIM card that this IMSI of checking is corresponding is effective SIM card, can again authentication of users input the first authentication information as user input when login cloud server the login password that uses, or login username and password, when cloud server verifies that the first authentication information is legal, determine that the user is validated user, allow the login of electronic equipment, open the second storage space, electronic device uploading data to the second storage space, to upgrade the data in the second storage space, and/or, the data backed up are obtained from the second storage space.
As can be seen here, in the present embodiment, detect electronic equipment be inserted with intelligent identification module and authentication of users input subscriber identity information legal after, the storage space for storing private information can be opened, achieve the double protection to storage space, improve the security of private information, reduce the risk that private information leaks, improve Consumer's Experience.
In several embodiments that the application provides, should be understood that disclosed equipment and method can realize by another way.Apparatus embodiments described above is only schematic, such as, the division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, and as: multiple unit or assembly can be in conjunction with, maybe can be integrated into another system, or some features can be ignored, or do not perform.In addition, the coupling each other of shown or discussed each ingredient or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of equipment or unit or communication connection can be electrical, machinery or other form.
The above-mentioned unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, also can be distributed in multiple network element; Part or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in various embodiments of the present invention can all be integrated in a processing unit, also can be each unit individually as a unit, also can two or more unit in a unit integrated; Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form that hardware also can be adopted to add SFU software functional unit realizes.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can have been come by the hardware that programmed instruction is relevant, aforesaid program can be stored in a computer read/write memory medium, this program, when performing, performs the step comprising said method embodiment; And aforesaid storage medium comprises: movable storage device, ROM (read-only memory) (ROM, Read-Only Memory), magnetic disc or CD etc. various can be program code stored medium.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of described claim.

Claims (10)

1. an information processing method, is applied in an electronic equipment, can arranges at least one intelligent identification module in described electronic equipment; Described intelligent identification module stores the subscriber identity information of described electronic equipment, and described subscriber identity information is used for the identity verify of described electronic equipment when connecting communication network; Described method comprises:
When receiving the first instruction, detecting described intelligent identification module and whether existing, and generating the first testing result;
Wherein, described first instruction carries out data manipulation for controlling first storage space of described electronic equipment to its inside;
According to described first testing result, perform or ignore described first instruction.
2. method according to claim 1, is characterized in that, described method comprises:
When described first testing result characterize described intelligent identification module exist time, respond described first instruction, first storage space is opened, and controls described electronic equipment and the first data is write to described first storage space or read the first data from described first storage space or delete the first data described first storage space.
3. method according to claim 1 and 2, is characterized in that, described method also comprises:
When described first testing result characterize described intelligent identification module do not exist time, do not respond described first instruction.
4. method according to claim 1, is characterized in that, when described first testing result characterize described intelligent identification module exist time, described method also comprises:
Obtain the first information, the described first information is used for the first authentication information of characterizing consumer input;
Obtain the subscriber identity information in described intelligent identification module;
Judge whether the first information mates with described subscriber identity information;
When being judged as the first information and described subscriber identity information matches, perform described first instruction.
5. method according to claim 4, is characterized in that, described method also comprises:
The first information and described subscriber identity information are carried out similarity comparison, obtains the first comparison result;
Judge described first comparison result whether first predetermined condition;
When described first comparison result first predetermined condition, be judged as that the described first information and described subscriber identity information match.
6. an electronic equipment, can arrange at least one intelligent identification module in described electronic equipment; Described intelligent identification module stores the subscriber identity information of described electronic equipment, and described subscriber identity information is used for the identity verify of described electronic equipment when connecting communication network; Described electronic equipment comprises:
Whether the first detecting unit, for when receiving the first instruction, detecting described intelligent identification module and existing, and generating the first testing result; Wherein, described first instruction carries out data manipulation for controlling first storage space of described electronic equipment to its inside;
First processing unit, for according to described first testing result, performs or ignores described first instruction.
7. electronic equipment according to claim 6, is characterized in that, described first processing unit, also for:
When described first testing result characterize described intelligent identification module exist time, respond described first instruction, first storage space is opened, and controls described electronic equipment and the first data is write to described first storage space or read the first data from described first storage space or delete the first data described first storage space.
8. electronic equipment according to claim 6, is characterized in that, described first processing unit, also for:
When described first testing result characterize described intelligent identification module do not exist time, do not respond described first instruction.
9. electronic equipment according to claim 6, is characterized in that, described electronic equipment also comprises the second processing unit, for:
When determine the first testing result that described first detecting unit generates characterize described intelligent identification module exist time, obtain the first information, the described first information is used for the first authentication information of characterizing consumer input;
Obtain the subscriber identity information in described intelligent identification module;
Judge whether the first information mates with described subscriber identity information;
When being judged as the first information and described subscriber identity information matches, trigger the first processing unit;
Accordingly, described first processing unit, for performing described first instruction.
10. electronic equipment according to claim 9, is characterized in that, described second processing unit, also for:
The first information and described subscriber identity information are carried out similarity comparison, obtains the first comparison result;
Judge described first comparison result whether first predetermined condition;
When described first comparison result first predetermined condition, be judged as that the described first information and described subscriber identity information match.
CN201410836979.6A 2014-12-29 2014-12-29 Information processing method and electronic device Pending CN104598784A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410836979.6A CN104598784A (en) 2014-12-29 2014-12-29 Information processing method and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410836979.6A CN104598784A (en) 2014-12-29 2014-12-29 Information processing method and electronic device

Publications (1)

Publication Number Publication Date
CN104598784A true CN104598784A (en) 2015-05-06

Family

ID=53124562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410836979.6A Pending CN104598784A (en) 2014-12-29 2014-12-29 Information processing method and electronic device

Country Status (1)

Country Link
CN (1) CN104598784A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107730231A (en) * 2017-11-02 2018-02-23 东信和平科技股份有限公司 A kind of transfer account method based on SIM card, device and medium
CN108985045A (en) * 2018-07-01 2018-12-11 东莞市华睿电子科技有限公司 A kind of login validation method based on text password

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035335A (en) * 2007-02-13 2007-09-12 中电通信科技有限责任公司 Mobile phone privacy protection method
JP2008171218A (en) * 2007-01-12 2008-07-24 Hitachi Ltd Personal identification method and personal identification system
EP2151786A2 (en) * 2008-08-06 2010-02-10 Fujitsu Limited Identification method control device and identification method control method
CN102694920A (en) * 2012-05-28 2012-09-26 广东欧珀移动通信有限公司 Mobile phone antitheft method
CN102880960A (en) * 2012-09-26 2013-01-16 深圳市亚略特生物识别科技有限公司 Short message payment method and system based on fingerprint identifying mobile phone
CN102946475A (en) * 2012-10-30 2013-02-27 深圳市金立通信设备有限公司 Information security control method and terminal
CN103269402A (en) * 2013-05-21 2013-08-28 上海斐讯数据通信技术有限公司 System and method for protecting mobile phone privacy
CN103606084A (en) * 2013-12-03 2014-02-26 深圳市赛为智能股份有限公司 Mobile on-line payment method and system based on biometric features recognition
CN103678979A (en) * 2013-12-06 2014-03-26 三星电子(中国)研发中心 Method and device for intelligently hiding privacy data
CN103685743A (en) * 2013-12-06 2014-03-26 上海斐讯数据通信技术有限公司 Voice-control authentication unlocking system and unlocking method thereof
CN103729310A (en) * 2014-01-14 2014-04-16 北京深思数盾科技有限公司 Method for protecting hardware data

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008171218A (en) * 2007-01-12 2008-07-24 Hitachi Ltd Personal identification method and personal identification system
CN101035335A (en) * 2007-02-13 2007-09-12 中电通信科技有限责任公司 Mobile phone privacy protection method
EP2151786A2 (en) * 2008-08-06 2010-02-10 Fujitsu Limited Identification method control device and identification method control method
CN102694920A (en) * 2012-05-28 2012-09-26 广东欧珀移动通信有限公司 Mobile phone antitheft method
CN102880960A (en) * 2012-09-26 2013-01-16 深圳市亚略特生物识别科技有限公司 Short message payment method and system based on fingerprint identifying mobile phone
CN102946475A (en) * 2012-10-30 2013-02-27 深圳市金立通信设备有限公司 Information security control method and terminal
CN103269402A (en) * 2013-05-21 2013-08-28 上海斐讯数据通信技术有限公司 System and method for protecting mobile phone privacy
CN103606084A (en) * 2013-12-03 2014-02-26 深圳市赛为智能股份有限公司 Mobile on-line payment method and system based on biometric features recognition
CN103678979A (en) * 2013-12-06 2014-03-26 三星电子(中国)研发中心 Method and device for intelligently hiding privacy data
CN103685743A (en) * 2013-12-06 2014-03-26 上海斐讯数据通信技术有限公司 Voice-control authentication unlocking system and unlocking method thereof
CN103729310A (en) * 2014-01-14 2014-04-16 北京深思数盾科技有限公司 Method for protecting hardware data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《电脑报》编写组: "《电脑报 2009合订本 下》", 31 December 2009, 重庆:重庆出版社 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107730231A (en) * 2017-11-02 2018-02-23 东信和平科技股份有限公司 A kind of transfer account method based on SIM card, device and medium
CN108985045A (en) * 2018-07-01 2018-12-11 东莞市华睿电子科技有限公司 A kind of login validation method based on text password

Similar Documents

Publication Publication Date Title
CN101436233B (en) Hard disk multi-user partition switch control method, system and computer terminal
CN104641669B (en) The device and method of control switching for the electronic access client in the case where not requiring network to access
US10382204B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN101577907B (en) Method and device for managing mobile terminal
US8359008B2 (en) Security system and method for an electronic device
US9378344B2 (en) Method and apparatus for protecting information based on data card
CN102880820A (en) Method for accessing application program of mobile terminal and mobile terminal
CN106127077B (en) A kind of method and terminal for protecting user privacy information
CN104700001A (en) Information encryption method and device of application program
CN105205374A (en) Application program encrypting method and user terminal
CN104766021A (en) Authority control system and method
CN105069333A (en) User domain access method, access system and terminal
CN110598384B (en) Information protection method, information protection device and mobile terminal
CN104253805A (en) Browser and data protection method thereof
CN106484796B (en) File management method, file management device and mobile terminal
CN105550598A (en) Safety management method and device of mobile storage equipment
CN103324874A (en) Verification method and electronic device
TW201644228A (en) A method and system for protecting private information of mobile terminal
CN102810139A (en) Secure data operation method and communication terminal
CN104852888B (en) A kind of method and device that static authentication information is set
CN104598784A (en) Information processing method and electronic device
CN105703909A (en) Authentication method and electronic equipment
CN105574380A (en) Application authority management method and device for terminal
CN105871840B (en) A kind of certificate management method and system
US20200081597A1 (en) Application program management method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination