CN105701413A - Method and apparatus for protecting personal key information by intelligent device - Google Patents

Method and apparatus for protecting personal key information by intelligent device Download PDF

Info

Publication number
CN105701413A
CN105701413A CN201511016565.XA CN201511016565A CN105701413A CN 105701413 A CN105701413 A CN 105701413A CN 201511016565 A CN201511016565 A CN 201511016565A CN 105701413 A CN105701413 A CN 105701413A
Authority
CN
China
Prior art keywords
photo
message
key message
individual
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201511016565.XA
Other languages
Chinese (zh)
Inventor
赵福利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201511016565.XA priority Critical patent/CN105701413A/en
Publication of CN105701413A publication Critical patent/CN105701413A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The present invention discloses a method and an apparatus for protecting personal key information by an intelligent device. The method comprises: acquiring a photographed picture; and comparing the picture with password data in a preset password database, and if personal key information that coincides with any password data in the preset password database exist in the picture, performing mask processing on the personal key information by using preset dummy information corresponding to the personal key information. In the technical scheme disclosed by the present application, after acquiring the photographed picture, it is determined whether the personal key information that coincides with the password data in the preset password database exists in the picture, i.e. whether a body feature used by a user of an intelligent device as a password, and if exists, mask processing is performed on the personal key information by using the preset dummy information corresponding to the personal key information. According to the technical scheme disclosed by the present application, by performing mask processing on the personal key information, leakage of the personal key information is avoided, and legal rights of the user is protected from being damaged.

Description

The method of a kind of smart machine protection individual's key message and device
Technical field
The present invention relates to technical field of intelligent equipment, more particularly, it relates to the method for a kind of smart machine protection individual's key message and device。
Background technology
Along with the development of biological identification technology, increasing people starts with specific physical trait (pupil information etc. such as eyes) as password, to encrypt for individual privacy or bank account etc.。
But, existing smart machine (such as mobile phone, pad etc.), all there is shoot function, smart machine the high definition photo shot, it is possible to include user and be used as the physical trait of password, be i.e. individual's key message。Photo is once be obtained by other people, and the individual key message namely exposed in available photo goes to obtain corresponding information, and then the rights and interests of user are suffered damage。Therefore, when photo contains the physical trait as password, namely during individual's key message, tackle this photo and carry out respective handling, with the information avoiding other people to utilize this photograph acquisition corresponding, and in prior art and be absent from a kind of technical scheme photo being processed and avoiding leaking individual's key message。
In sum, how a kind of technical scheme photo being processed and avoiding leaking individual's key message is provided, is current those skilled in the art's problem demanding prompt solution。
Summary of the invention
It is an object of the invention to provide a kind of smart machine protection individual's method of key message and device, to pass through photo carries out process to avoid leaking individual key message。
To achieve these goals, the present invention provides following technical scheme:
A kind of method of smart machine protection individual's key message, including:
Obtain the photo of shooting;
Described photo is compared with the code data in preset password data base, if described photo exists the individual key message being consistent with the arbitrary code data in described preset password data base, then utilize the default fake information corresponding with described individual's key message that described individual's key message is covered process。
Preferably, also include:
If being absent from the individual key message being consistent with the code data in described preset password data base in described photo, then output prompts the user whether that needing that described photo is covered the first of process selects message;
Receiving described user selects the first of message feedback to select result for described first, if described first selection result is the message that described user needs described photo is covered process, then output points out described user by choosing the second selection message needing to carry out covering the target site of process in described photo;
Receiving described user selects the second of message feedback to select result for described second, obtains the described second target site selecting to comprise in result, and utilizes the default fake information corresponding with described target site that described target site is covered process。
Preferably, also include:
If there is the individual key message being consistent with the arbitrary code data in described preset password data base in described photo, then output prompting user is the encryption message that described photo arranges password;
Receive the described user code message for described encryption message feedback, obtain the photo password comprised in described code message, utilize described photo password that described photo is encrypted。
Preferably, described utilization and described individual's default fake information corresponding to key message also include after described individual's key message is covered process:
Described photo is preserved。
Preferably, also include:
When described photo is sent to network or other-end by needs, output prompting this photo of user is the prompting message of the photo with photo password。
A kind of device of smart machine protection individual's key message, including:
Acquisition module, for obtaining the photo of shooting;
Comparing module, for comparing described photo with the code data in preset password data base;
First processing module, if for described photo exists the individual key message being consistent with the arbitrary code data in described preset password data base, then utilize the default fake information corresponding with described individual's key message that described individual's key message is covered process。
Preferably, also include:
First output module, if for being absent from the individual key message being consistent with the code data in described preset password data base in described photo, then output prompts the user whether that needing that described photo is covered the first of process selects message;
Second output module, the first of message feedback is selected to select result for receiving described user for described first, if described first selection result is the message that described user needs described photo is covered process, then output points out described user by choosing the second selection message needing to carry out covering the target site of process in described photo;
Second processing module, the second of message feedback is selected to select result for receiving described user for described second, obtain the described second target site selecting to comprise in result, and utilize the default fake information corresponding with described target site that described target site is covered process。
Preferably, also include:
3rd output module, if for there is the individual key message being consistent with the arbitrary code data in described preset password data base in described photo, then output prompting user is the encryption message that described photo arranges password;
3rd processing module, for receiving the described user code message for described encryption message feedback, obtains the photo password comprised in described code message, utilizes described photo password that described photo is encrypted。
Preferably, also include:
Preserve module, for described photo is preserved。
Preferably, also include:
4th output module, for when described photo is sent to network or other-end by needs, output prompting this photo of user is the prompting message of the photo with photo password。
The invention provides the method for a kind of smart machine protection individual's key message and device, wherein, described method includes: obtain the photo of shooting;Described photo is compared with the code data in preset password data base, if described photo exists the individual key message being consistent with the arbitrary code data in described preset password data base, then utilize the default fake information corresponding with described individual's key message that described individual's key message is covered process。In technical scheme disclosed in the present application, after obtaining the photo of shooting, judge whether photo exists the individual key message being consistent with the code data in preset password data base, namely the user that whether there is smart machine is used as the physical trait of password, if it is present utilize the default fake information corresponding with this individual's key message that it is covered process;That is, when photo exists the physical trait that user is used as password, by the default fake information corresponding with physical trait, it is covered process, be used as the physical trait of password to avoid other people to pass through this photograph acquisition user, and then the situation obtaining corresponding information occurs。Visible, technical scheme disclosed in the present application, by covering process to individual's key message, it is to avoid the leakage of individual key message, it is ensured that the rights and interests of user are without prejudice。
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to the accompanying drawing provided。
The flow chart of the method for a kind of smart machine protection individual's key message that Fig. 1 provides for the embodiment of the present invention;
The method of a kind of smart machine protection individual's key message that Fig. 2 provides for the embodiment of the present invention is absent from photo process chart during the individual key message being consistent with the code data in preset password data base;
The structural representation of the device of a kind of smart machine protection individual's key message that Fig. 3 provides for the embodiment of the present invention。
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments。Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention。
Refer to Fig. 1, it illustrates the flow chart of the method for a kind of smart machine protection individual's key message that the embodiment of the present invention provides, it is possible to comprise the following steps:
S11: obtain the photo of shooting。
After smart machine shooting photo, it is possible to first photo is put and temporarily store in both the buffers, facilitate the later stage for the process of photo。
S12: compared with the code data in preset password data base by photo, it is judged that whether there is the individual key message being consistent with the code data in preset password data base in photo, if it is, perform step S13, if it is not, then perform step S14。
It should be noted that the code data comprised in preset password data base is the password for obtaining corresponding informance of user setup。Preset password data base can be saved in smart machine this locality, other-end or equipment can also be saved in, communicated with the other-end or equipment preserving preset password data base by smart machine, with access preset password database, it is also possible to carry out the setting of other modes according to actual needs。Whether photo exists the individual key message being consistent with code data, namely judges the physical trait whether existing that serve as password in photo。
S13: utilize the default fake information corresponding with individual's key message that individual's key message is covered process。
When photo exists the individual key message being consistent with the arbitrary code data in preset password data base, utilize default fake information that individual's key message is covered process。Wherein, default fake information can be pre-determine according to actual needs, and it is saved in default fake information storehouse, and the principle presetting the existence position in fake information storehouse and the existence position of preset password data base is identical, it is possible to reference to the explanation of the above-mentioned existence position for preset password data base。And covering process can be utilize default fake information to remove to replace individual's key message, when being pupil information such as individual's key message, it is possible to use other similar pupils replace the pupil in photo;The concrete meaning covering process can also be determined according to actual needs。
Step S14: stop operation。
When photo is absent from the individual key message being consistent with the arbitrary code data in preset password data base, illustrate that photo will not leak the individual key message of user, now, do not need photo to carry out any process。
In technical scheme disclosed in the present application, after obtaining the photo of shooting, judge whether photo exists the individual key message being consistent with the code data in preset password data base, namely the user that whether there is smart machine is used as the physical trait of password, if it is present utilize the default fake information corresponding with this individual's key message that it is covered process;That is, when photo exists the physical trait that user is used as password, by the default fake information corresponding with physical trait, it is covered process, be used as the physical trait of password to avoid other people to pass through this photograph acquisition user, and then the situation obtaining corresponding information occurs。Visible, technical scheme disclosed in the present application, by covering process to individual's key message, it is to avoid the leakage of individual key message, it is ensured that the rights and interests of user are without prejudice。
Wherein, default fake information can be the fake information that key message set in advance and individual is corresponding; when being pupil information such as individual's key message, utilize similar pupil that the pupil in photo is replaced, or when individual's key message is eyebrow information; utilize similar eyebrow that the eyebrow in photo is replaced; Deng, to ensure under the premise not affecting photographic quality, individual's key message is covered process; protection individual's key message is not leaked, and the rights and interests protecting user are without prejudice。
As in figure 2 it is shown, the method that a kind of smart machine that above-described embodiment provides protects individual's key message, it is also possible to including:
S21: if being absent from the individual key message being consistent with the code data in preset password data base in photo, then output prompts the user whether that need photo is covered process first selects message。
When photo is absent from the individual key message being consistent with the code data in preset password data base, output the first selection message, first selects message can include "Yes" and two options of "No", if user selects the option of "Yes", then illustrate that user needs photo is covered process, if user selects the option of "No", then illustrate that photo need not be covered process by user。
S22: receive user and select the first of message feedback to select result for first, if the first selection result is the message that user needs photo is covered process, then output prompting user is by choosing the second selection message needing to carry out covering the target site of process in photo。
The option of "Yes" that user chooses that first selects result to be or "No", if it selects the option of "Yes", namely user needs photo is covered process, then output the second selection message, second selects message can be able to carry out the message of sectional drawing on photo, the figure intercepted is user needs to carry out covering the target site of process, it is also possible to be otherwise realize choose target site, specifically can be determined according to actual needs。If user selects the option of "No", namely photo need not be covered process by user, then no longer export the second selection message for user。
S23: receive user and select the second of message feedback to select result for second, obtain the target site comprised in the second selection result, and utilize the default fake information corresponding with target site that target site is covered process。
Second selects message to include the target site that user selects, and then target site is covered process。When some code data user does not store to preset password data base or other smart machines the situation of the individual key message not judging to have in photo; pass through above-mentioned steps; can when smart machine judges do not possess individual key message in photo; independently the target site in photo is protected in advance by user, reduce further photo and reveal the possibility of individual's key message。
The method of a kind of smart machine protection individual's key message that above-described embodiment provides, it is also possible to including:
If there is the individual key message being consistent with the arbitrary code data in preset password data base in photo, then output prompting user arranges the encryption message of password for photo;
Receive user's code message for encryption message feedback, obtain the photo password comprised in code message, utilize photo password that photo is encrypted。
When photo exists individual's key message, by exporting encryption message, make user input the photo password of its setting, and then utilize photo password to be encrypted for photo。Thus, when some code data user does not store to preset password data base or other smart machines the situation of the individual key message not judging to have in photo, it is possible to avoid the individual key message in photo to be leaked further by the mode that photo is encrypted。By covering of photo is processed and encryption, being protected the individual key message preserved in photo further by the mode of double insurance, the rights and interests of protection user are without prejudice。
The method of a kind of smart machine protection individual's key message that above-described embodiment provides, preserves photo。
After photo disposal is completed, namely determine after will not leaking individual's key message, after utilizing the default fake information corresponding with described individual's key message that described individual's key message is covered process or after other situations that photo disposal is completed (as when judging photo does not include individual's key message), photo can be preserved, inquire about when needing for the later stage。
It addition, when user needs that photo is sent to network or other-end, output prompting this photo of user is the prompting message of the photo with photo password。Owing to photo is the photo comprising individual's key message, the individual key message being obtained in photo by other people in the unsuccessful situation of process is covered in order to avoid what cause due to some cause specifics, therefore, when user needs to send to network or other-end photo, needing prompting this photo of user is the photo with photo password, risk that may be present during to inform that this photo is sent to network or other-end by user, be equivalent to go up one again for photo heavily insure, further avoid the leakage of individual's key message。
Corresponding with said method embodiment, the embodiment of the present invention additionally provides the device of a kind of smart machine protection individual's key message, as it is shown on figure 3, may include that
Acquisition module 31, for obtaining the photo of shooting;
Comparing module 32, for comparing photo with the code data in preset password data base;
First processing module 33, if for there is the individual key message being consistent with the arbitrary code data in preset password data base in photo, then utilizes the default fake information corresponding with individual's key message that individual's key message is covered process。
In technical scheme disclosed in the present application, after obtaining the photo of shooting, judge whether photo exists the individual key message being consistent with the code data in preset password data base, namely the user that whether there is smart machine is used as the physical trait of password, if it is present utilize the default fake information corresponding with this individual's key message that it is covered process;That is, when photo exists the physical trait that user is used as password, by the default fake information corresponding with physical trait, it is covered process, be used as the physical trait of password to avoid other people to pass through this photograph acquisition user, and then the situation obtaining corresponding information occurs。Visible, technical scheme disclosed in the present application, by covering process to individual's key message, it is to avoid the leakage of individual key message, it is ensured that the rights and interests of user are without prejudice。
The device of a kind of smart machine protection individual's key message that above-described embodiment provides, it is also possible to including:
First output module, if for being absent from the individual key message being consistent with the code data in preset password data base in photo, then output prompts the user whether that need photo is covered process first selects message;
Second output module, the first of message feedback is selected to select result for receiving user for first, if the first selection result is the message that user needs photo is covered process, then output prompting user is by choosing the second selection message needing to carry out covering the target site of process in photo;
Second processing module, selects the second of message feedback to select result for receiving user for second, obtains the target site comprised in the second selection result, and utilize the default fake information corresponding with target site that target site is covered process。
The device of a kind of smart machine protection individual's key message that above-described embodiment provides, it is also possible to including:
3rd output module, if for there is the individual key message being consistent with the arbitrary code data in preset password data base in photo, then output prompting user arranges the encryption message of password for photo;
3rd processing module, for receiving user's code message for encryption message feedback, obtains the photo password comprised in code message, utilizes photo password that photo is encrypted。
The device of a kind of smart machine protection individual's key message that above-described embodiment provides, it is also possible to including:
Preserve module, for photo is preserved。
The device of a kind of smart machine protection individual's key message that above-described embodiment provides, it is also possible to including:
4th output module, for when photo is sent to network or other-end by needs, output prompting this photo of user is the prompting message of the photo with photo password。
Owing to the method for the individual key message of a kind of smart machine that device is with above-described embodiment provides protection of a kind of smart machine protection individual's key message of embodiment of the present invention offer is corresponding; therefore; detailed description for its relevant portion refer to part explanation corresponding in the embodiment of the method for a kind of smart machine protection individual's key message, and in this not go into detail。
Described above to the disclosed embodiments, makes those skilled in the art be capable of or uses the present invention。The multiple amendment of these embodiments be will be apparent from for a person skilled in the art, and generic principles defined herein can without departing from the spirit or scope of the present invention, realize in other embodiments。Therefore, the present invention is not intended to be limited to the embodiments shown herein, and is to fit to the widest scope consistent with principles disclosed herein and features of novelty。

Claims (10)

1. the method for smart machine protection individual's key message, it is characterised in that including:
Obtain the photo of shooting;
Described photo is compared with the code data in preset password data base, if described photo exists the individual key message being consistent with the arbitrary code data in described preset password data base, then utilize the default fake information corresponding with described individual's key message that described individual's key message is covered process。
2. the method for smart machine according to claim 1 protection individual key message, it is characterised in that also include:
If being absent from the individual key message being consistent with the code data in described preset password data base in described photo, then output prompts the user whether that needing that described photo is covered the first of process selects message;
Receiving described user selects the first of message feedback to select result for described first, if described first selection result is the message that described user needs described photo is covered process, then output points out described user by choosing the second selection message needing to carry out covering the target site of process in described photo;
Receiving described user selects the second of message feedback to select result for described second, obtains the described second target site selecting to comprise in result, and utilizes the default fake information corresponding with described target site that described target site is covered process。
3. the method for smart machine according to claim 1 protection individual key message, it is characterised in that also include:
If there is the individual key message being consistent with the arbitrary code data in described preset password data base in described photo, then output prompting user is the encryption message that described photo arranges password;
Receive the described user code message for described encryption message feedback, obtain the photo password comprised in described code message, utilize described photo password that described photo is encrypted。
4. the method for smart machine according to claim 1 protection individual key message, it is characterised in that described utilization and described individual's default fake information corresponding to key message also include after described individual key message is covered process:
Described photo is preserved。
5. the method for smart machine according to claim 4 protection individual key message, it is characterised in that also include:
When described photo is sent to network or other-end by needs, output prompting this photo of user is the prompting message of the photo with photo password。
6. the device of smart machine protection individual's key message, it is characterised in that including:
Acquisition module, for obtaining the photo of shooting;
Comparing module, for comparing described photo with the code data in preset password data base;
First processing module, if for described photo exists the individual key message being consistent with the arbitrary code data in described preset password data base, then utilize the default fake information corresponding with described individual's key message that described individual's key message is covered process。
7. the device of smart machine according to claim 6 protection individual key message, it is characterised in that also include:
First output module, if for being absent from the individual key message being consistent with the code data in described preset password data base in described photo, then output prompts the user whether that needing that described photo is covered the first of process selects message;
Second output module, the first of message feedback is selected to select result for receiving described user for described first, if described first selection result is the message that described user needs described photo is covered process, then output points out described user by choosing the second selection message needing to carry out covering the target site of process in described photo;
Second processing module, the second of message feedback is selected to select result for receiving described user for described second, obtain the described second target site selecting to comprise in result, and utilize the default fake information corresponding with described target site that described target site is covered process。
8. the device of smart machine according to claim 6 protection individual key message, it is characterised in that also include:
3rd output module, if for there is the individual key message being consistent with the arbitrary code data in described preset password data base in described photo, then output prompting user is the encryption message that described photo arranges password;
3rd processing module, for receiving the described user code message for described encryption message feedback, obtains the photo password comprised in described code message, utilizes described photo password that described photo is encrypted。
9. the device of smart machine according to claim 6 protection individual key message, it is characterised in that also include:
Preserve module, for described photo is preserved。
10. the device of smart machine according to claim 9 protection individual key message, it is characterised in that also include:
4th output module, for when described photo is sent to network or other-end by needs, output prompting this photo of user is the prompting message of the photo with photo password。
CN201511016565.XA 2015-12-29 2015-12-29 Method and apparatus for protecting personal key information by intelligent device Pending CN105701413A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511016565.XA CN105701413A (en) 2015-12-29 2015-12-29 Method and apparatus for protecting personal key information by intelligent device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511016565.XA CN105701413A (en) 2015-12-29 2015-12-29 Method and apparatus for protecting personal key information by intelligent device

Publications (1)

Publication Number Publication Date
CN105701413A true CN105701413A (en) 2016-06-22

Family

ID=56225934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511016565.XA Pending CN105701413A (en) 2015-12-29 2015-12-29 Method and apparatus for protecting personal key information by intelligent device

Country Status (1)

Country Link
CN (1) CN105701413A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108460284A (en) * 2017-02-17 2018-08-28 广州亿三电子科技有限公司 A kind of computer critical data protection system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739856A (en) * 2012-05-31 2012-10-17 西安电子科技大学 Mobile phone unlocking system and method based on palm image information
CN103824030A (en) * 2014-02-27 2014-05-28 宇龙计算机通信科技(深圳)有限公司 Data protection device and data protection method
CN104134042A (en) * 2013-07-18 2014-11-05 腾讯科技(深圳)有限公司 Private file encryption method and private file encryption device
CN104331673A (en) * 2014-10-30 2015-02-04 宇龙计算机通信科技(深圳)有限公司 Intelligent terminal and photo safety handling method based on intelligent terminal
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739856A (en) * 2012-05-31 2012-10-17 西安电子科技大学 Mobile phone unlocking system and method based on palm image information
CN104134042A (en) * 2013-07-18 2014-11-05 腾讯科技(深圳)有限公司 Private file encryption method and private file encryption device
CN103824030A (en) * 2014-02-27 2014-05-28 宇龙计算机通信科技(深圳)有限公司 Data protection device and data protection method
CN104331673A (en) * 2014-10-30 2015-02-04 宇龙计算机通信科技(深圳)有限公司 Intelligent terminal and photo safety handling method based on intelligent terminal
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108460284A (en) * 2017-02-17 2018-08-28 广州亿三电子科技有限公司 A kind of computer critical data protection system and method
CN108460284B (en) * 2017-02-17 2023-12-29 广州亿三电子科技有限公司 Computer key data protection system and method

Similar Documents

Publication Publication Date Title
CN106210528B (en) A kind of method, device and mobile terminal encrypting photo
CN104484596B (en) The method and terminal of password are created in multiple operating system
CN104797003B (en) A kind of method and device for switching intelligent terminal user
KR20170057321A (en) Security control method for user in social network, social application device and terminal
CN104320256A (en) Method for achieving fingerprint universal password verification
CN102867157B (en) Mobile terminal and data guard method
CN104219650B (en) Send the method and user equipment of user's ID authentication information
CN106953868A (en) The processing method and system for the material that internet is asked for visa
CN105898743A (en) Network connection method, device and system
US9426647B2 (en) Method and device for protecting privacy data of mobile terminal user
CN104915605B (en) Photo processing method and device
CN105046167A (en) Generating method and apparatus for encrypted photo and electronic equipment
CN105472605A (en) Mobile phone application calling authentication method, multifunctional universal smart card and mobile terminal
CN105701413A (en) Method and apparatus for protecting personal key information by intelligent device
CN104270754B (en) A kind of Subscriber Identity Module method for authenticating and device
CN103685676B (en) The information processing method of blue tooth submachine, separated mobile terminal and blue tooth submachine
EP2911087A1 (en) Method, device and apparatus for storing and reading data
CN104918244A (en) Terminal and terminal communication method
CN105025203B (en) With reference to the image encipher-decipher method and its image capturing device of physiological characteristic
CN106815529A (en) Cell phone pictures safety protection system and method based on Steganography
CN107220570B (en) SIM card-based STK card writing system and method
WO2017076287A1 (en) Method and device for pairing bluetooth devices
CN105447354B (en) Information processing method and device
CN107038389A (en) Data encryption processing method, data deciphering processing method and mobile terminal
CN105245526B (en) Call the method and apparatus of SIM card application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160622