CN105827622A - Method and device for protecting user information - Google Patents

Method and device for protecting user information Download PDF

Info

Publication number
CN105827622A
CN105827622A CN201610262524.7A CN201610262524A CN105827622A CN 105827622 A CN105827622 A CN 105827622A CN 201610262524 A CN201610262524 A CN 201610262524A CN 105827622 A CN105827622 A CN 105827622A
Authority
CN
China
Prior art keywords
user
software client
primary user
personal data
encrypted message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610262524.7A
Other languages
Chinese (zh)
Inventor
李音
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610262524.7A priority Critical patent/CN105827622A/en
Publication of CN105827622A publication Critical patent/CN105827622A/en
Priority to PCT/CN2016/100755 priority patent/WO2017185648A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the user information protection technical field and relates to a method and device for protecting user information. The method for protecting user information includes the following steps that: when a primary user logins a software client, the primary user marks the personal data of the primary user which are required to be hidden in the software client; when the software client is operated, whether a current user is the primary user is judged; when the current user is the primary user, the software client is controlled to display the marked personal data required to be hidden; and when the current user is not the primary user, the software client is controlled not to display the personal data marked as hidden data. With the method and device provided by the embodiments of the invention adopted, inconveniences caused by the leakage of personal data of users can be prevented, and the personal data of the primary user can be prevented from being altered. The method and device of the invention are simple in operation. With the method and device adopted, the improvement of user experience can be benefitted, and individual needs of the users can be satisfied.

Description

A kind of method and device protecting user profile
Technical field
The present embodiments relate to user profile resist technology field, particularly relate to a kind of method and device protecting user profile.
Background technology
Along with the development of the electronic equipments such as the universal of network and smart mobile phone, user can be reached by smart mobile phone and browse the clients such as video player, music player, web browser or mailbox, brings great convenience for user's life and work.
In prior art, user uses for convenience, the clients such as video player, music player, web browser or mailbox all can record the historical record of user's viewing, cache, collect and the personal information such as account, it is simple to user carries out associative operation, improves user's retention ratio.But mobile phone is often used by other people, owing to the clients such as video player, music player, web browser or mailbox are without login authentication, userspersonal information is caused to reveal;Meanwhile, after using the clients such as video player, music player, web browser or mailbox at other people so that the data such as the historical record of user are changed, and the follow-up use for user is made troubles, and affect user's experience.
Summary of the invention
The invention provides a kind of method and device protecting user profile, it is intended to solve existing software client and can not well protect userspersonal information, and the technical problem that users personal data is easily changed.
In order to solve posed problems above, the technical solution used in the present invention is: a kind of method protecting user profile, comprises the following steps:
When primary user logs in software client, primary user described in described software client need the personal data hidden be marked;
When running described software client, it is judged that whether active user is described primary user;
When described active user is described primary user, control described software client show be labeled as needs hide personal data;When described active user is not described primary user, control described software client do not show described in be labeled as the personal data hidden.
The technical scheme that the embodiment of the present invention is taked also includes: described judge whether described active user is that described primary user specifically includes: open software client, enter interface for password input, set primary user's encrypted message by interface for password input, and the encrypted message set is stored.
The technical scheme that the embodiment of the present invention is taked also includes: described needs hide personal data include historical viewings record, data cached or collection data at least one.
The technical scheme that the embodiment of the present invention is taked also includes: when running described software client, judge whether active user carries out password authentification, if active user does not carry out password authentification, control described software client and enter guest mode, do not show primary user's personal data that labelling is hidden in described software client;If active user carries out password authentification, then judge whether active user's password authentification is passed through.
The technical scheme that the embodiment of the present invention is taked also includes: the judgment mode whether described active user's of judgement password authentification is passed through is: receive the encrypted message of active user's input, judge that the encrypted message that active user inputs is the most consistent with primary user's encrypted message of storage, if the encrypted message of active user's input is inconsistent with primary user's encrypted message of storage, control described software client and enter guest mode, do not show the described primary user personal data that labelling is hidden in described software client;If the encrypted message of active user's input is consistent with primary user's encrypted message of storage, controls described software client and enter primary user's pattern, show the described primary user personal data that labelling is hidden in described software client.
Another technical scheme that the embodiment of the present invention is taked is: a kind of device protecting user profile, including data editing module, primary user's judge module and control module;
Described data editing module is marked for primary user in software client needs the personal data hidden;
Described primary user's judge module is for when running described software client, it is judged that whether active user is described primary user;
When described active user is described primary user, is shown by the described control module described software client of control and be labeled as the personal data that needs are hidden;
When described active user is not described primary user, by described control module control described software client do not show described in be labeled as the personal data hidden.
The technical scheme that the embodiment of the present invention is taked also includes: also include password setting module and password memory module,
Described password setting module, for when opening software client, shows interface for password input, and by interface for password input setting code information;
Described password memory module is for storing the encrypted message set.
The technical scheme that the embodiment of the present invention is taked also includes: the needs of described data editing module labelling hide personal data include historical viewings record, data cached or collection data at least one.
The technical scheme that the embodiment of the present invention is taked also includes: also include verifying judge module, described checking judge module is for when running described software client, judge whether active user carries out password authentification, if active user does not carry out password authentification, control described software client by described control module and enter guest mode, do not show the described primary user personal data that labelling is hidden in described software client;If active user carries out password authentification, judge whether active user's password authentification is passed through by described primary user's judge module.
The technical scheme that the embodiment of the present invention is taked also includes: described primary user's judge module judges that the judgment mode whether active user's password authentification is passed through is: receive the encrypted message of active user's input, judge that the encrypted message that active user inputs is the most consistent with primary user's encrypted message of storage in described password memory module, if the encrypted message of active user's input is inconsistent with primary user's encrypted message of storage in described password memory module, control described software client by described control module and enter guest mode, do not show the described primary user personal data that labelling is hidden in described software client;If the encrypted message of active user's input is consistent with primary user's encrypted message of storage in described password memory module, control described software client by described control module and enter primary user's pattern, show the described primary user personal data that labelling is hidden in described software client.
Compared with prior art; having the beneficial effects that of the embodiment of the present invention: the method and device of the protection user profile of the embodiment of the present invention is marked by primary user in software client needs the personal data hidden; when needs run software client, it is judged that whether active user is primary user;If active user is primary user, controlling software client and show and be labeled as the personal data that needs are hiding, if active user is not primary user, control software client does not show the personal data being labeled as hiding., thus primary user's personal data are effectively protected, prevent primary user's personal data from revealing and the inconvenience that brings, and avoid primary user's personal data to be changed;The present invention is simple to operate, is conducive to improving user's experience, and meets users ' individualized requirement.
Accompanying drawing explanation
Fig. 1 is the flow chart of the method for the protection user profile of first embodiment of the invention;
Fig. 2 is the flow chart of the method for the protection user profile of second embodiment of the invention;
Fig. 3 is the structural representation of the apparatus system of the protection user profile of the embodiment of the present invention.
Detailed description of the invention
For the ease of understanding the present invention, below with reference to relevant drawings, the present invention is described more fully.Accompanying drawing gives presently preferred embodiments of the present invention.But, the present invention can realize in many different forms, however it is not limited to embodiment described herein.On the contrary, providing the purpose of these embodiments is to make the understanding to the disclosure more thorough comprehensively.
Unless otherwise defined, all of technology used herein is identical with the implication that the those skilled in the art belonging to the present invention are generally understood that with scientific terminology.The term used the most in the description of the invention is intended merely to describe the purpose of specific embodiment, it is not intended that in limiting the present invention.
Refer to Fig. 1, be the flow chart of the method for the protection user profile of first embodiment of the invention.The method of the protection user profile of first embodiment of the invention comprises the following steps:
Step 100: when primary user logs in software client, needs the personal data hidden to be marked to primary user in software client;
Step 101: when running software client, it is judged that whether active user is primary user;If active user is primary user, perform step 102;If active user is not primary user, perform step 103;
Step 102: control software client and show and be labeled as the personal data that needs are hiding;
Step 103: control software client and do not show the personal data being labeled as hiding.
Refer to Fig. 2, be the flow chart of the method for the protection user profile of second embodiment of the invention.The method of the protection user profile of second embodiment of the invention comprises the following steps:
Step 200: open the upper software client run of intelligent terminal, enter interface for password input;
In step 200, intelligent terminal includes but not limited to the intelligent electronic device such as smart mobile phone, panel computer;Software client includes but not limited to that video player, music player, browser, shopping website or mail etc. can produce individual after browsing and browse the client of record.
Step 201: set the encrypted message of primary user by interface for password input, and the encrypted message set is stored;
Optionally, in step 201, the encrypted message set by interface for password input is included: setting finger print information, numerical ciphers or graphing etc., in other embodiments of the present invention, the encrypted message of setting can also include speech cipher, face recognition or iris identification etc.;Owing to fingerprint authentication mode is more convenient to operate, and safety is higher, and the embodiment of the present invention preferably employs fingerprint authentication mode.When using fingerprint authentication mode, the mode of interface for password input setting code information includes but not limited to that the fingerprint collecting unit such as intelligent terminal's HOME key gather finger print information, the finger print information gathered at least includes one or more finger print information, and the quantity of primary user can be set to many people, such as, can be set to mobile terminal local user or other users (finger print information of many people can be gathered) that local user is specified.
Step 202: the personal data of primary user in software client are edited, and the personal data that labelling needs are hidden;
Alternatively, in step 202., primary user's personal data include primary user's historical viewings record in this software client, cache, the personal data such as collection, primary user can select to be marked hiding to all or part of personal data according to demand, after personal data are labeled and hide, will not show when other users open this software client.
Step 203: when user is again turned on this software client, it is judged that whether active user carries out password authentification, if active user does not carry out password authentification, performs step 204;If active user carries out password authentification, perform step 205;
Optionally, in step 203, software client is provided with password authentification icon, judge whether active user carries out the judgment mode of password authentification and be: judge whether active user touches fingerprint collecting unit or click on password authentification icon, if active user does not touch fingerprint collecting unit or clicks on Password Input icon, then it is assumed that active user does not carry out password authentification;Wherein, the formation that password authentification icon can minimize is arranged at any one angle of software client, when the encrypted message that user sets is as numerical ciphers or graphing, click on password authentification icon, can show the interface for password input of correspondence, user can be by interface for password input input numerical ciphers or graphing.
Step 204: make this software client enter guest mode, does not show primary user's personal data that labelling is hidden in this software client;
Step 205: receive the encrypted message of active user's input, and judge that the encrypted message that active user inputs is the most consistent with primary user's encrypted message of storage, if the encrypted message of active user's input is inconsistent with primary user's encrypted message of storage, perform step 500;If the encrypted message of active user's input is consistent with primary user's encrypted message of storage, perform step 700;
Step 206: make this software client enter primary user's pattern, show primary user's personal data in this software client.
The method of the protection user profile of the embodiment of the present invention by needing the personal data hidden to be marked to primary user in software client, when needs run software client, it is judged that whether active user is primary user;If active user is primary user; control software client show and be labeled as the personal data that needs are hiding; if active user is not primary user; control software client and do not show the personal data being labeled as hiding; thus primary user's personal data are effectively protected; the inconvenience preventing primary user's personal data from revealing and to bring, and avoid primary user's personal data to be changed;The present invention is simple to operate, is conducive to improving user's experience, and meets users ' individualized requirement.
Refer to Fig. 3, be the structural representation of the device of the protection user profile of the embodiment of the present invention.The device of the protection user profile of the embodiment of the present invention includes password setting module 1, password memory module 2, data editing module 3, checking judge module 4, primary user's judge module 5 and control module 6;
Password setting module 1, for when user opens the software client run on intelligent terminal, shows interface for password input, and by interface for password input setting code information;Wherein, software client includes but not limited to that video player, music player, browser, shopping website or mail etc. can produce individual after browsing and browse the client of record.The encrypted message that password setting module 1 sets includes: setting finger print information, numerical ciphers or graphing etc., in other embodiments of the present invention, the encrypted message of setting can also include speech cipher, face recognition or iris identification etc.;When using fingerprint authentication mode, password setting module 1 also includes that fingerprint collecting unit, fingerprint collecting unit are used for gathering user fingerprints information;Fingerprint collecting unit includes but not limited to intelligent terminal's HOME key.
Password memory module 2 is for storing the encrypted message set.
Data editing module 3 is for editing the personal data of primary user in software client, and labelling needs hiding personal data;Wherein, primary user's personal data include primary user's historical viewings record in this software client, cache, the personal data such as collection, primary user can select to be marked hiding to all or part of personal data according to demand, after personal data are labeled and hide, will not show when other users open this software client.
Checking judge module 4 is for when user is again turned on this software client, it is judged that whether active user carries out password authentification, if active user does not carry out password authentification, controls this software client by control module 6 and enters guest mode;If active user carries out password authentification, verify encrypted message by primary user's judge module 5;Wherein, software client is provided with password authentification icon, judge whether active user carries out the judgment mode of password authentification and be: judge whether active user touches fingerprint collecting unit or click on password authentification icon, if active user does not touch fingerprint collecting unit or clicks on Password Input icon, then it is assumed that active user does not carry out password authentification;Wherein, the formation that password authentification icon can minimize is arranged at any one angle of software client, when the encrypted message that user sets is as numerical ciphers or graphing, click on password authentification icon, can show the interface for password input of correspondence, user can be by interface for password input input numerical ciphers or graphing.
Primary user's judge module 5 is for reading primary user's encrypted message of storage in password memory module 2, and receive the encrypted message of active user's input, judge that the encrypted message that active user inputs is the most consistent with primary user's encrypted message of storage, if the encrypted message of active user's input is inconsistent with primary user's encrypted message of storage, controls this software client by control module 6 and enter guest mode;If the encrypted message of active user's input is consistent with primary user's encrypted message of storage, controls this software client by control module 6 and enter primary user's pattern;
Control module 6 controls the operational mode of software client for the judged result according to checking judge module 4 or primary user's judge module 5;Specifically include: if checking judge module 4 determine active user do not carry out password authentification or primary user's judge module 5 to determine the encrypted message of active user's input inconsistent with primary user's encrypted message of storage, control software client and enter guest mode, do not show primary user's personal data that labelling is hidden in this software client;If the encrypted message that primary user's judge module 5 determines active user's input is consistent with primary user's encrypted message of storage, controls software client and enter primary user's pattern, and show primary user's personal data in this software client.
The method and device of the protection user profile of the embodiment of the present invention by needing the personal data hidden to be marked to primary user in software client, when needs run software client, it is judged that whether active user is primary user;If active user is primary user; control software client show and be labeled as the personal data that needs are hiding; if active user is not primary user; control software client and do not show the personal data being labeled as hiding; thus primary user's personal data are effectively protected; the inconvenience preventing primary user's personal data from revealing and to bring, and avoid primary user's personal data to be changed;The present invention is simple to operate, is conducive to improving user's experience, and meets users ' individualized requirement.
Above-described embodiment is the present invention preferably embodiment; but embodiments of the present invention are also not restricted to the described embodiments; the change made under other any spirit without departing from the present invention and principle, modify, substitute, combine, simplify; all should be the substitute mode of equivalence, within being included in protection scope of the present invention.

Claims (10)

1. the method protecting user profile, it is characterised in that comprise the following steps:
When primary user logs in software client, primary user described in described software client need the personal data hidden be marked;
When running described software client, it is judged that whether active user is described primary user;
When described active user is described primary user, control described software client show be labeled as needs hide personal data;When described active user is not described primary user, control described software client do not show described in be labeled as the personal data hidden.
The method of protection user profile the most according to claim 1; it is characterized in that; described judge whether described active user is that described primary user specifically includes: open software client; enter interface for password input; set primary user's encrypted message by interface for password input, and the encrypted message set is stored.
The method of protection user profile the most according to claim 2, it is characterised in that described needs hide personal data include historical viewings record, data cached or collection data at least one.
The method of protection user profile the most according to claim 3; it is characterized in that; also include: when running described software client; judge whether active user carries out password authentification; if active user does not carry out password authentification; control described software client and enter guest mode, do not show primary user's personal data that labelling is hidden in described software client;If active user carries out password authentification, then judge whether active user's password authentification is passed through.
The method of protection user profile the most according to claim 4; it is characterized in that; the judgment mode whether described active user's of judgement password authentification is passed through is: receive the encrypted message of active user's input; judge that the encrypted message that active user inputs is the most consistent with primary user's encrypted message of storage; if the encrypted message of active user's input is inconsistent with primary user's encrypted message of storage; control described software client and enter guest mode, do not show the described primary user personal data that labelling is hidden in described software client;If the encrypted message of active user's input is consistent with primary user's encrypted message of storage, controls described software client and enter primary user's pattern, show the described primary user personal data that labelling is hidden in described software client.
6. the device protecting user profile, it is characterised in that include data editing module, primary user's judge module and control module;
Described data editing module is marked for primary user in software client needs the personal data hidden;
Described primary user's judge module is for when running described software client, it is judged that whether active user is described primary user;
When described active user is described primary user, is shown by the described control module described software client of control and be labeled as the personal data that needs are hidden;
When described active user is not described primary user, by described control module control described software client do not show described in be labeled as the personal data hidden.
The device of protection user profile the most according to claim 6, it is characterised in that also include password setting module and password memory module,
Described password setting module, for when opening software client, shows interface for password input, and by interface for password input setting code information;
Described password memory module is for storing the encrypted message set.
The device of protection user profile the most according to claim 7, it is characterised in that described data editing module labelling need hide personal data include historical viewings record, data cached or collection data at least one.
The device of protection user profile the most according to claim 8; it is characterized in that; also include verifying judge module; described checking judge module is for when running described software client; judge whether active user carries out password authentification; if active user does not carry out password authentification, control described software client by described control module and enter guest mode, do not show the described primary user personal data that labelling is hidden in described software client;If active user carries out password authentification, judge whether active user's password authentification is passed through by described primary user's judge module.
The device of protection user profile the most according to claim 9, it is characterized in that, described primary user's judge module judges that the judgment mode whether active user's password authentification is passed through is: receive the encrypted message of active user's input, judge that the encrypted message that active user inputs is the most consistent with primary user's encrypted message of storage in described password memory module, if the encrypted message of active user's input is inconsistent with primary user's encrypted message of storage in described password memory module, control described software client by described control module and enter guest mode, do not show the described primary user personal data that labelling is hidden in described software client;If the encrypted message of active user's input is consistent with primary user's encrypted message of storage in described password memory module, control described software client by described control module and enter primary user's pattern, show the described primary user personal data that labelling is hidden in described software client.
CN201610262524.7A 2016-04-25 2016-04-25 Method and device for protecting user information Pending CN105827622A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610262524.7A CN105827622A (en) 2016-04-25 2016-04-25 Method and device for protecting user information
PCT/CN2016/100755 WO2017185648A1 (en) 2016-04-25 2016-09-29 Method and apparatus for protecting user information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610262524.7A CN105827622A (en) 2016-04-25 2016-04-25 Method and device for protecting user information

Publications (1)

Publication Number Publication Date
CN105827622A true CN105827622A (en) 2016-08-03

Family

ID=56527422

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610262524.7A Pending CN105827622A (en) 2016-04-25 2016-04-25 Method and device for protecting user information

Country Status (2)

Country Link
CN (1) CN105827622A (en)
WO (1) WO2017185648A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709310A (en) * 2017-01-17 2017-05-24 宇龙计算机通信科技(深圳)有限公司 Virtual reality system interface login method and device
WO2017185648A1 (en) * 2016-04-25 2017-11-02 乐视控股(北京)有限公司 Method and apparatus for protecting user information
CN108270757A (en) * 2017-01-03 2018-07-10 腾讯科技(深圳)有限公司 A kind of user account switching method, device, client and system
CN109002731A (en) * 2018-07-31 2018-12-14 佛山长意云信息技术有限公司 A kind of social software management method, device, computer equipment and storage medium
CN109885997A (en) * 2019-03-29 2019-06-14 云深互联(北京)科技有限公司 A kind of user information guard method, client and electronic equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143797B (en) * 2019-12-27 2023-09-26 上海闻泰信息技术有限公司 Unlocking method and device of terminal equipment, terminal equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103825999A (en) * 2012-11-19 2014-05-28 腾讯科技(深圳)有限公司 Application program function display method and device
CN103873668A (en) * 2012-12-17 2014-06-18 三星电子(中国)研发中心 Method for protecting user data of portable terminal and portable terminal
CN105117627A (en) * 2015-07-30 2015-12-02 努比亚技术有限公司 Method and device for hiding information

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8695087B2 (en) * 2008-04-04 2014-04-08 Sandisk Il Ltd. Access control for a memory device
CN102467462B (en) * 2010-11-17 2015-03-11 中国移动通信集团公司 Method for protecting data stored in device and corresponding device
CN104732125B (en) * 2015-01-30 2017-12-22 努比亚技术有限公司 The display methods and terminal of encryption information
CN104992091B (en) * 2015-06-05 2019-03-01 小米科技有限责任公司 Access the method, apparatus and storage medium of terminal
CN105827622A (en) * 2016-04-25 2016-08-03 乐视控股(北京)有限公司 Method and device for protecting user information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103825999A (en) * 2012-11-19 2014-05-28 腾讯科技(深圳)有限公司 Application program function display method and device
CN103873668A (en) * 2012-12-17 2014-06-18 三星电子(中国)研发中心 Method for protecting user data of portable terminal and portable terminal
CN105117627A (en) * 2015-07-30 2015-12-02 努比亚技术有限公司 Method and device for hiding information

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017185648A1 (en) * 2016-04-25 2017-11-02 乐视控股(北京)有限公司 Method and apparatus for protecting user information
CN108270757A (en) * 2017-01-03 2018-07-10 腾讯科技(深圳)有限公司 A kind of user account switching method, device, client and system
WO2018127048A1 (en) * 2017-01-03 2018-07-12 腾讯科技(深圳)有限公司 Data display method and device, and storage medium
CN108270757B (en) * 2017-01-03 2022-02-18 腾讯科技(深圳)有限公司 User account switching method, device, client and system
CN106709310A (en) * 2017-01-17 2017-05-24 宇龙计算机通信科技(深圳)有限公司 Virtual reality system interface login method and device
CN109002731A (en) * 2018-07-31 2018-12-14 佛山长意云信息技术有限公司 A kind of social software management method, device, computer equipment and storage medium
CN109885997A (en) * 2019-03-29 2019-06-14 云深互联(北京)科技有限公司 A kind of user information guard method, client and electronic equipment

Also Published As

Publication number Publication date
WO2017185648A1 (en) 2017-11-02

Similar Documents

Publication Publication Date Title
CN105827622A (en) Method and device for protecting user information
CN103377332B (en) The method of access application and device
AU2014327030B2 (en) Scrambling passcode entry interface
CN108647508B (en) Method and system for automatic association of authentication credentials with biometric information
KR101280050B1 (en) Location-based security system for portable electronic device
CN105975182B (en) A kind of terminal operation method and terminal
EP2836957B1 (en) Location-based access control for portable electronic device
CN108038393B (en) Application privacy protection method and mobile terminal
EP2650808A1 (en) Method for integrating account management function in input method software
CN104335216B (en) Expedited biometric validation
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
US10212158B2 (en) Automatic association of authentication credentials with biometrics
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN104375836A (en) Method and device for showing lock screen window
CN104954534B (en) Control method, device and the corresponding communication terminal of communication terminal
Wang et al. Towards continuous and passive authentication across mobile devices: an empirical study
CN107465701B (en) Method and device for inputting password into interface at dynamic position
CN104809402A (en) Fuzzy display method for information and terminal
CN106951757A (en) A kind of method and apparatus for operating application program
CN106599648A (en) Application startup method and terminal
KR20080112674A (en) Apparatus, system, method and computer program recorded medium for authenticating internet service server and user by using portable storage with security function
Vecchiato et al. The perils of Android security configuration
CN107506198A (en) The display methods and mobile terminal of a kind of mobile terminal
CN106529232A (en) Startup method and device
CN106845199A (en) Object authentication method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160803