CN106599712A - Electronic equipment and control method thereof - Google Patents

Electronic equipment and control method thereof Download PDF

Info

Publication number
CN106599712A
CN106599712A CN201610911018.6A CN201610911018A CN106599712A CN 106599712 A CN106599712 A CN 106599712A CN 201610911018 A CN201610911018 A CN 201610911018A CN 106599712 A CN106599712 A CN 106599712A
Authority
CN
China
Prior art keywords
information
personal information
application
request
regard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610911018.6A
Other languages
Chinese (zh)
Inventor
姜龙求
黄勇皓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Priority to CN201610911018.6A priority Critical patent/CN106599712A/en
Publication of CN106599712A publication Critical patent/CN106599712A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The invention provides electronic equipment and a control method thereof. The electronic equipment which executes at least one application which uses a personal information execution function comprises a memory and a processor, wherein the memory is configured to store personal information, and information related to the protection of the personal information is set by aiming at each application; the processor is configured to respond when a request for the personal information is received from the application, determines whether the personal information is protected or not on the basis of the set information, encrypts the personal information on the basis of a determining result, provides the encrypted personal information for the application, and responds when an execution request for a function related to the encrypted personal information is received from the application, and the processor is also configured to decrypt the encrypted personal information and execute the function. Therefore, after the protection of the personal information is set, a user can normally use service and prevent the personal information from being leaked.

Description

Electronic equipment and its control method
This application claims Korea Spro 10-2015-0145551 submitted in Korean Intellectual Property Office on October 19th, 2015 State's patent application and the 10-2016-0047135 Korean Patents submitted in Korean Intellectual Property Office on April 18th, 2016 The priority of application, the disclosure of this application is herein incorporated by quoting its whole.
Technical field
The each side of the disclosure is usually directed to a kind of electronic equipment and its control method, for example, is related to a kind of protection personal The electronic equipment and its control method of information.
Background technology
With the development of electronic technology, various types of electronic products have been developed and have been distributed.Specifically, it is various Display device (such as TV, smart phone, PC, notebook PC and PDA) is widely used in general family.
As such display device is widely used, user has increased the demand of various functions.Therefore, manufacture Business makes great efforts the cumulative demand for meeting user, releases the product with New function.
Specifically, such display device can perform various applications, and those applications can ask the personal letter of user Cease to perform various functions.Obtaining the application of personal information can be based on the personal information execution various functions for obtaining.
But, in this case, the personal information of user may by using compromised, this be not the intention of user simultaneously Problem may be caused.
The content of the invention
This example embodiment relates in one aspect to a kind of electronic equipment and its control method, wherein, the electronic equipment quilt It is configured to perform application and provides normal service while personal information is protected.
According to example embodiment, there is provided it is a kind of be configured to perform use personal information perform function at least one should Electronic equipment, the electronic equipment includes:Memory, is configured to store personal information, wherein, the guarantor with personal information The relevant information of shield is set for each application, and processor is configured to, in response to receiving for personal information from application Request, based on arrange information determine whether protect personal information, based on a determination that result personal information is encrypted and to Using the personal information for providing encryption, in response to receiving for the execution of the function relevant with the personal information of encryption from application Request, the personal information to encrypting is decrypted and performs the function.
Processor can be configured to determine that the request for carrying out self-application is request or the perform function for personal information Request.
Processor can be configured to:When application request personal information, based on the information relevant with the protection of personal information Determine whether to protect personal information, or when being default personal information by the personal information of application request, based on individual The information that the protection of information is relevant determines whether to protect personal information.
The information relevant with the protection of personal information may include the information of the application with regard to personal information need not be protected and Information with regard to being not required to the type of personal information to be protected.
Processor can be configured to based on regard to protecting the application of personal information and be not required to personal letter to be protected Whether the Asymmetry information of the type of breath is protected is determined by the personal information of application request, personal information is not encrypted simultaneously Personal information is provided to application.
The equipment may also include display, and processor can be configured to display function over the display perform knot Really.
Personal information may include the information of the position with regard to electronic equipment, associated person information, with regard to the information of photo files It is one or more with the information with regard to message.
In response to receiving the request for associated person information from application, processor can be configured to enter associated person information Row encryption simultaneously provides the associated person information of encryption to application, and in response to from application receive for the contact person of encryption letter Cease relevant function performs request, and the associated person information to encrypting is decrypted and shows over the display the connection based on decryption It is the contact person UI of people's information generation.
Request, processor are performed for the call function based on the associated person information encrypted in response to receiving from application The associated person information to encrypting can be configured to and be decrypted and perform call function.
In response to receiving the request for positional information from application, processor can be configured to that positional information is carried out to add Positional information that is close and encrypting to application offer, and in response to receiving for relevant with the positional information of encryption from application The positional information generation for performing request, being decrypted and show over the display based on decryption to the positional information of encryption of function Map screen.
Processor can be encrypted to purchase information and provide the purchase information of encryption to application, and in response to from application Receive and request is performed for the function information-related with the purchase of encryption, the purchase information to encrypting is decrypted and will solution Close purchase information is sent to outside shopping server.
Processor can be encrypted to type information and provide the type information of encryption to application, in response to receiving from application Request is performed to for the function relevant with the type information of encryption, the type information to encrypting is decrypted and prints decryption Type information.
According to example embodiment, there is provided a kind of control is performed using at least one application of personal information perform function The method of electronic equipment, methods described includes:In response to receiving request for personal information from application, based on personal letter The pre-stored information that the protection of breath is set for information about for each application determines whether to protect personal information, based on a determination that knot Fruit personal information is encrypted and to application provide encryption personal information, and in response to from application receive for plus The relevant function of close personal information performs request, and the personal information to encrypting is decrypted and performs the function.
Methods described may also include:It is determined that the request received from application is for the request of personal information is also carried out work( The request of energy.
The step of determining may include:When application request personal information, based on the information relevant with the protection of personal information Determine whether to protect personal information, or when being default personal information by the personal information of application request, based on individual The information that the protection of information is relevant determines whether to protect personal information.
The information relevant with the protection of personal information may include the information of the application with regard to personal information need not be protected and Information with regard to being not required to the type of personal information to be protected.
The step of offer, may include:Based on regard to the application of personal information and to be protected with regard to being not required to need not be protected The information of the type of people's information determines not to be protected by the personal information of application request, personal information is not encrypted and to should With offer personal information.
Methods described may also include the implementing result of display function.
Personal information may include the information of the position with regard to electronic equipment, associated person information, with regard to the information of photo files With it is one or more in the information with regard to message.
The step of offer, may include:In response to receiving the request for associated person information from application, contact person is believed Breath be encrypted and to application provide encryption associated person information, and in response to from using reception process for encryption connection It is that people information-related function performs request, the associated person information to encrypting is decrypted and shows over the display based on solving The contact person UI that close associated person information is produced.
The step of execution, may include:In response to receiving for the call function of the associated person information based on encryption from application Perform request, to encrypt associated person information be decrypted and perform call function.
The step of execution, may include:Purchase information is encrypted and the purchase information of encryption is provided to application, and is rung Ying Yucong applications are received and perform request for the function information-related with the purchase of encryption, and the purchase information to encrypting is carried out The purchase information of decryption is simultaneously sent to outside shopping server by decryption.
The step of execution, may include:Type information is encrypted and the type information of encryption is provided to application, and is rung Ying Yucong applications are received and perform request for the function relevant with the type information of encryption, and the type information to encrypting is carried out Decrypt and print the type information of decryption.
According to example embodiment, there is provided a kind of storage is used to perform answers using at least one of personal information perform function The storage medium of program, wherein, described program makes when executed electronic equipment carry out following operation:In response to from application The request for personal information is received, it is pre- using what is be set for each based on the information relevant with the protection of personal information Storage information determines whether to protect personal information, based on a determination that result is encrypted to personal information and provides encryption to application Personal information, and in response to receiving for performing request with the relevant function of personal information of encryption from application, pair adds Close personal information is decrypted and performs the function.
According to various example embodiments, even if after the protection for arranging personal information, user can also be normally used clothes Business, and can prevent and/or reduce the compromised possibility of personal information.
Description of the drawings
By the detailed description below in conjunction with accompanying drawing, above-mentioned and/or other aspects of the disclosure will be apparent from, wherein, Identical label represents identical element, wherein:
Fig. 1 is the block diagram of the example arrangement for illustrating electronic equipment;
Fig. 2 is the block diagram of the example arrangement for illustrating electronic equipment;
Fig. 3 is the block diagram of the example arrangement of the electronic equipment for illustrating Fig. 1;
Fig. 4 is the diagram for illustrating storage example software module in memory;
Fig. 5 is the diagram of the example process for illustrating processor;
Fig. 6 to Fig. 7 is the flow chart of the example for illustrating the data processing between each module of Fig. 5;
Fig. 8 to Figure 13 is the diagram for illustrating various example embodiments;
Figure 14 is the block diagram of the exemplary construction for illustrating secret protection module;
Figure 15 and Figure 16 are the diagrams for illustrating example encryption method;
Figure 17 is the flow chart of the exemplary method for illustrating control electronics;
Figure 18 to Figure 21 is the diagram for illustrating various example embodiments.
Specific embodiment
Hereinafter, the example embodiment of the disclosure is more fully described with reference to the accompanying drawings.In the following description, if Detailed description to known function or configuration will unnecessarily obscure the theme of the disclosure, then can omit to known function Or the detailed description of configuration.Term used in the example embodiment of the disclosure has been contemplated that the function of the disclosure and is determined Justice, and can be changed according to user, operator or legal precedent.Therefore, the definition of term should consider all interior of the disclosure Hold and be made.
Fig. 1 is the block diagram of the example arrangement for illustrating electronic equipment.
With reference to Fig. 1, electronic equipment 100 includes memory 110 and processor (for example, including process circuit) 120.
For example, electronic equipment 100 can be carried out at least one application to perform using any of the function of personal information Equipment, and be capable of achieving to make various types of electronic equipments, such as, for example, TV, electronic blackboard, electrical form, giant display (LFD), smart phone, panel computer, Desktop PC, notebook PC, Set Top Box, intelligent watch, wearable device, imaging device, Household electrical appliance (for example, food reserves device, air-conditioning, washer, baking box, micro-wave oven, washing machine or air purifier), medical treatment dress Put (for example, medical image filming apparatus or medical measuring device (blood sugar monitor, heart rate monitoring unit, monitoring of blood pressure dress Put, body temperature measuring device etc.)), on-vehicle information entertainment device, ship electronic equipment (for example, marine navigation equipment, gyro compass Deng), avionic unit, safety device, headstock unit, industry or domestic robot, unmanned plane, the ATM of financial institution, shop Point of sale (POS) or Internet of Things (IOT) device (for example, bulb, various sensors, heat abstractor, fire alarm, perseverance Warm device, street lamp, bread baker, health and fitness facilities, boiler, heater, boiler etc.), but not limited to this.
Memory 110 can store personal information and the information relevant with the protection of personal information and be set for each application Information.
For example, personal information may include, for example, can expose the information of privacy of user.For example, according to the individual of example embodiment People's information may include the information of the position with regard to electronic equipment 100, associated person information, the information with regard to photo files and with regard to disappearing At least one of information of breath.
For example, in the case where user holds electronic equipment 100, can be with pass with regard to the information of the position of electronic equipment 100 It is corresponding in the information of customer location.
Additionally, content information may include the contact person of name, telephone number, e-mail address, homepage address etc. Information.
With regard to photo files information may include by user shoot photo, by the photo of the Internet download, catch Photo etc..
Text, the comment on SNS, the Email exchanged with the 3rd people with regard to user is may include with regard to the information of message Deng information.
Personal information not only may include the information of the above-mentioned position with regard to electronic equipment 100, associated person information and with regard to The information of photo files, also includes the information of all documents with regard to being write by user or being stored, such as in electronic equipment 100 Document files, content, music file, video, memo file, schedule listing file of storage etc..
The information relevant with the protection of personal information can be set for each application, and may include information whether to protect Protect by the information of the personal information of each application request of multiple applications and the method with regard to being encrypted to personal information Information.
For example, the information relevant with the protection of personal information can be set for each application, and may include many when performing In individual application first using when the personal information that needs be position with regard to electronic equipment 100 information and should for first With the information of the information that need not protect the position with regard to electronic equipment 100.
Additionally, the information relevant with the protection of personal information can be set for each application, and may include many when performing In individual application second using when the personal information that needs be content information and for the second application content need not be protected to believe The information of breath.
The information relevant with the protection of personal information can be set and may include strategy for each application, for example, with regard to The reference information of personal information whether is protected for each application.In addition, may also comprise with regard to being encrypted to personal information The information of method, for example, with regard to the information that will be encrypted using which kind of password.
If receiving the request for personal information from application, processor 120 can be configured to be based on and be directed to often The relevant information of the protection of the personal information that individual application is arranged determining whether to protect personal information, based on a determination that result is to individual Information be encrypted and to application provide encryption personal information, and if from application receive for encryption information have The function of pass performs request, then processor 120 is configured to the personal information to encrypting and is decrypted and performs the function.
For example, if application request personal information, processor 120 can be configured to based on storage in the memory 110 Configuration information determining whether to protect the personal information with regard to respective application, and if it is determined that should protect for respective application Personal information is protected and provides, then processor 120 can be configured to be encrypted personal information and provide encryption to respective application Personal information.
If received with regard to the work(relevant with the personal information of encryption from the application of the personal information for being provided of encrypting Can perform request, then processor 120 can be configured to encryption personal information be decrypted and perform the function.
For example, it is associated person information in personal information, application is chat application, and determination should be protected for chat application In the case of protecting and providing personal information, processor 120 can be configured to be encrypted and to chat application associated person information The associated person information of encryption is provided.If the chat application for being provided of the associated person information of encryption is produced based on associated person information List of friends user interface (UI), and ask to perform the function of showing list of friends UI for producing, then processor 120 can be configured It is that the associated person information to encryption is decrypted and shows list of friends UI of generation.
As described above, chat application can be received and only using the associated person information of encryption, and unencryption can be provided without Actual contact information.Additionally, chat application wishes that the function of display list of friends UI for performing can be in electronic equipment 100 Normally perform.Therefore, can also normally perform while the personal information for preventing such as associated person information is compromised should With.
For example, when the function relevant with the personal information of the encryption by application request is performed in electronic equipment 100, place The personal information that reason device 120 can be configured to encrypting is decrypted and performs the function.When application cannot be known to encryption The result that is decrypted of personal information while can also normally perform by the function of application request, enabling protection is personal Information.
Meanwhile, in the disclosure, the personal information of encryption can refer to such as protected data, and before encrypted Actual personal information is referred to alternatively as such as initial data.
Processor 120 can be configured to determine that the request of application is for the request of personal information or asking for perform function Ask.
For example, if application request personal information, processor 120 can be configured to be based on and arrange for each application The relevant information of protection of personal information determine whether to protect personal information, based on a determination that result personal information is carried out plus It is close, and provide the personal information of encryption to application.But, if application request perform function, processor 120 can be configured to Personal information to encrypting is decrypted and performs by the function relevant with personal information of application request.
For example, if chat application ROL request-online people information is to produce list of friends UI, processor 120 can be configured to It is determined that whether associated person information is protected for chat application, based on a determination that result is encrypted to associated person information and should to chat With the associated person information for providing encryption.But, if chat application request performs call function, processor 120 can be configured It is that the associated person information to encryption is decrypted and performs call function.
Fig. 2 is the block diagram of the example embodiment for illustrating electronic equipment.
With reference to Fig. 2, electronic equipment 100 includes memory 110, processor (for example, including process circuit) 120 and display (for example, including display floater and display driver circuit) 130.Memory 110 and processor 120 have been described above being described, Therefore the further description to memory 110 and processor 120 will not provided.
Display 130 can show it is producing as multiple images (film, drama, record image, slow video etc.) and The various objects of all video images shown by specific frame per second or still image, photo, document etc..
Display 130 can be implemented as, for example, liquid crystal display (LCD), Organic Light Emitting Diode (OLED), plasma Display (PDP) etc..
For example, request is performed for the function relevant with the personal information of encryption if received from application, is located The personal information that reason device 120 can be configured to encrypting is decrypted, and performs the function, and shows pass by display 130 In the implementing result of the function.
For example, request is performed for the calling sending function relevant with the associated person information of encryption if received, Processor 120 can be configured to the associated person information to encrypting and be decrypted, and perform calling sending function, and in display 130 Screen as upper display:The screen is included in the telephone number of other side included in actual contact information and currently holds The information of capable call function.
In this example, chat application can only obtain the associated person information of encryption, and cannot obtain the reality with regard to other side The information of telephone number.Because the associated person information for reality not being provided to chat application, therefore personal information can be protected.
When processor 120 can be configured as application request personal information, based on the letter relevant with the protection of personal information Cease to determine whether to protect personal information, or it is default personal information that can be configured as by the personal information of application request When, determine whether to protect personal information based on the information relevant with the protection of personal information.
For example, if being arranged to be protected for the personal information of the chat application in multiple applications, processor 120 When can be configured as chat application ROL request-online people's information, determined whether based on the information relevant with the protection of personal information Protection associated person information.
If the protection of the personal information for photo files in various personal information is not set, but for connection It is that the personal information of people's information is set protection, then processor 120 can be configured as base during chat application requesting photographs file Determine in the information relevant with the protection of personal information and do not protect photo files, but chat tool request connection can be configured as Protection associated person information is determined when being people's information based on the information relevant with the protection of personal information.
For example, the information relevant with the protection of personal information may include the letter of the application with regard to protecting personal information Cease and be not required to the information of the type of personal information to be protected.
For example, the information relevant with the protection of personal information may include whether to be necessary to determine to individual for each application Whether the information of the protection of information, may also comprise and be necessary not considered based on the type of personal information using determination to personal letter The information of the protection of breath.
For example, the information relevant with the protection of personal information may include to need protection for the chat application in multiple applications Personal information but the information of personal information for map application need not be protected, and therefore, if chat application request Associated person information, then processor 120 can be configured to be encrypted associated person information and provide the connection of encryption to chat application It is people's information, and if map application request position information, then processor 120 can be configured to that positional information is not carried out to add It is close and to map application provide initial data state under positional information.
Selectively, the information relevant with the protection of personal information may include not consider that the type applied is needed for contacting People's information protection personal information protection and need not protect the information of personal information for positional information.Therefore, if chatted Its application or mail applications ROL request-online people's information, then processor 120 can be configured to not consider the type applied and to contact People's information is encrypted, and provides the associated person information of encryption to chat application or mail applications.If chat application or map Application request positional information, then processor 120 can be configured to not consider the type applied and positional information be not encrypted, And to the positional information under chat application or map application offer initial data state.
For example, processor 120 can be configured to be based on information and the pass with regard to protecting the application of personal information Determine in the information of the type for being not required to personal information to be protected and do not protect by the personal information of application request, not to personal letter Breath is encrypted and provides the personal information under initial data state to application.
Meanwhile, Fig. 3 is the block diagram of the example arrangement of the electronic equipment for illustrating Fig. 1.
With reference to Fig. 3, electronic equipment 100 ' includes memory 110, processor (for example, including process circuit) 120, display (for example, including display floater and display driver circuit) 130, communicator (for example, including telecommunication circuit) 140, user interface (example Such as, including interface circuit) 150, application drive device (for example, including application drive circuit) 160 and loudspeaker 170.Can not be more detailed Thin offer with regard to Fig. 1 and Fig. 2 in element repeat element description.
Processor 120 is configured to the integrated operation of control electronics 100 '.
For example, processor 120 includes that RAM 121, ROM 122, host CPU 123, graphic process unit 124, first interface are arrived N-th interface 125-1~125-n and bus 126.
RAM 121, ROM 122, host CPU 123, graphic process unit 124, first interface are to the n-th interface 125-1~125-n Can be connected with each other by bus 126.
First interface to the n-th interface 125-1 to 125-n can be connected with above-mentioned various elements.First interface is to the n-th interface One in 125-1 to 125-n can be the network interface being connected with external device (ED) by network.
The accessible storage device 110 of host CPU 123 is simultaneously opened using operating system (O/S) execution for storing in the memory 110 It is dynamic.Additionally, host CPU 123 is usable in various programs, content, data stored in memory 110 etc. to perform various operations.
ROM 122 stores one group of instruction for activation system.In response to providing in the order being input into and Change on energy, host CPU 123 can be based on the order stored in ROM 122 and replicate the O/S for storing in the memory 110 To in RAM121, and by performing O/S activation systems.It is done in response to starting, host CPU 123 can be by the memory 110 The various application copies of storage are copied to the application program in RAM 121 to perform in RAM 121 by execution Various operations.
Graphic process unit 124 can be produced using calculator (not shown) and renderer (not shown) includes that various objects are (all Such as icon, image, text) screen.Calculator (not shown) can be based on the control instruction for receiving, according to the layout of screen Calculate shown object's property value, coordinate value, shape, size, color etc..Renderer (not shown) can be based on by The property value that calculator (not shown) is calculated produces the screen of the various layouts for including object.Specifically, graphic process unit 124 May be in response to voice that user sends and textual form changed into in the system response of generation, and determine the font of text, size, Color etc..The screen produced by renderer (not shown) can be shown in the viewing area of display 130.
Meanwhile, the program that the operation of above-mentioned processor 120 can pass through to store in the memory 110 is performed.
Memory 110 can store the O/S software modules and such as various content of multimedia for drive electronics 100 ' Various data.
For example, memory 110 may include software module, wherein, when software module is performed, if application request is personal Information, then software module determines whether to protect personal information based on configuration information, based on a determination that result carries out adding to personal information It is close, and the personal information of encryption is provided to application, and if application request performs the function relevant with the personal information of encryption, Then the personal information to encrypting is decrypted and performs the function, and this will hereinafter be described in more detail with reference to Fig. 4.
Communicator 140 may include to be performed according to various types of communication means and various types of external equipments communicate each Plant telecommunication circuit.Communicator 140 may include various telecommunication circuits, such as, for example, however it is not limited to, communication chip (such as WiFi cores Piece, Bluetooth chip, wireless communication chips etc.).
For example, WiFi chip and Bluetooth chip perform communication using WiFi methods and bluetooth approach respectively.Radio communication Chip can refer to for example according to various communication standards (such as IEEE, Zigbee, G mobile communication (3G), the third generation Partner program (3GPP), Long Term Evolution (LTE) etc.) perform the chip for communicating.Additionally, communicator may also include using various The frequency of the 13.56MHz in RF-ID frequency bands (135kHz, 13.56MHz, 433MHz, 860MHz-960MHz, 2.45GHz etc.) The NFC chip that band is operated according to NFC methods.
For example, communicator 140 can use multiple clothes of various telecommunication circuits and each application provided in multiple applications Business device performs communication.For the communication with each server, same communication means can be used, but also dependent on environment using not Same communication means.
The application that application drive device 160 pairs can be provided by electronic equipment 100 ' is driven and perform function.For example, apply Can refer to by the application program performed using oneself, and may include various content of multimedia.For example, term " content of multimedia " can Including the electronic program guides (EPG) in text, audio frequency, still image, animation, video and interactive content, Content Provider Content, the electronic information from user's reception, the information with regard to current event etc., but not limited to this.
Such application can not only provide content of multimedia, and can provide various information, and in order to provide above-mentioned letter Breath, it may be desired to above-mentioned personal information.
As necessary, when the function by application request is performed, loudspeaker 170 can be used for exporting voice signal.Additionally, Electronic equipment 100 ' may also include audio process, video processor, button, USB interface, camera, microphone etc..
Fig. 4 is the diagram for illustrating the example software module of storage in memory (110).
With reference to Fig. 4, the program storage of memory 110, such as to determine that whether protecting the module 111 of personal information, encryption mould Block 112 and function performing module 113 etc..
The operation of above-mentioned processor 120 can pass through the program performing for storing in the memory 110.Hereinafter, use The operation of the processor 120 of the program stored in memory 110 will be described in greater detail below.
For example, if application request personal information, be used to determine whether protect personal information module 111 can be based on The information that the protection of personal information is relevant determines whether to protect personal information for the information that each application is set to perform Function.
Encrypting module 112 can be based on by being used to determine whether that the determination result of the module 111 for protecting personal information is performed The function that personal information is encrypted.
If receiving the request that performs for the function relevant with the personal information of encryption from application, function performs mould Block 113 can be decrypted and perform the function to the personal information encrypted.
Additionally, memory 110 may include communication module, and the communication module as the module communicated with outside execution can Including apparatus module, messenger programs, Short Message Service (SMS) and multimedia information service for being communicated with external device (ED) (MMS) program, the message transmission module of such as e-mail program, call information collect program module and including VoIp modules Phone module etc..
Fig. 5 is the diagram of the example process for illustrating processor.
With reference to Fig. 5, secret protection module 500 includes, for example, privacy engine module 510, policy module 520, strategy DB 521st, data processing module 530 and privacy line module 540.
For example, secret protection module 500 can be configured to a part or the chip that processor 120 includes, and privacy Engine modules 510, policy module 520, strategy DB 521, data processing module 530 and privacy line module 540 also can be configured The part included for processor 120 or chip.
Additionally, secret protection module 500, privacy engine module 510, policy module 520, strategy DB 521, data processing Module 530 and privacy line module 540 can be configured to software module, and in this example, can be stored in memory 110 In.
In the disclosure, for example, it will be assumed that secret protection module 500, privacy engine module 510, policy module 520, plan Slightly DB 521, data processing module 530 and privacy line module 540 are configured to a part or the core that processor 120 includes Piece.
If from the request received using 10 for personal information, secret protection module 500 can be based on and personal letter The information that the protection of breath is relevant determines whether to protect personal information, and based on a determination that knot for each using the information being set Fruit to using 10 provide encryption personal information, and if from using 10 receive for encryption personal information it is relevant Function performs request, then secret protection module 500 can be decrypted and perform the function to the personal information encrypted.Example Such as, the relevant information of the protection of personal information can be defined as privacy policy for the information that each application is set.
Privacy policy is stored in tactful DB 521, and policy module 520 performs management and deposits in tactful DB 521 The function of the privacy policy of storage.
If from the request received using 10 for personal information, privacy engine module 510 can refer to by tactful mould What block 520 was detected determines whether guarantor with regard to the privacy policy of respective application 10 and by using the personal information of 10 requests Protect by the personal information using 10 requests.If it is determined that should protect by the personal information using 10 requests, then privacy engine mould Personal information under initial data state can be encrypted as being protected by block 510 according to privacy policy by data processing module 530 Shield data.
For example, privacy engine module 510 may be in response to for the request of personal information obtains personal information from information source 20. Information source 20 may include memory 21, GPS module 22, WiFi module 23 etc., but not limited to this.Privacy engine module 510 can be from Memory 21 obtains personal information (such as, associated person information, photo files, music file, document etc.), can be from GPS module 22 Positional information is obtained, and information, speed of download with regard to communication quality state etc. can be obtained from WiFi module 23.
Privacy engine module 510 can pass through data processing module 530 and provide adding under protected data state to using 10 Close personal information.
If hidden additionally, from receiving for the request that performs with the relevant function of personal information of encryption using 10 The decryption of the personal information of the encryption under protected data state can be the personal letter under initial data state by private line module 540 Breath, and perform request function.The example of such function may include for example to show the function of list of friends UI, calling connection function Deng.For example, privacy line module 540 can pass through the display function 31 of execution display list of friends UI of display 130 or by logical Letter module performs call function 32.Other examples of such function may include to show the function of purchase UI, send out purchase information It is sent to the function of shopping server, the function of the type information that printing is received from external device (ED), shows function of medical treatment UI etc., but Not limited to this.
For example, privacy line module 540 can pass through the display function that display 130 performs display purchase UI or medical treatment UI 31, the sending function 33 of transmission information is performed using the telecommunication circuit of communicator 140, or it is right using the execution of printer (not shown) The printing function 34 that type information is printed.
Fig. 6 to Fig. 7 is the flow chart of the example for illustrating the data processing between each module of Fig. 5.
With reference to Fig. 6, if using 10 to request personal information of secret protection module 500 (S610), privacy engine module 510 can obtain the personal information (S620) under initial data state from information source 20, and privacy engine module 510 can pass through plan Slightly module 520 check with regard to using 10 privacy policy to determine whether to be necessary to protect personal information (S630).
If it is determined that personal information need to be to be protected, then privacy engine module 510 can be received from data processing module 530 The personal information (S640) of the encryption under protection data mode, and to the individual of the encryption provided using 10 under protected data state People's information (S650).
If it is determined that personal information be not required to it is to be protected, then privacy engine module 510 can to using 10 provide initial data Not encrypted personal information (S660) under state.
Meanwhile, with reference to Fig. 7, if performing the function relevant with personal information using 10 request secret protection modules 500 (S710), then privacy line module 540 can by policy module 520 check with regard to using 10 privacy policy to determine by applying The personal information of 10 requests is to be in (S720) under initial data state under protected data state.
If under protected data state, privacy line module 540 can be to protected data state for personal information Under encryption personal information be decrypted to obtain initial data state under personal information (S730), and use initial data Personal information perform function (S740) under state.
If personal information is under initial data state, privacy line module 540 can be using under initial data state Personal information perform function and be not decrypted process.
Meanwhile, Fig. 8 to Figure 13 is the diagram for illustrating various example embodiments.
If being determined the application request associated person information for needing to protect personal information, processor 120 can be configured to Associated person information is encrypted and to application provide encryption associated person information, and if from application receive for plus Close information-related function performs request, then processor 120 can be configured to the associated person information to encrypting and be decrypted And the contact person UI that on the display 130 associated person information of the display based on decryption is produced.
With reference to regard to above-mentioned Fig. 8, if providing address book information to produce using 121 request secret protection modules 122 List of friends UI, then secret protection module 122 initial data 810 with regard to address book information can be obtained from memory 110.
Here, telephone number " 01095300602 " as the initial data 810 with regard to address book information example, but this The example for generally only describing for convenience, with regard to produce list of friends UI address book information initial data 810 include it is many Individual telephone number.
Secret protection module 122 can be encrypted with will be with regard to address book to the initial data 810 with regard to address book information The initial data 810 of information is converted to the protected data 820 with regard to address book information.
For example, telephone number " 22091820385 " as the protected data 820 with regard to address book information example, but This example for generally only describing for convenience, with regard to the protected data of the address book information with regard to producing list of friends UI 820 include multiple telephone numbers.
Meanwhile, with regard to address book information protected data 820 by entering to the initial data 810 with regard to address book information Row is encrypted and produced, and therefore, physical number " 01095300602 " is expressed as different forms “22091820385”。
Additionally, privacy protection mode 122 can be to the protected data 820 provided using 121 with regard to address book information.Cause This, though address book information is sent to into server 840 using 121, but by being protected number using 121 address informations for sending According to the address book information 820 (22091820385) of the encryption under state, rather than including the initial data shape of actual phone number Address book information 810 (01009530602) under state, and therefore, personal information can be protected.
Meanwhile, if performing display friend's row using the request of protected data 820 with regard to address book information using 121 The protection data 820 with regard to address book information are sent while the function of table UI, then secret protection module 122 can be to regard to address The protected data 820 of book information is decrypted to change into regard to address with regard to the protected data 820 of address book information The initial data 810 of book information, based on initial data list of friends UI 830 is produced, and shows what is produced by display 130 List of friends UI 830.
For example, show and include within a processor two identical secret protection modules 122, but this is to illustrate application 121 request secret protection modules 122 provide the situation of personal information and perform the function relevant with personal information using 121 requests Situation.Processor 120 may include a secret protection module 122.
Similarly, because the initial data 810 of the address book information with regard to being used to show list of friends UI 830 is only aobvious Show in device 130 and used, therefore protected data 810 with regard to address book information, and unavailable pass can be only obtained using 121 In the initial data 810 of address book information, and therefore, personal information can be protected.
Meanwhile, if receive performing request for the call function based on the associated person information encrypted from application, Processor 120 can be configured to the associated person information to encrypting and be decrypted and perform the call function.
With reference to regard to above-mentioned Fig. 9, if user input user operation is marked with performing with list of friends UI 910 Specific people call function, then can send while asking secret protection module 122 to perform call function using 121 and close In the protected data 820 (22091820385) of address book information.
Additionally, secret protection module 122 can be decrypted with will be with regard to the protected data 820 with regard to address book information The protected data 820 (22091820385) of address book information changes into the initial data 810 with regard to address book information (01095300602), and by communicator 140 hold to specific people corresponding with the initial data 810 with regard to address book information Row calling sends request.
Additionally, secret protection module 122 can control electronics while calling transmission request is performed by communicator 140 Device 100 shows calling connection screen 920, wherein, calling connection screen 920 is shown as actual phone number with regard to address The initial data 810 (01095300602) of book information.
For example, when call function is performed, the protected data 820 with regard to address book information can be only obtained using 121 (22091820385), it is not identifiable as the initial data with regard to address book information of actual phone number (01095300602), and therefore, personal information can be protected.
Meanwhile, if application request positional information, processor 120 can be configured to be encrypted positional information and to Using the positional information for providing encryption, and if receive holding for the function relevant with the positional information of encryption from application Row request, then processor 120 can be configured to be decrypted the positional information of encryption, and show over the display based on decryption Positional information produce map screen.
With reference to regard to above-mentioned Figure 10, if the request secret protection of map application 121 ' module 122 positional information is provided with The screen of the current location for representing electronic equipment 100 is produced, then secret protection module 122 can be obtained with regard to position from memory 110 The initial data 810 ' of confidence breath.
For example, the initial data 810 ' with regard to positional information include with regard to longitude and latitude information (37.4562684, 127.0228328) initial data 810 ', but with regard to positional information may include with regard to azimuth and height above sea level rather than longitude and latitude Information.
Secret protection module 122 can be encrypted with will be with regard to positional information to the initial data 810 ' with regard to positional information Initial data 810 ' be converted to protected data 820 ' with regard to positional information.
For example, the protected data 820 ' with regard to positional information may include by being encrypted to the information with regard to longitude and latitude And produce and show information (37.2029352,127.102934), and with as the initial data with regard to positional information 810 ' information with regard to actual longitude and latitude (37.4562684,127.0228328) different form.
Additionally, secret protection module 122 can provide the protected data 820 ' with regard to positional information to map application 121 '. Therefore, even if map application 121 ' sends positional information, the positional information sent by map application 121 ' is in protected data Encryption under state positional information 820 ' (37.2029352,127.102934), rather than exist including actual position information Positional information 810 ' under initial data state (37.4562684,127.0228328), and therefore, personal information can be protected.
Meanwhile, if map application 121 ' is being referred to using the request execution display of protected data 820 ' with regard to positional information While showing the function of screen of the current location of electronic equipment 100, will send with regard to the protected data 820 ' of positional information To secret protection module 122, then secret protection module 122 protected data 820 ' with regard to positional information can be decrypted with The initial data 810 ' with regard to positional information will be changed into regard to the protected data 820 ' of positional information, produced based on initial data The screen of the raw current location for indicating electronic equipment 100, and the present bit for indicating electronic equipment 100 is shown by display 130 The screen put.
For example, to show and include two identical secret protection modules 122 in processor 120, but this is to illustrate Perform using the situation of the offer personal information of 121 request secret protection modules 122 and using 121 requests relevant with personal information Function situation.Processor 120 may include a secret protection module 122.
Similarly, due to regard to for show indicate electronic equipment 100 current location screen positional information original Beginning data 810 ' are only used in display 130, therefore map application 121 ' can be obtained only with regard to the protected of positional information Data 820 ' and the unavailable initial data 810 ' with regard to positional information, and therefore, personal information can be protected.
Meanwhile, for example, electronic equipment 100 can be implemented as the intelligent TV of executable at least one application rather than user's end End device.
With reference to Figure 11, various applications can be shown on the screen of intelligent TV 1100, and in this case, video call Can be performed to ask the memory of intelligent TV 1100 to provide address book information using 1110.
Similarly, the secret protection module 122 in intelligent TV 1100 can obtain the original with regard to address book information from memory Beginning data, by initial data the protected data with regard to address book information is encrypted as, and is received to the offer of video call application 1110 Protection data.
If video call application 1110 using with regard to address book information protected data request perform show with regard to While the function of the screen of address book, to secret protection module 122 protected data with regard to address book information is sent, then it is hidden Private protection module 122 can be decrypted with by with regard to the protected of address book information to the protected data with regard to address book information Data change into the initial data with regard to address book information, and based on initial data the screen with regard to address book information is produced, and lead to Cross display 130 show produce with regard to address book information screen.
In this example, due to only existing with regard to the initial data for display with regard to the address book information of the screen of address book Used in display 130, therefore video call application 1110 can only obtain the protected data with regard to address book information, not The initial data with regard to address book information can be obtained.Therefore, personal information can be protected.
Similarly, user desire to selecting specific people and performing video call with the specific people, video call should Asked to perform video call function, and secret protection module using the protected data with regard to address book information with 1110 122 by being the initial data with regard to address book information controlling communicator with regard to the decryption of the protected data of address book information 140 perform video call function.
Meanwhile, with reference to Figure 12, if performing photo album application in intelligent TV 1200, photo album application is obtained In memory in intelligent TV store photo files are to produce and show various photograph images, as shown in figure 12.Show figure As one of 1210 process will be described as an example.
Photo album application can ask the memory of intelligent TV 1200 to provide corresponding photo files, and secret protection Module 122 can obtain initial data with regard to corresponding photo files from the memory of intelligent TV 1200, and initial data is encrypted It is the protected data with regard to photo files, and protected data is provided to photo album application.
If photo album is applied is performing display including corresponding using the protected data request with regard to photo files While the function of the photograph album screen of image 1210, secret protection module will be sent to regard to the protected data of photo files 122, then secret protection module 122 protected data with regard to photo files can be decrypted for photo files to change into pass In the initial data of photo files, corresponding image 1210 is produced based on initial data, and include producing by the display of display 130 The photograph album screen of raw corresponding image 1210.
In this example, photo album application can only obtain the protected data with regard to photo files, and with regard to being used for Display includes that the initial data of the photo files of the photograph album screen of corresponding image 1210 is only used in display 130.Cause This, the unavailable initial data with regard to photo files of photo album application, and therefore, personal information can be protected.
Meanwhile, even if when data are sent between multiple electronic equipments and server, it is above-mentioned for personal information The process of protection can be employed.
With reference to Figure 13, if the user while performing files passe application in notebook PC screens 1310, select in notebook PC Memory in store photo files and by the photo files be added to perform files passe application files passe window So that photo files to be uploaded onto the server on 1320, then the photo files of addition are uploaded onto the server 1320 by files passe application On.In this example, the secret protection module 122 in notebook PC can detect photo files and be uploaded on server 1320, And the photo files under initial data state are converted to into the photo files under protected data state, and to files passe application Protected data is provided.
Therefore, because the photo files under protected data state are sent to server 1320 by files passe application, because This server 1320 cannot obtain the photo files under initial data state.Therefore, the leakage of personal information can be avoided.
Subsequently, if the user while photo album application being performed in intelligence TV and being performed by photo album application from server 1320 download the photo files under protected data state and show the function of photo files, then hidden in intelligence TV 1330 Private protection module 122 can detect photo album application desired display photo, and the protected number that will be downloaded from server 1320 Photo files are shown according to the photo files decryption under state for the photo files under initial data state and by display 130.
Additionally, if the user while perform file download application in smart mobile phone 1340, downloading from server 1320 protected Photo files under data mode simultaneously perform the function of showing the photo files under the protected data state downloaded, then intelligent hand Secret protection module 122 in machine 1340 can detect file download application desired display photo, by what is downloaded from server 1320 Photo files decryption under protected data state is the photo files under initial data state, and is shown by display 130 Photo files.
Meanwhile, Figure 14 is the diagram of the exemplary construction for illustrating secret protection module.
For example, in the foregoing description with regard to Fig. 8, in processor 120 two identical secret protection modules are included 122, but this is merely for convenience of description.If wrapped using 121, secret protection module 122, memory 110 and display 130 Include in electronic equipment 100 as shown in Figure 4, then a secret protection module 122 can obtain personal information simultaneously from memory 110 Personal information is sent to into display 130 with perform function.
Meanwhile, as shown in figure 13, send between multiple electronic equipments and server the data of encryption can need it is predetermined Encryption method.At this point, Figure 15 and Figure 16 are the diagrams for illustrating encryption method.
According to example embodiment, as shown in figure 15, for example, encryption and decryption can pass through sending out for the personal information that transmission is encrypted The direct key made arrangements for his funeral between end 100 and the receiving terminal 100 ' of the personal information for receiving encryption is exchanged and is performed.
For example, if receive encryption personal information the pre-stored of receiving terminal 100 ' public keys and private key and The public keys that the pre-stored receiving terminal 100 ' of transmission terminal 100 of the personal information of encryption has is sent, then receiving terminal 100 ' can use private key to encrypt personal information (for example, by transmission terminal 100 by corresponding public-key encryption and The personal information of transmission) it is decrypted.In this example, when scheduled event occurs, public keys can send the He of terminal 100 Exchange between receiving terminal 100 '.For example, if predetermined menus are chosen, the address book supported by instant messenger is exchanged Deng public keys can be exchanged.
Additionally, as shown in figure 16, for example, encryption and decryption can be performed by external encryption management server 300.Example Such as, encryption handling server 300 can for example be implemented as Cloud Server operated by equipment manufacturers etc., but not limited to this.
When the management of public keys of encryption handling server 300 and private key, encryption handling server 300 may be in response to From the request of the transmission terminal for sending message, private key is distributed to into the receiving terminal 100 ' of the message for receiving encryption, and Public keys corresponding with the private key for being assigned to receiving terminal 100 ' is distributed to into transmission terminal 100.Therefore, receive eventually End 100 ' can be by using corresponding private key to being solved by sending the message of the public-key encryption that terminal 100 has It is close.Therefore, can produce and provide arbitrary private key in session each time.
Above-mentioned encryption and decryption approaches are only examples, and can use other various encryption and decryption approaches.
Figure 17 is the flow chart of the exemplary method for illustrating control electronics.
Control is performed to be included using the method for at least one electronic equipment applied of personal information perform function, works as application During request personal information, based on the information that the information relevant with the protection of the personal information of pre-stored is set for each application Determine whether to protect personal information (S1710).
Based on a determination that result is encrypted to personal information and provides the personal information (S1720) of encryption to application.
If receiving from application and performing request for the function relevant with the personal information of encryption, the individual for encrypting Information is decrypted and the function is performed (S1730).
Additionally, may also include determining that come the request of self-application be right according to the method for the control electronics of example embodiment In the request or the request of perform function of personal information.
For example, it is determined whether the step of protection personal information may include to be based on when application request personal information and personal letter The relevant information of protection of breath determining whether to protect personal information, or when belonging to predetermined individual by the personal information of application request Determine whether to protect personal information based on the information relevant with the protection of personal information during information.
Additionally, the information relevant with the protection of personal information may include the letter of the application with regard to protecting personal information Breath and the information with regard to being not required to the type of personal information to be protected.
The step of offer, may include to be based on regard to protecting the information of the application of personal information and with regard to protecting The information of the type of the personal information of shield determining whether not protect by the personal information of application request, and not to personal information Personal information is provided in the case of being encrypted to application.
Additionally, may also include the implementing result of display function according to the method for the control electronics of example embodiment.
Personal information may include the information of the position with regard to electronic equipment, associated person information, with regard to the information of photo files At least one of with the information with regard to message.
Further it is provided that the step of include, when application request associated person information, then associated person information is encrypted and to Using the personal information for providing encryption, and include the step of perform, when from application receive for the contact person of encryption letter When the execution of the relevant function of breath is asked, then the associated person information to encrypting is decrypted and shows the contact person's letter based on decryption The contact person UI that breath is produced.
Additionally, perform the step of include, when from application receive for based on encryption associated person information call function Execution ask when, to encrypt associated person information be decrypted and perform call function.
Figure 18 to Figure 21 is the diagram for illustrating various example embodiments.
In figure 18, electronic equipment 100 can be such as food reserves device (for example, refrigerator) 1800.If electronics sets Standby 100 is food reserves device, then relevant with food reserves various to apply 1811 to may be mounted to that in electronic equipment 100.Example Such as, electronic equipment 100 may include to perform the storage for checking the food stored in the storeroom 1801 of food reserves device 1800 The application of the function of condition, the application of the function of the storage temperature of execution adjustment electronic equipment 100, execution check electronic equipment The application of the function of the inventory history of 100 food, execution are displayed in the storeroom 1801 of food reserves device 1800 and store Food function application, do not perform purchase and will be stored in application of function of food in electronic equipment 100 etc., but not It is limited to this.At least one of above-mentioned application can be implemented as each function of being provided by an application.
In this example, needed to protect the example application of personal information to could be for making according to the determination of example embodiment With the application 1811 of purchase information purchase article (for example, food etc.).
For example, it is defeated if user is input into purchase information to buy article by user interface 150 (for example, shown in Fig. 3) The purchase information for entering can be stored in memory 110.
Purchase information may include such as user profile (for example, user name, the pet name of user, the e-mail address of user Deng), with regard to by article to be purchased information (for example, the identification information of food, the shelf-life information of food, with regard to will Information of the quantity of purchased food etc.), the financial information (for example, card number, term of validity etc. of card) needed for purchase and dispensing Information (for example, postcode of station address, residence country, user etc.).
In another example, processor 120 can detect the food stored in the storeroom 1801 of food reserves device 1800 Type, quantity, shelf-life, Expiration Date of thing etc..If the food stored in the storeroom 1801 of food reserves device 1800 One of type, quantity and Expiration Date be not reaching to predetermined standard, then processor 120 can be by with regard in the memory 110 must The information of article that must be purchased is stored as purchase information automatically.
In this case, based on for the user's request of the state for confirming purchase information, can ask to process using 1811 Device 120 provides purchase information to show the purchase UI 1831 including purchase information.
Processor 120 can be encrypted to purchase information and provide the purchase information of encryption to application.If it is right to receive Request is performed in the function information-related with the purchase of encryption, then processor 120 can be decrypted to the purchase information encrypted And the purchase UI 1831 for the purchase information based on decryption being shown by display 130 and being produced.
For example, if providing purchase information to produce purchase UI 1831 using 1811 request secret protection modules 122, Secret protection module 122 can obtain the initial data 1821 with regard to buying information from memory 110.
For example, with regard to buy information initial data 1821 can be such as address a part (such as “Manhattan”)。
Secret protection module 122 can be encrypted to the initial data 1821 with regard to buying information and will be with regard to purchase information Encryption raw information 1821 be converted to regard to buy information protected data 1822.
Here, the protected data 1822 with regard to buying information can be a part (such as " P of such as station address [Manhattan]”)。
Subsequently, secret protection module 122 can be to the protected data 1822 provided using 1811 with regard to buying information.Cause This, even if purchase information is sent to into server 830 in the case where user does not agree to using 1811, privacy information also can quilt Protection, this is because by the purchase information 1822 for using the 1811 purchase information for sending being the encryption under protected data state.
Using 1811 the request of protected data 1822 with regard to personal information can be used to perform the work(for showing purchase UI 1831 Energy.So, once will be sent to secret protection module 1822 with regard to the protection data 1822 for buying information using 1811, privacy is protected Shield module 122 can be decrypted to the protected data 1822 with regard to buying information, and by with regard to the protected number of purchase information The initial data 1821 with regard to buying information is converted to according to 1822.Display 130 can produce the purchase including initial data 1821 UI 1831 simultaneously shows the purchase UI 1831 of generation.In this case, buying UI 1831 may include purchase information.Purchase letter Breath may include at least one of user profile as above, Item Information, financial information and distribution information.
In this example, using 1811 also can only obtain with regard to buy information protected data 1822, and with regard to purchase Buy information initial data 1822 be simply displayed device 130 for show buy UI 1831.Therefore, using 1811 unavailable passes In the initial data 1821 of purchase information, and therefore, personal information can be protected.
With reference to Figure 19, determining that the user of the article that will be bought can use please want to buy using 1911 to shopping server 1900 Buy article.In this example, the application 1911 of Figure 19 can be same or similar with the application 1811 of Figure 18, or with apply 1811 The application of same type.
According to the purchase of article ask, using 1911 can request processor 120 provide purchase information so that user is defeated The purchase information for entering and storing in the memory 110 is sent to shopping server 1900.Shopping server 1900 can be management User expects the server of the dispensing of the article of purchase.For example, shopping server 1900 can search for expecting purchase with user The dealer of article simultaneously asks dealer by the residential area of item dispenser to user.In this example, shopping server 1900 can To be the server that for example directly run by dealer or the server sold as multiple dealers.Shopping server 1900 can be implemented as more than one server or Cloud Server.
When using 1911 request purchase information, processor 120 can be encrypted and to carrying using 1911 to purchase information For the purchase information encrypted.Subsequently, if receiving holding for the function information-related with the purchase of encryption from using 1911 Row is asked, then processor 120 can be decrypted and be sent out the purchase information decrypted by communicator 140 to the purchase information encrypted It is sent to outside shopping server 1900.
For example, if providing the purchase by shopping server 1900 is sent to using 1911 request secret protection modules 122 Information is bought, then secret protection module 122 can obtain the initial data 1921 with regard to buying information from memory 110.Subsequently, privacy Protection module 122 can be encrypted and be converted to initial data 1921 protected to the initial data 1921 with regard to buying information Data 1922.
For example, the protected data 1922 with regard to buying information can be a part (such as " P of such as station address [Manhattan]”)。
Secret protection module 122 can be to the protected data 1922 provided using 1911 with regard to shopping information.
Using 1911 the request of protected data 1922 with regard to shopping information can be used to perform and shopping information is sent to into purchase The function of thing server 1900.So, if using 1911 privacy will be sent to regard to the protected data 1922 of shopping information Protection module 122, then secret protection module 122 pairs be decrypted with regard to the protected datas 1922 of buying information and will be with regard to purchase Buy information protected data 1922 be converted to regard to buy information initial data 1921.The telecommunication circuit of communicator 140 can Initial data 1921 after conversion is sent to into shopping server 1900.
In this example, also can only obtain with regard to buying the protected data 1922 of information using 1911, and be sent The initial data 1921 with regard to buying information to shopping server is only used by the telecommunication circuit of communicator 140.Therefore, apply 1911 can not obtain with regard to buy information initial data 1921, and therefore, personal information can be protected.
With reference to Figure 20, electronic equipment 100 can be such as image forming apparatus 2000 (for example, printer).
If electronic equipment 100 is imaging device, relevant with the printing of content various types of application 2011 can quilt In electronic equipment 100.For example, electronic equipment 100 may include for arranging Printing Qptions (such as, printing amount, printing matter Amount, one side are printed or printings of duplex printing, colour print or black and white, layout etc.) application, go through for performing offer printing The application of the function of history, the application of forwarding address for arranging mimeograph documents, for printing content according to predetermined Printing Qptions Application etc., but not limited to this.Meanwhile, at least one of above-mentioned application can be implemented as by each work(of an application offer Energy.
In this example, can be according to the example of the application of the protected personal information of offer needs of example embodiment For printing the application 2011 of the content selected by user.
For example, if the user while external equipment (not shown) (for example, personal computer, notebook, smart phone Deng) in select by content to be printed, then the content for being printed can be converted into into printable form and be sent to electricity Sub- equipment 100.Additionally, if the user while select the content that will be printed in external equipment, then the content for being printed can be sent out Electronic equipment 100 is sent to, and the content changing for receiving can be printable form by electronic equipment 100.Printable lattice The example of formula can be the Postscript (PS) of back printer language, printer control language (PCL) etc..Have changed by Content to can print form may be sent to that the memory 110 of electronic equipment 100.Storage form in the memory 110 is Jing is changed to the printable content of electronic equipment 100 and is referred to alternatively as type information.
In this example, using 2011 can request processor 120 provide type information with basis from expecting to print selected The request of the user of the content selected performs print job.
Processor 120 can be encrypted to type information and provide the type information of encryption to application.Receiving from application To the request that performs of the relevant function of type information with encryption, processor 120 can be decrypted simultaneously to the type information of encryption Print job is performed using the type information of decryption by print unit 180.For example, processor 120 can use ink ejecting method, point At least one of spray method and laser printing method print type information on the print medium.
For example, if providing type information using 2011 request secret protection modules 122, secret protection module 122 can The initial data 2021 with regard to type information is obtained from memory 110.
For example, the initial data 2012 with regard to type information may include at least one of such as this paper and image.
Secret protection module 122 can be encrypted to the initial data 2021 with regard to type information and will be with regard to type information Initial data 2021 be converted to protected data 2022 with regard to type information.
Secret protection module 122 can be to the protected data 2022 provided using 2011 with regard to type information.Therefore, even if Using 2011 not in the case of user's agreement to the transmission type information of server 840, privacy information also can be protected, This is because the type information 2022 of the encryption by the form for using 2011 type informations for sending being protected data.
Using 2011 the request of protected data 2022 with regard to type information can be used to perform to print type information Function.So, if using 2011 secret protection module 122 will be sent to regard to the protected data 2022 of type information, Then secret protection module 122 can be decrypted to the protected data 2022 with regard to type information, be converted into regard to printing Initial data 2021 is simultaneously sent to print unit 180 by the initial data 2021 of information.Print unit 180 can be by beating for receiving Official seal breath is printed upon on printing paper.
In this example, protected data 2022 with regard to type information is only obtained using 2011, and accordingly, with respect to being used for The initial data 2021 of the type information printed to type information is only used in print unit 180.Therefore, apply 2011 cannot obtain the initial data 2021 with regard to type information, and therefore, personal information can be protected.
With reference to Figure 21, electronic equipment 100 can be such as (for example, the computerized tomography bat of medical image filming apparatus 2100 Take the photograph device, ultrasonic wave filming apparatus, X-ray filming apparatus, MR imaging apparatus etc.).
If electronic equipment 100 is medical image filming apparatus, the various applications relevant with the shooting of medical image 2111 may be mounted to that in electronic equipment 10.For example, electronic equipment 100 may include perform reference object (such as patient, animal or Body mould) function application, perform and the shooting option of medical image be set (for example, control is irradiated to the choosing of wavelength on object Item, amount of radiation of signal etc.) function application, drive rotating frame application, for the guide rail or platform of regulating object position The medical image of shooting is sent to the application of the function of external equipment, the work(of the medical image of execution input object for plate, execution Can application, show the application of information of medical image etc. with regard to catching object, but not limited to this.Meanwhile, in above-mentioned application At least one can be implemented as by one application provide each function.
In this example, according to the privacy information of example embodiment need the example of protected application can be show or The application 2111 of the medical information of sending object.
Medical information can be received from user input or from external server (not shown), and be stored in electronic equipment 100 Memory 110 in.In this example, medical information may include weight, height, blood pressure, blood sugar level, body temperature, the disease of patient Case history history etc..If object is taken, processor 120 can in the memory 110 store another example as medical information Medical image.
In this example, the request of the user from the medical information for expecting confirmation patient, request can be based on using 2111 Processor 120 provides medical information to show medical science UI 2131 including medical information.
Processor 120 can be encrypted to medical information and provide the medical information of encryption to application.Receiving from application When asking to the execution for the function relevant with the medical information of encryption, processor 120 can be carried out to the medical information encrypted Decryption simultaneously shows medical science UI 2131 that the medical information based on decryption is produced by display 130.
For example, if providing medical information to produce medical science UI using 2111 request secret protection modules 122, privacy is protected Shield module 122 can obtain the initial data 2121 with regard to medical information from memory 110.
For example, the initial data 2121 with regard to medical information can be the medical image of the inside for for example catching object.
Secret protection module 122 initial data 2121 with regard to medical information can be encrypted and be converted into regard to The protected data 2122 of medical information.
Secret protection module 122 can be to the protected data 2122 provided using 2111 with regard to medical information.Therefore, even if Using 2111 not in the case of user's agreement to the transmission medical information of server 840, privacy information also can be protected, This is because the medical information 2122 of the encryption by the form for using 2111 medical informations for sending being protected data.
Using 2111 the request of protected data 2122 with regard to medical information can be used to perform the work(for showing medical science UI 2131 Energy.So, if using the protected data 2122 sent to secret protection module 122 with regard to medical information, secret protection Module 122 can be decrypted and be converted into regard to the original of medical information to the protected data 2122 with regard to medical information Data 2121.Display 130 can produce medical science UI 2131 including initial data 2121 and show medical science UI 2131 of generation.
In this example, protected data 2122 with regard to medical information is only obtained using 2111, and accordingly, with respect to being used for The initial data 2121 for showing the medical information of medical science UI 2131 is only used in display 130.Therefore, using 2111 nothings Method obtain with regard to medical information initial data 2121, and therefore, medical information can be protected.
Meanwhile, with regard to the storage medium according to example embodiment, store in storage medium for performing using personal letter The program of at least one application of breath perform function, described program performs following operation:Had based on the personal information with pre-stored The information of pass determines whether to protect personal information, when application request personal information, base for the information that each application is set In it is determined that result personal information is encrypted and to application provide encryption personal information, and when from application receive for When the execution of the function relevant with the personal information of encryption is asked, the personal information to encrypting is decrypted and performs the work( Energy.
Simultaneously, it is possible to provide store the non-transitory for performing the program of the control method according to example embodiment and calculate Machine computer-readable recording medium.
For example, it is possible to provide store the non-transitory computer-readable medium of the program for performing following operation:When application please It is true to perform for the information that each application is set based on the information relevant with the personal information of pre-stored when seeking personal information It is fixed whether protect the program of personal information, based on a determination that result is encrypted to personal information and provides the individual of encryption to application Information, the personal letter when the execution request with regard to the function relevant with the personal information of encryption is received from application, to encryption Breath is decrypted and performs the function.
Non-transitory recordable media refer to can semi-permanently data storage medium.For example, be able to can remember in non-transitory Above-mentioned various example realities are stored and provided in recording medium (such as, CD, DVD, hard disk, Blu-ray disc, USB, memory card, ROM etc.) Apply example and program.
Although bus is not shown in the above-mentioned block diagram with regard to electronic equipment, can be performed in electronics by bus Communication between each element of equipment.Additionally, each device may also include performs the processor of above-mentioned various steps (such as CPU, microprocessor etc.).
Above-mentioned example embodiment and advantage are only that example is not to be interpreted as limiting the disclosure.This teaching can be by easily It is applied to the equipment of other kinds type.Additionally, the description of example embodiment of this disclosure is intended to explanation, being not intended to limit right will The scope asked, and many replacements, modifications and variations are apparent to one skilled in the art.

Claims (15)

1. it is a kind of to be configured to perform at least one electronic equipment applied for using personal information perform function, the equipment bag Include:
Memory, is configured to store personal information, and the information relevant with the protection of personal information applies quilt for each Arrange;
Processor, is configured to respond to from using the request received for personal information, and being determined based on the information for arranging is No protection personal information, based on a determination that result is encrypted to personal information and provides the personal information of encryption, response to application Request is performed for the function relevant with the personal information of encryption in receiving from application, the personal information to encrypting is solved It is close and perform the function.
2. electronic equipment as claimed in claim 1, wherein, processor is configured to determine that the request for carrying out self-application is for individual The request of people's information is also carried out the request of the function.
3. electronic equipment as claimed in claim 1, wherein, when processor is configured as application request personal information, it is based on The information relevant with the protection of personal information determining whether to protect personal information, or when being by the personal information of application request During default personal information, determine whether to protect personal information based on the information relevant with the protection of personal information.
4. electronic equipment as claimed in claim 1, wherein, the information relevant with the protection of personal information is included with regard to need not The information and the information with regard to being not required to the type of personal information to be protected of the application of protection personal information.
5. electronic equipment as claimed in claim 4, wherein, processor is configured to be based on regard to protecting personal information Application information and with regard to be not required to personal information to be protected type information come determine do not protect by application request People's information, is not encrypted to personal information and provides personal information to application.
6. electronic equipment as claimed in claim 1, also includes:
Display,
Wherein, processor is configured to show the implementing result of the function over the display.
7. electronic equipment as claimed in claim 6, wherein, personal information includes the information of the position with regard to electronic equipment, connection It is one or more in people's information, the information with regard to photo files and the information with regard to message.
8. electronic equipment as claimed in claim 7, wherein, in response to receiving the request for associated person information from application, Processor is configured to be encrypted associated person information and provides the associated person information of encryption to application, in response to connecing from application The request that performs for the function relevant with the associated person information of encryption is received, processor is additionally configured to the contact person to encrypting Information is decrypted and shows over the display the contact person UI that the associated person information based on decryption is produced.
9. electronic equipment as claimed in claim 7, wherein, in response to receiving for the contact person's letter based on encryption from application The call function of breath performs request, and processor is configured to the associated person information to encrypting and is decrypted and performs calling work( Energy.
10. electronic equipment as claimed in claim 7, wherein, in response to receiving the request for positional information, place from application Reason device is configured to be encrypted positional information and provides the positional information of encryption to application, right in response to receiving from application In the request that performs of the function relevant with the positional information of encryption, processor is additionally configured to the positional information to encrypting and solves Map screen that is close and showing the positional information generation for being based on decryption over the display.
A kind of 11. controls perform the method for the electronic equipment using at least one application of personal information perform function, the side Method includes:
In response to receiving the request for personal information from application, determine whether to protect personal letter based on the information of pre-stored Breath, wherein, the information relevant with the protection of personal information is set for each application;
Based on a determination that result is encrypted to personal information and provides the personal information of encryption to application, and in response to from application Receive and request is performed for the function relevant with the personal information of encryption, the personal information to encrypting is decrypted and performs The function.
12. methods as claimed in claim 11, also include:
It is determined that the request for carrying out self-application is for the request of personal information is also carried out the request of the function.
13. methods as claimed in claim 11, wherein it is determined that step includes:When application request personal information, based on it is individual The relevant information of protection of people's information determining whether to protect personal information, or when being default by the personal information of application request During personal information, determine whether to protect personal information based on the information relevant with the protection of personal information.
14. methods as claimed in claim 11, wherein, the information relevant with the protection of personal information is included with regard to protecting The information and the information with regard to being not required to the type of personal information to be protected of the application of shield personal information.
15. methods as claimed in claim 14, wherein, there is provided step includes:Based on regard to personal information need not be protected Using information and information with regard to being not required to the type of personal information to be protected do not protect by the individual of application request to determine Information, is not encrypted to personal information, and provides personal information to application.
CN201610911018.6A 2016-10-19 2016-10-19 Electronic equipment and control method thereof Withdrawn CN106599712A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610911018.6A CN106599712A (en) 2016-10-19 2016-10-19 Electronic equipment and control method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610911018.6A CN106599712A (en) 2016-10-19 2016-10-19 Electronic equipment and control method thereof

Publications (1)

Publication Number Publication Date
CN106599712A true CN106599712A (en) 2017-04-26

Family

ID=58555656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610911018.6A Withdrawn CN106599712A (en) 2016-10-19 2016-10-19 Electronic equipment and control method thereof

Country Status (1)

Country Link
CN (1) CN106599712A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111567076A (en) * 2018-01-12 2020-08-21 三星电子株式会社 User terminal device, electronic device, system including the same, and control method
CN113220690A (en) * 2021-05-26 2021-08-06 青岛海尔科技有限公司 Target data storage method and device, storage medium and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130205404A1 (en) * 2009-02-02 2013-08-08 Yahoo! Inc. Protecting privacy of shared personal information
US20140101443A1 (en) * 2012-10-05 2014-04-10 Samsung Electronics Co., Ltd. Method and apparatus for selectively providing protection of screen information data
CN105719120A (en) * 2016-04-25 2016-06-29 成都蓉科联创科技有限责任公司 Method for encrypting privacy information on express waybills

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130205404A1 (en) * 2009-02-02 2013-08-08 Yahoo! Inc. Protecting privacy of shared personal information
US20140101443A1 (en) * 2012-10-05 2014-04-10 Samsung Electronics Co., Ltd. Method and apparatus for selectively providing protection of screen information data
CN105719120A (en) * 2016-04-25 2016-06-29 成都蓉科联创科技有限责任公司 Method for encrypting privacy information on express waybills

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111567076A (en) * 2018-01-12 2020-08-21 三星电子株式会社 User terminal device, electronic device, system including the same, and control method
CN113220690A (en) * 2021-05-26 2021-08-06 青岛海尔科技有限公司 Target data storage method and device, storage medium and electronic device

Similar Documents

Publication Publication Date Title
US10572674B2 (en) Terminal device and method for protecting information thereof
US20190012756A1 (en) Method and system for providing information regarding with delivery article using augmented reality
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
JP5753947B2 (en) Method, system, and apparatus for sharing application information
US10762542B2 (en) Item transfer apparatus, system and method
EP3295363B1 (en) Terminal device and method for protecting information thereof
US11017345B2 (en) Method for providing delivery item information and apparatus therefor
CN104428788A (en) Secure printing in a cloud-based print system
EP3298535B1 (en) Electronic apparatus and controlling method thereof
WO2013057885A1 (en) Information processing apparatus, server, information processing system and information processing method
US9851930B2 (en) Release codes with print job identifiers and directives
US20180285855A1 (en) System for proxy payment based on shared electronic commerce shopping cart, method thereof and non-transitory computer readable storage medium having computer program recorded thereon
JP2017208136A (en) Information processing device, server device, and information processing system
CN109145530A (en) Online document automatic authorization method, apparatus and electronic equipment
CN106599712A (en) Electronic equipment and control method thereof
US20150256402A1 (en) Method and apparatus for grouping personal electronic devices using information pattern code
JP2014127005A (en) Image forming apparatus and equipment information management system
WO2021026268A1 (en) Pairing merchant point of sale with payment reader terminal via server application programming interface
JP6405711B2 (en) Control program and information processing apparatus
US9712653B2 (en) Data transmission device, data transmission method and program for data transmission device
US20200213859A1 (en) Electronic device and controlling method of electronic device
JP2006106228A (en) Portable computer and radio tag data display method
KR102372180B1 (en) Apparatas and method for offering safety of uniform resource locator in an electronic device
CN109426721B (en) Safety prompting method and device based on virtual keyboard
KR102639502B1 (en) Method for providing a policy to an electronic device, storage medium and server therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20170426