CN109871707A - Method for secret protection and device calculate equipment and storage medium - Google Patents
Method for secret protection and device calculate equipment and storage medium Download PDFInfo
- Publication number
- CN109871707A CN109871707A CN201711262822.7A CN201711262822A CN109871707A CN 109871707 A CN109871707 A CN 109871707A CN 201711262822 A CN201711262822 A CN 201711262822A CN 109871707 A CN109871707 A CN 109871707A
- Authority
- CN
- China
- Prior art keywords
- characteristic
- face
- content
- biological characteristic
- secret protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 86
- 230000008569 process Effects 0.000 claims description 38
- 230000001815 facial effect Effects 0.000 claims description 24
- 238000000605 extraction Methods 0.000 claims description 23
- 238000004422 calculation algorithm Methods 0.000 claims description 14
- 230000006870 function Effects 0.000 claims description 7
- 210000001525 retina Anatomy 0.000 claims description 6
- 230000005611 electricity Effects 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 7
- 239000000284 extract Substances 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 3
- 244000097202 Rathbunia alamosensis Species 0.000 description 2
- 235000009776 Rathbunia alamosensis Nutrition 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 2
- 238000012512 characterization method Methods 0.000 description 2
- 238000010009 beating Methods 0.000 description 1
- 210000004204 blood vessel Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000036299 sexual function Effects 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of method for secret protection and device, calculates equipment and storage medium.This method comprises: to needing the content for carrying out secret protection to encrypt, and save encrypted content;Label associated with encrypted content is created, also, sets hidden state for the encrypted content;Label is encrypted;When needing to access the content, label is decrypted;If successful decryption, encrypted content is shown in the display interface, otherwise shows unrelated content in the display interface.Due to not only being encrypted to private content, also label is encrypted, so further improving the security performance of private content compared with the prior art.Moreover, showing unrelated content in the display interface when decrypting failure, the content of encryption can not be accessed by leading to unauthenticated user so at all, be leaked it not to further enhance the protection of private content.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of private content for protecting electronic equipment
Method for secret protection and device calculate equipment and storage medium.
Background technique
Quote www.xinhuanet.com's report, mobile Internet user's magnitude rough estimate in 2016 was close to more than 700,000,000,2016 years netizens
The average daily surf time reach 3.8 hours.Mobile phone browser is still the net-fault tool of netizen's first choice.Netizen is using browsing
Device online, retains the contents such as the bookmark to get off, document, inevitably occurs needing to carry out privacy encipherment protection partial content
Demand.And currently occupy the big cell phone system (android/iOS) of amount biggish two, these documents can not be carried out effective
Protection, once mobile phone passes into others' hands, is just easy to be obtained by others.
In the prior art, in order to protect privacy of user, allow user to the application program in mobile phone (for example, 360 privacies are protected
Dangerous case) setting password encrypted, start application program when must input correct password, so as to prevent other people from arbitrarily beating
It opens the application program and reveals privacy.However, in some cases, user but must not its underground password allow other people to open to answer
With.Although user is provided with password at this time, but the privacy to stick one's chin out of having to does not play very well the privacy of user
Protective effect.Moreover, password or password are easy to pass out of mind or be forged by people, lead to not protect private content.Therefore, it is desirable to
A kind of convenient and effective method for secret protection.
Summary of the invention
The purpose of the present invention is to provide in a kind of secret for capableing of operation readiness and highly-safe protection electronic equipment
The method for secret protection and device of appearance calculate equipment and storage medium.
According to an aspect of the present invention, a kind of method for secret protection for electronic equipment, the secret protection are provided
Method includes: and to save encrypted content to needing the content for carrying out secret protection to encrypt;Creation has been encrypted with described
The associated label of content, also, set hidden state for the encrypted content;The label is encrypted;
When needing to access the encrypted content, the label is decrypted;If successful decryption is shown in the display interface
Show the encrypted content, otherwise shows the content unrelated with the encrypted content in the display interface.
In method for secret protection of the invention, due to not only to needing the content for carrying out secret protection to encrypt, going back
Label associated with the encrypted content is encrypted, so improving the peace of private content compared with the prior art
Full performance.Moreover, being shown in the display interface in the decryption failure to the label unrelated with the encrypted content
Content causes unauthenticated user that the content unrelated with the encrypted content can only be accessed in this way, thus further
The protection for strengthening private content is leaked it not.In addition, user only needs to have added by clicking label
Close content is presented to the user, and therefore, user is very convenient when using, without any obstacle, better user experience.
Preferably, the method for secret protection can also include: the biology spy that user is acquired under privacy protection mode
Sign;If difference between collected biological characteristic and preset biological characteristic be less than or equal to predetermined value, release to institute
The locking for stating display interface, in response to user click the label and by the encrypted content be set as display state and
It is shown on display interface;If difference between collected biological characteristic and the preset biological characteristic be greater than it is predetermined
Value, then lock the display interface.
Preferably, the method for secret protection can also include the biological characteristic and storage life that storage is acquired or downloaded in advance
The characteristic of object feature.
Preferably, the method for secret protection can also include carrying out mathematical algorithm processing to the collected biological characteristic of institute
To extract the characteristic of biological characteristic.
Preferably, the method for secret protection can also include the characteristic and storage to extracted biological characteristic
Biological attribute data is compared.
Preferably, what the content can be that electronic device user accesses during online includes text, photo, audio
And/or the web page contents of video.
Preferably, the label can be the browser bookmark for being linked to webpage.
Preferably, the biological characteristic can be face, fingerprint, palmmprint, iris, retina, pulse, sound or by bonding force
Degree.
Preferably, the raw method for secret protection can also include face registration process and face recognition process, wherein people
Face registration process includes the image for obtaining object to be registered, and it is to be registered to obtain to carry out feature extraction to the image of object to be registered
The characteristic of object differentiates whether object to be registered is face by the characteristic, if differentiating, object to be registered is
The characteristic of acquisition is then stored in facial feature database module by face, and by the image of the object to be registered of acquisition
It is stored in face library module as facial image;Face recognition process includes the image for obtaining object to be identified, to be identified
The image of object carries out feature extraction to obtain the characteristic of object to be identified, based on characteristic by the to be identified right of acquisition
As being compared with the face being stored in face library module, if obtain object to be identified and be stored in face database
Face between difference be less than or equal to designated value, then authenticate success, otherwise authentification failure.
Preferably, the face recognition process can also include that the characteristic of the object to be identified of acquisition is uploaded to people
Face database module, to update face database.
According to another aspect of the present invention, a kind of privacy protection device for electronic equipment is provided.The privacy is protected
Protection unit includes: encrypting storing unit, for needing the content for carrying out secret protection to encrypt, and save encrypted it is interior
Hold;Label creating unit, for creating label associated with the encrypted content, also, will be in described encrypted
It is installed with and is set to hidden state;Encryption unit, for being encrypted to the label;Decryption unit, described in being accessed when needs
When encrypted content, the label is decrypted;Display unit is shown in the display interface if being used for successful decryption
Show the encrypted content, otherwise shows the content unrelated with the encrypted content in the display interface.
Preferably, the electronic equipment can also include the biological characteristic for acquiring user under privacy protection mode
Acquisition module, wherein if acquisition module difference between collected biological characteristic and preset biological characteristic be less than etc.
In predetermined value, then successful decryption;If acquisition module between collected biological characteristic and the preset biological characteristic
Difference is greater than predetermined value, then decrypts and fail.
Preferably, the electronic equipment can also include special for storing the biology for the biological characteristic for acquiring or downloading in advance
Levy the biological attribute data library module of library module and the characteristic for storing biological characteristic.
Preferably, the electronic equipment can also include characteristic processing module, for collected to acquisition module
Biological characteristic carries out mathematical algorithm processing to extract the characteristic of biological characteristic.
Preferably, the electronic equipment can also include biological attribute data comparison module, for extraction biological characteristic
Characteristic and the biological attribute data that is stored in biological attribute data library module be compared.
Preferably, what the content can be that electronic device user accesses during online includes text, photo, audio
And/or the web page contents of video.
Preferably, the label can be the browser bookmark for being linked to webpage.
Preferably, the biological characteristic can be face, fingerprint, palmmprint, iris, retina, pulse, sound or by bonding force
Degree.
Preferably, the electronic equipment can also include the mould for executing face registration process and face recognition process
Block, wherein face registration process includes being taken pictures with camera to obtain the image of object to be registered, to the image of object to be registered
Feature extraction is carried out to obtain the characteristic of object to be registered, differentiated by the characteristic object to be registered whether be
Face, if differentiating, object to be registered is face, and the characteristic of acquisition is stored in facial feature database module, and will
The image of the object to be registered obtained is stored in face library module as facial image;Face recognition process includes using camera
It takes pictures to obtain the image of object to be identified, feature extraction is carried out to obtain the spy of object to be identified to the image of object to be identified
Data are levied, the object to be identified of acquisition is compared with the face being stored in face library module based on characteristic, if
The object to be identified of acquisition and the difference being stored between the face in face database are less than or equal to designated value, then certification at
Function, otherwise authentification failure.
Preferably, in face recognition process, the characteristic of the object to be identified of acquisition is uploaded to face database
Module, to update face database.
According to another aspect of the present invention, a kind of calculating equipment is provided, the calculating equipment includes: processor;And
Memory is stored thereon with executable code, when the executable code is executed by the processor, holds the processor
The above-mentioned method for secret protection of row.
According to another aspect of the present invention, a kind of non-transitory machinable medium is provided, being stored thereon with can
Code is executed, when the executable code is executed by the processor of electronic equipment, the processor is made to execute above-mentioned privacy
Guard method.
In method for secret protection and device of the invention, due to not only to needing the content for carrying out secret protection to add
It is close, also label associated with the encrypted content is encrypted, so improving in secret compared with the prior art
The security performance of appearance.Moreover, being shown and the encrypted content in the display interface in the decryption failure to the label
Unrelated content causes unauthenticated user that the content unrelated with the encrypted content can only be accessed in this way, thus
The protection for further enhancing private content is leaked it not.In addition, user only needs by clicking label
Encrypted content is presented to the user, therefore, user is very convenient when using, without any obstacle, better user experience.
Detailed description of the invention
Disclosure illustrative embodiments are described in more detail in conjunction with the accompanying drawings, the disclosure above-mentioned and its
Its purpose, feature and advantage will be apparent, wherein in disclosure illustrative embodiments, identical reference label
Typically represent same parts.
Fig. 1 is to show the flow chart of the method for secret protection of embodiment according to the present invention.
Fig. 2 is to show the block diagram of the electronic equipment of embodiment according to the present invention.
Fig. 3 is to show the flow chart of the biological characteristic registration process of embodiment according to the present invention.
Fig. 4 is to show the flow chart of the living things feature recognition process of embodiment according to the present invention.
Fig. 5 is to show the block diagram of the privacy protection device of embodiment according to the present invention.
Fig. 6 shows the example that particular web site is added to hidden strong box of embodiment according to the present invention.
Fig. 7 shows the example that hidden strong box is unlocked by recognition of face of embodiment according to the present invention.
Fig. 8 is to show the flow chart of the face registration process of embodiment according to the present invention.
Fig. 9 is to show the flow chart of the face recognition process of embodiment according to the present invention.
Specific embodiment
The preferred embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Preferred embodiment, however, it is to be appreciated that may be realized in various forms the disclosure without the embodiment party that should be illustrated here
Formula is limited.On the contrary, these embodiments are provided so that this disclosure will be more thorough and complete, and can be by the disclosure
Range is completely communicated to those skilled in the art.
Before technical solution of the present invention is specifically described, the term mentioned in the present invention is fitted first
When explanation." electronic equipment " mentioned herein refers to any with the electronic component used by terminal user or consumer
Equipment comprising mobile phone, personal digital assistant (PDA), computer, tablet computer, music player, camera, video recording
Mechanical, electrical sub- reader, radio set equipment and game machine." biological characteristic " mentioned herein, which refers to, can uniquely measure
Or can automatic identification and verifying physiological characteristic or behavior.Biological characteristic is divided into two class of physical trait and behavioural characteristic.Body
Body characteristics include fingerprint, palmmprint, palm shape, retina, iris, human scent, shape of face, the blood vessel of hand and DNA etc.;Behavioural characteristic packet
It includes: signature, voice, walking step state etc..For example, biological characteristic can be face, fingerprint, palmmprint, iris, retina, pulse, sound
Sound or keystroke dynamics." content " mentioned herein refers to the web page contents that electronic device user accesses during online.
For example, web page contents may include text, photo, audio and/or video." browser bookmark " mentioned herein refers to use
Family is during browsing webpage, the station address label generated using browser, and is deposited with the format that browser is supported
Storage one section of small application on a web browser, it is subsequent in, user usually only need to click in bookmark column on a web browser save should
Browser bookmark, browser directly can parse the browser bookmark according to cured analytical algorithm, so that it is clear to be linked to this
It lookes at the corresponding webpage of device bookmark, and executes operation, for example, data are extracted, inquiry, information publication etc. is (referring to patent document
CN102571688B)." hidden strong box " mentioned herein refers to a kind of for storing the application tool of private content, use
After family places the content of secret in the safe, the private content could can only be accessed again by decrypting safety box.
It is below with reference to accompanying drawings and right in conjunction with specific embodiments in order to be clearer and more clear technical solution of the present invention
Method for secret protection and device of the invention is described in detail.
Fig. 1 is to show the method for secret protection for electronic equipment 200 shown in Fig. 2 of embodiment according to the present invention
Flow chart.Electronic equipment 200 includes physical characteristics collecting module 201, characteristic processing module 202, biological attribute data
Library module 203, biological characteristic library module 204, biological attribute data comparison module 205 and application module 206.Physical characteristics collecting
Module 201 is the module for acquiring biological characteristic, for example, camera, camera, scanner, sensor etc..At characteristic
Module 202 is managed to be used to carry out mathematical algorithm processing (for example, packet to from the collected biological characteristic of physical characteristics collecting module 201
Include Karhunen-Loeve transformation, the face characteristic extraction algorithm of PCA method etc.), to extract biological attribute data.Biological attribute data library module
203 biological characteristics for being used to store include as biological characteristic registration and the biological attribute data for being compared template of identification process
Database.It includes being compared the biological special of template as living things feature recognition process that biological characteristic library module 204, which is used to store,
The biological characteristic library of sign.Biological attribute data comparison module 205 is used for the characteristic exported from characteristic processing module 202
It is compared according to as the characteristic for being compared template, to differentiate whether collected biological characteristic is registered biology
Feature.Application module 206 is the application program or module for protecting private content, for example, hidden strong box.
As shown in Figure 1, firstly, in step S101, to needing the content for carrying out secret protection to encrypt, and will encrypt
Content be saved in application module.In step S102, label associated with encrypted content is created in application module, and
And hidden state is set by encrypted content.In step S103, label is encrypted.Add when user wants access to
When close content, in step S104, label is decrypted.At this point, application module is under privacy protection mode.If
Difference between the collected biological characteristic of physical characteristics collecting module and preset biological characteristic is less than or equal to first predetermined value
("Yes" in step S105), then show encrypted content (step S106) in the display interface.On the other hand, if it is biological
Difference between the collected biological characteristic of collection apparatus module and the preset biological characteristic is greater than first predetermined value (step
"No" in S105), then the content (step S107) unrelated with encrypted content is shown in the display interface.Here, and
The unrelated content of the content of encryption can be particular webpage content (for example, homepage of People's Net or Sina website).The content can
Be electronic device user accessed during online include text, photo, audio and/or video web page contents.It is described
Label can be the browser bookmark for being linked to webpage, be also possible to other labels with link sexual function.Below to above-mentioned
The biological characteristic registration process and living things feature recognition process being related in step S106 and S107 are described in detail.
Fig. 3 is to show the flow chart of the biological characteristic registration process of embodiment according to the present invention.In step S301, benefit
Use the acquisition of physical characteristics collecting module 201 as the biological characteristic of object to be registered, for example, face, fingerprint, palmmprint etc..So
Afterwards, step S302 carries out mathematical algorithm processing to the biological characteristic of acquisition to extract the data of characterization biological characteristic.In step
S303 extracts biological attribute data and outputs it to biological attribute data comparison module 205.In addition, in step S304, in life
Biological attribute data library is downloaded or updated in (for example, when using for the first time) object characteristic library module 203.Then, in step
S305 initializes biological attribute data and outputs it to biological attribute data comparison module 205.Then, in step
S306, in biological attribute data comparison module 205 by the biological attribute data of extraction with from biological attribute data library just
The biological attribute data of beginningization is compared.Then, in step S307, differentiate the biological attribute data of extraction and the life of initialization
Whether the difference between object characteristic is less than or equal to second predetermined value.If the life of the biological attribute data and initialization that extract
Difference between object characteristic is less than or equal to second predetermined value ("Yes" in step S307), then by the biological characteristic number of extraction
According to being saved in biological attribute data library (step S308).If the biological attribute data of the biological attribute data and initialization that extract
Between difference be greater than second predetermined value ("No" in step S307), then return to step S301, that is, adopted using biological characteristic
Collection module 201 acquires next biological characteristic.
Fig. 4 is to show the flow chart of the living things feature recognition process of embodiment according to the present invention.In step S401, benefit
Use the acquisition of physical characteristics collecting module 201 as the biological characteristic of object to be identified.Then, step S402, the life to acquisition
Object feature carries out mathematical algorithm processing to extract the data of characterization biological characteristic.In step S403, biological attribute data is extracted simultaneously
Output it to biological attribute data comparison module 205.In addition, in step S404, in biological attribute data library module 203
(for example, when using for the first time) downloading updates biological attribute data library.Then, in step S405, biological attribute data is carried out
It initializes and outputs it to biological attribute data comparison module 205.Next, biological characteristic will be stored in step S406
Registered biological characteristic in library exports biological attribute data comparison module 205.Then, in step S407, in biological characteristic
Biological characteristic library by the biological attribute data of extraction and is come from based on the biological attribute data of initialization in data comparing module 205
The characteristic of registered biological characteristic be compared.Then, in step S408, differentiate the biological attribute data of extraction with
Whether the difference between the biological attribute data of registered biological characteristic is less than or equal to third predetermined value.If the biology extracted
Difference between characteristic and the biological attribute data of registered biological characteristic is less than or equal to third predetermined value (step S408
In "Yes"), then the biological attribute data of extraction is saved in biological attribute data library (step S409).If the biology extracted
Difference between characteristic and the biological attribute data of registered biological characteristic is greater than third predetermined value (in step S408
"No"), then return to step S401, that is, acquire next biological characteristic using physical characteristics collecting module 201.
In above-mentioned method for secret protection, due to being carried out using the display interface of biometric authentication technology application modules
Unlock, so improving the security performance of private content compared with the prior art.Further, since label and encrypted content phase
Association, so user only needs to be presented to the user encrypted content by clicking label, therefore, when user uses
It is very convenient, without any obstacle, better user experience.In addition, the conduct of acquisition is waited for during above-mentioned living things feature recognition
Identify that the characteristic of the biological characteristic of object passes back to biological attribute data library, to update biological attribute data library.So not
Biological attribute data library can be only updated, while living things feature recognition algorithm can also be improved, to further improve biology
The accuracy of feature identification.
In addition, the present invention also provides a kind of privacy protection devices for electronic equipment.Fig. 5 is to show according to the present invention
Embodiment the privacy protection device 500 for electronic equipment 200 as shown in Figure 2 block diagram.The privacy protection device 500
Including encrypting storing unit 501, label creating unit 502, encryption unit 503, decryption unit 504 and display unit 505.Encryption
Storage unit 501 is used for needing the content for carrying out secret protection to encrypt, and saves encrypted content.Label creation is single
Member 502 sets hiding for the encrypted content for creating label associated with the encrypted content
State.Encryption unit 503 is for encrypting the label.What decryption unit 504 had encrypted described in being used to access when needs
When content, the label is decrypted.Display unit 505 is used to show described added in the display interface in successful decryption
Close content, and show the content unrelated with the encrypted content in the display interface when decrypting failure.Privacy is protected
Protection unit 500 can also include the acquisition unit (not shown) for acquiring the biological characteristic of user under privacy protection mode.
If acquisition unit difference between collected biological characteristic and preset biological characteristic be less than or equal to predetermined value, decrypt
Success.On the other hand, if acquisition unit difference between collected biological characteristic and the preset biological characteristic it is big
In predetermined value, then decrypts and fail.
Next, by a specific example of description application method for secret protection of the invention.In this example, people is utilized
Face identification technology is unlocked the hidden strong box on mobile phone to provide a user in internet behavior link and need encipherment protection
The service of partial content.Fig. 6 shows the picture that particular web site is added to hidden strong box.As shown in fig. 6, when user wants to just
When the web page contents of access encrypt, user only need in the display interface the long-pressing page can by the webpage institute it is right
The bookmark answered is added to hidden strong box.When user thinks to access the web page contents encrypted again, user passes through recognition of face
Hidden strong box is unlocked to access the bookmark being stored in the hidden strong box.As shown in fig. 7, showing face on mobile phone screen
It identifies interface, prompts user that face is placed in camera and take pictures.Then, recognition of face is carried out for the facial image of shooting
Process.If identified successfully, the display interface of hidden strong box is unlocked and shows " my bookmark " under the safety box page.When
When user clicks " my bookmark ", the list for the bookmark for including in " my bookmark " is shown in the display interface.On the contrary, if
Recognition failures, then the display interface of hidden strong box is locked and interior unrelated with above-mentioned web page contents of display in the display interface
Hold (not shown), for example, locking picture or a specific webpage (for example, homepage of People's Net or Sina website) can be shown.
Face recognition technology employed in above-mentioned example is mainly concerned with face registration process and face recognition process.Under
Face is briefly described face registration process and face recognition process.
Fig. 8 shows the flow chart of face registration process.As shown in figure 8, firstly, being shot in step S801 with camera
Facial image.Then, step S802 carries out mathematical algorithm to the facial image of shooting and handles to extract face characteristic data.It connects
Get off, in step S803, extracts face characteristic data and output it to face characteristic data comparing module.In addition, in step
S804 downloads in facial feature database module (for example, when using for the first time) or updates facial feature database.Then, exist
Step S805 initializes face characteristic data and outputs it to face characteristic data comparing module.Then, in step
S806, by the face characteristic data of extraction and from the initialization of facial feature database in face characteristic data comparing module
Face characteristic data be compared.Then, in step S807, the face of the face characteristic data and initialization that differentiate extraction is special
Whether the difference between sign data is less than or equal to the 4th predetermined value.If the face of the face characteristic data and initialization extracted is special
The difference levied between data is less than or equal to the 4th predetermined value ("Yes" in step S807), then protects the face characteristic data of extraction
It is stored to facial feature database (step S808).If between the face characteristic data of the face characteristic data and initialization extracted
Difference be greater than the 4th predetermined value ("No" in step S807), then return to step S801, that is, with camera shoot next frame
Facial image.
Fig. 9 shows the flow chart of face recognition process.As shown in figure 9, firstly, being shot in step S901 with camera
Facial image.Then, step S902 carries out mathematical algorithm to the facial image of shooting and handles to extract face characteristic data.It connects
Get off, in step S903, extracts face characteristic data and output it to face characteristic data comparing module.In addition, in step
S904 downloads in facial feature database module (for example, when using for the first time) or updates facial feature database.Then, exist
Step S905 initializes face characteristic data and outputs it to face characteristic data comparing module.Meanwhile in step
In S906, the registered face stored in face database is inputed into face characteristic data comparing module.Then, in step
S907, face characteristic data in face characteristic data comparing module based on initialization by the face characteristic data of extraction with
The face characteristic data of the face of registration are compared.Then, in step S908, differentiate the face characteristic data of extraction and infused
Whether the difference between the characteristic of the face of volume is less than or equal to the 5th predetermined value.If extract face characteristic data with
Difference between the characteristic of the face of registration is less than or equal to the 5th predetermined value ("Yes" in step S908), then by extraction
Face characteristic data are saved in facial feature database (step S909).If the face characteristic data extracted and registered people
Difference between the characteristic of face is greater than the 5th predetermined value ("No" in step S908), then returns to step S901, that is, uses
Camera shoots next frame facial image.
In above-mentioned face recognition process, the characteristic of the face of extraction is passed back into face characteristic when identifying successfully
Database, to update facial feature database.Facial feature database not only can be updated, while face can also be improved
Feature recognition algorithms, to further improve the accuracy of recognition of face.
Above by reference to attached drawing be described in detail method for secret protection for electronic equipment according to the present invention and
Device.
In addition, being also implemented as a kind of computer program or computer program product, the meter according to the method for the present invention
Calculation machine program or computer program product include the calculating for executing the above steps limited in the above method of the invention
Machine program code instruction.
In addition, the present invention can also be embodied as a kind of calculating equipment, which includes: processor;And memory,
It is stored thereon with executable code, when the executable code is executed by the processor, the processor is made to execute basis
Each step of method of the invention.
Alternatively, the present invention can also be embodied as a kind of (or the computer-readable storage of non-transitory machinable medium
Medium or machine readable storage medium), it is stored thereon with executable code (or computer program or computer instruction code),
When the executable code (or computer program or computer instruction code) by electronic equipment (or calculate equipment, server
Deng) processor execute when, so that the processor is executed each step according to the above method of the present invention.
Those skilled in the art will also understand is that, various illustrative logical blocks, mould in conjunction with described in disclosure herein
Block, circuit and algorithm steps may be implemented as the combination of electronic hardware, computer software or both.
The flow chart and block diagram in the drawings show the possibility of the system and method for multiple embodiments according to the present invention realities
Existing architecture, function and operation.In this regard, each box in flowchart or block diagram can represent module, a journey
A part of sequence section or code, a part of the module, section or code include one or more for realizing defined
The executable instruction of logic function.It should also be noted that in some implementations as replacements, the function of being marked in box can also
To be occurred with being different from the sequence marked in attached drawing.For example, two continuous boxes can actually be basically executed in parallel,
They can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram and/or stream
The combination of each box in journey figure and the box in block diagram and or flow chart, can the functions or operations as defined in executing
Dedicated hardware based system realize, or can realize using a combination of dedicated hardware and computer instructions.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and
It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill
Many modifications and changes are obvious for the those of ordinary skill in art field.The selection of term used herein, purport
In the principle, practical application or improvement to the technology in market for best explaining each embodiment, or make the art
Other those of ordinary skill can understand each embodiment disclosed herein.
Claims (22)
1. a kind of method for secret protection for electronic equipment characterized by comprising
To needing the content for carrying out secret protection to encrypt, and save encrypted content;
Label associated with the encrypted content is created, also, sets hidden state for the encrypted content;
The label is encrypted;
When needing to access the encrypted content, the label is decrypted;
If successful decryption, show the encrypted content in the display interface, otherwise in the display interface display and institute
State the unrelated content of encrypted content.
2. method for secret protection according to claim 1, which is characterized in that the method for secret protection further include: hidden
Under private protected mode, the biological characteristic of user is acquired,
If difference between collected biological characteristic and preset biological characteristic be less than or equal to predetermined value, be decrypted into
Function;
If difference between collected biological characteristic and the preset biological characteristic be greater than predetermined value, decrypt mistake
It loses.
3. method for secret protection according to claim 2, which is characterized in that the method for secret protection further includes that storage is pre-
The characteristic of the biological characteristic and storage biological characteristic that first acquire or download.
4. method for secret protection according to claim 3, which is characterized in that the method for secret protection further includes to being adopted
The biological characteristic collected carries out mathematical algorithm processing to extract the characteristic of biological characteristic.
5. method for secret protection according to claim 4, which is characterized in that the method for secret protection further includes to being mentioned
The characteristic of the biological characteristic taken and the biological attribute data of storage are compared.
6. method for secret protection according to any one of claims 1 to 5, which is characterized in that the content is electronics
What equipment user accessed during online includes the web page contents of text, photo, audio and/or video.
7. method for secret protection according to claim 6, which is characterized in that the label is the browser for being linked to webpage
Bookmark.
8. method for secret protection according to claim 7, which is characterized in that the biological characteristic is face, fingerprint, the palm
Line, iris, retina, pulse, sound or keystroke dynamics.
9. method for secret protection according to claim 8, which is characterized in that the raw method for secret protection further includes face
Registration process and face recognition process,
Wherein, face registration process includes the image for obtaining object to be registered, carries out feature extraction to the image of object to be registered
To obtain the characteristic of object to be registered, differentiate whether object to be registered is face by the characteristic, if differentiating
Object to be registered is face, then the characteristic of acquisition is stored in facial feature database module, and by acquisition wait infuse
The image of volume object is stored in face library module as facial image;
Face recognition process includes the image for obtaining object to be identified, carries out feature extraction to the image of object to be identified to obtain
The characteristic of object to be identified, based on characteristic by the object to be identified of acquisition and the face that is stored in face library module
It is compared, if the object to be identified obtained and the difference being stored between the face in face database are less than or equal to specify
Value, then authenticate success, otherwise authentification failure.
10. method for secret protection according to claim 9, which is characterized in that the face recognition process further includes that will obtain
The characteristic of the object to be identified obtained uploads to human face data library module, to update face database.
11. a kind of privacy protection device for electronic equipment, which is characterized in that the privacy protection device includes:
Encrypting storing unit for needing the content for carrying out secret protection to encrypt, and saves encrypted content;
Label creating unit, for creating label associated with the encrypted content, also, will be in described encrypted
It is installed with and is set to hidden state;
Encryption unit, for being encrypted to the label;
Decryption unit, for when needing to access the encrypted content, the label to be decrypted;
Display unit fails for showing the encrypted content in the display interface in successful decryption, and in decryption
When show the content unrelated with the encrypted content in the display interface.
12. privacy protection device according to claim 11, which is characterized in that the electronic equipment includes in privacy
The acquisition module of the biological characteristic of user is acquired under protected mode,
Wherein, if acquisition module difference between collected biological characteristic and preset biological characteristic be less than or equal to it is predetermined
It is worth, then successful decryption;
If acquisition module difference between collected biological characteristic and the preset biological characteristic be greater than predetermined value,
Decryption failure.
13. privacy protection device according to claim 12, which is characterized in that the electronic equipment further includes for storing
The biological characteristic library module for the biological characteristic for acquiring or downloading in advance and the biology of the characteristic for storing biological characteristic are special
Levy database module.
14. privacy protection device according to claim 13, which is characterized in that the electronic equipment further includes characteristic
Processing module, for carrying out mathematical algorithm processing to the collected biological characteristic of acquisition module to extract the characteristic of biological characteristic
According to.
15. privacy protection device according to claim 14, which is characterized in that the electronic equipment further includes biological characteristic
Data comparing module, for special to the characteristic for extracting biological characteristic and the biology being stored in biological attribute data library module
Sign data are compared.
16. privacy protection device described in any one of 1 to 15 according to claim 1, which is characterized in that the content is electricity
What sub- equipment user accessed during online includes the web page contents of text, photo, audio and/or video.
17. privacy protection device according to claim 16, which is characterized in that the label is the browsing for being linked to webpage
Device bookmark.
18. privacy protection device according to claim 17, which is characterized in that the biological characteristic is face, fingerprint, the palm
Line, iris, retina, pulse, sound or keystroke dynamics.
19. privacy protection device according to claim 18, which is characterized in that the electronic equipment further includes for executing
The module of face registration process and face recognition process,
Wherein, face registration process includes being taken pictures with camera to obtain the image of object to be registered, to the figure of object to be registered
As carrying out feature extraction to obtain the characteristic of object to be registered, object to be registered is differentiated by the characteristic whether
For face, if differentiating, object to be registered is face, and the characteristic of acquisition is stored in facial feature database module, and
The image of the object to be registered of acquisition is stored in face library module as facial image;
Face recognition process includes being taken pictures with camera to obtain the image of object to be identified, is carried out to the image of object to be identified
Feature extraction by the object to be identified of acquisition and is stored in face to obtain the characteristic of object to be identified, based on characteristic
Face in library module is compared, if the object to be identified obtained and the difference being stored between the face in face database
It is different to be less than or equal to designated value, then success is authenticated, otherwise authentification failure.
20. privacy protection device according to claim 19, which is characterized in that in face recognition process, acquisition to
The characteristic of identification object is uploaded to human face data library module, to update face database.
21. a kind of calculating equipment, comprising:
Processor;And
Memory is stored thereon with executable code, when the executable code is executed by the processor, makes the processing
Device executes the method for secret protection as described in any one of claim 1-10.
22. a kind of non-transitory machinable medium, is stored thereon with executable code, when the executable code is electric
When the processor of sub- equipment executes, the processor is made to execute the secret protection side as described in any one of claims 1 to 10
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711262822.7A CN109871707A (en) | 2017-12-04 | 2017-12-04 | Method for secret protection and device calculate equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711262822.7A CN109871707A (en) | 2017-12-04 | 2017-12-04 | Method for secret protection and device calculate equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109871707A true CN109871707A (en) | 2019-06-11 |
Family
ID=66915862
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711262822.7A Pending CN109871707A (en) | 2017-12-04 | 2017-12-04 | Method for secret protection and device calculate equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109871707A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112261216A (en) * | 2020-10-20 | 2021-01-22 | 北京字节跳动网络技术有限公司 | Terminal control method and device, terminal and storage medium |
CN114817938A (en) * | 2021-01-28 | 2022-07-29 | 海信集团控股股份有限公司 | Method and equipment for accessing shared photo album and protecting private pictures of shared photo album |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070250920A1 (en) * | 2006-04-24 | 2007-10-25 | Jeffrey Dean Lindsay | Security Systems for Protecting an Asset |
JP2008065572A (en) * | 2006-09-07 | 2008-03-21 | Konica Minolta Business Technologies Inc | Method for updating biometric information used in biometric authentication system, and biometric authentication system |
US20140075368A1 (en) * | 2012-09-07 | 2014-03-13 | Lg Electronics Inc. | Method for controlling content and digital device using the same |
US20140075527A1 (en) * | 2012-09-07 | 2014-03-13 | Lg Electronics Inc. | Method for controlling content and digital device using the same |
CN104182671A (en) * | 2013-05-23 | 2014-12-03 | 腾讯科技(深圳)有限公司 | Method and device for protecting privacy information of browser |
CN104584025A (en) * | 2012-09-28 | 2015-04-29 | 英特尔公司 | Device, method, and system for controlling access to web objects of a webpage or web-brower application |
CN104700001A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Information encryption method and device of application program |
CN104869170A (en) * | 2015-05-29 | 2015-08-26 | 四川效率源信息安全技术有限责任公司 | Decryption method for encrypted data file of UC browser |
-
2017
- 2017-12-04 CN CN201711262822.7A patent/CN109871707A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070250920A1 (en) * | 2006-04-24 | 2007-10-25 | Jeffrey Dean Lindsay | Security Systems for Protecting an Asset |
JP2008065572A (en) * | 2006-09-07 | 2008-03-21 | Konica Minolta Business Technologies Inc | Method for updating biometric information used in biometric authentication system, and biometric authentication system |
US20140075368A1 (en) * | 2012-09-07 | 2014-03-13 | Lg Electronics Inc. | Method for controlling content and digital device using the same |
US20140075527A1 (en) * | 2012-09-07 | 2014-03-13 | Lg Electronics Inc. | Method for controlling content and digital device using the same |
CN104584025A (en) * | 2012-09-28 | 2015-04-29 | 英特尔公司 | Device, method, and system for controlling access to web objects of a webpage or web-brower application |
CN104182671A (en) * | 2013-05-23 | 2014-12-03 | 腾讯科技(深圳)有限公司 | Method and device for protecting privacy information of browser |
CN104700001A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Information encryption method and device of application program |
CN104869170A (en) * | 2015-05-29 | 2015-08-26 | 四川效率源信息安全技术有限责任公司 | Decryption method for encrypted data file of UC browser |
Non-Patent Citations (3)
Title |
---|
祝恩等著: "自动指纹识别技术", 国防科技大学出版社, pages: 161 - 162 * |
陆伟 等: "一种安全浏览器设计实现", 数字技术与应用, pages 121 - 122 * |
陆伟等: "一种安全浏览器设计实现", 《数字技术与应用》, no. 07, 15 July 2010 (2010-07-15), pages 121 - 122 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112261216A (en) * | 2020-10-20 | 2021-01-22 | 北京字节跳动网络技术有限公司 | Terminal control method and device, terminal and storage medium |
CN112261216B (en) * | 2020-10-20 | 2022-05-03 | 北京字节跳动网络技术有限公司 | Terminal control method and device, terminal and storage medium |
CN114817938A (en) * | 2021-01-28 | 2022-07-29 | 海信集团控股股份有限公司 | Method and equipment for accessing shared photo album and protecting private pictures of shared photo album |
CN114817938B (en) * | 2021-01-28 | 2024-05-17 | 海信集团控股股份有限公司 | Method and equipment for accessing shared album and protecting private pictures of shared album |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104903904B (en) | Bar code authentication for resource request | |
CN111585964B (en) | Login information input method, login information storage method and related device | |
CN108063750A (en) | dynamic user identity verification method | |
Castiglione et al. | Biometrics in the cloud: challenges and research opportunities | |
US20150143483A1 (en) | Device and Method for Identity Authentication Management | |
CN105279410A (en) | User Authentication Retry with a Biometric Sensing Device | |
EA037018B1 (en) | Method for digitally signing an electronic file | |
US20120005735A1 (en) | System for Three Level Authentication of a User | |
JP5343761B2 (en) | Optical information reader and authentication system using optical information reader | |
CA2766695A1 (en) | Authentication method and system | |
CN106462706A (en) | A method and apparatus for providing client-side score-based authentication | |
Ali et al. | A secure and efficient multi-factor authentication algorithm for mobile money applications | |
CN107733973A (en) | Method of controlling security, terminal, server and computer-readable medium | |
Hossain et al. | Improving cloud data security through hybrid verification technique based on biometrics and encryption system | |
CN109871707A (en) | Method for secret protection and device calculate equipment and storage medium | |
CN109871706A (en) | Method for secret protection and device calculate equipment and storage medium | |
KR20160080456A (en) | Method and apparstus for processing user authentification | |
Paul et al. | IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't | |
WO2017091133A1 (en) | Method and system for secure storage of information | |
Butt et al. | Privacy protection of biometric templates | |
KR101500947B1 (en) | Creation and authentication of biometric information | |
CN109871722A (en) | Auth method, system, terminal and storage medium based on optical picture shape code | |
Kannavara et al. | Topics in biometric human-machine interaction security | |
CN105844137B (en) | Device and method for identifying picture browsing operation authority | |
CN114969777A (en) | File access control method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200713 Address after: 310052 room 508, floor 5, building 4, No. 699, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province Applicant after: Alibaba (China) Co.,Ltd. Address before: 510627 Guangdong city of Guangzhou province Whampoa Tianhe District Road No. 163 Xiping Yun Lu Yun Ping B radio square 14 storey tower Applicant before: Guangzhou Dongjing Computer Technology Co.,Ltd. |
|
TA01 | Transfer of patent application right |