CN109871707A - Method for secret protection and device calculate equipment and storage medium - Google Patents

Method for secret protection and device calculate equipment and storage medium Download PDF

Info

Publication number
CN109871707A
CN109871707A CN201711262822.7A CN201711262822A CN109871707A CN 109871707 A CN109871707 A CN 109871707A CN 201711262822 A CN201711262822 A CN 201711262822A CN 109871707 A CN109871707 A CN 109871707A
Authority
CN
China
Prior art keywords
characteristic
face
content
biological characteristic
secret protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711262822.7A
Other languages
Chinese (zh)
Inventor
伍中联
唐安南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Original Assignee
Guangzhou Dongjing Computer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Dongjing Computer Technology Co Ltd filed Critical Guangzhou Dongjing Computer Technology Co Ltd
Priority to CN201711262822.7A priority Critical patent/CN109871707A/en
Publication of CN109871707A publication Critical patent/CN109871707A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of method for secret protection and device, calculates equipment and storage medium.This method comprises: to needing the content for carrying out secret protection to encrypt, and save encrypted content;Label associated with encrypted content is created, also, sets hidden state for the encrypted content;Label is encrypted;When needing to access the content, label is decrypted;If successful decryption, encrypted content is shown in the display interface, otherwise shows unrelated content in the display interface.Due to not only being encrypted to private content, also label is encrypted, so further improving the security performance of private content compared with the prior art.Moreover, showing unrelated content in the display interface when decrypting failure, the content of encryption can not be accessed by leading to unauthenticated user so at all, be leaked it not to further enhance the protection of private content.

Description

Method for secret protection and device calculate equipment and storage medium
Technical field
The present invention relates to field of information security technology, more particularly to a kind of private content for protecting electronic equipment Method for secret protection and device calculate equipment and storage medium.
Background technique
Quote www.xinhuanet.com's report, mobile Internet user's magnitude rough estimate in 2016 was close to more than 700,000,000,2016 years netizens The average daily surf time reach 3.8 hours.Mobile phone browser is still the net-fault tool of netizen's first choice.Netizen is using browsing Device online, retains the contents such as the bookmark to get off, document, inevitably occurs needing to carry out privacy encipherment protection partial content Demand.And currently occupy the big cell phone system (android/iOS) of amount biggish two, these documents can not be carried out effective Protection, once mobile phone passes into others' hands, is just easy to be obtained by others.
In the prior art, in order to protect privacy of user, allow user to the application program in mobile phone (for example, 360 privacies are protected Dangerous case) setting password encrypted, start application program when must input correct password, so as to prevent other people from arbitrarily beating It opens the application program and reveals privacy.However, in some cases, user but must not its underground password allow other people to open to answer With.Although user is provided with password at this time, but the privacy to stick one's chin out of having to does not play very well the privacy of user Protective effect.Moreover, password or password are easy to pass out of mind or be forged by people, lead to not protect private content.Therefore, it is desirable to A kind of convenient and effective method for secret protection.
Summary of the invention
The purpose of the present invention is to provide in a kind of secret for capableing of operation readiness and highly-safe protection electronic equipment The method for secret protection and device of appearance calculate equipment and storage medium.
According to an aspect of the present invention, a kind of method for secret protection for electronic equipment, the secret protection are provided Method includes: and to save encrypted content to needing the content for carrying out secret protection to encrypt;Creation has been encrypted with described The associated label of content, also, set hidden state for the encrypted content;The label is encrypted; When needing to access the encrypted content, the label is decrypted;If successful decryption is shown in the display interface Show the encrypted content, otherwise shows the content unrelated with the encrypted content in the display interface.
In method for secret protection of the invention, due to not only to needing the content for carrying out secret protection to encrypt, going back Label associated with the encrypted content is encrypted, so improving the peace of private content compared with the prior art Full performance.Moreover, being shown in the display interface in the decryption failure to the label unrelated with the encrypted content Content causes unauthenticated user that the content unrelated with the encrypted content can only be accessed in this way, thus further The protection for strengthening private content is leaked it not.In addition, user only needs to have added by clicking label Close content is presented to the user, and therefore, user is very convenient when using, without any obstacle, better user experience.
Preferably, the method for secret protection can also include: the biology spy that user is acquired under privacy protection mode Sign;If difference between collected biological characteristic and preset biological characteristic be less than or equal to predetermined value, release to institute The locking for stating display interface, in response to user click the label and by the encrypted content be set as display state and It is shown on display interface;If difference between collected biological characteristic and the preset biological characteristic be greater than it is predetermined Value, then lock the display interface.
Preferably, the method for secret protection can also include the biological characteristic and storage life that storage is acquired or downloaded in advance The characteristic of object feature.
Preferably, the method for secret protection can also include carrying out mathematical algorithm processing to the collected biological characteristic of institute To extract the characteristic of biological characteristic.
Preferably, the method for secret protection can also include the characteristic and storage to extracted biological characteristic Biological attribute data is compared.
Preferably, what the content can be that electronic device user accesses during online includes text, photo, audio And/or the web page contents of video.
Preferably, the label can be the browser bookmark for being linked to webpage.
Preferably, the biological characteristic can be face, fingerprint, palmmprint, iris, retina, pulse, sound or by bonding force Degree.
Preferably, the raw method for secret protection can also include face registration process and face recognition process, wherein people Face registration process includes the image for obtaining object to be registered, and it is to be registered to obtain to carry out feature extraction to the image of object to be registered The characteristic of object differentiates whether object to be registered is face by the characteristic, if differentiating, object to be registered is The characteristic of acquisition is then stored in facial feature database module by face, and by the image of the object to be registered of acquisition It is stored in face library module as facial image;Face recognition process includes the image for obtaining object to be identified, to be identified The image of object carries out feature extraction to obtain the characteristic of object to be identified, based on characteristic by the to be identified right of acquisition As being compared with the face being stored in face library module, if obtain object to be identified and be stored in face database Face between difference be less than or equal to designated value, then authenticate success, otherwise authentification failure.
Preferably, the face recognition process can also include that the characteristic of the object to be identified of acquisition is uploaded to people Face database module, to update face database.
According to another aspect of the present invention, a kind of privacy protection device for electronic equipment is provided.The privacy is protected Protection unit includes: encrypting storing unit, for needing the content for carrying out secret protection to encrypt, and save encrypted it is interior Hold;Label creating unit, for creating label associated with the encrypted content, also, will be in described encrypted It is installed with and is set to hidden state;Encryption unit, for being encrypted to the label;Decryption unit, described in being accessed when needs When encrypted content, the label is decrypted;Display unit is shown in the display interface if being used for successful decryption Show the encrypted content, otherwise shows the content unrelated with the encrypted content in the display interface.
Preferably, the electronic equipment can also include the biological characteristic for acquiring user under privacy protection mode Acquisition module, wherein if acquisition module difference between collected biological characteristic and preset biological characteristic be less than etc. In predetermined value, then successful decryption;If acquisition module between collected biological characteristic and the preset biological characteristic Difference is greater than predetermined value, then decrypts and fail.
Preferably, the electronic equipment can also include special for storing the biology for the biological characteristic for acquiring or downloading in advance Levy the biological attribute data library module of library module and the characteristic for storing biological characteristic.
Preferably, the electronic equipment can also include characteristic processing module, for collected to acquisition module Biological characteristic carries out mathematical algorithm processing to extract the characteristic of biological characteristic.
Preferably, the electronic equipment can also include biological attribute data comparison module, for extraction biological characteristic Characteristic and the biological attribute data that is stored in biological attribute data library module be compared.
Preferably, what the content can be that electronic device user accesses during online includes text, photo, audio And/or the web page contents of video.
Preferably, the label can be the browser bookmark for being linked to webpage.
Preferably, the biological characteristic can be face, fingerprint, palmmprint, iris, retina, pulse, sound or by bonding force Degree.
Preferably, the electronic equipment can also include the mould for executing face registration process and face recognition process Block, wherein face registration process includes being taken pictures with camera to obtain the image of object to be registered, to the image of object to be registered Feature extraction is carried out to obtain the characteristic of object to be registered, differentiated by the characteristic object to be registered whether be Face, if differentiating, object to be registered is face, and the characteristic of acquisition is stored in facial feature database module, and will The image of the object to be registered obtained is stored in face library module as facial image;Face recognition process includes using camera It takes pictures to obtain the image of object to be identified, feature extraction is carried out to obtain the spy of object to be identified to the image of object to be identified Data are levied, the object to be identified of acquisition is compared with the face being stored in face library module based on characteristic, if The object to be identified of acquisition and the difference being stored between the face in face database are less than or equal to designated value, then certification at Function, otherwise authentification failure.
Preferably, in face recognition process, the characteristic of the object to be identified of acquisition is uploaded to face database Module, to update face database.
According to another aspect of the present invention, a kind of calculating equipment is provided, the calculating equipment includes: processor;And Memory is stored thereon with executable code, when the executable code is executed by the processor, holds the processor The above-mentioned method for secret protection of row.
According to another aspect of the present invention, a kind of non-transitory machinable medium is provided, being stored thereon with can Code is executed, when the executable code is executed by the processor of electronic equipment, the processor is made to execute above-mentioned privacy Guard method.
In method for secret protection and device of the invention, due to not only to needing the content for carrying out secret protection to add It is close, also label associated with the encrypted content is encrypted, so improving in secret compared with the prior art The security performance of appearance.Moreover, being shown and the encrypted content in the display interface in the decryption failure to the label Unrelated content causes unauthenticated user that the content unrelated with the encrypted content can only be accessed in this way, thus The protection for further enhancing private content is leaked it not.In addition, user only needs by clicking label Encrypted content is presented to the user, therefore, user is very convenient when using, without any obstacle, better user experience.
Detailed description of the invention
Disclosure illustrative embodiments are described in more detail in conjunction with the accompanying drawings, the disclosure above-mentioned and its Its purpose, feature and advantage will be apparent, wherein in disclosure illustrative embodiments, identical reference label Typically represent same parts.
Fig. 1 is to show the flow chart of the method for secret protection of embodiment according to the present invention.
Fig. 2 is to show the block diagram of the electronic equipment of embodiment according to the present invention.
Fig. 3 is to show the flow chart of the biological characteristic registration process of embodiment according to the present invention.
Fig. 4 is to show the flow chart of the living things feature recognition process of embodiment according to the present invention.
Fig. 5 is to show the block diagram of the privacy protection device of embodiment according to the present invention.
Fig. 6 shows the example that particular web site is added to hidden strong box of embodiment according to the present invention.
Fig. 7 shows the example that hidden strong box is unlocked by recognition of face of embodiment according to the present invention.
Fig. 8 is to show the flow chart of the face registration process of embodiment according to the present invention.
Fig. 9 is to show the flow chart of the face recognition process of embodiment according to the present invention.
Specific embodiment
The preferred embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in attached drawing Preferred embodiment, however, it is to be appreciated that may be realized in various forms the disclosure without the embodiment party that should be illustrated here Formula is limited.On the contrary, these embodiments are provided so that this disclosure will be more thorough and complete, and can be by the disclosure Range is completely communicated to those skilled in the art.
Before technical solution of the present invention is specifically described, the term mentioned in the present invention is fitted first When explanation." electronic equipment " mentioned herein refers to any with the electronic component used by terminal user or consumer Equipment comprising mobile phone, personal digital assistant (PDA), computer, tablet computer, music player, camera, video recording Mechanical, electrical sub- reader, radio set equipment and game machine." biological characteristic " mentioned herein, which refers to, can uniquely measure Or can automatic identification and verifying physiological characteristic or behavior.Biological characteristic is divided into two class of physical trait and behavioural characteristic.Body Body characteristics include fingerprint, palmmprint, palm shape, retina, iris, human scent, shape of face, the blood vessel of hand and DNA etc.;Behavioural characteristic packet It includes: signature, voice, walking step state etc..For example, biological characteristic can be face, fingerprint, palmmprint, iris, retina, pulse, sound Sound or keystroke dynamics." content " mentioned herein refers to the web page contents that electronic device user accesses during online. For example, web page contents may include text, photo, audio and/or video." browser bookmark " mentioned herein refers to use Family is during browsing webpage, the station address label generated using browser, and is deposited with the format that browser is supported Storage one section of small application on a web browser, it is subsequent in, user usually only need to click in bookmark column on a web browser save should Browser bookmark, browser directly can parse the browser bookmark according to cured analytical algorithm, so that it is clear to be linked to this It lookes at the corresponding webpage of device bookmark, and executes operation, for example, data are extracted, inquiry, information publication etc. is (referring to patent document CN102571688B)." hidden strong box " mentioned herein refers to a kind of for storing the application tool of private content, use After family places the content of secret in the safe, the private content could can only be accessed again by decrypting safety box.
It is below with reference to accompanying drawings and right in conjunction with specific embodiments in order to be clearer and more clear technical solution of the present invention Method for secret protection and device of the invention is described in detail.
Fig. 1 is to show the method for secret protection for electronic equipment 200 shown in Fig. 2 of embodiment according to the present invention Flow chart.Electronic equipment 200 includes physical characteristics collecting module 201, characteristic processing module 202, biological attribute data Library module 203, biological characteristic library module 204, biological attribute data comparison module 205 and application module 206.Physical characteristics collecting Module 201 is the module for acquiring biological characteristic, for example, camera, camera, scanner, sensor etc..At characteristic Module 202 is managed to be used to carry out mathematical algorithm processing (for example, packet to from the collected biological characteristic of physical characteristics collecting module 201 Include Karhunen-Loeve transformation, the face characteristic extraction algorithm of PCA method etc.), to extract biological attribute data.Biological attribute data library module 203 biological characteristics for being used to store include as biological characteristic registration and the biological attribute data for being compared template of identification process Database.It includes being compared the biological special of template as living things feature recognition process that biological characteristic library module 204, which is used to store, The biological characteristic library of sign.Biological attribute data comparison module 205 is used for the characteristic exported from characteristic processing module 202 It is compared according to as the characteristic for being compared template, to differentiate whether collected biological characteristic is registered biology Feature.Application module 206 is the application program or module for protecting private content, for example, hidden strong box.
As shown in Figure 1, firstly, in step S101, to needing the content for carrying out secret protection to encrypt, and will encrypt Content be saved in application module.In step S102, label associated with encrypted content is created in application module, and And hidden state is set by encrypted content.In step S103, label is encrypted.Add when user wants access to When close content, in step S104, label is decrypted.At this point, application module is under privacy protection mode.If Difference between the collected biological characteristic of physical characteristics collecting module and preset biological characteristic is less than or equal to first predetermined value ("Yes" in step S105), then show encrypted content (step S106) in the display interface.On the other hand, if it is biological Difference between the collected biological characteristic of collection apparatus module and the preset biological characteristic is greater than first predetermined value (step "No" in S105), then the content (step S107) unrelated with encrypted content is shown in the display interface.Here, and The unrelated content of the content of encryption can be particular webpage content (for example, homepage of People's Net or Sina website).The content can Be electronic device user accessed during online include text, photo, audio and/or video web page contents.It is described Label can be the browser bookmark for being linked to webpage, be also possible to other labels with link sexual function.Below to above-mentioned The biological characteristic registration process and living things feature recognition process being related in step S106 and S107 are described in detail.
Fig. 3 is to show the flow chart of the biological characteristic registration process of embodiment according to the present invention.In step S301, benefit Use the acquisition of physical characteristics collecting module 201 as the biological characteristic of object to be registered, for example, face, fingerprint, palmmprint etc..So Afterwards, step S302 carries out mathematical algorithm processing to the biological characteristic of acquisition to extract the data of characterization biological characteristic.In step S303 extracts biological attribute data and outputs it to biological attribute data comparison module 205.In addition, in step S304, in life Biological attribute data library is downloaded or updated in (for example, when using for the first time) object characteristic library module 203.Then, in step S305 initializes biological attribute data and outputs it to biological attribute data comparison module 205.Then, in step S306, in biological attribute data comparison module 205 by the biological attribute data of extraction with from biological attribute data library just The biological attribute data of beginningization is compared.Then, in step S307, differentiate the biological attribute data of extraction and the life of initialization Whether the difference between object characteristic is less than or equal to second predetermined value.If the life of the biological attribute data and initialization that extract Difference between object characteristic is less than or equal to second predetermined value ("Yes" in step S307), then by the biological characteristic number of extraction According to being saved in biological attribute data library (step S308).If the biological attribute data of the biological attribute data and initialization that extract Between difference be greater than second predetermined value ("No" in step S307), then return to step S301, that is, adopted using biological characteristic Collection module 201 acquires next biological characteristic.
Fig. 4 is to show the flow chart of the living things feature recognition process of embodiment according to the present invention.In step S401, benefit Use the acquisition of physical characteristics collecting module 201 as the biological characteristic of object to be identified.Then, step S402, the life to acquisition Object feature carries out mathematical algorithm processing to extract the data of characterization biological characteristic.In step S403, biological attribute data is extracted simultaneously Output it to biological attribute data comparison module 205.In addition, in step S404, in biological attribute data library module 203 (for example, when using for the first time) downloading updates biological attribute data library.Then, in step S405, biological attribute data is carried out It initializes and outputs it to biological attribute data comparison module 205.Next, biological characteristic will be stored in step S406 Registered biological characteristic in library exports biological attribute data comparison module 205.Then, in step S407, in biological characteristic Biological characteristic library by the biological attribute data of extraction and is come from based on the biological attribute data of initialization in data comparing module 205 The characteristic of registered biological characteristic be compared.Then, in step S408, differentiate the biological attribute data of extraction with Whether the difference between the biological attribute data of registered biological characteristic is less than or equal to third predetermined value.If the biology extracted Difference between characteristic and the biological attribute data of registered biological characteristic is less than or equal to third predetermined value (step S408 In "Yes"), then the biological attribute data of extraction is saved in biological attribute data library (step S409).If the biology extracted Difference between characteristic and the biological attribute data of registered biological characteristic is greater than third predetermined value (in step S408 "No"), then return to step S401, that is, acquire next biological characteristic using physical characteristics collecting module 201.
In above-mentioned method for secret protection, due to being carried out using the display interface of biometric authentication technology application modules Unlock, so improving the security performance of private content compared with the prior art.Further, since label and encrypted content phase Association, so user only needs to be presented to the user encrypted content by clicking label, therefore, when user uses It is very convenient, without any obstacle, better user experience.In addition, the conduct of acquisition is waited for during above-mentioned living things feature recognition Identify that the characteristic of the biological characteristic of object passes back to biological attribute data library, to update biological attribute data library.So not Biological attribute data library can be only updated, while living things feature recognition algorithm can also be improved, to further improve biology The accuracy of feature identification.
In addition, the present invention also provides a kind of privacy protection devices for electronic equipment.Fig. 5 is to show according to the present invention Embodiment the privacy protection device 500 for electronic equipment 200 as shown in Figure 2 block diagram.The privacy protection device 500 Including encrypting storing unit 501, label creating unit 502, encryption unit 503, decryption unit 504 and display unit 505.Encryption Storage unit 501 is used for needing the content for carrying out secret protection to encrypt, and saves encrypted content.Label creation is single Member 502 sets hiding for the encrypted content for creating label associated with the encrypted content State.Encryption unit 503 is for encrypting the label.What decryption unit 504 had encrypted described in being used to access when needs When content, the label is decrypted.Display unit 505 is used to show described added in the display interface in successful decryption Close content, and show the content unrelated with the encrypted content in the display interface when decrypting failure.Privacy is protected Protection unit 500 can also include the acquisition unit (not shown) for acquiring the biological characteristic of user under privacy protection mode. If acquisition unit difference between collected biological characteristic and preset biological characteristic be less than or equal to predetermined value, decrypt Success.On the other hand, if acquisition unit difference between collected biological characteristic and the preset biological characteristic it is big In predetermined value, then decrypts and fail.
Next, by a specific example of description application method for secret protection of the invention.In this example, people is utilized Face identification technology is unlocked the hidden strong box on mobile phone to provide a user in internet behavior link and need encipherment protection The service of partial content.Fig. 6 shows the picture that particular web site is added to hidden strong box.As shown in fig. 6, when user wants to just When the web page contents of access encrypt, user only need in the display interface the long-pressing page can by the webpage institute it is right The bookmark answered is added to hidden strong box.When user thinks to access the web page contents encrypted again, user passes through recognition of face Hidden strong box is unlocked to access the bookmark being stored in the hidden strong box.As shown in fig. 7, showing face on mobile phone screen It identifies interface, prompts user that face is placed in camera and take pictures.Then, recognition of face is carried out for the facial image of shooting Process.If identified successfully, the display interface of hidden strong box is unlocked and shows " my bookmark " under the safety box page.When When user clicks " my bookmark ", the list for the bookmark for including in " my bookmark " is shown in the display interface.On the contrary, if Recognition failures, then the display interface of hidden strong box is locked and interior unrelated with above-mentioned web page contents of display in the display interface Hold (not shown), for example, locking picture or a specific webpage (for example, homepage of People's Net or Sina website) can be shown.
Face recognition technology employed in above-mentioned example is mainly concerned with face registration process and face recognition process.Under Face is briefly described face registration process and face recognition process.
Fig. 8 shows the flow chart of face registration process.As shown in figure 8, firstly, being shot in step S801 with camera Facial image.Then, step S802 carries out mathematical algorithm to the facial image of shooting and handles to extract face characteristic data.It connects Get off, in step S803, extracts face characteristic data and output it to face characteristic data comparing module.In addition, in step S804 downloads in facial feature database module (for example, when using for the first time) or updates facial feature database.Then, exist Step S805 initializes face characteristic data and outputs it to face characteristic data comparing module.Then, in step S806, by the face characteristic data of extraction and from the initialization of facial feature database in face characteristic data comparing module Face characteristic data be compared.Then, in step S807, the face of the face characteristic data and initialization that differentiate extraction is special Whether the difference between sign data is less than or equal to the 4th predetermined value.If the face of the face characteristic data and initialization extracted is special The difference levied between data is less than or equal to the 4th predetermined value ("Yes" in step S807), then protects the face characteristic data of extraction It is stored to facial feature database (step S808).If between the face characteristic data of the face characteristic data and initialization extracted Difference be greater than the 4th predetermined value ("No" in step S807), then return to step S801, that is, with camera shoot next frame Facial image.
Fig. 9 shows the flow chart of face recognition process.As shown in figure 9, firstly, being shot in step S901 with camera Facial image.Then, step S902 carries out mathematical algorithm to the facial image of shooting and handles to extract face characteristic data.It connects Get off, in step S903, extracts face characteristic data and output it to face characteristic data comparing module.In addition, in step S904 downloads in facial feature database module (for example, when using for the first time) or updates facial feature database.Then, exist Step S905 initializes face characteristic data and outputs it to face characteristic data comparing module.Meanwhile in step In S906, the registered face stored in face database is inputed into face characteristic data comparing module.Then, in step S907, face characteristic data in face characteristic data comparing module based on initialization by the face characteristic data of extraction with The face characteristic data of the face of registration are compared.Then, in step S908, differentiate the face characteristic data of extraction and infused Whether the difference between the characteristic of the face of volume is less than or equal to the 5th predetermined value.If extract face characteristic data with Difference between the characteristic of the face of registration is less than or equal to the 5th predetermined value ("Yes" in step S908), then by extraction Face characteristic data are saved in facial feature database (step S909).If the face characteristic data extracted and registered people Difference between the characteristic of face is greater than the 5th predetermined value ("No" in step S908), then returns to step S901, that is, uses Camera shoots next frame facial image.
In above-mentioned face recognition process, the characteristic of the face of extraction is passed back into face characteristic when identifying successfully Database, to update facial feature database.Facial feature database not only can be updated, while face can also be improved Feature recognition algorithms, to further improve the accuracy of recognition of face.
Above by reference to attached drawing be described in detail method for secret protection for electronic equipment according to the present invention and Device.
In addition, being also implemented as a kind of computer program or computer program product, the meter according to the method for the present invention Calculation machine program or computer program product include the calculating for executing the above steps limited in the above method of the invention Machine program code instruction.
In addition, the present invention can also be embodied as a kind of calculating equipment, which includes: processor;And memory, It is stored thereon with executable code, when the executable code is executed by the processor, the processor is made to execute basis Each step of method of the invention.
Alternatively, the present invention can also be embodied as a kind of (or the computer-readable storage of non-transitory machinable medium Medium or machine readable storage medium), it is stored thereon with executable code (or computer program or computer instruction code), When the executable code (or computer program or computer instruction code) by electronic equipment (or calculate equipment, server Deng) processor execute when, so that the processor is executed each step according to the above method of the present invention.
Those skilled in the art will also understand is that, various illustrative logical blocks, mould in conjunction with described in disclosure herein Block, circuit and algorithm steps may be implemented as the combination of electronic hardware, computer software or both.
The flow chart and block diagram in the drawings show the possibility of the system and method for multiple embodiments according to the present invention realities Existing architecture, function and operation.In this regard, each box in flowchart or block diagram can represent module, a journey A part of sequence section or code, a part of the module, section or code include one or more for realizing defined The executable instruction of logic function.It should also be noted that in some implementations as replacements, the function of being marked in box can also To be occurred with being different from the sequence marked in attached drawing.For example, two continuous boxes can actually be basically executed in parallel, They can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram and/or stream The combination of each box in journey figure and the box in block diagram and or flow chart, can the functions or operations as defined in executing Dedicated hardware based system realize, or can realize using a combination of dedicated hardware and computer instructions.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill Many modifications and changes are obvious for the those of ordinary skill in art field.The selection of term used herein, purport In the principle, practical application or improvement to the technology in market for best explaining each embodiment, or make the art Other those of ordinary skill can understand each embodiment disclosed herein.

Claims (22)

1. a kind of method for secret protection for electronic equipment characterized by comprising
To needing the content for carrying out secret protection to encrypt, and save encrypted content;
Label associated with the encrypted content is created, also, sets hidden state for the encrypted content;
The label is encrypted;
When needing to access the encrypted content, the label is decrypted;
If successful decryption, show the encrypted content in the display interface, otherwise in the display interface display and institute State the unrelated content of encrypted content.
2. method for secret protection according to claim 1, which is characterized in that the method for secret protection further include: hidden Under private protected mode, the biological characteristic of user is acquired,
If difference between collected biological characteristic and preset biological characteristic be less than or equal to predetermined value, be decrypted into Function;
If difference between collected biological characteristic and the preset biological characteristic be greater than predetermined value, decrypt mistake It loses.
3. method for secret protection according to claim 2, which is characterized in that the method for secret protection further includes that storage is pre- The characteristic of the biological characteristic and storage biological characteristic that first acquire or download.
4. method for secret protection according to claim 3, which is characterized in that the method for secret protection further includes to being adopted The biological characteristic collected carries out mathematical algorithm processing to extract the characteristic of biological characteristic.
5. method for secret protection according to claim 4, which is characterized in that the method for secret protection further includes to being mentioned The characteristic of the biological characteristic taken and the biological attribute data of storage are compared.
6. method for secret protection according to any one of claims 1 to 5, which is characterized in that the content is electronics What equipment user accessed during online includes the web page contents of text, photo, audio and/or video.
7. method for secret protection according to claim 6, which is characterized in that the label is the browser for being linked to webpage Bookmark.
8. method for secret protection according to claim 7, which is characterized in that the biological characteristic is face, fingerprint, the palm Line, iris, retina, pulse, sound or keystroke dynamics.
9. method for secret protection according to claim 8, which is characterized in that the raw method for secret protection further includes face Registration process and face recognition process,
Wherein, face registration process includes the image for obtaining object to be registered, carries out feature extraction to the image of object to be registered To obtain the characteristic of object to be registered, differentiate whether object to be registered is face by the characteristic, if differentiating Object to be registered is face, then the characteristic of acquisition is stored in facial feature database module, and by acquisition wait infuse The image of volume object is stored in face library module as facial image;
Face recognition process includes the image for obtaining object to be identified, carries out feature extraction to the image of object to be identified to obtain The characteristic of object to be identified, based on characteristic by the object to be identified of acquisition and the face that is stored in face library module It is compared, if the object to be identified obtained and the difference being stored between the face in face database are less than or equal to specify Value, then authenticate success, otherwise authentification failure.
10. method for secret protection according to claim 9, which is characterized in that the face recognition process further includes that will obtain The characteristic of the object to be identified obtained uploads to human face data library module, to update face database.
11. a kind of privacy protection device for electronic equipment, which is characterized in that the privacy protection device includes:
Encrypting storing unit for needing the content for carrying out secret protection to encrypt, and saves encrypted content;
Label creating unit, for creating label associated with the encrypted content, also, will be in described encrypted It is installed with and is set to hidden state;
Encryption unit, for being encrypted to the label;
Decryption unit, for when needing to access the encrypted content, the label to be decrypted;
Display unit fails for showing the encrypted content in the display interface in successful decryption, and in decryption When show the content unrelated with the encrypted content in the display interface.
12. privacy protection device according to claim 11, which is characterized in that the electronic equipment includes in privacy The acquisition module of the biological characteristic of user is acquired under protected mode,
Wherein, if acquisition module difference between collected biological characteristic and preset biological characteristic be less than or equal to it is predetermined It is worth, then successful decryption;
If acquisition module difference between collected biological characteristic and the preset biological characteristic be greater than predetermined value, Decryption failure.
13. privacy protection device according to claim 12, which is characterized in that the electronic equipment further includes for storing The biological characteristic library module for the biological characteristic for acquiring or downloading in advance and the biology of the characteristic for storing biological characteristic are special Levy database module.
14. privacy protection device according to claim 13, which is characterized in that the electronic equipment further includes characteristic Processing module, for carrying out mathematical algorithm processing to the collected biological characteristic of acquisition module to extract the characteristic of biological characteristic According to.
15. privacy protection device according to claim 14, which is characterized in that the electronic equipment further includes biological characteristic Data comparing module, for special to the characteristic for extracting biological characteristic and the biology being stored in biological attribute data library module Sign data are compared.
16. privacy protection device described in any one of 1 to 15 according to claim 1, which is characterized in that the content is electricity What sub- equipment user accessed during online includes the web page contents of text, photo, audio and/or video.
17. privacy protection device according to claim 16, which is characterized in that the label is the browsing for being linked to webpage Device bookmark.
18. privacy protection device according to claim 17, which is characterized in that the biological characteristic is face, fingerprint, the palm Line, iris, retina, pulse, sound or keystroke dynamics.
19. privacy protection device according to claim 18, which is characterized in that the electronic equipment further includes for executing The module of face registration process and face recognition process,
Wherein, face registration process includes being taken pictures with camera to obtain the image of object to be registered, to the figure of object to be registered As carrying out feature extraction to obtain the characteristic of object to be registered, object to be registered is differentiated by the characteristic whether For face, if differentiating, object to be registered is face, and the characteristic of acquisition is stored in facial feature database module, and The image of the object to be registered of acquisition is stored in face library module as facial image;
Face recognition process includes being taken pictures with camera to obtain the image of object to be identified, is carried out to the image of object to be identified Feature extraction by the object to be identified of acquisition and is stored in face to obtain the characteristic of object to be identified, based on characteristic Face in library module is compared, if the object to be identified obtained and the difference being stored between the face in face database It is different to be less than or equal to designated value, then success is authenticated, otherwise authentification failure.
20. privacy protection device according to claim 19, which is characterized in that in face recognition process, acquisition to The characteristic of identification object is uploaded to human face data library module, to update face database.
21. a kind of calculating equipment, comprising:
Processor;And
Memory is stored thereon with executable code, when the executable code is executed by the processor, makes the processing Device executes the method for secret protection as described in any one of claim 1-10.
22. a kind of non-transitory machinable medium, is stored thereon with executable code, when the executable code is electric When the processor of sub- equipment executes, the processor is made to execute the secret protection side as described in any one of claims 1 to 10 Method.
CN201711262822.7A 2017-12-04 2017-12-04 Method for secret protection and device calculate equipment and storage medium Pending CN109871707A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711262822.7A CN109871707A (en) 2017-12-04 2017-12-04 Method for secret protection and device calculate equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711262822.7A CN109871707A (en) 2017-12-04 2017-12-04 Method for secret protection and device calculate equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109871707A true CN109871707A (en) 2019-06-11

Family

ID=66915862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711262822.7A Pending CN109871707A (en) 2017-12-04 2017-12-04 Method for secret protection and device calculate equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109871707A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261216A (en) * 2020-10-20 2021-01-22 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium
CN114817938A (en) * 2021-01-28 2022-07-29 海信集团控股股份有限公司 Method and equipment for accessing shared photo album and protecting private pictures of shared photo album

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070250920A1 (en) * 2006-04-24 2007-10-25 Jeffrey Dean Lindsay Security Systems for Protecting an Asset
JP2008065572A (en) * 2006-09-07 2008-03-21 Konica Minolta Business Technologies Inc Method for updating biometric information used in biometric authentication system, and biometric authentication system
US20140075368A1 (en) * 2012-09-07 2014-03-13 Lg Electronics Inc. Method for controlling content and digital device using the same
US20140075527A1 (en) * 2012-09-07 2014-03-13 Lg Electronics Inc. Method for controlling content and digital device using the same
CN104182671A (en) * 2013-05-23 2014-12-03 腾讯科技(深圳)有限公司 Method and device for protecting privacy information of browser
CN104584025A (en) * 2012-09-28 2015-04-29 英特尔公司 Device, method, and system for controlling access to web objects of a webpage or web-brower application
CN104700001A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Information encryption method and device of application program
CN104869170A (en) * 2015-05-29 2015-08-26 四川效率源信息安全技术有限责任公司 Decryption method for encrypted data file of UC browser

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070250920A1 (en) * 2006-04-24 2007-10-25 Jeffrey Dean Lindsay Security Systems for Protecting an Asset
JP2008065572A (en) * 2006-09-07 2008-03-21 Konica Minolta Business Technologies Inc Method for updating biometric information used in biometric authentication system, and biometric authentication system
US20140075368A1 (en) * 2012-09-07 2014-03-13 Lg Electronics Inc. Method for controlling content and digital device using the same
US20140075527A1 (en) * 2012-09-07 2014-03-13 Lg Electronics Inc. Method for controlling content and digital device using the same
CN104584025A (en) * 2012-09-28 2015-04-29 英特尔公司 Device, method, and system for controlling access to web objects of a webpage or web-brower application
CN104182671A (en) * 2013-05-23 2014-12-03 腾讯科技(深圳)有限公司 Method and device for protecting privacy information of browser
CN104700001A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Information encryption method and device of application program
CN104869170A (en) * 2015-05-29 2015-08-26 四川效率源信息安全技术有限责任公司 Decryption method for encrypted data file of UC browser

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
祝恩等著: "自动指纹识别技术", 国防科技大学出版社, pages: 161 - 162 *
陆伟 等: "一种安全浏览器设计实现", 数字技术与应用, pages 121 - 122 *
陆伟等: "一种安全浏览器设计实现", 《数字技术与应用》, no. 07, 15 July 2010 (2010-07-15), pages 121 - 122 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261216A (en) * 2020-10-20 2021-01-22 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium
CN112261216B (en) * 2020-10-20 2022-05-03 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium
CN114817938A (en) * 2021-01-28 2022-07-29 海信集团控股股份有限公司 Method and equipment for accessing shared photo album and protecting private pictures of shared photo album
CN114817938B (en) * 2021-01-28 2024-05-17 海信集团控股股份有限公司 Method and equipment for accessing shared album and protecting private pictures of shared album

Similar Documents

Publication Publication Date Title
CN104903904B (en) Bar code authentication for resource request
CN111585964B (en) Login information input method, login information storage method and related device
CN108063750A (en) dynamic user identity verification method
Castiglione et al. Biometrics in the cloud: challenges and research opportunities
US20150143483A1 (en) Device and Method for Identity Authentication Management
CN105279410A (en) User Authentication Retry with a Biometric Sensing Device
EA037018B1 (en) Method for digitally signing an electronic file
US20120005735A1 (en) System for Three Level Authentication of a User
JP5343761B2 (en) Optical information reader and authentication system using optical information reader
CA2766695A1 (en) Authentication method and system
CN106462706A (en) A method and apparatus for providing client-side score-based authentication
Ali et al. A secure and efficient multi-factor authentication algorithm for mobile money applications
CN107733973A (en) Method of controlling security, terminal, server and computer-readable medium
Hossain et al. Improving cloud data security through hybrid verification technique based on biometrics and encryption system
CN109871707A (en) Method for secret protection and device calculate equipment and storage medium
CN109871706A (en) Method for secret protection and device calculate equipment and storage medium
KR20160080456A (en) Method and apparstus for processing user authentification
Paul et al. IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't
WO2017091133A1 (en) Method and system for secure storage of information
Butt et al. Privacy protection of biometric templates
KR101500947B1 (en) Creation and authentication of biometric information
CN109871722A (en) Auth method, system, terminal and storage medium based on optical picture shape code
Kannavara et al. Topics in biometric human-machine interaction security
CN105844137B (en) Device and method for identifying picture browsing operation authority
CN114969777A (en) File access control method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200713

Address after: 310052 room 508, floor 5, building 4, No. 699, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Alibaba (China) Co.,Ltd.

Address before: 510627 Guangdong city of Guangzhou province Whampoa Tianhe District Road No. 163 Xiping Yun Lu Yun Ping B radio square 14 storey tower

Applicant before: Guangzhou Dongjing Computer Technology Co.,Ltd.

TA01 Transfer of patent application right