WO2012065557A1 - 保护设备中存储的数据的方法和相应的设备 - Google Patents

保护设备中存储的数据的方法和相应的设备 Download PDF

Info

Publication number
WO2012065557A1
WO2012065557A1 PCT/CN2011/082325 CN2011082325W WO2012065557A1 WO 2012065557 A1 WO2012065557 A1 WO 2012065557A1 CN 2011082325 W CN2011082325 W CN 2011082325W WO 2012065557 A1 WO2012065557 A1 WO 2012065557A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
user
private data
fingerprint information
current user
Prior art date
Application number
PCT/CN2011/082325
Other languages
English (en)
French (fr)
Inventor
樊科
Original Assignee
中国移动通信集团公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US13/885,954 priority Critical patent/US20130318625A1/en
Application filed by 中国移动通信集团公司 filed Critical 中国移动通信集团公司
Priority to KR1020137015447A priority patent/KR20130088171A/ko
Publication of WO2012065557A1 publication Critical patent/WO2012065557A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/117Identification of persons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Definitions

  • the present invention relates to the field of data security technologies, and in particular, to a method and a corresponding device for protecting data stored in a device. Background technique
  • fingerprint identification technology is used to protect private data in mobile devices, personal digital assistants (PDAs), and other terminal devices.
  • PDAs personal digital assistants
  • the user enters his fingerprint information into a terminal device such as a mobile phone or a PDA, thereby registering as a registered user in the device, and then setting access rights to certain programs or data, and setting the access permission program or data as private data, correspondingly Programs or data that do not have access rights set are non-private data.
  • set access rights for contacts, text messages, communication records, calendars, messages, pictures, videos, audio, file managers, browser history, etc. so that non-registered users cannot access data that sets access rights.
  • the inventor of the present application has found that the prior art prompts the user to input fingerprint information when the user sets the private data and then accesses the fingerprint information, which causes the non-registered user who uses the device to clearly know that the device uses the fingerprint recognition technology. That is to say, the private data of the registered user is likely to exist in the device. Therefore, the prior art method for protecting the private data in the terminal device such as the mobile phone and the PDA by using the fingerprint identification technology is not concealed, and the device is easily exposed. The fact that private data reduces the security and reliability of the private data to be protected. Summary of the invention
  • Embodiments of the present application disclose a data protection method for improving the security and reliability of private data to be protected when protecting private data in a terminal device by using fingerprint recognition technology.
  • An embodiment of the present application discloses a data protection method, where the method includes:
  • the device automatically acquires fingerprint information of a current user of the device
  • An embodiment of the present application further discloses an apparatus, including: The fingerprint reading module automatically acquires fingerprint information of the current user of the device;
  • the identification module compares the acquired fingerprint information of the current user with the fingerprint information of the registered user preset by the device;
  • the data invoking module calls the private data stored in the device if the recognition result is the same, otherwise, the non-private data stored in the device is invoked.
  • the method for protecting data stored in the device and the corresponding device disclosed in the embodiment of the present application when the current user of the device accesses the preset application in the device, the device automatically acquires the fingerprint information of the current user, and the acquired information is obtained.
  • the fingerprint information is matched with the registered user fingerprint information stored by itself. If the same, the private data is called. If it is different, the non-private data is called. Because the device does not send any input to the current user accessing the preset application in the above process. The prompt of the fingerprint information, so that the current user does not realize that his fingerprint information has been acquired, and the current user can still use the selected application normally.
  • All the actions performed by the device include: obtaining the current user fingerprint information of the device, matching the fingerprint information with the registered user fingerprint information, and calling the corresponding data according to the matching result, all performed without the current user being aware of the current data. And does not affect the functionality of the triggered application, so the user does not realize that the device has set fingerprint recognition to protect private data. In this way, the private data to be protected by the registered user can be more secretly protected, and the security and reliability of the private data are increased.
  • Figure 1 shows an apparatus 100 of an embodiment of the present application
  • Figure 2 shows an apparatus 200 of another embodiment of the present application
  • Figure 3 illustrates a method 3000 of protecting data stored in an apparatus of one embodiment of the present application
  • FIG. 4 illustrates a method 4000 of protecting data stored in a device of another embodiment of the present application.
  • the device mentioned in the present application can be registered by the user in the prior art method of entering the fingerprint information of the registered user. For example, the user first enters one or more fingerprints, then enters the fingerprint again, and matches one or more fingerprints previously entered. If the same, one or more fingerprints are recorded, and the registration is successful; otherwise, the fingerprint is re-entered.
  • the method in which the user registers the fingerprint information into the device belongs to the prior art, and therefore will not be described again.
  • the device described below has completed the process of user registration, that is, the registered user fingerprint information has been stored in the device, and the private data to be protected and the corresponding application have been set.
  • FIG. 1 shows a schematic diagram of an apparatus 100 in accordance with an embodiment of the present application.
  • the device 100 includes a fingerprint reading module 10, an identification module 20, and a data invoking module 30.
  • the fingerprint reading module 10 can automatically acquire current user fingerprint information of the device.
  • Identification module
  • the 20 may match the acquired fingerprint information of the current user with the registered user fingerprint information stored in the device 100. If the two fingerprints are the same, determine that the current user is a registered user, and if different, determine that the current user is a non-registered user.
  • the data invoking module 30 calls the private data stored in the device, and when the current user is determined to be a non-registered user, the data invoking module 30 calls the non-private data stored in the device.
  • the data invoking module 30 can also invoke non-private data stored in the device.
  • the following uses a mobile phone as an example for explanation. It is assumed that the registered user sets the communication method of the contact X as private data, and sets the "Contacts" application as the preset protection application.
  • the fingerprint reading module 10 can automatically acquire the current user fingerprint information of the mobile phone in real time. For example, when the first user touches the touch display of the mobile phone, the fingerprint reading module 10 automatically acquires the fingerprint information that the first user presses on the touch screen, and the identification module 20 stores the acquired fingerprint information of the first user and the device 100. The registered user fingerprint information is matched, and if the matching result is the same, the first user is determined as the registered user. The data invoking module 30 then calls the private data stored in the mobile phone, that is, the communication method of the contact X is called; or the non-private data stored in the mobile phone is called.
  • the fingerprint reading module 10 automatically obtains the fingerprint information that the second user presses on the touch display of the mobile phone.
  • the identification module 20 matches the acquired fingerprint information of the second user with the registered user fingerprint information stored in the device 100. If the matching result is not the same, the second user is determined to be a non-registered user.
  • the data invoking module 30 calls the non-private data stored in the mobile phone, that is, the non-registered user cannot see the private data set by the registered user.
  • FIG. 2 shows an apparatus 200 of another embodiment of the present application.
  • the device 200 may further include an application calling module 40 for receiving a current user input of the device to trigger an application preset in the device 200.
  • the fingerprint reading module 10 can automatically acquire the current user fingerprint information that triggers the application when the user of the device triggers the preset application.
  • the data invoking module 30 calls the private data stored in the device corresponding to the application through the application, when the current user is determined by the identification module 20 to be a non-registered user, The data invoking module 30 calls the non-private data stored in the device corresponding to the application through the application.
  • the Device 200 may be any device that needs to protect private data and is provided with a fingerprinting device, such as a cell phone, PDA, and the like.
  • the application calling module 40 may include a touch-display liquid crystal display (LCD, which is overlaid on the body of the device 200,
  • the fingerprint reading module 10 can be a transparent thin film field effect transistor (TFT, Thin Film)
  • Transistor (including sensor TFT and switch TFT) and is placed on the touch display LCD.
  • the user can see the display on the touchscreen LCD through the fingerprint reading module 10.
  • the techniques of combining the fingerprint reading module 10 and the LCD in the prior art can be directly used in the present application, and will not be described again.
  • the related information of the contact X is automatically set to private data
  • the application corresponding to the related information of the contact X is automatically set.
  • the application for example, the device automatically sets the relevant information of the contact X in the short message to the private data, and automatically sets the short message application as the preset protection application.
  • the application calling module 40 receives the current user triggering the address book application by pressing the touch display by the finger, and the fingerprint reading module 10 automatically acquires the fingerprint information of the current user, and the identification module 20 stores the acquired fingerprint information with the registered user stored in the device 100. The fingerprint information is matched.
  • the data calling module 30 calls the contact mode of the contact X stored in the device through the address book application, or the data calling module 30 passes the address book.
  • the application calls the non-private data stored in the mobile phone; if it is different, it determines that the current user is a non-registered user, and the data calling module 30 calls the non-private data stored in the mobile phone through the address book application, that is, the non-registered user cannot view Contact to contact X.
  • the device of this embodiment does not issue any prompt for inputting fingerprint information to a non-registered user, and the device does not issue any prompt to the non-registered user even when the current user of the device triggers the preset application.
  • the fingerprint reading module 10 automatically acquires the fingerprint information of the current user of the device, that is, the current user does not realize that his fingerprint information has been acquired, and the current user can still use the selected application normally. All the actions performed by the device include: obtaining the current user fingerprint information of the device, matching the fingerprint information with the registered user fingerprint information, and calling the corresponding data according to the matching result, all if the current user of the device is unaware of the situation.
  • private data and non-private data are optionally stored in different databases.
  • the device 200 may further include a first database 51 and a second database 52 for storing private data and non-private data, respectively.
  • the data invoking module 30 calls the private data stored in the first database 51 through the application
  • the data invoking module 30 calls the non-private data in the second database 52 through the application.
  • the contact information of the contact X in the above example may be stored in the first database 51, and when the identification module 20 determines that the current user is a registered user, the data invoking module 30 calls the first database 51 to store through the address book application.
  • the contact mode of the contact X; or the data invoking module 30 calls the non-private data in the second database 52 through the address book application.
  • the data of the registered user and the data of the non-registered user are stored in the first database 51 and the second database 52 respectively, that is, in the embodiment, the device 200 provides different data according to different users, and is not Hide or block private data in a database. Therefore, compared with the prior art, the device of the present embodiment increases the security of private data and is intelligent.
  • the identification module 20 when the fingerprint reading module 10 cannot obtain the current user fingerprint information that triggers the application when the current user of the device triggers the preset application, the identification module 20 will The user is determined to be a non-registered user. For example, when the user triggers a preset application by using an object other than the finger, for example, in the above example, when the current user clicks on the touch display of the mobile phone by the stylus to trigger the address book application, the fingerprint reading module 10 cannot obtain The current user's fingerprint information, at this time the identification module 20 determines the user as a non-registered user, and the data invoking module 30 calls the non-private data through the address book application. For example, in device 200, data invoking module 30 invokes non-private data from second database 52 via the address book application.
  • the above registered users may also be divided into a primary registered user and a secondary registered user.
  • the first database 51 stores private data with the primary registered user and private data from the registered user.
  • the identification module 20 determines that the user is the primary registered user
  • the data invoking module 30 invokes the private data of the primary registered user from the first database 51 through the triggered application; when the identifying module 20 determines that the user is a registered user, The data invoking module 30 calls the private data from the registered user from the first database 51 through the triggered application.
  • the primary registration user's rights can be equal to the rights of the registered user, or greater than the rights of the registered user.
  • the primary registered user has the same rights as the registered user, they can see each other's private data, or they cannot see each other's private data. If the primary registered user has more privileges than the registered user, the primary registered user can see the private data from the registered user, but the registered user cannot see the private data of the primary registered user.
  • the private data from the registered user can also be stored in a different database than the private data of the primary registered user.
  • a third database may be set to store private data from the registered user, and correspondingly, when the identification module 20 recognizes that the user is a registered user, the data invoking module 30 calls the registered user from the third database through the triggered application. Private data.
  • device 100 and/or device 200 when a non-registered user applies a preset application, device 100 and/or device 200 also stores operational information for the application.
  • the operation information of the application registered by the non-registered user is stored in the second database 52.
  • the second database 52 can record the operational information of the non-registered user using the address book application.
  • the apparatus 200 described above may further include a prompting module 60, as shown in FIG.
  • the prompting module 60 issues a prompt message prompting the registered user whether to invoke the operation information, and/or Whether to delete the operation information.
  • the second database 52 stores operation information of the non-registered user application address book application.
  • the prompting module 60 issues a prompt message to prompt the registered user whether to invoke the operation. Information, and/or whether to delete the operation information.
  • the threshold may be set such that the second database 52 may store operational information at a predetermined time and/or space. For example, setting the threshold allows the second database 52 to store the operation information for 24 hours, automatically deleting the stored operation information when the 24-hour period expires, or the upper limit of the space for storing the operation information is 64M or the like.
  • the application that needs to be protected by the registered user can be a sub-application under an application (also can be understood as a specific operation in an application), for example, a registered user can be "short”
  • the "Outbox" sub-application in the "Information” application is set to the application that needs to be protected.
  • other sub-applications in the short message application such as using sub-applications such as "Inbox”, “Draft”, “Unread Information”, etc., it can be used normally.
  • the data invocation module 30 calls non-private data, although the "outbox" sub-application is still working.
  • FIG. 3 illustrates a method 3000 of protecting data stored in an apparatus of one embodiment of the present application.
  • step S301 the device automatically acquires fingerprint information of the current user of the device.
  • step S302 the device matches the acquired current fingerprint information with the registered user fingerprint information stored in the device. If the two fingerprints are the same, the current user is determined to be a registered user, and then in step S303, the device invokes the privacy. Data; if the two fingerprints are different, the current user is determined to be a non-registered user, and then in step S304, the device invokes non-private data.
  • the non-registered user can still use the function of the application normally, but cannot see the private data set by the registered user.
  • the device may automatically acquire fingerprint information of the current user in real time. For example, assume that a registered user sets the communication method of the contact X in the mobile phone as private data, and sets the "Contacts" application as the default protected application. Then, in step S301, when the first user touches the touch screen of the mobile phone by the finger, the device automatically acquires the fingerprint information that the first user presses on the touch screen, because the device can obtain the current user fingerprint information in real time, so as long as the current user passes the finger When the touch display of the mobile phone is touched, the device can obtain the fingerprint that the current user presses on the touch show.
  • step S302 the device matches the acquired fingerprint information of the first user with the registered user fingerprint information stored in the device, and the two fingerprints are the same, so the first user is determined to be the registered user, and then in step S303, The device invokes the contact information of contact X.
  • the device automatically acquires the fingerprint information of the second user in step S301, and the acquired fingerprint information of the second user and the registered user fingerprint information stored in the device 100 in step S302.
  • the matching is performed, and the matching result is different. Therefore, the second user is determined to be a non-registered user, and non-private data is called in step S304, that is, the non-registered user cannot see the private data set by the registered user.
  • step S301 when the current user of the device triggers an application preset in the device, the device automatically acquires fingerprint information of the current user.
  • step S302 the device matches the acquired fingerprint information with the registered user fingerprint information stored in the device. If the two fingerprints are the same, the current user is determined to be a registered user, and then the device passes the application in step S303.
  • the program calls the private data corresponding to the application; if the two fingerprints are different, the current user is determined to be a non-registered user, and then in step S304, the device invokes the non-private data corresponding to the application through the application.
  • step S301 when the current user of the mobile phone clicks the touch display to trigger the address book application, the device automatically acquires the fingerprint information of the current user; in step S302, the device stores the acquired fingerprint information with the stored information in the device.
  • FIG. 4 illustrates a method 4000 of protecting data stored in a device of another embodiment of the present application. The same steps in the method 4000 shown in FIG. 4 and the method 3000 shown in FIG. 3 are not described again.
  • private data and non-private data may be stored in different databases.
  • the device can include a first database for storing private data of the registered user and a second database for storing the non-private data.
  • step S402 if the device determines the current user as the registered user, the device invokes the private data stored in the first database through the application in step S403; in step S402, if the device determines the current user as When the user is not a registered user, in step S404, the device calls the non-private data in the second database through the application.
  • step S402 if the mobile phone determines the current user as the registered user, in step S403, the mobile phone invokes the contact information of the contact X stored in the first database through the address book application; or the mobile phone passes the address book.
  • the application calls the non-private data stored in the second database; in step S402, if the mobile phone determines the current user as a non-registered user, then in step S404, the mobile phone invokes the second database stored in the address book application.
  • Non-private data if the mobile phone determines the current user as the registered user, in step S403, the mobile phone invokes the contact information of the contact X stored in the first database through the address book application; or the mobile phone passes the address book.
  • the application calls the non-private data stored in the second database; in step S402, if the mobile phone determines the current user as a non-registered user, then in step S404, the mobile phone invokes the second database stored in the address book application.
  • Non-private data if the mobile phone determines the
  • the current user triggers the preset application and the device cannot acquire the current user fingerprint information that triggers the application in step S401
  • the current user is determined to be a non-registered user. For example, when the current user clicks the touch screen of the mobile phone to trigger the address book application, the mobile phone will not be able to obtain the fingerprint information of the current user, and the current user is determined to be a non-registered user.
  • the mobile phone invokes non-private data through the address book application. For example, the phone calls non-private data from the second database through the contacts application.
  • the above registered users may also be divided into a primary registered user and a secondary registered user.
  • private data with the primary registered user and private data from the registered user are stored in the first database of the device.
  • the device invokes the private data of the primary registered user from the first database through the triggered application in step S403; when the user is determined to be the registered user in step S402 At this time, the device calls the private data from the registered user from the first database through the triggered application in step S403.
  • the private data from the registered user can also be stored in a different database than the private data of the primary registered user. For example, you can also set up a third database to store private data from registered users.
  • the device when a non-registered user applies a preset application, the device also stores operation information of the application in step S405.
  • the operation information of the non-registered user application of the application is stored in the second database.
  • the second database of the mobile phone records the operation information of the non-registered user using the address book application in step S405.
  • the device sends a prompt message in step S406 to prompt the registration.
  • the user invokes the operation information and/or whether to delete the operation information.
  • the threshold can be set to cause the device to store operational information at a predetermined time and/or space. For example, setting the threshold allows the second database of the device to store the operation information for 24 hours, automatically deleting the stored operation information when the 24-hour period expires, or the upper limit of the space for storing the operation information is 64M or the like.
  • the method for protecting data stored in the device and the corresponding device disclosed in the embodiment of the present application when the current user of the device accesses the preset application in the device, the device automatically acquires the fingerprint information of the current user, and the acquired information is obtained.
  • the fingerprint information is matched with the registered user fingerprint information stored by itself. If the same, the private data is called. If it is different, the non-private data is called. Because the device does not send any input to the current user accessing the preset application in the above process. The prompt of the fingerprint information, so that the current user does not realize that his fingerprint information has been acquired, and the current user can still use the selected application normally.
  • All the actions performed by the device include: obtaining the current user fingerprint information of the device, matching the fingerprint information with the registered user fingerprint information, and calling the corresponding data according to the matching result, all performed without the current user being aware of the current data. And does not affect the functionality of the triggered application, so the user does not realize that the device has set fingerprint recognition to protect private data. In this way, the private data to be protected by the registered user can be more secretly protected, and the security and reliability of the private data are increased.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the present invention can be embodied in the form of a computer program product embodied on one or more computer-usable storage interfaces (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer usable program code.
  • computer-usable storage interfaces including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the device is implemented in a flow or a flow or a block diagram of a block or multiple The function specified in the box.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Abstract

本申请公开了一种保护设备中存储的数据的方法,一种数据保护方法,包括:所述设备自动获取用户的指紋信息;判断所获取的设备的当前用户的指紋信息与所述设备中预设的注册用户指紋信息是否相同;如果判断的结果是相同,调用私密数据,否则,调用非私密数据。本发明还公开了相应的设备。通过本发明,可以更隐秘地保护用户的私密数据,使私密数据更加安全。

Description

保护设备中存储的数据的方法和相应的设备 本申请要求在 2010年 11月 17日提交中国专利局、 申请号为 201010547532.9、 发明名 称为"保护设备中存储的数据的方法和相应的设备 "的中国专利申请的优先权,其全部内容通过 引用结合在本申请中。
技术领域
本发明涉及数据安全技术领域, 尤其涉及一种保护设备中存储的数据的方法和相应的 设备。 背景技术
如今通过生物识别技术来保护私密数据已经得到广泛的应用。 例如利用指紋识别技术 来保护手机、 个人数字助理(PDA, Personal Digital Assistant )等终端设备中的私密数据。 用户将自己的指紋信息录入手机、 PDA等终端设备中, 从而在该设备中注册为注册用户, 进而对某些程序或数据设置访问权限,设置了访问权限的程序或数据为私密数据,相应地, 未设置访问权限的程序或数据为非私密数据。 例如对通讯录、短信息、 通讯记录、 日程表、 邮件、 图片、 视频、 音频、 文件管理器、 浏览器的历史记录等设置访问权限, 使非注册用 户无法访问设置访问权限的数据。
本申请发明人发现, 现有技术在用户设置了私密数据后再进行访问时, 都会提示用户 输入指紋信息, 这导致使用该设备的非注册用户会清楚地知晓该设备釆用了指紋识别技 术, 也就是说该设备中很有可能存有注册用户的私密数据, 因此, 现有技术利用指紋识别 技术来保护手机、 PDA等终端设备中的私密数据的方法不够隐蔽, 轻易地暴露了设备中存 在私密数据的事实, 降低了所要保护的私密数据的安全性和可靠性。 发明内容
本申请的实施方式公开了一种数据保护方法, 用以在利用指紋识别技术保护终端设备 中的私密数据时, 提高所要保护的私密数据的安全性和可靠性。
本申请的实施方式公开一种数据保护方法, 所述方法包括:
所述设备自动获取设备的当前用户的指紋信息;
判断所获取的当前用户指紋信息与所述设备中预设的注册用户指紋信息是否相同; 如果判断的结果是相同, 调用所述设备中存储的私密数据, 否则, 调用所述设备中存 储的非私密数据。
本申请的实施方式还公开一种设备, 包括: 指紋读取模块, 自动获取设备的当前用户的指紋信息;
识别模块, 将所获取的当前用户的指紋信息与所述设备预设的注册用户指紋信息进行 匹酉己; 以及
数据调用模块, 如果所述识别模块识别的结果是相同, 则调用所述设备中存储的私密 数据, 否则, 调用所述设备中存储的非私密数据。
本申请的实施方式公开的保护设备中存储的数据的方法和相应的设备, 当设备的当前 用户访问设备中预设的应用程序时, 该设备自动获取当前用户的指紋信息, 并将获取到的 指紋信息与自身存储的注册用户指紋信息进行匹配, 如果相同, 则调用私密数据, 如果不 同, 则调用非私密数据, 由于在上述过程中, 设备未向访问预设应用程序的当前用户发出 任何输入指紋信息的提示, 从而, 当前用户不会意识到自己的指紋信息已经被获取, 而且 当前用户仍然可以正常使用所选择的应用程序。 设备所进行的所有动作, 包括: 获取设备 的当前用户指紋信息、 将该指紋信息与注册用户指紋信息进行匹配、 根据匹配结果调用相 应的数据, 都是在当前用户毫无察觉的情况下进行的, 并且不会影响所触发的应用程序的 功能, 因此用户不会意识到该设备已经设定了指紋识别功能来保护私密数据。 这样, 可以 更加隐秘地保护注册用户的所要保护的私密数据, 增加了私密数据的安全性和可靠性。
附图说明
图 1示出本申请一个实施方式的设备 100;
图 2示出本申请另一个实施方式的设备 200;
图 3示出本申请一个实施方式的保护设备中存储的数据的方法 3000; 以及
图 4示出本申请另一个实施方式的保护设备中存储的数据的方法 4000。
具体实施方式
下面将结合本申请实施方式中的附图, 对本申请实施方式中的技术方案进行描述。 本申请所提及的设备可以应用现有技术中录入注册用户指紋信息的方法进行用户注 册。 例如, 用户首先录入一个或多个指紋, 然后再次录入指紋, 并与之前录入的一个或多 个指紋进行匹配, 如果相同则记录所录入的一个或多个指紋, 注册成功; 否则重新录入指 紋。 用户将指紋信息注册到设备中的方法属于现有技术, 因此不再赘述。
以下描述的设备已经完成了用户注册的过程, 即设备中已经存储有注册用户指紋信 息, 并且已经设定了需要保护的私密数据与相应的应用程序。
图 1示出本申请一个实施方式的设备 100的示意图。 如图 1所示, 设备 100包括指紋 读取模块 10、 识别模块 20和数据调用模块 30。 在该实施方式中, 指紋读取模块 10可自动获取设备的当前用户指紋信息。 识别模块
20可对所获取的当前用户的指紋信息与设备 100中存储的注册用户指紋信息进行匹配,如 果两种指紋相同, 则确定当前用户为注册用户, 如果不同, 则确定当前用户为非注册用户。 当当前用户被确定为注册用户时, 数据调用模块 30调用设备中存储的私密数据, 当当前 用户被确定为非注册用户时, 数据调用模块 30调用设备中存储的非私密数据。 较佳地, 当当前用户被确定为注册用户时, 数据调用模块 30还可以调用设备中存储的非私密数据。
以下以手机为例进行说明。 假定注册用户将联系人 X的通信方式设定为私密数据, 并 将 "通讯录" 应用程序设定为预设的保护应用程序。
在本申请的一个实施方式中, 指紋读取模块 10可以实时地自动获取手机的当前用户 指紋信息。 例如, 在第一用户触摸该手机的触摸展时, 指紋读取模块 10 自动获取第一用 户按压在触摸屏上的指紋信息, 识别模块 20对所获取的第一用户的指紋信息与设备 100 中存储的注册用户指紋信息进行匹配,如果匹配结果相同,则将第一用户确定为注册用户。 然后数据调用模块 30调用手机中存储的私密数据, 即调用联系人 X的通信方式; 或者调 用手机中存储的非私密数据。 此时, 如果第二用户使用该手机, 指紋读取模块 10 自动获 取第二用户按压在手机触摸展上的指紋信息。 识别模块 20对所获取的第二用户的指紋信 息与设备 100中存储的注册用户指紋信息进行匹配, 如果匹配结果不相同, 则将第二用户 确定为非注册用户。 数据调用模块 30调用手机中存储的非私密数据, 即非注册用户无法 看到注册用户设定的私密数据。
图 2示出了本申请另一个实施方式的设备 200。 如图 2所示, 在本申请的另一个实施 方式中, 设备 200还可包括应用程序调用模块 40, 用于接收设备的当前用户输入以触发设 备 200中预设的应用程序。 指紋读取模块 10可在设备的用户触发预设的应用程序时, 自 动获取触发该应用程序的当前用户指紋信息。 当当前用户被识别模块 20确定为注册用户 时, 数据调用模块 30通过该应用程序调用设备中存储的、 与该应用程序对应的私密数据, 当当前用户被识别模块 20确定为非注册用户时, 数据调用模块 30通过该应用程序调用设 备中存储的、 与该应用程序对应的非私密数据。
设备 200可以是需要保护私密数据并设置有指紋识别装置的任何设备,例如手机、 PDA 等。 应用程序调用模块 40可以包括覆盖在设备 200的机体上的触摸展液晶显示器( LCD,
Liquid Crystal Display )。指紋读取模块 10可以是透明的薄膜场效应晶体管( TFT, Thin Film
Transistor ) (包括传感器 TFT和开关 TFT )并且设置在触摸展 LCD上。在一个实施方式中, 用户可以通过指紋读取模块 10看见触摸展 LCD上的显示。 现有技术中指紋读取模块 10 与 LCD相结合的技术均可直接用于本申请, 不再赘述。
作为一种选择, 当联系人 X的通信方式被设定为私密数据时,联系人 X的相关信息都 自动设定为私密数据,与联系人 X的相关信息对应的应用程序也均自动设定为预设的保护 应用程序, 比如设备将短信息中联系人 X的相关信息自动设定为私密数据, 并将短信息应 用程序自动设定为预设的保护应用程序。 应用程序调用模块 40接收当前用户通过手指按 压触摸展来触发通讯录应用程序, 指紋读取模块 10 自动获取该当前用户的指紋信息, 识 别模块 20将所获取指紋信息与设备 100中存储的注册用户指紋信息进行匹配, 如果两种 指紋相同, 则确定该当前用户为注册用户, 数据调用模块 30通过通讯录应用程序调用存 储在设备中的联系人 X的联系方式, 或者数据调用模块 30通过通讯录应用程序调用存储 在手机中的非私密数据; 如果不同, 则确定该当前用户为非注册用户, 数据调用模块 30 通过通讯录应用程序调用存储在手机中的非私密数据, 即非注册用户无法看到联系人 X的 联系方式。
本实施方式的设备不会向非注册用户发出任何输入指紋信息的提示, 即使在设备的当 前用户触发预设的应用程序时, 设备也不会向非注册用户发出任何提示。 指紋读取模块 10 会自动地获取设备的当前用户的指紋信息, 也就是说该当前用户不会意识到自己的指紋信 息已经被获取, 而且当前用户仍然可以正常使用所选择的应用程序。 设备所进行的所有动 作, 包括: 获取设备的当前用户指紋信息、 将该指紋信息与注册用户指紋信息进行匹配、 根据匹配结果调用相应的数据, 都是在设备的当前用户毫无察觉的情况下 "默默,, 地进行 的, 并且不会影响所触发的应用程序的功能, 因此非注册用户不会意识到该手机已经设定 了指紋识别功能来保护私密数据。 这样可以更加隐秘地保护注册用户的所要保护的私密数 据, 增加了安全性和可靠性, 并且不会降低非注册用户的用户体验。
在本申请的另一个实施方式中, 私密数据和非私密数据可选择地存储在不同的数据库 中。 如图 2所示, 设备 200还可包括第一数据库 51和第二数据库 52 , 分别用于存储私密 数据和非私密数据。 例如, 当调用预设的应用程序的当前用户被确定为注册用户时, 数据 调用模块 30通过该应用程序调用第一数据库 51中存储的私密数据, 当该当前用户被确定 为非注册用户时, 数据调用模块 30通过该应用程序调用第二数据库 52中的非私密数据。 例如, 上述示例中联系人 X的联系方式可存储在第一数据库 51中, 当识别模块 20确定该 当前用户为注册用户时, 数据调用模块 30通过通讯录应用程序调用第一数据库 51中存储 的联系人 X的联系方式;或者数据调用模块 30通过通讯录应用程序调用第二数据库 52中 的非私密数据。
本实施方式中注册用户的数据与非注册用户的数据分别存储在第一数据库 51 和第二 数据库 52中, 也就是说在本实施方式中, 设备 200根据不同的用户提供不同的数据, 并 不是在一个数据库中隐藏或屏蔽私密数据。 因此, 与现有技术相比, 本实施方式的设备增 加了私密数据的安全性, 并具有智能性。
作为一种选择, 在上述的设备 200中, 当指紋读取模块 10在设备的当前用户触发预 设的应用程序时无法获取触发该应用程序的当前用户指紋信息时, 识别模块 20将该当前 用户确定为非注册用户。 例如当用户使用除手指之外的其他物体触发预设的应用程序时, 例如在上述示例中, 当前用户通过手写笔点击手机的触摸展来触发通讯录应用程序时, 指 紋读取模块 10无法获得该当前用户的指紋信息, 此时识别模块 20将该用户确定为非注册 用户, 数据调用模块 30通过通讯录应用程序调用非私密数据。 例如, 在设备 200中数据 调用模块 30通过通讯录应用程序从第二数据库 52中调用非私密数据。
在一个实施方式中,上述注册用户还可分为主注册用户和从注册用户。例如在设备 200 中, 第一数据库 51 中存储有与主注册用户的私密数据和从注册用户的私密数据。 当识别 模块 20确定出用户为主注册用户时, 数据调用模块 30通过所触发的应用程序从第一数据 库 51中调用主注册用户的私密数据; 当识别模块 20确定出用户为从注册用户时, 数据调 用模块 30通过所触发的应用程序从第一数据库 51中调用从注册用户的私密数据。 主注册 用户的权限可以与从注册用户的权限平等, 或者大于从注册用户的权限。 如果主注册用户 与从注册用户的权限平等, 则互相可以看到对方的私密数据, 或者互相看不到对方的私密 数据。 如果主注册用户的权限大于从注册用户的权限, 则主注册用户可以看到从注册用户 的私密数据, 但是从注册用户看不到主注册用户的私密数据。 当然从注册用户的私密数据 也可以与主注册用户的私密数据存储在不同的数据库中。 例如可以设置第三数据库来存储 从注册用户私密数据, 相应地, 当识别模块 20识别出用户为从注册用户时, 数据调用模 块 30通过所触发的应用程序从第三数据库中调用从注册用户的私密数据。
作为一种选择, 当非注册用户应用预设的应用程序时,设备 100和 /或设备 200还存储 该应用程序的操作信息。 例如, 在设备 200中, 在第二数据库 52中存储非注册用户应用 该应用程序的操作信息。 例如, 在上述的示例中, 第二数据库 52可记录非注册用户使用 了通讯录应用程序的操作信息。
此外, 根据本申请的另一个实施方式, 上述设备 200还可包括提示模块 60 , 如图 2所 示。 当设备 200中存储有非注册用户应用预设的应用程序的操作信息时, 当注册用户再次 触发相同的应用程序时, 提示模块 60发出提示信息, 提示注册用户是否调用该操作信息, 和 /或是否删除该操作信息。 例如, 在上述示例中, 第二数据库 52存储有非注册用户应用 通讯录应用程序的操作信息, 当注册用户再次触发通讯录应用程序时, 提示模块 60发出 提示信息,提示注册用户是否调用该操作信息,和 /或是否删除该操作信息。作为一种选择, 在本申请的一个实施方式中, 可以设定阈值使第二数据库 52可按照预定的时间和 /或空间 来存储操作信息。 例如, 设定阈值使第二数据库 52可以存储操作信息 24小时, 24小时期 满则自动删除所存储的操作信息, 或者存储操作信息的空间的上限值为 64M等等。
作为一种选择 , 注册用户设定的需要保护的应用程序可以是某个应用程序下的子应用 程序 (也可以理解为是某个应用程序中的具体操作), 例如, 注册用户可以将 "短信息" 应用程序中的 "发件箱" 子应用程序设定为需要保护的应用程序。 这样, 在非注册用户使 用短消息应用程序中的其他子应用程序时, 例如使用 "收件箱"、 "草稿箱"、 "未读信息" 等子应用程序时, 可以正常使用。 在非注册用户使用 "发件箱" 子应用程序时, 虽然仍可 正常使用 "发件箱" 子应用程序, 但是数据调用模块 30调用的是非私密数据。
图 3示出本申请一个实施方式的保护设备中存储的数据的方法 3000。
如图 3所示,在步骤 S301中,设备自动获取设备的当前用户的指紋信息。在步骤 S302 中, 设备将所获取的当前指紋信息与设备中存储的注册用户指紋信息进行匹配, 如果两种 指紋相同, 则将该当前用户确定为注册用户, 然后在步骤 S303 中, 设备调用私密数据; 如果两种指紋不同, 则将该当前用户确定为非注册用户, 然后在步骤 S304 中, 设备调用 非私密数据。 在该实施方式中, 非注册用户仍然可以正常使用应用程序的功能, 但是无法 看到注册用户设定的私密数据。
在本申请的一个实施方式中, 在步骤 S301 中, 设备可以实时地自动获取该当前用户 的指紋信息。 例如, 假定注册用户将手机中的联系人 X的通信方式设定为私密数据, 并将 "通讯录" 应用程序设定为预设的保护应用程序。 则在步骤 S301 中, 在第一用户通过手 指触摸手机的触摸屏时, 设备自动获取第一用户按压在触摸屏上的指紋信息, 因为设备可 实时地获取当前用户指紋信息, 因此只要当当前用户通过手指触摸手机的触摸展时, 设备 即可获取该当前用户按压在触摸展上的指紋。 然后在步骤 S302 中, 设备将所获取的第一 用户的指紋信息与设备中存储的注册用户指紋信息进行匹配, 两种指紋相同, 因此将第一 用户确定为注册用户, 然后在步骤 S303中, 设备调用联系人 X的联系方式。 此时, 如果 第二用户使用该手机, 则在步骤 S301中设备自动获取第二用户的指紋信息, 在步骤 S302 中对所获取的第二用户的指紋信息与设备 100中存储的注册用户指紋信息进行匹配, 匹配 结果不相同, 因此将第二用户确定为非注册用户, 在步骤 S304调用非私密数据, 即非注 册用户无法看到注册用户设定的私密数据。
在本申请的另一个实施方式中, 在步骤 S301 中, 当设备的当前用户触发设备中预设 的应用程序时, 设备会自动获取当前用户的指紋信息。 在步骤 S302 中, 设备将所获取的 指紋信息与设备中存储的注册用户指紋信息进行匹配, 如果两种指紋相同, 则将该当前用 户确定为注册用户, 然后在步骤 S303 中, 设备通过该应用程序调用与该应用程序对应的 私密数据; 如果两种指紋不同, 则将该当前用户确定为非注册用户, 然后在步骤 S304中, 设备通过该应用程序调用与该应用程序对应的非私密数据。
以下以包括触摸展的手机为例进行说明,假定注册用户将联系人 X的通信方式设定为 私密数据, 并将 "通讯录" 应用程序设定为预设的保护应用程序。 在步骤 S301 中, 当手 机的当前用户通过手指点击触摸展来触发通讯录应用程序时, 设备自动获取该当前用户的 指紋信息; 在步骤 S302 中, 设备将所获取的指紋信息与设备中存储的注册用户指紋信息 进行匹配, 如果两种指紋相同, 则确定该当前用户为注册用户, 然后在步骤 S303 中, 通 过通讯录应用程序调用联系人 X的联系方式; 或者通过通讯录应用程序调用非私密数据; 如果两种指紋不同, 则确定该用户为非注册用户, 在步骤 S304 中, 通过通讯录应用程序 调用非私密数据, 即非注册用户无法看到联系人 X的联系方式。
图 4示出本申请另一个实施方式的保护设备中存储的数据的方法 4000。图 4所示的方 法 4000与图 3所示的方法 3000中相同的步骤不再赘述。
在本申请的另一个实施方式中, 私密数据和非私密数据可以存储在不同的数据库中。 例如, 设备可包括第一数据库, 用于存储注册用户的私密数据; 以及第二数据库, 用于存 储非私密数据。在步骤 S402中,如果设备将当前用户确定为注册用户,则在步骤 S403中, 该设备通过该应用程序调用第一数据库中存储的私密数据; 在步骤 S402 中, 如果设备将 该当前用户确定为非注册用户时, 则在步骤 S404 中, 该设备通过该应用程序调用第二数 据库中的非私密数据。 例如, 在步骤 S402 中, 如果手机将当前用户确定为注册用户, 则 在步骤 S403中, 该手机通过通讯录应用程序调用第一数据库中存储的联系人 X的联系方 式; 或者该手机通过通讯录应用程序调用第二数据库中存储的非私密数据; 在步骤 S402 中, 如果手机将当前用户确定为非注册用户时, 则在步骤 S404 中, 该手机通过通讯录应 用程序调用第二数据库中存储的非私密数据。
此外, 如果在步骤 S401 中当当前用户触发预设的应用程序而设备无法获取触发该应 用程序的当前用户指紋信息, 则将该当前用户确定为非注册用户。 例如当前用户通过手写 笔点击手机的触摸屏来触发通讯录应用程序时, 该手机将无法获得该当前用户的指紋信 息, 则将该当前用户确定为非注册用户。 然后在步骤 S404 中, 该手机通过通讯录应用程 序调用非私密数据。 例如, 该手机通过通讯录应用程序从第二数据库中调用非私密数据。
作为一种选择, 上述注册用户还可分为主注册用户和从注册用户。 例如, 在设备的第 一数据库中存储有与主注册用户的私密数据和从注册用户的私密数据。 在步骤 S402 中当 用户被确定为主注册用户时, 在步骤 S403 中设备通过所触发的应用程序从第一数据库中 调用主注册用户的私密数据; 在步骤 S402中当用户被确定为从注册用户时, 在步骤 S403 中设备通过所触发的应用程序从第一数据库中调用从注册用户的私密数据。 当然从注册用 户的私密数据也可以与主注册用户的私密数据存储在不同的数据库中。 例如还可以设置第 三数据库来存储从注册用户私密数据。
根据本申请的另一个实施方式, 当非注册用户应用预设的应用程序时, 在步骤 S405 中设备还存储该应用程序的操作信息。 例如, 在步骤 S405 中, 在第二数据库中存储非注 册用户应用该应用程序的操作信息。 例如, 在步骤 S405 中手机的第二数据库记录非注册 用户使用通讯录应用程序的操作信息。
作为一种选择, 如果设备中存储有非注册用户应用预设的应用程序的操作信息, 则在 注册用户再次触发相同的应用程序时, 在步骤 S406 中设备会发出提示信息, 提示注册用 户是否调用该操作信息和 /或是否删除该操作信息。 例如, 如果手机中已经存储有非注册用 户应用通讯录应用程序的操作信息, 则在注册用户再次触发通讯录应用程序时, 在步骤 S406 中该手机会发出提示信息, 提示注册用户是否调用该操作信息和 /或是否删除该操作 信息。 作为一种选择, 可以设定阈值使设备按照预定的时间和 /或空间来存储操作信息。 例 如, 设定阈值使设备的第二数据库可以存储操作信息 24小时, 24小时期满则自动删除所 存储的操作信息, 或者存储操作信息的空间的上限值为 64M等等。
以上仅为本申请的示例性实施方式, 本领域技术人员根据上述实施方式, 在本申请权 利要求限定的范围内, 可以对上述各个实施方式进行修改。
本申请的实施方式公开的保护设备中存储的数据的方法和相应的设备, 当设备的当前 用户访问设备中预设的应用程序时, 该设备自动获取当前用户的指紋信息, 并将获取到的 指紋信息与自身存储的注册用户指紋信息进行匹配, 如果相同, 则调用私密数据, 如果不 同, 则调用非私密数据, 由于在上述过程中, 设备未向访问预设应用程序的当前用户发出 任何输入指紋信息的提示, 从而, 当前用户不会意识到自己的指紋信息已经被获取, 而且 当前用户仍然可以正常使用所选择的应用程序。 设备所进行的所有动作, 包括: 获取设备 的当前用户指紋信息、 将该指紋信息与注册用户指紋信息进行匹配、 根据匹配结果调用相 应的数据, 都是在当前用户毫无察觉的情况下进行的, 并且不会影响所触发的应用程序的 功能, 因此用户不会意识到该设备已经设定了指紋识别功能来保护私密数据。 这样, 可以 更加隐秘地保护注册用户的所要保护的私密数据, 增加了私密数据的安全性和可靠性。
本领域内的技术人员应明白, 本发明的实施例可提供为方法、 系统、 或计算机程序产 品。 因此, 本发明可釆用完全硬件实施例、 完全软件实施例、 或结合软件和硬件方面的实 施例的形式。 而且, 本发明可釆用在一个或多个其中包含有计算机可用程序代码的计算机 可用存储介盾 (包括但不限于磁盘存储器、 CD-ROM、 光学存储器等)上实施的计算机程 序产品的形式。
本发明是参照根据本发明实施例的方法、 设备(系统)、 和计算机程序产品的流程图 和 /或方框图来描述的。 应理解可由计算机程序指令实现流程图和 /或方框图中的每一流 程和 /或方框、 以及流程图和 /或方框图中的流程和 /或方框的结合。 可提供这些计算机 程序指令到通用计算机、 专用计算机、 嵌入式处理机或其他可编程数据处理设备的处理器 以产生一个机器, 使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用 于实现在流程图一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功能的 装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方 式工作的计算机可读存储器中, 使得存储在该计算机可读存储器中的指令产生包括指令装 置的制造品, 该指令装置实现在流程图一个流程或多个流程和 /或方框图一个方框或多个 方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上, 使得在计算机 或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理, 从而在计算机或其他 可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和 /或方框图一个 方框或多个方框中指定的功能的步骤。
尽管已描述了本发明的优选实施例, 但本领域内的技术人员一旦得知了基本创造性概 念, 则可对这些实施例做出另外的变更和修改。 所以, 所附权利要求意欲解释为包括优选 实施例以及落入本发明范围的所有变更和修改。

Claims

权 利 要 求
1. 一种数据保护方法, 其特征在于, 所述方法包括:
自动获取设备的当前用户的指紋信息;
判断所获取的当前用户指紋信息与所述设备中预设的注册用户指紋信息是否相同; 如果判断的结果是相同, 调用所述设备中存储的私密数据, 否则, 调用所述设备中存 储的非私密数据。
2. 如权利要求 1所述的方法, 其特征在于, 所述自动获取设备的当前用户的指紋信息 的步骤包括:
当当前用户触发所述设备中预设的应用程序时, 自动获取用户的指紋信息。
3. 如权利要求 2所述的方法, 其特征在于, 所述如果判断的结果是相同, 调用私密数 据, 否则, 调用非私密数据的步骤包括:
如果判断的结果是相同, 所述应用程序调用该应用程序对应的私密数据, 否则, 所述 应用程序调用与该应用程序对应的非私密数据。
4. 如权利要求 1所述的方法, 其特征在于, 所述自动获取设备的当前用户的指紋信息 的步骤包括:
实时地自动获取设备的当前用户的指紋信息。
5. 如权利要求 1所述的方法, 其特征在于, 所述设备自动获取用户的指紋信息的步骤 包括:
所述设备的指紋读取装置自动获取用户按压在所述设备的触摸屏上的指紋信息。
6. 如权利要求 3所述的方法, 其特征在于, 如果所述判断的结果是不同, 则所述方法 还包括:
记录所述应用程序的操作信息, 以使得所述注册用户通过记录的操作信息获悉非注册 用户通过所述应用程序进行的操作。
7、 如权利要求 1 所述的方法, 其特征在于, 如果所述判断的结果是相同, 则所述方 法还包括:
调用所述设备中存储的非私密数据。
8. 如权利要求 1所述的方法, 其特征在于, 当无法获取所述用户的指紋信息时, 所述 方法还包括:
调用所述设备中存储的非私密数据。
9. 一种设备, 其特征在于, 包括:
指紋读取模块, 用于自动获取设备的当前用户的指紋信息;
识别模块, 用于将所获取的当前用户的指紋信息与所述设备预设的注册用户指紋信息 进行匹配; 数据调用模块, 用于如果所述识别模块识别的结果是相同, 则调用所述设备中存储的 私密数据, 否则, 调用所述设备中存储的非私密数据。
10. 如权利要求 9所述的设备, 其特征在于, 还包括:
应用程序调用模块, 用于接收设备的当前用户输入以触发所述设备中预设的应用程 序。
11. 如权利要求 10所述的设备, 其特征在于,
所述指紋读取模块, 具体用于在所述应用程序被触发时, 自动获取设备的当前用户的 指丈信息。
12. 如权利要求 9所述的设备, 其特征在于,
所述指紋读取模块, 具体用于实时地自动获取设备的当前用户的指紋信息。
13. 如权利要求 10所述的设备, 其特征在于,
所述应用程序调用模块包括触摸展, 用于接收触发所述应用程序的指令。
14. 如权利要求 9所述的设备, 其特征在于, 还包括:
第一数据库, 用于存储所述私密数据; 以及
第二数据库, 用于存储所述非私密数据。
15. 如权利要求 14所述的设备, 其特征在于,
所述第二数据库, 还用于如果所述识别模块判断的结果是不同时, 记录所述应用程序 的操作信息。
16. 如权利要求 9所述的设备, 其特征在于,
所述数据调用模块, 还用于如果所述识别模块识别的结果是相同, 调用所述设备中存 储的非私密数据。
17. 如权利要求 11所述的设备, 其特征在于,
所述数据调用模块, 还用于当所述指紋读取模块无法获取所述用户的指紋信息时, 调 用所述设备中存储的非私密数据。
PCT/CN2011/082325 2010-11-17 2011-11-17 保护设备中存储的数据的方法和相应的设备 WO2012065557A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/885,954 US20130318625A1 (en) 2010-11-17 2011-11-11 Method for protecting data stored in device and device thereof
KR1020137015447A KR20130088171A (ko) 2010-11-17 2011-11-17 장치에 저장된 데이터를 보호하는 방법 및 그에 상응하는 장치

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010547532.9 2010-11-17
CN201010547532.9A CN102467462B (zh) 2010-11-17 2010-11-17 保护设备中存储的数据的方法和相应的设备

Publications (1)

Publication Number Publication Date
WO2012065557A1 true WO2012065557A1 (zh) 2012-05-24

Family

ID=46071120

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/082325 WO2012065557A1 (zh) 2010-11-17 2011-11-17 保护设备中存储的数据的方法和相应的设备

Country Status (4)

Country Link
US (1) US20130318625A1 (zh)
KR (1) KR20130088171A (zh)
CN (1) CN102467462B (zh)
WO (1) WO2012065557A1 (zh)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130287274A1 (en) * 2012-04-29 2013-10-31 Weidong Shi Methods and Apparatuses of Unified Capacitive Based Sensing of Touch and Fingerprint
CN104239804A (zh) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 一种数据保护方法及装置
CN103488926A (zh) * 2013-09-05 2014-01-01 广东欧珀移动通信有限公司 防止未读取信息记录被清除的方法和系统
US9154466B2 (en) * 2013-12-23 2015-10-06 Symantec Corporation Systems and methods for introducing variation in sub-system output signals to prevent device fingerprinting
KR102201738B1 (ko) * 2014-02-05 2021-01-12 엘지전자 주식회사 디스플레이 디바이스 및 그 제어 방법
CN104331670A (zh) * 2014-10-28 2015-02-04 小米科技有限责任公司 私密内容保护方法及装置
CN104573550A (zh) * 2014-12-27 2015-04-29 小米科技有限责任公司 数据保护方法和装置
EP4080387A1 (en) * 2015-03-31 2022-10-26 Huawei Technologies Co., Ltd. Mobile terminal privacy protection method, protection apparatus, and mobile terminal
EP3089064A1 (en) * 2015-04-08 2016-11-02 LG Electronics Inc. Mobile terminal and method for controlling the same
CN105574366A (zh) * 2015-05-28 2016-05-11 宇龙计算机通信科技(深圳)有限公司 一种应用程序的数据保护方法、装置及终端
CN104933342B (zh) * 2015-06-18 2018-01-23 广东欧珀移动通信有限公司 一种图片查看方法及移动终端
CN105243311B (zh) * 2015-10-19 2017-02-22 广东欧珀移动通信有限公司 一种指纹信息的安全调用方法、装置及移动终端
US10404697B1 (en) 2015-12-28 2019-09-03 Symantec Corporation Systems and methods for using vehicles as information sources for knowledge-based authentication
US10326733B2 (en) 2015-12-30 2019-06-18 Symantec Corporation Systems and methods for facilitating single sign-on for multiple devices
CN105677406A (zh) * 2015-12-31 2016-06-15 小米科技有限责任公司 应用操作方法及装置
CN105827622A (zh) * 2016-04-25 2016-08-03 乐视控股(北京)有限公司 一种保护用户信息的方法及装置
US10375114B1 (en) 2016-06-27 2019-08-06 Symantec Corporation Systems and methods for enforcing access-control policies
US10462184B1 (en) 2016-06-28 2019-10-29 Symantec Corporation Systems and methods for enforcing access-control policies in an arbitrary physical space
CN107632775A (zh) * 2016-07-19 2018-01-26 中兴通讯股份有限公司 一种用户空间之间的信息共享方法、装置及终端
CN106326768B (zh) * 2016-08-23 2019-05-07 Oppo广东移动通信有限公司 一种信息管理方法、装置及智能终端
US10469457B1 (en) 2016-09-26 2019-11-05 Symantec Corporation Systems and methods for securely sharing cloud-service credentials within a network of computing devices
WO2018094567A1 (zh) * 2016-11-22 2018-05-31 深圳市汇顶科技股份有限公司 输入方法和终端设备
US10812981B1 (en) 2017-03-22 2020-10-20 NortonLifeLock, Inc. Systems and methods for certifying geolocation coordinates of computing devices
JP6947004B2 (ja) * 2017-12-20 2021-10-13 トヨタ自動車株式会社 車載音声出力装置、音声出力装置、音声出力方法、及び音声出力プログラム
US10594848B2 (en) * 2018-03-14 2020-03-17 Qualcomm Incorporated Systems and methods of initiating a communication at a mobile device
CN112771487A (zh) * 2018-11-02 2021-05-07 深圳市欢太科技有限公司 应用控制方法、计算机可读存储介质和电子设备
US11599717B2 (en) * 2020-03-20 2023-03-07 Capital One Services, Llc Separately collecting and storing form contents
CN112346888A (zh) * 2020-11-04 2021-02-09 网易(杭州)网络有限公司 一种基于软件应用的数据通讯方法、装置以及服务端设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090235068A1 (en) * 2008-03-13 2009-09-17 Fujitsu Limited Method and Apparatus for Identity Verification
CN101557428A (zh) * 2008-04-08 2009-10-14 中兴通讯股份有限公司 一种数据卡
CN101827148A (zh) * 2010-05-18 2010-09-08 深圳桑菲消费通信有限公司 一种应用于手机的指纹识别系统及其运行方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8046588B2 (en) * 2006-02-23 2011-10-25 Rockwell Automation Technologies, Inc. Audit trail in a programmable safety instrumented system via biometric signature(s)
TW200811725A (en) * 2006-08-31 2008-03-01 Inventec Corp Portable terminal apparatus
KR101549557B1 (ko) * 2009-03-10 2015-09-03 엘지전자 주식회사 휴대 단말기 및 그 제어방법

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090235068A1 (en) * 2008-03-13 2009-09-17 Fujitsu Limited Method and Apparatus for Identity Verification
CN101557428A (zh) * 2008-04-08 2009-10-14 中兴通讯股份有限公司 一种数据卡
CN101827148A (zh) * 2010-05-18 2010-09-08 深圳桑菲消费通信有限公司 一种应用于手机的指纹识别系统及其运行方法

Also Published As

Publication number Publication date
CN102467462B (zh) 2015-03-11
KR20130088171A (ko) 2013-08-07
US20130318625A1 (en) 2013-11-28
CN102467462A (zh) 2012-05-23

Similar Documents

Publication Publication Date Title
WO2012065557A1 (zh) 保护设备中存储的数据的方法和相应的设备
WO2013159725A1 (zh) 访问应用程序的方法及装置
WO2017143879A1 (zh) 文件的权限管理方法及装置
US20070294529A1 (en) Method and apparatus for data protection for mobile devices
WO2017107421A1 (zh) 支付方法和装置
RU2636686C2 (ru) Способ и устройство для отправки информации в голосовой службе
EP3176719B1 (en) Methods and devices for acquiring certification document
CN103914520B (zh) 数据查询方法、终端设备和服务器
TW201346615A (zh) 資訊保密系統及資訊保密方法
CN107767133B (zh) 虚拟卡片的开卡方法、装置及系统、存储介质
WO2020248602A1 (zh) 基于区块链的关系绑定方法、装置及设备
US20150047019A1 (en) Information processing method and electronic device
KR102071530B1 (ko) 디나이얼 발생시 대응 메뉴얼을 제안하는 전자 장치 및 방법
US11017109B1 (en) Dynamic sandboxing of user data
CN109801065A (zh) 虚拟卡片的开卡方法、装置及系统、存储介质
CN110263515B (zh) 一种加密应用的打开方法及终端设备
CN110727941A (zh) 一种隐私数据保护方法、装置、终端设备及存储介质
US20210397751A1 (en) Software initiated camera and microphone indicator
CN107239236A (zh) 数据写入方法及装置
US20230016349A1 (en) Screen Recording from a Remote Device
US10528709B1 (en) Notifying applications of screen recording
CN106778296A (zh) 一种访问对象的访问方法、装置及终端
WO2019095449A1 (zh) 一种防止个人信息泄露的方法和装置
WO2017197976A1 (zh) 隐藏/显示应用程序的方法及终端设备
CN111125742A (zh) 文件管理方法、智能终端以及具有存储功能的装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11842259

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20137015447

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 13885954

Country of ref document: US

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (FORM 1205A) DATED 09.09.13

122 Ep: pct application non-entry in european phase

Ref document number: 11842259

Country of ref document: EP

Kind code of ref document: A1