WO2016177201A1 - 一种控制隐私数据的方法、终端及穿戴设备 - Google Patents

一种控制隐私数据的方法、终端及穿戴设备 Download PDF

Info

Publication number
WO2016177201A1
WO2016177201A1 PCT/CN2016/077715 CN2016077715W WO2016177201A1 WO 2016177201 A1 WO2016177201 A1 WO 2016177201A1 CN 2016077715 W CN2016077715 W CN 2016077715W WO 2016177201 A1 WO2016177201 A1 WO 2016177201A1
Authority
WO
WIPO (PCT)
Prior art keywords
wearable device
terminal
specified
instruction
designated
Prior art date
Application number
PCT/CN2016/077715
Other languages
English (en)
French (fr)
Inventor
张庆立
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016177201A1 publication Critical patent/WO2016177201A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • This paper relates to the field of communications, and in particular to a method, terminal and wearable device for controlling private data.
  • the password protection method will first bring inconvenience in use. For example, the frequently viewed photos or the applications used must be entered with a password to affect the user experience. Once the password is unlocked, the mobile phone will be leaked by others. Your own privacy.
  • Embodiments of the present invention provide a method, a terminal, and a wearable device for controlling privacy data, so as to enhance protection of terminal privacy data.
  • the embodiment of the invention provides a method for controlling privacy data, including:
  • the terminal communicates with the designated wearable device, detects a signal strength of the designated wearable device, or receives an instruction of the designated wearable device;
  • the terminal displays or hides the specified privacy data according to the signal strength, including:
  • the terminal detects that the signal strength exceeds a first threshold, unlocking the specified privacy data in the specified application
  • the terminal detects that the signal strength is lower than a second threshold, the specified implicit in the specified application Private data is locked.
  • the foregoing method further has the following feature: the displaying or hiding the specified privacy data according to the instruction, including:
  • the terminal parses the instruction, if the instruction is an unlocking instruction, unlocking the specified private data in the specified application; if the instruction is a locking instruction, locking the specified private data in the specified application.
  • the foregoing method further has the following feature: before the terminal detects the signal strength of the designated wearable device or receives the instruction of the designated wearable device, the method further includes:
  • the terminal establishes a pairing relationship with the designated wearable device.
  • the foregoing method further has the following features:
  • the embodiment of the invention further provides a terminal, which includes:
  • a communication module configured to communicate with a designated wearable device
  • control module configured to detect a signal strength of the designated wearable device or receive an instruction of the designated wearable device
  • the application processing module is configured to display or hide the specified privacy data according to the signal strength or the instruction.
  • the foregoing terminal further has the following features:
  • the application processing module displays or hides the specified privacy data according to the signal strength, including: if detecting that the signal strength exceeds the first threshold, unlocking the specified privacy data in the specified application; if the signal is detected If the strength is lower than the second threshold, the specified private data within the specified application is locked.
  • the foregoing terminal further has the following features:
  • the processing module displays or hides the specified privacy data according to the instruction, including: parsing the instruction, and if the instruction is an unlocking instruction, unlocking the specified private data in the specified application;
  • the lock instruction locks the specified private data within the specified application.
  • the foregoing terminal further has the following features:
  • Setting a module, configured to establish a pairing relationship with the designated wearable device.
  • the foregoing terminal further has the following features:
  • the embodiment of the invention further provides a method for controlling privacy data, including:
  • the wearable device communicates with the designated terminal
  • the wearable device periodically sends an advertisement message carrying the transmission power information, or sends a lock instruction or an unlock instruction to the designated terminal.
  • the method further has the following feature: after the wearable device communicates with the designated terminal, the method further includes:
  • the wearable device establishes a pairing relationship with the designated terminal.
  • the manner in which the wearable device communicates with the designated terminal includes any one of the following:
  • the embodiment of the invention further provides a wearable device, which comprises:
  • the first communication module is configured to communicate with the designated terminal
  • the second communication module is configured to periodically send an advertisement message carrying the transmission power information, or send a lock instruction or an unlock instruction to the designated terminal.
  • the wearable device further has the following features: further comprising:
  • Setting a module, configured to establish a pairing relationship with the designated terminal.
  • the embodiments of the present invention provide a method, a terminal, and a wearable device for controlling privacy data, which can enhance protection of terminal privacy data.
  • FIG. 1 is a schematic diagram of a terminal according to an embodiment of the present invention.
  • FIG. 2 is a schematic diagram of a wearable device according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of a method for controlling privacy data according to an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of interaction between a terminal and a wearable device according to an embodiment of the present invention.
  • Wearable devices are becoming more and more popular, such as smart watches. Wearable devices are generally private items and are not used for others. Control of privacy information for terminals (such as mobile phones) can be achieved through wearable devices.
  • the embodiment of the invention implements the protection of the privacy content in the mobile phone by using the wearable device.
  • the device of the embodiment of the invention comprises a terminal and a wearable device.
  • the terminal in this embodiment includes: a communication module, a control module, an application processing module, and a setting module. among them,
  • the communication module is configured to be responsible for communication between the terminal and the corresponding wearable device.
  • BLE Low Power Bluetooth
  • BLE Low Power Bluetooth
  • control module configured to detect a signal strength of the designated wearable device or receive instruction information of the designated wearable device, and then send a command to the application processing module.
  • the application processing module is configured to display or hide the specified privacy data according to the signal strength or the instruction information sent by the control module.
  • the setting module is set to establish the pairing of the wearable device and the terminal, and the private password can be used to unlock the private information when the wearable device is not around.
  • the communication module can be any kind of short-range communication means, and the low-power Bluetooth (BLE) is taken as an example for description.
  • BLE low-power Bluetooth
  • the wearable device of the embodiment of the present invention needs to support communication with a mobile phone (for example, BLE), and has a certain input mode (key, touch, tap, etc.) to receive the user's instruction and send it to the terminal through a corresponding communication method.
  • a mobile phone for example, BLE
  • a certain input mode key, touch, tap, etc.
  • the wearable device of this embodiment includes:
  • the first communication module is configured to communicate with the corresponding terminal
  • the second communication module is configured to periodically send an advertisement message carrying the transmission power information, or send a lock instruction or an unlock instruction to the designated terminal.
  • Setting a module, configured to establish a pairing relationship with the designated terminal.
  • the user Before using the method of the embodiment of the present invention, the user first needs to ensure that the terminal and the wearable device have been turned on, and the corresponding communication switch has also been turned on.
  • Step 101 When the user uses the terminal and the wearable device provided by the embodiment of the present invention for the first time, the terminal establishes a pairing relationship with the wearable device, so that the wearable device is used as the control device for the mobile phone privacy data (this process can be protected by using a traditional password, and subsequent Unbind and re-bind new devices if needed.)
  • Step 102 The user sets a corresponding privacy item through the terminal, and the setting process can be protected by a traditional password or by the following method.
  • Step 103.1 When the wearable device approaches the terminal or the wearable device receives the input of the user to send an unlock command, the terminal detects the signal strength of the wearable device or receives an instruction sent by the wearable device.
  • Step 104.1 When the terminal detects that the signal strength exceeds the set first threshold or the received command is unlocked, the terminal displays or hides the privacy data in the specified application.
  • Step 103.2 When the wearable device is away from the terminal or the wearable device receives the input and send lock command of the user, the terminal detects the signal strength of the wearable device or receives an instruction sent by the wearable device.
  • Step 104.2 The terminal detects that the signal strength is lower than the set second threshold or the received command is locked, and then displays or hides the privacy data in the specified application.
  • the way to hide private data includes not displaying it in the list, displaying it in the list but hiding the actual content, directly hiding related applications.
  • This embodiment provides a method for controlling private data. As shown in FIG. 3, the method in this embodiment includes:
  • Step 301 The terminal communicates with the designated wearable device, detects a signal strength of the designated wearable device, or receives an instruction of the designated wearable device.
  • Step 302 Display or hide the specified privacy data according to the signal strength or the instruction.
  • the communication means used between the terminal and the wearable device in step 301 can be any short-distance communication means, and the low-power Bluetooth (BLE) is taken as an example for description. It should be noted that the steps here are all carried out under the premise of establishing a pairing relationship between the wearable device and the mobile phone device.
  • BLE low-power Bluetooth
  • step 301 includes two methods:
  • the wearable device transmits an advertisement through a BLE at a certain time interval, wherein the advertisement may include power information when the signal is transmitted, and the terminal may parse the transmit power information contained in the signal after receiving the Advertisement information, and according to the received
  • the signal strength (RSSI) calculates the approximate distance between the handset device and the wearable device.
  • the wearable device sends a command to the mobile phone device by means of Notification, and the mobile phone device analyzes the received message and obtains the parsed content.
  • Step 302 corresponds to step 301, and there are two methods for processing:
  • the terminal compares the calculated distance between the terminal and the wearable device with the set threshold max (maximum value) and min (minimum value), and if the distance changes from greater than min to less than min, the proximity event is triggered.
  • the notification application module unlocks the private data; if the distance becomes less than max from greater than max, the remote event is triggered, and the application module is notified to lock the private data.
  • the terminal processes the received instruction information, and if it is a lock command, notifies the application processing module to lock the private data; if it is an unlock command, notifies the application processing module to unlock the private data.
  • the privacy data includes, but is not limited to, privacy photos, privacy messages, privacy contacts, privacy applications, and the like.
  • the wearable device periodically sends the advertisement information, where the power information (txpower) of the signal sent by the wearable device is included, and the communication module of the mobile device receives the advertisement.
  • the information is parsed, and the distance information is calculated by using RSSI and txpower, and the distance information is sent to the mobile device device control module for processing.
  • This mode is called automatic mode. If the user operates the setting module of the mobile device to open the manual mode, the communication module of the mobile device sends a request opening notification mode to the wearing device, in which the wearing device can receive the user's input and communicate the corresponding command to the mobile phone. Device.
  • the wearable device sends a corresponding instruction to the mobile phone device, and the communication module parses the command and hands it to the control module for processing, and then returns to the wearable device confirmation information.
  • the mobile phone device can be designed to ignore the Advertisement information sent by the wearable device, that is, the lock data is not locked and unlocked by calculating the distance until the user sends an instruction to unlock the private data through the wearable device.
  • the control module of the mobile phone device sends a notification event according to the information of the communication module, and the information included in the notification event is a lock or unlock command.
  • the notification mode may be a broadcast mode (can be understood as a design)
  • the observer mode in the mode each application chooses whether to handle the event notification.
  • the application processing module After the application processing module receives the broadcast, it can determine whether to process the broadcast according to the settings of the application itself and the data within the application. If the application needs to process the broadcast, the user set the privacy data to be hidden when the lock command is received. For example, the gallery application can hide the user's privacy picture, and the SMS application can hide the user's privacy message.
  • the mobile phone itself can hide the application icon marked as a privacy application by the user; correspondingly, when the unlock command is received, the previously hidden private data is redisplayed, for example, the gallery application displays all the pictures normally, and the short message application displays all SMS, the phone itself can also display all installed apps and so on. Users can set appropriate privacy data for each application to achieve good control.
  • the communication method of the mobile phone device and the wearable device can also use the currently common WiFi and NFC (Near Field Communication Technology) technology.
  • control module can send corresponding broadcast commands to each application.
  • Any application that stores private data can choose to process the broadcast, and then display or hide the private data, especially as a mobile phone device. It can directly implement the hiding and display of one or more applications when processing this command.
  • the method of the embodiment of the invention solves the privacy problem of the user's mobile phone in a more flexible manner.
  • the inconvenience of using privacy data encryption to the user can be reduced, and the security of the privacy data can still be guaranteed.
  • all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • each device/function module/functional unit in the above embodiment When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种控制隐私数据的方法、终端及穿戴设备,该方法包括:终端与指定穿戴设备进行通讯,检测所述指定穿戴设备的信号强度或接收所述指定穿戴设备的指令;根据所述信号强度或所述指令对指定隐私数据进行显示或隐藏处理。通过本发明实施例可以加强对终端隐私数据的保护。

Description

一种控制隐私数据的方法、终端及穿戴设备 技术领域
本文涉及通信领域,特别是涉及一种控制隐私数据的方法、终端及穿戴设备。
背景技术
关于手机的隐私保护问题,相关的技术方案普遍是通过密码进行保护。通过输入正确的密码可以访问已经隐藏起来的隐私数据。
密码保护的方式首先会带来使用上的不便,比如经常查看的照片或者使用的应用都要输入密码才能使用,非常影响用户体验;一旦输入密码解锁之后,手机再被别人拿着使用还是会泄漏自己的隐私。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例提供一种控制隐私数据的方法、终端及穿戴设备,以加强对终端隐私数据的保护。
本发明实施例提供了一种控制隐私数据的方法,包括:
终端与指定穿戴设备进行通讯,检测所述指定穿戴设备的信号强度或接收所述指定穿戴设备的指令;
根据所述信号强度或所述指令对指定隐私数据进行显示或隐藏处理。
可选地,上述方法还具有下面特点:所述终端根据所述信号强度对指定隐私数据进行显示或隐藏,包括:
若所述终端检测所述信号强度超过第一阈值,则对指定应用内的指定隐私数据进行解锁;
若所述终端检测所述信号强度低于第二阈值,则对指定应用内的指定隐 私数据进行锁定。
可选地,上述方法还具有下面特点:所述根据所述指令对指定隐私数据进行显示或隐藏,包括:
所述终端解析所述指令,若所述指令为解锁指令,则对指定应用内的指定隐私数据进行解锁;若所述指令为锁定指令,则对指定应用内的指定隐私数据进行锁定。
可选地,上述方法还具有下面特点:所述终端检测指定穿戴设备的信号强度或接收所述指定穿戴设备的指令之前,还包括:
所述终端与所述指定穿戴设备建立配对关系。
可选地,上述方法还具有下面特点:还包括:
将指定应用中的指定数据设置为隐私数据。
本发明实施例还提供了一种终端,其中,包括:
通讯模块,设置为与指定穿戴设备进行通讯;
控制模块,设置为检测所述指定穿戴设备的信号强度或接收所述指定穿戴设备的指令;
应用处理模块,设置为根据所述信号强度或所述指令对指定隐私数据进行显示或隐藏处理。
可选地,上述终端还具有下面特点:
所述应用处理模块,根据所述信号强度对指定隐私数据进行显示或隐藏,包括:若检测所述信号强度超过第一阈值,则对指定应用内的指定隐私数据进行解锁;若检测所述信号强度低于第二阈值,则对指定应用内的指定隐私数据进行锁定。
可选地,上述终端还具有下面特点:
所述处理模块,根据所述指令对指定隐私数据进行显示或隐藏,包括:解析所述指令,若所述指令为解锁指令,则对指定应用内的指定隐私数据进行解锁;若所述指令为锁定指令,则对指定应用内的指定隐私数据进行锁定。
可选地,上述终端还具有下面特点:还包括:
设置模块,设置为与所述指定穿戴设备建立配对关系。
可选地,上述终端还具有下面特点:还包括:
设置模块,设置为将指定应用模块中的指定数据设置为隐私数据。
本发明实施例还提供了一种控制隐私数据的方法,包括:
穿戴设备与指定终端进行通讯;
所述穿戴设备定时发送携带发射功率信息的广告消息,或者向所述指定终端发送锁定指令或解锁指令。
可选地,上述方法还具有下面特点:所述穿戴设备与指定终端进行通讯后,还包括:
所述穿戴设备与所述指定终端建立配对关系。
可选地,上述方法还具有下面特点:所述穿戴设备与指定终端进行通讯的方式包括以下的任一种:
低功耗蓝牙、WiFi和近距离无线通讯技术。
本发明实施例还提供了一种穿戴设备,其中,包括:
第一通讯模块,设置为与指定终端进行通讯;
第二通讯模块,设置为定时发送携带发射功率信息的广告消息,或者向所述指定终端发送锁定指令或解锁指令。
可选地,上述穿戴设备还具有下面特点:还包括:
设置模块,设置为与所述指定终端建立配对关系。
综上,本发明实施例提供一种控制隐私数据的方法、终端及穿戴设备,可以加强对终端隐私数据的保护。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1为本发明实施例的终端的示意图;
图2为本发明实施例的穿戴设备的示意图;
图3为本发明实施例的一种控制隐私数据的方法的流程图;
图4为本发明实施例的终端与穿戴设备交互的示意流程图。
本发明的较佳实施方式
下文中将结合附图对本发明的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。
目前可穿戴设备越来越普及,例如智能腕表。可穿戴设备一般属于私人用品而不会借给别人使用,可以通过可穿戴设备来实现对于终端(例如手机)隐私信息的控制。本发明实施例就是利用穿戴设备实现对于手机中隐私内容的保护。
本发明实施例的装置包括终端和穿戴设备。
如图1所示,本实施例的终端包括:通讯模块、控制模块,应用处理模块以及设置模块。其中,
通讯模块,设置为负责终端与对应的穿戴设备进行通讯,目前一般使用BLE(低功耗蓝牙)作为通讯手段。
控制模块,设置为检测指定穿戴设备的信号强度或接收所述指定穿戴设备的指令信息,然后给应用处理模块发送命令。
应用处理模块,设置为根据控制模块发来的所述信号强度或所述指令信息对指定隐私数据进行显示或隐藏处理。
设置模块,设置为建立穿戴设备与终端的配对,同时可以在穿戴设备不在身边时使用传统密码方式解锁隐私信息。
其中,通讯模块可以是任何一种近距离通讯手段,这里以低功耗蓝牙(BLE)为例来进行说明。
本发明实施例的穿戴设备需要支持与手机进行通讯(例如BLE),并且有一定的输入方式(按键,触摸,敲击等)来接收用户的指令并通过相应的通讯方式发送给终端。
图2为本发明实施例的穿戴设备的示意图,如图2所示,本实施例的穿戴设备包括:
第一通讯模块,设置为与对应的终端进行通讯;
第二通讯模块,设置为定时发送携带发射功率信息的广告消息,或者向所述指定终端发送锁定指令或解锁指令。
设置模块,设置为与所述指定终端建立配对关系。
用户在使用本发明实施例的方法之前,首先要确保终端与穿戴设备已经打开,并且相应的通讯开关也已打开。
后续的使用具体包括如下步骤:
步骤101:用户在首次使用本发明实施例提供的终端和穿戴设备时,通过终端与穿戴设备建立配对关系,以便使用穿戴设备作为手机隐私数据的控制设备(这个过程可以使用传统密码进行保护,后续如果有需要可以解绑和重新绑定新的设备)。
步骤102:用户通过终端设置相应的隐私项目,这个设置过程可以由传统密码保护或者由下述的方法进行保护。
步骤103.1:在穿戴设备靠近终端或者穿戴设备接收用户的输入发送解锁命令时,终端检测此穿戴设备的信号强度或者接收穿戴设备发送的指令。
步骤104.1:终端检测到信号强度超过设定的第一阈值或者接收到的指令为解锁,则对指定应用内的隐私数据进行显示或者隐藏操作。
步骤103.2:在穿戴设备远离终端或者穿戴设备接收用户的输入发送锁定命令时,终端检测此穿戴设备的信号强度或者接收穿戴设备发送的指令。
步骤104.2:终端检测到信号强度低于设定的第二阈值或者接收到的指令为锁定,则对指定应用内的隐私数据进行显示或者隐藏操作。
隐私数据的隐藏方式包括在列表中不予显示,在列表中显示但是隐藏实际内容,直接隐藏相关应用等方式。
终端侧实施例
本实施例提供了一种控制隐私数据的方法,如图3所示,本实施例的方法包括:
步骤301:终端与指定穿戴设备进行通讯,检测所述指定穿戴设备的信号强度或接收所述指定穿戴设备的指令;
步骤302:根据所述信号强度或所述指令对指定隐私数据进行显示或隐藏处理。
步骤301中终端与穿戴设备之间使用的通讯手段,可以是任何一种近距离通讯手段,这里以低功耗蓝牙(BLE)为例来进行说明。需要说明的是,这里的步骤都是需要在建立好可穿戴设备与手机装置的配对关系的前提下进行的。
本实施例中,步骤301包括两种方法:
(1)穿戴设备通过BLE按照一定的时间间隔发射Advertisement(广告),其中Advertisement中可以包含信号发射时的功率信息,终端接收到Advertisement信息后可以解析其中包含的发射功率信息,并根据接收到的信号强度(RSSI)计算出手机装置与穿戴设备之间大概的距离。
(2)穿戴设备以Notification(通知)的方式给手机装置发送指令,手机装置接收到指令后进行解析,并获得解析的内容。
步骤302与步骤301对应,有两种方法来进行处理:
(1)终端将计算出的终端与穿戴设备之间的距离和设置的阈值max(最大值)和min(最小值)进行比对,如果距离从大于min变成了小于min,则触发靠近事件,通知应用模块解锁隐私数据;如果距离从小于max变成了大于max,则触发远离事件,通知应用模块锁定隐私数据。
(2)终端将接收到的指令信息进行处理,如果是锁定命令则通知应用处理模块锁定隐私数据;如果是解锁命令则通知应用处理模块解锁隐私数据。
所述隐私数据包括但不限于隐私照片,隐私短信,隐私联系人,隐私应用等。
本实施例中,穿戴设备定时发送Advertisement信息,其中包含有穿戴设备发送信号的功率信息(txpower),手机装置的通讯模块接收Advertisement 信息并进行解析,利用RSSI和txpower来计算距离信息,并将距离信息发送给手机装置控制模块处理,我们将此方式称之为自动模式。如果用户操作手机装置的设置模块打开了手动模式,则手机装置的通讯模块会给穿戴设备发送请求打开通知模式,在这种模式下,穿戴设备可以接收用户的输入并将相应的命令传达给手机装置。
如图4所示,例如用户操作穿戴设备要求锁定隐私数据,则穿戴设备会发送相应的指令给手机装置,通讯模块解析命令并交给控制模块处理,然后返回给穿戴设备确认信息。需要注意的是,在这个过程中手机装置可以设计为忽略掉穿戴设备发送的Advertisement信息,也就是不通过计算距离来实现隐私数据的锁定和解锁,直到用户通过穿戴设备发送指令解锁隐私数据。
本实施例中,例如,手机装置的控制模块根据通讯模块的信息来发送通知事件,通知事件中包含的信息是锁定或者解锁命令,一般来说,通知方式可以采用广播的方式(可以理解为设计模式中的观察者模式),由各个应用自己选择是否对事件通知进行处理。应用处理模块接收到广播之后,可以根据应用本身的设置以及应用内的数据来确定是否要处理这个广播。如果应用需要处理这个广播,在收到锁定命令的时候,将用户设置为隐私的数据隐藏起来,例如图库应用可以将用户设置为隐私的图片隐藏起来,短信应用可以将用户标记为隐私的短信隐藏起来,手机本身可以将用户标记为隐私应用的应用图标隐藏起来;相应的,在收到解锁命令的时候,将之前隐藏的隐私数据重新显示出来,例如图库应用正常显示所有图片,短信应用显示所有短信,手机本身也可以显示所有已安装的应用等。用户可以针对每一个应用设置相应的隐私数据,从而实现良好的控制。
手机装置与穿戴设备的通讯方式除了使用BLE以外,也可以使用目前常见的WiFi和NFC(近距离无线通讯技术)技术。
基于应用的隐私保护技术,可以由控制模块发送相应的广播命令给各个应用,凡是存有隐私数据的应用都可以选择对这个广播进行处理,然后对隐私数据实现显示或者隐藏,尤其,作为手机装置本身可以在处理这个命令时直接实现一个或者多个应用的隐藏和显示。
本发明实施例的方法通过一种更灵活的方式解决用户手机的隐私问题, 可以减少因为隐私数据加密给用户带来的使用上的不便,隐私数据的安全性仍然可以保证。
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。
上述实施例中的各装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。
上述实施例中的各装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。
工业实用性
上述技术方案加强对终端隐私数据的保护。

Claims (17)

  1. 一种控制隐私数据的方法,包括:
    终端与指定穿戴设备进行通讯,检测所述指定穿戴设备的信号强度或接收所述指定穿戴设备的指令;
    根据所述信号强度或所述指令对指定隐私数据进行显示或隐藏处理。
  2. 如权利要求1所述的方法,其中:所述终端根据所述信号强度对指定隐私数据进行显示或隐藏,包括:
    若所述终端检测所述信号强度超过第一阈值,则对指定应用内的指定隐私数据进行解锁;
    若所述终端检测所述信号强度低于第二阈值,则对指定应用内的指定隐私数据进行锁定。
  3. 如权利要求1所述的方法,其中:所述根据所述指令对指定隐私数据进行显示或隐藏,包括:
    所述终端解析所述指令,若所述指令为解锁指令,则对指定应用内的指定隐私数据进行解锁;若所述指令为锁定指令,则对指定应用内的指定隐私数据进行锁定。
  4. 如权利要求1所述的方法,所述终端检测指定穿戴设备的信号强度或接收所述指定穿戴设备的指令之前,还包括:
    所述终端与所述指定穿戴设备建立配对关系。
  5. 如权利要求1-4任一项所述的方法,还包括:
    将指定应用中的指定数据设置为隐私数据。
  6. 一种终端,包括:
    通讯模块,设置为与指定穿戴设备进行通讯;
    控制模块,设置为检测所述指定穿戴设备的信号强度或接收所述指定穿戴设备的指令;
    应用处理模块,设置为根据所述信号强度或所述指令对指定隐私数据进行显示或隐藏处理。
  7. 如权利要求6所述的终端,其中:
    所述应用处理模块是设置为通过如下方式实现根据所述信号强度对指定隐私数据进行显示或隐藏:若检测所述信号强度超过第一阈值,则对指定应用内的指定隐私数据进行解锁;若检测所述信号强度低于第二阈值,则对指定应用内的指定隐私数据进行锁定。
  8. 如权利要求6所述的终端,其中:
    所述处理模块是设置为通过如下方式实现根据所述指令对指定隐私数据进行显示或隐藏:解析所述指令,若所述指令为解锁指令,则对指定应用内的指定隐私数据进行解锁;若所述指令为锁定指令,则对指定应用内的指定隐私数据进行锁定。
  9. 如权利要求6所述的终端,还包括:
    设置模块,设置为与所述指定穿戴设备建立配对关系。
  10. 如权利要求6-9任一项所述的终端,还包括:
    设置模块,设置为将指定应用模块中的指定数据设置为隐私数据。
  11. 一种控制隐私数据的方法,包括:
    穿戴设备与指定终端进行通讯;
    所述穿戴设备定时发送携带发射功率信息的广告消息,或者向所述指定终端发送锁定指令或解锁指令。
  12. 如权利要求11所述的方法,所述穿戴设备与指定终端进行通讯后,还包括:
    所述穿戴设备与所述指定终端建立配对关系。
  13. 如权利要求11或12所述的方法,其中:所述穿戴设备与指定终端进行通讯的方式包括以下的任一种:
    低功耗蓝牙、无线保真WiFi和近距离无线通讯技术。
  14. 一种穿戴设备,包括:
    第一通讯模块,设置为与指定终端进行通讯;
    第二通讯模块,设置为定时发送携带发射功率信息的广告消息,或者向 所述指定终端发送锁定指令或解锁指令。
  15. 如权利要求14所述的穿戴设备,还包括:
    设置模块,设置为与所述指定终端建立配对关系。
  16. 一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现权利要求1-5任一项所述的方法。
  17. 一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现权利要求11-13中任一项所述的方法。
PCT/CN2016/077715 2015-10-20 2016-03-29 一种控制隐私数据的方法、终端及穿戴设备 WO2016177201A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510685386.9 2015-10-20
CN201510685386.9A CN106603805A (zh) 2015-10-20 2015-10-20 一种控制隐私数据的方法、终端及穿戴设备

Publications (1)

Publication Number Publication Date
WO2016177201A1 true WO2016177201A1 (zh) 2016-11-10

Family

ID=57217464

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/077715 WO2016177201A1 (zh) 2015-10-20 2016-03-29 一种控制隐私数据的方法、终端及穿戴设备

Country Status (2)

Country Link
CN (1) CN106603805A (zh)
WO (1) WO2016177201A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135468A (zh) * 2017-04-27 2017-09-05 上海斐讯数据通信技术有限公司 一种基于可穿戴设备的移动终端通知方法和系统
CN108259661A (zh) * 2017-12-27 2018-07-06 北京海杭通讯科技有限公司 基于蓝牙连接的隐私信息保护方法及移动终端
CN113301403B (zh) * 2021-05-25 2022-12-09 惠州Tcl移动通信有限公司 基于穿戴设备的媒体播放控制方法、装置、设备及介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243165A (zh) * 2014-08-28 2014-12-24 电子科技大学 基于智能手环的智能移动终端隐私保护系统和方法
CN104318170A (zh) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 一种基于多移动终端保护数据安全的方法及装置
CN104318177A (zh) * 2014-10-29 2015-01-28 小米科技有限责任公司 终端设备中数据的保护方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243165A (zh) * 2014-08-28 2014-12-24 电子科技大学 基于智能手环的智能移动终端隐私保护系统和方法
CN104318170A (zh) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 一种基于多移动终端保护数据安全的方法及装置
CN104318177A (zh) * 2014-10-29 2015-01-28 小米科技有限责任公司 终端设备中数据的保护方法及装置

Also Published As

Publication number Publication date
CN106603805A (zh) 2017-04-26

Similar Documents

Publication Publication Date Title
US11751053B2 (en) Method and mobile terminal for controlling screen lock
US10643000B2 (en) Access control method and terminal device
EP3242195B1 (en) Control implementation method and apparatus for intelligent hardware device
JP6017737B1 (ja) 低電力近距離無線通信認証
US10257204B2 (en) Information processing method and electronic apparatus
CN108156537B (zh) 一种移动终端的远程操作方法及移动终端
EP3247144B1 (en) Method and apparatus for accessing base station
US9088982B2 (en) Beacon frame data transmission rate adjustment
WO2016177201A1 (zh) 一种控制隐私数据的方法、终端及穿戴设备
EP3135065B1 (en) Adaptive transmit power adjustment for phone in hand detection using wearable device
US9002323B2 (en) SIM card authentication system and method
KR101826939B1 (ko) 보안 처리를 위한 통신 단말장치
KR20210000869A (ko) 스마트폰의 불사용 시간에 기초하여 상기 스마트폰의 사용을 제한하는 방법과 상기 방법을 수행할 수 있는 컴퓨터 프로그램
WO2014191040A1 (en) Unlocking an electronic device
KR20110093295A (ko) 휴대단말기에서 vNote를 적응적으로 사용하는 방법 및 장치
KR20180058141A (ko) 분실 스마트폰 위치 알림 시스템
KR20180020770A (ko) 도어록 시스템 및 도어록 제어 방법
KR20140060732A (ko) 근거리 통신 기능 제어 방법, 이를 위한 근거리 통신 모듈 및 휴대 단말
JP2009201006A (ja) 移動通信端末制御方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16789195

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16789195

Country of ref document: EP

Kind code of ref document: A1