WO2017004925A1 - Private information protection method, device and system, and computer storage medium - Google Patents

Private information protection method, device and system, and computer storage medium Download PDF

Info

Publication number
WO2017004925A1
WO2017004925A1 PCT/CN2015/095649 CN2015095649W WO2017004925A1 WO 2017004925 A1 WO2017004925 A1 WO 2017004925A1 CN 2015095649 W CN2015095649 W CN 2015095649W WO 2017004925 A1 WO2017004925 A1 WO 2017004925A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
wearable device
private information
information
private
Prior art date
Application number
PCT/CN2015/095649
Other languages
French (fr)
Chinese (zh)
Inventor
孙子文
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017004925A1 publication Critical patent/WO2017004925A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • the present invention relates to information security technologies in the field of communications, and in particular, to a method, device and system for protecting private information, and a computer storage medium.
  • the information security technology of the current terminal is mainly performed by transmitting encrypted information, encrypting the keyboard lock, hiding the encrypted inbox or folder, and setting a private contact by physically partitioning the contacts in the mobile phone address book.
  • these security methods are likely to lead to accidental disclosure of user private information. For example, a user may put a mobile phone aside after entering an instant messaging application, causing it to be viewed by others.
  • the embodiment of the invention provides a method, a device and a system for protecting private information, and a computer storage medium, which can effectively prevent the private information inside the terminal from being leaked due to an accident.
  • an embodiment of the present invention provides a method for protecting private information, where the method is applied to a wearable device that is connected to a terminal device, where the method includes:
  • the wearable device sends encrypted comparison information to the terminal
  • the wearable device detects an encryption status of the terminal private information
  • the wearable device When the terminal private information is in a non-encrypted state, the wearable device sends a control And the control instruction for hiding, by the terminal, the private information.
  • the encrypted comparison information includes: a picture having at least one image feature or a preset password comparison character string.
  • the method further includes: the wearable device receiving the private information sent by the terminal.
  • the method further includes: the wearable device sending the decryption information to the terminal;
  • the decryption information is used by the terminal to compare with the encrypted comparison information, and controls the hidden state of the private information according to the comparison result.
  • the embodiment of the present invention provides a method for protecting private information, where the method is applied to a terminal device that is connected to a wearable device, and the method includes:
  • the terminal When the terminal private information is in a non-encrypted state, the terminal receives a control instruction sent by the wearable device for controlling the terminal to hide the private information, and according to the control instruction Private information is hidden.
  • the encrypted comparison information includes: a picture having at least one image feature or a preset password comparison character string.
  • the method further includes: the terminal sending its own private information to the wearable device.
  • the method further includes:
  • the terminal compares the decrypted information with the encrypted comparison information
  • the hidden state of the private information is converted into a public state.
  • an embodiment of the present invention provides a wearable device, where the wearable device includes: a first sending unit, a first detecting unit, where
  • the first sending unit is configured to send the encrypted comparison information to the terminal
  • the first detecting unit is configured to detect an encryption state of the terminal private information; and trigger the first sending unit when the terminal private information is in an unencrypted state;
  • the first sending unit is further configured to send a control instruction for controlling the terminal to hide the private information.
  • the wearable device further includes a first receiving unit configured to receive the private information sent by the terminal.
  • the first sending unit is further configured to send decryption information to the terminal; wherein the decryption information is used by the terminal to compare with the encrypted comparison information, and the control is performed according to a comparison result.
  • the hidden state of private information is further configured to send decryption information to the terminal; wherein the decryption information is used by the terminal to compare with the encrypted comparison information, and the control is performed according to a comparison result.
  • an embodiment of the present invention provides a terminal, where the terminal includes: a second receiving unit, a second detecting unit, a second sending unit, and a control unit;
  • the second receiving unit is configured to receive the encrypted comparison information sent by the wearable device; and receive the detection instruction sent by the wearable device; wherein the detection instruction is used to indicate that the terminal is to the user The encryption status of the private information is detected and fed back;
  • the second detecting unit is configured to detect an encryption state of the private information of the terminal itself
  • the second sending unit is configured to send an encrypted state of the terminal's own private information to the wearable device
  • the second receiving unit is further configured to receive, by the wearable device, a control instruction for controlling the terminal to hide the private information
  • the control unit is configured to hide its own private information according to the control instruction.
  • the second sending unit is further configured to send the private information of the device to the wearable device.
  • the second receiving unit is further configured to receive decryption information sent by the wearable device
  • the terminal further includes a comparing unit configured to compare the decrypted information with the encrypted comparison information; and triggering the control unit when the decrypted information is consistent with the encrypted comparison information;
  • the control unit is further configured to convert the hidden state of the private information into a public state.
  • an embodiment of the present invention provides a system for protecting private information, where the system includes a wearable device and a terminal, where the terminal and the wearable device complete a pairing connection;
  • the wearable device is configured to send encrypted comparison information to the terminal.
  • the terminal is configured to receive encrypted comparison information sent by the wearable device.
  • an embodiment of the present invention provides a computer storage medium, where the computer storage medium stores executable instructions, where the executable instructions are used to perform the foregoing protection private message. Interest method.
  • the embodiment of the invention provides a method, a device and a system for protecting private information, and a computer storage medium, which can transmit the encrypted comparison information to the terminal through the wearable device and control the hiding or disclosure of the private information in the terminal, thereby effectively avoiding the terminal. Internal private information is leaked due to an accident.
  • FIG. 1 is a schematic flowchart of a method for protecting private information according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of another method for protecting private information according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of a method for protecting private information according to an embodiment of the present disclosure
  • FIG. 4 is a schematic diagram of an encryption comparison information according to an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of decrypting private information hidden and hidden by a terminal by a wearable device according to an embodiment of the present disclosure
  • FIG. 6 is a schematic diagram of decryption information according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a wearable device according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of another wearable device according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of another terminal according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic structural diagram of a system for protecting private information according to an embodiment of the present invention.
  • the method can be applied to the wearable device that is connected to the terminal device, such as a smart watch, smart glasses, etc., and can effectively protect the private information of the terminal.
  • the method can include:
  • S101 The wearable device sends the encrypted comparison information to the terminal.
  • the encryption comparison information may be used as a reference for comparing the received decrypted messages in the subsequent decryption process of the wearable device; in this embodiment, the encrypted comparison information may include a picture with at least one image feature or Set the password comparison string.
  • S102 The wearable device detects an encryption status of the terminal private information.
  • the private information described in this embodiment may include a contact of a relatively sensitive terminal address book/instant messaging software saved by the terminal, and may also include a call record and a message chat record with the contacts; This embodiment does not specifically limit this.
  • the terminal can hide the private information according to the operation of the user. Therefore, when the terminal has hidden the private information, that is, the terminal private information is already in an encrypted state, the wearable The device does not need to hide the private information again.
  • the method may further include: the wearable device receives the private information sent by the terminal; understandably, the wearable device implements the wearable after receiving the private message sent by the terminal.
  • the device synchronizes with the private message of the terminal, so that the private message can be synchronously downloaded to the terminal when necessary, for example, after the terminal is re-flashed or upgraded.
  • the specific process of encrypting and hiding the private message in the terminal by the wearable device is implemented in steps S101 to S103, so that when the user is away from the terminal, the terminal can perform the transmission of the encrypted comparison information and the pair through the wearable device.
  • the hiding of private information in the terminal or The control is publicly disclosed, thereby effectively preventing the private information inside the terminal from being leaked due to an accident.
  • the embodiment may further include a process in which the wearable device decrypts the private information hidden by the terminal encryption, and the process may include:
  • the wearable device sends the decryption information to the terminal; the decrypted information is used by the terminal to compare with the encrypted comparison information, and controls the hidden state of the private information according to the comparison result.
  • the decryption information can be sent to the terminal through the wearable device, so that the terminal compares the decrypted information with the encrypted comparison information; When they are consistent, the terminal converts the hidden state of the private information into a public state.
  • An embodiment of the present invention provides a method for protecting private information of a terminal, which is applied to a wearable device, and sends the encrypted comparison information to the terminal and controls the hiding or disclosure of the private information in the terminal, thereby effectively avoiding the terminal. Internal private information is leaked due to an accident.
  • a flow of a method for protecting private information of a terminal is provided.
  • the method may be applied to a terminal device that is connected to a wearable device, and the terminal device is used.
  • Mobile terminals such as mobile phones, smart phones, notebook computers, digital broadcast receivers, personal digital assistants (PDAs), tablet computers (PADs), portable multimedia players (PMPs), navigation devices, and the like, as well as digital TVs,
  • PDAs personal digital assistants
  • PADs tablet computers
  • PMPs portable multimedia players
  • navigation devices and the like, as well as digital TVs, A fixed terminal for a desktop computer or the like.
  • the method can include:
  • S201 The terminal receives the encrypted comparison information sent by the wearable device.
  • the terminal saves the received encrypted comparison information as a reference for comparing the decrypted messages sent by the wearable device in the decryption process.
  • the encrypted comparison information may include: A picture of an image feature or a preset password comparison string.
  • S202 The terminal receives the detection instruction sent by the wearable device, and sends the encrypted status of the private information to the wearable device.
  • the detection instruction is used to instruct the terminal to detect and feedback the encryption status of the private information of the terminal.
  • the terminal When the terminal private information is in a non-encrypted state, the terminal receives a control instruction sent by the wearable device for controlling the terminal to hide the private information, and hides the private information according to the control instruction;
  • the terminal can also hide the private information according to the operation of the user. Therefore, after the terminal has hidden the private information, that is, the terminal private information is already in the encrypted state. When the wearable device does not need to hide the private information again.
  • the method may further include: the terminal transmitting the private information of the terminal to the wearable device; understandably, after the wearable device receives the private message sent by the terminal, the The wearer synchronizes with the private message of the terminal, so that the private message can be synchronously downloaded to the terminal when necessary, for example, after the terminal is re-flashed or upgraded.
  • the specific process of encrypting and hiding the private message of the terminal by the wearable device is implemented in steps S201 to S203, so that when the user is away from the terminal, the encrypted comparison information is sent to the terminal through the wearable device, and The hidden or public control of the private information in the terminal is controlled, thereby effectively preventing the private information inside the terminal from being leaked due to an accident.
  • the embodiment may further include a process in which the wearable device decrypts the private information hidden by the terminal encryption, and the process may include:
  • the terminal receives the decrypted information sent by the wearable device.
  • the terminal compares the decrypted information with the encrypted comparison information
  • the terminal converts the hidden state of the private information. To be public.
  • the decryption information can be sent to the terminal through the wearable device, so that the terminal compares the decrypted information with the encrypted comparison information; When they are consistent, the terminal converts the hidden state of the private information into a public state; when the two are inconsistent, the terminal continues to keep the hidden state of the private information.
  • An embodiment of the present invention provides a method for protecting private information of a terminal, which is applied to a wearable device, and sends the encrypted comparison information to the terminal and controls the hiding or disclosure of the private information in the terminal, thereby effectively avoiding the terminal. Internal private information is leaked due to an accident.
  • FIG. 3 shows a detailed process of a method for protecting private information of a terminal according to an embodiment of the present invention, which may specifically include:
  • S301 Perform a pairing connection between the terminal and the wearable device.
  • connection between the terminal and the wearable device can be performed by using a wireless device, such as a Bluetooth/Infrared/Fidelity (WIFI) or a wired connection.
  • a wireless device such as a Bluetooth/Infrared/Fidelity (WIFI) or a wired connection.
  • WIFI Bluetooth/Infrared/Fidelity
  • S302 The terminal turns on the hidden function of the private information.
  • the hidden function of the private information can be turned on and off by the terminal accepting the operation of the user.
  • S303 The wearable device sends the encrypted comparison information to the terminal.
  • the encrypted comparison information can be sent to the terminal through the wearable device worn by the user.
  • the encrypted comparison information may be an image having three feature regions, as shown in FIG. 4 . As shown, the dotted line indicates as the encrypted comparison information. The feature area of the image.
  • the wearable device after receiving the private message sent by the terminal, the wearable device synchronizes the private message of the wearable device with the terminal, so that the private message can be synchronously downloaded when necessary, for example, after the terminal is re-flashed or upgraded. Go to the terminal.
  • S305 The wearable device sends a detection instruction to the terminal.
  • the detection instruction is used to instruct the terminal to detect and feedback the encryption status of the private information of the terminal;
  • S306 The terminal detects an encryption status of the private information according to the detection instruction.
  • S307 The terminal sends the encrypted status of the private information to the wearable device.
  • the wearable device does not need to hide the private information again.
  • S309 The terminal hides its own private information according to the control instruction.
  • S501 The wearable device sends the decryption information to the terminal.
  • the encrypted comparison information is the image shown in FIG. 4, therefore, in the present embodiment, the decrypted information is an image as shown in FIG. 6; it can be seen that FIG. 6 and FIG. The dotted line portion between Figure 4 is uniform, while the solid line portions are inconsistent.
  • step S502 The terminal compares the decryption information with the encrypted comparison information; when the two are consistent, step S503 is performed; when the two are inconsistent, step S504 is performed;
  • step S504 is performed.
  • S503 The terminal converts the hidden state of the private information into a public state.
  • S504 The terminal continues to keep the hidden state of the private information.
  • steps S501 to S504 are decryption processes corresponding to the encryption process shown in FIG. 3, and still transmit the decryption information to the terminal through the wearable device to control the hidden state of the terminal's own private information, which can effectively Avoid leaking private information inside the terminal due to accidents.
  • a structure of a wearable device 70 may be included, which may include: a first sending unit 701, a first detecting unit 702;
  • the first sending unit 701 is configured to send the encrypted comparison information to the terminal;
  • the first detecting unit 702 is configured to detect the encryption status of the terminal private information; and when the terminal private information is in the non-encrypted state, trigger the first sending unit 701;
  • the first sending unit 701 is further configured to send a control instruction for controlling the terminal to hide the private information.
  • the wearable device 70 further includes a first receiving unit 703 configured to receive private information sent by the terminal.
  • the first sending unit 701 is further configured to send the decryption information to the terminal; wherein the decrypted information is used by the terminal to compare with the encrypted comparison information, and the hidden state of the private information is controlled according to the comparison result.
  • the first sending unit 701 and the first sending unit 701 may be implemented by an integrated circuit module in the wearable device 70 that supports Bluetooth/infrared/WIFI or wired communication; the first detecting unit 702 may be a processor in the wearable device 70, Implemented by a microprocessor, an application specific integrated circuit (ASIC), or a logic programmable gate array (FPGA).
  • ASIC application specific integrated circuit
  • FPGA logic programmable gate array
  • the embodiment of the present invention provides a wearable device 70, which sends the encrypted comparison information to the terminal through the wearable device 70 and controls the hiding or disclosure of the private information in the terminal, thereby effectively preventing the private information inside the terminal from being leaked due to an accident. .
  • a structure of a terminal 90 which may include: a second receiving unit 901, a second detecting unit 902, and a second sending unit 903. And a control unit 904; wherein
  • the second receiving unit 901 is configured to receive the encrypted comparison information sent by the wearable device, and receive the detection instruction sent by the wearable device, where the detection instruction is used to instruct the terminal to detect and feedback the encryption status of the private information of the terminal. ;
  • the second detecting unit 902 is configured to detect an encryption state of the private information of the terminal itself
  • the second sending unit 903 is configured to send the encrypted status of the terminal's own private information to the wearable device
  • the second receiving unit 901 is further configured to receive, by the wearable device, a control instruction for controlling the terminal to hide the private information;
  • the control unit 904 is configured to hide its own private information according to the control instruction.
  • the second sending unit 903 is further configured to send its own private information to the wearable device.
  • the second receiving unit 901 is further configured to receive the decryption information sent by the wearable device;
  • the terminal 90 further includes a comparing unit 905 configured to decrypt the decrypted information and the encrypted pair. Comparing with the information; and when the decrypted information is consistent with the encrypted comparison information, triggering control unit 904;
  • the control unit 904 is further configured to convert the hidden state of the private information into a public state.
  • the second sending unit 903 and the second receiving unit 901 can be implemented by an integrated circuit module in the terminal 90 that supports Bluetooth/infrared/WIFI or wired communication; the second detecting unit 902 can be implemented by the processor, the microprocessor in the terminal 90, An application specific integrated circuit (ASIC) or a logic programmable gate array (FPGA) implementation.
  • ASIC application specific integrated circuit
  • FPGA logic programmable gate array
  • the embodiment of the present invention provides a terminal 90, which transmits the encrypted comparison information to the terminal 90 through the wearable device and controls the hiding or disclosure of the private information in the terminal 90, thereby effectively preventing the private information inside the terminal 90 from being leaked due to an accident. .
  • the system 110 includes a wearable device 70 and a terminal 90. After the 90 is connected to the wearable device 70;
  • the wearable device 70 is configured to send the encrypted comparison information to the terminal 90;
  • the terminal 90 is configured to receive the encrypted comparison information sent by the wearable device 70;
  • the control command sent by the wearable device 70 for controlling the terminal 90 to hide the private information is received, and the private information of the terminal is hidden according to the control instruction.
  • the wearable device 70 is further configured to receive the private information sent by the terminal 90 after being paired with the terminal 90.
  • the wearable device 70 is further configured to send a decryption information to the terminal 90 after transmitting a control instruction for controlling the terminal 90 to hide the private information; wherein the decryption information is used by the terminal 90 Comparing with the encrypted comparison information, and controlling the hidden state of the private information according to the comparison result.
  • the terminal 90 After the terminal 90 is further configured to be paired with the wearable device 70, the terminal 90 sends its own private information to the wearable device 70.
  • the terminal 90 After the terminal 90 is further configured to hide the private information of the user according to the control instruction, the terminal 90 receives the decryption information sent by the wearable device 70; and performs the decryption information and the encrypted comparison information. Comparing; when the decrypted information is consistent with the encrypted comparison information, converting the hidden state of the private information into a public state.
  • the embodiment of the invention further describes a computer storage medium, wherein the computer storage medium stores executable instructions, and the executable instructions are used to execute the method for protecting private information as shown in any of the figures of FIG. 1 to FIG.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing storage medium includes: a mobile storage device, a random access memory (RAM), a read-only memory (ROM), a magnetic disk, or an optical disk.
  • RAM random access memory
  • ROM read-only memory
  • magnetic disk or an optical disk.
  • optical disk A medium that can store program code.
  • the above-described integrated unit of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in a contribution to the related art, and the computer software product is stored in a
  • the storage medium includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a RAM, a ROM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided are a private information protection method, device and system, and computer storage medium. The method is applicable to a wearable apparatus paired and connected to a terminal apparatus. The method comprises: (S101) transmitting, by a wearable apparatus, encrypted contrastive information to a terminal; (S102) detecting, by the wearable apparatus, an encryption state of private information in the terminal; and (S103) when the private information in the terminal is in a non-encryption state, transmitting, by the wearable apparatus, a control instruction to control the terminal to hide the private information.

Description

保护私密信息的方法、装置和系统、计算机存储介质Method, device and system for protecting private information, computer storage medium 技术领域Technical field
本发明涉及通信领域的信息安全技术,尤其涉及一种保护私密信息的方法、装置和系统、计算机存储介质。The present invention relates to information security technologies in the field of communications, and in particular, to a method, device and system for protecting private information, and a computer storage medium.
背景技术Background technique
随着智能移动终端的发展,终端内保存了越来越多的私密信息,例如各种即时通信软件中保存的联系人、聊天记录、银行账号等信息。因此,终端私密信息的安全性问题也成为了一种重要的问题。With the development of intelligent mobile terminals, more and more private information is stored in the terminal, such as contacts, chat records, bank account numbers and the like stored in various instant messaging software. Therefore, the security of the terminal's private information has also become an important issue.
当前终端的信息安全技术主要是通过传输加密信息、键盘锁加密、隐藏加密的收件箱或文件夹以及通过对手机通讯录里的联系人进行物理分区设置私密联系人来进行的。但是这些安全方式容易导致用户私密信息的意外泄露。例如:用户可能在进入即时通讯应用后将手机放置在一旁,从而导致被其他人查看。The information security technology of the current terminal is mainly performed by transmitting encrypted information, encrypting the keyboard lock, hiding the encrypted inbox or folder, and setting a private contact by physically partitioning the contacts in the mobile phone address book. However, these security methods are likely to lead to accidental disclosure of user private information. For example, a user may put a mobile phone aside after entering an instant messaging application, causing it to be viewed by others.
发明内容Summary of the invention
本发明实施例提供一种保护私密信息的方法、装置和系统、计算机存储介质,能够有效地避免终端内部私密信息由于意外而导致泄露。The embodiment of the invention provides a method, a device and a system for protecting private information, and a computer storage medium, which can effectively prevent the private information inside the terminal from being leaked due to an accident.
本发明实施例的技术方案是这样实现的:The technical solution of the embodiment of the present invention is implemented as follows:
第一方面,本发明实施例提供了一种保护私密信息的方法,所述方法应用于与终端设备完成对配连接后的可穿戴设备,所述方法包括:In a first aspect, an embodiment of the present invention provides a method for protecting private information, where the method is applied to a wearable device that is connected to a terminal device, where the method includes:
所述可穿戴设备向所述终端发送加密对比信息;The wearable device sends encrypted comparison information to the terminal;
所述可穿戴设备检测终端私密信息的加密状态;The wearable device detects an encryption status of the terminal private information;
当所述终端私密信息处于非加密状态时,所述可穿戴设备发送用于控 制所述终端将所述私密信息进行隐藏的控制指令。When the terminal private information is in a non-encrypted state, the wearable device sends a control And the control instruction for hiding, by the terminal, the private information.
在上述方案中,所述加密对比信息包括:具有至少一个图像特征的图片或者预设的密码对照字符串。In the above solution, the encrypted comparison information includes: a picture having at least one image feature or a preset password comparison character string.
在上述方案中,所述可穿戴设备与所述终端进行配对连接后,所述方法还包括:所述可穿戴设备接收所述终端发送的私密信息。In the above solution, after the wearable device is paired with the terminal, the method further includes: the wearable device receiving the private information sent by the terminal.
在上述方案中,所述可穿戴设备发送用于控制所述终端将所述私密信息进行隐藏的控制指令之后,所述方法还包括:所述可穿戴设备向所述终端发送解密信息;其中,所述解密信息用于所述终端与所述加密对比信息进行比较,并根据比较结果控制所述私密信息的隐藏状态。In the above solution, after the wearable device sends a control instruction for controlling the terminal to hide the private information, the method further includes: the wearable device sending the decryption information to the terminal; The decryption information is used by the terminal to compare with the encrypted comparison information, and controls the hidden state of the private information according to the comparison result.
第二方面,本发明实施例提供了一种保护私密信息的方法,所述方法应用于与可穿戴设备完成对配连接后的终端设备,所述方法包括:In a second aspect, the embodiment of the present invention provides a method for protecting private information, where the method is applied to a terminal device that is connected to a wearable device, and the method includes:
所述终端接收由所述可穿戴设备发送的加密对比信息;Receiving, by the terminal, encrypted comparison information sent by the wearable device;
所述终端接收所述可穿戴设备发送的检测指令;并将自身的私密信息的加密状态发送至所述可穿戴设备;其中,所述检测指令用于指示所述终端对自身的私密信息的加密状态进行检测并反馈;Receiving, by the terminal, a detection instruction sent by the wearable device, and transmitting an encryption status of the private information to the wearable device; wherein the detection instruction is used to indicate that the terminal encrypts the private information of the terminal Status is detected and fed back;
当所述终端私密信息处于非加密状态时,所述终端接收由所述可穿戴设备发送的用于控制所述终端将所述私密信息进行隐藏的控制指令,并根据所述控制指令对自身的私密信息进行隐藏。When the terminal private information is in a non-encrypted state, the terminal receives a control instruction sent by the wearable device for controlling the terminal to hide the private information, and according to the control instruction Private information is hidden.
在上述方案中,所述加密对比信息包括:具有至少一个图像特征的图片或者预设的密码对照字符串。In the above solution, the encrypted comparison information includes: a picture having at least one image feature or a preset password comparison character string.
在上述方案中,所述终端与所述可穿戴设备进行配对连接后,所述方法还包括:所述终端向所述可穿戴设备发送自身的私密信息。In the above solution, after the terminal is paired with the wearable device, the method further includes: the terminal sending its own private information to the wearable device.
在上述方案中,所述终端根据所述控制指令对自身的私密信息进行隐藏之后,所述方法还包括:In the above solution, after the terminal hides the private information of the user according to the control instruction, the method further includes:
所述终端接收由所述可穿戴设备发送的解密信息; Receiving, by the terminal, decryption information sent by the wearable device;
所述终端将所述解密信息与所述加密对比信息进行比较;The terminal compares the decrypted information with the encrypted comparison information;
当所述解密信息与所述加密对比信息一致时,将所述私密信息的隐藏状态转换为公开状态。When the decrypted information is consistent with the encrypted comparison information, the hidden state of the private information is converted into a public state.
第三方面,本发明实施例提供了一种可穿戴设备,所述可穿戴设备包括:第一发送单元、第一检测单元;其中,In a third aspect, an embodiment of the present invention provides a wearable device, where the wearable device includes: a first sending unit, a first detecting unit, where
所述第一发送单元,配置为向终端发送加密对比信息;The first sending unit is configured to send the encrypted comparison information to the terminal;
所述第一检测单元,配置为检测终端私密信息的加密状态;并且当所述终端私密信息处于非加密状态时,触发所述第一发送单元;The first detecting unit is configured to detect an encryption state of the terminal private information; and trigger the first sending unit when the terminal private information is in an unencrypted state;
所述第一发送单元,还配置为发送用于控制所述终端将所述私密信息进行隐藏的控制指令。The first sending unit is further configured to send a control instruction for controlling the terminal to hide the private information.
在上述方案中,所述可穿戴设备还包括第一接收单元,配置为接收所述终端发送的私密信息。In the above solution, the wearable device further includes a first receiving unit configured to receive the private information sent by the terminal.
在上述方案中,所述第一发送单元,还配置为向所述终端发送解密信息;其中,所述解密信息用于所述终端与所述加密对比信息进行比较,并根据比较结果控制所述私密信息的隐藏状态。In the above solution, the first sending unit is further configured to send decryption information to the terminal; wherein the decryption information is used by the terminal to compare with the encrypted comparison information, and the control is performed according to a comparison result. The hidden state of private information.
第四方面,本发明实施例提供了一种终端,所述终端包括:第二接收单元,第二检测单元、第二发送单元和控制单元;其中,In a fourth aspect, an embodiment of the present invention provides a terminal, where the terminal includes: a second receiving unit, a second detecting unit, a second sending unit, and a control unit;
所述第二接收单元,配置为接收由所述可穿戴设备发送的加密对比信息;以及,接收所述可穿戴设备发送的检测指令;其中,所述检测指令用于指示所述终端对自身的私密信息的加密状态进行检测并反馈;The second receiving unit is configured to receive the encrypted comparison information sent by the wearable device; and receive the detection instruction sent by the wearable device; wherein the detection instruction is used to indicate that the terminal is to the user The encryption status of the private information is detected and fed back;
所述第二检测单元,配置为检测所述终端自身的私密信息的加密状态;The second detecting unit is configured to detect an encryption state of the private information of the terminal itself;
所述第二发送单元,配置为将所述终端自身的私密信息的加密状态发送至所述可穿戴设备;The second sending unit is configured to send an encrypted state of the terminal's own private information to the wearable device;
所述第二接收单元,还配置为接收由所述可穿戴设备发送的用于控制所述终端将所述私密信息进行隐藏的控制指令; The second receiving unit is further configured to receive, by the wearable device, a control instruction for controlling the terminal to hide the private information;
所述控制单元,配置为根据所述控制指令对自身的私密信息进行隐藏。The control unit is configured to hide its own private information according to the control instruction.
在上述方案中,所述第二发送单元,还配置为向所述可穿戴设备发送自身的私密信息。In the above solution, the second sending unit is further configured to send the private information of the device to the wearable device.
在上述方案中,所述第二接收单元,还配置为接收由所述可穿戴设备发送的解密信息;In the above solution, the second receiving unit is further configured to receive decryption information sent by the wearable device;
所述终端还包括比较单元,配置为将所述解密信息与所述加密对比信息进行比较;并且当所述解密信息与所述加密对比信息一致时,触发所述控制单元;The terminal further includes a comparing unit configured to compare the decrypted information with the encrypted comparison information; and triggering the control unit when the decrypted information is consistent with the encrypted comparison information;
所述控制单元,还配置为将所述私密信息的隐藏状态转换为公开状态。The control unit is further configured to convert the hidden state of the private information into a public state.
第五方面,本发明实施例提供了一种保护私密信息的系统,所述系统包括可穿戴设备和终端;其中,所述终端与所述可穿戴设备完成对配连接后;In a fifth aspect, an embodiment of the present invention provides a system for protecting private information, where the system includes a wearable device and a terminal, where the terminal and the wearable device complete a pairing connection;
所述可穿戴设备,配置为向所述终端发送加密对比信息;以及,The wearable device is configured to send encrypted comparison information to the terminal; and
检测终端私密信息的加密状态;以及,Detecting the encryption status of the terminal private information; and,
当所述终端私密信息处于非加密状态时,发送用于控制所述终端将所述私密信息进行隐藏的控制指令;And when the terminal private information is in a non-encrypted state, sending a control instruction for controlling the terminal to hide the private information;
所述终端,配置为接收由所述可穿戴设备发送的加密对比信息;以及,The terminal is configured to receive encrypted comparison information sent by the wearable device; and
接收所述可穿戴设备发送的检测指令;并将自身的私密信息的加密状态发送至所述可穿戴设备;其中,所述检测指令用于指示所述终端对自身的私密信息的加密状态进行检测并反馈;以及,Receiving a detection instruction sent by the wearable device; and transmitting an encryption status of the private information to the wearable device; wherein the detection instruction is used to instruct the terminal to detect an encryption status of the private information of the terminal And feedback; and,
当所述终端私密信息处于非加密状态时,接收由所述可穿戴设备发送的用于控制所述终端将所述私密信息进行隐藏的控制指令,并根据所述控制指令对自身的私密信息进行隐藏。Receiving, by the wearable device, a control instruction sent by the wearable device to control the terminal to hide the private information, and performing, according to the control instruction, private information of the terminal, when the terminal private information is in an unencrypted state. hide.
第四方面,本发明实施例提供了一种计算机存储介质,所述计算机存储介质中存储有可执行指令,所述可执行指令用于执行上述的保护私密信 息的方法。In a fourth aspect, an embodiment of the present invention provides a computer storage medium, where the computer storage medium stores executable instructions, where the executable instructions are used to perform the foregoing protection private message. Interest method.
本发明实施例提供了一种保护私密信息的方法、装置和系统、计算机存储介质,通过可穿戴设备向终端发送加密对比信息以及对终端中私密信息的隐藏或公开进行控制,从而有效地避免终端内部私密信息由于意外而导致泄露。The embodiment of the invention provides a method, a device and a system for protecting private information, and a computer storage medium, which can transmit the encrypted comparison information to the terminal through the wearable device and control the hiding or disclosure of the private information in the terminal, thereby effectively avoiding the terminal. Internal private information is leaked due to an accident.
附图说明DRAWINGS
图1为本发明实施例提供的一种保护私密信息的方法流程示意图;FIG. 1 is a schematic flowchart of a method for protecting private information according to an embodiment of the present invention;
图2为本发明实施例提供的另一种保护私密信息的方法流程示意图;2 is a schematic flowchart of another method for protecting private information according to an embodiment of the present invention;
图3为本发明实施例提供的一种保护私密信息的方法的详细流程示意图;FIG. 3 is a schematic flowchart of a method for protecting private information according to an embodiment of the present disclosure;
图4为本发明实施例提供的一种加密对比信息示意图;4 is a schematic diagram of an encryption comparison information according to an embodiment of the present invention;
图5为本发明实施例提供的一种可穿戴设备对终端加密隐藏的私密信息进行解密的流程示意图;FIG. 5 is a schematic flowchart of decrypting private information hidden and hidden by a terminal by a wearable device according to an embodiment of the present disclosure;
图6为本发明实施例提供的一种解密信息示意图;FIG. 6 is a schematic diagram of decryption information according to an embodiment of the present invention;
图7为本发明实施例提供的一种可穿戴设备的结构示意图;FIG. 7 is a schematic structural diagram of a wearable device according to an embodiment of the present disclosure;
图8为本发明实施例提供的另一种可穿戴设备的结构示意图;FIG. 8 is a schematic structural diagram of another wearable device according to an embodiment of the present disclosure;
图9为本发明实施例提供的一种终端的结构示意图;FIG. 9 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure;
图10为本发明实施例提供的另一种终端的结构示意图;FIG. 10 is a schematic structural diagram of another terminal according to an embodiment of the present disclosure;
图11为本发明实施例提供的一种保护私密信息的系统的结构示意图。FIG. 11 is a schematic structural diagram of a system for protecting private information according to an embodiment of the present invention.
具体实施方式detailed description
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述。The technical solutions in the embodiments of the present invention will be clearly and completely described in the following with reference to the accompanying drawings.
实施例一Embodiment 1
参见图1,其示出了本发明实施例提供的一种保护私密信息的方法流 程,该方法可以应用于与终端设备完成对配连接后的可穿戴设备,例如智能手表,智能眼镜等,可以有效实现终端私密信息的保护,该方法可以包括:Referring to FIG. 1 , a flow of a method for protecting private information according to an embodiment of the present invention is shown. The method can be applied to the wearable device that is connected to the terminal device, such as a smart watch, smart glasses, etc., and can effectively protect the private information of the terminal. The method can include:
S101:可穿戴设备向终端发送加密对比信息;S101: The wearable device sends the encrypted comparison information to the terminal.
需要说明的是,加密对比信息可以用于可穿戴设备后续解密过程中对接收到的解密消息进行对比的参照;在本实施例中,加密对比信息可以包括具有至少一个图像特征的图片或者为预设的密码对照字符串。It should be noted that the encryption comparison information may be used as a reference for comparing the received decrypted messages in the subsequent decryption process of the wearable device; in this embodiment, the encrypted comparison information may include a picture with at least one image feature or Set the password comparison string.
S102:可穿戴设备检测终端私密信息的加密状态;S102: The wearable device detects an encryption status of the terminal private information.
S103:当终端私密信息处于非加密状态时,可穿戴设备发送用于控制终端将私密信息进行隐藏的控制指令;S103: When the terminal private information is in an unencrypted state, the wearable device sends a control instruction for controlling the terminal to hide the private information;
可以理解地,本实施例中所述的私密信息可以包括终端保存的较为敏感的终端通讯录/即时通讯软件的联系人,还可以包括与这些联系人之间的通话记录和消息聊天记录等;本实施例对此不作具体限定。It can be understood that the private information described in this embodiment may include a contact of a relatively sensitive terminal address book/instant messaging software saved by the terminal, and may also include a call record and a message chat record with the contacts; This embodiment does not specifically limit this.
终端侧由于设置了私密信息的隐藏功能,因此,终端能够根据用户的操作对私密信息进行隐藏,所以,当终端已经将私密信息进行隐藏之后,也就是终端私密信息已处于加密状态时,可穿戴设备就无需再次对私密信息进行隐藏。Because the hidden function of the private information is set on the terminal side, the terminal can hide the private information according to the operation of the user. Therefore, when the terminal has hidden the private information, that is, the terminal private information is already in an encrypted state, the wearable The device does not need to hide the private information again.
示例性地,可穿戴设备与终端进行配对连接后,该方法还可以包括:可穿戴设备接收终端发送的私密信息;可以理解地,可穿戴设备接收到终端发送的私密消息之后,实现了可穿戴设备与终端的私密消息的同步,从而可以在有需要的时候,例如终端重新刷机或者升级之后,将私密消息同步下载到终端中。Illustratively, after the wearable device is paired with the terminal, the method may further include: the wearable device receives the private information sent by the terminal; understandably, the wearable device implements the wearable after receiving the private message sent by the terminal. The device synchronizes with the private message of the terminal, so that the private message can be synchronously downloaded to the terminal when necessary, for example, after the terminal is re-flashed or upgraded.
可以理解地,通过步骤S101至S103实现了可穿戴设备对终端中的私密消息进行加密隐藏的具体过程,从而,能够在用户远离终端时,通过可穿戴设备对终端进行加密对比信息的发送以及对终端中私密信息的隐藏或 公开进行控制,从而有效地避免终端内部私密信息由于意外而导致泄露。It can be understood that the specific process of encrypting and hiding the private message in the terminal by the wearable device is implemented in steps S101 to S103, so that when the user is away from the terminal, the terminal can perform the transmission of the encrypted comparison information and the pair through the wearable device. The hiding of private information in the terminal or The control is publicly disclosed, thereby effectively preventing the private information inside the terminal from being leaked due to an accident.
需要说明的是,本实施例还可以包括可穿戴设备对终端加密隐藏的私密信息进行解密的过程,该过程可以包括:It should be noted that the embodiment may further include a process in which the wearable device decrypts the private information hidden by the terminal encryption, and the process may include:
可穿戴设备向终端发送解密信息;该解密信息用于终端与加密对比信息进行比较,并根据比较结果控制私密信息的隐藏状态。The wearable device sends the decryption information to the terminal; the decrypted information is used by the terminal to compare with the encrypted comparison information, and controls the hidden state of the private information according to the comparison result.
可以理解地,当无需对私密信息进行隐藏的时候,例如用户在终端附近时,可以通过可穿戴设备将解密信息发送至终端,以使得终端通过将解密信息与加密对比信息进行比较;当两者一致时,终端将私密信息的隐藏状态转换为公开状态。It can be understood that when there is no need to hide the private information, for example, when the user is near the terminal, the decryption information can be sent to the terminal through the wearable device, so that the terminal compares the decrypted information with the encrypted comparison information; When they are consistent, the terminal converts the hidden state of the private information into a public state.
本发明实施例提供了一种应用于可穿戴设备侧的保护终端私密信息的方法,通过可穿戴设备向终端发送加密对比信息以及对终端中私密信息的隐藏或公开进行控制,从而有效地避免终端内部私密信息由于意外而导致泄露。An embodiment of the present invention provides a method for protecting private information of a terminal, which is applied to a wearable device, and sends the encrypted comparison information to the terminal and controls the hiding or disclosure of the private information in the terminal, thereby effectively avoiding the terminal. Internal private information is leaked due to an accident.
实施例二Embodiment 2
基于上述实施例,参见图2,其示出了本发明实施例提供的一种保护终端私密信息的方法流程,该方法可以应用于与可穿戴设备完成对配连接后的终端设备,该终端设备可以包括诸如移动电话、智能电话、笔记本电脑、数字广播接收器、个人数字助理(PDA)、平板电脑(PAD)、便携式多媒体播放器(PMP)、导航装置等等的移动终端以及诸如数字TV、台式计算机等等的固定终端。该方法可以包括:Based on the foregoing embodiment, referring to FIG. 2, a flow of a method for protecting private information of a terminal according to an embodiment of the present invention is provided. The method may be applied to a terminal device that is connected to a wearable device, and the terminal device is used. Mobile terminals such as mobile phones, smart phones, notebook computers, digital broadcast receivers, personal digital assistants (PDAs), tablet computers (PADs), portable multimedia players (PMPs), navigation devices, and the like, as well as digital TVs, A fixed terminal for a desktop computer or the like. The method can include:
S201:终端接收由可穿戴设备发送的加密对比信息;S201: The terminal receives the encrypted comparison information sent by the wearable device.
需要说明的是,终端将接收到的加密对比信息进行保存,作为后续将可穿戴设备在解密过程中所发送的解密消息进行对比的参照;在本实施例中,加密对比信息可以包括:具有至少一个图像特征的图片或者为预设的密码对照字符串。 It should be noted that the terminal saves the received encrypted comparison information as a reference for comparing the decrypted messages sent by the wearable device in the decryption process. In this embodiment, the encrypted comparison information may include: A picture of an image feature or a preset password comparison string.
S202:终端接收可穿戴设备发送的检测指令;并将自身的私密信息的加密状态发送至可穿戴设备;S202: The terminal receives the detection instruction sent by the wearable device, and sends the encrypted status of the private information to the wearable device.
其中,检测指令用于指示终端对自身的私密信息的加密状态进行检测并反馈。The detection instruction is used to instruct the terminal to detect and feedback the encryption status of the private information of the terminal.
S203:当终端私密信息处于非加密状态时,终端接收由可穿戴设备发送的用于控制终端将私密信息进行隐藏的控制指令,并根据控制指令对自身的私密信息进行隐藏;S203: When the terminal private information is in a non-encrypted state, the terminal receives a control instruction sent by the wearable device for controlling the terminal to hide the private information, and hides the private information according to the control instruction;
可以理解地,终端由于设置了私密信息的隐藏功能,因此,终端也能够根据用户的操作对私密信息进行隐藏,所以,当终端已经将私密信息进行隐藏之后,也就是终端私密信息已处于加密状态时,可穿戴设备就无需再次对私密信息进行隐藏。It can be understood that, because the terminal has the hidden function of setting the private information, the terminal can also hide the private information according to the operation of the user. Therefore, after the terminal has hidden the private information, that is, the terminal private information is already in the encrypted state. When the wearable device does not need to hide the private information again.
示例性地,终端与可穿戴设备进行配对连接后,该方法还可以包括:终端向可穿戴设备发送自身的私密信息;可以理解地,可穿戴设备接收到终端发送的私密消息之后,实现了可穿戴设备与终端的私密消息的同步,从而可以在有需要的时候,例如终端重新刷机或者升级之后,将私密消息同步下载到终端中。Illustratively, after the terminal is paired with the wearable device, the method may further include: the terminal transmitting the private information of the terminal to the wearable device; understandably, after the wearable device receives the private message sent by the terminal, the The wearer synchronizes with the private message of the terminal, so that the private message can be synchronously downloaded to the terminal when necessary, for example, after the terminal is re-flashed or upgraded.
可以理解地,通过步骤S201至S203实现了终端通过可穿戴设备对自身的私密消息进行加密隐藏的具体过程,从而,能够在用户远离终端时,通过可穿戴设备对终端发送加密对比信息的以及对终端中私密信息的隐藏或公开进行控制,从而有效地避免终端内部私密信息由于意外而导致泄露。It can be understood that the specific process of encrypting and hiding the private message of the terminal by the wearable device is implemented in steps S201 to S203, so that when the user is away from the terminal, the encrypted comparison information is sent to the terminal through the wearable device, and The hidden or public control of the private information in the terminal is controlled, thereby effectively preventing the private information inside the terminal from being leaked due to an accident.
需要说明的是,本实施例还可以包括可穿戴设备对终端加密隐藏的私密信息进行解密的过程,该过程可以包括:It should be noted that the embodiment may further include a process in which the wearable device decrypts the private information hidden by the terminal encryption, and the process may include:
终端接收由可穿戴设备发送的解密信息;以及,The terminal receives the decrypted information sent by the wearable device; and,
终端将解密信息与加密对比信息进行比较;以及,The terminal compares the decrypted information with the encrypted comparison information; and,
当解密信息与加密对比信息一致时,终端将私密信息的隐藏状态转换 为公开状态。When the decrypted information is consistent with the encrypted comparison information, the terminal converts the hidden state of the private information. To be public.
可以理解地,当无需对私密信息进行隐藏的时候,例如用户在终端附近时,可以通过可穿戴设备将解密信息发送至终端,以使得终端通过将解密信息与加密对比信息进行比较;当两者一致时,终端将私密信息的隐藏状态转换为公开状态;当两者不一致时,终端继续保持私密信息的隐藏状态。It can be understood that when there is no need to hide the private information, for example, when the user is near the terminal, the decryption information can be sent to the terminal through the wearable device, so that the terminal compares the decrypted information with the encrypted comparison information; When they are consistent, the terminal converts the hidden state of the private information into a public state; when the two are inconsistent, the terminal continues to keep the hidden state of the private information.
本发明实施例提供了一种应用于可穿戴设备侧的保护终端私密信息的方法,通过可穿戴设备向终端发送加密对比信息以及对终端中私密信息的隐藏或公开进行控制,从而有效地避免终端内部私密信息由于意外而导致泄露。An embodiment of the present invention provides a method for protecting private information of a terminal, which is applied to a wearable device, and sends the encrypted comparison information to the terminal and controls the hiding or disclosure of the private information in the terminal, thereby effectively avoiding the terminal. Internal private information is leaked due to an accident.
实施例三Embodiment 3
基于前述实施例相同的技术构思,参见图3,其示出了本发明实施例提供的一种保护终端私密信息的方法的详细流程,具体可以包括:Based on the same technical concept of the foregoing embodiment, refer to FIG. 3, which shows a detailed process of a method for protecting private information of a terminal according to an embodiment of the present invention, which may specifically include:
S301:终端和可穿戴设备之间进行配对连接;S301: Perform a pairing connection between the terminal and the wearable device.
可以理解地,终端与可穿戴设备之间可以使用无线,例如:蓝牙/红外/无线保真(WIFI,WIreless-FIdelity)或有线方式完成配对连接,本实施例对此不做具体赘述。It is to be understood that the connection between the terminal and the wearable device can be performed by using a wireless device, such as a Bluetooth/Infrared/Fidelity (WIFI) or a wired connection.
S302:终端开启私密信息的隐藏功能;S302: The terminal turns on the hidden function of the private information.
可以理解地,通常情况下,当终端在用户操作过程中,无需对终端的私密信息进行隐藏,因此,私密信息的隐藏功能可以通过终端接受用户的操作进行开启和关闭。It can be understood that, in the normal operation, when the terminal does not need to hide the private information of the terminal during the operation of the user, the hidden function of the private information can be turned on and off by the terminal accepting the operation of the user.
S303:可穿戴设备向终端发送加密对比信息;S303: The wearable device sends the encrypted comparison information to the terminal.
可以理解地,当用户需要暂时远离终端的时候,可以通过用户佩戴的可穿戴设备向终端发送加密对比信息,在本实施例中,加密对比信息可以是具有三个特征区域的图像,如图4所示,虚线表示作为加密对比信息的 图像的特征区域。It can be understood that when the user needs to be temporarily away from the terminal, the encrypted comparison information can be sent to the terminal through the wearable device worn by the user. In this embodiment, the encrypted comparison information may be an image having three feature regions, as shown in FIG. 4 . As shown, the dotted line indicates as the encrypted comparison information. The feature area of the image.
S304:终端在接收到加密对比信息并保存之后,将自身的私密信息发送至可穿戴设备;S304: After receiving the encrypted comparison information and saving, the terminal sends the private information to the wearable device.
可以理解地,可穿戴设备接收到终端发送的私密消息之后,实现了可穿戴设备与终端的私密消息的同步,从而可以在有需要的时候,例如终端重新刷机或者升级之后,将私密消息同步下载到终端中。It can be understood that after receiving the private message sent by the terminal, the wearable device synchronizes the private message of the wearable device with the terminal, so that the private message can be synchronously downloaded when necessary, for example, after the terminal is re-flashed or upgraded. Go to the terminal.
S305:可穿戴设备向终端发送检测指令;S305: The wearable device sends a detection instruction to the terminal.
需要说明的是,该检测指令用于指示终端对自身的私密信息的加密状态进行检测并反馈;It should be noted that the detection instruction is used to instruct the terminal to detect and feedback the encryption status of the private information of the terminal;
S306:终端根据检测指令检测自身的私密信息的加密状态;S306: The terminal detects an encryption status of the private information according to the detection instruction.
S307:终端将自身的私密信息的加密状态发送至可穿戴设备;S307: The terminal sends the encrypted status of the private information to the wearable device.
S308:当终端私密信息处于非加密状态时,可穿戴设备向终端发送用于控制终端将私密信息进行隐藏的控制指令;S308: When the terminal private information is in a non-encrypted state, the wearable device sends a control instruction for controlling the terminal to hide the private information.
可以理解地,当终端私密信息已处于加密状态时,可穿戴设备就无需再次对私密信息进行隐藏。Understandably, when the terminal private information is already in an encrypted state, the wearable device does not need to hide the private information again.
S309:终端根据控制指令将自身的私密信息进行隐藏。S309: The terminal hides its own private information according to the control instruction.
需要说明的是,上述过程S301至S309实现了终端通过可穿戴设备对自身的私密消息进行加密隐藏的具体过程,而本实施例还提供了可穿戴设备对终端加密隐藏的私密信息进行解密的过程,具体参见图5,可以包括:It should be noted that the foregoing process S301 to S309 implements a specific process for the terminal to encrypt and hide the private message of the terminal through the wearable device, and the embodiment further provides a process for the wearable device to decrypt the encrypted private information hidden by the terminal. For details, see Figure 5, which may include:
S501:可穿戴设备向终端发送解密信息;S501: The wearable device sends the decryption information to the terminal.
可以理解地,由于图3所示的加密隐藏过程中,加密对比信息为图4所示的图像,因此,本实施中,解密信息为如图6所示的图像;可以看出,图6与图4之间的虚线部分是一致的,而实线部分不一致。It can be understood that, in the encryption hiding process shown in FIG. 3, the encrypted comparison information is the image shown in FIG. 4, therefore, in the present embodiment, the decrypted information is an image as shown in FIG. 6; it can be seen that FIG. 6 and FIG. The dotted line portion between Figure 4 is uniform, while the solid line portions are inconsistent.
S502:终端将解密信息与加密对比信息进行比较;当两者一致时,执行步骤S503;当两者不一致时,执行步骤S504; S502: The terminal compares the decryption information with the encrypted comparison information; when the two are consistent, step S503 is performed; when the two are inconsistent, step S504 is performed;
可以理解地,当终端进行比较的策略仅为特征区域比较时,图4和图6之间的虚线部分是一致的,也就是,两者之间特征区域一致,所以终端可以认为两者是一致的,执行步骤S503;It can be understood that when the comparison strategy of the terminal is only the feature region comparison, the dotted line portion between FIG. 4 and FIG. 6 is consistent, that is, the feature regions are consistent between the two, so the terminal can consider the two to be consistent. , executing step S503;
当终端进行比较的策略为图像的全部区域比较时,图4和图6之间的实线部分是不一致的,所以终端可以认为两者是不一致的,执行步骤S504。When the policy for the terminal to compare is the comparison of the entire area of the image, the solid line parts between FIG. 4 and FIG. 6 are inconsistent, so the terminal can consider that the two are inconsistent, and step S504 is performed.
S503:终端将私密信息的隐藏状态转换为公开状态;S503: The terminal converts the hidden state of the private information into a public state.
S504:终端继续保持私密信息的隐藏状态。S504: The terminal continues to keep the hidden state of the private information.
需要说明的是,步骤S501至S504是与图3所示的加密过程相对应的解密过程,仍然通过可穿戴设备向终端发送解密信息来对终端自身的私密信息的隐藏状态进行控制,能够有效地避免终端内部私密信息由于意外而导致泄露。It should be noted that steps S501 to S504 are decryption processes corresponding to the encryption process shown in FIG. 3, and still transmit the decryption information to the terminal through the wearable device to control the hidden state of the terminal's own private information, which can effectively Avoid leaking private information inside the terminal due to accidents.
实施例四Embodiment 4
基于前述实施例相同的技术构思,参见图7,其示出了本发明实施例提供的一种可穿戴设备70的结构,可以包括:第一发送单元701、第一检测单元702;其中,Based on the same technical concept of the foregoing embodiment, referring to FIG. 7, a structure of a wearable device 70 according to an embodiment of the present invention may be included, which may include: a first sending unit 701, a first detecting unit 702;
第一发送单元701,配置为向终端发送加密对比信息;The first sending unit 701 is configured to send the encrypted comparison information to the terminal;
第一检测单元702,配置为检测终端私密信息的加密状态;并且当终端私密信息处于非加密状态时,触发第一发送单元701;The first detecting unit 702 is configured to detect the encryption status of the terminal private information; and when the terminal private information is in the non-encrypted state, trigger the first sending unit 701;
第一发送单元701,还配置为发送用于控制终端将私密信息进行隐藏的控制指令。The first sending unit 701 is further configured to send a control instruction for controlling the terminal to hide the private information.
示例性地,参见图8,可穿戴设备70还包括第一接收单元703,配置为接收终端发送的私密信息。Illustratively, referring to FIG. 8, the wearable device 70 further includes a first receiving unit 703 configured to receive private information sent by the terminal.
示例性地,第一发送单元701,还配置为向终端发送解密信息;其中,解密信息用于终端与加密对比信息进行比较,并根据比较结果控制私密信息的隐藏状态。 Exemplarily, the first sending unit 701 is further configured to send the decryption information to the terminal; wherein the decrypted information is used by the terminal to compare with the encrypted comparison information, and the hidden state of the private information is controlled according to the comparison result.
第一发送单元701和第一发送单元701可以由可穿戴设备70中支持蓝牙/红外/WIFI或有线方式通信的集成电路模块实现;第一检测单元702可以由可穿戴设备70中的处理器、微处理器、专用集成电路(ASIC)或逻辑可编程门阵列(FPGA)实现。The first sending unit 701 and the first sending unit 701 may be implemented by an integrated circuit module in the wearable device 70 that supports Bluetooth/infrared/WIFI or wired communication; the first detecting unit 702 may be a processor in the wearable device 70, Implemented by a microprocessor, an application specific integrated circuit (ASIC), or a logic programmable gate array (FPGA).
本发明实施例提供了一种可穿戴设备70,通过可穿戴设备70向终端发送加密对比信息以及对终端中私密信息的隐藏或公开进行控制,从而有效地避免终端内部私密信息由于意外而导致泄露。The embodiment of the present invention provides a wearable device 70, which sends the encrypted comparison information to the terminal through the wearable device 70 and controls the hiding or disclosure of the private information in the terminal, thereby effectively preventing the private information inside the terminal from being leaked due to an accident. .
实施例五Embodiment 5
基于前述实施例相同的技术构思,参见图9,其示出了本发明实施例提供的一种终端90的结构,可以包括:第二接收单元901,第二检测单元902、第二发送单元903和控制单元904;其中,Based on the same technical concept of the foregoing embodiment, referring to FIG. 9, a structure of a terminal 90 according to an embodiment of the present invention is shown, which may include: a second receiving unit 901, a second detecting unit 902, and a second sending unit 903. And a control unit 904; wherein
第二接收单元901,配置为接收由可穿戴设备发送的加密对比信息;以及,接收可穿戴设备发送的检测指令;其中,检测指令用于指示终端对自身的私密信息的加密状态进行检测并反馈;The second receiving unit 901 is configured to receive the encrypted comparison information sent by the wearable device, and receive the detection instruction sent by the wearable device, where the detection instruction is used to instruct the terminal to detect and feedback the encryption status of the private information of the terminal. ;
第二检测单元902,配置为检测终端自身的私密信息的加密状态;The second detecting unit 902 is configured to detect an encryption state of the private information of the terminal itself;
第二发送单元903,配置为将终端自身的私密信息的加密状态发送至可穿戴设备;The second sending unit 903 is configured to send the encrypted status of the terminal's own private information to the wearable device;
第二接收单元901,还配置为接收由可穿戴设备发送的用于控制终端将私密信息进行隐藏的控制指令;The second receiving unit 901 is further configured to receive, by the wearable device, a control instruction for controlling the terminal to hide the private information;
控制单元904,配置为根据控制指令对自身的私密信息进行隐藏。The control unit 904 is configured to hide its own private information according to the control instruction.
示例性地,第二发送单元903,还配置为向可穿戴设备发送自身的私密信息。Exemplarily, the second sending unit 903 is further configured to send its own private information to the wearable device.
示例性地,第二接收单元901,还配置为接收由可穿戴设备发送的解密信息;Exemplarily, the second receiving unit 901 is further configured to receive the decryption information sent by the wearable device;
参见图10,终端90还包括比较单元905,配置为将解密信息与加密对 比信息进行比较;并且当解密信息与加密对比信息一致时,触发控制单元904;Referring to FIG. 10, the terminal 90 further includes a comparing unit 905 configured to decrypt the decrypted information and the encrypted pair. Comparing with the information; and when the decrypted information is consistent with the encrypted comparison information, triggering control unit 904;
控制单元904,还配置为将私密信息的隐藏状态转换为公开状态。The control unit 904 is further configured to convert the hidden state of the private information into a public state.
第二发送单元903和第二接收单元901可以由终端90中支持蓝牙/红外/WIFI或有线方式通信的集成电路模块实现;第二检测单元902可以由终端90中的处理器、微处理器、专用集成电路(ASIC)或逻辑可编程门阵列(FPGA)实现。The second sending unit 903 and the second receiving unit 901 can be implemented by an integrated circuit module in the terminal 90 that supports Bluetooth/infrared/WIFI or wired communication; the second detecting unit 902 can be implemented by the processor, the microprocessor in the terminal 90, An application specific integrated circuit (ASIC) or a logic programmable gate array (FPGA) implementation.
本发明实施例提供了一种终端90,通过可穿戴设备向终端90发送加密对比信息以及对终端90中私密信息的隐藏或公开进行控制,从而有效地避免终端90内部私密信息由于意外而导致泄露。The embodiment of the present invention provides a terminal 90, which transmits the encrypted comparison information to the terminal 90 through the wearable device and controls the hiding or disclosure of the private information in the terminal 90, thereby effectively preventing the private information inside the terminal 90 from being leaked due to an accident. .
实施例六Embodiment 6
基于前述实施例相同的技术构思,参见图11,其示出了本发明实施例提供的一种保护终端私密信息的系统110的结构,该系统110包括可穿戴设备70和终端90;其中,终端90与可穿戴设备70完成对配连接后;Based on the same technical concept of the foregoing embodiment, referring to FIG. 11, a structure of a system 110 for protecting terminal privacy information according to an embodiment of the present invention is provided. The system 110 includes a wearable device 70 and a terminal 90. After the 90 is connected to the wearable device 70;
可穿戴设备70,配置为向终端90发送加密对比信息;以及,The wearable device 70 is configured to send the encrypted comparison information to the terminal 90;
检测终端90私密信息的加密状态;以及,Detecting the encryption status of the private information of the terminal 90; and,
当终端90私密信息处于非加密状态时,发送用于控制终端90将私密信息进行隐藏的控制指令;When the terminal 90 private information is in a non-encrypted state, a control instruction for controlling the terminal 90 to hide the private information is sent;
终端90,配置为接收由可穿戴设备70发送的加密对比信息;以及,The terminal 90 is configured to receive the encrypted comparison information sent by the wearable device 70;
接收可穿戴设备70发送的检测指令;并将自身的私密信息的加密状态发送至可穿戴设备70;其中,检测指令用于指示终端90对自身的私密信息的加密状态进行检测并反馈;以及,Receiving the detection instruction sent by the wearable device 70; and transmitting the encryption status of the private information to the wearable device 70; wherein the detection instruction is used to instruct the terminal 90 to detect and feedback the encryption status of the private information of the user;
当终端90私密信息处于非加密状态时,接收由可穿戴设备70发送的用于控制终端90将私密信息进行隐藏的控制指令,并根据控制指令对自身的私密信息进行隐藏。 When the terminal 90 private information is in the non-encrypted state, the control command sent by the wearable device 70 for controlling the terminal 90 to hide the private information is received, and the private information of the terminal is hidden according to the control instruction.
所述可穿戴设备70还配置为与所述终端90进行配对连接后,接收所述终端90发送的私密信息。The wearable device 70 is further configured to receive the private information sent by the terminal 90 after being paired with the terminal 90.
所述可穿戴设备70还配置为发送用于控制所述终端90将所述私密信息进行隐藏的控制指令之后,向所述终端90发送解密信息;其中,所述解密信息用于所述终端90与所述加密对比信息进行比较,并根据比较结果控制所述私密信息的隐藏状态。The wearable device 70 is further configured to send a decryption information to the terminal 90 after transmitting a control instruction for controlling the terminal 90 to hide the private information; wherein the decryption information is used by the terminal 90 Comparing with the encrypted comparison information, and controlling the hidden state of the private information according to the comparison result.
所述终端90还配置为与所述可穿戴设备70进行配对连接后,所述终端90向所述可穿戴设备70发送自身的私密信息。After the terminal 90 is further configured to be paired with the wearable device 70, the terminal 90 sends its own private information to the wearable device 70.
所述终端90还配置为根据所述控制指令对自身的私密信息进行隐藏之后,所述终端90接收由所述可穿戴设备70发送的解密信息;将所述解密信息与所述加密对比信息进行比较;当所述解密信息与所述加密对比信息一致时,将所述私密信息的隐藏状态转换为公开状态。After the terminal 90 is further configured to hide the private information of the user according to the control instruction, the terminal 90 receives the decryption information sent by the wearable device 70; and performs the decryption information and the encrypted comparison information. Comparing; when the decrypted information is consistent with the encrypted comparison information, converting the hidden state of the private information into a public state.
本发明实施例还记载一种计算机存储介质,所述计算机存储介质中存储有可执行指令,所述可执行指令用于执行图1至图3任一附图所示的保护私密信息的方法。The embodiment of the invention further describes a computer storage medium, wherein the computer storage medium stores executable instructions, and the executable instructions are used to execute the method for protecting private information as shown in any of the figures of FIG. 1 to FIG.
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、随机存取存储器(RAM,Random Access Memory)、只读存储器(ROM,Read-Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。A person skilled in the art can understand that all or part of the steps of implementing the above method embodiments may be completed by using hardware related to the program instructions. The foregoing program may be stored in a computer readable storage medium, and the program is executed when executed. The foregoing storage medium includes: a mobile storage device, a random access memory (RAM), a read-only memory (ROM), a magnetic disk, or an optical disk. A medium that can store program code.
或者,本发明上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一 个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、RAM、ROM、磁碟或者光盘等各种可以存储程序代码的介质。Alternatively, the above-described integrated unit of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product. Based on such understanding, the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in a contribution to the related art, and the computer software product is stored in a The storage medium includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the methods described in various embodiments of the present invention. The foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a RAM, a ROM, a magnetic disk, or an optical disk.
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。 The above is only a specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope of the present invention. It should be covered by the scope of the present invention. Therefore, the scope of the invention should be determined by the scope of the appended claims.

Claims (17)

  1. 一种保护私密信息的方法,所述方法应用于与终端设备完成对配连接后的可穿戴设备,所述方法包括:A method for protecting private information, the method being applied to a wearable device that is connected to a terminal device, the method comprising:
    所述可穿戴设备向所述终端发送加密对比信息;The wearable device sends encrypted comparison information to the terminal;
    所述可穿戴设备检测终端私密信息的加密状态;The wearable device detects an encryption status of the terminal private information;
    当所述终端私密信息处于非加密状态时,所述可穿戴设备发送用于控制所述终端将所述私密信息进行隐藏的控制指令。When the terminal private information is in a non-encrypted state, the wearable device sends a control instruction for controlling the terminal to hide the private information.
  2. 根据权利要求1所述的方法,其中,所述加密对比信息包括:具有至少一个图像特征的图片或者预设的密码对照字符串。The method of claim 1, wherein the encrypted comparison information comprises a picture having at least one image feature or a preset password comparison character string.
  3. 根据权利要求1所述的方法,其中,所述方法还包括:所述可穿戴设备与所述终端进行配对连接后,接收所述终端发送的私密信息。The method according to claim 1, wherein the method further comprises: after the wearable device performs a pair connection with the terminal, receiving the private information sent by the terminal.
  4. 根据权利要求1所述的方法,其中,所述方法还包括:所述可穿戴设备发送用于控制所述终端将所述私密信息进行隐藏的控制指令之后,所述可穿戴设备向所述终端发送解密信息;其中,所述解密信息用于所述终端与所述加密对比信息进行比较,并根据比较结果控制所述私密信息的隐藏状态。The method according to claim 1, wherein the method further comprises: after the wearable device sends a control instruction for controlling the terminal to hide the private information, the wearable device is to the terminal Sending decryption information; wherein the decryption information is used by the terminal to compare with the encrypted comparison information, and controls a hidden state of the private information according to the comparison result.
  5. 一种保护私密信息的方法,所述方法应用于与可穿戴设备完成对配连接后的终端设备,所述方法包括:A method for protecting private information, the method being applied to a terminal device after the pairing with the wearable device is completed, the method comprising:
    所述终端接收由所述可穿戴设备发送的加密对比信息;Receiving, by the terminal, encrypted comparison information sent by the wearable device;
    所述终端接收所述可穿戴设备发送的检测指令;并将自身的私密信息的加密状态发送至所述可穿戴设备;其中,所述检测指令用于指示所述终端对自身的私密信息的加密状态进行检测并反馈;Receiving, by the terminal, a detection instruction sent by the wearable device, and transmitting an encryption status of the private information to the wearable device; wherein the detection instruction is used to indicate that the terminal encrypts the private information of the terminal Status is detected and fed back;
    当所述终端私密信息处于非加密状态时,所述终端接收由所述可穿戴设备发送的用于控制所述终端将所述私密信息进行隐藏的控制指令,并根据所述控制指令对自身的私密信息进行隐藏。 When the terminal private information is in a non-encrypted state, the terminal receives a control instruction sent by the wearable device for controlling the terminal to hide the private information, and according to the control instruction Private information is hidden.
  6. 根据权利要求5所述的方法,其中,所述加密对比信息包括:具有至少一个图像特征的图片或者预设的密码对照字符串。The method of claim 5, wherein the encrypted comparison information comprises a picture having at least one image feature or a preset password comparison character string.
  7. 根据权利要求5所述的方法,其中,所述方法还包括:所述终端与所述可穿戴设备进行配对连接后,所述终端向所述可穿戴设备发送自身的私密信息。The method according to claim 5, wherein the method further comprises: after the terminal is paired with the wearable device, the terminal sends its own private information to the wearable device.
  8. 根据权利要求5所述的方法,其中,所述方法还包括:The method of claim 5 wherein the method further comprises:
    所述终端根据所述控制指令对自身的私密信息进行隐藏之后,所述终端接收由所述可穿戴设备发送的解密信息;After the terminal hides the private information of the terminal according to the control instruction, the terminal receives the decryption information sent by the wearable device;
    所述终端将所述解密信息与所述加密对比信息进行比较;The terminal compares the decrypted information with the encrypted comparison information;
    当所述解密信息与所述加密对比信息一致时,将所述私密信息的隐藏状态转换为公开状态。When the decrypted information is consistent with the encrypted comparison information, the hidden state of the private information is converted into a public state.
  9. 一种可穿戴设备,所述可穿戴设备包括:第一发送单元、第一检测单元;其中,A wearable device, comprising: a first sending unit, a first detecting unit; wherein
    所述第一发送单元,配置为向终端发送加密对比信息;The first sending unit is configured to send the encrypted comparison information to the terminal;
    所述第一检测单元,配置为检测终端私密信息的加密状态;并且当所述终端私密信息处于非加密状态时,触发所述第一发送单元;The first detecting unit is configured to detect an encryption state of the terminal private information; and trigger the first sending unit when the terminal private information is in an unencrypted state;
    所述第一发送单元,还配置为发送用于控制所述终端将所述私密信息进行隐藏的控制指令。The first sending unit is further configured to send a control instruction for controlling the terminal to hide the private information.
  10. 根据权利要求9所述的可穿戴设备,其中,所述可穿戴设备还包括第一接收单元,配置为接收所述终端发送的私密信息。The wearable device of claim 9, wherein the wearable device further comprises a first receiving unit configured to receive private information sent by the terminal.
  11. 根据权利要求9所述的可穿戴设备,其中,所述第一发送单元,还配置为向所述终端发送解密信息;其中,所述解密信息用于所述终端与所述加密对比信息进行比较,并根据比较结果控制所述私密信息的隐藏状态。The wearable device according to claim 9, wherein the first transmitting unit is further configured to send decryption information to the terminal; wherein the decryption information is used by the terminal to compare with the encrypted comparison information And controlling the hidden state of the private information according to the comparison result.
  12. 一种终端,所述终端包括:第二接收单元,第二检测单元、第二 发送单元和控制单元;其中,A terminal, the terminal comprising: a second receiving unit, a second detecting unit, and a second a sending unit and a control unit; wherein
    所述第二接收单元,配置为接收由所述可穿戴设备发送的加密对比信息;以及,接收所述可穿戴设备发送的检测指令;其中,所述检测指令用于指示所述终端对自身的私密信息的加密状态进行检测并反馈;The second receiving unit is configured to receive the encrypted comparison information sent by the wearable device; and receive the detection instruction sent by the wearable device; wherein the detection instruction is used to indicate that the terminal is to the user The encryption status of the private information is detected and fed back;
    所述第二检测单元,配置为检测所述终端自身的私密信息的加密状态;The second detecting unit is configured to detect an encryption state of the private information of the terminal itself;
    所述第二发送单元,配置为将所述终端自身的私密信息的加密状态发送至所述可穿戴设备;The second sending unit is configured to send an encrypted state of the terminal's own private information to the wearable device;
    所述第二接收单元,还配置为接收由所述可穿戴设备发送的用于控制所述终端将所述私密信息进行隐藏的控制指令;The second receiving unit is further configured to receive, by the wearable device, a control instruction for controlling the terminal to hide the private information;
    所述控制单元,配置为根据所述控制指令对自身的私密信息进行隐藏。The control unit is configured to hide its own private information according to the control instruction.
  13. 根据权利要求12所述的终端,其中,所述第二发送单元,还配置为向所述可穿戴设备发送自身的私密信息。The terminal according to claim 12, wherein the second transmitting unit is further configured to send its own private information to the wearable device.
  14. 根据权利要求12所述的终端,其中,所述第二接收单元,还配置为接收由所述可穿戴设备发送的解密信息;The terminal according to claim 12, wherein the second receiving unit is further configured to receive decryption information sent by the wearable device;
    所述终端还包括比较单元,配置为将所述解密信息与所述加密对比信息进行比较;并且当所述解密信息与所述加密对比信息一致时,触发所述控制单元;The terminal further includes a comparing unit configured to compare the decrypted information with the encrypted comparison information; and triggering the control unit when the decrypted information is consistent with the encrypted comparison information;
    所述控制单元,还配置为将所述私密信息的隐藏状态转换为公开状态。The control unit is further configured to convert the hidden state of the private information into a public state.
  15. 一种保护私密信息的系统,所述系统包括可穿戴设备和终端;其中,所述终端与所述可穿戴设备完成对配连接后;A system for protecting private information, the system comprising a wearable device and a terminal; wherein the terminal and the wearable device complete a mating connection;
    所述可穿戴设备,配置为向所述终端发送加密对比信息;以及,The wearable device is configured to send encrypted comparison information to the terminal; and
    检测终端私密信息的加密状态;以及,Detecting the encryption status of the terminal private information; and,
    当所述终端私密信息处于非加密状态时,发送用于控制所述终端将所述私密信息进行隐藏的控制指令;And when the terminal private information is in a non-encrypted state, sending a control instruction for controlling the terminal to hide the private information;
    所述终端,配置为接收由所述可穿戴设备发送的加密对比信息;以及, The terminal is configured to receive encrypted comparison information sent by the wearable device; and
    接收所述可穿戴设备发送的检测指令;并将自身的私密信息的加密状态发送至所述可穿戴设备;其中,所述检测指令用于指示所述终端对自身的私密信息的加密状态进行检测并反馈;以及,Receiving a detection instruction sent by the wearable device; and transmitting an encryption status of the private information to the wearable device; wherein the detection instruction is used to instruct the terminal to detect an encryption status of the private information of the terminal And feedback; and,
    当所述终端私密信息处于非加密状态时,接收由所述可穿戴设备发送的用于控制所述终端将所述私密信息进行隐藏的控制指令,并根据所述控制指令对自身的私密信息进行隐藏。Receiving, by the wearable device, a control instruction sent by the wearable device to control the terminal to hide the private information, and performing, according to the control instruction, private information of the terminal, when the terminal private information is in an unencrypted state. hide.
  16. 一种计算机存储介质,所述计算机存储介质中存储有可执行指令,所述可执行指令用于执行权利要求1至4任一项所述的保护私密信息的方法。A computer storage medium storing executable instructions for performing the method of protecting private information according to any one of claims 1 to 4.
  17. 一种计算机存储介质,所述计算机存储介质中存储有可执行指令,所述可执行指令用于执行权利要求5至8任一项所述的保护私密信息的方法。 A computer storage medium storing executable instructions for performing the method of protecting private information according to any one of claims 5 to 8.
PCT/CN2015/095649 2015-07-07 2015-11-26 Private information protection method, device and system, and computer storage medium WO2017004925A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510394066.8A CN106326765A (en) 2015-07-07 2015-07-07 Terminal privacy information protection method, apparatus and system
CN201510394066.8 2015-07-07

Publications (1)

Publication Number Publication Date
WO2017004925A1 true WO2017004925A1 (en) 2017-01-12

Family

ID=57684751

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/095649 WO2017004925A1 (en) 2015-07-07 2015-11-26 Private information protection method, device and system, and computer storage medium

Country Status (2)

Country Link
CN (1) CN106326765A (en)
WO (1) WO2017004925A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103840942A (en) * 2014-02-19 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Data protection system and method
CN104318170A (en) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 Multi-mobile terminal-based data security protection method and device
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103840942A (en) * 2014-02-19 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Data protection system and method
CN104318170A (en) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 Multi-mobile terminal-based data security protection method and device
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device

Also Published As

Publication number Publication date
CN106326765A (en) 2017-01-11

Similar Documents

Publication Publication Date Title
EP3086587B1 (en) Method and apparatus for transmitting and receiving encrypted message between terminals
US9390293B2 (en) Device, method, and system for secure mobile data storage
US9571280B2 (en) Application integrity protection via secure interaction and processing
CA2701061C (en) Method and system for recovering a security credential
US20170046509A1 (en) Securing sensor data
KR102065833B1 (en) Data synchronization method and device
EP3092838B1 (en) Secure voice and data method and system
CN112165490B (en) Encryption method, decryption method, storage medium and terminal equipment
CN107766701B (en) Electronic equipment, dynamic library file protection method and device
CN112291268B (en) Information transmission method, device, equipment and storage medium
US20140245027A1 (en) Device and method for providing safety of data by using multiple modes in device
EP2775745A1 (en) Method and system for providing information using a consent procedure executed by means of near-field communication
CA2891610C (en) Agent for providing security cloud service and security token device for security cloud service
EP4037250A1 (en) Message transmitting system with hardware security module
US8781128B2 (en) Method and device for automatically distributing updated key material
WO2017004925A1 (en) Private information protection method, device and system, and computer storage medium
CN105451201A (en) Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal
KR101759443B1 (en) A private data security apparatus of the communication terminal for remote service
KR102380107B1 (en) Encryption system
CA2738555C (en) Method and device for automatically distributing updated key material
KR101678789B1 (en) User terminal and Method for sharing of encrypted data using the same
JP2007201885A (en) Information processing system, information processor, information processing method and program
JP2013074386A (en) Information leakage prevention system for portable terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15897579

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15897579

Country of ref document: EP

Kind code of ref document: A1