WO2017004925A1 - Procédé, dispositif et système de protection d'informations privées et support d'informations pour ordinateur - Google Patents

Procédé, dispositif et système de protection d'informations privées et support d'informations pour ordinateur Download PDF

Info

Publication number
WO2017004925A1
WO2017004925A1 PCT/CN2015/095649 CN2015095649W WO2017004925A1 WO 2017004925 A1 WO2017004925 A1 WO 2017004925A1 CN 2015095649 W CN2015095649 W CN 2015095649W WO 2017004925 A1 WO2017004925 A1 WO 2017004925A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
wearable device
private information
information
private
Prior art date
Application number
PCT/CN2015/095649
Other languages
English (en)
Chinese (zh)
Inventor
孙子文
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017004925A1 publication Critical patent/WO2017004925A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • the present invention relates to information security technologies in the field of communications, and in particular, to a method, device and system for protecting private information, and a computer storage medium.
  • the information security technology of the current terminal is mainly performed by transmitting encrypted information, encrypting the keyboard lock, hiding the encrypted inbox or folder, and setting a private contact by physically partitioning the contacts in the mobile phone address book.
  • these security methods are likely to lead to accidental disclosure of user private information. For example, a user may put a mobile phone aside after entering an instant messaging application, causing it to be viewed by others.
  • the embodiment of the invention provides a method, a device and a system for protecting private information, and a computer storage medium, which can effectively prevent the private information inside the terminal from being leaked due to an accident.
  • an embodiment of the present invention provides a method for protecting private information, where the method is applied to a wearable device that is connected to a terminal device, where the method includes:
  • the wearable device sends encrypted comparison information to the terminal
  • the wearable device detects an encryption status of the terminal private information
  • the wearable device When the terminal private information is in a non-encrypted state, the wearable device sends a control And the control instruction for hiding, by the terminal, the private information.
  • the encrypted comparison information includes: a picture having at least one image feature or a preset password comparison character string.
  • the method further includes: the wearable device receiving the private information sent by the terminal.
  • the method further includes: the wearable device sending the decryption information to the terminal;
  • the decryption information is used by the terminal to compare with the encrypted comparison information, and controls the hidden state of the private information according to the comparison result.
  • the embodiment of the present invention provides a method for protecting private information, where the method is applied to a terminal device that is connected to a wearable device, and the method includes:
  • the terminal When the terminal private information is in a non-encrypted state, the terminal receives a control instruction sent by the wearable device for controlling the terminal to hide the private information, and according to the control instruction Private information is hidden.
  • the encrypted comparison information includes: a picture having at least one image feature or a preset password comparison character string.
  • the method further includes: the terminal sending its own private information to the wearable device.
  • the method further includes:
  • the terminal compares the decrypted information with the encrypted comparison information
  • the hidden state of the private information is converted into a public state.
  • an embodiment of the present invention provides a wearable device, where the wearable device includes: a first sending unit, a first detecting unit, where
  • the first sending unit is configured to send the encrypted comparison information to the terminal
  • the first detecting unit is configured to detect an encryption state of the terminal private information; and trigger the first sending unit when the terminal private information is in an unencrypted state;
  • the first sending unit is further configured to send a control instruction for controlling the terminal to hide the private information.
  • the wearable device further includes a first receiving unit configured to receive the private information sent by the terminal.
  • the first sending unit is further configured to send decryption information to the terminal; wherein the decryption information is used by the terminal to compare with the encrypted comparison information, and the control is performed according to a comparison result.
  • the hidden state of private information is further configured to send decryption information to the terminal; wherein the decryption information is used by the terminal to compare with the encrypted comparison information, and the control is performed according to a comparison result.
  • an embodiment of the present invention provides a terminal, where the terminal includes: a second receiving unit, a second detecting unit, a second sending unit, and a control unit;
  • the second receiving unit is configured to receive the encrypted comparison information sent by the wearable device; and receive the detection instruction sent by the wearable device; wherein the detection instruction is used to indicate that the terminal is to the user The encryption status of the private information is detected and fed back;
  • the second detecting unit is configured to detect an encryption state of the private information of the terminal itself
  • the second sending unit is configured to send an encrypted state of the terminal's own private information to the wearable device
  • the second receiving unit is further configured to receive, by the wearable device, a control instruction for controlling the terminal to hide the private information
  • the control unit is configured to hide its own private information according to the control instruction.
  • the second sending unit is further configured to send the private information of the device to the wearable device.
  • the second receiving unit is further configured to receive decryption information sent by the wearable device
  • the terminal further includes a comparing unit configured to compare the decrypted information with the encrypted comparison information; and triggering the control unit when the decrypted information is consistent with the encrypted comparison information;
  • the control unit is further configured to convert the hidden state of the private information into a public state.
  • an embodiment of the present invention provides a system for protecting private information, where the system includes a wearable device and a terminal, where the terminal and the wearable device complete a pairing connection;
  • the wearable device is configured to send encrypted comparison information to the terminal.
  • the terminal is configured to receive encrypted comparison information sent by the wearable device.
  • an embodiment of the present invention provides a computer storage medium, where the computer storage medium stores executable instructions, where the executable instructions are used to perform the foregoing protection private message. Interest method.
  • the embodiment of the invention provides a method, a device and a system for protecting private information, and a computer storage medium, which can transmit the encrypted comparison information to the terminal through the wearable device and control the hiding or disclosure of the private information in the terminal, thereby effectively avoiding the terminal. Internal private information is leaked due to an accident.
  • FIG. 1 is a schematic flowchart of a method for protecting private information according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of another method for protecting private information according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of a method for protecting private information according to an embodiment of the present disclosure
  • FIG. 4 is a schematic diagram of an encryption comparison information according to an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of decrypting private information hidden and hidden by a terminal by a wearable device according to an embodiment of the present disclosure
  • FIG. 6 is a schematic diagram of decryption information according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a wearable device according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of another wearable device according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of another terminal according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic structural diagram of a system for protecting private information according to an embodiment of the present invention.
  • the method can be applied to the wearable device that is connected to the terminal device, such as a smart watch, smart glasses, etc., and can effectively protect the private information of the terminal.
  • the method can include:
  • S101 The wearable device sends the encrypted comparison information to the terminal.
  • the encryption comparison information may be used as a reference for comparing the received decrypted messages in the subsequent decryption process of the wearable device; in this embodiment, the encrypted comparison information may include a picture with at least one image feature or Set the password comparison string.
  • S102 The wearable device detects an encryption status of the terminal private information.
  • the private information described in this embodiment may include a contact of a relatively sensitive terminal address book/instant messaging software saved by the terminal, and may also include a call record and a message chat record with the contacts; This embodiment does not specifically limit this.
  • the terminal can hide the private information according to the operation of the user. Therefore, when the terminal has hidden the private information, that is, the terminal private information is already in an encrypted state, the wearable The device does not need to hide the private information again.
  • the method may further include: the wearable device receives the private information sent by the terminal; understandably, the wearable device implements the wearable after receiving the private message sent by the terminal.
  • the device synchronizes with the private message of the terminal, so that the private message can be synchronously downloaded to the terminal when necessary, for example, after the terminal is re-flashed or upgraded.
  • the specific process of encrypting and hiding the private message in the terminal by the wearable device is implemented in steps S101 to S103, so that when the user is away from the terminal, the terminal can perform the transmission of the encrypted comparison information and the pair through the wearable device.
  • the hiding of private information in the terminal or The control is publicly disclosed, thereby effectively preventing the private information inside the terminal from being leaked due to an accident.
  • the embodiment may further include a process in which the wearable device decrypts the private information hidden by the terminal encryption, and the process may include:
  • the wearable device sends the decryption information to the terminal; the decrypted information is used by the terminal to compare with the encrypted comparison information, and controls the hidden state of the private information according to the comparison result.
  • the decryption information can be sent to the terminal through the wearable device, so that the terminal compares the decrypted information with the encrypted comparison information; When they are consistent, the terminal converts the hidden state of the private information into a public state.
  • An embodiment of the present invention provides a method for protecting private information of a terminal, which is applied to a wearable device, and sends the encrypted comparison information to the terminal and controls the hiding or disclosure of the private information in the terminal, thereby effectively avoiding the terminal. Internal private information is leaked due to an accident.
  • a flow of a method for protecting private information of a terminal is provided.
  • the method may be applied to a terminal device that is connected to a wearable device, and the terminal device is used.
  • Mobile terminals such as mobile phones, smart phones, notebook computers, digital broadcast receivers, personal digital assistants (PDAs), tablet computers (PADs), portable multimedia players (PMPs), navigation devices, and the like, as well as digital TVs,
  • PDAs personal digital assistants
  • PADs tablet computers
  • PMPs portable multimedia players
  • navigation devices and the like, as well as digital TVs, A fixed terminal for a desktop computer or the like.
  • the method can include:
  • S201 The terminal receives the encrypted comparison information sent by the wearable device.
  • the terminal saves the received encrypted comparison information as a reference for comparing the decrypted messages sent by the wearable device in the decryption process.
  • the encrypted comparison information may include: A picture of an image feature or a preset password comparison string.
  • S202 The terminal receives the detection instruction sent by the wearable device, and sends the encrypted status of the private information to the wearable device.
  • the detection instruction is used to instruct the terminal to detect and feedback the encryption status of the private information of the terminal.
  • the terminal When the terminal private information is in a non-encrypted state, the terminal receives a control instruction sent by the wearable device for controlling the terminal to hide the private information, and hides the private information according to the control instruction;
  • the terminal can also hide the private information according to the operation of the user. Therefore, after the terminal has hidden the private information, that is, the terminal private information is already in the encrypted state. When the wearable device does not need to hide the private information again.
  • the method may further include: the terminal transmitting the private information of the terminal to the wearable device; understandably, after the wearable device receives the private message sent by the terminal, the The wearer synchronizes with the private message of the terminal, so that the private message can be synchronously downloaded to the terminal when necessary, for example, after the terminal is re-flashed or upgraded.
  • the specific process of encrypting and hiding the private message of the terminal by the wearable device is implemented in steps S201 to S203, so that when the user is away from the terminal, the encrypted comparison information is sent to the terminal through the wearable device, and The hidden or public control of the private information in the terminal is controlled, thereby effectively preventing the private information inside the terminal from being leaked due to an accident.
  • the embodiment may further include a process in which the wearable device decrypts the private information hidden by the terminal encryption, and the process may include:
  • the terminal receives the decrypted information sent by the wearable device.
  • the terminal compares the decrypted information with the encrypted comparison information
  • the terminal converts the hidden state of the private information. To be public.
  • the decryption information can be sent to the terminal through the wearable device, so that the terminal compares the decrypted information with the encrypted comparison information; When they are consistent, the terminal converts the hidden state of the private information into a public state; when the two are inconsistent, the terminal continues to keep the hidden state of the private information.
  • An embodiment of the present invention provides a method for protecting private information of a terminal, which is applied to a wearable device, and sends the encrypted comparison information to the terminal and controls the hiding or disclosure of the private information in the terminal, thereby effectively avoiding the terminal. Internal private information is leaked due to an accident.
  • FIG. 3 shows a detailed process of a method for protecting private information of a terminal according to an embodiment of the present invention, which may specifically include:
  • S301 Perform a pairing connection between the terminal and the wearable device.
  • connection between the terminal and the wearable device can be performed by using a wireless device, such as a Bluetooth/Infrared/Fidelity (WIFI) or a wired connection.
  • a wireless device such as a Bluetooth/Infrared/Fidelity (WIFI) or a wired connection.
  • WIFI Bluetooth/Infrared/Fidelity
  • S302 The terminal turns on the hidden function of the private information.
  • the hidden function of the private information can be turned on and off by the terminal accepting the operation of the user.
  • S303 The wearable device sends the encrypted comparison information to the terminal.
  • the encrypted comparison information can be sent to the terminal through the wearable device worn by the user.
  • the encrypted comparison information may be an image having three feature regions, as shown in FIG. 4 . As shown, the dotted line indicates as the encrypted comparison information. The feature area of the image.
  • the wearable device after receiving the private message sent by the terminal, the wearable device synchronizes the private message of the wearable device with the terminal, so that the private message can be synchronously downloaded when necessary, for example, after the terminal is re-flashed or upgraded. Go to the terminal.
  • S305 The wearable device sends a detection instruction to the terminal.
  • the detection instruction is used to instruct the terminal to detect and feedback the encryption status of the private information of the terminal;
  • S306 The terminal detects an encryption status of the private information according to the detection instruction.
  • S307 The terminal sends the encrypted status of the private information to the wearable device.
  • the wearable device does not need to hide the private information again.
  • S309 The terminal hides its own private information according to the control instruction.
  • S501 The wearable device sends the decryption information to the terminal.
  • the encrypted comparison information is the image shown in FIG. 4, therefore, in the present embodiment, the decrypted information is an image as shown in FIG. 6; it can be seen that FIG. 6 and FIG. The dotted line portion between Figure 4 is uniform, while the solid line portions are inconsistent.
  • step S502 The terminal compares the decryption information with the encrypted comparison information; when the two are consistent, step S503 is performed; when the two are inconsistent, step S504 is performed;
  • step S504 is performed.
  • S503 The terminal converts the hidden state of the private information into a public state.
  • S504 The terminal continues to keep the hidden state of the private information.
  • steps S501 to S504 are decryption processes corresponding to the encryption process shown in FIG. 3, and still transmit the decryption information to the terminal through the wearable device to control the hidden state of the terminal's own private information, which can effectively Avoid leaking private information inside the terminal due to accidents.
  • a structure of a wearable device 70 may be included, which may include: a first sending unit 701, a first detecting unit 702;
  • the first sending unit 701 is configured to send the encrypted comparison information to the terminal;
  • the first detecting unit 702 is configured to detect the encryption status of the terminal private information; and when the terminal private information is in the non-encrypted state, trigger the first sending unit 701;
  • the first sending unit 701 is further configured to send a control instruction for controlling the terminal to hide the private information.
  • the wearable device 70 further includes a first receiving unit 703 configured to receive private information sent by the terminal.
  • the first sending unit 701 is further configured to send the decryption information to the terminal; wherein the decrypted information is used by the terminal to compare with the encrypted comparison information, and the hidden state of the private information is controlled according to the comparison result.
  • the first sending unit 701 and the first sending unit 701 may be implemented by an integrated circuit module in the wearable device 70 that supports Bluetooth/infrared/WIFI or wired communication; the first detecting unit 702 may be a processor in the wearable device 70, Implemented by a microprocessor, an application specific integrated circuit (ASIC), or a logic programmable gate array (FPGA).
  • ASIC application specific integrated circuit
  • FPGA logic programmable gate array
  • the embodiment of the present invention provides a wearable device 70, which sends the encrypted comparison information to the terminal through the wearable device 70 and controls the hiding or disclosure of the private information in the terminal, thereby effectively preventing the private information inside the terminal from being leaked due to an accident. .
  • a structure of a terminal 90 which may include: a second receiving unit 901, a second detecting unit 902, and a second sending unit 903. And a control unit 904; wherein
  • the second receiving unit 901 is configured to receive the encrypted comparison information sent by the wearable device, and receive the detection instruction sent by the wearable device, where the detection instruction is used to instruct the terminal to detect and feedback the encryption status of the private information of the terminal. ;
  • the second detecting unit 902 is configured to detect an encryption state of the private information of the terminal itself
  • the second sending unit 903 is configured to send the encrypted status of the terminal's own private information to the wearable device
  • the second receiving unit 901 is further configured to receive, by the wearable device, a control instruction for controlling the terminal to hide the private information;
  • the control unit 904 is configured to hide its own private information according to the control instruction.
  • the second sending unit 903 is further configured to send its own private information to the wearable device.
  • the second receiving unit 901 is further configured to receive the decryption information sent by the wearable device;
  • the terminal 90 further includes a comparing unit 905 configured to decrypt the decrypted information and the encrypted pair. Comparing with the information; and when the decrypted information is consistent with the encrypted comparison information, triggering control unit 904;
  • the control unit 904 is further configured to convert the hidden state of the private information into a public state.
  • the second sending unit 903 and the second receiving unit 901 can be implemented by an integrated circuit module in the terminal 90 that supports Bluetooth/infrared/WIFI or wired communication; the second detecting unit 902 can be implemented by the processor, the microprocessor in the terminal 90, An application specific integrated circuit (ASIC) or a logic programmable gate array (FPGA) implementation.
  • ASIC application specific integrated circuit
  • FPGA logic programmable gate array
  • the embodiment of the present invention provides a terminal 90, which transmits the encrypted comparison information to the terminal 90 through the wearable device and controls the hiding or disclosure of the private information in the terminal 90, thereby effectively preventing the private information inside the terminal 90 from being leaked due to an accident. .
  • the system 110 includes a wearable device 70 and a terminal 90. After the 90 is connected to the wearable device 70;
  • the wearable device 70 is configured to send the encrypted comparison information to the terminal 90;
  • the terminal 90 is configured to receive the encrypted comparison information sent by the wearable device 70;
  • the control command sent by the wearable device 70 for controlling the terminal 90 to hide the private information is received, and the private information of the terminal is hidden according to the control instruction.
  • the wearable device 70 is further configured to receive the private information sent by the terminal 90 after being paired with the terminal 90.
  • the wearable device 70 is further configured to send a decryption information to the terminal 90 after transmitting a control instruction for controlling the terminal 90 to hide the private information; wherein the decryption information is used by the terminal 90 Comparing with the encrypted comparison information, and controlling the hidden state of the private information according to the comparison result.
  • the terminal 90 After the terminal 90 is further configured to be paired with the wearable device 70, the terminal 90 sends its own private information to the wearable device 70.
  • the terminal 90 After the terminal 90 is further configured to hide the private information of the user according to the control instruction, the terminal 90 receives the decryption information sent by the wearable device 70; and performs the decryption information and the encrypted comparison information. Comparing; when the decrypted information is consistent with the encrypted comparison information, converting the hidden state of the private information into a public state.
  • the embodiment of the invention further describes a computer storage medium, wherein the computer storage medium stores executable instructions, and the executable instructions are used to execute the method for protecting private information as shown in any of the figures of FIG. 1 to FIG.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing storage medium includes: a mobile storage device, a random access memory (RAM), a read-only memory (ROM), a magnetic disk, or an optical disk.
  • RAM random access memory
  • ROM read-only memory
  • magnetic disk or an optical disk.
  • optical disk A medium that can store program code.
  • the above-described integrated unit of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in a contribution to the related art, and the computer software product is stored in a
  • the storage medium includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a RAM, a ROM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé, un dispositif et un système de protection d'informations privées ainsi qu'un support d'informations pour ordinateur. Le procédé est applicable à un appareil à porter qui est apparié et connecté à un appareil terminal. Le procédé comprend : (S101) la transmission à un terminal, par un appareil à porter, d'informations contrastives chiffrées ; (S102) la détection, par l'appareil à porter, de l'état de chiffrement d'informations privées dans le terminal ; et, (S103) lorsque les informations privées dans le terminal sont dans un état de non-chiffrement, la transmission, par l'appareil à porter, d'une instruction de commande destinée à commander le terminal afin de cacher les informations privées.
PCT/CN2015/095649 2015-07-07 2015-11-26 Procédé, dispositif et système de protection d'informations privées et support d'informations pour ordinateur WO2017004925A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510394066.8A CN106326765A (zh) 2015-07-07 2015-07-07 一种保护终端私密信息的方法、装置和系统
CN201510394066.8 2015-07-07

Publications (1)

Publication Number Publication Date
WO2017004925A1 true WO2017004925A1 (fr) 2017-01-12

Family

ID=57684751

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/095649 WO2017004925A1 (fr) 2015-07-07 2015-11-26 Procédé, dispositif et système de protection d'informations privées et support d'informations pour ordinateur

Country Status (2)

Country Link
CN (1) CN106326765A (fr)
WO (1) WO2017004925A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103840942A (zh) * 2014-02-19 2014-06-04 宇龙计算机通信科技(深圳)有限公司 数据保护系统及方法
CN104318170A (zh) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 一种基于多移动终端保护数据安全的方法及装置
CN104573536A (zh) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 文件保护方法及文件保护装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103840942A (zh) * 2014-02-19 2014-06-04 宇龙计算机通信科技(深圳)有限公司 数据保护系统及方法
CN104318170A (zh) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 一种基于多移动终端保护数据安全的方法及装置
CN104573536A (zh) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 文件保护方法及文件保护装置

Also Published As

Publication number Publication date
CN106326765A (zh) 2017-01-11

Similar Documents

Publication Publication Date Title
EP3086587B1 (fr) Procédé et appareil de transmission et de réception de message chiffré entre terminaux
US9390293B2 (en) Device, method, and system for secure mobile data storage
US9571280B2 (en) Application integrity protection via secure interaction and processing
CA2701061C (fr) Procede et systeme de recuperation d'une justification de securite
US20170046509A1 (en) Securing sensor data
KR102065833B1 (ko) 데이터 동기화 방법 및 장치
EP3092838B1 (fr) Procédé et système pour la sécurisation de voix et de données
CN112165490B (zh) 一种加密方法、解密方法、存储介质及终端设备
CN107766701B (zh) 电子设备、动态库文件保护方法及装置
CN112291268B (zh) 信息的传输方法、装置、设备以及存储介质
US20140245027A1 (en) Device and method for providing safety of data by using multiple modes in device
EP2775745A1 (fr) Procédé et système pour fournir des informations au moyen d'une procédure de consentement exécutée via une communication en champ proche
CA2891610C (fr) Agent dispensant un service de securite nuagique et dispositif de jeton de securite destine au service de securite nuagique
EP4037250A1 (fr) Système de transmission de message doté d'un module de sécurité de matériel
US8781128B2 (en) Method and device for automatically distributing updated key material
WO2017004925A1 (fr) Procédé, dispositif et système de protection d'informations privées et support d'informations pour ordinateur
CN105451201A (zh) 移动终端及其远程控制方法、装置及系统
KR101759443B1 (ko) 원격 서비스용 통신 단말기의 개인정보 보안장치
KR102380107B1 (ko) 암호화 시스템
CA2738555C (fr) Procede et dispositif pour la distribution automatique de materiel cle mis a jour
KR101678789B1 (ko) 사용자 단말기 및 그것을 이용한 암호화된 데이터 공유 방법
JP2007201885A (ja) 情報処理システム、情報処理装置、情報処理方法およびプログラム
JP2013074386A (ja) 携帯端末用情報漏洩防止システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15897579

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15897579

Country of ref document: EP

Kind code of ref document: A1