WO2017166689A1 - Procédé et dispositif de protection de la confidentialité - Google Patents

Procédé et dispositif de protection de la confidentialité Download PDF

Info

Publication number
WO2017166689A1
WO2017166689A1 PCT/CN2016/097463 CN2016097463W WO2017166689A1 WO 2017166689 A1 WO2017166689 A1 WO 2017166689A1 CN 2016097463 W CN2016097463 W CN 2016097463W WO 2017166689 A1 WO2017166689 A1 WO 2017166689A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
mobile terminal
level
password
fingerprint information
Prior art date
Application number
PCT/CN2016/097463
Other languages
English (en)
Chinese (zh)
Inventor
成伟男
张充
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017166689A1 publication Critical patent/WO2017166689A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present invention relates to the field of mobile terminal technologies, and in particular, to a method and an apparatus for privacy protection.
  • the fingerprint recognition function is generally applied to unlocking a mobile phone or replacing a password in a quick payment, which brings a lot of convenience for the user to use the mobile phone.
  • the privacy information in the mobile phone such as photos, short messages, call records, and the like, can be browsed and operated by other people, resulting in a security risk in the private information in the mobile terminal.
  • the embodiment of the invention provides a method and a device for protecting privacy, which can solve the problem that the privacy information in the mobile terminal in the prior art has a security risk.
  • a method of privacy protection including:
  • the operation authority corresponding to the low privilege level is set, and the low privilege level is lower than the current privilege level.
  • a device for privacy protection the device being applied to a mobile terminal, the device comprising:
  • a receiving unit configured to receive fingerprint information input by a user
  • a determining unit configured to determine a permission level corresponding to the fingerprint information received by the receiving unit
  • a setting unit configured to set an operation right corresponding to the authority level determined by the determining unit When the non-operation time of the mobile terminal reaches the preset time, the operation authority corresponding to the low privilege level is set, and the low privilege level is lower than the current privilege level.
  • the method and device for protecting the privacy provided by the embodiment of the present invention firstly receive the fingerprint information input by the user, determine the permission level corresponding to the fingerprint information, and set the operation authority corresponding to the permission level, when the non-operation time of the mobile terminal reaches the preset time.
  • the low privilege level is lower than the current privilege level.
  • the mobile terminal sets the operation authority according to the privilege level, so that only the user with the viewing privacy privilege can view the private information in the mobile terminal, and when the unoperated time of the mobile terminal reaches the preset time, the mobile terminal The operation authority is reduced, the privacy information in the mobile terminal is prevented from being snooped by others, and the security of the privacy information in the mobile terminal is improved.
  • FIG. 1 is a flowchart of a method for privacy protection according to an embodiment of the present invention
  • FIG. 3 is a flowchart of another method for privacy protection according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a logical structure of an apparatus for privacy protection according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a logical structure of another apparatus for privacy protection according to an embodiment of the present invention.
  • the embodiment of the present invention provides a method for protecting the privacy.
  • the method is applied to the mobile terminal. As shown in FIG. 1 , the method includes:
  • the mobile terminal can perform subsequent steps according to the fingerprint information input by the user.
  • the corresponding relationship between the fingerprint information and the privilege level is set in advance and stored in the mobile terminal. After receiving the fingerprint information input by the user, the mobile terminal identifies the fingerprint information, and further stores the fingerprint information and the privilege level from the mobile terminal. The correspondence relationship determines the permission level corresponding to the currently received fingerprint information.
  • the privilege level includes at least the highest privilege level, and the operation privilege corresponding to the highest privilege level is to allow operation on all information in the mobile terminal.
  • the mobile terminal may respond to a request by the user to open a private short message or a call record, and according to the user.
  • the requested request displays private information such as a private message or call history.
  • the privilege level in the embodiment of the present invention may include only the highest privilege level and the common privilege level.
  • the operation privilege corresponding to the common privilege level is: allowing non-private information in the mobile terminal to operate, but not allowing the mobile The private information in the terminal operates. Under the operation authority corresponding to the normal permission level, the mobile terminal hides the private information and does not respond to the received request for viewing the private information.
  • multiple privilege levels may be included in the embodiment of the present invention, for example, the highest level, the second level, and the third level.
  • Each level of privilege level corresponds to a respective operation authority, starting from the highest level.
  • the operation authority corresponding to each level of the privilege level is gradually weakened, or each level of privilege level corresponds to the operation authority of different types of applications in the mobile terminal, but only the operation authority corresponding to the highest privilege level allows the operation of the private information of the mobile terminal. .
  • the mobile terminal identifies the fingerprint information, and when determining that the fingerprint information is legal fingerprint information, the mobile terminal successfully unlocks.
  • the operation authority of the current mobile terminal is set as the operation authority corresponding to the privilege level.
  • the mobile terminal when the mobile terminal is not operated within a preset time, in order to prevent others from snooping on the private information in the mobile terminal, the mobile terminal automatically sets the operation authority to the operation authority corresponding to the low privilege level, and the low privilege level is lower than Current privilege level.
  • the preset time may be 30 seconds.
  • the privilege level includes the highest privilege level and the normal privilege level
  • the current operation authority of the mobile terminal is the operation authority corresponding to the highest privilege level. If the mobile terminal is not operated in 30 seconds. , the mobile terminal will set the operation authority to the operation authority corresponding to the normal permission level.
  • the method for privacy protection provided by the embodiment of the present invention first receives fingerprint information input by a user, determines a permission level corresponding to the fingerprint information, and sets an operation authority corresponding to the permission level.
  • the operation authority corresponding to the low privilege level is set, and the low privilege level is lower than the current privilege level.
  • the different fingerprint information in the embodiment of the present invention corresponds to different permission levels, and the mobile terminal sets the operation authority according to the permission level, so that only the user with the viewing privacy permission can view the privacy in the mobile terminal.
  • the method includes:
  • the fingerprint information input by the user for the first time refers to the fingerprint information that the mobile terminal has not saved.
  • the mobile terminal sets the permission level corresponding to the fingerprint information to the highest privilege level, and sets the operation authority corresponding to the highest privilege level to Allows all information in the mobile terminal to operate.
  • the mobile terminal can receive the operation permission corresponding to the highest privilege level.
  • the other fingerprint information sets the permission level corresponding to the other fingerprint information according to the instruction input by the user on the setting interface of the mobile terminal.
  • the execution order between the steps 201-202 and the step 203 is not limited, and multiple permission levels may be set in advance, and the operation authority corresponding to each permission level may be set, or in the above step 202. After the permission level corresponding to the fingerprint information input by the user is set, the operation authority corresponding to the permission level is set, which is not limited by the present invention.
  • the mobile terminal can be unlocked by inputting a password. Therefore, the unlock password and the private password of the mobile terminal need to be set in advance.
  • the unlock password is used to unlock the mobile terminal, and the private password is used to determine whether the operation authority corresponding to the highest privilege level can be enabled.
  • step 204 does not limit the order of execution between step 204 and steps 201-202 and step 203 above.
  • FIG. 1 is a flow of the default fingerprint verification success, and the embodiment of the present invention also provides fingerprint verification.
  • step 102 When the fingerprint verification is successful, step 102 is performed. When the fingerprint verification fails, step 302 is performed.
  • step 304 is performed; otherwise, the unlocking is refused, and no other operations are performed.
  • step 306 When the received private password is the same as the private password set in advance, the verification succeeds, and step 306 is performed; otherwise, the verification fails, and step 307 is performed.
  • the private information of the mobile terminal is hidden, and only information other than the private information can be displayed.
  • step 307 is to set the operation authority corresponding to the normal privilege level.
  • step 104 needs to be performed.
  • the privacy protection method when the user unlocks the mobile terminal by using the password, the private password still needs to be verified. Only after the private password is successfully verified, the mobile terminal is set to the highest level of the privilege level.
  • the operation authority is that the user can view the private information in the mobile terminal only when the mobile terminal is in the operation authority corresponding to the highest level of the permission level. Therefore, if the private password verification fails, the private information in the mobile terminal cannot be viewed, and the mobile terminal is avoided.
  • the privacy information is snooped by others, improving the security of private information in mobile terminals.
  • the embodiment of the present invention further provides a device for privacy protection, which is applied to a mobile terminal.
  • the device includes: a receiving unit 401, and a determining unit 402. Setting unit 403;
  • the receiving unit 401 is configured to receive fingerprint information input by the user;
  • a determining unit 402 configured to determine a permission level corresponding to the fingerprint information received by the receiving unit 401;
  • a setting unit 403 configured to set an operation authority corresponding to the permission level determined by the determining unit 402; when the non-operation time of the mobile terminal reaches a preset time, setting an operation authority corresponding to the low authority level, the low authority level being lower than the current Permission level.
  • the receiving unit 401 is further configured to receive fingerprint information that is input by the user for the first time;
  • the setting unit 403 is further configured to set a permission level corresponding to the fingerprint information input by the user for the first time; and set an operation authority corresponding to each permission level.
  • the privilege level includes the highest privilege level, and the operation privilege corresponding to the highest privilege level is to allow operation on all information in the mobile terminal.
  • the setting unit 403 is further configured to set an unlock password and a private password corresponding to the highest privilege level.
  • the apparatus further includes: a verification unit 404, a prompting unit 405,
  • the verification unit 404 is configured to identify fingerprint information input by the user
  • the prompting unit 405 is configured to prompt the user to input an unlocking password when the fingerprint recognition fails;
  • the receiving unit 401 is further configured to receive an unlock password input by the user.
  • the verification unit 404 is further configured to verify the unlock password received by the receiving unit 401;
  • the prompting unit 405 is further configured to prompt the user to input a private password when the unlock password verification succeeds;
  • the receiving unit 401 is further configured to receive a private password input by the user.
  • the verification unit 404 is further configured to verify the private password received by the receiving unit 401;
  • the setting unit 403 is further configured to: when the private password verification succeeds, set the operation authority corresponding to the highest privilege level; when the private password verification fails, set the operation authority corresponding to the second advanced privilege level.
  • the receiving unit receives the fingerprint information input by the user, the determining unit determines the permission level corresponding to the fingerprint information, and the setting unit sets the operation authority corresponding to the permission level, when the non-operation time of the mobile terminal reaches When the time is preset, the operation authority corresponding to the low privilege level is set, and the low privilege level is lower than the current privilege level.
  • the different fingerprint information corresponds to different privilege levels, and the mobile terminal sets the operation authority according to the privilege level, so that only the user with the viewing privacy privilege can view the privilege level.
  • the privacy information in the mobile terminal and when the non-operation time of the mobile terminal reaches the preset time, the mobile terminal reduces the operation authority, avoids the privacy information in the mobile terminal being snooped by others, and improves the security of the privacy information in the mobile terminal. Sex.
  • the present invention can be implemented by means of software plus necessary general hardware, and of course, by hardware, but in many cases, the former is a better implementation. .
  • the technical solution of the present invention which is essential or contributes to the prior art, can be embodied in the form of a software product stored in a readable storage medium, such as a floppy disk of a computer.
  • a hard disk or optical disk, etc. includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un procédé et un dispositif de protection de la confidentialité, se rapportant au domaine de la technologie des terminaux mobiles, et capables de pallier les risques de sécurité qui existent dans les informations de confidentialité présentes dans un terminal mobile dans l'état antérieur de la technique. Le procédé consiste à recevoir les informations d'empreinte digitale introduites par un utilisateur (101), à déterminer un niveau d'habilitation correspondant aux informations d'empreinte digitale (102), à spécifier une habilitation d'utilisation correspondant au niveau d'habilitation (103), à spécifier, lorsque le temps de non-utilisation du terminal mobile atteint un temps prédéfini, une habilitation d'utilisation correspondant à un bas niveau d'habilitation, le bas niveau d'habilitation étant inférieur au niveau actuel d'habilitation (104). Il convient pour protéger les informations de confidentialité présentes dans le terminal mobile.
PCT/CN2016/097463 2016-03-31 2016-08-31 Procédé et dispositif de protection de la confidentialité WO2017166689A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610199768.5 2016-03-31
CN201610199768.5A CN105809007A (zh) 2016-03-31 2016-03-31 一种隐私保护的方法及装置

Publications (1)

Publication Number Publication Date
WO2017166689A1 true WO2017166689A1 (fr) 2017-10-05

Family

ID=56459455

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/097463 WO2017166689A1 (fr) 2016-03-31 2016-08-31 Procédé et dispositif de protection de la confidentialité

Country Status (2)

Country Link
CN (1) CN105809007A (fr)
WO (1) WO2017166689A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711177A (zh) * 2018-12-14 2019-05-03 国家电网有限公司 基于生物信息识别的数据安全管理方法及终端设备
CN113378135A (zh) * 2021-06-08 2021-09-10 华中科技大学 一种用于计算机隐私数据查询验证的方法
WO2023123493A1 (fr) * 2021-12-31 2023-07-06 华为技术有限公司 Procédé et appareil de gestion de données

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809007A (zh) * 2016-03-31 2016-07-27 宇龙计算机通信科技(深圳)有限公司 一种隐私保护的方法及装置
CN106355141B (zh) * 2016-08-24 2020-11-10 上海传英信息技术有限公司 可携式电子装置及其操作方法
CN107798224A (zh) * 2016-09-07 2018-03-13 中兴通讯股份有限公司 一种终端控制方法及装置、用户终端
WO2019051692A1 (fr) * 2017-09-13 2019-03-21 深圳传音通讯有限公司 Procédé de protection d'informations privées, terminal et support de stockage lisible par ordinateur
CN110674486A (zh) * 2019-09-25 2020-01-10 珠海格力电器股份有限公司 一种终端安全控制方法、存储介质及终端设备

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390126A (zh) * 2012-05-09 2013-11-13 腾讯科技(深圳)有限公司 一种使用权限管理方法和装置
WO2013187789A1 (fr) * 2012-06-14 2013-12-19 Vlatacom D.O.O. Système et procédé pour un contrôle d'accès biométrique de haute sécurité
CN103955638A (zh) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 隐私保护方法和装置
CN104065823A (zh) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 移动终端的基于虹膜识别技术的用户模式控制方法及系统
CN105208211A (zh) * 2015-09-29 2015-12-30 努比亚技术有限公司 一种隐私保护装置、方法及移动终端
CN105208008A (zh) * 2015-08-27 2015-12-30 宇龙计算机通信科技(深圳)有限公司 基于指纹识别的账户登录方法、装置和终端
CN105809007A (zh) * 2016-03-31 2016-07-27 宇龙计算机通信科技(深圳)有限公司 一种隐私保护的方法及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101384048A (zh) * 2008-09-08 2009-03-11 中兴通讯股份有限公司 信息管理方法以及移动终端
CN102855426B (zh) * 2012-08-03 2015-09-09 广东欧珀移动通信有限公司 一种基于Android的用户管理方法
CN103902862B (zh) * 2012-12-30 2018-04-27 联想(北京)有限公司 一种移动设备管理方法、装置及一种移动设备

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390126A (zh) * 2012-05-09 2013-11-13 腾讯科技(深圳)有限公司 一种使用权限管理方法和装置
WO2013187789A1 (fr) * 2012-06-14 2013-12-19 Vlatacom D.O.O. Système et procédé pour un contrôle d'accès biométrique de haute sécurité
CN103955638A (zh) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 隐私保护方法和装置
CN104065823A (zh) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 移动终端的基于虹膜识别技术的用户模式控制方法及系统
CN105208008A (zh) * 2015-08-27 2015-12-30 宇龙计算机通信科技(深圳)有限公司 基于指纹识别的账户登录方法、装置和终端
CN105208211A (zh) * 2015-09-29 2015-12-30 努比亚技术有限公司 一种隐私保护装置、方法及移动终端
CN105809007A (zh) * 2016-03-31 2016-07-27 宇龙计算机通信科技(深圳)有限公司 一种隐私保护的方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711177A (zh) * 2018-12-14 2019-05-03 国家电网有限公司 基于生物信息识别的数据安全管理方法及终端设备
CN113378135A (zh) * 2021-06-08 2021-09-10 华中科技大学 一种用于计算机隐私数据查询验证的方法
CN113378135B (zh) * 2021-06-08 2023-08-25 华中科技大学 一种用于计算机隐私数据查询验证的方法
WO2023123493A1 (fr) * 2021-12-31 2023-07-06 华为技术有限公司 Procédé et appareil de gestion de données

Also Published As

Publication number Publication date
CN105809007A (zh) 2016-07-27

Similar Documents

Publication Publication Date Title
WO2017166689A1 (fr) Procédé et dispositif de protection de la confidentialité
US9396352B2 (en) System and method to provide server control for access to mobile client data
US20200042723A1 (en) Identity fraud risk engine platform
US8955076B1 (en) Controlling access to a protected resource using multiple user devices
US9781105B2 (en) Fallback identity authentication techniques
JP6571203B2 (ja) モバイル端末のプライバシー保護方法および保護装置、並びにモバイル端末
US8931081B2 (en) Device identification for externalizing password from device coupled with user control of external password service
CN103813334A (zh) 权限控制方法和权限控制装置
US20040243824A1 (en) Securely authorizing the performance of actions
US10110578B1 (en) Source-inclusive credential verification
JP2013537758A (ja) オペレーティングシステムのロックを解除する方法及び装置
WO2015117332A1 (fr) Procédé et dispositif pour activer une interface en mode de débogage usb, et terminal
WO2017020426A1 (fr) Procédé, appareil et système de communication reposant sur une identification de caractéristiques biologiques
WO2019047148A1 (fr) Procédé de vérification de mot de passe, terminal, et support de stockage lisible par ordinateur
CN111433770A (zh) 用户选择的密钥认证
US20150047019A1 (en) Information processing method and electronic device
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
KR101719511B1 (ko) 네트워크를 사용하여 게이트에 대한 액세스 허용 여부를 결정하는 방법, 서버 및 컴퓨터 판독 가능한 기록 매체
CN112887922B (zh) 消息发送方法和电子设备
WO2018006349A1 (fr) Procédé et système de vérification de l'entrée d'un utilisateur sur la base d'un mot de passe de type image
WO2018006326A1 (fr) Procédé et système de vérification basés sur un dispositif de sécurité d'entrée intelligent au moyen d'un terminal mobile et d'un mot de passe de type image
WO2017166359A1 (fr) Procédé d'accès à un domaine utilisateur, dispositif d'accès et terminal mobile
JP2007310630A (ja) 本人認証機能のリカバリシステム及びリカバリ方法
EP3467693B1 (fr) Procédé et appareil de vérification d'identité
CN105975841A (zh) 一种基于加密狗锁定/解锁电脑屏幕的方法

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16896459

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16896459

Country of ref document: EP

Kind code of ref document: A1