WO2018209897A1 - Procédé et appareil de commande de charge, support de stockage et dispositif informatique - Google Patents

Procédé et appareil de commande de charge, support de stockage et dispositif informatique Download PDF

Info

Publication number
WO2018209897A1
WO2018209897A1 PCT/CN2017/108284 CN2017108284W WO2018209897A1 WO 2018209897 A1 WO2018209897 A1 WO 2018209897A1 CN 2017108284 W CN2017108284 W CN 2017108284W WO 2018209897 A1 WO2018209897 A1 WO 2018209897A1
Authority
WO
WIPO (PCT)
Prior art keywords
location data
sensitive information
current location
terminal
security
Prior art date
Application number
PCT/CN2017/108284
Other languages
English (en)
Chinese (zh)
Inventor
陈秋红
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2018209897A1 publication Critical patent/WO2018209897A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Definitions

  • the present application relates to the field of information security technologies, and in particular, to a method, device, storage medium, and computer device for displaying sensitive information.
  • smart terminals With the development and popularization of smart terminals, people's lives have become convenient. More and more users are accustomed to storing sensitive information in smart terminals, such as diaries, privacy photos, bank card information, and so on. Therefore, it is very important for smart terminals to perform security verification on users before displaying sensitive information. At present, smart terminals can set security authentication such as passwords, fingerprints, and faces at some sensitive information entrances to ensure the security of sensitive information of users.
  • a method, apparatus, storage medium, and computer device for displaying sensitive information are provided.
  • a method for displaying sensitive information includes: receiving a display instruction for sensitive information; acquiring current location data of the terminal according to the display instruction of the sensitive information; comparing the current location data with the pre- Whether the set security location data matches; and when the current location data matches the preset secure location data, the sensitive information is displayed on the terminal.
  • a sensitive information display device comprising: a display instruction receiving module, configured to receive a display instruction for sensitive information; and a current location data obtaining module, configured to acquire current location data of the terminal according to the display instruction for the sensitive information; a current location data matching module, configured to compare whether the current location data and the preset security location data match; and a sensitive information display module, configured to: when the current location data and the preset security location data match, in the terminal The sensitive information is shown on the display.
  • a computer device comprising a memory and one or more processors, the memory storing computer readable instructions, the computer readable instructions being executed by the processor, causing the one or more processors to execute The following steps: receiving a display instruction for sensitive information; acquiring current location data of the terminal according to the display instruction of the sensitive information; comparing whether the current location data and the preset security location data match; and when the current location data and When the preset security location data matches, the sensitive information is displayed on the terminal.
  • One or more non-transitory readable storage mediums storing computer readable instructions, when executed by one or more processors, cause the one or more processors to perform the steps of: receiving And displaying the current location data of the terminal according to the display instruction of the sensitive information; comparing whether the current location data and the preset security location data match; and when the current location data and the preset security When the location data matches, the sensitive information is displayed on the terminal.
  • 1 is an application environment diagram of a method for displaying sensitive information in an embodiment
  • FIG. 2 is a flow chart of a method for displaying sensitive information in an embodiment
  • FIG. 3 is a flow chart of a method for displaying sensitive information in another embodiment
  • FIG. 4 is a structural block diagram of a sensitive information display device in an embodiment
  • FIG. 5 is a structural block diagram of a sensitive information display apparatus in another embodiment
  • Figure 6 is a diagram showing the internal structure of a terminal in an embodiment.
  • terminal 110 can be located by signaling with positioning background 120.
  • the terminal 110 includes, but is not limited to, a device having a positioning function such as a mobile phone, a tablet computer, a portable notebook, or a smart wearable device.
  • the positioning background 120 is configured to provide the current location data of the terminal 110 to the terminal 110.
  • the positioning background 110 may include, but is not limited to, a positioning background by means of GPS (Global Positioning System) positioning, Beidou positioning, Wi-Fi positioning, and the like.
  • the terminal 110 stores sensitive information, wherein the sensitive information may be data including sensitive information, including but not limited to short messages, diaries, privacy photos, and bank card information.
  • the terminal 110 Before displaying the sensitive information, the terminal 110 can connect to the positioning background 120 through signal transmission, and receive the geographical location data of the terminal 110 that is located in the positioning background 120. Comparing whether the current location data and the preset security location data match; when the current location data matches the preset security location data, the sensitive information is displayed on the terminal.
  • a method for displaying sensitive information comprising:
  • Step S202 receiving a display instruction for sensitive information.
  • Sensitive information means that when it is consulted by a non-target audience, it will be the owner or phase of the information. Information about the loss caused by the object. Sensitive information includes, but is not limited to, a combination of one or more of text, images, videos, and web links, such as text messages, diaries, privacy photos, and bank card information.
  • the sensitive information may be part or all of the data stored in the terminal, or the data obtained from the server may be used as sensitive information, such as the balance of the bank account queried after the terminal is connected to the network.
  • the method before triggering the display instruction for the sensitive information, the method further includes receiving an operation instruction of the user, and determining whether the information related to the operation instruction belongs to the preset sensitive information, and if yes, triggering the display instruction for the sensitive information.
  • the operation instruction includes an operation instruction for performing a password change, a payment request, a view of media information such as a picture or a short message, and the like. For example, after receiving the operation instruction of the user's password change, it can be determined that the operation of changing the password involves sensitive information, that is, password information, and thus triggers the display instruction of the sensitive information.
  • the terminal includes a touch screen, such as a capacitive screen or an electronic screen, and a corresponding command can be generated by receiving a click operation on a control displayed on the touch screen.
  • the terminal may provide a corresponding interface for the sensitive information to be displayed, and the interface includes a corresponding control for receiving the display instruction for the sensitive information, and triggering the display instruction for the sensitive information when detecting the click operation acting on the control .
  • the corresponding display instruction for sensitive information is triggered without providing corresponding controls to simplify the operation of displaying sensitive information.
  • the terminal may detect the display operation performed by the user, and determine whether the display object affected by the display operation includes a preset sensitive information to be displayed, and if so, the instruction corresponding to the display operation is Display instructions for sensitive information.
  • Step S204 Acquire current location data of the terminal according to the display instruction of the sensitive information.
  • a positioning system is preset in the terminal. After the terminal receives the display instruction for the sensitive information, the terminal may trigger the positioning system, and may transmit the signal to the positioning background to obtain the current location data corresponding to the geographical location where the terminal is located.
  • the current location data includes, but is not limited to, two-dimensional position data composed of longitude and latitude, or three-dimensional position data composed of longitude, latitude, and altitude.
  • the terminal can be built with a SIM (Subscriber Identification Module) card, and the GPS signal is transmitted to the GPS satellite positioning background to achieve positioning.
  • SIM Subscriber Identification Module
  • the terminal can be built with the Beidou satellite navigation receiver chip, by receiving signals transmitted by the satellite, and passing through According to the distance formula in the three-dimensional coordinates, the latitude and longitude and elevation of the terminal can be obtained.
  • the terminal may also acquire data corresponding to the location of the terminal in real time or at a preset time interval when the display operation of the sensitive information is not received, and use the data acquired each time as the current location data. Therefore, the time for the terminal to acquire the current location data after the request is reduced, and the efficiency of displaying the sensitive information by the terminal is improved.
  • Step S206 comparing whether the current location data and the preset security location data match. If yes, go to step S208; otherwise, go to step S210.
  • the preset security location data also includes but is not limited to two-dimensional location data composed of longitude and latitude, or three-dimensional position data composed of longitude, latitude and altitude, and the like. combination.
  • the security location data is pre-configured in the terminal, and can be compared with the current location data fed back to the terminal by the received positioning background.
  • the preset security location data may be data corresponding to one or more security locations located by specific latitude and longitude. When the current location of the terminal coincides with the security location located by the specific latitude and longitude, the current location data and the pre-determination are determined. Set the security location data to match.
  • the preset security location data may also be data corresponding to one or more security zones, wherein the security zone may be a security zone centered on a specific latitude and longitude corresponding to the location and radiused by a preset safety distance, such as The location of the office seat is set to a specific safe location. When the distance between the location corresponding to the current location data and the office seat is less than or equal to the security distance, it is determined that the current location data matches the preset security location data.
  • the security area may be a range of irregular areas, such as a certain building, a certain cell, etc., and when the location corresponding to the current location data is within the range, it is determined that the current location data matches the preset security location data.
  • Step S208 displaying sensitive information on the terminal.
  • the manner of displaying sensitive information includes, but is not limited to, displaying a combination of one or more data types of text, pictures, videos, and webpage link data stored in the terminal on the display screen of the terminal, or acquiring text from the server through terminal networking, A combination of one or more data types, such as pictures, videos, and web page link data, wherein the server includes, but is not limited to, an application server or a web server. For example, when the current location data matches the preset secure location data, the user can log in to the online bank through the browser on the terminal to view the account balance.
  • step S210 no sensitive information is displayed.
  • the terminal may provide a corresponding interface for the sensitive information to be displayed, where the interface includes a corresponding control for receiving the display instruction for the sensitive information, where the current location data and the preset security location data do not match.
  • the click operation on the control cannot trigger the display of sensitive information.
  • the terminal may display the prompt information that the terminal is not in the secure location, for example, when the current location data and the preset secure location data do not match, the click operation of the control for receiving the display instruction for the sensitive information is received. After that, the information box that is not in the safe location is popped up, and after a preset time, for example, after 2 seconds, the interface for displaying sensitive information is returned.
  • a shielding layer may be disposed on the display location corresponding to the sensitive information, and the shielding layer is used to block the display of the sensitive information.
  • the moving position of the sensitive information on the display screen can be obtained in real time, and the shielding layer is correspondingly moved to block the sensitive information in real time;
  • the entire interface is shielded, such as blurring the interface containing sensitive information, so that the user cannot clearly view the sensitive information. Or encrypting the sensitive information and displaying it in the form of cipher text, so that the user cannot directly view the sensitive information.
  • the terminal is preset with a corresponding password verification device, and the method for displaying the sensitive information further includes the step of password verification.
  • the terminal may provide a corresponding password verification interface for the step of password verification, and the interface may include a corresponding control for receiving the password verification instruction, and when receiving the password verification instruction, such as receiving a click operation on the corresponding control, Perform the password verification step.
  • the method of password verification includes, but is not limited to, verification by a password, a fingerprint, a face, and the like.
  • the password may be a combination of one or more of numbers, letters or other characters having a preset length.
  • the fingerprint can be collected through the fingerprint collection device built in the terminal. Faces can be built into the face recognition device built into the terminal
  • the order of the password verification step is not limited.
  • the terminal enters the password verification interface, prompts the user to perform password verification, and obtains the current location data of the terminal after the password verification is passed. If not, the user is prompted to verify the password and cannot view the sensitive information.
  • the terminal can display a password verification interface for password verification.
  • the current location data and secure location data matching steps and password verification steps can be performed simultaneously.
  • the preset location data is used to verify the current location data of the terminal when the display instruction for the sensitive information is received, and the corresponding sensitive information can be displayed only when the current location data matches the security location data. Because the geographical location data is too rich, it is difficult for the cracker to perform the traversal operation to obtain the secure location data, which improves the difficulty of cracking sensitive information. Moreover, the geographical location data is determined by positioning, and the user does not need to manually input for verification, thereby improving the convenience of displaying sensitive information.
  • the current location data fed back to the terminal by the received location background is compared with all preset security locations, and any one of the current location data and the secure location data is secure.
  • the location data is matched to display sensitive information corresponding to the display instructions.
  • a list of secure location data can be presented and a set operation that acts on more than one secure location data in the list can be received.
  • the setting operations include, but are not limited to, adding secure location data, deleting secure location data, or changing secure location data.
  • the terminal may perform a secure location recommendation on the user according to the duration and/or frequency at which the terminal stays at different geographic locations.
  • the location may be recommended to the user as a secure location when the terminal is in a certain geographic location for a longer period of time than the preset duration. For example, when the user averages more than three hours per day in a restaurant for five consecutive days, the location of the hotel is recommended to the user as a secure location.
  • the secure location corresponding to the secure location data includes a secure point location, which may be a specific point location consisting of longitude and latitude, or a specific point location of the three-dimensional location data combination consisting of longitude, latitude, and altitude.
  • the sensitive information can be displayed on the terminal when the current location corresponding to the current location data of the terminal is at the location.
  • the security location corresponding to the security location data includes a security zone location, wherein the security zone location may be a security zone bit centered on a specific latitude and longitude corresponding location
  • the current position data corresponding to the current position data is determined to match the preset safety distance data when the distance from the center of the circle is less than the preset safety distance.
  • the location of the security zone may be an area of an irregular area, such as a certain building, a certain cell, etc., when the location corresponding to the current location data is within the range, determining that the current location data matches the preset security location data .
  • the location sequence corresponding to the geographical location may also be used as the location of the security zone, including but not limited to the zip code.
  • the zip code corresponding to the security location is 518000, and when the location of the terminal is detected in the Luohu zone of Shenzhen, the current The location data matches the preset security location data.
  • the sensitive information may be classified according to its sensitivity or sensitive type.
  • the method for displaying sensitive information further includes:
  • Step S205 reading the security location data corresponding to the security level of the sensitive information.
  • Each sensitive information has a corresponding security level, and each security level has corresponding security location data.
  • the terminal may read the security level of the corresponding sensitive information according to the display instruction of the sensitive information, and read the corresponding security location data according to the security level.
  • Step S206 includes comparing whether the current location data and the security location data corresponding to the security level of the sensitive information match, and if so, displaying the corresponding sensitive information.
  • the security location data corresponding to the security level may include the same security location data as the security level, or may also be the security location data that is the same as the security level and higher than the security level.
  • the terminal Show privacy photos, bank card information and text messages.
  • the terminal can display the bank card information and the short message but not Can display privacy photos.
  • the sensitive information that the terminal can display is a short message, and the privacy photo and the bank card information cannot be displayed.
  • step S206 includes reading the security location data corresponding to the security level of the sensitive information.
  • the terminal can read the security level of the corresponding sensitive information according to the display instruction of the sensitive information, and read the corresponding security location data according to the security level, and match the current location data with the corresponding security location data, if matched, Then perform the corresponding password verification.
  • the terminal Before displaying sensitive information, the terminal may have corresponding password verification methods in different geographical locations. For example, a complex password authentication method is adopted in a public place, and the sensitive information is displayed when the password verification is passed. For example, when the current location is in your home, the user can view the privacy photo by sliding to unlock. When the current location is in the office, the user can check the privacy photo by entering a password for password verification. The current location is in the frequent coffee shop, the user You can view your privacy photos with fingerprint password verification.
  • a complex password authentication method is adopted in a public place, and the sensitive information is displayed when the password verification is passed.
  • the user can view the privacy photo by sliding to unlock.
  • the user can check the privacy photo by entering a password for password verification.
  • the current location is in the frequent coffee shop, the user You can view your privacy photos with fingerprint password verification.
  • the sensitive information is divided into security levels, and the corresponding security location data with security level is set, or the corresponding password verification mode is set according to the security level of the security location data, so that the sensitive information is better hierarchically managed and improved.
  • Protect sensitive information is not limited to any security level.
  • the location data of the connection terminal connected by the terminal in short-range wireless communication mode is acquired, and the location data of the connection terminal is used as the current location data of the terminal.
  • short-range wireless communication methods include, but are not limited to, wireless communication methods such as Bluetooth, Wi-Fi, NFC (Near Field Communication).
  • the terminal may obtain the current location data of the terminal by using a Wi-Fi positioning manner, where the current location data may be the number of locations corresponding to the location where the Wi-Fi identifier of the Wi-Fi connected to the terminal is located.
  • the Wi-Fi logo is an identification of a Wi-Fi-enabled signal source, including but not limited to a cell phone, a router, a notebook, and the like.
  • the terminal itself When the terminal itself is not in a secure location, it is still determined that the current location data of the terminal matches the security location data, and the corresponding information can be displayed. Sensitive information.
  • the area covered by the Wi-Fi sent by the Wi-Fi identifier may be used as a secure location, and when the terminal is connected to the Wi-Fi, it may be determined that the current location data of the terminal matches the secure location data.
  • the sensitive information includes payment information; the presentation instructions include display instructions for the payment information generated in accordance with the payment request.
  • the payment request is a request for performing a payment operation, and the payment information is sensitive information involved in performing a payment operation, such as an account balance, a payment amount, a bank card account number, and the like.
  • the corresponding display instruction for the payment information may be generated according to the payment request, and the current location data and the preset security location data are compared according to the display instruction, for example, the current location data corresponding to the current location data of the terminal may be calculated.
  • the distance between the location and the specific security location corresponding to each preset specific security location data detecting whether each calculated distance is within a preset safety distance of the corresponding security location, and if so, displaying the payment information. And make a payment operation.
  • the password verification may be performed before calculating the distance between the current location information and each preset specific security location, or before performing the payment operation, where the password verification manner includes but is not limited to by password, fingerprint, The face is verified, and after the password verification is passed, the next step is performed.
  • a sensitive information display device comprising:
  • the instruction receiving module 402 is configured to receive a display instruction for sensitive information.
  • the current location data obtaining module 404 is configured to obtain current location data of the terminal according to the display instruction for the sensitive information.
  • the current location data matching module 406 is configured to compare whether the current location data and the preset security location data match.
  • the sensitive information display module 408 is configured to match the current location data and the preset secure location data. Display sensitive information on the terminal.
  • the preset security location data includes more than one security location data
  • the current location data matching module 406 is further configured to compare whether any one of the current location data and the preset security location data matches.
  • the security location corresponding to the security location data includes a security zone location
  • the current location data matching module 406 is further configured to compare whether the current location corresponding to the current location data is within the secure zone location.
  • the sensitive information includes more than one sensitive information.
  • the sensitive information display device further includes:
  • the secure location data reading module 405 is configured to read secure location data corresponding to the security level of the sensitive information.
  • the current location data matching module 406 is also used to compare the current location data with the secure location data corresponding to the security level of the sensitive information.
  • the current location data acquisition module 404 is further configured to acquire location data of the connection terminal that the terminal connects in short-range wireless communication manner, and use location data of the connection terminal as current location data of the terminal.
  • the sensitive information includes payment information
  • the display instruction receiving module 402 is further configured to receive a display instruction for the payment information generated according to the payment request.
  • the above sensitive information presentation apparatus can be implemented in the form of a computer readable instruction that can be run on a computer device as shown in FIG.
  • Each of the above-described sensitive information display devices may be implemented in whole or in part by software, hardware, and combinations thereof.
  • the above modules may be embedded in the hardware of the terminal or may be stored in the memory of the terminal in a software form, so that the processor calls the execution of the operations corresponding to the above modules.
  • the processor can be a central processing unit (CPU), a microprocessor, a microcontroller, or the like.
  • one or more non-transitory readable storage media having computer readable instructions that, when executed by one or more processors, cause one or more processors to execute The following steps: receiving display instructions for sensitive information; based on the exhibition of sensitive information The instruction acquires the current location data of the terminal; compares whether the current location data and the preset security location data match; when the current location data matches the preset security location data, the sensitive information is displayed on the terminal.
  • the preset security location data includes more than one secure location data
  • the step of comparing the current location data performed by the processor with the preset security location data includes: comparing the current location data with the preset Whether any of the secure location data in the secure location data matches.
  • the security location corresponding to the security location data includes a security zone location
  • the step of comparing the current location data performed by the processor with the preset security location data includes: comparing whether the current location corresponding to the current location data is In the safe area location.
  • the sensitive information includes more than one sensitive information
  • comparing whether the current location data and the preset security location data performed by the processor match comprises: comparing whether the current location data and the corresponding security location data match.
  • the step of acquiring, by the processor, the current location data of the terminal according to the display instruction for the sensitive information comprises: acquiring location data of the connection terminal connected by the terminal in short-range wireless communication manner, and connecting the location data of the terminal As the current location data of the terminal.
  • the sensitive information includes payment information
  • the step of receiving the display instruction for the sensitive information by the one or more processors includes receiving a display instruction for the payment information generated according to the payment request.
  • a computer apparatus comprising a memory and one or more processors having stored therein computer readable instructions that, when executed by a processor, cause one or more processors to execute The following steps: receiving a display instruction for the sensitive information; obtaining the current location data of the terminal according to the display instruction of the sensitive information; comparing whether the current location data and the preset security location data match; and matching the current location data with the preset security location data Display sensitive information on the terminal.
  • the preset security location data includes more than one secure location data
  • the step of comparing the current location data and the preset security location data performed by the processor is performed, The method includes: comparing whether any one of the current location data and the preset security location data matches.
  • the security location corresponding to the security location data includes a security zone location
  • the step of comparing the current location data performed by the processor with the preset security location data includes: comparing whether the current location corresponding to the current location data is In the safe area location.
  • the sensitive information includes more than one sensitive information
  • comparing whether the current location data and the preset security location data performed by the processor match comprises: comparing whether the current location data and the corresponding security location data match.
  • the step of acquiring, by the processor, the current location data of the terminal according to the display instruction for the sensitive information comprises: acquiring location data of the connection terminal connected by the terminal in short-range wireless communication manner, and connecting the location data of the terminal As the current location data of the terminal.
  • the sensitive information includes payment information
  • the step of the processor executing the receiving the display of the sensitive information comprises receiving a display instruction for the payment information generated in accordance with the payment request.
  • the computer device described above may include, but is not limited to, a mobile phone, a tablet, a portable notebook, or a smart wearable device.
  • FIG. 6 it is a schematic diagram of the internal structure of the terminal in one embodiment.
  • the terminal includes a processor, a memory and a network interface, and a display screen connected through a system bus.
  • the processor of the terminal is used to provide calculation and control capabilities to support the operation of the entire terminal.
  • the memory is used to store data, instruction codes, etc., and the network interface is used for network communication with the positioning background 120.
  • At least one computer readable instruction is stored on the memory, the computer readable instructions being executable by the processor to implement the server-enabled sensitive information presentation method provided in the embodiments of the present application.
  • the memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, or a read-only memory (ROM).
  • the memory includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium of the terminal stores an operating system, a database, and computer readable instructions.
  • the database stores data related to implementing a sensitive information presentation method provided by the above various embodiments, such as storing secure location data.
  • the computer readable instructions can be The processor is configured to implement a sensitive information presentation method provided by the above various embodiments.
  • the internal memory in the terminal provides a cached operating environment for operating systems, databases, and computer readable instructions in a non-volatile storage medium.
  • the network interface may be an Ethernet card or a wireless network card or the like for communicating with an external terminal or server.
  • the display screen of the terminal may be a touch screen, such as a capacitive screen or an electronic screen, and a corresponding instruction may be generated by receiving a click operation of a control applied to the touch screen.
  • the structure of the terminal shown in FIG. 6 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the terminal to which the solution of the present application is applied. It includes more or fewer components than those shown in the figures, or some components are combined, or have different component arrangements.
  • the terminal in the figure may also include a camera or the like.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

L'invention concerne un procédé et un appareil de commande de charge, un support de stockage et un dispositif informatique. Le procédé consiste à : recevoir une instruction d'affichage d'informations sensibles; obtenir des données de position actuelle d'un terminal selon l'instruction d'affichage des informations sensibles; à comparer si les données de position actuelle correspondent à des données de position de sécurité préétablies ou non; si les données de position actuelle correspondent aux données de position de sécurité préétablies, à afficher les informations sensibles sur le terminal.
PCT/CN2017/108284 2017-05-19 2017-10-30 Procédé et appareil de commande de charge, support de stockage et dispositif informatique WO2018209897A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710359426.XA CN107665313B (zh) 2017-05-19 2017-05-19 敏感信息展示方法、装置、存储介质和计算机设备
CN201710359426.X 2017-05-19

Publications (1)

Publication Number Publication Date
WO2018209897A1 true WO2018209897A1 (fr) 2018-11-22

Family

ID=61121785

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/108284 WO2018209897A1 (fr) 2017-05-19 2017-10-30 Procédé et appareil de commande de charge, support de stockage et dispositif informatique

Country Status (2)

Country Link
CN (1) CN107665313B (fr)
WO (1) WO2018209897A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399252A (zh) * 2018-03-05 2018-08-14 广东欧珀移动通信有限公司 信息处理方法、移动终端及计算机可读存储介质
CN110401621A (zh) * 2018-04-25 2019-11-01 中国移动通信集团有限公司 一种敏感指令的防护方法、设备及存储介质
CN109753265A (zh) * 2019-01-08 2019-05-14 合肥联宝信息技术有限公司 一种控制方法及电子设备
CN116401651B (zh) * 2023-06-08 2023-09-19 深圳市晨歌电子有限公司 一种信息存储安全防护方法、系统及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615940A (zh) * 2014-10-27 2015-05-13 腾讯科技(深圳)有限公司 敏感信息显示方法及装置
CN104700266A (zh) * 2015-03-16 2015-06-10 深圳酷派技术有限公司 一种安全支付方法及装置
US20160014148A1 (en) * 2014-07-10 2016-01-14 Soteria Systems Llc Web anomaly detection apparatus and method
CN105471823A (zh) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 一种敏感信息处理方法、装置、服务器及安全判定系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289752A (zh) * 2011-07-18 2011-12-21 北京融易通信息技术有限公司 一种基于暗号的移动支付方法及系统
CN105306204B (zh) * 2014-07-04 2020-07-10 腾讯科技(深圳)有限公司 安全验证方法、装置及系统
US9779271B2 (en) * 2015-06-08 2017-10-03 Juniper Networks, Inc. Apparatus, system, and method for detecting theft of network devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160014148A1 (en) * 2014-07-10 2016-01-14 Soteria Systems Llc Web anomaly detection apparatus and method
CN105471823A (zh) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 一种敏感信息处理方法、装置、服务器及安全判定系统
CN104615940A (zh) * 2014-10-27 2015-05-13 腾讯科技(深圳)有限公司 敏感信息显示方法及装置
CN104700266A (zh) * 2015-03-16 2015-06-10 深圳酷派技术有限公司 一种安全支付方法及装置

Also Published As

Publication number Publication date
CN107665313B (zh) 2019-08-09
CN107665313A (zh) 2018-02-06

Similar Documents

Publication Publication Date Title
US10645069B2 (en) Location service for user authentication
CN105306204B (zh) 安全验证方法、装置及系统
US10455419B2 (en) System and method for mobile identity protection for online user authentication
US10243944B2 (en) Systems and methods for location-based device security
US10783275B1 (en) Electronic alerts for confidential content disclosures
US10623959B1 (en) Augmented reality security access
US10776464B2 (en) System and method for adaptive application of authentication policies
US10362042B2 (en) Method for transmitting verification information and terminal
EP3200417B1 (fr) Procédé et dispositif pour l'interaction d'informations et l'association entre données de caractéristiques biologiques humaines et un compte
WO2018209897A1 (fr) Procédé et appareil de commande de charge, support de stockage et dispositif informatique
US20160173501A1 (en) Managing electronic account access control
KR102118294B1 (ko) 무선 네트워크 유형 검출 방법과 장치, 및 전자 디바이스
KR102436509B1 (ko) 임시 계정 정보를 제공하는 방법, 장치 및 시스템
US10318722B2 (en) Power charger authorization for a user equipment via a cryptographic handshake
US20170171177A1 (en) Authentication via item recognition
WO2017201874A1 (fr) Procédé et appareil permettant d'indiquer une perte de terminal
US20180034750A1 (en) Instant messaging method, server, and storage medium
US10169619B2 (en) Physical token based secured charge management of a user equipment
US20200374283A1 (en) Cognitive behavioral and environmental access
US10127407B2 (en) Location defined power charger management authorization for a user equipment
US9686285B2 (en) Securely transmitting authentication information
JP2017058749A (ja) 認証装置、認証方法及び認証プログラム
WO2019090584A1 (fr) Procédé et système d'inscription de compte pour terminal intelligent
CN113515318A (zh) 一种应用程序的登录方法、装置及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17910118

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 09.03.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17910118

Country of ref document: EP

Kind code of ref document: A1