Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User privacy data protection method and mobile terminal using user privacy data protection method

A mobile terminal, user privacy technology, applied in the direction of preventing unauthorized use of memory, instruments, characters and pattern recognition, etc., can solve problems such as decreased user satisfaction, affecting user convenience, and rejecting users, and achieves saving of password input. time, avoid the risk of forgetting passwords, and improve the effect of user experience

Inactive Publication Date: 2013-01-16
SAMSUNG ELECTRONICS CHINA R&D CENT +1
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Recently, there have also been mobile terminals that use the face recognition function to save the process of entering passwords, but when it is recognized that the user is not the owner of the mobile terminal, any operation by the user on the mobile terminal is directly rejected
[0004] The method of entering the password has two disadvantages. One is that it is quite cumbersome to use, and the password must be entered every time before viewing the encrypted content, which interferes with the normal use of the mobile terminal by the user, resulting in a decline in user satisfaction; the other is that when the mobile terminal is unlocked, If it is obtained by others before it is unlocked, you can still enter the mobile terminal to browse contacts, short messages, files, etc., and still fail to meet the confidentiality measures
On the other hand, for the method of using the face recognition function to identify the user, although there is no need to manually enter the password, the mobile terminal will be automatically locked when it is recognized that the user is not the owner of the mobile terminal, which will affect the convenience of users who borrow the mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User privacy data protection method and mobile terminal using user privacy data protection method
  • User privacy data protection method and mobile terminal using user privacy data protection method
  • User privacy data protection method and mobile terminal using user privacy data protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Embodiments of the invention will now be described in detail, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like parts throughout. The embodiments are described below in order to explain the present invention by referring to the figures.

[0025] figure 1 It is a block diagram showing a mobile terminal for protecting user privacy data according to an embodiment of the present invention. According to an embodiment of the present invention, the mobile terminal may be a mobile phone. However, the present invention is not limited thereto, and the mobile terminal may also be a PDA, PMP, IPAD, etc.

[0026] refer to figure 1 , the mobile terminal includes a controller 100 , a display unit 102 , an input unit 104 , a memory 106 , a user privacy data protection unit 108 , a communication unit 112 , an antenna 114 , a codec 116 , a microphone 118 and a speaker 120 .

[0027] The controller 100 controls the overall op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user privacy data protection method and a mobile terminal using the user privacy data protection method. The user privacy data protection method comprises the following steps of: (a) periodically taking a user face image, and performing face identification on the taken user face image; (b) when an identification result indicates that a current user is not the owner of the mobile terminal, automatically hiding encrypted contents in the mobile terminal, and adding 1 to a counting value of a first counter; (c) if the counting value of the first counter reaches a first threshold, driving a display unit of the mobile terminal to display a password input interface to request a user to input a password; (d) if the number of times of continuous input of a wrong password reaches a second threshold, starting a self-destruction system of the mobile terminal; and (e) when the identification result indicates that the current user is the owner of the mobile terminal, activating all functions of the mobile terminal, and resetting the first counter.

Description

technical field [0001] The present invention relates to a method for protecting user privacy data and a mobile terminal using the method, more specifically, to a method for protecting user privacy data that automatically hides encrypted content based on face recognition technology and a mobile terminal using the method. Background technique [0002] With the development of science and technology, the functions of mobile terminals (such as mobile phones, personal digital assistants (PDA), portable multimedia players (PMP), IPAD, etc.) are becoming more and more powerful, and users have increasingly strong requirements for mobile terminal security . When using a mobile terminal, a lot of privacy data will be stored in the mobile terminal. For business people, the portable mobile terminal is a device that holds all the information. Therefore, once the private data stored in the mobile terminal spreads, the loss caused is by no means the value of a mobile terminal itself. In ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14G06K9/00
Inventor 王绍辉吉亮杨阳
Owner SAMSUNG ELECTRONICS CHINA R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products