Unlock instant, AI-driven research and patent intelligence for your innovation.
Data protection method and device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A data protection and data technology, applied in the direction of digital data protection, digital data authentication, etc.
Active Publication Date: 2013-05-01
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 46 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] The purpose of the embodiments of the present invention is to provide a data protection method to solve the problem of how to control the data open authority to open data when different users use mobile terminals
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0023] figure 1 The data protection implementation process provided by the first embodiment of the present invention is shown, and the process is described in detail as follows:
[0024] Step S101, acquiring face image information facing the screen of the mobile terminal.
[0025] At present, passwords, patterns, etc. have been used as unlocking or booting methods; this embodiment also has the function of the above-mentioned unlocking or booting methods, and a data protection function is added on this basis, and the data protection function provides the method. In the data protection mode, the data protection provided by this method is realized by enabling the data protection function.
[0026] In order to prevent users who have not obtained the data open permission from seeing the private data, setting a password or pattern unlock method may destroy the friendship, the user can enable the data protection function, which can avoid destroying the friendship and protect the pri...
Embodiment 2
[0054] figure 2 The composition structure of the data protection device provided by the second embodiment of the present invention is shown, and for the convenience of description, only the parts related to the embodiment of the present invention are shown.
[0055] The data protection device can be a software unit, a hardware unit, or a combination of software and hardware running in each terminal device (such as a tablet computer, a smart phone), or it can be integrated into the terminal device as an independent pendant or run on a In the application system of the terminal device.
[0056] The present embodiment provides a data protection device, which can include a face image information unit 21, an extraction unit 22, a comparison unit 23, an authority acquisition unit 24, and a data opening unit 25, wherein each functional unit is described in detail as follows:
[0057] The face image information unit 21 is configured to acquire face image information facing the screen...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention is suitable for the field of mobile terminals, and provides a data protection method and a data protection device. The method comprises the following steps of: acquiring face image information of a person facing a mobile terminal-oriented screen, extracting face characteristic data according to the face image information, comparing the face characteristic data with a preset face characteristic data template, and acquiring a data opening right according to the comparative result and a data opening right table; and when different users use the mobile terminal, acquiring face image information, extracting face characteristic data, identifying user identities according to the face characteristic data template, and acquiring a corresponding data opening right to open data. According to the data protection method and the data protection device, different data rights are opened for different users, so that personal data, private data and private authentication data are protected effectively.
Description
technical field [0001] The invention belongs to the field of mobile terminals, and in particular relates to a data protection method and device. Background technique [0002] Currently, with the popularization of mobile terminals, users can use the mobile terminals to browse information. Various data are stored in the mobile terminal, and relevant authorized network data can also be browsed through the stored various authentication data. Some private or sensitive data is not suitable for friends or strangers to see, especially if the mobile terminal is accidentally lost, which may easily cause personal data leakage. When relatives and friends want to play with mobile terminals, the existing unlocking methods such as passwords or patterns are not friendly enough; the "retrieve the phone" function after the phone is lost also needs to rely on a remote server; how to avoid data in a simple and flexible way Leakage, data management has become an urgent problem to be solved. ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.