Data protection method and device

A data protection and data technology, applied in the direction of digital data protection, digital data authentication, etc.

Active Publication Date: 2013-05-01
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the embodiments of the present invention is to provide a data protection method to solv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and device
  • Data protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] figure 1 The data protection implementation process provided by the first embodiment of the present invention is shown, and the process is described in detail as follows:

[0024] Step S101, acquiring face image information facing the screen of the mobile terminal.

[0025] At present, passwords, patterns, etc. have been used as unlocking or booting methods; this embodiment also has the function of the above-mentioned unlocking or booting methods, and a data protection function is added on this basis, and the data protection function provides the method. In the data protection mode, the data protection provided by this method is realized by enabling the data protection function.

[0026] In order to prevent users who have not obtained the data open permission from seeing the private data, setting a password or pattern unlock method may destroy the friendship, the user can enable the data protection function, which can avoid destroying the friendship and protect the pri...

Embodiment 2

[0054] figure 2 The composition structure of the data protection device provided by the second embodiment of the present invention is shown, and for the convenience of description, only the parts related to the embodiment of the present invention are shown.

[0055] The data protection device can be a software unit, a hardware unit, or a combination of software and hardware running in each terminal device (such as a tablet computer, a smart phone), or it can be integrated into the terminal device as an independent pendant or run on a In the application system of the terminal device.

[0056] The present embodiment provides a data protection device, which can include a face image information unit 21, an extraction unit 22, a comparison unit 23, an authority acquisition unit 24, and a data opening unit 25, wherein each functional unit is described in detail as follows:

[0057] The face image information unit 21 is configured to acquire face image information facing the screen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the field of mobile terminals, and provides a data protection method and a data protection device. The method comprises the following steps of: acquiring face image information of a person facing a mobile terminal-oriented screen, extracting face characteristic data according to the face image information, comparing the face characteristic data with a preset face characteristic data template, and acquiring a data opening right according to the comparative result and a data opening right table; and when different users use the mobile terminal, acquiring face image information, extracting face characteristic data, identifying user identities according to the face characteristic data template, and acquiring a corresponding data opening right to open data. According to the data protection method and the data protection device, different data rights are opened for different users, so that personal data, private data and private authentication data are protected effectively.

Description

technical field [0001] The invention belongs to the field of mobile terminals, and in particular relates to a data protection method and device. Background technique [0002] Currently, with the popularization of mobile terminals, users can use the mobile terminals to browse information. Various data are stored in the mobile terminal, and relevant authorized network data can also be browsed through the stored various authentication data. Some private or sensitive data is not suitable for friends or strangers to see, especially if the mobile terminal is accidentally lost, which may easily cause personal data leakage. When relatives and friends want to play with mobile terminals, the existing unlocking methods such as passwords or patterns are not friendly enough; the "retrieve the phone" function after the phone is lost also needs to rely on a remote server; how to avoid data in a simple and flexible way Leakage, data management has become an urgent problem to be solved. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/62
Inventor 颜伟
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products