Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information privacy method and electronic terminal

An information security, electronic terminal technology, applied in the field of communication, can solve the problems of rigidity, complex information security methods, obvious security methods, etc.

Inactive Publication Date: 2013-06-26
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an information security method, which aims to solve the problems that the existing information security methods are complicated and rigid to use, and the security method is relatively obvious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information privacy method and electronic terminal
  • Information privacy method and electronic terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] figure 1 The implementation flow of the information security method provided by the embodiment of the present invention is shown, and the details are as follows:

[0036] In step S101, at least one biometric feature of a user is collected and stored.

[0037] In the present invention, the biometric feature of the user includes one or a combination of face, iris, handwriting, fingerprint, and gesture, but is not limited thereto.

[0038] The collection module of the user's biological characteristics can use the device that comes with the electronic terminal, or can be plugged into other dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of communication and provides an information privacy method and an electronic terminal. The information privacy method includes the following steps. Biological characteristics of a current user are collected. The biological characteristics of the current user are compared with at least one user biological characteristic stored in a biological characteristic base. The user biological characteristic is correlated with operation authority of information privacy. According to a comparison result, information that the current user is not supposed to know is automatically hidden. The biological characteristics of the current user are collected and compared with the stored biological characteristics. Based on the comparison result, the information that the current user is not supposed to know is automatically hidden. Thus, automatic identification can be performed without tedious log-in and code entering. Private information can be automatically hidden and a privacy manner is invisible and not easily observed by people.

Description

technical field [0001] The invention belongs to the communication field and relates to an information security method and an electronic terminal. Background technique [0002] With the development of society and the advancement of technology, various electronic terminals (such as mobile phones, tablet computers, notebook computers, cameras, electronic photo frames, desktop computers, televisions, etc.) have become an important part of people's lives. These electronic products often store valuable Personal private information, or certain information should not be disclosed to specific users. In some scenarios, this kind of information confidentiality behavior should not be too obvious, and it is not appropriate to let others know. [0003] For such problems, most electronic terminals do not take protective measures at present, which sometimes brings a lot of embarrassing situations to people. The existing solutions are roughly: adopt multi-user management, use different acco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/60
Inventor 李琳
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products