Data protection device and data protection method

A technology for data protection and private files, applied in the field of communications, it can solve problems such as forgetting encryption, and achieve the effect of simplifying operations, realizing automatic encryption, and avoiding privacy leakage.

Inactive Publication Date: 2014-05-28
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the mobile phone may take pictures or copy pictures at any time during use, it is impossible for users to encrypt pictures immediately after generating pictures in real time, so they often forget to encrypt due to negligence, and in the information security of the terminal, not only images Information, SMS / email and other applications also have potential security risks, so if you want to protect user information security, just encrypting pictures is not enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection device and data protection method
  • Data protection device and data protection method
  • Data protection device and data protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0038] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0039] figure 1 A schematic structural diagram of a data protection device according to an embodiment of the present invention is shown.

[0040] Such as figure 1 As shown, the data protection dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data protection device and a data protection method. The data protection device comprises a setting unit and a processing unit. The setting unit adds any feather image in a terminal to a secret file according to a received setting command, wherein the feature images include facial images. The processing unit searches the terminal for a target file related to the feature image and adds the target file to the secret file. The processing unit comprises a comparison unit used for obtaining all the facial images stored in the terminal, and comparing the feather image with each facial image in all the facial images according to the comparison result. The first extraction unit confirms the facial similarity of each facial image and the feature image according to the comparison result, extracts the facial images with the facial similarity larger than preset facial similarity, and adds the facial images to the secret file. By means of the technical scheme, automatic encryption of files can be achieved, and the encryption operation is simplified.

Description

technical field [0001] The present invention relates to the technical field of communications, and in particular, to a data protection device and a data protection method. Background technique [0002] With the advancement of science and technology, the mobile Internet has become an inevitable trend. As a communication tool, the terminal (mobile phone, tablet computer) can also navigate, shop, take pictures, check information, watch movies, etc. Many users' personal information is stored in the terminal. Therefore, the information security of the terminal is becoming more and more important, and the most widely involved is the privacy of pictures. For this reason, many companies have developed a lot of encrypted program software for users to manually hide or encrypt files. [0003] The current methods of encrypting pictures all require the user to find the file to be encrypted, and then hide or encrypt the file. However, since the mobile phone may take pictures or copy pict...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6209
Inventor 黄立军
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products