Personnel information safety management method and management device

A technology of information security and management method, applied in the field of personal information security management method and management device, can solve the problems of increasing mobile phone, user loss, leakage, etc., and achieve the effect of reducing leakage risk and improving effectiveness

Active Publication Date: 2014-10-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since mobile phones often store a large amount of personal privacy information that users do not want others to know, once leaked, it will bring irreparable losses to users, so how to effectively protect users' personal information in mobile phones has always been a major problem in the industry.
[0003] In the prior art, the method of password unlocking is generally used to protect the personal information security of mobile phone users, but using password unlocking itself is a kind of leaking behavior. When a mobile phone user unlocks through a password, his behavior is equivalent to telling the people around The storage of personal privacy information of mobile phone users virtually increases the risk of mobile phone leaks and reduces the effectiveness of personal information security management in mobile phones

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personnel information safety management method and management device
  • Personnel information safety management method and management device
  • Personnel information safety management method and management device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0018] figure 1 It is a flow chart of the personal information security management method provided in the first embodiment. Such as figure 1 As shown, the personal information security management method in this embodiment includes the following steps:

[0019] Step S11 , setting an unlocking method of the user terminal according to an instruction input by the user, marking the personal information specified by the user as hidden, and the unlocking method includes a first unlocking method and a second unlocking method.

[0020] The unlocking method set according to the instruction input by the user is used to unlock the screen when the user terminal screen is locked, and may include a face recognition unlocking method, a password unlocking method, a fingerprint recognition unlocking method, a voiceprint recognition unlocking method, a graphic code unlocking method, and Gesture unlocking methods, etc. In the embodiment of the present invention, the user terminal can set at le...

no. 2 example

[0037] Figure 4 It is a flow chart of the personal information security management method provided by the second embodiment of the present invention. Such as Figure 4 As shown, the personal information security management method in this embodiment includes the following steps:

[0038] Step S21, responding to a user's boot command, starting the user terminal to enter the desktop of the first system.

[0039] In the embodiment of the present invention, the user terminal enters the desktop of the first system every time it is activated in response to the user's boot command, that is, after each boot, the user terminal does not display the personal information marked as hidden to the current user of the user terminal. Information, so that the illegal user of the user terminal can be prevented from obtaining the personal information of the user of the user terminal by switching on and off, thereby improving the effectiveness of personal information security management in the u...

no. 3 example

[0052] Figure 5 A schematic structural diagram of a personal information security management device provided in the third embodiment. The personal information security management device provided in this embodiment can be used to implement the personal information security management method in the first embodiment. Such as Figure 5 As shown, the personal information security management device 10 includes an unlocking mode and information setting module 11 , a user unlocking motion detection module 12 , an unlocking mode judging module 13 , a first system desktop switching module 14 , and a second system desktop switching module 15 .

[0053] Wherein, the unlocking method and information setting module 11 is used to set the unlocking method according to the instruction input by the user, and mark the personal information specified by the user as hidden, and the unlocking method includes a first unlocking method and a second unlocking method. The user's unlocking action detec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a personnel information safety management method, which is used for managing personnel information in a user terminal, and comprises the following steps that: an unlocking mode of the user terminal is set according to instructions input by a user, and the personnel information specified by the user is marked into hidden information; the unlocking action of the user is detected; whether an unlocking mode corresponding to the unlocking action of the user is a first unlocking mode or not is detected; if so, a screen is unlocked in the first unlocking mode, and the operation enters a first system desktop; and if not, the screen is unlocked in a second unlocking mode, and the operation enters the second system desktop. In addition, the invention also provides a management device. The personnel information safety management method and the management device have the advantages that the secret leakage risk is lower, and the individual privacy of the user can be more effectively protected.

Description

technical field [0001] The invention relates to personal information security management technology, in particular to a personal information security management method and management device. Background technique [0002] With the development of science and technology, user terminals such as mobile phones play an increasingly important role in people's lives. However, because mobile phones often store a large amount of personal privacy information that users do not want others to know, once leaked, it will bring irreparable losses to users. Therefore, how to effectively protect users' personal information in mobile phones has always been a major problem in the industry. [0003] In the prior art, the method of password unlocking is generally used to protect the personal information security of mobile phone users, but using password unlocking itself is a kind of leaking behavior. When a mobile phone user unlocks through a password, his behavior is equivalent to telling the peo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/36
CPCG06F21/32G06F21/36
Inventor 叶颖华侯月姣
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products