Privacy protection method and electronic equipment

A technology for privacy protection and electronic equipment, applied in digital data protection, electronic digital data processing, instruments, etc., can solve the problem of insufficient refinement of privacy protection and achieve the effect of refinement of privacy protection

Pending Publication Date: 2020-05-08
VIVO MOBILE COMM CO LTD
14 Cites 1 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a privacy protection method and an electronic device to solve the problem that ...
View more

Method used

In the implementation of the present invention, the privacy protection of electronic equipment is refined to the control level, and at the same time, further privacy protection is performed f...
View more

Abstract

The embodiment of the invention provides a privacy protection method and electronic equipment. The method comprises the following steps: receiving a first input; opening a privacy setting mode in response to the first input; displaying a first interface of the target application; receiving a second input acting on a target control in the first interface; in response to the second input, setting the target control as a privacy control; when the privacy setting mode is closed and a third input acting on the privacy control is received, carrying out identity authentication; and under the condition that the identity verification is passed, responding to the third input. In embodiments of the present invention, after the privacy setting mode of the electronic equipment is started, the control in the target application interface can be set as the privacy control, and only the control related to the privacy information is protected, so that when a user uses the application, the privacy control needs to be verified, but a non-privacy space does not need to be verified, and the privacy protection of the electronic equipment is more refined.

Application Domain

Digital data protectionDigital data authentication

Technology Topic

Target controlPrivacy protection +3

Image

  • Privacy protection method and electronic equipment
  • Privacy protection method and electronic equipment
  • Privacy protection method and electronic equipment

Examples

  • Experimental program(1)

Example Embodiment

[0030] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, rather than all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
[0031] In the embodiments of the present invention, words such as "exemplary" or "for example" are used to represent examples, illustrations, or illustrations. Any embodiment or design solution described as "exemplary" or "for example" in the embodiments of the present invention should not be construed as being more preferable or advantageous than other embodiments or design solutions. To be precise, words such as "exemplary" or "for example" are used to present related concepts in a specific manner.
[0032] In this document, relational terms such as "first" and "second" are only used to distinguish the same names, rather than implying the relationship or order between these names.
[0033] In the embodiment of the present invention, the electronic device may be a mobile phone, a tablet computer, a notebook computer, an Ultra-Mobile Personal Computer (UMPC), a netbook, or a Personal Digital Assistant (PDA), etc.
[0034] See figure 1 , The embodiment of the present invention provides a privacy protection method, the execution subject of the method is an electronic device, and the specific steps of the method are as follows:
[0035] Step 101: Receive the first input;
[0036] Step 102: In response to the first input, turn on the privacy setting mode;
[0037] In the embodiment of the present invention, the user instructs the electronic device to turn on the privacy setting mode through the first input, that is, instructs the electronic device to use the privacy protection method of the embodiment of the present invention.
[0038] Specifically, when at least one input parameter of the first input satisfies a preset condition, the privacy setting mode is turned on, and the input parameter includes at least one of the following: input time, input times, input strength, and input fingerprint.
[0039] The above-mentioned preset conditions may be preset by the electronic device, for example: the input time reaches the preset duration, the input intensity reaches the preset pressure value, etc. The preset conditions may be set by the user himself, for example: fingerprints entered by the user in advance, user Set input time, etc.
[0040] In some embodiments, the input parameters include fingerprint input and input time. For example, the user presses the fingerprint module with his finger, and the electronic device verifies that the current fingerprint is passed in the background and records the time the user has to press the finger. When the preset time ( For example, after 3 seconds), turn on the privacy setting mode.
[0041] In some embodiments, a fingerprint pressing pressure threshold V is set (for example, the pressure value output by the fingerprint module is 10), the user presses the fingerprint module with the finger, and the electronic device background verifies that the current fingerprint is passed, when the pressure value exceeds the previous setting If the current pressure is less than the pressure threshold V after a period of time S (for example, 0.5 seconds), it is determined that a pressing event is triggered. When the number of triggers reaches the preset number N (for example, 3 times), and the current fingerprint is passed, Turn on the privacy setting mode, the specific operation process is: when the user's finger is put into the fingerprint module, after the fingerprint is verified, then press the fingerprint module 3 times with a certain pressure to enter the privacy setting mode.
[0042] Step 103: Display the first interface of the target application;
[0043] In the embodiment of the present invention, after the privacy device mode is turned on, the user can start the target application in a normal way of using the application to display the first interface of the target application.
[0044] Step 104: Receive a second input acting on the target control in the first interface;
[0045] Step 105: In response to the second input, set the target control as a privacy control, and then return to step 104, or perform step 106;
[0046] In the embodiment of the present invention, the user sets the target control as a privacy control by performing a second input on the target control in the first interface, and the second input may be long pressing the target control for a certain period of time (for example, 2 seconds). After the target control is set as the privacy control through the second input, the second input is performed on the target control again to cancel the privacy setting of the target control. Or, after the second input to the target control, two menu items pop up, one is used to set the target control as a privacy control, and the other is used to cancel the setting of the target control as a privacy control.
[0047] It should be noted that after step 105 is executed, step 104 can be returned, that is, step 104 and step 105 are repeatedly executed to set multiple target controls.
[0048] In some implementations, considering that in the process of using the application, various operations of the user are input to the controls in the application interface, so when the privacy device mode is turned on, all controls in the application interface are identified , So that users can specify which controls can be set in the application interface, for example: see figure 2 All the controls are identified through the identification box. It can be understood that the way of identifying the controls can be highlighting, changing the font color, etc. The embodiment of the present invention does not specifically limit the way of identifying the controls.
[0049] In some embodiments, the method of the embodiment of the present invention further includes: receiving a fourth input acting on any control in the first interface; in response to the fourth input, displaying a second interface that matches the any control;
[0050] In the embodiment of the present invention, many applications have multiple interfaces, and different interfaces can be opened by clicking different controls. For example, in the address book interface, clicking a contact control will open the contact details accordingly. Information interface. For this kind of application interface opened by the control, there are also operable controls, so it is also necessary to set privacy settings for the controls in the newly opened interface.
[0051] Specifically, the aforementioned fourth input is an input different from the second input. For example, the second input is a long-pressing of the control for 2 seconds, and the fourth input can be a normal tap (that is, the tapping time is less than 2 seconds), or a double-click tap . In this way, when the user performs the fourth input to the target control, the second interface matching the target control is opened, so that the user can set the controls in the second interface.
[0052] Further, after setting the target control as a privacy control, a mapping relationship between the target application and the privacy control is established, so that when the user uses the target application, the electronic device will find out which controls in the target application are private according to the mapping relationship Control.
[0053] Step 106: When the privacy setting mode is closed and the third input acting on the privacy control is received, identity verification is performed;
[0054] In the embodiment of the present invention, there may be many ways to close the privacy setting mode, such as re-entering the first input or returning to the homepage. The embodiment of the present invention does not specifically limit the way of closing the privacy setting mode.
[0055] The aforementioned third input refers to an input performed by the user while using the control, such as a tap input on the control. When the user wants to use the privacy control, the electronic device verifies the user's identity. The identity verification can be done in multiple ways, such as verifying the user's fingerprint, verifying the user's face, and so on.
[0056] Step 107: If the identity verification is passed, respond to the third input.
[0057] In the embodiment of the present invention, the electronic device responds to the third input only when the user's identity verification is passed, that is, the privacy control can be used only when the identity verification is passed. This can ensure that users who currently use electronic devices are safe and avoid leakage of private information. Optionally, if the authentication fails, the privacy control can be made unclickable, or the privacy control can be grayed out, or the privacy control can not be displayed.
[0058] In the implementation of the present invention, after the electronic device starts the privacy setting mode, the controls in the target application interface can be set as privacy controls, and only controls related to privacy information are protected. In this way, the user needs to verify the privacy controls when using the application. The non-private space can be used without verification, making the privacy protection of electronic devices more detailed.
[0059] See image 3 , The embodiment of the present invention provides another privacy protection method, the execution subject of the method is an electronic device, and the specific steps of the method are as follows:
[0060] Step 301: Receive the first input;
[0061] Step 302: In response to the first input, turn on the privacy setting mode;
[0062] Step 303: Display the first interface of the target application;
[0063] Step 304: Receive a second input acting on the target control in the first interface;
[0064] Step 305: In response to the second input, set the target control as a privacy control, and then return to step 304, or perform step 306;
[0065] Step 306: When the privacy setting mode is turned off and the third input acting on the privacy control is received, identity verification is performed;
[0066] Step 307: If the identity verification is passed, respond to the third input.
[0067] The description of the above steps 301 to 307 can refer to figure 1 The description of steps 101 to 107 in step 101 will not be repeated here.
[0068] Step 308: Display the privacy information matching the privacy control;
[0069] In the embodiment of the present invention, in the case of passing the identity verification, in response to the third input, the privacy information that matches the privacy control is displayed. For example, for an e-mail application, the inbox control is a privacy control, and the inbox control is a privacy control. The private information matched by the control is the received mail.
[0070] Step 309: In the case of detecting the acquisition operation of the private information, determine whether the privacy level of the privacy control reaches a preset level;
[0071] Step 310: When the privacy level of the privacy control reaches a preset level, the user who obtains the operation is authenticated.
[0072] In the embodiment of the present invention, some special circumstances are considered. For example, the owner of the electronic device leaves without returning the interface after viewing the private information. At this time, the private information is still displayed in the electronic device. Obtaining operations such as copying, screenshots, etc. of this private information will lead to the disclosure of private information. Therefore, further protection and processing are required for private information.
[0073] Specifically, after the target control is set as the privacy control in step 305, the privacy level of the privacy control is set, and when the privacy level reaches the preset level, the identity verification of the user performing the acquisition operation is performed.
[0074] The following describes the authentication process of the user who obtains the operation in the case of copying private information and taking screenshots of private information.
[0075] Case 1. The acquisition operation is a copy operation of private information, and the identity verification of the user of the acquisition operation includes the following sub-steps:
[0076] (1) Obtain the identity information of the user who obtained the operation;
[0077] When a copy operation of private information is detected, obtain the identity information of the user who is currently performing the copy operation, for example: obtain the face information of the current user, attach the face information to the clipboard, and combine the copied data with the current face information Binding.
[0078] (2) Verify the identity information of the user who is copying;
[0079] (3) In the case where the authentication of the user's identity information of the obtaining operation is passed, the pasting operation of the private information is allowed.
[0080] In the embodiment of the present invention, the copied private information can be pasted only when the identity information is verified, which effectively prevents other users from stealing private information by copying and pasting.
[0081] Case 2: The acquisition operation is a screenshot operation of the private information, and the identity verification of the user who acquired the operation includes the following sub-steps:
[0082] (1) Obtain the identity information of the user who performed the screenshot operation, and obscure the screenshot;
[0083] When a screenshot operation on private information is detected, the identity information of the user currently performing the screenshot operation is obtained, for example, the facial information of the current user is obtained, and the screenshot is blurred.
[0084] (2) In the case of detecting the browsing operation of the screenshot, verify the identity information of the user who operated the screenshot;
[0085] In the embodiment of the present invention, when a user wants to browse a screenshot of private information, the user's identity information is verified.
[0086] (3) In the case where the identity information of the user performing the screenshot operation is verified, the screenshot is decoded.
[0087] In the embodiment of the present invention, the screenshot can be decoded only when the identity information is verified. Even if the user who fails the identity verification takes a screenshot of the private information, the result is a vague picture, and the private information cannot be obtained, which is effective Prevent other users from stealing private information through screenshots.
[0088] In the implementation of the present invention, the privacy protection of the electronic device is refined to the control level, and the matching privacy information is further protected to prevent other users from obtaining the privacy information through copying or screenshots, and to provide the reliability of the privacy protection of the electronic device. .
[0089] See Figure 4 , An embodiment of the present invention provides an electronic device 400, including:
[0090] The first receiving module 401 is configured to receive a first input;
[0091] The activation module 402 is configured to activate the privacy setting mode in response to the first input;
[0092] The first display module 403 is used to display the first interface of the target application;
[0093] The second receiving module 404 is configured to receive a second input that acts on the target control in the first interface;
[0094] A setting module 405, configured to set the target control as a privacy control in response to the second input;
[0095] The verification module 406 is configured to perform identity verification when the privacy setting mode is closed and the third input acting on the privacy control is received;
[0096] The response module 407 is configured to respond to the third input when the identity verification is passed.
[0097] Optionally, the opening module 402 includes:
[0098] An enabling unit, configured to enable the privacy setting mode when at least one input parameter of the first input meets a preset condition;
[0099] The input parameter includes at least one of the following: input time, input times, input strength, and input fingerprint.
[0100] Optionally, the electronic device 400 further includes:
[0101] The third receiving module is configured to receive a fourth input acting on any control in the first interface;
[0102] The second display module is configured to display a second interface matching the arbitrary control in response to the fourth input.
[0103] Optionally, the electronic device 400 further includes:
[0104] The establishment module is used to establish a mapping relationship between the target application and the privacy control.
[0105] Optionally, the electronic device 400 further includes:
[0106] The setting module is used to set the privacy level of the privacy control.
[0107] Optionally, the electronic device 400 further includes:
[0108] The third display module is used to display privacy information matching the privacy control;
[0109] The judging module is used for judging whether the privacy level of the privacy control reaches a preset level in the case of detecting the acquisition operation of the privacy information, and when the privacy level of the privacy control reaches the preset level, Perform identity verification on the user of the obtaining operation.
[0110] Optionally, the obtaining operation is a copy operation of the private information;
[0111] The electronic device 400 further includes:
[0112] The obtaining module is used to obtain the identity information of the user of the copy operation;
[0113] The first verification module is configured to verify the identity information of the user of the copy operation; in the case where the identity information of the user of the copy operation is verified, allowing the paste operation of the private information.
[0114] Optionally, the obtaining operation is a screenshot operation of the private information;
[0115] The electronic device 400 further includes:
[0116] The first processing module is used to obtain the identity information of the user who performs the screenshot operation, and obscure the screenshot;
[0117] The second verification module is configured to verify the identity information of the user of the screenshot operation in the case of detecting the browsing operation on the screenshot;
[0118] The second processing module is configured to decode the screenshot when the identity information of the user performing the screenshot operation is verified.
[0119] In the implementation of the present invention, after the electronic device starts the privacy setting mode, the controls in the target application interface can be set as privacy controls, and only controls related to privacy information are protected. In this way, the user needs to verify the privacy controls when using the application. The non-private space can be used without verification, making the privacy protection of electronic devices more detailed.
[0120] Figure 5 In order to implement a schematic diagram of the hardware structure of an electronic device according to various embodiments of the present invention, as shown in the figure, the electronic device 500 includes but is not limited to: a radio frequency unit 501, a network module 502, an audio output unit 503, an input unit 504, and a sensor 505 , Display unit 506, user input unit 507, interface unit 508, memory 509, processor 510, and power supply 511. Those skilled in the art can understand, Figure 5 The structure of the mobile terminal shown in does not constitute a limitation on the mobile terminal, and the mobile terminal may include more or fewer components than those shown in the figure, or a combination of certain components, or different component arrangements. In the embodiments of the present invention, mobile terminals include, but are not limited to, mobile phones, tablet computers, notebook computers, palmtop computers, vehicle-mounted terminals, wearable devices, and pedometers.
[0121] Preferably, a computer program that is stored in the memory 509 and can run on the processor 510, and when the computer program is executed by the processor 510, the following steps are implemented: receiving a first input; in response to the first input, turning on the privacy setting mode ; Display the first interface of the target application; receive the second input acting on the target control in the first interface; in response to the second input, set the target control as a privacy control; turn off the privacy setting mode, and receive the effect on privacy When the third input of the control is performed, authentication is performed; in the case of passing the authentication, the third input is responded to.
[0122] In the implementation of the present invention, after the electronic device starts the privacy setting mode, the controls in the target application interface can be set as privacy controls, and only controls related to privacy information are protected. In this way, the user needs to verify the privacy controls when using the application. The non-private space can be used without verification, making the privacy protection of electronic devices more detailed.
[0123] It should be understood that, in the embodiment of the present invention, the radio frequency unit 501 can be used for receiving and sending signals in the process of sending and receiving information or talking. Specifically, the downlink data from the base station is received and processed by the processor 510; Uplink data is sent to the base station. Generally, the radio frequency unit 501 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 501 can also communicate with the network and other devices through a wireless communication system.
[0124] The mobile terminal provides users with wireless broadband Internet access through the network module 502, such as helping users to send and receive emails, browse web pages, and access streaming media.
[0125] The audio output unit 503 may convert the audio data received by the radio frequency unit 501 or the network module 502 or stored in the memory 509 into an audio signal and output it as sound. Moreover, the audio output unit 503 may also provide audio output related to a specific function performed by the electronic device 500 (for example, call signal reception sound, message reception sound, etc.). The audio output unit 503 includes a speaker, a buzzer, a receiver, and the like.
[0126] The input unit 504 is used to receive audio or video signals. The input unit 504 may include a graphics processing unit (GPU) 5041 and a microphone 5042. The graphics processing unit 5041 is configured to monitor still pictures or video images obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed. The processed image frame may be displayed on the display unit 506. The image frame processed by the graphics processor 5041 may be stored in the memory 509 (or other storage medium) or sent via the radio frequency unit 501 or the network module 502. The microphone 5042 can receive sound, and can process such sound into audio data. The processed audio data can be converted into a format that can be sent to a mobile communication base station via the radio frequency unit 501 for output in the case of a telephone call mode.
[0127] The electronic device 500 further includes at least one sensor 505, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor and a proximity sensor. The ambient light sensor can adjust the brightness of the display panel 5061 according to the brightness of the ambient light. The proximity sensor can close the display panel 5061 and the display panel 5061 when the electronic device 500 is moved to the ear. / Or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three-axis), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, related games , Magnetometer attitude calibration), vibration recognition related functions (such as pedometer, percussion), etc.; sensor 505 can also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, Infrared sensors, etc., will not be repeated here.
[0128] The display unit 506 is used to display information input by the user or information provided to the user. The display unit 506 may include a display panel 5061, and the display panel 5061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
[0129] The user input unit 507 may be used to receive inputted numeric or character information, and generate key signal input related to user settings and function control of the mobile terminal. Specifically, the user input unit 507 includes a touch panel 5071 and other input devices 5072. The touch panel 5071, also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 5071 or near the touch panel 5071. operating). The touch panel 5071 may include two parts: a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch position, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 510, the command sent by the processor 510 is received and executed. In addition, the touch panel 5071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 5071, the user input unit 507 may also include other input devices 5072. Specifically, other input devices 5072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
[0130] Further, the touch panel 5071 can be overlaid on the display panel 5061. When the touch panel 5071 detects a touch operation on or near it, it is transmitted to the processor 510 to determine the type of the touch event. The type of event provides corresponding visual output on the display panel 5061. Although in Figure 5 The touch panel 5071 and the display panel 5061 are used as two independent components to realize the input and output functions of the mobile terminal. However, in some embodiments, the touch panel 5071 and the display panel 5061 can be integrated to realize the mobile terminal. The input and output functions of the device are not limited here.
[0131] The interface unit 508 is an interface for connecting an external device and the electronic device 500. For example, the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) port, video I/O port, headphone port, etc. The interface unit 508 can be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more components in the electronic device 500 or can be used to connect the electronic device 500 Transfer data between devices.
[0132] The memory 509 can be used to store software programs and various data. The memory 509 may mainly include a storage program area and a storage data area. The storage program area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data (such as audio data, phone book, etc.) created by the use of mobile phones. In addition, the memory 509 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
[0133] The processor 510 is the control center of the mobile terminal. It uses various interfaces and lines to connect the various parts of the entire mobile terminal, runs or executes software programs and/or modules stored in the memory 509, and calls data stored in the memory 509 , Perform various functions of the mobile terminal and process data, so as to monitor the mobile terminal as a whole. The processor 510 may include one or more processing units; preferably, the processor 510 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface, application programs, etc., and the modem The processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 510.
[0134] The electronic device 500 may also include a power supply 511 (such as a battery) for supplying power to various components. Preferably, the power supply 511 may be logically connected to the processor 510 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system. And other functions.
[0135] In addition, the electronic device 500 includes some functional modules not shown, which will not be repeated here.
[0136] The embodiment of the present invention also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, each process of the above-mentioned account management method embodiment is realized, and the same technology can be achieved. The effect, in order to avoid repetition, will not be repeated here. Wherein, the computer-readable storage medium, such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, etc.
[0137] It should be noted that in this article, the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements not only includes those elements, It also includes other elements not explicitly listed, or elements inherent to the process, method, article, or device. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, article or device that includes the element.
[0138] The above are only specific implementations of this application, but the protection scope of this application is not limited to this. Any change or replacement within the technical scope disclosed in this application shall be covered by the protection scope of this application . Therefore, the protection scope of this application should be subject to the protection scope of the claims.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products