Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection terminal equipment and privacy protection method

A technology for privacy protection and terminal equipment, which is applied in the field of information security, can solve problems such as privacy leakage, and achieve the effects of strong privacy, enhanced security, and a wide range of application scenarios

Pending Publication Date: 2022-07-22
BEIJING UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This can easily lead to privacy leaks and irreparable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection terminal equipment and privacy protection method
  • Privacy protection terminal equipment and privacy protection method
  • Privacy protection terminal equipment and privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The embodiments of the present invention are described below with reference to the accompanying drawings, so that those skilled in the art can better understand the present invention and implement it, but the enumerated embodiments are not intended to limit the present invention. The following embodiments and technical features in the embodiments can be combined with each other, wherein the same components are denoted by the same reference numerals.

[0015] like figure 1 As shown, the terminal device of the present invention includes a data storage unit, which stores the biometric information of the user to which the terminal device belongs, for example, including: face information and iris information, to ensure that the user can quickly and accurately locate when using his own terminal device. to myself.

[0016] The terminal device of the present invention includes a photographing unit capable of 360° radial scanning. In one embodiment, the maximum scanning range ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a privacy protection terminal device, comprising: a shooting unit for shooting people appearing around the device; and when the main control unit determines that the shooting unit shoots that the person appearing in the peripheral set range is not the equipment user, the main control unit enables the equipment screen to enter an encryption state through the following steps: S1, carrying out feature extraction on the iris of the terminal user, encoding the iris features of the device user to generate an encryption key for chaotic encryption; and S2, chaos encryption of the terminal information is completed by using the encryption key. According to the method and the device, when the owner uses the terminal equipment in any place, a non-owner cannot see things which the owner is doing through the equipment, and hidden dangers such as privacy leakage possibly existing when the owner uses the terminal equipment in public places are solved.

Description

technical field [0001] The present invention relates to the technical field of information security, and more particularly, to a privacy protection terminal device and a privacy protection method. Background technique [0002] With the rapid development of the Internet industry, people's reliance on the network is becoming stronger and stronger, but there is a risk of privacy leakage when using the Internet. Therefore, information security in network equipment is extremely important to users. Today, users can encrypt their terminal devices to protect their privacy. This method appears to be safe, but in fact it has a lot of hidden dangers. The current terminal encryption method only implements "surface" encryption on the device or content. As long as there is enough time in this encryption method, the thief can decipher the password and steal the private information stored in the device. This can easily lead to privacy leakage, resulting in irreparable losses. [0003] T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/84G06F21/60G06F21/32G06V40/16G06V40/18G06V10/82G06N3/04H04L9/00
CPCG06F21/84G06F21/602G06F21/32H04L9/001G06N3/045
Inventor 赵雅楠司农孙瑜高新张岩艳
Owner BEIJING UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More