WO2017166689A1 - 一种隐私保护的方法及装置 - Google Patents

一种隐私保护的方法及装置 Download PDF

Info

Publication number
WO2017166689A1
WO2017166689A1 PCT/CN2016/097463 CN2016097463W WO2017166689A1 WO 2017166689 A1 WO2017166689 A1 WO 2017166689A1 CN 2016097463 W CN2016097463 W CN 2016097463W WO 2017166689 A1 WO2017166689 A1 WO 2017166689A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
mobile terminal
level
password
fingerprint information
Prior art date
Application number
PCT/CN2016/097463
Other languages
English (en)
French (fr)
Inventor
成伟男
张充
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017166689A1 publication Critical patent/WO2017166689A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present invention relates to the field of mobile terminal technologies, and in particular, to a method and an apparatus for privacy protection.
  • the fingerprint recognition function is generally applied to unlocking a mobile phone or replacing a password in a quick payment, which brings a lot of convenience for the user to use the mobile phone.
  • the privacy information in the mobile phone such as photos, short messages, call records, and the like, can be browsed and operated by other people, resulting in a security risk in the private information in the mobile terminal.
  • the embodiment of the invention provides a method and a device for protecting privacy, which can solve the problem that the privacy information in the mobile terminal in the prior art has a security risk.
  • a method of privacy protection including:
  • the operation authority corresponding to the low privilege level is set, and the low privilege level is lower than the current privilege level.
  • a device for privacy protection the device being applied to a mobile terminal, the device comprising:
  • a receiving unit configured to receive fingerprint information input by a user
  • a determining unit configured to determine a permission level corresponding to the fingerprint information received by the receiving unit
  • a setting unit configured to set an operation right corresponding to the authority level determined by the determining unit When the non-operation time of the mobile terminal reaches the preset time, the operation authority corresponding to the low privilege level is set, and the low privilege level is lower than the current privilege level.
  • the method and device for protecting the privacy provided by the embodiment of the present invention firstly receive the fingerprint information input by the user, determine the permission level corresponding to the fingerprint information, and set the operation authority corresponding to the permission level, when the non-operation time of the mobile terminal reaches the preset time.
  • the low privilege level is lower than the current privilege level.
  • the mobile terminal sets the operation authority according to the privilege level, so that only the user with the viewing privacy privilege can view the private information in the mobile terminal, and when the unoperated time of the mobile terminal reaches the preset time, the mobile terminal The operation authority is reduced, the privacy information in the mobile terminal is prevented from being snooped by others, and the security of the privacy information in the mobile terminal is improved.
  • FIG. 1 is a flowchart of a method for privacy protection according to an embodiment of the present invention
  • FIG. 3 is a flowchart of another method for privacy protection according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a logical structure of an apparatus for privacy protection according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a logical structure of another apparatus for privacy protection according to an embodiment of the present invention.
  • the embodiment of the present invention provides a method for protecting the privacy.
  • the method is applied to the mobile terminal. As shown in FIG. 1 , the method includes:
  • the mobile terminal can perform subsequent steps according to the fingerprint information input by the user.
  • the corresponding relationship between the fingerprint information and the privilege level is set in advance and stored in the mobile terminal. After receiving the fingerprint information input by the user, the mobile terminal identifies the fingerprint information, and further stores the fingerprint information and the privilege level from the mobile terminal. The correspondence relationship determines the permission level corresponding to the currently received fingerprint information.
  • the privilege level includes at least the highest privilege level, and the operation privilege corresponding to the highest privilege level is to allow operation on all information in the mobile terminal.
  • the mobile terminal may respond to a request by the user to open a private short message or a call record, and according to the user.
  • the requested request displays private information such as a private message or call history.
  • the privilege level in the embodiment of the present invention may include only the highest privilege level and the common privilege level.
  • the operation privilege corresponding to the common privilege level is: allowing non-private information in the mobile terminal to operate, but not allowing the mobile The private information in the terminal operates. Under the operation authority corresponding to the normal permission level, the mobile terminal hides the private information and does not respond to the received request for viewing the private information.
  • multiple privilege levels may be included in the embodiment of the present invention, for example, the highest level, the second level, and the third level.
  • Each level of privilege level corresponds to a respective operation authority, starting from the highest level.
  • the operation authority corresponding to each level of the privilege level is gradually weakened, or each level of privilege level corresponds to the operation authority of different types of applications in the mobile terminal, but only the operation authority corresponding to the highest privilege level allows the operation of the private information of the mobile terminal. .
  • the mobile terminal identifies the fingerprint information, and when determining that the fingerprint information is legal fingerprint information, the mobile terminal successfully unlocks.
  • the operation authority of the current mobile terminal is set as the operation authority corresponding to the privilege level.
  • the mobile terminal when the mobile terminal is not operated within a preset time, in order to prevent others from snooping on the private information in the mobile terminal, the mobile terminal automatically sets the operation authority to the operation authority corresponding to the low privilege level, and the low privilege level is lower than Current privilege level.
  • the preset time may be 30 seconds.
  • the privilege level includes the highest privilege level and the normal privilege level
  • the current operation authority of the mobile terminal is the operation authority corresponding to the highest privilege level. If the mobile terminal is not operated in 30 seconds. , the mobile terminal will set the operation authority to the operation authority corresponding to the normal permission level.
  • the method for privacy protection provided by the embodiment of the present invention first receives fingerprint information input by a user, determines a permission level corresponding to the fingerprint information, and sets an operation authority corresponding to the permission level.
  • the operation authority corresponding to the low privilege level is set, and the low privilege level is lower than the current privilege level.
  • the different fingerprint information in the embodiment of the present invention corresponds to different permission levels, and the mobile terminal sets the operation authority according to the permission level, so that only the user with the viewing privacy permission can view the privacy in the mobile terminal.
  • the method includes:
  • the fingerprint information input by the user for the first time refers to the fingerprint information that the mobile terminal has not saved.
  • the mobile terminal sets the permission level corresponding to the fingerprint information to the highest privilege level, and sets the operation authority corresponding to the highest privilege level to Allows all information in the mobile terminal to operate.
  • the mobile terminal can receive the operation permission corresponding to the highest privilege level.
  • the other fingerprint information sets the permission level corresponding to the other fingerprint information according to the instruction input by the user on the setting interface of the mobile terminal.
  • the execution order between the steps 201-202 and the step 203 is not limited, and multiple permission levels may be set in advance, and the operation authority corresponding to each permission level may be set, or in the above step 202. After the permission level corresponding to the fingerprint information input by the user is set, the operation authority corresponding to the permission level is set, which is not limited by the present invention.
  • the mobile terminal can be unlocked by inputting a password. Therefore, the unlock password and the private password of the mobile terminal need to be set in advance.
  • the unlock password is used to unlock the mobile terminal, and the private password is used to determine whether the operation authority corresponding to the highest privilege level can be enabled.
  • step 204 does not limit the order of execution between step 204 and steps 201-202 and step 203 above.
  • FIG. 1 is a flow of the default fingerprint verification success, and the embodiment of the present invention also provides fingerprint verification.
  • step 102 When the fingerprint verification is successful, step 102 is performed. When the fingerprint verification fails, step 302 is performed.
  • step 304 is performed; otherwise, the unlocking is refused, and no other operations are performed.
  • step 306 When the received private password is the same as the private password set in advance, the verification succeeds, and step 306 is performed; otherwise, the verification fails, and step 307 is performed.
  • the private information of the mobile terminal is hidden, and only information other than the private information can be displayed.
  • step 307 is to set the operation authority corresponding to the normal privilege level.
  • step 104 needs to be performed.
  • the privacy protection method when the user unlocks the mobile terminal by using the password, the private password still needs to be verified. Only after the private password is successfully verified, the mobile terminal is set to the highest level of the privilege level.
  • the operation authority is that the user can view the private information in the mobile terminal only when the mobile terminal is in the operation authority corresponding to the highest level of the permission level. Therefore, if the private password verification fails, the private information in the mobile terminal cannot be viewed, and the mobile terminal is avoided.
  • the privacy information is snooped by others, improving the security of private information in mobile terminals.
  • the embodiment of the present invention further provides a device for privacy protection, which is applied to a mobile terminal.
  • the device includes: a receiving unit 401, and a determining unit 402. Setting unit 403;
  • the receiving unit 401 is configured to receive fingerprint information input by the user;
  • a determining unit 402 configured to determine a permission level corresponding to the fingerprint information received by the receiving unit 401;
  • a setting unit 403 configured to set an operation authority corresponding to the permission level determined by the determining unit 402; when the non-operation time of the mobile terminal reaches a preset time, setting an operation authority corresponding to the low authority level, the low authority level being lower than the current Permission level.
  • the receiving unit 401 is further configured to receive fingerprint information that is input by the user for the first time;
  • the setting unit 403 is further configured to set a permission level corresponding to the fingerprint information input by the user for the first time; and set an operation authority corresponding to each permission level.
  • the privilege level includes the highest privilege level, and the operation privilege corresponding to the highest privilege level is to allow operation on all information in the mobile terminal.
  • the setting unit 403 is further configured to set an unlock password and a private password corresponding to the highest privilege level.
  • the apparatus further includes: a verification unit 404, a prompting unit 405,
  • the verification unit 404 is configured to identify fingerprint information input by the user
  • the prompting unit 405 is configured to prompt the user to input an unlocking password when the fingerprint recognition fails;
  • the receiving unit 401 is further configured to receive an unlock password input by the user.
  • the verification unit 404 is further configured to verify the unlock password received by the receiving unit 401;
  • the prompting unit 405 is further configured to prompt the user to input a private password when the unlock password verification succeeds;
  • the receiving unit 401 is further configured to receive a private password input by the user.
  • the verification unit 404 is further configured to verify the private password received by the receiving unit 401;
  • the setting unit 403 is further configured to: when the private password verification succeeds, set the operation authority corresponding to the highest privilege level; when the private password verification fails, set the operation authority corresponding to the second advanced privilege level.
  • the receiving unit receives the fingerprint information input by the user, the determining unit determines the permission level corresponding to the fingerprint information, and the setting unit sets the operation authority corresponding to the permission level, when the non-operation time of the mobile terminal reaches When the time is preset, the operation authority corresponding to the low privilege level is set, and the low privilege level is lower than the current privilege level.
  • the different fingerprint information corresponds to different privilege levels, and the mobile terminal sets the operation authority according to the privilege level, so that only the user with the viewing privacy privilege can view the privilege level.
  • the privacy information in the mobile terminal and when the non-operation time of the mobile terminal reaches the preset time, the mobile terminal reduces the operation authority, avoids the privacy information in the mobile terminal being snooped by others, and improves the security of the privacy information in the mobile terminal. Sex.
  • the present invention can be implemented by means of software plus necessary general hardware, and of course, by hardware, but in many cases, the former is a better implementation. .
  • the technical solution of the present invention which is essential or contributes to the prior art, can be embodied in the form of a software product stored in a readable storage medium, such as a floppy disk of a computer.
  • a hard disk or optical disk, etc. includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Telephone Function (AREA)

Abstract

一种隐私保护的方法及装置,涉及移动终端技术领域,可以解决现有技术中移动终端中的隐私信息存在安全隐患的问题。通过接收用户输入的指纹信息(101),确定指纹信息对应的权限级别(102),设置对应于该权限级别的操作权限(103),当移动终端的未操作时间达到预设时间时,设置低权限级别对应的操作权限,低权限级别低于当前权限级别(104)。适于对移动终端中的隐私信息进行保护时采用。

Description

一种隐私保护的方法及装置
本申请要求于2016年3月31日提交中国专利局,申请号为201610199768.5、发明名称为“一种隐私保护的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及移动终端技术领域,尤其涉及一种隐私保护的方法及装置。
背景技术
目前,越来越多的移动终端具备了指纹识别功能,指纹识别功能一般应用于手机解锁,或者在快捷支付时代替密码使用,为用户使用手机带来了很多便利。但是用户使用指纹解锁手机后,手机中的隐私信息,例如照片、短信、通话记录等信息是可以被其他人浏览并且操作的,导致移动终端中的隐私信息存在安全隐患。
发明内容
本发明的实施例提供一种隐私保护的方法及装置,可以解决现有技术中移动终端中的隐私信息存在安全隐患的问题。
为达到上述目的,本发明的实施例采用如下技术方案:
一种隐私保护的方法,包括:
接收用户输入的指纹信息;
确定所述指纹信息对应的权限级别;
设置对应于所述权限级别的操作权限;
当移动终端的未操作时间达到预设时间时,设置低权限级别对应的操作权限,所述低权限级别低于当前权限级别。
一种隐私保护的装置,所述装置应用于移动终端中,所述装置包括:
接收单元,用于接收用户输入的指纹信息;
确定单元,用于确定所述接收单元接收的所述指纹信息对应的权限级别;
设置单元,用于设置对应于所述确定单元确定的所述权限级别的操作权 限;当移动终端的未操作时间达到预设时间时,设置低权限级别对应的操作权限,所述低权限级别低于当前权限级别。
本发明实施例提供的隐私保护的方法及装置,首先接收用户输入的指纹信息,确定指纹信息对应的权限级别,设置对应于该权限级别的操作权限,当移动终端的未操作时间达到预设时间时,设置低权限级别对应的操作权限,低权限级别低于当前权限级别。相比于现有技术中在移动终端处于已解锁状态,移动终端中的私密信息可以被其他人进行浏览,导致移动终端中的隐私信息存在安全隐患相比,本发明实施例中不同的指纹信息对应不同的权限级别,移动终端会根据权限级别设置操作权限,使得只有具有查看隐私权限的用户才能够查看移动终端中的隐私信息,且当移动终端的未操作时间到达预设时间时,移动终端会降低操作权限,避免了移动终端中的隐私信息被其他人窥探,提高了移动终端中隐私信息的安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例提供的一种隐私保护的方法的流程图;
图2为本发明实施例提供的另一种隐私保护的方法的流程图;
图3为本发明实施例提供的另一种隐私保护的方法的流程图;
图4为本发明实施例提供的一种隐私保护的装置的逻辑结构示意图;
图5为本发明实施例提供的另一种隐私保护的装置的逻辑结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
为了解决现有技术中移动终端中的隐私信息存在安全隐患的问题,本发明实施例提供一种隐私保护的方法,该方法应用于移动终端中,如图1所示,该方法包括:
101、接收用户输入的指纹信息。
可以理解的是,当用户采用指纹解锁时,会输入指纹信息,进而移动终端可根据用户输入的指纹信息进行后续步骤。
102、确定指纹信息对应的权限级别。
其中,指纹信息与权限级别的对应关系是事先设置并存储在移动终端中的,移动终端接收到用户输入的指纹信息之后,对指纹信息进行识别,进而从移动终端中存储的指纹信息与权限级别的对应关系中确定当前接收的指纹信息对应的权限级别。
其中,权限级别至少包括最高权限级别,最高权限级别对应的操作权限为允许对移动终端中的所有信息进行操作,例如,移动终端可以响应用户输入的打开私密短信或通话记录等请求,并根据用户输入的请求显示私密短信或通话记录等私密信息。
需要说明的是,本发明实施例中的权限级别可以只包括最高权限级别和普通权限级别,普通权限级别对应的操作权限为:允许对移动终端中的非私密信息进行操作,但是不允许对移动终端中的私密信息进行操作,在普通权限级别对应的操作权限下,移动终端会将私密信息隐藏,不会响应接收到的查看私密信息的请求。
在另一种实现方式中,本发明实施例中可以包括多个权限级别,例如最高级、第二级、第三级……每一级权限级别分别对应各自的操作权限,从最高级开始,每一级权限级别对应的操作权限逐级减弱,或者每一级权限级别对应操作移动终端中不同种类应用的操作权限,但是只有最高权限级别对应的操作权限才允许对移动终端的私密信息进行操作。
还需说明的是,在确定指纹信息对应的权限级别的过程中,移动终端会对指纹信息进行识别,当确定指纹信息为合法指纹信息时,移动终端会成功解锁。
103、设置对应于所述权限级别的操作权限。
在上述步骤102中确定接收到的指纹信息对应的权限级别之后,会将当前移动终端的操作权限设置为该权限级别对应的操作权限。
104、当移动终端的未操作时间达到预设时间时,设置低权限级别对应的操作权限,低权限级别低于当前权限级别。
可以理解的是,当移动终端在预设时间内没有***作,为了避免他人窥探移动终端中的私密信息,移动终端会自动将操作权限设置为低权限级别对应的操作权限,低权限级别低于当前权限级别。
例如,预设时间可以为30秒,当权限级别包括最高权限级别以及普通权限级别时,移动终端当前的操作权限为最高权限级别对应的操作权限,如果在30秒内移动终端没有被进行任何操作,则移动终端会将操作权限设置为普通权限级别对应的操作权限。
本发明实施例提供的隐私保护的方法,首先接收用户输入的指纹信息,确定指纹信息对应的权限级别,设置对应于该权限级别的操作权限,当移动终端的未操作时间达到预设时间时,设置低权限级别对应的操作权限,低权限级别低于当前权限级别,相比于现有技术中在移动终端处于已解锁状态,移动终端中的私密信息可以被其他人进行浏览,导致移动终端中的隐私信息存在安全隐患相比,本发明实施例中不同的指纹信息对应不同的权限级别,移动终端会根据权限级别设置操作权限,使得只有具有查看隐私权限的用户才能够查看移动终端中的隐私信息,且当移动终端的未操作时间到达预设时间时,移动终端会降低操作权限,避免了移动终端中的隐私信息被其他人窥探,提高了移动终端中隐私信息的安全性。
在实现图1对应的实施例中的方法流程之前,需对移动终端中的相关功能进行设置,在本发明实施例提供的另一种实现方式中,如图2所示,该方法包括:
201、接收用户首次输入的指纹信息。
其中,用户首次输入的指纹信息指移动终端未保存过的指纹信息
202、设置用户首次输入的指纹信息对应的权限级别。
203、设置每个权限级别对应的操作权限。
需要说明的是,在用户首次设置移动终端的隐私保护功能时,需输入自己的指纹信息,移动终端会将该指纹信息对应的权限级别设置为最高权限级别,设置最高权限级别对应的操作权限为允许对移动终端中的所有信息进行操作。
之后,在开启最高权限级别对应的操作权限的情况下,移动终端可以接收 其他的指纹信息,根据用户在移动终端的设置界面输入的指令设置其他的指纹信息对应的权限级别。
值得说明的是,本发明实施例不限制步骤201-202与步骤203之间的执行顺序,可事先设置多个权限级别,并设置好每个权限级别对应的操作权限,也可以在上述步骤202设置用户首次输入的指纹信息对应的权限级别之后,再设置该权限级别对应的操作权限,本发明对此不作限制。
204、设置解锁密码以及所述最高权限级别对应的私密密码。
可以理解的是,在用户不方便指纹解锁,或者移动终端不能识别出用户的指纹信息时,也可以通过输入密码的方式对移动终端进行解锁,所以需事先设置移动终端的解锁密码以及私密密码。
其中,解锁密码用于对移动终端进行解锁,私密密码用于确定是否可以开启最高权限级别对应的操作权限。
同样,本发明也不限制步骤204与上述步骤201-202以及与步骤203之间的执行顺序。
结合图1所示的实施例,在移动终端接收到用户输入的指纹信息后,需对指纹信息进行验证,图1所示的为默认指纹验证成功的流程,本发明实施例还提供了指纹验证失败后的执行流程,如图3所示,在上述步骤101、接收用户输入的指纹信息之后,该方法还包括:
301、对用户输入的指纹信息进行验证。
当指纹验证成功时,执行上述步骤102,当指纹验证失败时,执行步骤302。
302、提示用户输入解锁密码。
303、接收用户输入的解锁密码,对解锁密码进行验证。
其中,当接收的解锁密码与事先设置的解锁密码相同时,则解锁密码验证成功,执行步骤304;否则拒绝解锁,不进行其他操作。
304、提示用户输入私密密码。
305、接收用户输入的私密密码。对私密密码进行验证。
当接收的私密密码与事先设置的私密密码相同时,验证成功,执行步骤306;否则,验证失败,执行步骤307。
306、设置最高权限级别对应的操作权限。
设置最高权限级别对应的操作权限后,移动终端中所有信息均可以显示。
307、设置次高级权限级别对应的操作权限。
设置次高级权限级别对应的操作权限后,移动终端的私密信息被隐藏,只能显示除私密信息之外的信息。
可以理解的是,当权限级别只包括最高级权限级别和普通权限级别时,则步骤307为设置普通权限级别对应的操作权限。
值得说明的是,在步骤306和307之后,都需执行步骤104。
本发明实施例提供的隐私保护的方法,当用户使用密码对移动终端进行解锁时,仍需对私密密码进行验证,只有对私密密码验证成功后,移动终端才会设置为最高级权限级别对应的操作权限,由于只有移动终端处于最高级权限级别对应的操作权限时,用户才能查看移动终端中的隐私信息,所以如果私密密码验证失败,就无法查看移动终端中的隐私信息,避免了移动终端中的隐私信息被其他人窥探,提高了移动终端中隐私信息的安全性。
结合图1至图3所示的方法流程,本发明实施例还提供一种隐私保护的装置,该装置应用于移动终端中,如图4所示,该装置包括:接收单元401,确定单元402,设置单元403;
接收单元401,用于接收用户输入的指纹信息;
确定单元402,用于确定接收单元401接收的指纹信息对应的权限级别;
设置单元403,用于设置对应于确定单元402确定的权限级别的操作权限;当移动终端的未操作时间达到预设时间时,设置低权限级别对应的操作权限,所述低权限级别低于当前权限级别。
在本发明另一实施例中,接收单元401,还用于接收用户首次输入的指纹信息;
设置单元403,还用于设置用户首次输入的指纹信息对应的权限级别;设置每个权限级别对应的操作权限。
其中,权限级别包括最高权限级别,最高权限级别对应的操作权限为允许对移动终端中的所有信息进行操作。
在本发明另一实施例中,设置单元403,还用于设置解锁密码以及最高权限级别对应的私密密码。
在本发明另一实施例中,如图5所示,该装置还包括:验证单元404,提示单元405,
验证单元404,用于对用户输入的指纹信息进行识别;
提示单元405,用于当指纹识别失败时,提示用户输入解锁密码;
接收单元401,还用于接收用户输入的解锁密码。
验证单元404,还用于对接收单元401接收的解锁密码进行验证;
提示单元405,还用于当解锁密码验证成功时,提示用户输入私密密码;
接收单元401,还用于接收用户输入的私密密码。
验证单元404,还用于对接收单元401接收的私密密码进行验证;
设置单元403,还用于当私密密码验证成功时,设置最高权限级别对应的操作权限;当私密密码验证失败时,设置次高级权限级别对应的操作权限。
本发明实施例提供的隐私保护的装置,接收单元接收用户输入的指纹信息,确定单元确定指纹信息对应的权限级别,设置单元设置对应于该权限级别的操作权限,当移动终端的未操作时间达到预设时间时,设置低权限级别对应的操作权限,低权限级别低于当前权限级别,相比于现有技术中在移动终端处于已解锁状态,移动终端中的私密信息可以被其他人进行浏览,导致移动终端中的隐私信息存在安全隐患相比,本发明实施例中不同的指纹信息对应不同的权限级别,移动终端会根据权限级别设置操作权限,使得只有具有查看隐私权限的用户才能够查看移动终端中的隐私信息,且当移动终端的未操作时间到达预设时间时,移动终端会降低操作权限,避免了移动终端中的隐私信息被其他人窥探,提高了移动终端中隐私信息的安全性。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本发明可借助软件加必需的通用硬件的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在可读取的存储介质中,如计算机的软盘,硬盘或光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。

Claims (10)

  1. 一种隐私保护的方法,其特征在于,包括:
    接收用户输入的指纹信息;
    确定所述指纹信息对应的权限级别;
    设置对应于所述权限级别的操作权限;
    当移动终端的未操作时间达到预设时间时,设置低权限级别对应的操作权限,所述低权限级别低于当前权限级别。
  2. 根据权利要求1所述的隐私保护的方法,其特征在于,所述方法还包括:
    接收用户首次输入的指纹信息;
    设置所述用户首次输入的指纹信息对应的权限级别;
    设置每个权限级别对应的操作权限。
  3. 根据权利要求2所述的隐私保护的方法,其特征在于,所述权限级别包括最高权限级别,所述最高权限级别对应的操作权限为允许对移动终端中的所有信息进行操作。
  4. 根据权利要求3所述的隐私保护的方法,其特征在于,所述方法还包括:
    设置解锁密码以及所述最高权限级别对应的私密密码。
  5. 根据权利要求1至4中任一项所述的隐私保护的方法,其特征在于,在所述接收用户输入的指纹信息之后,所述方法还包括:
    对所述用户输入的指纹信息进行识别;
    当指纹识别失败时,提示用户输入解锁密码;
    接收用户输入的解锁密码,对所述解锁密码进行验证;
    当所述解锁密码验证成功时,提示用户输入私密密码;
    接收用户输入的私密密码。对所述私密密码进行验证;
    当所述私密密码验证成功时,设置所述最高权限级别对应的操作权限;
    当所述私密密码验证失败时,设置次高级权限级别对应的操作权限。
  6. 一种隐私保护的装置,其特征在于,所述装置应用于移动终端中,所 述装置包括:
    接收单元,用于接收用户输入的指纹信息;
    确定单元,用于确定所述接收单元接收的所述指纹信息对应的权限级别;
    设置单元,用于设置对应于所述确定单元确定的所述权限级别的操作权限;还用于当移动终端的未操作时间达到预设时间时,设置低权限级别对应的操作权限,所述低权限级别低于当前权限级别。
  7. 根据权利要求6所述的隐私保护的装置,其特征在于,
    所述接收单元,还用于接收用户首次输入的指纹信息;
    所述设置单元,还用于设置所述用户首次输入的指纹信息对应的权限级别;还用于设置每个权限级别对应的操作权限。
  8. 根据权利要求7所述的隐私保护的装置,其特征在于,所述权限级别包括最高权限级别,所述最高权限级别对应的操作权限为允许对移动终端中的所有信息进行操作。
  9. 根据权利要求8所述的隐私保护的装置,其特征在于,
    所述设置单元,还用于设置解锁密码以及所述最高权限级别对应的私密密码。
  10. 根据权利要求6至9中任一项所述的隐私保护的装置,其特征在于,所述装置还包括:
    验证单元,用于对所述用户输入的指纹信息进行验证;
    提示单元,用于当指纹验证失败时,提示用户输入解锁密码;
    所述接收单元,还用于接收用户输入的解锁密码;
    所述验证单元,还用于对所述接收单元接收的解锁密码进行验证;
    所述提示单元,还用于当所述解锁密码验证成功时,提示用户输入私密密码;
    所述接收单元,还用于接收用户输入的私密密码;
    所述验证单元,还用于对所述接收单元接收的私密密码进行验证;
    所述设置单元,还用于当所述私密密码验证成功时,设置所述最高权限级别对应的操作权限;当所述私密密码验证失败时,设置次高级权限级别对应的操作权限。
PCT/CN2016/097463 2016-03-31 2016-08-31 一种隐私保护的方法及装置 WO2017166689A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610199768.5A CN105809007A (zh) 2016-03-31 2016-03-31 一种隐私保护的方法及装置
CN201610199768.5 2016-03-31

Publications (1)

Publication Number Publication Date
WO2017166689A1 true WO2017166689A1 (zh) 2017-10-05

Family

ID=56459455

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/097463 WO2017166689A1 (zh) 2016-03-31 2016-08-31 一种隐私保护的方法及装置

Country Status (2)

Country Link
CN (1) CN105809007A (zh)
WO (1) WO2017166689A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711177A (zh) * 2018-12-14 2019-05-03 国家电网有限公司 基于生物信息识别的数据安全管理方法及终端设备
CN113378135A (zh) * 2021-06-08 2021-09-10 华中科技大学 一种用于计算机隐私数据查询验证的方法
WO2023123493A1 (zh) * 2021-12-31 2023-07-06 华为技术有限公司 数据管理方法及装置

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809007A (zh) * 2016-03-31 2016-07-27 宇龙计算机通信科技(深圳)有限公司 一种隐私保护的方法及装置
CN106355141B (zh) * 2016-08-24 2020-11-10 上海传英信息技术有限公司 可携式电子装置及其操作方法
CN107798224A (zh) * 2016-09-07 2018-03-13 中兴通讯股份有限公司 一种终端控制方法及装置、用户终端
WO2019051692A1 (zh) * 2017-09-13 2019-03-21 深圳传音通讯有限公司 隐私信息保护方法、终端及计算机可读存储介质
CN110674486A (zh) * 2019-09-25 2020-01-10 珠海格力电器股份有限公司 一种终端安全控制方法、存储介质及终端设备

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390126A (zh) * 2012-05-09 2013-11-13 腾讯科技(深圳)有限公司 一种使用权限管理方法和装置
WO2013187789A1 (en) * 2012-06-14 2013-12-19 Vlatacom D.O.O. System and method for high security biometric access control
CN103955638A (zh) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 隐私保护方法和装置
CN104065823A (zh) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 移动终端的基于虹膜识别技术的用户模式控制方法及***
CN105208211A (zh) * 2015-09-29 2015-12-30 努比亚技术有限公司 一种隐私保护装置、方法及移动终端
CN105208008A (zh) * 2015-08-27 2015-12-30 宇龙计算机通信科技(深圳)有限公司 基于指纹识别的账户登录方法、装置和终端
CN105809007A (zh) * 2016-03-31 2016-07-27 宇龙计算机通信科技(深圳)有限公司 一种隐私保护的方法及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101384048A (zh) * 2008-09-08 2009-03-11 中兴通讯股份有限公司 信息管理方法以及移动终端
CN102855426B (zh) * 2012-08-03 2015-09-09 广东欧珀移动通信有限公司 一种基于Android的用户管理方法
CN103902862B (zh) * 2012-12-30 2018-04-27 联想(北京)有限公司 一种移动设备管理方法、装置及一种移动设备

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390126A (zh) * 2012-05-09 2013-11-13 腾讯科技(深圳)有限公司 一种使用权限管理方法和装置
WO2013187789A1 (en) * 2012-06-14 2013-12-19 Vlatacom D.O.O. System and method for high security biometric access control
CN103955638A (zh) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 隐私保护方法和装置
CN104065823A (zh) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 移动终端的基于虹膜识别技术的用户模式控制方法及***
CN105208008A (zh) * 2015-08-27 2015-12-30 宇龙计算机通信科技(深圳)有限公司 基于指纹识别的账户登录方法、装置和终端
CN105208211A (zh) * 2015-09-29 2015-12-30 努比亚技术有限公司 一种隐私保护装置、方法及移动终端
CN105809007A (zh) * 2016-03-31 2016-07-27 宇龙计算机通信科技(深圳)有限公司 一种隐私保护的方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711177A (zh) * 2018-12-14 2019-05-03 国家电网有限公司 基于生物信息识别的数据安全管理方法及终端设备
CN113378135A (zh) * 2021-06-08 2021-09-10 华中科技大学 一种用于计算机隐私数据查询验证的方法
CN113378135B (zh) * 2021-06-08 2023-08-25 华中科技大学 一种用于计算机隐私数据查询验证的方法
WO2023123493A1 (zh) * 2021-12-31 2023-07-06 华为技术有限公司 数据管理方法及装置

Also Published As

Publication number Publication date
CN105809007A (zh) 2016-07-27

Similar Documents

Publication Publication Date Title
WO2017166689A1 (zh) 一种隐私保护的方法及装置
US9712565B2 (en) System and method to provide server control for access to mobile client data
US20200042723A1 (en) Identity fraud risk engine platform
US8955076B1 (en) Controlling access to a protected resource using multiple user devices
US9781105B2 (en) Fallback identity authentication techniques
JP6571203B2 (ja) モバイル端末のプライバシー保護方法および保護装置、並びにモバイル端末
US8931081B2 (en) Device identification for externalizing password from device coupled with user control of external password service
US20040243824A1 (en) Securely authorizing the performance of actions
CN103813334A (zh) 权限控制方法和权限控制装置
US10110578B1 (en) Source-inclusive credential verification
JP2013537758A (ja) オペレーティングシステムのロックを解除する方法及び装置
WO2015117332A1 (zh) 一种usb调试模式接口启动的方法、装置及终端
WO2017020426A1 (zh) 一种基于生物特征识别的通信方法、装置及***
WO2019047148A1 (zh) 一种密码验证方法、终端、计算机可读存储介质
CN111433770A (zh) 用户选择的密钥认证
US20150047019A1 (en) Information processing method and electronic device
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
KR101719511B1 (ko) 네트워크를 사용하여 게이트에 대한 액세스 허용 여부를 결정하는 방법, 서버 및 컴퓨터 판독 가능한 기록 매체
CN112887922B (zh) 消息发送方法和电子设备
WO2018006349A1 (zh) 一种基于图片密码验证用户进入的方法及***
WO2018006326A1 (zh) 一种通过移动终端和图片密码验证智能门禁的方法及***
WO2016197608A1 (zh) 一种辅助解锁方法和装置
JP2007310630A (ja) 本人認証機能のリカバリシステム及びリカバリ方法
EP3467693B1 (en) Identity verification method and apparatus
CN105975841A (zh) 一种基于加密狗锁定/解锁电脑屏幕的方法

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16896459

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16896459

Country of ref document: EP

Kind code of ref document: A1