[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105574382A - Information protection method and terminal - Google Patents

Information protection method and terminal Download PDF

Info

Publication number
CN105574382A
CN105574382A CN201510143803.7A CN201510143803A CN105574382A CN 105574382 A CN105574382 A CN 105574382A CN 201510143803 A CN201510143803 A CN 201510143803A CN 105574382 A CN105574382 A CN 105574382A
Authority
CN
China
Prior art keywords
information
user
hidden
identification information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510143803.7A
Other languages
Chinese (zh)
Inventor
唐以森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Coolpad Technologies Co Ltd
Original Assignee
Shenzhen Coolpad Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Coolpad Technologies Co Ltd filed Critical Shenzhen Coolpad Technologies Co Ltd
Priority to CN201510143803.7A priority Critical patent/CN105574382A/en
Publication of CN105574382A publication Critical patent/CN105574382A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses an information protection method, comprising the steps of acquiring identification information, and judging whether the identification information is matched with prearranged standard identification information, wherein the standard identification information comprises owner identification information; when the identification information is not matched with the owner identification information, acquiring prearranged hidden information and virtual information; and hiding the hidden information, and displaying the virtual information. The embodiment of the invention also discloses a terminal. By using the information protection method and the terminal, the information security and privacy of the terminal can be improved, and the user experience can be improved.

Description

Information protection method and terminal
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to a method and a terminal for protecting information.
Background
In recent years, with the progress of science and technology, intelligent terminals such as mobile phones and tablet computers are also continuously developed, and the intelligent terminals have entered thousands of households and become necessary terminal products for people.
At present, as the functions of these intelligent terminals are increasingly perfected and diversified, the terminal applications are increasingly enriched, and the terminal can store a great amount of personal privacy information of users, such as: the mobile phone stores personal privacy information such as photos, videos, short messages and contacts, and the user often has a secret requirement on the personal privacy information. However, since the smart terminal may pass by hands of other people, for example, the mobile phone is placed on the desktop and is used by friends, relatives, and the like, the user may be exposed to the risk of disclosure of personal privacy information.
In order to improve the security of the personal privacy information stored in the terminal of the user, currently, the privacy of the personal privacy information of the terminal is mainly realized by setting an unlocking mode, and the user can operate the terminal only by unlocking the terminal. However, when the user operates the terminal after unlocking the terminal, there is a possibility that the user may see the personal privacy information by other people nearby during the operation, for example, the privacy information related to the user secret is not intended to be seen by other people; or when a familiar person asks the user to acquire the unlocking mode and the user has to inform the unlocking mode, at the moment, other people can unlock the terminal, so that other people can randomly check the privacy information stored in the terminal, the privacy information is leaked, the privacy of the terminal is low, and inconvenience is brought to the user.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present invention is to provide a method and a terminal for information protection. The terminal can display corresponding information according to the identity of the user, so that the information safety and privacy of the terminal are improved, and the user experience is improved.
In order to solve the above technical problem, an embodiment of the present invention provides an information protection method, including:
acquiring identification information, and judging whether the identification information is matched with preset standard identification information or not, wherein the standard identification information comprises owner identification information;
when the identification information is not matched with the owner identification information, preset hidden information and virtual information are obtained;
and hiding the hidden information and displaying the virtual information.
Wherein the identification information includes: unlocking information input by a user and characteristic information of the user;
the acquiring the identification information includes:
receiving input unlocking information, wherein the unlocking information comprises: key information, slide information, pattern information, passwords, and fingerprint information; or,
the method comprises the steps of collecting characteristic information of a user, wherein the characteristic information comprises iris information of the user, voice information of the user, fingerprint information of the user and face characteristic information of the user.
Wherein the owner information comprises non-owner identification information;
after judging whether the identification information is matched with preset standard identification information, the method comprises the following steps:
when the unlocking information is not matched with the owner identification information, judging whether the unlocking information is matched with non-owner identification information;
and when the unlocking information is matched with the non-owner identification information, executing the step of acquiring preset hidden information and virtual information.
Wherein the hiding the hidden information comprises:
acquiring associated information of the hidden information;
hiding the associated information.
Wherein the method comprises the following steps:
receiving a hiding instruction input by a user aiming at the information needing to be hidden, and identifying the information needing to be hidden as hidden information.
Correspondingly, an embodiment of the present invention further provides a terminal, including:
a terminal, characterized in that the terminal comprises:
the system comprises an acquisition judging unit, a judging unit and a judging unit, wherein the acquisition judging unit is used for acquiring identification information and judging whether the identification information is matched with preset standard identification information or not, and the standard identification information comprises owner identification information;
the acquisition unit is used for acquiring preset hidden information and virtual information when the identification information is not matched with the owner identification information;
and the hidden display unit is used for hiding the hidden information and displaying the virtual information.
Wherein the identification information includes: unlocking information input by a user and characteristic information of the user;
the acquisition judging unit includes:
the receiving subunit is configured to receive input unlocking information, where the unlocking information includes: key information, slide information, pattern information, passwords, and fingerprint information; or,
the device comprises a collecting subunit, a processing subunit and a processing unit, wherein the collecting subunit is used for collecting characteristic information of a user, and the characteristic information comprises iris information of the user, voice information of the user, fingerprint information of the user and facial characteristic information of the user.
Wherein the owner information comprises non-owner identification information;
the terminal includes:
the judging unit is used for judging whether the unlocking information is matched with the non-owner identification information or not when the obtaining and judging unit judges that the unlocking information is not matched with the owner identification information;
and when the unlocking information is matched with the non-owner identification information, the judging unit informs the acquiring unit to acquire preset hidden information and virtual information.
Wherein the hidden display unit includes:
the acquisition subunit is used for acquiring the associated information of the hidden information;
and the hiding subunit is used for hiding the associated information.
Wherein, the terminal includes:
the device comprises a receiving unit and a hiding unit, wherein the receiving unit is used for receiving a hiding instruction which is input by a user through operation aiming at information needing to be hidden, and identifying the information needing to be hidden as hidden information.
The embodiment of the invention has the following beneficial effects:
according to the embodiment of the invention, the identification information is obtained, whether the identification information is matched with the preset standard identification information is judged, when the identification information is not matched with the owner identification information, the preset hidden information and the virtual information are obtained, the hidden information is hidden, and the virtual information is displayed, so that the terminal can only display the private information to the owner for checking, the information safety and privacy of the terminal are improved, and the user experience is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart illustrating a method for protecting information according to a first embodiment of the present invention;
FIG. 2 is a flow chart illustrating a method for protecting information according to a second embodiment of the present invention;
FIG. 3 is a schematic diagram of a page display in an embodiment of the invention;
FIG. 4 is a schematic illustration of another page display in an embodiment of the invention;
fig. 5 is a flowchart of a terminal according to a first embodiment of the present invention;
fig. 6 is a flowchart illustrating a second embodiment of a terminal according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminal described in the embodiments of the present invention may include: a mobile phone, a tablet computer, a palm computer, or a Mobile Internet Device (MID), etc., which are examples and not exhaustive, and include but are not limited to the above terminals.
Fig. 1 is a schematic flow chart of a method for protecting information according to a first embodiment of the present invention. As shown in fig. 1, the method for protecting information according to this embodiment includes the steps of:
s100, acquiring identification information, and judging whether the identification information is matched with preset owner identification information.
In the embodiment of the present invention, the identification information may be unlocking information input by a user. The unlocking information input by the user may be unlocking information input by the user through a touch panel, or unlocking information input by the user through a terminal key, or unlocking information input by the user through other functional modules of the terminal, such as a camera and a sensor, and the touch panel includes: a touch screen or a touch screen, without limitation. The unlocking information may include key information, slide information, pattern information, a password, and user characteristic information, wherein the user characteristic information may include: iris information, voice information of the user, fingerprint information of the user, face feature information of the user, and the like. That is, when the user sets an unlocking mode for the terminal, and when the terminal is awakened from the standby state to the operating state, the user needs to input corresponding unlocking information to unlock the terminal. Specifically, when the unlocking mode is unlocking through the touch panel, the terminal can acquire unlocking information input by a user through the touch panel; when the unlocking mode is unlocking through the camera, the terminal can acquire the characteristic information of the user as unlocking information through the camera; when the unlocking mode is unlocking through the sound sensor, the terminal can acquire the sound information of the user through the sound sensor to serve as unlocking information. The terminal may also have other unlocking manners, which is not limited herein.
In the embodiment of the present invention, the terminal may preset standard identification information, where the standard identification information may be unlocking information for unlocking the terminal in which an unlocking manner is set, and the standard identification information may include key information, slide information, pattern information, a password, fingerprint information, and the like. The terminal can preset a plurality of standard identification information, wherein one of the standard identification information is owner identification information, and the other standard identification information is non-owner identification information, wherein the owner identification information comprises owner unlocking information. When the terminal acquires unlocking information input by a user, the terminal can match the acquired unlocking information with preset standard identification information and judge whether the acquired unlocking information is matched with the standard identification information, wherein the terminal can judge whether the acquired unlocking information is matched with the owner identification information, and when the terminal judges that the acquired unlocking information is not matched with the owner identification information, the terminal can execute the step of S101 for acquiring preset hidden information and virtual information; or when the terminal judges that the acquired unlocking information is not matched with the owner identification information, the terminal can judge whether the unlocking information is matched with the non-owner identification information, when the terminal judges that the unlocking information is matched with the non-owner identification information, the terminal can execute the step of S101 for acquiring preset hidden information and virtual information, and when the terminal judges that the unlocking information is not matched with the non-owner identification information, the terminal is failed to unlock.
Optionally, in the embodiment of the present invention, the terminal may collect the feature information of the user. When the user wakes up from the standby state to the working state, the terminal may collect the feature information of the user, where the feature information of the user may include the iris information of the user, the voice information of the user, the fingerprint information of the user, the facial feature information of the user, and the like. Specifically, for example, when the terminal is awakened to enter the operating state, the terminal may start the camera to collect iris information, facial feature information, and the like of the user, or the terminal may start the sound sensor to collect sound information of the user, or the terminal may collect fingerprint information of the user through the touch screen. Further, the terminal can set the collection interval time to collect the characteristic information of the user.
In the embodiment of the present invention, the owner identification information preset by the terminal may include owner characteristic information. The owner characteristic information may include iris information of the user, voice information of the user, fingerprint information of the user, facial characteristic information of the user, and the like. When the terminal collects the characteristic information of the user, the terminal can match the collected characteristic information of the user with the owner characteristic information included in the preset owner identification information, and judge whether the obtained user characteristic information is matched with the owner characteristic information included in the owner identification information.
Optionally, in the embodiment of the present invention, when the terminal determines that the unlocking information input by the user matches the preset owner identification information, the terminal may further collect the feature information of the user, and determine whether the feature information of the user matches the owner identification information, where the terminal may periodically collect the feature information of the user, and periodically determine whether the feature information of the user matches the owner identification information. Therefore, the terminal can judge whether the user is changed in the operation process of the terminal, and the safety of the terminal is improved.
S101, when the identification information is not matched with the owner identification information, preset hidden information and virtual information are obtained.
In the embodiment of the invention, when the terminal judges that the unlocking information input by the user is not matched with the owner unlocking information included in the preset owner identification information, the terminal can acquire the preset hidden information and the virtual information; or, when the terminal judges that the unlocking information input by the user is not matched with the owner unlocking information included in the owner identification information but is matched with the non-owner unlocking information included in the non-owner identification information, the terminal can acquire preset hidden information and virtual information; or, when the terminal judges that the collected feature information of the user is not matched with the owner feature information included in the preset owner identification information, the terminal can acquire the preset hidden information and the virtual information. The hidden information may be any file stored in the terminal, where a user specifies a part of the file as the hidden information, specifically, the part of the file is as follows: user-specified applications, or files under user-specified applications, or user-specified folders, etc., such as: the mobile phone short message service system comprises a mobile phone short message application designated by a user, a short message under the mobile phone short message application designated by the user, a mobile phone contact application designated by the user, a contact under the mobile phone contact application designated by the user, a picture stored in a mobile phone designated by the user, a video designated by the user and the like. Further, the virtual information may be any file preset by the user at the terminal, specifically, the file includes: an application program preset by a user on a terminal, or a file under the application program preset by the user on the terminal, or a folder preset by the user on the terminal, and the like, for example: the mobile phone short message service system comprises a mobile phone short message application preset by a user at a terminal, a short message applied by the user at the terminal, a mobile phone contact application preset by the user at the terminal, a contact applied by the user at the mobile phone contact preset by the user at the terminal, a picture stored by the mobile phone preset by the user at the terminal, a video preset by the user at the terminal and the like.
S102, hiding the hidden information and displaying the virtual information.
In the embodiment of the invention, after the terminal acquires the preset hidden information and the virtual information, the terminal can hide the preset hidden information, so that the terminal does not display the hidden information, and a user cannot see the hidden information of the terminal. For example: when the owner presets a current display page corresponding to a certain virtual information, the terminal can display the virtual information on the current display page, and when the owner presets another display page corresponding to another virtual information, the terminal can display another virtual information when displaying another display page, and in a specific application, the terminal can for example: the owner designates hidden information and presets virtual information, wherein the hidden information can comprise a contact 2 and a short message 2, and the virtual information can comprise a contact 3 and a short message 3. When the terminal displays a display page of the contact, the terminal can hide the contact 2, and display a virtual information contact 3 and a normal contact 1, as shown in fig. 3; when the terminal displays the display page of the short message, the terminal can hide the short message 2, and display the virtual information short message 2 and the normal short message 1, as shown in fig. 4.
Optionally, in this embodiment of the present invention, after the terminal acquires the hidden information, the terminal may further acquire associated information of the hidden information, for example: when the terminal obtains the hidden information and applies the short message, the terminal can obtain all the short messages under the short message application, installation programs related to the short message application and the like. The method can effectively reduce the worry of the non-owner user of the terminal for the owner to set the limit on the non-owner user, and effectively improve the experience degree of the user and the privacy of the terminal.
According to the embodiment of the invention, the identification information is acquired, whether the identification information is matched with the preset standard identification information is judged, when the identification information is not matched with the owner identification information, the preset hidden information and the virtual information are acquired, the hidden information is hidden, and the virtual information is displayed, so that the terminal can display the corresponding information according to the identity of the user, the information safety and privacy of the terminal are improved, and the user experience is improved.
Fig. 2 is a flowchart illustrating a second embodiment of a method for information protection according to the present invention. As shown in fig. 2, the method for protecting information according to this embodiment includes the steps of:
s200, receiving a hiding instruction input by a user aiming at the information needing to be hidden, and identifying the information needing to be hidden as hidden information.
In the embodiment of the invention, the owner can preset the hidden data. The hidden information preset by the owner may include: the owner operates the information to be hidden and inputs the hidden instruction, and when the terminal receives the hidden instruction, the terminal can identify the information to be hidden, which is operated by the owner, as the hidden information. For example: the terminal can add the short message 1 into the hidden information base, and at the moment, the terminal marks the short message 1 as hidden information.
In the embodiment of the invention, the owner can also preset virtual information. The virtual information preset by the owner comprises: the owner inputs the virtual information in the virtual information base, and the terminal stores the virtual information in the virtual information base, for example: the owner adds the short message 2 into the virtual information base, at the moment, the terminal stores the short message 2 into the virtual information base, and when the terminal displays the short message, the terminal displays the short message.
S201, acquiring identification information, and judging whether the identification information is matched with preset standard identification information, wherein the standard identification information comprises owner identification information.
S202, when the identification information is not matched with the owner identification information, preset hidden information and virtual information are obtained;
s203, hiding the hidden information and displaying the virtual information.
For specific implementation of step S201, step S202, and step S203, reference may be made to the specific implementation of step S100, step S101, and step S102 in the foregoing embodiments, which is not described herein again.
According to the embodiment of the invention, the identification information is acquired, whether the identification information is matched with the preset standard identification information is judged, when the identification information is not matched with the owner identification information, the preset hidden information and the virtual information are acquired, the hidden information is hidden, and the virtual information is displayed, so that the terminal can display the corresponding information according to the identity of the user, the information safety and privacy of the terminal are improved, and the user experience is improved.
Fig. 5 is a flowchart illustrating a terminal according to a first embodiment of the present invention. As shown in fig. 5, a terminal according to this embodiment includes:
an acquisition judging unit 100, configured to acquire identification information and judge whether the identification information matches preset standard identification information, where the standard identification information includes owner identification information.
An obtaining unit 200, configured to obtain preset hidden information and virtual information when the identification information is not matched with the owner identification information.
A hidden display unit 300, configured to hide the hidden information and display the virtual information.
Wherein the identification information includes: unlocking information input by the user and characteristic information of the user.
The obtaining and determining unit 100 is specifically configured to:
receiving input unlocking information, wherein the unlocking information comprises: key information, slide information, pattern information, passwords, and fingerprint information; or,
the method comprises the steps of collecting characteristic information of a user, wherein the characteristic information comprises iris information of the user, voice information of the user, fingerprint information of the user and face characteristic information of the user.
Wherein, the terminal includes:
the judging unit is used for judging whether the unlocking information is matched with the non-owner identification information or not when the obtaining and judging unit judges that the unlocking information is not matched with the owner identification information;
and when the unlocking information is matched with the non-owner identification information, the judging unit informs the acquiring unit to acquire preset hidden information and virtual information.
The hidden display unit 300 is specifically configured to:
acquiring associated information of the hidden information;
hiding the associated information.
In the embodiment of the present invention, the identification information may be unlocking information input by a user. The unlocking information input by the user may be unlocking information input by the user through a touch panel, or unlocking information input by the user through a terminal key, or unlocking information input by the user through other functional modules of the terminal, such as a camera and a sensor, and the touch panel includes: a touch screen or a touch screen, without limitation. The unlocking information may include key information, slide information, pattern information, a password, and user characteristic information, wherein the user characteristic information may include: iris information, voice information of the user, fingerprint information of the user, face feature information of the user, and the like. That is, when the user sets an unlocking mode for the terminal, and when the terminal is awakened from the standby state to the operating state, the user needs to input corresponding unlocking information to unlock the terminal. Specifically, when the unlocking mode is unlocking through the touch panel, the obtaining and determining unit 100 may collect the unlocking information input by the user through the touch panel; when the unlocking mode is unlocking through the camera, the acquisition and judgment unit 100 can acquire the characteristic information of the user as unlocking information through the camera; when the unlocking mode is unlocking through the sound sensor, the acquisition and determination unit 100 may acquire sound information of the user through the sound sensor as the unlocking information. The obtaining and determining unit 100 may also have other unlocking manners, which is not limited herein.
In the embodiment of the present invention, the terminal may preset standard identification information, where the standard identification information may be unlocking information for unlocking the terminal in which an unlocking manner is set, and the standard identification information may include key information, slide information, pattern information, a password, fingerprint information, and the like. The terminal can preset a plurality of standard identification information, wherein one of the standard identification information is owner identification information, and the other standard identification information is non-owner identification information, wherein the owner identification information comprises owner unlocking information. When the acquisition and judgment unit 100 acquires the unlocking information input by the user, the acquisition and judgment unit 100 may match the acquired unlocking information with preset standard identification information, and judge whether the acquired unlocking information matches with the standard identification information, wherein the acquisition and judgment unit 100 may judge whether the acquired unlocking information matches with the owner identification information, and when the acquisition and judgment unit 100 judges that the acquired unlocking information does not match with the owner identification information, the acquisition and judgment unit 100 may notify the acquisition unit 200 to acquire preset hidden information and virtual information; or when the obtaining and judging unit 100 judges that the obtained unlocking information is not matched with the owner identification information, the judging unit may judge whether the unlocking information is matched with the non-owner identification information, when the judging unit judges that the unlocking information is matched with the non-owner identification information, the judging unit may notify the obtaining unit 200 to obtain preset hidden information and virtual information, and when the judging unit judges that the unlocking information is not matched with the non-owner identification information, the terminal is failed to unlock.
Optionally, in the embodiment of the present invention, the obtaining and determining unit 100 may collect feature information of a user. When the user wakes up from the standby state to the working state, the obtaining and determining unit 100 may collect the feature information of the user, where the feature information of the user may include the iris information of the user, the voice information of the user, the fingerprint information of the user, the facial feature information of the user, and the like. Specifically, for example, when the terminal is awakened to enter the operating state, the acquisition and determination unit 100 may activate a camera to collect iris information, facial feature information, and the like of the user, or the acquisition and determination unit 100 may activate a sound sensor to collect voice information of the user, or the acquisition and determination unit 100 may collect fingerprint information and the like of the user through a touch screen. Further, the acquisition judging unit 100 acquires the characteristic information of the user according to a preset acquisition interval time.
In the embodiment of the present invention, the owner identification information preset by the terminal may include owner characteristic information. The owner characteristic information may include iris information of the user, voice information of the user, fingerprint information of the user, facial characteristic information of the user, and the like. When the acquisition and judgment unit 100 acquires the feature information of the user, the acquisition and judgment unit 100 may match the acquired feature information of the user with the owner feature information included in the preset owner identification information, and judge whether the acquired user feature information matches the owner feature information included in the owner identification information.
Optionally, in the embodiment of the present invention, when the obtaining and determining unit 100 determines that the unlocking information input by the user matches preset owner identification information, the obtaining and determining unit 100 may further collect feature information of the user, and determine whether the feature information of the user matches the owner identification information, where the obtaining and determining unit 100 may collect the feature information of the user periodically, and determine whether the feature information of the user matches the owner identification information periodically. This allows the acquisition judging unit 100 to judge whether the terminal has changed the user during operation, improving the terminal security.
In the embodiment of the present invention, when the acquisition determining unit 100 determines that the unlocking information input by the user does not match the owner unlocking information included in the preset owner identification information, the acquiring unit 200 may acquire the preset hidden information and the virtual information; or, when the obtaining and determining unit 100 determines that the unlocking information input by the user is not matched with the owner unlocking information included in the owner identification information, but is matched with the non-owner unlocking information included in the non-owner identification information, the obtaining unit 200 may obtain preset hidden information and virtual information; alternatively, when the acquisition determining unit 100 determines that the acquired feature information of the user does not match the owner feature information included in the preset owner identification information, the acquiring unit 200 may acquire the preset hidden information and the virtual information. The hidden information may be any file stored in the terminal, where a user specifies a part of the file as the hidden information, specifically, the part of the file is as follows: user-specified applications, or files under user-specified applications, or user-specified folders, etc., such as: the mobile phone short message service system comprises a mobile phone short message application designated by a user, a short message under the mobile phone short message application designated by the user, a mobile phone contact application designated by the user, a contact under the mobile phone contact application designated by the user, a picture stored in a mobile phone designated by the user, a video designated by the user and the like. Further, the virtual information may be any file preset by the user at the terminal, specifically, the file includes: an application program preset by a user on a terminal, or a file under the application program preset by the user on the terminal, or a folder preset by the user on the terminal, and the like, for example: the mobile phone short message service system comprises a mobile phone short message application preset by a user at a terminal, a short message applied by the user at the terminal, a mobile phone contact application preset by the user at the terminal, a contact applied by the user at the mobile phone contact preset by the user at the terminal, a picture stored by the mobile phone preset by the user at the terminal, a video preset by the user at the terminal and the like.
In this embodiment of the present invention, after the obtaining unit 200 obtains the preset hidden information and the virtual information, the hidden display unit 300 may hide the preset hidden information, so that the hidden display unit 300 does not display the hidden information, so that the user cannot see the hidden information of the terminal, further, the hidden display unit 300 may display the preset virtual information, so that the hidden display unit 300 may display the virtual information preset by the owner, so as to guide the owner of the non-owner, and improve the security and privacy of the terminal information, further, the hidden display unit 300 may display the corresponding virtual information according to the currently displayed page. For example: when the owner presets a current display page corresponding to a certain virtual information, the hidden display unit 300 may display the virtual information on the current display page, and when the owner presets another display page corresponding to another virtual information, the hidden display unit 300 may display another virtual information when displaying another display page, in a specific application, for example: the owner designates hidden information and presets virtual information, wherein the hidden information can comprise a contact 2 and a short message 2, and the virtual information can comprise a contact 3 and a short message 3. When the terminal displays the display page of the contact, the hiding display unit 300 may hide the contact 2, and display the virtual information contact 3 and the normal contact 1, as shown in fig. 3; when the terminal displays the display page of the short message, the hiding display unit 300 may hide the short message 2, and display the virtual information short message 2 and the normal short message 1, as shown in fig. 4.
Optionally, in this embodiment of the present invention, after the terminal acquires the hidden information, the hidden display unit 300 may further acquire associated information of the hidden information, for example: when the hidden information acquired by the hidden display unit 300 is applied to the short message, the hidden display unit 300 may acquire all the short messages under the short message application, the installation program associated with the short message application, and the like. The method can effectively reduce the worry of the non-owner user of the terminal for the owner to set the limit on the non-owner user, and effectively improve the experience degree of the user and the privacy of the terminal.
According to the embodiment of the invention, the identification information is acquired, whether the identification information is matched with the preset standard identification information is judged, when the identification information is not matched with the owner identification information, the preset hidden information and the virtual information are acquired, the hidden information is hidden, and the virtual information is displayed, so that the terminal can display the corresponding information according to the identity of the user, the information safety and privacy of the terminal are improved, and the user experience is improved.
Fig. 6 is a flowchart illustrating a second embodiment of a terminal according to the present invention. As shown in fig. 6, a terminal according to this embodiment includes:
an acquisition judgment unit 100, an acquisition unit 200, and a hidden display unit 300.
Wherein, the terminal further includes:
the receiving unit 400 is configured to receive a hiding instruction input by a user for operating information that needs to be hidden, and identify the information that needs to be hidden as hidden information.
In the embodiment of the invention, the owner can preset the hidden data. The hidden information preset by the owner may include: the owner operates the information to be hidden and inputs the hidden command, and when the terminal receives the hidden command, the receiving unit 400 may identify the information to be hidden, which is operated by the owner, as the hidden information. For example: the terminal can add the short message 1 into the hidden information base, and at the moment, the terminal marks the short message 1 as hidden information.
In the embodiment of the invention, the owner can also preset virtual information. The virtual information preset by the owner comprises: the owner inputs the virtual information in the virtual information base, and the terminal stores the virtual information in the virtual information base, for example: the owner adds the short message 2 into the virtual information base, at the moment, the terminal stores the short message 2 into the virtual information base, and when the terminal displays the short message, the terminal displays the short message.
It can be understood that the functions of the functional modules of the terminal in this embodiment may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the relevant description of the foregoing method embodiment, which is not described herein again.
According to the embodiment of the invention, the identification information is acquired, whether the identification information is matched with the preset standard identification information is judged, when the identification information is not matched with the owner identification information, the preset hidden information and the virtual information are acquired, the hidden information is hidden, and the virtual information is displayed, so that the terminal can display the corresponding information according to the identity of the user, the information safety and privacy of the terminal are improved, and the user experience is improved.
The following describes a specific application process of the present invention by taking a terminal as a mobile phone as an embodiment.
In the embodiment of the invention, the mobile phone can comprise a setting module and a function module, wherein the setting module can be used for setting related options for hiding mobile phone information, the setting module can comprise a password modification module, a personal information security opening function module, a security adding module and a virtual adding module, the password modification module can be used for a user to modify the options of passwords required to be input when the user enters the setting, the personal information security opening function module can be used for the user to select whether the terminal is required to display all personal information, whether the personal information is hidden and whether a camera option is opened, the security adding module can comprise file names of all files of the terminals such as 'information', 'contact', 'note book' and the like, can be used for the user to select the files to be hidden, and the virtual adding module can be used for the user to set virtual information, such as short messages, short messages and the like added by the, Contacts, etc.
In the embodiment of the invention, when a user wakes up and unlocks on a touch screen of the mobile phone, the mobile phone can acquire unlocking information input by the user and judges whether the user is the owner of the mobile phone, when the mobile phone judges that the user is the owner of the mobile phone, if a selected option in the personal information security function module is to open the camera, the mobile phone can open the camera to verify the user and judge whether the user is the owner of the mobile phone, wherein the camera can acquire the face characteristics of the user and match the face characteristics with the preset face characteristics, if the matching is successful, the user is the owner, and if the matching is unsuccessful, the user is the non-owner. When the mobile phone judges that the user is not the mobile phone owner, the mobile phone can read the selected option in the personal information safety function module, if the selected option in the personal information safety function module is the hidden personal information, the mobile phone reads the hidden information set by the added safety module and the virtual information set by the added virtual module, acquires the hidden information and the virtual information, hides the hidden information and displays the virtual information.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (10)

1. A method of information protection, the method comprising:
acquiring identification information, and judging whether the identification information is matched with preset standard identification information or not, wherein the standard identification information comprises owner identification information;
when the identification information is not matched with the owner identification information, preset hidden information and virtual information are obtained;
and hiding the hidden information and displaying the virtual information.
2. The method of claim 1, the identification information comprising: unlocking information input by a user and characteristic information of the user;
the acquiring the identification information includes:
receiving input unlocking information, wherein the unlocking information comprises: key information, slide information, pattern information, passwords, and fingerprint information; or,
the method comprises the steps of collecting characteristic information of a user, wherein the characteristic information comprises iris information of the user, voice information of the user, fingerprint information of the user and face characteristic information of the user.
3. The method of claim 2, wherein the owner information includes non-owner identification information;
after judging whether the identification information is matched with preset standard identification information, the method comprises the following steps:
when the unlocking information is not matched with the owner identification information, judging whether the unlocking information is matched with non-owner identification information;
and when the unlocking information is matched with the non-owner identification information, executing the step of acquiring preset hidden information and virtual information.
4. The method of claim 3, wherein the hiding the hidden information comprises:
acquiring associated information of the hidden information;
hiding the associated information.
5. The method of claim 4, wherein the method comprises:
receiving a hiding instruction input by a user aiming at the information needing to be hidden, and identifying the information needing to be hidden as hidden information.
6. A terminal, characterized in that the terminal comprises:
the system comprises an acquisition judging unit, a judging unit and a judging unit, wherein the acquisition judging unit is used for acquiring identification information and judging whether the identification information is matched with preset standard identification information or not, and the standard identification information comprises owner identification information;
the acquisition unit is used for acquiring preset hidden information and virtual information when the identification information is not matched with the owner identification information;
and the hidden display unit is used for hiding the hidden information and displaying the virtual information.
7. The terminal of claim 6, the identification information comprising: unlocking information input by a user and characteristic information of the user;
the acquisition judging unit includes:
the receiving subunit is configured to receive input unlocking information, where the unlocking information includes: key information, slide information, pattern information, passwords, and fingerprint information; or,
the device comprises a collecting subunit, a processing subunit and a processing unit, wherein the collecting subunit is used for collecting characteristic information of a user, and the characteristic information comprises iris information of the user, voice information of the user, fingerprint information of the user and facial characteristic information of the user.
8. The terminal of claim 7, wherein the owner information includes non-owner identification information;
the terminal includes:
the judging unit is used for judging whether the unlocking information is matched with the non-owner identification information or not when the obtaining and judging unit judges that the unlocking information is not matched with the owner identification information;
and when the unlocking information is matched with the non-owner identification information, the judging unit informs the acquiring unit to acquire preset hidden information and virtual information.
9. The terminal of claim 8, wherein the hidden display unit comprises:
the acquisition subunit is used for acquiring the associated information of the hidden information;
and the hiding subunit is used for hiding the associated information.
10. The terminal of claim 9, wherein the terminal comprises:
the device comprises a receiving unit and a hiding unit, wherein the receiving unit is used for receiving a hiding instruction which is input by a user through operation aiming at information needing to be hidden, and identifying the information needing to be hidden as hidden information.
CN201510143803.7A 2015-03-30 2015-03-30 Information protection method and terminal Pending CN105574382A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510143803.7A CN105574382A (en) 2015-03-30 2015-03-30 Information protection method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510143803.7A CN105574382A (en) 2015-03-30 2015-03-30 Information protection method and terminal

Publications (1)

Publication Number Publication Date
CN105574382A true CN105574382A (en) 2016-05-11

Family

ID=55884503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510143803.7A Pending CN105574382A (en) 2015-03-30 2015-03-30 Information protection method and terminal

Country Status (1)

Country Link
CN (1) CN105574382A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106293751A (en) * 2016-08-15 2017-01-04 华为技术有限公司 A kind of method showing information on the terminal device and terminal unit
CN106406632A (en) * 2016-11-28 2017-02-15 维沃移动通信有限公司 Information management method and mobile terminal
CN106548167A (en) * 2016-12-09 2017-03-29 北京小米移动软件有限公司 A kind of method and device of hiden application
CN107077217A (en) * 2016-09-28 2017-08-18 达闼科技(北京)有限公司 For the control method of electronic equipment, device and electronic equipment
CN111078013A (en) * 2019-12-13 2020-04-28 努比亚技术有限公司 Message display method, mobile terminal and computer readable storage medium
CN114547708A (en) * 2022-01-14 2022-05-27 北京元年科技股份有限公司 Information security protection method, device, equipment and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812829A (en) * 2012-11-08 2014-05-21 华为技术有限公司 Method and system for improving security of remote desktop, and remote desktop server
CN104184900A (en) * 2014-08-28 2014-12-03 深圳市中兴移动通信有限公司 Data processing method, system and mobile terminal
CN104268455A (en) * 2014-10-13 2015-01-07 深圳市中兴移动通信有限公司 Mobile terminal, and information protection method and device thereof
CN104318183A (en) * 2014-11-18 2015-01-28 南京酷派软件技术有限公司 Processing method and device for communication information of terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812829A (en) * 2012-11-08 2014-05-21 华为技术有限公司 Method and system for improving security of remote desktop, and remote desktop server
CN104184900A (en) * 2014-08-28 2014-12-03 深圳市中兴移动通信有限公司 Data processing method, system and mobile terminal
CN104268455A (en) * 2014-10-13 2015-01-07 深圳市中兴移动通信有限公司 Mobile terminal, and information protection method and device thereof
CN104318183A (en) * 2014-11-18 2015-01-28 南京酷派软件技术有限公司 Processing method and device for communication information of terminal

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106293751A (en) * 2016-08-15 2017-01-04 华为技术有限公司 A kind of method showing information on the terminal device and terminal unit
WO2018032661A1 (en) * 2016-08-15 2018-02-22 华为技术有限公司 Information displaying method for terminal device, and terminal device
CN108351928A (en) * 2016-08-15 2018-07-31 华为技术有限公司 A kind of terminal device information display methods and terminal device
US11269981B2 (en) 2016-08-15 2022-03-08 Huawei Technologies Co., Ltd. Information displaying method for terminal device and terminal device
CN107077217A (en) * 2016-09-28 2017-08-18 达闼科技(北京)有限公司 For the control method of electronic equipment, device and electronic equipment
WO2018058373A1 (en) * 2016-09-28 2018-04-05 达闼科技(北京)有限公司 Control method and apparatus for electronic device, and electronic device
CN106406632A (en) * 2016-11-28 2017-02-15 维沃移动通信有限公司 Information management method and mobile terminal
CN106406632B (en) * 2016-11-28 2019-09-27 维沃移动通信有限公司 A kind of approaches to IM and mobile terminal
CN106548167A (en) * 2016-12-09 2017-03-29 北京小米移动软件有限公司 A kind of method and device of hiden application
CN111078013A (en) * 2019-12-13 2020-04-28 努比亚技术有限公司 Message display method, mobile terminal and computer readable storage medium
CN114547708A (en) * 2022-01-14 2022-05-27 北京元年科技股份有限公司 Information security protection method, device, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
US20220385471A1 (en) Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal
CN104700010B (en) Personal information protection method and protection device
JP5663644B2 (en) TERMINAL DEVICE AUTHENTICATION METHOD, TERMINAL DEVICE, AND PROGRAM
US9904774B2 (en) Method and device for locking file
CN105574382A (en) Information protection method and terminal
EP3144786B1 (en) Method and mobile terminal for processing fingerprint input information
CN103886237A (en) Control method and system for electronic device with fingerprint sensor and touch screen
US20140106711A1 (en) Method, user device and computer-readable storage for displaying message using fingerprint
CN106843729A (en) A kind of terminal control method and terminal
CN104866750A (en) Method and device for starting application
CN104778416B (en) A kind of information concealing method and terminal
CN106355141B (en) Portable electronic device and operation method thereof
CN104933342A (en) Picture viewing method and mobile terminal
CN104573485A (en) Method and device for starting terminal application
CN104182662A (en) Mobile terminal, system and method for hiding and starting hidden application programs
CN106815509B (en) Multimedia file protection method and device and electronic equipment
CN107305605B (en) Terminal equipment and application starting method
CN106682561A (en) Scanning function utilization method and device
WO2016119341A1 (en) Method and device for implementing multi-user login mode, and computer storage medium
CN107085694B (en) Information display processing method and device
CN102902907B (en) A kind of collocation method, inking device and electronic equipment
CN106453257A (en) Security verification method, apparatus and system, terminal device and network server
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
CN107742073A (en) Information displaying method, device, computer installation and computer-readable recording medium
CN105224885A (en) A kind of data processing method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160511

RJ01 Rejection of invention patent application after publication