WO2015158045A1 - Privacy protection method for electronic device and electronic device - Google Patents
Privacy protection method for electronic device and electronic device Download PDFInfo
- Publication number
- WO2015158045A1 WO2015158045A1 PCT/CN2014/081770 CN2014081770W WO2015158045A1 WO 2015158045 A1 WO2015158045 A1 WO 2015158045A1 CN 2014081770 W CN2014081770 W CN 2014081770W WO 2015158045 A1 WO2015158045 A1 WO 2015158045A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- privacy protection
- data
- protection mode
- privacy
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the present invention relates to the field of mobile communications, and in particular, to a privacy protection method for an electronic device and an electronic device.
- BACKGROUND With the development and popularization of mobile internet technologies, the functions of electronic devices are more and more powerful, and personal privacy data stored on electronic devices is also increasing. The protection of these private data becomes an important function of electronic devices. .
- personal privacy data stored on electronic devices is protected from unauthorized access or viewing by means of a lock screen, setting an application activation password lock (pattern lock), and encrypting application data.
- the above protection methods have disadvantages such as cumbersome use, slow startup speed, or limitations that are obviously detrimental to the use of certain specific scenes.
- An embodiment of the present invention provides a privacy protection method for an electronic device, including: identifying an operation of a user under a current interface; setting an electronic device to enter a privacy protection mode according to an operation of the electronic device; and in an electronic device privacy protection mode, on the current interface Hide pre-marked private data.
- the electronic device processing module is configured to: set the electronic device to exit the electronic device privacy protection mode according to the electronic device operation; and after exiting the electronic device privacy protection mode, display the electronic device privacy data on the current interface.
- the electronic device privacy data comprises: a single data or file, an application, and/or file system data within the electronic device.
- the electronic device identification module is configured to: identify the operation of the user on a specific interface or any interface of an operating system of the electronic device electronic device.
- the electronic device operation comprises: a screen click, a screen slide, a special button being triggered, and/or an action gesture shot by the camera.
- the electronic device processing module is configured to: It is determined whether the action corresponding to the operation of the electronic device is to set the electronic device to enter the privacy protection mode, and if the determination is yes, the electronic device is set to enter the privacy protection mode.
- the beneficial effects of the embodiments of the present invention are as follows: By hiding the privacy data of the user when the privacy protection mode is activated, the problem that the privacy protection operation in the prior art is cumbersome, the startup speed is slow, or the limitation is obviously unfavorable for use in certain specific scenarios is solved.
- the data is presented as normal data, and in some special scenarios (such as the above scenario), the electronic device can enter the privacy protection mode immediately by a special action or gesture operation, and the mark is private.
- the data is hidden from the interface display for protection purposes; afterwards, the privacy protection mode can be exited through a special action, and the display of the data can be restored, thereby satisfying the need to protect the privacy data, and not It will cause unnecessary troubles for daily use.
- the privacy protection mode can be quickly started and exited, and the embarrassing situation in the above situation is skillfully avoided.
- Step 301 Setting a terminal to enter and exit The specific action of the privacy protection mode; in order to quickly activate the privacy protection mode through a specific action, it is necessary to preset a specific action; in order to facilitate the exit of the privacy protection mode, the specific action of exiting the privacy protection mode is also set here. Because of the mutual exclusion of the privacy protection mode and the non-privacy protection mode, the specific actions of entering/exiting the privacy protection mode may be the same or different.
- the processing module 64 is configured to: determine whether the action corresponding to the operation is to set the electronic device to enter the privacy protection mode, and if the determination is yes, set the electronic device to enter the privacy protection mode.
- a software function module for privacy protection may be set in the electronic device, and the module may be an extension of the original module function in the electronic device, or may be a separately attached software module; the software module may The privacy data is marked on the data in the user's electronic device, and the marked data can make any data stored on the electronic device, such as a single message or a single image or a file, or the entire short message module or the built-in/external SD.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Telephone Function (AREA)
Abstract
A privacy protection method for an electronic device and the electronic device. The method comprises: recognizing an operation of a user on a current interface; setting that the electronic device enters a privacy protection mode according to the operation on the electronic device; and hiding pre-marked privacy data on the current interface in the privacy protection mode of the electronic device. By means of the method, on the premise of not causing complex operations in daily use of the user, privacy protection demands of the mobile phone user in a specific scenario can be met.
Description
一种电子设备的隐私保护方法及电子设备 技术领域 本发明涉及移动通讯领域,特别是涉及一种电子设备的隐私保护方法及电子设备。 背景技术 随着移动互联网技术的发展和普及, 电子设备的功能越来越强大, 存放在电子设 备上的个人隐私数据也越来越多, 对这些隐私数据的保护成为电子设备的一个重要的 功能。 目前的电子设备上, 已经有通过锁屏、 设置应用启动密码锁(图案锁)、 为应用 数据加密等手段和方法来保护存放在电子设备上的个人隐私数据不被非授权访问或查 看。 然而由于对电子设备终端操作的特性, 上面这些保护方法,存在着诸如使用繁琐、 启动速度慢或限制明显不利于某些特定场景使用的缺点。 如下的使用场景: 聚会上, 某位人可能对其它人的新款电子设备感兴趣而希望查看操作, 而此时该电子设备中存 有某些隐私数据不便被他人看到, 如敏感联系人通话记录、 工资短信通知或比较私密 的照片等。 此时锁屏不能达到保护的目的, 而设置密码锁加密的方式一方面会带给别 人不信任感, 另一方面这些额外的操作也给自己的日常使用带来麻烦。 故上述已有的 隐私保护手段都不能很好地在此情景下保护个人隐私, 从而引发相互之间的尴尬。 发明内容 鉴于现有技术中隐私保护操作繁琐、 启动速度慢、 或限制明显不利于某些特定场 景使用的问题, 本发明实施例提供一种克服上述问题或者至少部分地解决上述问题的 电子设备的隐私保护方法及电子设备。 本发明实施例提供一种电子设备的隐私保护方法, 包括: 识别用户在当前界面下的操作; 根据电子设备操作, 设置电子设备进入隐私保护模式; 在电子设备隐私保护模式下, 在当前界面上隐藏预先标记的隐私数据。 优选地, 上述方法还包括:
根据电子设备操作, 设置电子设备退出电子设备隐私保护模式; 退出电子设备隐私保护模式后, 在当前界面上显示电子设备隐私数据。 优选地, 电子设备隐私数据包括: 电子设备电子设备内的单个数据或文件、 应用 程序、 和 /或文件系统数据。 优选地, 识别用户在当前界面下的操作具体包括: 在特定界面或者电子设备电子 设备的操作系统任一界面上识别用户的操作。 优选地, 电子设备操作具体包括: 屏幕点击、 屏幕滑动、 触发特殊按键、 和 /或摄 像头拍摄的动作手势。 优选地, 根据电子设备操作, 设置电子设备进入隐私保护模式包括: 判断与电子设备操作对应的动作是否为设置电子设备进入隐私保护模式, 如果判 断为是, 则设置电子设备进入隐私保护模式。 本发明实施例还提供了一种电子设备, 包括: 识别模块, 设置为识别用户在当前界面下的操作; 处理模块, 设置为根据电子设备操作, 设置电子设备进入隐私保护模式, 并在电 子设备隐私保护模式下, 在当前界面上隐藏预先标记的隐私数据。 优选地, 电子设备处理模块设置为: 根据电子设备操作, 设置电子设备退出电子设备隐私保护模式; 退出电子设备隐私保护模式后, 在当前界面上显示电子设备隐私数据。 优选地, 电子设备隐私数据包括: 电子设备内的单个数据或文件、 应用程序、 和 / 或文件系统数据。 优选地, 电子设备识别模块设置为: 在特定界面或者电子设备电子设备的操作系 统任一界面上识别用户的操作。 优选地, 电子设备操作包括: 屏幕点击、 屏幕滑动、 触发特殊按键、 和 /或摄像头 拍摄的动作手势。 优选地, 电子设备处理模块设置为:
判断与电子设备操作对应的动作是否为设置电子设备进入隐私保护模式, 如果判 断为是, 则设置电子设备进入隐私保护模式。 本发明实施例有益效果如下: 通过在启动隐私保护模式时隐藏用户的隐私数据, 解决了现有技术中隐私保护操 作繁琐、 启动速度慢、 或限制明显不利于某些特定场景使用的问题, 能够在不对用户 日常使用造成操作繁琐的前提下, 满足电子设备用户在特定场景下的隐私保护需求, 并且能够根据用户操作使电子设备快速进入隐私保护模式, 从而快速保护用户的隐私 数据。 上述说明仅是本发明实施例技术方案的概述, 为了能够更清楚了解本发明实施例 的技术手段, 而可依照说明书的内容予以实施, 并且为了让本发明的上述和其它目的、 特征和优点能够更明显易懂, 以下特举本发明的具体实施方式。 附图说明 通过阅读下文优选实施方式的详细描述, 各种其他的优点和益处对于本领域普通 技术人员将变得清楚明了。 附图仅用于示出优选实施方式的目的, 而并不认为是对本 发明的限制。 而且在整个附图中, 用相同的参考符号表示相同的部件。 在附图中: 图 1是本发明实施例一的电子设备的隐私保护方法的流程图; 图 2是本发明实施例二的电子设备的隐私保护方法的流程图; 图 3是本发明实施例的电子设备的隐私保护方法的详细处理流程图; 图 4是本发明实施例的标记隐私数据的流程图; 图 5是本发明实施例的操作识别的流程图; 图 6是本发明实施例的电子设备的结构示意图; 以及 图 7是本发明实施例的电子设备处理示意图。 具体实施方式 下面将参照附图更详细地描述本公开的示例性实施例。 虽然附图中显示了本公开 的示例性实施例, 然而应当理解, 可以以各种形式实现本公开而不应被这里阐述的实
施例所限制。 相反, 提供这些实施例是为了能够更透彻地理解本公开, 并且能够将本 公开的范围完整的传达给本领域的技术人员。 为了解决现有技术中的上述技术问题, 本发明实施例提供了一种电子设备的隐私 保护方法及电子设备, 描述了针对快速启动的电子设备隐私保护机制, 可以在不对用 户日常使用造成操作繁琐的前提下,满足电子设备用户在特定场景下的隐私保护需求。 以下结合附图以及实施例, 对本发明实施例进行进一步详细说明。 应当理解, 此处所 描述的具体实施例仅仅用以解释本发明实施例, 并不限定本发明实施例。 方法实施例 根据本发明的实施例, 提供了一种电子设备的隐私保护方法, 图 1是本发明实施 例一的电子设备的隐私保护方法的流程图, 如图 1所示, 根据本发明实施例的电子设 备的隐私保护方法包括如下处理: 步骤 101, 识别用户在当前界面下的操作; 具体地, 可以在特定界面或者电子设 备的操作系统任一界面上识别用户的操作。 操作具体包括: 屏幕点击、 屏幕滑动、 触 发特殊按键、 和 /或摄像头拍摄的动作手势。 步骤 102, 根据操作, 设置电子设备进入隐私保护模式; 需要说明的是, 本发明 实施例的电子设备可以是手机、平板电脑等多种类似具有触摸屏和 /或摄像头的便携式 电子设备。 步骤 102包括: 判断与操作对应的动作是否为设置电子设备进入隐私保护模式, 如果判断为是, 则设置电子设备进入隐私保护模式。 步骤 103, 在隐私保护模式下, 在当前界面上隐藏预先标记的隐私数据。 其中, 隐私数据包括: 电子设备内的单个数据或文件、 应用程序、 和 /或文件系统数据。 优选地, 在本发明实施例中, 还可以根据操作, 设置电子设备退出隐私保护模式; 退出隐私保护模式后, 在当前界面上显示隐私数据。 本发明实施例的技术方案提供了一种隐私保护机制, 在需要保护的隐私数据生成 (如收到短信、 添加联系人) 时通过一定的机制去标记数据未隐私数据。 日常个人使 用中这些数据会作为普通数据进行呈现, 而在某些特殊场景下(如上述的场景), 可以 通过一个特殊的动作或手势操作, 使得电子设备立刻进入隐私保护模式, 对标记为隐 私的数据从界面显示上进行隐藏, 以达到保护的目的; 过后可以再通过一个特殊的动 作退出隐私保护模式, 恢复这些数据的显示, 则既可满足保护隐私数据的需要, 又不
会对日常的使用带来不必要的麻烦。 同时因为不涉及到具体的数据加密, 只是在显示 的时候对数据进行筛选识别, 这样定义的隐私保护模式可以快速启动和退出, 巧妙地 避免上述情境中的尴尬局面发生。 根据本发明的实施例, 提供了一种电子设备的隐私保护方法, 图 2是本发明实施 例二的电子设备的隐私保护方法的流程图, 如图 2所示, 根据本发明实施例的电子设 备的隐私保护方法包括如下处理: 步骤 201, 对电子设备内的隐私数据进行标记; 优选地, 在本发明实施例中, 隐 私数据包括: 电子设备内的单个数据或文件、 应用程序、 和 /或文件系统数据。 步骤 202, 识别用户的操作, 根据识别的操作启动或退出隐私保护模式; 在步骤 202中, 识别用户的操作包括: 在特定界面或者电子设备操作系统中任一 界面上识别用户的操作。 例如, 特定界面可以为解锁界面等。 其中, 操作包括: 屏幕 点击、 屏幕滑动、 触发特殊按键、 和 /或摄像头拍摄的动作手势。 在步骤 202中, 根据识别的操作启动或退出隐私保护模式包括: 判断与操作对应 的动作是设置电子设备进入隐私保护模式还是设置电子设备退出隐私保护模式, 并根 据判断结果执行相应的动作。 在实际应用中, 可以获取预先设置的操作映射表, 根据 操作映射表、 以及识别的操作确定操作对应的是启动隐私保护模式或退出隐私保护模 式, 并执行相应的操作。 步骤 203, 如果启动了隐私保护模式, 则在应用界面隐藏标记的隐私数据, 如果 关闭了隐私保护模式, 则在应用界面显示标记的隐私数据。 综上所述, 本发明实施例提供了一种借助特定的动作快速启动电子设备隐私保护 模式的方法, 在实际应用中, 电子设备内设置有用于隐私保护的软件功能, 该软件功 能可以对用户电子设备内的数据做隐私数据标记; 该软件功能可以在特定界面或全局 识别用户的特殊动作(如屏幕手势滑动或摄像头拍摄的动作手势), 并根据这些动作的 预先定义, 启动或退出隐私保护模式; 在隐私保护模式下, 标记为隐私的数据将不会 被显示到应用界面; 退出隐私保护模式后, 应用界面内的所有可显示数据都会被显示 到应用界面; 这里的数据包括但不限于应用、 应用的数据文件及电子设备文件系统内 的文件。 以下结合附图, 对本发明实施例的上述技术方案进行详细说明。
图 3是本发明实施例的电子设备的隐私保护方法的详细处理流程图,如图 3所示, 通过特定动作快速启动隐私保护模式的方法和机制包括以下步骤: 步骤 301, 设置终端进入和退出隐私保护模式的特定动作; 为了通过特定动作快速启动隐私保护模式, 需要对特定的动作进行预先设置; 为 了方便退出隐私保护模式, 这里也一并对退出隐私保护模式的特定动作进行设置。 因 为隐私保护模式和非隐私保护模式的互斥性,进入 /退出隐私保护模式的特定动作可以 相同, 也可以不同。 为了达到快速启动的目的, 在不与其它操作产生歧义的前提下, 设置的特定动作 应尽量简单和方便操作, 且可以在一个便于操作的界面内 (如桌面或待机) 或电子设 备系统全局被识别; 其中特定的动作, 包括但不限于屏幕点击和滑动、 特殊按键、 摄像头拍摄的动作 手势等可以被电子设备识别的动作事件; 其中特定动作在设置完成后, 即处于被监视的状态, 以便随时被识别。 步骤 302, 对需要保护的隐私的数据进行标记; 其中隐私数据可以是一张图片、 一条短信之类的单个数据或文件, 也可以是 SD 卡、 文件夹等的多个数据或文件, 且标记可以针对单个数据, 也可针对多个数据, 隐 私数据被标记后, 可以通过再次标记来取消隐私属性, 且标记属性在被标记前可以查 看。 需要说明的是, 基于描述的方便, 步骤 301在歩骤 302之前, 在实际使用中, 步 骤 301和步骤 302可以没有先后之分。 步骤 303, 识别进入隐私保护模式的特定动作; 前置条件: 电子设备处于非隐私保护状态下, 且已执行步骤 301和步骤 302。 其中识别特定动作, 如是非电子设备系统范围内的可识别, 需要电子设备界面切 换到可识别特定动作的界面 步骤 304, 执行步骤 303, 通知隐私保护软件模块启动隐私保护模式, 记录进入隐 私保护模式的状态, 并通知当前正在显示的界面进行刷新, 对当前界面内标记为隐私 的数据 /应用进行隐藏处理, 不在界面上显示。
在不退出隐私保护模式前, 后续所有出现的应用界面显示前都需要对界面内的数 据 /应用是否标记为隐私进行判断, 隐藏标记的隐私数据 /应用。 步骤 305, 识别退出隐私保护模式的特定动作; 前置条件: 电子设备处于隐私保护状态下, 且已执行步骤 301和 302。 其中识别特定动作, 如是非电子设备系统范围内的可识别, 需要电子设备界面切 换到可识别特定动作的界面。 步骤 306, 执行步骤 305, 通知隐私保护软件模块退出隐私保护模式, 记录退出隐 私保护模式的状态, 并通知当前正在显示的界面进行刷新, 不再对当前界面内标记为 隐私的数据 /应用进行筛选, 直接显示所有的数据 /应用。 在退出隐私保护模式后, 后续所有出现的应用界面显示前不再对界面内的数据是 否标记为隐私进行判断, 所有的数据 /应用都将被显示到界面。 图 4是本发明实施例的标记隐私数据的流程图,如图 4所示,具体包括如下处理: 步骤 401, 启动数据标记模块; 其中启动数据模块需要当前处于非隐私保护模式, 否则界面上的数据会因为隐私 保护模式的存在而显示不全。 步骤 402, 选择数据的标记模式; 其中数据标记模式有按文件系统分区标记和按应用程序标记两种模式供选择。 步骤 403, 从列出的应用列表中选择需要标记隐私的应用。 步骤 402选择按了应 用程序标记, 出现电子设备内已安装的所有应用列表, 可以在应用级别选择对整个应 用进行标记; 其中有可查看数据的应用 (如短信、 联系人、 通话记录等), 可以通过进一步点击 进行应用数据的标记。 步骤 404, 点击应用从列出的应用数据中选择需要标记隐私的数据。 步骤 403选 择了有可查看数据的应用, 出现应用可查看数据列表, 可以在此列表中针对数据进行 标记;
其中应用可查看数据列表如仍有子内容, 如联系人信息内的电子设备号码、 座机 号码等, 仍可按照步骤 403到 404的操作步骤进一歩选择, 直到可以选择具体的数据 条目为止。 步骤 405, 从列出的数据分区中, 选择需要标记隐私的分区。 步骤 402选择按了 文件系统标记, 出现电子设备文件系统根目录内的所有文件及文件夹列表, 可以在文 件和文件夹级别对数据进行标记; 其中对于文件夹, 可以通过进一步点击进行展开, 并列出文件夹下的所有目录及 文件, 仍可反复按照步骤 405的操作, 选择文件或文件夹, 直到文件夹下只有文件或 目录为空。 上面所描述的只是一种实现数据标记模块的业务流程, 实际的数据业务标记可以 是一个单独模块, 也可以是某个模块内部的一个功能 (如短消息模块内的一个选项菜 单) 或者一个单独模块及业务模块内部功能的集合。 这里所述的数据标记流程, 包括 但不限于上述形式, 任何可以实现本专利所描述的数据业务标记逻辑的功能模块均可 设置为数据标记模块的实现。 图 5是本发明实施例的操作识别的流程图, 如图 5所示, 包括如下处理: 步骤 501, 识别特定动作; 其中识别特定动作是指在电子设备可以识别动作的界 面, 完成特定的动作操作(序列), 电子设备可以识别这个操作序列且可以解析为进入 /退出隐私保护模式特殊操作; 识别特殊动作的界面, 可以使电子设备中的某一个或几个界面, 也可以是电子设 备全局的所有界面, 这取决于特定动作的类型及电子设备对它的识别能力。 步骤 502, 根据步骤 501 的特殊动作解析结果, 决定是进入还是退出隐私保护模 式; 步骤 503, 如步骤 501动作的解析结果是进入隐私保护模式, 则通知隐私保护软 件模块请求启动隐私保护模式, 标记目前的隐私保护状态, 准备好过滤界面隐私数据 的条件, 待发送消息通知前端的用户界面更新显示; 步骤 504, 如步骤 501动作的解析结果是退出隐私保护模式, 则通知隐私保护软 件模块请求退出隐私保护模式, 标记目前的隐私保护状态, 清除过滤界面隐私数据的 条件, 待发送消息通知前端的用户界面更新显示;
步骤 505, 运行在前台的应用程序收到隐私数据保护模块发来的界面更新消息后, 从隐私数据保护模块读取隐私数据的过滤条件(隐私数据是否显示),重新组织数据并 更新界面上的显示内容。 综上所述, 借助于本发明实施例的技术方案, 能够应用于电子设备等需要进行隐 私保护的设备, 可以在不影响用户日常使用的情况下, 为用户提供用一种便捷的个性 化的隐私安全解决方案。 装置实施例 根据本发明的实施例, 提供了一种电子设备, 图 6是本发明实施例的电子设备的 结构示意图, 如图 6所示, 根据本发明实施例的启动电子设备隐私保护模式的装置包 括:识别模块 62、以及处理模块 64, 以下对本发明实施例的各个模块进行详细的说明。 识别模块 62, 设置为识别用户在当前界面下的操作; 识别模块具体设置为: 在特 定界面或者电子设备的操作系统任一界面上识别用户的操作。 操作具体包括: 屏幕点 击、 屏幕滑动、 触发特殊按键、 和 /或摄像头拍摄的动作手势。 处理模块 64, 设置为根据操作, 设置电子设备进入隐私保护模式, 并在隐私保护 模式下, 在当前界面上隐藏预先标记的隐私数据。 隐私数据包括: 电子设备内的单个 数据或文件、 应用程序、 和 /或文件系统数据。 优选地, 处理模块 64设置为: 根据操作, 设置电子设备退出隐私保护模式; 退出 隐私保护模式后, 在当前界面上显示隐私数据。 处理模块 64设置为:判断与操作对应的动作是否为设置电子设备进入隐私保护模 式, 如果判断为是, 则设置电子设备进入隐私保护模式。 优选地,在实际应用中,在电子设备中可以设置一用于隐私保护的软件功能模块, 该模块可以是电子设备内原有模块功能的扩展, 也可以是单独附加的软件模块; 该软 件模块可以对用户电子设备内的数据做隐私数据标记, 标记的数据可以使电子设备上 存储的任何数据, 如一条短信, 一张图片等单个数据或文件, 也可以是整个短信模块 或内置 /外置 SD卡等应用及文件系统数据; 该软件模块有隐私保护模式和非隐私保护 模式两种工作模式, 需要在隐私保护模式下对标记为隐私数据进行隐藏, 非隐私保护 模式下对标记为隐私数据进行显示; 设置为设置和识别特定动作的模块, 该模块可以 识别并设置一组方便用户操作的特定动作的意义, 该动作包括但不限于屏幕点击和滑 动、 特殊按键、 摄像头拍摄的动作手势等可以被电子设备识别的动作事件; 根据设定
的特定动作意义快速进入或退出隐私保护模式; 可以配合隐私保护模块的应用前段界 面显示模块, 需要在隐私保护模式下对标记为隐私的数据内容进行过滤, 将此部分数 据从界面显示上剔除; 非隐私保护模式下, 显示所有可显示的数据内容。 图 7是本发明实施例的电子设备处理结构示意图, 如图 7所示, 优选地, 在实际 应用中, 该装置包含有以下两个基本模块组成: 特定动作设置识别模块 72 (对应于上 述识别模块 62), 设置为设置和识别用户的特定动作, 并将该动作解析为进入 /退出隐 私保护模块的命令, 发送给隐私数据保护模块 74; 隐私数据保护模块 74 (对应于上述 处理模块 64), 该模块的功能包括对电子设备内的数据进行隐私保护标记, 标记和记 录隐私保护模式状态, 根据隐私保护记录模块的状态, 向前端应用发送界面更新消息 的功能; 需要在隐私保护模式下对标记为隐私数据的内容进行过滤, 将此部分数据从 界面显示上剔除。 综上所述, 借助于本发明实施例的技术方案, 通过在启动隐私保护模式时隐藏用 户的隐私数据, 解决了现有技术中隐私保护操作繁琐、 启动速度慢、 或限制明显不利 于某些特定场景使用的问题, 能够在不对用户日常使用造成操作繁琐的前提下, 满足 电子设备用户在特定场景下的隐私保护需求。 显然, 本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精 神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的 范围之内, 则本发明也意图包含这些改动和变型在内。 工业实用性 本发明提供的上述技术方案, 可以应用于电子设备的隐私保护过程中, 通过在启 动隐私保护模式时隐藏用户的隐私数据, 解决了现有技术中隐私保护操作繁琐、 启动 速度慢、 或限制明显不利于某些特定场景使用的问题, 能够在不对用户日常使用造成 操作繁琐的前提下, 满足电子设备用户在特定场景下的隐私保护需求, 并且能够根据 用户操作使电子设备快速进入隐私保护模式, 从而快速保护用户的隐私数据。
TECHNICAL FIELD The present invention relates to the field of mobile communications, and in particular, to a privacy protection method for an electronic device and an electronic device. BACKGROUND With the development and popularization of mobile internet technologies, the functions of electronic devices are more and more powerful, and personal privacy data stored on electronic devices is also increasing. The protection of these private data becomes an important function of electronic devices. . On current electronic devices, personal privacy data stored on electronic devices is protected from unauthorized access or viewing by means of a lock screen, setting an application activation password lock (pattern lock), and encrypting application data. However, due to the characteristics of the operation of the electronic device terminal, the above protection methods have disadvantages such as cumbersome use, slow startup speed, or limitations that are obviously detrimental to the use of certain specific scenes. The following usage scenarios: At a party, a person may be interested in other people's new electronic devices and want to view the operation. At this time, some private data stored in the electronic device is inconvenient to be seen by others, such as a sensitive contact call. Record, pay SMS notifications or more intimate photos. At this point, the lock screen can't achieve the purpose of protection, and the way to set the password lock encryption will bring distrust to others. On the other hand, these extra operations also bring trouble to their daily use. Therefore, the existing privacy protection methods are not able to protect personal privacy in this situation, which leads to mutual embarrassment. SUMMARY OF THE INVENTION In view of the problems in the prior art that the privacy protection operation is cumbersome, the startup speed is slow, or the limitation is obviously disadvantageous for the use of certain specific scenarios, the embodiments of the present invention provide an electronic device that overcomes the above problems or at least partially solves the above problems. Privacy protection methods and electronic devices. An embodiment of the present invention provides a privacy protection method for an electronic device, including: identifying an operation of a user under a current interface; setting an electronic device to enter a privacy protection mode according to an operation of the electronic device; and in an electronic device privacy protection mode, on the current interface Hide pre-marked private data. Preferably, the above method further includes: According to the operation of the electronic device, the electronic device is set to exit the electronic device privacy protection mode; after exiting the electronic device privacy protection mode, the electronic device privacy data is displayed on the current interface. Preferably, the electronic device privacy data comprises: a single data or file, an application, and/or file system data within the electronic device electronic device. Preferably, identifying the operation of the user under the current interface specifically includes: identifying an operation of the user on a specific interface or an interface of an operating system of the electronic device electronic device. Preferably, the operation of the electronic device specifically includes: a screen click, a screen slide, a special button is triggered, and/or an action gesture photographed by the camera. Preferably, according to the operation of the electronic device, setting the electronic device to enter the privacy protection mode comprises: determining whether the action corresponding to the operation of the electronic device is to set the electronic device to enter the privacy protection mode, and if the determination is yes, setting the electronic device to enter the privacy protection mode. An embodiment of the present invention further provides an electronic device, including: an identification module, configured to identify an operation of a user under a current interface; and a processing module configured to set an electronic device to enter a privacy protection mode according to operation of the electronic device, and to be in the electronic device In the privacy mode, pre-marked private data is hidden on the current interface. Preferably, the electronic device processing module is configured to: set the electronic device to exit the electronic device privacy protection mode according to the electronic device operation; and after exiting the electronic device privacy protection mode, display the electronic device privacy data on the current interface. Preferably, the electronic device privacy data comprises: a single data or file, an application, and/or file system data within the electronic device. Preferably, the electronic device identification module is configured to: identify the operation of the user on a specific interface or any interface of an operating system of the electronic device electronic device. Preferably, the electronic device operation comprises: a screen click, a screen slide, a special button being triggered, and/or an action gesture shot by the camera. Preferably, the electronic device processing module is configured to: It is determined whether the action corresponding to the operation of the electronic device is to set the electronic device to enter the privacy protection mode, and if the determination is yes, the electronic device is set to enter the privacy protection mode. The beneficial effects of the embodiments of the present invention are as follows: By hiding the privacy data of the user when the privacy protection mode is activated, the problem that the privacy protection operation in the prior art is cumbersome, the startup speed is slow, or the limitation is obviously unfavorable for use in certain specific scenarios is solved. Under the premise that the user's daily use is cumbersome, the electronic device user can meet the privacy protection requirements in a specific scenario, and the electronic device can quickly enter the privacy protection mode according to the user operation, thereby quickly protecting the user's private data. The above description is only an overview of the technical solutions of the embodiments of the present invention, and the technical means of the embodiments of the present invention can be more clearly understood, and can be implemented according to the contents of the specification, and the above and other objects, features and advantages of the present invention can be made. It will be more apparent and understood that the specific embodiments of the invention are set forth below. BRIEF DESCRIPTION OF THE DRAWINGS Various other advantages and benefits will become apparent to those skilled in the art from this description. The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. 1 is a flowchart of a method for protecting a privacy of an electronic device according to Embodiment 1 of the present invention; FIG. 2 is a flowchart of a method for protecting a privacy of an electronic device according to Embodiment 2 of the present invention; FIG. 4 is a flowchart of marking privacy data according to an embodiment of the present invention; FIG. 5 is a flowchart of operation identification according to an embodiment of the present invention; FIG. 6 is a flowchart of an operation of the embodiment of the present invention; A schematic diagram of the structure of an electronic device; and FIG. 7 is a schematic diagram of processing of an electronic device according to an embodiment of the present invention. DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although the exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be implemented in various forms and should not be The restrictions are imposed by the regulations. Rather, these embodiments are provided so that this disclosure will be more fully understood, and the scope of the disclosure may be fully disclosed to those skilled in the art. In order to solve the above-mentioned technical problems in the prior art, an embodiment of the present invention provides a privacy protection method and an electronic device for an electronic device, and describes a privacy protection mechanism for an electronic device that is quickly activated, which may be cumbersome to operate without daily use of the user. Under the premise, meet the privacy protection needs of users of electronic devices in specific scenarios. The embodiments of the present invention are further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the embodiments of the present invention Method Embodiments According to an embodiment of the present invention, a privacy protection method for an electronic device is provided. FIG. 1 is a flowchart of a privacy protection method for an electronic device according to Embodiment 1 of the present invention. As shown in FIG. 1, according to the present invention, The privacy protection method of the electronic device includes the following processing: Step 101: Identify an operation of the user under the current interface; specifically, the operation of the user may be identified on a specific interface or an interface of an operating system of the electronic device. The operations specifically include: screen tapping, screen sliding, triggering special buttons, and/or action gestures taken by the camera. Step 102: According to the operation, the electronic device is set to enter a privacy protection mode. The electronic device in the embodiment of the present invention may be a portable electronic device similar to a mobile phone, a tablet computer, or the like, having a touch screen and/or a camera. Step 102 includes: determining whether the action corresponding to the operation is to set the electronic device to enter the privacy protection mode, and if the determination is yes, setting the electronic device to enter the privacy protection mode. Step 103: Hide the pre-marked private data on the current interface in the privacy protection mode. The privacy data includes: a single data or file, an application, and/or file system data within the electronic device. Preferably, in the embodiment of the present invention, the electronic device may be set to exit the privacy protection mode according to the operation; after exiting the privacy protection mode, the privacy data is displayed on the current interface. The technical solution of the embodiment of the present invention provides a privacy protection mechanism for marking data non-private data through a certain mechanism when generating privacy data (such as receiving a short message or adding a contact). In daily personal use, the data is presented as normal data, and in some special scenarios (such as the above scenario), the electronic device can enter the privacy protection mode immediately by a special action or gesture operation, and the mark is private. The data is hidden from the interface display for protection purposes; afterwards, the privacy protection mode can be exited through a special action, and the display of the data can be restored, thereby satisfying the need to protect the privacy data, and not It will cause unnecessary troubles for daily use. At the same time, because it does not involve specific data encryption, it only filters and identifies the data at the time of display. The defined privacy protection mode can be quickly started and exited, and the embarrassing situation in the above situation is skillfully avoided. According to an embodiment of the present invention, a privacy protection method for an electronic device is provided. FIG. 2 is a flowchart of a privacy protection method for an electronic device according to Embodiment 2 of the present invention. As shown in FIG. 2, an electronic device according to an embodiment of the present invention is shown. The method for protecting the privacy of the device includes the following steps: Step 201: Mark the privacy data in the electronic device. Preferably, in the embodiment of the present invention, the privacy data includes: a single data or file in the electronic device, an application, and/or Or file system data. Step 202: Identify an operation of the user, start or exit the privacy protection mode according to the identified operation. In step 202, identifying the operation of the user includes: identifying the operation of the user on any interface of the specific interface or the electronic device operating system. For example, the specific interface may be an unlock interface or the like. Among them, the operations include: screen click, screen slide, trigger special button, and/or action gesture shot by the camera. In step 202, starting or exiting the privacy protection mode according to the identified operation includes: determining whether the action corresponding to the operation is setting whether the electronic device enters the privacy protection mode or setting the electronic device to exit the privacy protection mode, and performing a corresponding action according to the determination result. In an actual application, a preset operation mapping table may be acquired, and according to the operation mapping table and the identified operation, the operation corresponding to the operation is to initiate a privacy protection mode or exit the privacy protection mode, and perform a corresponding operation. Step 203: If the privacy protection mode is activated, the marked privacy data is hidden in the application interface, and if the privacy protection mode is turned off, the marked private data is displayed on the application interface. In summary, the embodiment of the present invention provides a method for quickly starting an electronic device privacy protection mode by using a specific action. In an actual application, a software function for privacy protection is set in the electronic device, and the software function can be used for the user. The data in the electronic device is marked as a private data; the software function can identify the user's special actions (such as screen gesture sliding or camera shooting action gestures) in a specific interface or globally, and activate or deactivate privacy protection according to the predefined actions of these actions. Mode; In privacy mode, data marked as private will not be displayed to the application interface; after exiting privacy protection mode, all displayable data in the application interface will be displayed to the application interface; the data here includes but is not limited to Applications, application data files, and files within the electronic device file system. The above technical solutions of the embodiments of the present invention are described in detail below with reference to the accompanying drawings. 3 is a detailed processing flowchart of a method for protecting a privacy of an electronic device according to an embodiment of the present invention. As shown in FIG. 3, a method and mechanism for quickly starting a privacy protection mode by using a specific action includes the following steps: Step 301: Setting a terminal to enter and exit The specific action of the privacy protection mode; in order to quickly activate the privacy protection mode through a specific action, it is necessary to preset a specific action; in order to facilitate the exit of the privacy protection mode, the specific action of exiting the privacy protection mode is also set here. Because of the mutual exclusion of the privacy protection mode and the non-privacy protection mode, the specific actions of entering/exiting the privacy protection mode may be the same or different. In order to achieve the purpose of quick start, the specific actions set should be as simple and convenient as possible without any ambiguity with other operations, and can be globally operated in an easy-to-operate interface (such as desktop or standby) or electronic device system. Identifying; specific actions, including but not limited to screen clicks and slides, special buttons, action gestures captured by the camera, etc., which can be recognized by the electronic device; wherein the specific action is in the monitored state after the setting is completed, so that It is recognized at any time. Step 302: Mark the data of the privacy that needs to be protected; wherein the privacy data may be a single data or a file such as a picture, a short message, or multiple data or files of an SD card, a folder, etc., and mark It can be for a single data or for multiple data. After the privacy data is tagged, the privacy attribute can be cancelled by re-marking, and the tag attribute can be viewed before being tagged. It should be noted that, based on the convenience of description, step 301 is preceded by step 302. In actual use, step 301 and step 302 may be in no particular order. Step 303: Identify a specific action to enter the privacy protection mode. Precondition: The electronic device is in a non-privacy protection state, and step 301 and step 302 have been performed. The specific action is identified, such as being identifiable within the range of the non-electronic device system, and the electronic device interface is required to switch to the interface step 304 for recognizing the specific action. Step 303 is executed to notify the privacy protection software module to activate the privacy protection mode, and the record enters the privacy protection mode. The status, and notify the currently displayed interface to refresh, hide the data/application marked as private in the current interface, and do not display on the interface. Before exiting the privacy protection mode, all subsequent application interfaces need to be judged whether the data/application in the interface is marked as privacy, and the tagged private data/application is hidden. Step 305: Identify a specific action of exiting the privacy protection mode; Precondition: The electronic device is in a privacy protection state, and steps 301 and 302 have been performed. Where a specific action is identified, such as being identifiable within the scope of the non-electronic device system, the electronic device interface is required to switch to an interface that identifies the particular action. Step 306, executing step 305, notifying the privacy protection software module to exit the privacy protection mode, recording the status of exiting the privacy protection mode, and notifying the currently displayed interface to refresh, and no longer filtering the data/application marked as private in the current interface. , directly display all data / applications. After exiting the privacy protection mode, all subsequent application interface displays no longer judge whether the data in the interface is marked as private, and all data/applications will be displayed to the interface. 4 is a flowchart of tagging privacy data according to an embodiment of the present invention. As shown in FIG. 4, the method specifically includes the following steps: Step 401: Start a data tagging module; wherein the initiating data module needs to be in a non-privacy protection mode, otherwise Data will be incomplete due to the existence of privacy protection patterns. Step 402: Select a mark mode of the data; wherein the data mark mode has two modes selected by a file system partition mark and an application mark. Step 403: Select an application that needs to mark privacy from the listed application list. Step 402: Selecting the application tag, a list of all applications installed in the electronic device appears, and the entire application can be marked at the application level; there are applications (such as short messages, contacts, call records, etc.) that can view data. The markup of the application data can be made by further clicking. Step 404: Click the application to select data that needs to be marked for privacy from the listed application data. Step 403 selects an application that has data to view, and an application can view a list of data, and the data can be marked in the list; The application can view the data list, such as the child content, such as the electronic device number in the contact information, the landline number, etc., and can still select according to the operation steps of steps 403 to 404 until a specific data entry can be selected. Step 405: From the listed data partitions, select a partition that needs to be marked for privacy. Step 402 selects the file system markup, and a list of all files and folders in the root directory of the electronic device file system appears, and the data can be marked at the file and folder level; wherein for the folder, the file can be expanded by further clicking, and List all the directories and files under the folder. You can still select the file or folder by repeatedly following the steps in step 405 until only the file or directory is empty under the folder. What is described above is only a business process that implements the data tagging module. The actual data service tag can be a single module, or it can be a function inside a module (such as an option menu in a short message module) or a separate A collection of modules and internal functions of a business module. The data tagging process described herein includes, but is not limited to, the above-described form, and any functional module that can implement the data service tagging logic described in this patent can be configured as an implementation of the data tagging module. FIG. 5 is a flowchart of operation identification according to an embodiment of the present invention. As shown in FIG. 5, the method includes the following steps: Step 501: Identify a specific action; wherein identifying a specific action refers to completing a specific action on an interface that the electronic device can recognize the action. Operation (sequence), the electronic device can recognize this sequence of operations and can be parsed into a special operation of entering/exiting the privacy protection mode; the interface for identifying a special action can make one or several interfaces in the electronic device or the electronic device globally All interfaces, depending on the type of action and the ability of the electronic device to recognize it. Step 502: Determine, according to the special action parsing result of step 501, whether to enter or exit the privacy protection mode. Step 503: If the parsing result of the action of step 501 is to enter the privacy protection mode, notify the privacy protection software module to request to initiate the privacy protection mode, marking The current privacy protection state, the condition for filtering the privacy data of the interface is ready, and the user interface update display of the front end is sent to the message. Step 504: If the parsing result of the action of step 501 is to exit the privacy protection mode, the privacy protection software module is notified to request to exit. Privacy protection mode, marking the current privacy protection status, clearing the conditions for filtering the privacy data of the interface, and notifying the front end user interface update display of the message to be sent; Step 505: After receiving the interface update message sent by the privacy data protection module, the application running in the foreground reads the filtering condition of the private data from the privacy data protection module (whether the privacy data is displayed), reorganizes the data, and updates the interface. Display content. In summary, the technical solution of the embodiments of the present invention can be applied to devices that require privacy protection, such as electronic devices, and can provide users with a convenient and personalized individualization without affecting the daily use of the user. Privacy security solution. The device embodiment provides an electronic device according to an embodiment of the present invention. FIG. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. As shown in FIG. 6, the privacy protection mode of the electronic device is activated according to an embodiment of the present invention. The device includes an identification module 62 and a processing module 64. The various modules of the embodiments of the present invention are described in detail below. The identification module 62 is configured to identify an operation of the user under the current interface; the identification module is specifically configured to: identify the operation of the user on a specific interface or an interface of an operating system of the electronic device. The operations specifically include: screen tapping, screen sliding, triggering special buttons, and/or action gestures taken by the camera. The processing module 64 is configured to set the electronic device to enter the privacy protection mode according to the operation, and hide the pre-marked private data on the current interface in the privacy protection mode. Privacy data includes: Single data or files, applications, and/or file system data within an electronic device. Preferably, the processing module 64 is configured to: set the electronic device to exit the privacy protection mode according to the operation; after exiting the privacy protection mode, display the privacy data on the current interface. The processing module 64 is configured to: determine whether the action corresponding to the operation is to set the electronic device to enter the privacy protection mode, and if the determination is yes, set the electronic device to enter the privacy protection mode. Preferably, in an actual application, a software function module for privacy protection may be set in the electronic device, and the module may be an extension of the original module function in the electronic device, or may be a separately attached software module; the software module may The privacy data is marked on the data in the user's electronic device, and the marked data can make any data stored on the electronic device, such as a single message or a single image or a file, or the entire short message module or the built-in/external SD. Application data and file system data such as cards; the software module has two working modes: privacy protection mode and non-privacy protection mode, and the privacy data is hidden in the privacy protection mode, and the private data is marked in the non-privacy protection mode. Display; set to set and identify a specific action module, the module can identify and set a set of meanings that are convenient for the user to operate, including but not limited to screen clicks and slides, special buttons, action gestures taken by the camera, etc. Action event recognized by the electronic device; According to the setting The specific action meaning quickly enters or exits the privacy protection mode; the front-end interface display module of the privacy protection module can be matched, and the data content marked as privacy needs to be filtered in the privacy protection mode, and the part of the data is removed from the interface display; In the non-privacy mode, all displayable data content is displayed. FIG. 7 is a schematic diagram of a processing structure of an electronic device according to an embodiment of the present invention. As shown in FIG. 7, preferably, in an actual application, the device includes the following two basic modules: a specific action setting identification module 72 (corresponding to the above identification) The module 62) is configured to set and recognize a specific action of the user, and parse the action into a command to enter/exit the privacy protection module, and send the command to the privacy data protection module 74; the privacy data protection module 74 (corresponding to the processing module 64) The function of the module includes: performing privacy protection marking on the data in the electronic device, marking and recording the state of the privacy protection mode, and transmitting the interface update message to the front-end application according to the state of the privacy protection recording module; Filter the content marked as private data and remove this part of the data from the interface display. In summary, the technical solution of the embodiment of the present invention solves the problem that the privacy protection operation in the prior art is cumbersome, the startup speed is slow, or the limitation is obviously disadvantageous to certain ones by hiding the user's private data when the privacy protection mode is activated. The problem of using a specific scenario can meet the privacy protection requirements of the electronic device user in a specific scenario without causing cumbersome operation for the user's daily use. It is apparent that those skilled in the art can make various modifications and variations to the invention without departing from the spirit and scope of the invention. Thus, it is intended that the present invention cover the modifications and the modifications of the invention INDUSTRIAL APPLICABILITY The above technical solution provided by the present invention can be applied to the privacy protection process of an electronic device, and the privacy protection operation in the prior art is cumbersome and slow to start, by hiding the privacy data of the user when the privacy protection mode is activated. Or limiting the problem that is obviously not conducive to the use of certain specific scenarios, and satisfying the privacy protection requirements of the electronic device user in a specific scenario without causing cumbersome operation for the user's daily use, and enabling the electronic device to quickly enter the privacy according to the user operation. Protect the mode to quickly protect the user's private data.
Claims
权 利 要 求 书 、 一种电子设备的隐私保护方法, 包括: Claims, a method of privacy protection for electronic devices, including:
识别用户在当前界面下的操作; 根据所述操作, 设置电子设备进入隐私保护模式; Identifying the operation of the user under the current interface; according to the operation, setting the electronic device to enter a privacy protection mode;
在所述隐私保护模式下, 在当前界面上隐藏预先标记的隐私数据。 、 如权利要求 1所述的方法, 其中, 所述方法还包括: 根据所述操作, 设置电子设备退出所述隐私保护模式; In the privacy protection mode, pre-marked private data is hidden on the current interface. The method of claim 1, wherein the method further comprises: setting the electronic device to exit the privacy protection mode according to the operation;
退出所述隐私保护模式后, 在当前界面上显示所述隐私数据。 、 如权利要求 1或 2所述的方法, 其中, 所述隐私数据包括: 所述电子设备内的 单个数据或文件、 应用程序、 和 /或文件系统数据。 、 如权利要求 1或 2所述的方法, 其中, 识别用户在当前界面下的操作包括: 在 特定界面或者所述电子设备的操作系统任一界面上识别用户的操作。 、 如权利要求 1或 2所述的方法, 其中, 所述操作包括: 屏幕点击、 屏幕滑动、 触发特殊按键、 和 /或摄像头拍摄的动作手势。 、 如权利要求 1所述的方法, 其中, 根据所述操作, 设置电子设备进入隐私保护 模式包括: After exiting the privacy protection mode, the privacy data is displayed on the current interface. The method of claim 1 or 2, wherein the privacy data comprises: a single data or file, an application, and/or file system data within the electronic device. The method according to claim 1 or 2, wherein the identifying the user's operation under the current interface comprises: identifying the user's operation on a specific interface or any interface of the operating system of the electronic device. The method according to claim 1 or 2, wherein the operation comprises: a screen click, a screen slide, a special button being triggered, and/or an action gesture shot by the camera. The method according to claim 1, wherein, according to the operation, setting the electronic device to enter the privacy protection mode comprises:
判断与所述操作对应的动作是否为设置电子设备进入隐私保护模式, 如果 判断为是, 则设置电子设备进入隐私保护模式。 、 一种电子设备, 包括: 识别模块, 设置为识别用户在当前界面下的操作; It is determined whether the action corresponding to the operation is to set the electronic device to enter the privacy protection mode, and if the determination is yes, the electronic device is set to enter the privacy protection mode. An electronic device, comprising: an identification module configured to identify an operation of the user under the current interface;
处理模块, 设置为根据所述操作, 设置电子设备进入隐私保护模式, 并在 所述隐私保护模式下, 在当前界面上隐藏预先标记的隐私数据。 、 如权利要求 7所述的电子设备, 其中, 所述处理模块设置为: 根据所述操作, 设置电子设备退出所述隐私保护模式; The processing module is configured to set the electronic device to enter a privacy protection mode according to the operation, and hide the pre-marked private data on the current interface in the privacy protection mode. The electronic device of claim 7, wherein the processing module is configured to: set the electronic device to exit the privacy protection mode according to the operation;
退出所述隐私保护模式后, 在当前界面上显示所述隐私数据。
、 如权利要求 7或 8所述的电子设备, 其中, 所述隐私数据包括: 电子设备内的 单个数据或文件、 应用程序、 和 /或文件系统数据。 0、 如权利要求 7或 8所述的电子设备, 其中, 所述识别模块设置为: 在特定界面 或者所述电子设备的操作系统任一界面上识别用户的操作。 1、 如权利要求 7或 8所述的电子设备, 其中, 所述操作包括: 屏幕点击、 屏幕滑 动、 触发特殊按键、 和 /或摄像头拍摄的动作手势。 、 如权利要求 7所述的电子设备, 其中, 所述处理模块设置为: 判断与所述操作对应的动作是否为设置电子设备进入隐私保护模式, 如果 判断为是, 则设置电子设备进入隐私保护模式。
After exiting the privacy protection mode, the privacy data is displayed on the current interface. The electronic device according to claim 7 or 8, wherein the privacy data comprises: a single data or file, an application program, and/or file system data within the electronic device. The electronic device according to claim 7 or 8, wherein the identification module is configured to: identify an operation of the user on a specific interface or an interface of an operating system of the electronic device. 1. The electronic device according to claim 7 or 8, wherein the operation comprises: a screen click, a screen slide, a special button being triggered, and/or an action gesture shot by the camera. The electronic device according to claim 7, wherein the processing module is configured to: determine whether the action corresponding to the operation is to set the electronic device to enter a privacy protection mode, and if the determination is yes, set the electronic device to enter the privacy protection mode.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410151504.3A CN104200170B (en) | 2014-04-15 | 2014-04-15 | The method for secret protection and electronic equipment of a kind of electronic equipment |
CN201410151504.3 | 2014-04-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015158045A1 true WO2015158045A1 (en) | 2015-10-22 |
Family
ID=52085461
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/081770 WO2015158045A1 (en) | 2014-04-15 | 2014-07-07 | Privacy protection method for electronic device and electronic device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104200170B (en) |
WO (1) | WO2015158045A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018165562A1 (en) * | 2017-03-10 | 2018-09-13 | Sony Interactive Entertainment LLC | Maintaining privacy for multiple users when serving media content to a group |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106341517A (en) * | 2015-07-07 | 2017-01-18 | 中兴通讯股份有限公司 | Information hiding method and corresponding terminal equipment |
CN105260671B (en) * | 2015-09-11 | 2018-11-20 | 北京金山安全软件有限公司 | Control method and device for notification bar of mobile terminal and mobile equipment |
CN105426717A (en) * | 2015-11-11 | 2016-03-23 | 广东欧珀移动通信有限公司 | A method and device for displaying an interface |
CN106919849A (en) * | 2015-12-24 | 2017-07-04 | 北京三星通信技术研究有限公司 | Method for secret protection and device |
CN105739817B (en) * | 2016-01-20 | 2019-01-22 | 厦门美图移动科技有限公司 | Icon hiding method, device and mobile terminal |
CN107306311A (en) * | 2016-04-25 | 2017-10-31 | 中兴通讯股份有限公司 | A kind of unlocking screen method, device and mobile terminal |
CN106250724A (en) * | 2016-07-25 | 2016-12-21 | 深圳天珑无线科技有限公司 | A kind of application control method, device and mobile device |
CN107133509A (en) * | 2017-04-28 | 2017-09-05 | 北京小米移动软件有限公司 | Method for secret protection and equipment |
CN109151188A (en) * | 2018-08-03 | 2019-01-04 | Oppo广东移动通信有限公司 | Foldable electronic equipment and display method based on same |
CN110968889B (en) * | 2018-09-30 | 2024-12-10 | 中兴通讯股份有限公司 | Data protection method, device, apparatus and computer storage medium |
CN114527900A (en) * | 2020-10-30 | 2022-05-24 | 华为技术有限公司 | Interface information display method and electronic equipment |
CN114020377A (en) * | 2021-10-15 | 2022-02-08 | 青岛海信移动通信技术股份有限公司 | Terminal device, picture information protection method and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103136479A (en) * | 2011-11-22 | 2013-06-05 | 中兴通讯股份有限公司 | Information protection method and device of mobile terminal |
US20130227709A1 (en) * | 2012-02-24 | 2013-08-29 | William Geoffrey Herbert | Content Control System |
CN103327183A (en) * | 2013-06-13 | 2013-09-25 | 中国科学院信息工程研究所 | Black box protecting method and system for private data of Android user based on tag |
CN103530549A (en) * | 2013-09-23 | 2014-01-22 | 北京奇虎科技有限公司 | Method and device for processing document/application program on mobile communication terminal |
CN103577220A (en) * | 2013-08-31 | 2014-02-12 | 成都西可科技有限公司 | System and method for opening private application or private data through NFC (near field communication) label |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20130143697A (en) * | 2010-11-20 | 2013-12-31 | 뉘앙스 커뮤니케이션즈, 인코포레이티드 | Performing actions on a computing device using a contextual keyboard |
-
2014
- 2014-04-15 CN CN201410151504.3A patent/CN104200170B/en active Active
- 2014-07-07 WO PCT/CN2014/081770 patent/WO2015158045A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103136479A (en) * | 2011-11-22 | 2013-06-05 | 中兴通讯股份有限公司 | Information protection method and device of mobile terminal |
US20130227709A1 (en) * | 2012-02-24 | 2013-08-29 | William Geoffrey Herbert | Content Control System |
CN103327183A (en) * | 2013-06-13 | 2013-09-25 | 中国科学院信息工程研究所 | Black box protecting method and system for private data of Android user based on tag |
CN103577220A (en) * | 2013-08-31 | 2014-02-12 | 成都西可科技有限公司 | System and method for opening private application or private data through NFC (near field communication) label |
CN103530549A (en) * | 2013-09-23 | 2014-01-22 | 北京奇虎科技有限公司 | Method and device for processing document/application program on mobile communication terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018165562A1 (en) * | 2017-03-10 | 2018-09-13 | Sony Interactive Entertainment LLC | Maintaining privacy for multiple users when serving media content to a group |
US10402630B2 (en) | 2017-03-10 | 2019-09-03 | Sony Interactive Entertainment LLC | Maintaining privacy for multiple users when serving media to a group |
Also Published As
Publication number | Publication date |
---|---|
CN104200170B (en) | 2018-06-19 |
CN104200170A (en) | 2014-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015158045A1 (en) | Privacy protection method for electronic device and electronic device | |
US9904774B2 (en) | Method and device for locking file | |
CN104992091B (en) | Method, device and storage medium for accessing terminal | |
CN104008348B (en) | application control method, device and terminal | |
CN104408344B (en) | System switching method, system switching device and terminal | |
EP3349424A1 (en) | Method for protecting privacy information and terminal device | |
CN106104601A (en) | Virtual card Activiation method and device | |
JP2017518598A (en) | Authority management method, apparatus, program, and recording medium | |
CN104572175B (en) | A kind of method and device for quickly starting non-privacy type application | |
JP6442493B2 (en) | Method and apparatus for unlocking | |
CN104660907A (en) | Shooting method and device as well as mobile terminal | |
CN111368329B (en) | Message display method and device, electronic equipment and storage medium | |
WO2018081919A1 (en) | Method and apparatus for hiding application icon | |
CN104318137A (en) | Operating system and/or application program start or switch method, device and terminal | |
CN105488368A (en) | Safety protection method and system of electronic device | |
WO2017181544A1 (en) | Method and device for managing task of instant messaging application | |
RU2643470C2 (en) | Search method and search device | |
CN105117115B (en) | A kind of method and apparatus for showing electronic document | |
CN104750478B (en) | The display methods and device of application interface | |
CN106548050A (en) | Using startup method and device | |
CN105760796B (en) | Application security processing method and device | |
WO2017211021A1 (en) | Application trigger method and device | |
CN104820538B (en) | The deployment method and system of a kind of photograph album | |
CN112685733B (en) | Safety detection method, safety detection device and storage medium | |
EP4220364A1 (en) | Method for presenting interface information, and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14889777 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14889777 Country of ref document: EP Kind code of ref document: A1 |