[go: up one dir, main page]

CN106599712A - Electronic equipment and control method thereof - Google Patents

Electronic equipment and control method thereof Download PDF

Info

Publication number
CN106599712A
CN106599712A CN201610911018.6A CN201610911018A CN106599712A CN 106599712 A CN106599712 A CN 106599712A CN 201610911018 A CN201610911018 A CN 201610911018A CN 106599712 A CN106599712 A CN 106599712A
Authority
CN
China
Prior art keywords
information
personal information
application
encrypted
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610911018.6A
Other languages
Chinese (zh)
Inventor
姜龙求
黄勇皓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Priority to CN201610911018.6A priority Critical patent/CN106599712A/en
Publication of CN106599712A publication Critical patent/CN106599712A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

提供了一种电子设备及其控制方法。执行使用个人信息执行功能的至少一个应用的电子设备包括:存储器,被配置为存储个人信息,其中与个人信息的保护有关的信息针对每个应用被设置,处理器,被配置为响应于从应用接收到对于个人信息的请求,基于设置的信息确定是否保护个人信息,基于确定结果对个人信息进行加密并向应用提供加密的个人信息,响应于从应用接收到对于与加密的个人信息有关的功能的执行请求,处理器还被配置为对加密的个人信息进行解密并执行所述功能。因此,即使在设置个人信息的保护之后,用户也可正常地使用服务并防止个人信息被泄露。

Provided are an electronic device and a control method thereof. An electronic device that executes at least one application that performs a function using personal information includes a memory configured to store the personal information, wherein information related to protection of the personal information is set for each application, and a processor configured to respond to the information from the application. Receives a request for personal information, determines whether to protect personal information based on the set information, encrypts personal information based on the determination result and provides encrypted personal information to the application, responds to receiving a request for a function related to encrypted personal information from the application The processor is further configured to decrypt the encrypted personal information and perform the described function. Therefore, even after the protection of personal information is set, the user can normally use the service and prevent personal information from being leaked.

Description

电子设备及其控制方法Electronic device and control method thereof

本申请要求于2015年10月19日在韩国知识产权局提交的第10-2015-0145551号韩国专利申请和于2016年4月18日在韩国知识产权局提交的第10-2016-0047135号韩国专利申请的优先权,该申请的公开通过引用其全部合并于此。This application claims Korean Patent Application No. 10-2015-0145551 filed with the Korean Intellectual Property Office on October 19, 2015 and Korean Patent Application No. 10-2016-0047135 filed with the Korean Intellectual Property Office on April 18, 2016 priority to a patent application, the disclosure of which is hereby incorporated by reference in its entirety.

技术领域technical field

本公开的各方面通常涉及一种电子设备及其控制方法,例如,涉及一种保护个人信息的电子设备及其控制方法。Aspects of the present disclosure generally relate to an electronic device and a control method thereof, for example, to an electronic device protecting personal information and a control method thereof.

背景技术Background technique

随着电子技术的发展,各种类型的电子产品已经得到开发和分布。具体地讲,各种显示设备(诸如TV、智能电话、PC、笔记本PC和PDA)被广泛地用于一般家庭。With the development of electronic technology, various types of electronic products have been developed and distributed. In particular, various display devices such as TVs, smart phones, PCs, notebook PCs, and PDAs are widely used in general households.

随着这样的显示设备被广泛地使用,用户对各种功能的需求已经增加。因此,制造商努力满足用户的渐增的需求,推出具有新功能的产品。As such display devices are widely used, user demands for various functions have increased. Therefore, manufacturers strive to meet the increasing demands of users and launch products with new functions.

具体地讲,这样的显示设备可执行各种应用,并且那些应用可请求用户的个人信息以执行各种功能。获得个人信息的应用可基于获得的个人信息执行各种功能。In particular, such display devices can execute various applications, and those applications can request user's personal information to perform various functions. An application that obtains personal information may perform various functions based on the obtained personal information.

但是,在这种情况下,用户的个人信息可能通过应用被泄露,这不是用户的意图并可能引起问题。However, in this case, the user's personal information may be leaked through the application, which is not the user's intention and may cause problems.

发明内容Contents of the invention

本示例实施例的一方面涉及一种电子设备及其控制方法,其中,所述电子设备被配置为执行应用并在保护个人信息的同时提供正常服务。An aspect of the present example embodiments relates to an electronic device configured to execute applications and provide normal services while protecting personal information and a controlling method thereof.

根据示例实施例,提供了一种被配置为执行使用个人信息执行功能的至少一个应用的电子设备,所述电子设备包括:存储器,被配置为存储个人信息,其中,与个人信息的保护有关的信息针对每个应用被设置,处理器,被配置为,响应于从应用接收到对于个人信息的请求,基于设置的信息确定是否保护个人信息,基于确定结果对个人信息进行加密并向应用提供加密的个人信息,响应于从应用接收到对于与加密的个人信息有关的功能的执行请求,对加密的个人信息进行解密并执行所述功能。According to an example embodiment, there is provided an electronic device configured to execute at least one application that performs a function using personal information, the electronic device including: a memory configured to store personal information, wherein the protection of the personal information The information is set for each application, and the processor is configured to, in response to receiving a request for the personal information from the application, determine whether to protect the personal information based on the set information, encrypt the personal information based on a determination result, and provide the application with encryption. In response to receiving an execution request for a function related to the encrypted personal information from the application, the encrypted personal information is decrypted and the function is executed.

处理器可被配置为确定来自应用的请求是对于个人信息的请求还是执行功能的请求。The processor may be configured to determine whether the request from the application is a request for personal information or a request to perform a function.

处理器可被配置为:当应用请求个人信息时,基于与个人信息的保护有关的信息确定是否保护个人信息,或者当由应用请求的个人信息是预设的个人信息时,基于与个人信息的保护有关的信息确定是否保护个人信息。The processor may be configured to determine whether to protect the personal information based on information related to the protection of the personal information when the application requests the personal information, or to determine whether to protect the personal information based on the information related to the personal information when the personal information requested by the application is preset personal information. Protection of related information determines whether personal information is protected.

与个人信息的保护有关的信息可包括关于不需要保护个人信息的应用的信息和关于不需要保护的个人信息的类型的信息。The information related to protection of personal information may include information on applications that do not require protection of personal information and information on types of personal information that do not require protection.

处理器可被配置为基于关于不需要保护个人信息的应用和不需要保护的个人信息的类型的信息不对是否保护由应用请求的个人信息进行确定,不对个人信息进行加密并向应用提供个人信息。The processor may be configured not to determine whether to protect the personal information requested by the application, not to encrypt the personal information, and to provide the personal information to the application based on the information about the application that does not need to protect the personal information and the type of the personal information that does not need to be protected.

所述设备还可包括显示器,并且处理器可被配置为在显示器上显示功能的执行结果。The device may further include a display, and the processor may be configured to display an execution result of the function on the display.

个人信息可包括关于电子设备的位置的信息、联系人信息、关于照片文件的信息和关于消息的信息的一个或更多个。The personal information may include one or more of information about the location of the electronic device, contact information, information about photo files, and information about messages.

响应于从应用接收到对于联系人信息的请求,处理器可被配置为对联系人信息进行加密并向应用提供加密的联系人信息,并且响应于从应用接收到对于与加密的联系人信息有关的功能的执行请求,对加密的联系人信息进行解密并在显示器上显示基于解密的联系人信息产生的联系人UI。In response to receiving a request for contact information from an application, the processor may be configured to encrypt the contact information and provide the encrypted contact information to the application, and in response to receiving a request from the application related to the encrypted contact information According to the execution request of the function, the encrypted contact information is decrypted and the contact UI generated based on the decrypted contact information is displayed on the display.

响应于从应用接收到对于基于加密的联系人信息的呼叫功能的执行请求,处理器可被配置为对加密的联系人信息进行解密并执行呼叫功能。In response to receiving an execution request for a call function based on encrypted contact information from an application, the processor may be configured to decrypt the encrypted contact information and execute the call function.

响应于从应用接收到对于位置信息的请求,处理器可被配置为对位置信息进行加密并向应用提供加密的位置信息,并且响应于从应用接收到对于与加密的位置信息有关的功能的执行请求,对加密的位置信息进行解密并在显示器上显示基于解密的位置信息产生的地图屏幕。In response to receiving a request for location information from an application, the processor may be configured to encrypt the location information and provide the encrypted location information to the application, and in response to receiving from the application an execution of a function related to the encrypted location information request, decrypt the encrypted location information and display a map screen generated based on the decrypted location information on the display.

处理器可对购买信息进行加密并向应用提供加密的购买信息,并且响应于从应用接收到对于与加密的购买信息有关的功能的执行请求,对加密的购买信息进行解密并将解密的购买信息发送到外部购物服务器。The processor may encrypt the purchase information and provide the encrypted purchase information to the application, and in response to receiving from the application an execution request for a function related to the encrypted purchase information, decrypt the encrypted purchase information and send the decrypted purchase information Sent to external shopping server.

处理器可对打印信息进行加密并向应用提供加密的打印信息,响应于从应用接收到对于与加密的打印信息有关的功能的执行请求,对加密的打印信息进行解密并打印解密的打印信息。The processor may encrypt the print information and provide the encrypted print information to the application, decrypt the encrypted print information and print the decrypted print information in response to receiving an execution request for a function related to the encrypted print information from the application.

根据示例实施例,提供了一种控制执行使用个人信息执行功能的至少一个应用的电子设备的方法,所述方法包括:响应于从应用接收到对于个人信息的请求,基于与个人信息的保护有关信息针对每个应用被设置的预存储信息确定是否保护个人信息,基于确定结果对个人信息进行加密并向应用提供加密的个人信息,并且响应于从应用接收到对于与加密的个人信息有关的功能的执行请求,对加密的个人信息进行解密并执行所述功能。According to an example embodiment, there is provided a method of controlling an electronic device executing at least one application that performs a function using personal information, the method including: in response to receiving a request for personal information from the application, based on Information determines whether to protect personal information for pre-stored information set for each application, encrypts personal information based on the determination result and provides encrypted personal information to the application, and responds to receiving a request for a function related to encrypted personal information from the application to execute the request, decrypt the encrypted personal information and perform the described function.

所述方法还可包括:确定从应用中接收的请求是对于个人信息的请求还是执行功能的请求。The method may further include determining whether the request received from the application is a request for personal information or a request to perform a function.

确定的步骤可包括:当应用请求个人信息时,基于与个人信息的保护有关的信息确定是否保护个人信息,或者当由应用请求的个人信息是预设的个人信息时,基于与个人信息的保护有关的信息确定是否保护个人信息。The determining step may include: when the application requests the personal information, determining whether to protect the personal information based on information related to the protection of the personal information, or when the personal information requested by the application is preset personal information, based on information related to the protection of the personal information The relevant information determines whether personal information is protected.

与个人信息的保护有关的信息可包括关于不需要保护个人信息的应用的信息和关于不需要保护的个人信息的类型的信息。The information related to protection of personal information may include information on applications that do not require protection of personal information and information on types of personal information that do not require protection.

提供的步骤可包括:基于关于不需要保护个人信息的应用和关于不需要保护的个人信息的类型的信息确定不保护由应用请求的个人信息,并不对个人信息进行加密并向应用提供个人信息。The providing may include determining not to protect the personal information requested by the application, not encrypting the personal information, and providing the personal information to the application based on the information on the application not requiring protection of the personal information and on the type of the personal information not requiring protection.

所述方法还可包括显示功能的执行结果。The method may further include displaying an execution result of the function.

个人信息可包括关于电子设备的位置的信息、联系人信息、关于照片文件的信息和关于消息的信息中的一个或更多个。The personal information may include one or more of information on the location of the electronic device, contact information, information on photo files, and information on messages.

提供的步骤可包括:响应于从应用中接收到对于联系人信息的请求,对联系人信息进行加密并向应用提供加密的联系人信息,并且响应于从应用接收过程对于与加密的联系人信息有关的功能的执行请求,对加密的联系人信息进行解密并在显示器上显示基于解密的联系人信息产生的联系人UI。The step of providing may include: in response to receiving a request for contact information from the application, encrypting the contact information and providing the encrypted contact information to the application, and responding to receiving a process from the application with the encrypted contact information The execution request of the relevant function decrypts the encrypted contact information and displays the contact UI generated based on the decrypted contact information on the display.

执行的步骤可包括:响应于从应用接收到对于基于加密的联系人信息的呼叫功能的执行请求,对加密的联系人信息进行解密并执行呼叫功能。The executing may include decrypting the encrypted contact information and executing the calling function in response to receiving an execution request for the call function based on the encrypted contact information from the application.

执行的步骤可包括:对购买信息进行加密并向应用提供加密的购买信息,并且响应于从应用接收到对于与加密的购买信息有关的功能的执行请求,对加密的购买信息进行解密并将解密的购买信息发送到外部购物服务器。The executed steps may include: encrypting the purchase information and providing the encrypted purchase information to the application, and in response to receiving an execution request for a function related to the encrypted purchase information from the application, decrypting the encrypted purchase information and decrypting the encrypted purchase information. The purchase information sent to the external shopping server.

执行的步骤可包括:对打印信息进行加密并向应用提供加密的打印信息,并且响应于从应用接收到对于与加密的打印信息有关的功能的执行请求,对加密的打印信息进行解密并打印解密的打印信息。The executed steps may include: encrypting the print information and providing the encrypted print information to the application, and in response to receiving an execution request for a function related to the encrypted print information from the application, decrypting the encrypted print information and printing the decrypted print information.

根据示例实施例,提供了一种存储用于执行使用个人信息执行功能的至少一个应用的程序的存储介质,其中,所述程序在被执行时使电子设备进行以下操作:响应于从应用接收到对于个人信息的请求,基于与个人信息的保护有关的信息针对每个应用被设置的预存储信息确定是否保护个人信息,基于确定结果对个人信息进行加密并向应用提供加密的个人信息,并且响应于从应用接收到对于与加密的个人信息有关的功能的执行请求,对加密的个人信息进行解密并执行所述功能。According to an exemplary embodiment, there is provided a storage medium storing a program for executing at least one application that performs a function using personal information, wherein the program, when executed, causes an electronic device to perform the following operations: in response to receiving a message from the application For a request for personal information, whether to protect personal information is determined based on information related to the protection of personal information for each application, based on pre-stored information set for each application, encrypts personal information based on the determination result and provides encrypted personal information to the application, and responds Upon receiving an execution request for a function related to the encrypted personal information from the application, the encrypted personal information is decrypted and the function is executed.

根据各种示例实施例,即使在设置个人信息的保护之后,用户也可正常地使用服务,并可防止和/或减少个人信息被泄露的可能性。According to various example embodiments, even after the protection of personal information is set, a user may normally use a service, and the possibility of personal information being leaked may be prevented and/or reduced.

附图说明Description of drawings

通过以下结合附图的详细的描述,本公开的上述和/或其他方面将更明显,其中,相同的标号表示相同的元件,其中:The above and/or other aspects of the present disclosure will be more apparent from the following detailed description in conjunction with the accompanying drawings, wherein like reference numerals denote like elements, wherein:

图1是示出电子设备的示例配置的框图;1 is a block diagram illustrating an example configuration of an electronic device;

图2是示出电子设备的示例配置的框图;2 is a block diagram illustrating an example configuration of an electronic device;

图3是示出图1的电子设备的示例配置的框图;3 is a block diagram illustrating an example configuration of the electronic device of FIG. 1;

图4是示出存储在存储器中的示例软件模块的示图;Figure 4 is a diagram illustrating example software modules stored in memory;

图5是示出处理器的示例处理的示图;FIG. 5 is a diagram illustrating example processing of a processor;

图6到图7是示出在图5的每个模块之间的数据处理的示例的流程图;6 to 7 are flowcharts illustrating examples of data processing between each module of FIG. 5;

图8到图13是示出各种示例实施例的示图;8 to 13 are diagrams illustrating various example embodiments;

图14是示出隐私保护模块的示例结构的框图;Fig. 14 is a block diagram showing an example structure of a privacy protection module;

图15和图16是示出示例加密方法的示图;15 and 16 are diagrams illustrating example encryption methods;

图17是示出控制电子设备的示例方法的流程图;17 is a flowchart illustrating an example method of controlling an electronic device;

图18到图21是示出各种示例实施例的示图。18 to 21 are diagrams illustrating various example embodiments.

具体实施方式detailed description

在下文中,将参照附图更详细地描述本公开的示例实施例。在下面的描述中,如果对公知的功能或配置的详细的描述将不必要地模糊本公开的主题,则可省略对公知的功能或配置的详细的描述。在本公开的示例实施例中使用的术语已经考虑本公开的功能而被定义,并且可根据用户、操作者或判例进行变化。因此,术语的定义应该考虑本公开的全部内容而被做出。Hereinafter, example embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. In the following description, a detailed description of a known function or configuration may be omitted if it would unnecessarily obscure the subject matter of the present disclosure. Terms used in exemplary embodiments of the present disclosure have been defined in consideration of the functions of the present disclosure, and may vary according to users, operators, or precedents. Therefore, definitions of terms should be made in consideration of the entire content of the present disclosure.

图1是示出电子设备的示例配置的框图。FIG. 1 is a block diagram showing an example configuration of an electronic device.

参照图1,电子设备100包括存储器110和处理器(例如,包括处理电路)120。Referring to FIG. 1 , an electronic device 100 includes a memory 110 and a processor (eg, including a processing circuit) 120 .

例如,电子设备100可以是执行至少一个应用以执行使用个人信息的功能的任何设备,并且可实现作各种类型的电子设备,诸如,例如,TV、电子黑板、电子表格、大型显示器(LFD)、智能电话、平板电脑、台式PC、笔记本PC、机顶盒、智能手表、可穿戴装置、成像设备、家用电器(例如,食物贮存装置、空调、清洗器、烤箱、微波炉、洗衣机或空气净化器)、医疗装置(例如,医学图像拍摄装置或医学测量装置(血糖监测装置、心率监测装置、血压监测装置、体温测量装置等))、车载信息娱乐装置、船舶电子装备(例如,船舶导航装备、电罗经等)、航空电子装置、安全装置、车头单元、工业或家庭机器人、无人机、金融机构的ATM、商店的销售点(POS)或物联网(IOT)的装置(例如,灯泡、各种传感器、散热装置、火警警报器、恒温器、路灯、烤面包机、健身器械、热水箱、加热器、锅炉等),但不限于此。For example, the electronic device 100 may be any device that executes at least one application to perform a function using personal information, and may be implemented as various types of electronic devices such as, for example, a TV, an electronic blackboard, a spreadsheet, a large display (LFD) , smartphones, tablets, desktop PCs, notebook PCs, set-top boxes, smart watches, wearable devices, imaging devices, home appliances (such as food storage devices, air conditioners, washing machines, ovens, microwave ovens, washing machines, or air purifiers), Medical devices (for example, medical image capture devices or medical measurement devices (blood sugar monitoring devices, heart rate monitoring devices, blood pressure monitoring devices, body temperature measurement devices, etc.)), vehicle infotainment devices, marine electronic equipment (for example, marine navigation equipment, gyrocompass etc.), avionics devices, security devices, head units, industrial or home robots, drones, ATMs at financial institutions, point-of-sale (POS) at stores, or Internet of Things (IOT) devices (e.g., light bulbs, various sensor , heat sinks, fire alarms, thermostats, street lights, toasters, fitness equipment, hot water tanks, heaters, boilers, etc.), but not limited to.

存储器110可存储个人信息和与个人信息的保护有关的信息针对每个应用被设置的信息。The memory 110 may store personal information and information related to protection of the personal information set for each application.

例如,个人信息可包括,例如,可暴露用户隐私的信息。例如,根据示例实施例的个人信息可包括关于电子设备100的位置的信息、联系人信息、关于照片文件的信息和关于消息的信息中的至少一个。For example, personal information may include, for example, information that may reveal a user's privacy. For example, the personal information according to example embodiments may include at least one of information about the location of the electronic device 100, contact information, information about photo files, and information about messages.

例如,在用户持有电子设备100的情况下,关于电子设备100的位置的信息可与关于用户位置的信息相应。For example, in a case where the user holds the electronic device 100, the information on the location of the electronic device 100 may correspond to the information on the user's location.

此外,内容信息可包括诸如姓名、电话号码、电子邮件地址、主页地址等的联系人信息。In addition, the content information may include contact information such as name, phone number, email address, homepage address, and the like.

关于照片文件的信息可包括由用户拍摄的照片、通过互联网下载的照片、捕捉的照片等。Information on photo files may include photos taken by a user, photos downloaded through the Internet, captured photos, and the like.

关于消息的信息可包括关于用户与第三人交换的文本、在SNS上的评论、电子邮件等的信息。The information on messages may include information on texts exchanged by the user with a third person, comments on SNS, emails, and the like.

个人信息不仅可包括上述的关于电子设备100的位置的信息、联系人信息和关于照片文件的信息,还包括关于由用户编写或存储的所有文档的信息,诸如在电子设备100中存储的文档文件、内容、音乐文件、视频、备忘录文件、日程列表文件等。Personal information may include not only the above-mentioned information on the location of the electronic device 100, contact information, and information on photo files, but also information on all documents written or stored by the user, such as document files stored in the electronic device 100 , content, music files, videos, memo files, schedule list files, etc.

与个人信息的保护有关的信息可针对每个应用被设置,并可包括关于是否必须保护由多个应用的每一个应用请求的个人信息的信息以及关于对个人信息进行加密的方法的信息。Information related to protection of personal information may be set for each application, and may include information on whether personal information requested by each of a plurality of applications must be protected and information on a method of encrypting personal information.

例如,与个人信息的保护有关的信息可针对每个应用被设置,并可包括当执行多个应用中的第一应用时需要的个人信息是关于电子设备100的位置的信息并且针对第一应用不需要保护关于电子设备100的位置的信息的信息。For example, information related to the protection of personal information may be set for each application, and may include that personal information required when executing a first application among a plurality of applications is information on the location of the electronic device 100 and is specific to the first application. There is no need to protect information about the location of the electronic device 100 .

此外,与个人信息的保护有关的信息可针对每个应用被设置,并可包括当执行多个应用中的第二应用时需要的个人信息是内容信息并且针对第二应用不需要保护内容信息的信息。In addition, information related to protection of personal information may be set for each application, and may include that personal information required when executing a second application among a plurality of applications is content information and protection of content information is not required for the second application information.

与个人信息的保护有关的信息可针对每个应用被设置并可包括策略,例如,关于针对每个应用是否保护个人信息的参考信息。此外,也可包括关于对个人信息进行加密的方法的信息,例如,关于将使用何种密码进行加密的信息。Information related to protection of personal information may be set for each application and may include policies, for example, reference information on whether to protect personal information for each application. In addition, information about the method used to encrypt personal information may also be included, for example, information about what cipher will be used for encryption.

如果从应用接收到对于个人信息的请求,则处理器120可被配置为基于与针对每个应用设置的个人信息的保护有关的信息来确定是否保护个人信息,基于确定结果对个人信息进行加密并向应用提供加密的个人信息,并且如果从应用接收到对于与加密的信息有关的功能的执行请求,则处理器120被配置为对加密的个人信息进行解密并执行所述功能。If a request for personal information is received from an application, the processor 120 may be configured to determine whether to protect the personal information based on information on the protection of the personal information set for each application, encrypt the personal information based on the determination result, and The encrypted personal information is provided to the application, and if an execution request for a function related to the encrypted information is received from the application, the processor 120 is configured to decrypt the encrypted personal information and execute the function.

例如,如果应用请求个人信息,则处理器120可被配置为基于存储在存储器110中的设置信息来确定是否保护关于相应应用的个人信息,并且如果确定针对相应应用应该保护并提供个人信息,则处理器120可被配置为对个人信息进行加密并向相应应用提供加密的个人信息。For example, if an application requests personal information, the processor 120 may be configured to determine whether to protect the personal information on the corresponding application based on the setting information stored in the memory 110, and if it is determined that the personal information should be protected and provided for the corresponding application, then The processor 120 may be configured to encrypt personal information and provide the encrypted personal information to a corresponding application.

如果从被提供了加密的个人信息的应用接收到关于与加密的个人信息有关的功能的执行请求,则处理器120可被配置为对加密的个人信息进行解密并执行所述功能。If an execution request for a function related to the encrypted personal information is received from an application provided with the encrypted personal information, the processor 120 may be configured to decrypt the encrypted personal information and execute the function.

例如,在个人信息是联系人信息,应用是聊天应用,并且确定针对聊天应用应该保护并提供个人信息的情况下,处理器120可被配置为对联系人信息进行加密并向聊天应用提供加密的联系人信息。如果被提供了加密的联系人信息的聊天应用基于联系人信息产生朋友列表用户界面(UI),并请求执行显示产生的朋友列表UI的功能,则处理器120可被配置为对加密的联系人信息进行解密并显示产生的朋友列表UI。For example, when the personal information is contact information, the application is a chat application, and it is determined that the personal information should be protected and provided for the chat application, the processor 120 may be configured to encrypt the contact information and provide the chat application with encrypted contact information. If the chat application provided with encrypted contact information generates a friend list user interface (UI) based on the contact information, and requests to perform a function of displaying the generated friend list UI, the processor 120 may be configured to The information is decrypted and the resulting friend list UI is displayed.

如上所述,聊天应用可接收并仅使用加密的联系人信息,并且可不被提供未加密的实际联系人信息。此外,聊天应用希望执行的显示朋友列表UI的功能可在电子设备100中正常地执行。因此,在防止诸如联系人信息的个人信息被泄露的同时还能够正常地执行应用。As noted above, the chat application may receive and use only encrypted contact information, and may not be provided with unencrypted actual contact information. In addition, the function of displaying the friend list UI, which the chat application wishes to perform, may be normally performed in the electronic device 100 . Therefore, applications can be normally executed while preventing personal information such as contact information from being leaked.

例如,当在电子设备100中执行与由应用请求的加密的个人信息有关的功能时,处理器120可被配置为对加密的个人信息进行解密并执行所述功能。当应用无法知道对加密的个人信息进行解密的结果同时还能够正常地执行由应用请求的功能,使得能够保护个人信息。For example, when a function related to encrypted personal information requested by an application is performed in the electronic device 100, the processor 120 may be configured to decrypt the encrypted personal information and perform the function. When the application cannot know the result of decrypting the encrypted personal information while being able to normally execute the function requested by the application, it is possible to protect the personal information.

同时,在本公开中,加密的个人信息可以指例如受保护数据,并且在被加密之前的实际个人信息可被称为例如原始数据。Meanwhile, in the present disclosure, encrypted personal information may refer to, for example, protected data, and actual personal information before being encrypted may be called, for example, original data.

处理器120可被配置为确定应用的请求是对于个人信息的请求还是执行功能的请求。The processor 120 may be configured to determine whether the application's request is a request for personal information or a request to perform a function.

例如,如果应用请求个人信息,则处理器120可被配置为基于与针对每个应用设置的个人信息的保护有关的信息确定是否保护个人信息,基于确定结果对个人信息进行加密,并向应用提供加密的个人信息。但是,如果应用请求执行功能,则处理器120可被配置为对加密的个人信息进行解密并执行由应用请求的与个人信息有关的功能。For example, if an application requests personal information, the processor 120 may be configured to determine whether to protect the personal information based on information on the protection of personal information set for each application, encrypt the personal information based on the determination result, and provide the application with Encrypted personal information. However, if the application requests performance of a function, the processor 120 may be configured to decrypt the encrypted personal information and perform the function requested by the application related to the personal information.

例如,如果聊天应用请求联系人信息以产生朋友列表UI,则处理器120可被配置为确定针对聊天应用是否保护联系人信息,基于确定结果对联系人信息进行加密并向聊天应用提供加密的联系人信息。但是,如果聊天应用请求执行呼叫功能,则处理器120可被配置为对加密的联系人信息进行解密并执行呼叫功能。For example, if a chat application requests contact information to generate a friend list UI, the processor 120 may be configured to determine whether to protect the contact information for the chat application, encrypt the contact information based on the determination result, and provide encrypted contact information to the chat application. person information. However, if the chat application requests to perform the call function, the processor 120 may be configured to decrypt the encrypted contact information and perform the call function.

图2是示出电子设备的示例实施例的框图。FIG. 2 is a block diagram illustrating an example embodiment of an electronic device.

参照图2,电子设备100包括存储器110、处理器(例如,包括处理电路)120和显示器(例如,包括显示面板和显示驱动电路)130。存储器110和处理器120已经在上文中被描述,因此将不提供对存储器110和处理器120的进一步的描述。Referring to FIG. 2 , the electronic device 100 includes a memory 110 , a processor (eg, including a processing circuit) 120 and a display (eg, including a display panel and a display driving circuit) 130 . The memory 110 and the processor 120 have been described above, and thus no further description of the memory 110 and the processor 120 will be provided.

显示器130可显示作为多个图像(诸如电影、戏剧、记录图像、慢视频等)产生的并按特定帧率显示的所有视频图像或诸如静态图像、照片、文档等的各种对象。The display 130 may display all video images or various objects such as still images, photos, documents, etc. generated as a plurality of images such as movies, dramas, recorded images, slow videos, etc. and displayed at a specific frame rate.

显示器130可被实现为,例如,液晶显示器(LCD)、有机发光二极管(OLED)、等离子显示器(PDP)等。The display 130 may be implemented as, for example, a Liquid Crystal Display (LCD), an Organic Light Emitting Diode (OLED), a Plasma Display (PDP), or the like.

例如,如果从应用中接收到对于与加密的个人信息有关的功能的执行请求,则处理器120可被配置为对加密的个人信息进行解密,执行所述功能,并通过显示器130显示关于所述功能的执行结果。For example, if an execution request for a function related to encrypted personal information is received from an application, the processor 120 may be configured to decrypt the encrypted personal information, execute the function, and display information about the encrypted personal information through the display 130. The result of executing the function.

例如,如果接收到对于与加密的联系人信息有关的呼叫发送功能的执行请求,则处理器120可被配置为对加密的联系人信息进行解密,执行呼叫发送功能,并在显示器130上显示这样的屏幕:该屏幕包括在实际联系人信息中所包括的对方的电话号码以及当前执行的呼叫功能的信息。For example, if a request to perform a call sending function related to encrypted contact information is received, the processor 120 may be configured to decrypt the encrypted contact information, execute a call sending function, and display on the display 130 such screen: This screen includes information on the other party's phone number included in the actual contact information and the call function currently being performed.

在本示例中,聊天应用仅可获得加密的联系人信息,并无法获得关于对方的实际电话号码的信息。由于不向聊天应用提供实际的联系人信息,因此个人信息能够被保护。In this example, the chat app only has encrypted contact information and no information about the person's actual phone number. Since the actual contact information is not provided to the chat application, personal information can be protected.

处理器120可被配置为当应用请求个人信息时,基于与个人信息的保护有关的信息来确定是否保护个人信息,或可被配置为当由应用请求的个人信息是预设的个人信息时,基于与个人信息的保护有关的信息来确定是否保护个人信息。The processor 120 may be configured to determine whether to protect the personal information based on information related to the protection of the personal information when the application requests the personal information, or may be configured to, when the personal information requested by the application is preset personal information, Whether to protect personal information is determined based on information related to the protection of personal information.

例如,如果针对多个应用中的聊天应用的个人信息被设置为被保护,则处理器120可被配置为当聊天应用请求联系人信息时,基于与个人信息的保护有关的信息来确定是否保护联系人信息。For example, if personal information for a chat application among multiple applications is set to be protected, the processor 120 may be configured to determine whether to protect or not based on information related to the protection of personal information when the chat application requests contact information. contact information.

如果对各种个人信息中的针对照片文件的个人信息的保护没有被设置,但针对联系人信息的个人信息被设置保护,则处理器120可被配置为当聊天应用请求照片文件时基于与个人信息的保护有关的信息来确定不保护照片文件,但可被配置为当聊天工具请求联系人信息时基于与个人信息的保护有关的信息来确定保护联系人信息。If protection of personal information for photo files among various personal information is not set, but protection is set for personal information of contact information, processor 120 may be configured to The information related to the protection of information is used to determine not to protect the photo file, but may be configured to determine to protect the contact information based on the information related to the protection of personal information when the chat tool requests the contact information.

例如,与个人信息的保护有关的信息可包括关于不需要保护个人信息的应用的信息和不需要保护的个人信息的类型的信息。For example, information related to the protection of personal information may include information on applications that do not require protection of personal information and information on types of personal information that do not require protection.

例如,与个人信息的保护有关的信息可包括是否有必要针对每个应用确定对个人信息的保护的信息,也可包括是否有必要基于个人信息的类型而不考虑应用确定对个人信息的保护的信息。For example, information related to the protection of personal information may include whether it is necessary to determine the protection of personal information for each application, or whether it is necessary to determine the protection of personal information based on the type of personal information regardless of the application information.

例如,与个人信息的保护有关的信息可包括需要保护针对多个应用中的聊天应用的个人信息但是不需要保护针对地图应用的个人信息的信息,并因此,如果聊天应用请求联系人信息,则处理器120可被配置为对联系人信息进行加密并向聊天应用提供加密的联系人信息,并且如果地图应用请求位置信息,则处理器120可被配置为不对位置信息进行加密并向地图应用提供原始数据状态下的位置信息。For example, information related to the protection of personal information may include information that personal information needs to be protected for a chat application among multiple applications but does not need to be protected for a map application, and therefore, if the chat application requests contact information, then The processor 120 may be configured to encrypt the contact information and provide the encrypted contact information to the chat application, and if the location information is requested by the map application, the processor 120 may be configured not to encrypt the location information and provide the location information to the map application. Position information in raw data state.

可选择地,与个人信息的保护有关的信息可包括不考虑应用的类型需要针对联系人信息保护个人信息的保护并且针对位置信息不需要保护个人信息的信息。因此,如果聊天应用或邮件应用请求联系人信息,则处理器120可被配置为不考虑应用的类型而对联系人信息进行加密,并向聊天应用或邮件应用提供加密的联系人信息。如果聊天应用或地图应用请求位置信息,则处理器120可被配置为不考虑应用的类型而不对位置信息进行加密,并向聊天应用或地图应用提供原始数据状态下的位置信息。Alternatively, the information related to protection of personal information may include information that protection of personal information is required for contact information and protection of personal information is not required for location information regardless of the type of application. Accordingly, if a chat application or a mail application requests contact information, the processor 120 may be configured to encrypt the contact information regardless of the type of the application and provide the encrypted contact information to the chat application or the mail application. If the chat application or the map application requests the location information, the processor 120 may be configured not to encrypt the location information regardless of the type of the application, and provide the location information in a raw data state to the chat application or the map application.

例如,处理器120可被配置为基于关于不需要保护个人信息的的应用的信息和关于不需要保护的个人信息的类型的信息来确定不保护由应用请求的个人信息,不对个人信息进行加密并向应用提供原始数据状态下的个人信息。For example, the processor 120 may be configured to determine not to protect the personal information requested by the application, not to encrypt the personal information and Provide applications with personal information in its raw data state.

同时,图3是示出图1的电子设备的示例配置的框图。Meanwhile, FIG. 3 is a block diagram illustrating an example configuration of the electronic device of FIG. 1 .

参照图3,电子设备100’包括存储器110、处理器(例如,包括处理电路)120、显示器(例如,包括显示面板和显示驱动电路)130、通信器(例如,包括通信电路)140、用户接口(例如,包括接口电路)150、应用驱动器(例如,包括应用驱动电路)160和扬声器170。可不更详细的提供关于与图1和图2中的元件重复的元件的描述。3, the electronic device 100' includes a memory 110, a processor (eg, including a processing circuit) 120, a display (eg, including a display panel and a display driver circuit) 130, a communicator (eg, including a communication circuit) 140, a user interface (eg, including an interface circuit) 150 , an application driver (eg, including an application driving circuit) 160 , and a speaker 170 . Descriptions about elements that overlap with those in FIGS. 1 and 2 may not be provided in more detail.

处理器120被配置为控制电子设备100’的整体操作。The processor 120 is configured to control overall operations of the electronic device 100'.

例如,处理器120包括RAM 121、ROM 122、主CPU 123、图形处理器124、第一接口到第n接口125-1~125-n和总线126。For example, the processor 120 includes a RAM 121 , a ROM 122 , a main CPU 123 , a graphics processor 124 , first to nth interfaces 125 - 1 ˜ 125 - n , and a bus 126 .

RAM 121、ROM 122、主CPU 123、图形处理器124、第一接口到第n接口125-1~125-n可通过总线126相互连接。The RAM 121 , the ROM 122 , the main CPU 123 , the graphics processor 124 , and the first to nth interfaces 125 - 1 - 125 -n can be connected to each other through the bus 126 .

第一接口到第n接口125-1到125-n可与上述的各种元件连接。第一接口到第n接口125-1到125-n中的一个可以是通过网络与外部装置连接的网络接口。The first to nth interfaces 125-1 to 125-n may be connected to various elements described above. One of the first to nth interfaces 125-1 to 125-n may be a network interface connected with an external device through a network.

主CPU 123可访问存储器110并使用在存储器110中存储的操作系统(O/S)执行启动。此外,主CPU 123可使用在存储器110中存储的各种程序、内容、数据等来执行各种操作。The main CPU 123 can access the memory 110 and perform booting using an operating system (O/S) stored in the memory 110 . Also, the main CPU 123 can perform various operations using various programs, contents, data, etc. stored in the memory 110 .

ROM 122存储用于启动系统的一组指令。响应于在正在输入的命令和正在提供的能量上的变化,主CPU 123可基于在ROM 122中存储的命令将在存储器110中存储的O/S复制到RAM121中,并通过执行O/S启动系统。响应于启动被完成,主CPU 123可将在存储器110中存储的各种应用程序复制到RAM 121中,并通过执行被复制到RAM 121中的应用程序来执行各种操作。ROM 122 stores a set of instructions for starting the system. In response to changes in the command being input and the energy being supplied, the main CPU 123 can copy the O/S stored in the memory 110 to the RAM 121 based on the command stored in the ROM 122, and start by executing the O/S system. In response to booting being completed, the main CPU 123 may copy various application programs stored in the memory 110 into the RAM 121 and perform various operations by executing the application programs copied into the RAM 121 .

图形处理器124可使用计算器(未示出)和渲染器(未示出)产生包括各种对象(诸如图标、图像、文本等)的屏幕。计算器(未示出)可基于接收到的控制指令,根据屏幕的布局计算将被显示的对象的属性值,诸如坐标值、形状、大小、颜色等。渲染器(未示出)可基于由计算器(未示出)计算的属性值产生包括对象的各种布局的屏幕。具体地讲,图形处理器124可响应于用户发出的语音将产生的系统响应改变为文本形式,并且确定文本的字体、大小、颜色等。可在显示器130的显示区域中显示通过渲染器(未示出)产生的屏幕。The graphics processor 124 may generate a screen including various objects such as icons, images, text, etc. using a calculator (not shown) and a renderer (not shown). A calculator (not shown) may calculate attribute values of objects to be displayed, such as coordinate values, shape, size, color, etc., according to the layout of the screen based on the received control instruction. A renderer (not shown) may generate screens including various layouts of objects based on attribute values calculated by a calculator (not shown). Specifically, the graphics processor 124 may change the generated system response into a text form in response to a voice uttered by the user, and determine the font, size, color, etc. of the text. A screen generated by a renderer (not shown) may be displayed in a display area of the display 130 .

同时,上述的处理器120的操作可通过在存储器110中存储的程序被执行。Meanwhile, the above-described operations of the processor 120 may be performed by programs stored in the memory 110 .

存储器110可存储用于驱动电子设备100’的O/S软件模块和诸如各种多媒体内容的各种数据。The memory 110 may store O/S software modules for driving the electronic device 100' and various data such as various multimedia contents.

例如,存储器110可包括软件模块,其中,当软件模块被执行时,如果应用请求个人信息,则软件模块基于设置信息确定是否保护个人信息,基于确定结果对个人信息进行加密,并向应用提供加密的个人信息,并且如果应用请求执行与加密的个人信息有关的功能,则对加密的个人信息进行解密并执行所述功能,这将参照图4在下文中进行更详细的描述。For example, the memory 110 may include a software module, wherein, when the software module is executed, if the application requests personal information, the software module determines whether to protect the personal information based on the setting information, encrypts the personal information based on the determination result, and provides the encrypted information to the application. and if the application requests to perform a function related to the encrypted personal information, the encrypted personal information is decrypted and the function is performed, which will be described in more detail below with reference to FIG. 4 .

通信器140可包括根据各种类型的通信方法与各种类型的外部设备执行通信的各种通信电路。通信器140可包括各种通信电路,诸如,例如,并不限于,通信芯片(诸如WiFi芯片、蓝牙芯片、无线通信芯片等)。The communicator 140 may include various communication circuits performing communication with various types of external devices according to various types of communication methods. The communicator 140 may include various communication circuits such as, for example, without limitation, a communication chip (such as a WiFi chip, a Bluetooth chip, a wireless communication chip, etc.).

例如,WiFi芯片和蓝牙芯片分别使用WiFi方法和蓝牙方法来执行通信。无线通信芯片可以指例如根据各种通信标准(诸如IEEE、Zigbee、第三代移动通信技术(3G)、第三代合作伙伴项目(3GPP)、长期演进(LTE)等)执行通信的芯片。此外,通信器还可包括使用各种RF-ID频带(诸如135kHz、13.56MHz、433MHz、860MHz-960MHz、2.45GHz等)中的13.56MHz的频带根据NFC方法进行操作的NFC芯片。For example, a WiFi chip and a Bluetooth chip perform communication using a WiFi method and a Bluetooth method, respectively. The wireless communication chip may refer to, for example, a chip that performs communication according to various communication standards such as IEEE, Zigbee, 3rd Generation Mobile Communication Technology (3G), 3rd Generation Partnership Project (3GPP), Long Term Evolution (LTE), and the like. In addition, the communicator may further include an NFC chip that operates according to the NFC method using a frequency band of 13.56MHz among various RF-ID frequency bands such as 135kHz, 13.56MHz, 433MHz, 860MHz-960MHz, 2.45GHz, and the like.

例如,通信器140可使用各种通信电路与提供多个应用中的每一个应用的多个服务器执行通信。针对与每个服务器的通信,可使用同样的通信方法,但也可根据环境使用不同的通信方法。For example, the communicator 140 may perform communication with a plurality of servers providing each of a plurality of applications using various communication circuits. For communication with each server, the same communication method can be used, but different communication methods can also be used depending on the environment.

应用驱动器160对可由电子设备100’提供的应用进行驱动并执行功能。例如,应用可以指由应用自己执行的应用程序,并可包括各种多媒体内容。例如,术语“多媒体内容”可包括文本、音频、静态图像、动画、视频和互动式内容、内容提供器中的电子节目指南(EPG)内容、从用户接收的电子消息、关于当前事件的信息等,但不限于此。The application driver 160 drives and performs functions of applications that can be provided by the electronic device 100'. For example, an application may refer to an application program executed by the application itself, and may include various multimedia contents. For example, the term "multimedia content" may include text, audio, still images, animation, video and interactive content, electronic program guide (EPG) content from content providers, electronic messages received from users, information about current events, etc. , but not limited to this.

这样的应用不仅可提供多媒体内容,而且可提供各种信息,并且为了提供上述信息,可需要上述的个人信息。Such an application may provide not only multimedia content but also various information, and in order to provide the above information, the above personal information may be required.

当必要时,在执行由应用请求的功能时,扬声器170可被用于输出声音信号。此外,电子设备100’还可包括音频处理器、视频处理器、按钮、USB接口、相机、麦克风等。When necessary, the speaker 170 may be used to output a sound signal when performing a function requested by an application. In addition, the electronic device 100' may further include an audio processor, a video processor, buttons, a USB interface, a camera, a microphone, and the like.

图4是示出在存储器(110)中存储的示例软件模块的示图。FIG. 4 is a diagram illustrating example software modules stored in memory (110).

参照图4,存储器110可存储程序,诸如确定是否保护个人信息的模块111、加密模块112和功能执行模块113等。Referring to FIG. 4, the memory 110 may store programs such as a module 111 for determining whether to protect personal information, an encryption module 112, a function execution module 113, and the like.

上述处理器120的操作可通过在存储器110中存储的程序执行。在下文中,使用在存储器110中存储的程序的处理器120的操作将在下面被更详细地描述。The operations of the processor 120 described above may be performed by programs stored in the memory 110 . Hereinafter, operations of the processor 120 using programs stored in the memory 110 will be described in more detail below.

例如,如果应用请求个人信息,则用于确定是否保护个人信息的模块111可基于与个人信息的保护有关的信息针对每个应用被设置的信息来执行确定是否保护个人信息的功能。For example, if an application requests personal information, the module 111 for determining whether to protect personal information may perform a function of determining whether to protect personal information based on information set for each application based on information related to protection of personal information.

加密模块112可基于通过用于确定是否保护个人信息的模块111的确定结果执行对个人信息进行加密的功能。The encryption module 112 may perform a function of encrypting personal information based on a determination result by the module 111 for determining whether to protect personal information.

如果从应用接收到对于与加密的个人信息有关的功能的执行请求,则功能执行模块113可对加密的个人信息进行解密并执行所述功能。If an execution request for a function related to encrypted personal information is received from an application, the function execution module 113 may decrypt the encrypted personal information and execute the function.

此外,存储器110可包括通信模块,并且作为与外部执行通信的模块的通信模块可包括用于与外部装置进行通信的装置模块、信使程序、短消息服务(SMS)与多媒体消息服务(MMS)程序、诸如电子邮件程序的消息发送模块、呼叫信息汇集程序模块和包括VoIp模块的电话模块等。Also, the memory 110 may include a communication module, and the communication module as a module performing communication with the outside may include a device module for communicating with an external device, a messenger program, a Short Message Service (SMS) and a Multimedia Message Service (MMS) program , a messaging module such as an e-mail program, a call information collection program module, and a telephony module including a VoIP module, etc.

图5是示出处理器的示例处理的示图。FIG. 5 is a diagram illustrating example processing of a processor.

参照图5,隐私保护模块500包括,例如,隐私引擎模块510、策略模块520、策略DB521、数据处理模块530和隐私用户模块540。Referring to FIG. 5 , the privacy protection module 500 includes, for example, a privacy engine module 510 , a policy module 520 , a policy DB 521 , a data processing module 530 and a privacy user module 540 .

例如,隐私保护模块500可被配置为处理器120中包括的一部分或芯片,并且隐私引擎模块510、策略模块520、策略DB 521、数据处理模块530和隐私用户模块540也可被配置为处理器120中包括的一部分或芯片。For example, the privacy protection module 500 can be configured as a part or a chip included in the processor 120, and the privacy engine module 510, the policy module 520, the policy DB 521, the data processing module 530 and the privacy user module 540 can also be configured as a processor Part or chip included in 120.

此外,隐私保护模块500、隐私引擎模块510、策略模块520、策略DB 521、数据处理模块530和隐私用户模块540可被配置为软件模块,并且在本示例中,可被存储在存储器110中。In addition, the privacy protection module 500, the privacy engine module 510, the policy module 520, the policy DB 521, the data processing module 530, and the privacy user module 540 may be configured as software modules, and in this example, may be stored in the memory 110.

在本公开中,例如,可假设隐私保护模块500、隐私引擎模块510、策略模块520、策略DB 521、数据处理模块530和隐私用户模块540被配置为处理器120中包括的一部分或芯片。In this disclosure, for example, it may be assumed that the privacy protection module 500 , the privacy engine module 510 , the policy module 520 , the policy DB 521 , the data processing module 530 and the privacy user module 540 are configured as a part or a chip included in the processor 120 .

如果从应用10接收到对于个人信息的请求,则隐私保护模块500可基于与个人信息的保护有关的信息针对每个应用被设置的信息来确定是否保护个人信息,并基于确定结果向应用10提供加密的个人信息,并且如果从应用10接收到对于与加密的个人信息有关的功能的执行请求,则隐私保护模块500可对加密的个人信息进行解密并执行所述功能。例如,个人信息的保护有关的信息针对每个应用被设置的信息可被定义为隐私策略。If a request for personal information is received from the application 10, the privacy protection module 500 may determine whether to protect the personal information based on the information set for each application based on the information related to the protection of personal information, and provide the application 10 based on the determination result. encrypted personal information, and if an execution request for a function related to the encrypted personal information is received from the application 10, the privacy protection module 500 may decrypt the encrypted personal information and execute the function. For example, information about protection of personal information that is set for each application may be defined as a privacy policy.

隐私策略被存储在策略DB 521中,并且策略模块520执行管理在策略DB 521中存储的隐私策略的功能。Privacy policies are stored in the policy DB 521 , and the policy module 520 performs a function of managing the privacy policies stored in the policy DB 521 .

如果从应用10接收到对于个人信息的请求,则隐私引擎模块510可参照由策略模块520检测到的关于相应应用10的隐私策略以及由应用10请求的个人信息,来确定是否保护由应用10请求的个人信息。如果确定应该保护由应用10请求的个人信息,则隐私引擎模块510可根据隐私策略通过数据处理模块530将在原始数据状态下的个人信息加密为受保护数据。If a request for personal information is received from an application 10, the privacy engine module 510 may determine whether to protect the personal information requested by the application 10 with reference to the privacy policy detected by the policy module 520 about the corresponding application 10 and the personal information requested by the application 10. personal information. If it is determined that the personal information requested by the application 10 should be protected, the privacy engine module 510 may encrypt the personal information in the original data state into protected data through the data processing module 530 according to the privacy policy.

例如,隐私引擎模块510可响应于对于个人信息的请求从信息源20获得个人信息。信息源20可包括存储器21、GPS模块22、WiFi模块23等,但不限于此。隐私引擎模块510可从存储器21获得个人信息(诸如,联系人信息、照片文件、音乐文件、文档等),可从GPS模块22获得位置信息,并可从WiFi模块23获得关于通信质量状态的信息、下载速度等。For example, privacy engine module 510 may obtain personal information from information source 20 in response to a request for the personal information. The information source 20 may include a memory 21, a GPS module 22, a WiFi module 23, etc., but is not limited thereto. The privacy engine module 510 can obtain personal information (such as contact information, photo files, music files, documents, etc.) from the memory 21, can obtain location information from the GPS module 22, and can obtain information about communication quality status from the WiFi module 23 , download speed, etc.

隐私引擎模块510可通过数据处理模块530向应用10提供受保护数据状态下的加密的个人信息。The privacy engine module 510 may provide encrypted personal information in a protected data state to the application 10 through the data processing module 530 .

此外,如果从应用10接收到对于与加密的个人信息有关的功能的执行请求,则隐私用户模块540可将受保护数据状态下的加密的个人信息解密为原始数据状态下的个人信息,并执行请求功能。这样的功能的示例可包括例如显示朋友列表UI的功能、呼叫连接功能等。例如,隐私用户模块540可通过显示器130执行显示朋友列表UI的显示功能31或通过通信模块执行呼叫功能32。这样的功能的其他示例可包括显示购买UI的功能、将购买信息发送到购物服务器的功能、打印从外部装置接收的打印信息的功能、显示医疗UI的功能等,但不限于此。In addition, if an execution request for a function related to encrypted personal information is received from the application 10, the privacy user module 540 may decrypt the encrypted personal information in the protected data state into personal information in the original data state, and execute Request feature. Examples of such functions may include, for example, a function of displaying a friend list UI, a call connection function, and the like. For example, the privacy user module 540 may perform a display function 31 of displaying a friend list UI through the display 130 or a call function 32 through the communication module. Other examples of such functions may include a function of displaying a purchase UI, a function of transmitting purchase information to a shopping server, a function of printing print information received from an external device, a function of displaying a medical UI, etc., but not limited thereto.

例如,隐私用户模块540可通过显示器130执行显示购买UI或医疗UI的显示功能31,使用通信器140的通信电路执行发送信息的发送功能33,或使用打印机(未示出)执行对打印信息进行打印的打印功能34。For example, the privacy user module 540 can perform the display function 31 of displaying the purchase UI or the medical UI through the display 130, perform the sending function 33 of sending information using the communication circuit of the communicator 140, or use a printer (not shown) to perform processing of printing information. Print function 34 for printing.

图6到图7是示出在图5的每个模块之间的数据处理的示例的流程图。6 to 7 are flowcharts showing an example of data processing between each module of FIG. 5 .

参照图6,如果应用10向隐私保护模块500请求个人信息(S610),则隐私引擎模块510可从信息源20获得原始数据状态下的个人信息(S620),并且隐私引擎模块510可通过策略模块520检查关于应用10的隐私策略以确定是否有必要保护个人信息(S630)。6, if the application 10 requests personal information from the privacy protection module 500 (S610), the privacy engine module 510 can obtain the personal information in the original data state from the information source 20 (S620), and the privacy engine module 510 can pass the policy module 520 checks the privacy policy on the application 10 to determine whether it is necessary to protect personal information (S630).

如果确定个人信息需要被保护,则隐私引擎模块510可从数据处理模块530获得受保护数据状态下的加密的个人信息(S640),并向应用10提供受保护数据状态下的加密的个人信息(S650)。If it is determined that the personal information needs to be protected, the privacy engine module 510 may obtain encrypted personal information in the protected data state from the data processing module 530 (S640), and provide the encrypted personal information in the protected data state to the application 10 ( S650).

如果确定个人信息不需要被保护,则隐私引擎模块510可向应用10提供原始数据状态下的未被加密的个人信息(S660)。If it is determined that the personal information does not need to be protected, the privacy engine module 510 may provide the unencrypted personal information in a raw data state to the application 10 (S660).

同时,参照图7,如果应用10请求隐私保护模块500执行与个人信息有关的功能(S710),则隐私用户模块540可通过策略模块520检查关于应用10的隐私策略以确定由应用10请求的个人信息是处于受保护数据状态下还是处于原始数据状态下(S720)。Meanwhile, referring to FIG. 7, if the application 10 requests the privacy protection module 500 to perform functions related to personal information (S710), the privacy user module 540 can check the privacy policy about the application 10 through the policy module 520 to determine the personal information requested by the application 10. Whether the information is in the state of protected data or in the state of original data (S720).

如果个人信息处于受保护数据状态下,则隐私用户模块540可对受保护数据状态下的加密的个人信息进行解密以获得原始数据状态下的个人信息(S730),并使用原始数据状态下的个人信息执行功能(S740)。If the personal information is in the state of protected data, the privacy user module 540 can decrypt the encrypted personal information in the state of protected data to obtain the personal information in the state of original data (S730), and use the personal information in the state of original data Information execution function (S740).

如果个人信息处于原始数据状态下,则隐私用户模块540可使用原始数据状态下的个人信息执行功能而不进行解密处理。If the personal information is in the raw data state, the privacy user module 540 may use the personal information in the raw data state to perform functions without decryption processing.

同时,图8到图13是示出各种示例实施例的示图。Meanwhile, FIGS. 8 to 13 are diagrams illustrating various example embodiments.

如果被确定需要保护个人信息的应用请求联系人信息,则处理器120可被配置为对联系人信息进行加密并向应用提供加密的联系人信息,并且如果从应用接收到对于与加密的信息有关的功能的执行请求,则处理器120可被配置为对加密的联系人信息进行解密并在显示器130上显示基于解密的联系人信息产生的联系人UI。If an application that is determined to need to protect personal information requests contact information, the processor 120 may be configured to encrypt the contact information and provide the encrypted contact information to the application, and if a request for information related to the encrypted information is received from the application The processor 120 may be configured to decrypt the encrypted contact information and display the contact UI generated based on the decrypted contact information on the display 130 .

参照关于上述的图8,如果应用121请求隐私保护模块122提供地址簿信息以产生朋友列表UI,则隐私保护模块122可从存储器110获得关于地址簿信息的原始数据810。Referring to FIG. 8 described above, if the application 121 requests the privacy protection module 122 to provide address book information to generate a friend list UI, the privacy protection module 122 may obtain raw data 810 about the address book information from the memory 110 .

这里,电话号码“01095300602”作为关于地址簿信息的原始数据810的示例,但这通常仅是为了方便描述的示例,关于产生朋友列表UI的地址簿信息的原始数据810包括多个电话号码。Here, the phone number "01095300602" is an example of the original data 810 on the address book information, but this is generally only an example for convenience of description, and the original data 810 on the address book information generating the friend list UI includes a plurality of phone numbers.

隐私保护模块122可对关于地址簿信息的原始数据810进行加密以将关于地址簿信息的原始数据810转换为关于地址簿信息的受保护数据820。The privacy protection module 122 may encrypt the original data 810 on the address book information to convert the original data 810 on the address book information into protected data 820 on the address book information.

例如,电话号码“22091820385”作为关于地址簿信息的受保护数据820的示例,但这通常仅是为了方便描述的示例,关于关于产生朋友列表UI的地址簿信息的受保护数据820包括多个电话号码。For example, the phone number "22091820385" is used as an example of the protected data 820 about the address book information, but this is generally only an example for convenience of description, and the protected data 820 about the address book information about generating the friend list UI includes multiple phone Number.

同时,关于地址簿信息的受保护数据820通过对关于地址簿信息的原始数据810进行加密而产生,并因此,实际的电话号码“01095300602”被表现为不同的形式“22091820385”。Meanwhile, the protected data 820 on the address book information is generated by encrypting the original data 810 on the address book information, and thus, the actual phone number '01095300602' is expressed in a different form '22091820385'.

此外,隐私保护模式122可向应用121提供关于地址簿信息的受保护数据820。因此,即使应用121将地址簿信息发送到服务器840,但由应用121发送的地址信息是受保护数据状态下的加密的地址簿信息820(22091820385),而不是包括实际电话号码的原始数据状态下的地址簿信息810(01009530602),并因此,个人信息可被保护。Additionally, the privacy protection mode 122 may provide the application 121 with protected data 820 regarding address book information. Therefore, even if the application 121 sends the address book information to the server 840, the address information sent by the application 121 is the encrypted address book information 820 (22091820385) in the protected data state, not in the original data state including the actual phone number The address book information 810 (01009530602), and thus, personal information can be protected.

同时,如果应用121在使用关于地址簿信息的受保护数据820请求执行显示朋友列表UI的功能的同时发送关于地址簿信息的保护数据820,则隐私保护模块122可对关于地址簿信息的受保护数据820进行解密以将关于地址簿信息的受保护数据820改变为关于地址簿信息的原始数据810,基于原始数据产生朋友列表UI 830,并通过显示器130显示产生的朋友列表UI 830。Meanwhile, if the application 121 transmits the protected data 820 on the address book information while requesting execution of the function of displaying the friend list UI using the protected data 820 on the address book information, the privacy protection module 122 may protect the protected data on the address book information. The data 820 is decrypted to change the protected data 820 on address book information into original data 810 on address book information, a friend list UI 830 is generated based on the original data, and the generated friend list UI 830 is displayed through the display 130 .

例如,示出了在处理器中包括两个相同的隐私保护模块122,但这是为了说明应用121请求隐私保护模块122提供个人信息的情况和应用121请求执行与个人信息有关的功能的情况。处理器120可包括一个隐私保护模块122。For example, it is shown that two identical privacy protection modules 122 are included in the processor, but this is for explaining the case where the application 121 requests the privacy protection module 122 to provide personal information and the case where the application 121 requests to execute functions related to personal information. Processor 120 may include a privacy protection module 122 .

同样地,由于关于用于显示朋友列表UI 830的地址簿信息的原始数据810仅在显示器130中被使用,因此应用121可仅获得关于地址簿信息的受保护数据810,并不可获得关于地址簿信息的原始数据810,并因此,个人信息可被保护。Likewise, since the original data 810 about the address book information for displaying the friend list UI 830 is only used in the display 130, the application 121 can only obtain the protected data 810 about the address book information, and cannot obtain information about the address book The raw data 810 of information, and thus, personal information can be protected.

同时,如果从应用接收到对于基于加密的联系人信息的呼叫功能的执行请求,则处理器120可被配置为对加密的联系人信息进行解密并执行所述呼叫功能。Meanwhile, if an execution request for a call function based on encrypted contact information is received from an application, the processor 120 may be configured to decrypt the encrypted contact information and execute the call function.

参照关于上述的图9,如果用户输入用户操作以执行与在朋友列表UI 910上标记的特定的人的呼叫功能,则应用121可在请求隐私保护模块122执行呼叫功能的同时发送关于地址簿信息的受保护数据820(22091820385)。Referring to FIG. 9 described above, if the user inputs a user operation to perform a call function with a specific person marked on the friend list UI 910, the application 121 may send information about the address book while requesting the privacy protection module 122 to perform the call function. Protected data of 820(22091820385).

此外,隐私保护模块122可对关于地址簿信息的受保护数据820进行解密以将关于地址簿信息的受保护数据820(22091820385)改变为关于地址簿信息的原始数据810(01095300602),并通过通信器140向与关于地址簿信息的原始数据810相应的特定的人执行呼叫发送请求。In addition, the privacy protection module 122 may decrypt the protected data 820 on the address book information to change the protected data 820 (22091820385) on the address book information into the original data 810 (01095300602) on the address book information, and communicate The device 140 performs a call transmission request to a specific person corresponding to the raw data 810 about the address book information.

此外,隐私保护模块122可在通过通信器140执行呼叫发送请求的同时,控制电子装置100显示呼叫连接屏幕920,其中,呼叫连接屏幕920显示作为实际电话号码的关于地址簿信息的原始数据810(01095300602)。In addition, the privacy protection module 122 may control the electronic device 100 to display a call connection screen 920 displaying the original data 810 ( 01095300602).

例如,当执行呼叫功能时,应用121可仅获得关于地址簿信息的受保护数据820(22091820385),并不可识别作为实际电话号码的关于地址簿信息的原始数据(01095300602),并因此,个人信息可被保护。For example, when performing a call function, the application 121 can only obtain the protected data 820 (22091820385) on the address book information, and cannot recognize the original data (01095300602) on the address book information as the actual phone number, and thus, the personal information can be protected.

同时,如果应用请求位置信息,则处理器120可被配置为对位置信息进行加密并向应用提供加密的位置信息,并且如果从应用接收到对于与加密的位置信息有关的功能的执行请求,则处理器120可被配置为对加密的位置信息进行解密,并在显示器上显示基于解密的位置信息产生的地图屏幕。Meanwhile, if an application requests location information, the processor 120 may be configured to encrypt the location information and provide the encrypted location information to the application, and if an execution request for a function related to the encrypted location information is received from the application, then The processor 120 may be configured to decrypt the encrypted location information, and display a map screen generated based on the decrypted location information on the display.

参照关于上述的图10,如果地图应用121’请求隐私保护模块122提供位置信息以产生表示电子设备100的当前位置的屏幕,则隐私保护模块122可从存储器110获得关于位置信息的原始数据810’。Referring to FIG. 10 described above, if the map application 121' requests the privacy protection module 122 to provide location information to generate a screen representing the current location of the electronic device 100, the privacy protection module 122 may obtain raw data 810' about the location information from the memory 110 .

例如,关于位置信息的原始数据810’包括关于经纬度的信息(37.4562684,127.0228328),但关于位置信息的原始数据810’可包括关于方位角和海拔而不是经纬度的信息。For example, the original data 810' about location information includes information about latitude and longitude (37.4562684, 127.0228328), but the original data 810' about location information may include information about azimuth and altitude instead of latitude and longitude.

隐私保护模块122可对关于位置信息的原始数据810’进行加密以将关于位置信息的原始数据810’转换为关于位置信息的受保护数据820’。The privacy protection module 122 may encrypt the raw data 810' on location information to convert the raw data 810' on location information into protected data 820' on location information.

例如,关于位置信息的受保护数据820’可包括通过对关于经纬度的信息进行加密而产生和显示的信息(37.2029352,127.102934),并具有与作为关于位置信息的原始数据810’的关于实际经纬度的信息(37.4562684,127.0228328)不同的形式。For example, the protected data 820' on location information may include information (37.2029352, 127.102934) generated and displayed by encrypting information on latitude and longitude, and have information on the actual latitude and longitude that is the original data 810' on location information. Information (37.4562684, 127.0228328) in different forms.

此外,隐私保护模块122可向地图应用121’提供关于位置信息的受保护数据820’。因此,即使地图应用121’发送位置信息,由地图应用121’发送的位置信息是在受保护数据状态下的加密的位置信息820’(37.2029352,127.102934),而不是包括实际位置信息的在原始数据状态下的位置信息810’(37.4562684,127.0228328),并因此,个人信息可被保护。In addition, the privacy protection module 122 may provide the protected data 820' regarding location information to the map application 121'. Therefore, even if the map application 121' transmits the location information, the location information sent by the map application 121' is the encrypted location information 820' (37.2029352, 127.102934) in the protected data state, rather than the original data including the actual location information. The location information 810'(37.4562684, 127.0228328) under the state, and thus, the personal information can be protected.

同时,如果地图应用121’在使用关于位置信息的受保护数据820’请求执行显示指示电子设备100的当前位置的屏幕的功能的同时,将关于位置信息的受保护数据820’发送到隐私保护模块122,则隐私保护模块122可对关于位置信息的受保护数据820’进行解密以将关于位置信息的受保护数据820’改变为关于位置信息的原始数据810’,基于原始数据产生指示电子设备100的当前位置的屏幕,并通过显示器130显示指示电子设备100的当前位置的屏幕。Meanwhile, if the map application 121' transmits the protected data 820' about the location information to the privacy protection module while requesting to execute the function of displaying the screen indicating the current location of the electronic device 100 using the protected data 820' about the location information 122, the privacy protection module 122 may decrypt the protected data 820' about the location information to change the protected data 820' about the location information into the original data 810' about the location information, and generate the instruction electronic device 100 based on the original data. and display a screen indicating the current location of the electronic device 100 through the display 130 .

例如,示出了在处理器120中包括两个相同的隐私保护模块122,但这是为了说明应用121请求隐私保护模块122提供个人信息的情况以及应用121请求执行与个人信息有关的功能的情况。处理器120可包括一个隐私保护模块122。For example, it is shown that two identical privacy protection modules 122 are included in the processor 120, but this is to illustrate the situation where the application 121 requests the privacy protection module 122 to provide personal information and the situation where the application 121 requests to perform functions related to personal information . Processor 120 may include a privacy protection module 122 .

同样地,由于关于用于显示指示电子设备100的当前位置的屏幕的位置信息的原始数据810’仅在显示器130中被使用,因此地图应用121’可仅获得关于位置信息的受保护数据820’并不可获得关于位置信息的原始数据810’,并因此,个人信息可被保护。Also, since the original data 810' about the location information for displaying the screen indicating the current location of the electronic device 100 is used only in the display 130, the map application 121' can obtain only the protected data 820' about the location information Raw data 810' about location information is not available, and thus, personal information can be protected.

同时,例如,电子设备100可被实现为可执行至少一个应用的智能TV而不是用户终端装置。Meanwhile, for example, the electronic device 100 may be implemented as a smart TV that can execute at least one application instead of a user terminal device.

参照图11,可在智能TV 1100的屏幕上显示各种应用,并在这种情况中,视频呼叫应用1110可被执行以请求智能TV 1100的存储器提供地址簿信息。Referring to FIG. 11 , various applications may be displayed on the screen of the smart TV 1100 , and in this case, a video call application 1110 may be executed to request the memory of the smart TV 1100 to provide address book information.

同样地,智能TV 1100中的隐私保护模块122可从存储器获得关于地址簿信息的原始数据,将原始数据加密为关于地址簿信息的受保护数据,并向视频呼叫应用1110提供受保护数据。Likewise, the privacy protection module 122 in the smart TV 1100 can obtain raw data about the address book information from the memory, encrypt the raw data into protected data about the address book information, and provide the protected data to the video call application 1110 .

如果视频呼叫应用1110在使用关于地址簿信息的受保护数据请求执行显示关于地址簿的屏幕的功能的同时,向隐私保护模块122发送关于地址簿信息的受保护数据,则隐私保护模块122可对关于地址簿信息的受保护数据进行解密以将关于地址簿信息的受保护数据改变为关于地址簿信息的原始数据,基于原始数据产生关于地址簿信息的屏幕,并通过显示器130显示产生的关于地址簿信息屏幕。If the video call application 1110 transmits the protected data on the address book information to the privacy protection module 122 while requesting to perform a function of displaying a screen on the address book using the protected data on the address book information, the privacy protection module 122 may The protected data on the address book information is decrypted to change the protected data on the address book information into original data on the address book information, a screen on the address book information is generated based on the original data, and the generated on the address is displayed through the display 130 book information screen.

在本示例中,由于关于用于显示关于地址簿的屏幕的地址簿信息的原始数据仅在显示器130中被使用,因此视频呼叫应用1110仅可获得关于地址簿信息的受保护数据,并不可获得关于地址簿信息的原始数据。因此,个人信息可被保护。In this example, since the raw data about the address book information for displaying the screen about the address book is only used in the display 130, the video call application 1110 can only obtain the protected data about the address book information, and cannot obtain Raw data about address book information. Therefore, personal information can be protected.

同样地,如果用户期望选择特定的人并与该特定的人执行视频呼叫,视频呼叫应用1110使用关于地址簿信息的受保护数据来请求执行视频呼叫功能,并且隐私保护模块122通过将关于地址簿信息的受保护数据解密为关于地址簿信息的原始数据来控制通信器140执行视频呼叫功能。Likewise, if the user desires to select a specific person and perform a video call with the specific person, the video call application 1110 uses the protected data about the address book information to request the execution of the video call function, and the privacy protection module 122 passes information about the address book The protected data of the information is decrypted into the original data about the address book information to control the communicator 140 to perform the video call function.

同时,参照图12,如果在智能TV 1200中执行照片相册应用,则照片相册应用获得在智能TV中的存储器中存储的照片文件以产生并显示各种照片图像,如图12所示。显示图像1210之一的处理将作为示例被描述。Meanwhile, referring to FIG. 12 , if a photo album application is executed in the smart TV 1200, the photo album application obtains photo files stored in a memory in the smart TV to generate and display various photo images, as shown in FIG. 12 . The process of displaying one of the images 1210 will be described as an example.

照片相册应用可请求智能TV 1200的存储器提供相应的照片文件,并且隐私保护模块122可从智能TV 1200的存储器获得关于相应的照片文件的原始数据,将原始数据加密为关于照片文件的受保护数据,并向照片相册应用提供受保护数据。The photo album application may request the memory of the smart TV 1200 to provide corresponding photo files, and the privacy protection module 122 may obtain original data about the corresponding photo files from the memory of the smart TV 1200, and encrypt the original data into protected data about the photo files , and provide protected data to the Photos Roll app.

如果照片相册应用在使用关于照片文件的受保护数据请求执行显示包括相应的图像1210的相册屏幕的功能的同时,将关于照片文件的受保护数据发送到隐私保护模块122,则隐私保护模块122可对关于照片文件的受保护数据进行解密以将照片文件改变为关于照片文件的原始数据,基于原始数据产生相应的图像1210,并通过显示器130显示包括产生的相应的图像1210的相册屏幕。If the photo album application transmits the protected data about the photo file to the privacy protection module 122 while requesting to perform the function of displaying the album screen including the corresponding image 1210 using the protected data about the photo file, the privacy protection module 122 may The protected data on the photo file is decrypted to change the photo file into original data on the photo file, a corresponding image 1210 is generated based on the original data, and an album screen including the generated corresponding image 1210 is displayed through the display 130 .

在本示例中,照片相册应用可仅获得关于照片文件的受保护数据,并且关于用于显示包括相应的图像1210的相册屏幕的照片文件的原始数据仅在显示器130中被使用。因此,照片相册应用不可获得关于照片文件的原始数据,并因此,个人信息可被保护。In this example, the photo album application may obtain only protected data on photo files, and raw data on photo files for displaying an album screen including a corresponding image 1210 is used only in the display 130 . Therefore, the photo album application cannot obtain raw data about photo files, and thus, personal information can be protected.

同时,即使当数据在多个电子设备和服务器之间被发送时,上述针对个人信息的保护的处理可被应用。Meanwhile, even when data is transmitted between a plurality of electronic devices and a server, the above-described processing for protection of personal information can be applied.

参照图13,如果用户在笔记本PC屏幕1310中执行文件上传应用,选择在笔记本PC的存储器中存储的照片文件并将所述照片文件添加到执行文件上传应用的文件上传窗口以将照片文件上传到服务器1320上,则文件上传应用将添加的照片文件上传到服务器1320上。在本示例中,笔记本PC中的隐私保护模块122可检测照片文件被上传到服务器1320上,并将原始数据状态下的照片文件转换为受保护数据状态下的照片文件,并向文件上传应用提供受保护数据。13, if the user executes the file upload application in the notebook PC screen 1310, selects the photo file stored in the memory of the notebook PC and adds the photo file to the file upload window of the execution file upload application to upload the photo file to On the server 1320, the file upload application uploads the added photo file to the server 1320. In this example, the privacy protection module 122 in the notebook PC can detect that the photo file is uploaded to the server 1320, and convert the photo file in the original data state into a photo file in the protected data state, and provide the file upload application with protected data.

因此,由于文件上传应用将受保护数据状态下的照片文件发送到服务器1320,因此服务器1320无法获得原始数据状态下的照片文件。因此,可避免个人信息的泄露。Therefore, since the file upload application sends the photo file in the protected data state to the server 1320, the server 1320 cannot obtain the photo file in the original data state. Therefore, leakage of personal information can be avoided.

随后,如果用户在智能TV中执行照片相册应用并执行通过照片相册应用从服务器1320下载受保护数据状态下的照片文件以及显示照片文件的功能,则智能TV 1330中的隐私保护模块122可检测照片相册应用期望显示照片,并将从服务器1320中下载的受保护数据状态下的照片文件解密为原始数据状态下的照片文件并通过显示器130显示照片文件。Subsequently, if the user executes the photo album application in the smart TV and performs the function of downloading the photo file under the protected data state from the server 1320 and displaying the photo file through the photo album application, the privacy protection module 122 in the smart TV 1330 can detect the photo The photo album application expects to display photos, and decrypts the photo files in the protected data state downloaded from the server 1320 to the photo files in the original data state and displays the photo files through the display 130 .

此外,如果用户在智能手机1340中执行文件下载应用,从服务器1320下载受保护数据状态下的照片文件并执行显示下载的受保护数据状态下的照片文件的功能,则智能手机1340中的隐私保护模块122可检测文件下载应用期望显示照片,将从服务器1320下载的受保护数据状态下的照片文件解密为原始数据状态下的照片文件,并通过显示器130显示照片文件。In addition, if the user executes the file download application in the smart phone 1340, downloads the photo file in the protected data state from the server 1320 and executes the function of displaying the downloaded photo file in the protected data state, the privacy protection in the smart phone 1340 The module 122 can detect that the file download application expects to display photos, decrypt the photo files in the protected data state downloaded from the server 1320 into photo files in the original data state, and display the photo files through the display 130 .

同时,图14是示出隐私保护模块的示例结构的示图。Meanwhile, FIG. 14 is a diagram illustrating an example structure of a privacy protection module.

例如,在关于图8的上述描述中,在处理器120中包括两个相同的隐私保护模块122,但这只是为了方便说明。如果应用121、隐私保护模块122、存储器110和显示器130被包括在如图4所示的电子设备100中,则一个隐私保护模块122可从存储器110获得个人信息并将个人信息发送到显示器130以执行功能。For example, in the above description about FIG. 8, two identical privacy protection modules 122 are included in the processor 120, but this is only for convenience of illustration. If the application 121, the privacy protection module 122, the memory 110 and the display 130 are included in the electronic device 100 as shown in FIG. Execution function.

同时,如图13所示,在多个电子设备和服务器之间发送加密的数据可需要预定的加密方法。在这点上,图15和图16是示出加密方法的示图。Meanwhile, as shown in FIG. 13, transmitting encrypted data between a plurality of electronic devices and a server may require a predetermined encryption method. In this regard, FIGS. 15 and 16 are diagrams illustrating encryption methods.

根据示例实施例,如图15所示,例如,加密和解密可通过发送加密的个人信息的发送终端100和接收加密的个人信息的接收终端100’之间的直接密钥交换而被执行。According to an example embodiment, as shown in FIG. 15 , for example, encryption and decryption may be performed through direct key exchange between a transmitting terminal 100 transmitting encrypted personal information and a receiving terminal 100' receiving encrypted personal information.

例如,如果接收加密的个人信息的接收终端100’预存储公共密钥和私人密钥并且发送加密的个人信息的发送终端100预存储接收终端100’具有的公共密钥,则接收终端100’可使用私人密钥对加密的个人信息(例如,由发送终端100通过相应的公共密钥加密和发送的个人信息)进行解密。在本示例中,当预定事件发生时,公共密钥可在发送终端100和接收终端100’之间交换。例如,如果预定菜单被选择,则由即时信使支持的地址簿被互换等,公共密钥可被交换。For example, if the receiving terminal 100' that receives encrypted personal information pre-stores a public key and a private key and the transmitting terminal 100 that transmits encrypted personal information pre-stores a public key that the receiving terminal 100' has, the receiving terminal 100' may The encrypted personal information (for example, the personal information encrypted and transmitted by the transmitting terminal 100 through the corresponding public key) is decrypted using the private key. In this example, the public key may be exchanged between the transmitting terminal 100 and the receiving terminal 100' when a predetermined event occurs. For example, if a predetermined menu is selected, address books supported by instant messengers are exchanged, etc., public keys may be exchanged.

此外,如图16所示,例如,加密和解密可通过外部加密管理服务器300被执行。例如,加密管理服务器300可例如被实现为由设备制造商操作的云服务器等,但不限于此。Also, as shown in FIG. 16 , encryption and decryption may be performed by an external encryption management server 300, for example. For example, the encryption management server 300 may be implemented, for example, as a cloud server or the like operated by a device manufacturer, but is not limited thereto.

当加密管理服务器300管理公共密钥和私人密钥时,加密管理服务器300可响应于来自发送消息的发送终端的请求,将私人密钥分配给接收加密的消息的接收终端100’,并将与被分配给接收终端100’的私人密钥相应的公共密钥分配给发送终端100。因此,接收终端100’可通过使用相应的私人密钥对通过发送终端100具有的公共密钥加密的消息进行解密。因此,在每一次会话可产生并提供任意的私人密钥。When the encryption management server 300 manages the public key and the private key, the encryption management server 300 may distribute the private key to the receiving terminal 100' receiving the encrypted message in response to a request from the transmitting terminal that transmits the message, and combine A public key corresponding to the private key allocated to the receiving terminal 100 ′ is allocated to the transmitting terminal 100 . Accordingly, the receiving terminal 100' can decrypt the message encrypted by the public key possessed by the transmitting terminal 100 by using the corresponding private key. Therefore, any private key can be generated and provided per session.

上述的加密和解密方法仅是示例,并且可使用其他各种加密和解密方法。The encryption and decryption methods described above are merely examples, and other various encryption and decryption methods may be used.

图17是示出控制电子设备的示例方法的流程图。17 is a flowchart illustrating an example method of controlling an electronic device.

控制执行使用个人信息执行功能的至少一个应用的电子设备的方法包括,当应用请求个人信息时,基于与预存储的个人信息的保护有关的信息针对每个应用被设置的信息确定是否保护个人信息(S1710)。The method of controlling an electronic device executing at least one application that performs a function using personal information includes, when the application requests the personal information, determining whether to protect the personal information based on information set for each application based on information related to protection of pre-stored personal information (S1710).

基于确定结果对个人信息进行加密并向应用提供加密的个人信息(S1720)。The personal information is encrypted based on the determination result and the encrypted personal information is provided to the application (S1720).

如果从应用接收到对于与加密的个人信息有关的功能的执行请求,则加密的个人信息被解密并且所述功能被执行(S1730)。If an execution request for a function related to the encrypted personal information is received from the application, the encrypted personal information is decrypted and the function is executed (S1730).

此外,根据示例实施例的控制电子设备的方法还可包括确定来自应用的请求是对于个人信息的请求还是执行功能的请求。In addition, the method of controlling an electronic device according to example embodiments may further include determining whether a request from an application is a request for personal information or a request to perform a function.

例如,确定是否保护个人信息的步骤可包括当应用请求个人信息时基于与个人信息的保护有关的信息来确定是否保护个人信息,或当由应用请求的个人信息属于预定个人信息时基于与个人信息的保护有关的信息来确定是否保护个人信息。For example, the step of determining whether to protect personal information may include determining whether to protect personal information based on information related to the protection of personal information when the application requests personal information, or based on information related to personal information when the personal information requested by the application belongs to predetermined personal information. to determine whether to protect personal information.

此外,与个人信息的保护有关的信息可包括关于不需要保护个人信息的应用的信息以及关于不需要保护的个人信息的类型的信息。In addition, information related to the protection of personal information may include information on applications that do not require protection of personal information and information on types of personal information that do not require protection.

提供的步骤可包括基于关于不需要保护个人信息的应用的信息和关于不需要保护的个人信息的类型的信息来确定是否不保护由应用请求的个人信息,并在不对个人信息进行加密的情况下向应用提供个人信息。The step of providing may include determining whether to not protect the personal information requested by the application based on the information on the application not requiring protection of the personal information and the information on the type of the personal information not requiring protection, and in the case of not encrypting the personal information Provide personal information to the application.

此外,根据示例实施例的控制电子设备的方法还可包括显示功能的执行结果。In addition, the method of controlling an electronic device according to example embodiments may further include displaying an execution result of a function.

个人信息可包括关于电子设备的位置的信息、联系人信息、关于照片文件的信息和关于消息的信息中的至少一个。The personal information may include at least one of information on a location of the electronic device, contact information, information on photo files, and information on messages.

此外,提供的步骤包括,当应用请求联系人信息时,则对联系人信息进行加密并向应用提供加密的个人信息,并且执行的步骤包括,当从应用接收到对于与加密的联系人信息有关的功能的执行请求时,则对加密的联系人信息进行解密并显示基于解密的联系人信息产生的联系人UI。Additionally, the step of providing includes, when the application requests contact information, encrypting the contact information and providing the encrypted personal information to the application, and the step of performing includes, when receiving from the application a request for information related to the encrypted contact information When the execution request of the function is requested, the encrypted contact information is decrypted and the contact UI generated based on the decrypted contact information is displayed.

此外,执行的步骤包括,当从应用接收到对于基于加密的联系人信息的呼叫功能的执行请求时,对加密的联系人信息进行解密并执行呼叫功能。In addition, the performed step includes, when an execution request for a call function based on the encrypted contact information is received from the application, decrypting the encrypted contact information and executing the call function.

图18到图21是示出各种示例实施例的示图。18 to 21 are diagrams illustrating various example embodiments.

在图18中,电子设备100可以是例如食物贮存装置(例如,冰箱)1800。如果电子设备100是食物贮存装置,则与食物贮存有关的各种应用1811可被安装在电子设备100中。例如,电子设备100可包括执行检查在食物贮存装置1800的贮存室1801中贮存的食物的贮存条件的功能的应用、执行调整电子设备100的贮存温度的功能的应用、执行检查电子设备100的食物的库存历史的功能的应用、执行显示在食物贮存装置1800的贮存室1801中贮存的食物的功能的应用、执行购买将要被贮存在电子设备100中的食物的功能的应用等,但不限于此。上述应用的至少一个可被实现为由一个应用提供的每个功能。In FIG. 18 , the electronic device 100 may be, for example, a food storage device (eg, a refrigerator) 1800 . If the electronic device 100 is a food storage device, various applications 1811 related to food storage may be installed in the electronic device 100 . For example, the electronic device 100 may include an application that performs a function of checking the storage condition of food stored in the storage chamber 1801 of the food storage device 1800, an application that performs a function of adjusting the storage temperature of the electronic device 100, and an application that performs a function of checking the food stored in the electronic device 100. The application of the function of the inventory history of the food storage device 1800, the application of the function of displaying the food stored in the storage room 1801 of the food storage device 1800, the application of the function of purchasing the food to be stored in the electronic device 100, etc., but not limited thereto . At least one of the above-mentioned applications may be implemented as each function provided by one application.

在本示例中,根据示例实施例的确定需要保护个人信息的示例应用可以是用于使用购买信息购买物品(例如,食物等)的应用1811。In this example, an example application that determines that personal information needs to be protected according to an example embodiment may be an application 1811 for purchasing items (eg, food, etc.) using purchase information.

例如,如果用户通过用户接口150(例如,图3中所示)输入购买信息以购买物品,输入的购买信息可被存储在存储器110中。For example, if a user enters purchase information to purchase an item through the user interface 150 (eg, shown in FIG. 3 ), the entered purchase information may be stored in the memory 110 .

购买信息可包括例如用户信息(例如,用户名、用户的昵称、用户的电子邮件地址等)、关于将要被购买的物品的信息(例如,食物的识别信息、食物的保质期信息、关于将要被购买的食物的数量的信息等)、购买所需的财务信息(例如,卡号、卡的有效期等)和配送信息(例如,用户地址、居住国、用户的邮政编码等)。Purchase information may include, for example, user information (e.g., user name, user's nickname, user's e-mail address, etc.), information about items to be purchased (e.g., identification information of food, shelf life information of food, information about items to be purchased). information on the quantity of food, etc.), financial information required for purchase (eg, card number, card expiration date, etc.), and delivery information (eg, user's address, country of residence, user's zip code, etc.).

在另一示例中,处理器120可检测在食物贮存装置1800的贮存室1801中存储的食物的类型、数量、保质期、到期日等。如果在食物贮存装置1800的贮存室1801中存储的食物的类型、数量和到期日之一没有达到预定的标准,则处理器120可将关于在存储器110中必须被购买的物品的信息自动存储为购买信息。In another example, the processor 120 may detect the type, quantity, shelf life, expiration date, etc. of food stored in the storage chamber 1801 of the food storage device 1800 . If one of the type, quantity and expiration date of the food stored in the storage chamber 1801 of the food storage device 1800 does not reach a predetermined standard, the processor 120 may automatically store information about items that must be purchased in the memory 110 for purchase information.

在这种情况下,基于对于确认购买信息的状态的用户请求,应用1811可请求处理器120提供购买信息以显示包括购买信息的购买UI 1831。In this case, the application 1811 may request the processor 120 to provide the purchase information to display the purchase UI 1831 including the purchase information based on the user's request for confirming the status of the purchase information.

处理器120可对购买信息进行加密并向应用提供加密的购买信息。如果接收到对于与加密的购买信息有关的功能的执行请求,则处理器120可对加密的购买信息进行解密并通过显示器130显示基于解密的购买信息而产生的购买UI 1831。The processor 120 may encrypt the purchase information and provide the encrypted purchase information to the application. If an execution request for a function related to the encrypted purchase information is received, the processor 120 may decrypt the encrypted purchase information and display the purchase UI 1831 generated based on the decrypted purchase information through the display 130 .

例如,如果应用1811请求隐私保护模块122提供购买信息以产生购买UI 1831,则隐私保护模块122可从存储器110获得关于购买信息的原始数据1821。For example, if the application 1811 requests the privacy protection module 122 to provide purchase information to generate the purchase UI 1831 , the privacy protection module 122 may obtain raw data 1821 on the purchase information from the memory 110 .

例如,关于购买信息的原始数据1821可以是例如地址的一部分(诸如“Manhattan”)。For example, raw data 1821 about purchase information may be, for example, part of an address (such as "Manhattan").

隐私保护模块122可对关于购买信息的原始数据1821进行加密并将关于购买信息的加密的原始信息1821转换为关于购买信息的受保护数据1822。The privacy protection module 122 may encrypt original data 1821 on purchase information and convert the encrypted original information 1821 on purchase information into protected data 1822 on purchase information.

这里,关于购买信息的受保护数据1822可以是例如用户地址的一部分(诸如“P[Manhattan]”)。Here, protected data 1822 regarding purchase information may be, for example, part of a user's address (such as "P[Manhattan]").

随后,隐私保护模块122可向应用1811提供关于购买信息的受保护数据1822。因此,即使应用1811在用户没有同意的情况下将购买信息发送到服务器830,隐私信息也可被保护,这是因为由应用1811发送的购买信息是受保护数据状态下的加密的购买信息1822。Subsequently, the privacy protection module 122 may provide the application 1811 with the protected data 1822 regarding the purchase information. Therefore, even if the application 1811 transmits purchase information to the server 830 without the user's consent, private information can be protected because the purchase information transmitted by the application 1811 is encrypted purchase information 1822 in a protected data state.

应用1811可使用关于私人信息的受保护数据1822请求执行显示购买UI 1831的功能。这样,一旦应用1811将关于购买信息的保护数据1822发送到隐私保护模块1822,隐私保护模块122可对关于购买信息的受保护数据1822进行解密,并将关于购买信息的受保护数据1822转换为关于购买信息的原始数据1821。显示器130可产生包括原始数据1821的购买UI 1831并显示产生的购买UI 1831。在这种情况下,购买UI 1831可包括购买信息。购买信息可包括如上所述的用户信息、物品信息、财务信息和配送信息中的至少一个。The application 1811 may request execution of a function of displaying the purchase UI 1831 using the protected data 1822 on private information. In this way, once the application 1811 sends the protected data 1822 about the purchase information to the privacy protection module 1822, the privacy protection module 122 can decrypt the protected data 1822 about the purchase information, and convert the protected data 1822 about the purchase information into about Raw data 1821 of purchase information. The display 130 may generate the purchase UI 1831 including the original data 1821 and display the generated purchase UI 1831 . In this case, the purchase UI 1831 may include purchase information. The purchase information may include at least one of user information, item information, financial information, and delivery information as described above.

在本示例中,应用1811也可仅获得关于购买信息的受保护数据1822,并且关于购买信息的原始数据1822仅被显示器130用于显示购买UI 1831。因此,应用1811不可获得关于购买信息的原始数据1821,并因此,私人信息可被保护。In this example, the application 1811 can also only obtain the protected data 1822 about the purchase information, and the original data 1822 about the purchase information is only used by the display 130 to display the purchase UI 1831 . Therefore, the application 1811 cannot obtain the raw data 1821 on purchase information, and thus, private information can be protected.

参照图19,决定将要购买的物品的用户可使用应用1911向购物服务器1900请求购买物品。在本示例中,图19的应用1911可与图18的应用1811相同或相似,或者是与应用1811相同类型的应用。Referring to FIG. 19 , a user who decides an item to purchase may request a shopping server 1900 to purchase an item using an application 1911 . In this example, the application 1911 of FIG. 19 may be the same as or similar to the application 1811 of FIG. 18 , or be the same type of application as the application 1811 .

根据物品的购买请求,应用1911可请求处理器120提供购买信息以将用户已经输入并在存储器110中存储的购买信息发送到购物服务器1900。购物服务器1900可以是管理用户期望购买的物品的配送的服务器。例如,购物服务器1900可搜索具有用户期望购买的物品的经销商并请求经销商将物品配送到用户的居住区。在本示例中,购物服务器1900可以是例如由经销商直接运行的服务器或者是为多个经销商进行销售的服务器。购物服务器1900可被实现为多于一个的服务器或云服务器。According to a purchase request of an item, the application 1911 may request the processor 120 to provide purchase information to transmit the purchase information that the user has input and stored in the memory 110 to the shopping server 1900 . The shopping server 1900 may be a server that manages delivery of items that users desire to purchase. For example, the shopping server 1900 may search for a dealer having an item that the user desires to purchase and request the dealer to deliver the item to the user's residential area. In this example, the shopping server 1900 may be, for example, a server directly operated by a dealer or a server that conducts sales for a plurality of dealers. The shopping server 1900 may be implemented as more than one server or cloud server.

当应用1911请求购买信息时,处理器120可对购买信息进行加密并向应用1911提供加密的购买信息。随后,如果从应用1911接收到对于与加密的购买信息有关的功能的执行请求,则处理器120可对加密的购买信息进行解密并通过通信器140将解密的购买信息发送到外部购物服务器1900。When the application 1911 requests purchase information, the processor 120 may encrypt the purchase information and provide the application 1911 with the encrypted purchase information. Subsequently, if an execution request for a function related to the encrypted purchase information is received from the application 1911 , the processor 120 may decrypt the encrypted purchase information and transmit the decrypted purchase information to the external shopping server 1900 through the communicator 140 .

例如,如果应用1911请求隐私保护模块122提供将被发送到购物服务器1900的购买信息,则隐私保护模块122可从存储器110获得关于购买信息的原始数据1921。随后,隐私保护模块122可对关于购买信息的原始数据1921进行加密并将原始数据1921转换为受保护数据1922。For example, if the application 1911 requests the privacy protection module 122 to provide purchase information to be transmitted to the shopping server 1900 , the privacy protection module 122 may obtain raw data 1921 on the purchase information from the memory 110 . Then, the privacy protection module 122 may encrypt the original data 1921 about the purchase information and convert the original data 1921 into protected data 1922 .

例如,关于购买信息的受保护数据1922可以是例如用户地址的一部分(诸如“P[Manhattan]”)。For example, protected data 1922 regarding purchase information may be, for example, part of a user's address (such as "P[Manhattan]").

隐私保护模块122可向应用1911提供关于购物信息的受保护数据1922。The privacy protection module 122 may provide the application 1911 with protected data 1922 on shopping information.

应用1911可使用关于购物信息的受保护数据1922请求执行将购物信息发送到购物服务器1900的功能。这样,如果应用1911将关于购物信息的受保护数据1922发送到隐私保护模块122,则隐私保护模块122对关于购买信息的受保护数据1922进行解密并将关于购买信息的受保护数据1922转换为关于购买信息的原始数据1921。通信器140的通信电路可将转换后的原始数据1921发送到购物服务器1900。The application 1911 may request to perform a function of transmitting the shopping information to the shopping server 1900 using the protected data 1922 on the shopping information. In this way, if the application 1911 sends the protected data 1922 about the shopping information to the privacy protection module 122, the privacy protection module 122 decrypts the protected data 1922 about the purchase information and converts the protected data 1922 about the purchase information into about Raw data 1921 of purchase information. The communication circuit of the communicator 140 may transmit the converted raw data 1921 to the shopping server 1900 .

在本示例中,应用1911也可仅获得关于购买信息的受保护数据1922,并且被发送到购物服务器的关于购买信息的原始数据1921仅被通信器140的通信电路使用。因此,应用1911可不获得关于购买信息的原始数据1921,并因此,私人信息可被保护。In this example, the application 1911 can also obtain only the protected data 1922 on the purchase information, and the original data 1921 on the purchase information transmitted to the shopping server is only used by the communication circuit of the communicator 140 . Accordingly, the application 1911 may not obtain raw data 1921 on purchase information, and thus, private information may be protected.

参照图20,电子设备100可以是例如图像形成设备2000(例如,打印机)。Referring to FIG. 20 , the electronic device 100 may be, for example, an image forming device 2000 (eg, a printer).

如果电子设备100是成像设备,则与内容的打印有关的各种类型的应用2011可被安装在电子设备100中。例如,电子设备100可包括用于设置打印选项(诸如,打印量、打印质量、单面打印或双面打印、彩色打印或黑白打印、打印格式等)的应用、用于执行提供打印历史的功能的应用、用于设置打印文件的转发地址的应用、用于根据预定打印选项打印内容的应用等,但不限于此。同时,上述应用的至少一个可被实现为由一个应用提供的各个功能。If the electronic device 100 is an image forming device, various types of applications 2011 related to printing of content may be installed in the electronic device 100 . For example, the electronic device 100 may include an application for setting printing options such as printing volume, printing quality, single-sided printing or double-sided printing, color printing or black-and-white printing, printing format, etc., a function for performing a printing history, etc. , an application for setting forwarding addresses for printing files, an application for printing content according to predetermined printing options, etc., but not limited thereto. Meanwhile, at least one of the above-mentioned applications may be implemented as respective functions provided by one application.

在本示例中,根据示例实施例的提供需要被保护的私人信息的应用的示例可以是用于打印由用户选择的内容的应用2011。In this example, an example of an application providing private information that needs to be protected according to an example embodiment may be an application 2011 for printing content selected by a user.

例如,如果用户在外部设备(未示出)(例如,个人计算机、笔记本计算机、智能电话等)中选择将要被打印的内容,则将被打印的内容可被转换为可打印的格式并被发送到电子设备100。此外,如果用户在外部设备中选择将被打印的内容,则将被打印的内容可被发送到电子设备100,并且电子设备100可将接收到的内容改变为可打印的格式。可打印的格式的示例可以是支持打印机语言的Postscript(PS)、打印机控制语言(PCL)等。已经被改变为可打印格式的内容可被发送到电子设备100的存储器110。存储在存储器110中的格式已经被改变为电子设备100可打印的内容可被称为打印信息。For example, if a user selects content to be printed in an external device (not shown) (eg, personal computer, notebook computer, smart phone, etc.), the content to be printed can be converted into a printable format and sent to the electronic device 100 . Also, if the user selects the content to be printed in the external device, the content to be printed may be transmitted to the electronic device 100, and the electronic device 100 may change the received content into a printable format. Examples of the printable format may be Postscript (PS), Printer Control Language (PCL), etc. supporting a printer language. The content that has been changed into a printable format may be transmitted to the storage 110 of the electronic device 100 . The content stored in the memory 110 whose format has been changed to be printable by the electronic device 100 may be referred to as print information.

在本示例中,应用2011可请求处理器120提供打印信息以根据来自期望打印所选择的内容的用户的请求执行打印作业。In this example, the application 2011 may request the processor 120 to provide print information to perform a print job according to a request from a user who desires to print the selected content.

处理器120可对打印信息进行加密并向应用提供加密的打印信息。在从应用接收到与加密的打印信息有关的功能的执行请求,处理器120可对加密的打印信息进行解密并通过打印单元180使用解密的打印信息执行打印作业。例如,处理器120可使用喷墨方法、点喷方法和激光打印方法中的至少一个将打印信息打印在打印介质上。The processor 120 may encrypt the printing information and provide the encrypted printing information to the application. Upon receiving an execution request of a function related to encrypted print information from an application, the processor 120 may decrypt the encrypted print information and execute a print job using the decrypted print information through the printing unit 180 . For example, the processor 120 may print the printing information on the printing medium using at least one of an inkjet method, a dot jet method, and a laser printing method.

例如,如果应用2011请求隐私保护模块122提供打印信息,则隐私保护模块122可从存储器110获得关于打印信息的原始数据2021。For example, if the application 2011 requests the privacy protection module 122 to provide printing information, the privacy protection module 122 can obtain the original data 2021 about the printing information from the memory 110 .

例如,关于打印信息的原始数据2012可包括例如本文和图像的至少一个。For example, the original data 2012 regarding printing information may include at least one of text and images, for example.

隐私保护模块122可对关于打印信息的原始数据2021进行加密并将关于打印信息的原始数据2021转换为关于打印信息的受保护数据2022。The privacy protection module 122 may encrypt the original data 2021 on printing information and convert the original data 2021 on printing information into protected data 2022 on printing information.

隐私保护模块122可向应用2011提供关于打印信息的受保护数据2022。因此,即使应用2011在没有经过用户同意的情况下向服务器840发送打印信息,隐私信息也可被保护,这是因为由应用2011发送的打印信息是受保护数据的形式的加密的打印信息2022。The privacy protection module 122 may provide the application 2011 with the protected data 2022 on printing information. Therefore, even if the application 2011 transmits print information to the server 840 without the user's consent, private information can be protected because the print information transmitted by the application 2011 is encrypted print information 2022 in the form of protected data.

应用2011可使用关于打印信息的受保护数据2022请求执行对打印信息进行打印的功能。这样,如果应用2011将关于打印信息的受保护数据2022发送到隐私保护模块122,则隐私保护模块122可对关于打印信息的受保护数据2022进行解密,将其转换为关于打印信息的原始数据2021并将原始数据2021发送到打印单元180。打印单元180可将接收到的打印信息打印在打印纸上。The application 2011 may request execution of a function of printing the print information using the protected data 2022 on the print information. In this way, if the application 2011 sends the protected data 2022 about the printing information to the privacy protection module 122, the privacy protection module 122 can decrypt the protected data 2022 about the printing information and convert it into the original data 2021 about the printing information And send the original data 2021 to the printing unit 180. The printing unit 180 may print the received printing information on printing paper.

在本示例中,应用2011仅获得关于打印信息的受保护数据2022,并因此,关于用于对打印信息进行打印的打印信息的原始数据2021仅在打印单元180中被使用。因此,应用2011无法获得关于打印信息的原始数据2021,并因此,私人信息可被保护。In this example, the application 2011 obtains only the protected data 2022 on printing information, and thus, the original data 2021 on printing information for printing the printing information is used only in the printing unit 180 . Therefore, the application 2011 cannot obtain the original data 2021 regarding printing information, and thus, private information can be protected.

参照图21,电子设备100可以是例如医学图像拍摄装置2100(例如,计算机断层拍摄装置、超声波拍摄装置、X射线拍摄装置、磁共振成像装置等)。Referring to FIG. 21 , the electronic device 100 may be, for example, a medical image capturing apparatus 2100 (for example, a computed tomography apparatus, an ultrasound imaging apparatus, an X-ray imaging apparatus, a magnetic resonance imaging apparatus, etc.).

如果电子设备100是医学图像拍摄装置,则与医学图像的拍摄有关的各种应用2111可被安装在电子设备10中。例如,电子设备100可包括执行拍摄对象(例如患者、动物或体模)的功能的应用、执行设置医学图像的拍摄选项(例如,控制照射到对象上的波长的选项、信号的辐射量等)的功能的应用、驱动旋转框架的应用、用于调整对象位置的导轨或台板、执行将拍摄的医学图像发送到外部设备的功能的应用、执行输入对象的医学图像的功能的应用、显示关于捕捉对象的医学图像的信息的应用等,但不限于此。同时,上述应用中的至少一个可被实现为由一个应用提供的各个功能。If the electronic device 100 is a medical image capturing apparatus, various applications 2111 related to capturing of medical images may be installed in the electronic device 10 . For example, the electronic device 100 may include an application that performs a function of photographing an object (such as a patient, an animal, or a phantom), performs a function of setting a photographing option of a medical image (such as an option to control the wavelength irradiated on the object, the radiation amount of the signal, etc.) application of the function of driving a rotating frame, a rail or a platen for adjusting the position of an object, an application of performing a function of sending a captured medical image to an external device, an application of performing a function of inputting a medical image of an object, displaying information about An application of information capturing a medical image of a subject, etc., but not limited thereto. Meanwhile, at least one of the above-mentioned applications may be implemented as respective functions provided by one application.

在本示例中,根据示例实施例的隐私信息需要被保护的应用的示例可以是显示或发送对象的医学信息的应用2111。In this example, an example of an application whose privacy information needs to be protected according to example embodiments may be an application 2111 that displays or transmits medical information of a subject.

医学信息可从用户输入或从外部服务器(未示出)接收,并被存储在电子设备100的存储器110中。在本示例中,医学信息可包括患者的重量、高度、血压、血糖水平、体温、疾病历史等。如果对象被拍摄,则处理器120可在存储器110中存储作为医学信息的另一示例的医学图像信息。The medical information may be input from a user or received from an external server (not shown), and stored in the memory 110 of the electronic device 100 . In this example, medical information may include the patient's weight, height, blood pressure, blood sugar levels, temperature, disease history, and the like. If a subject is photographed, the processor 120 may store medical image information, which is another example of medical information, in the memory 110 .

在本示例中,应用2111可基于来自期望确认患者的医学信息的用户的请求,请求处理器120提供医学信息以显示包括医学信息的医学UI 2131。In this example, the application 2111 may request the processor 120 to provide medical information to display the medical UI 2131 including the medical information based on a request from a user who desires to confirm the medical information of a patient.

处理器120可对医学信息进行加密并向应用提供加密的医学信息。在从应用接收到对于与加密的医学信息有关的功能的执行请求时,处理器120可对加密的医学信息进行解密并通过显示器130显示基于解密的医学信息产生的医学UI 2131。The processor 120 may encrypt the medical information and provide the encrypted medical information to the application. Upon receiving an execution request for a function related to encrypted medical information from an application, the processor 120 may decrypt the encrypted medical information and display a medical UI 2131 generated based on the decrypted medical information through the display 130 .

例如,如果应用2111请求隐私保护模块122提供医学信息以产生医学UI,则隐私保护模块122可从存储器110获得关于医学信息的原始数据2121。For example, if the application 2111 requests the privacy protection module 122 to provide medical information to generate a medical UI, the privacy protection module 122 may obtain raw data 2121 about the medical information from the memory 110 .

例如,关于医学信息的原始数据2121可以是例如捕捉对象的内部的医学图像。For example, the raw data 2121 regarding medical information may be, for example, a medical image capturing the inside of a subject.

隐私保护模块122可对关于医学信息的原始数据2121进行加密并将其转换为关于医学信息的受保护数据2122。The privacy protection module 122 may encrypt and convert raw data 2121 on medical information into protected data 2122 on medical information.

隐私保护模块122可向应用2111提供关于医学信息的受保护数据2122。因此,即使应用2111在没有经过用户同意的情况下向服务器840发送医学信息,隐私信息也可被保护,这是因为由应用2111发送的医学信息是受保护数据的形式的加密的医学信息2122。The privacy protection module 122 may provide the application 2111 with protected data 2122 regarding medical information. Therefore, even if the application 2111 transmits medical information to the server 840 without the user's consent, private information can be protected because the medical information transmitted by the application 2111 is encrypted medical information 2122 in the form of protected data.

应用2111可使用关于医学信息的受保护数据2122请求执行显示医学UI 2131的功能。这样,如果应用向隐私保护模块122发送关于医学信息的受保护数据2122,则隐私保护模块122可对关于医学信息的受保护数据2122进行解密并将其转换为关于医学信息的原始数据2121。显示器130可产生包括原始数据2121的医学UI 2131并显示产生的医学UI 2131。The application 2111 may request execution of a function of displaying the medical UI 2131 using the protected data 2122 on medical information. In this way, if the application sends the protected data 2122 on medical information to the privacy protection module 122, the privacy protection module 122 may decrypt and convert the protected data 2122 on medical information into raw data 2121 on medical information. The display 130 may generate the medical UI 2131 including the raw data 2121 and display the generated medical UI 2131 .

在本示例中,应用2111仅获得关于医学信息的受保护数据2122,并因此,关于用于显示医学UI 2131的医学信息的原始数据2121仅在显示器130中被使用。因此,应用2111无法获得关于医学信息的原始数据2121,并因此,医学信息可被保护。In this example, the application 2111 obtains only the protected data 2122 on the medical information, and thus, the raw data 2121 on the medical information for displaying the medical UI 2131 is only used in the display 130 . Therefore, the application 2111 cannot obtain the raw data 2121 on the medical information, and thus, the medical information can be protected.

同时,关于根据示例实施例的存储介质,在存储介质中存储用于执行使用个人信息执行功能的至少一个应用的程序,所述程序执行以下操作:基于与预存储的个人信息有关的信息针对每个应用被设置的信息确定是否保护个人信息,当应用请求个人信息时,基于确定结果对个人信息进行加密并向应用提供加密的个人信息,并且当从应用接收到对于与加密的个人信息有关的功能的执行请求时,对加密的个人信息进行解密并执行所述功能。Meanwhile, regarding the storage medium according to the exemplary embodiment, a program for executing at least one application that performs a function using personal information is stored in the storage medium, the program performs an operation of: The information set by each application determines whether to protect personal information, when the application requests personal information, encrypts the personal information based on the determination result and provides the encrypted personal information to the application, and when a request for the encrypted personal information is received from the application When a function is requested, the encrypted personal information is decrypted and the function is executed.

同时,可提供存储了用于执行根据示例实施例的控制方法的程序的非暂时性计算机可读介质。Meanwhile, a non-transitory computer readable medium storing a program for executing the control method according to example embodiments may be provided.

例如,可提供存储了执行以下操作的程序的非暂时性计算机可读介质:当应用请求个人信息时,基于与预存储的个人信息有关的信息针对每个应用被设置的信息来执行确定是否保护个人信息的程序、基于确定结果对个人信息进行加密并向应用提供加密的个人信息,当从应用接收到关于与加密的个人信息有关的功能的执行请求时,对加密的个人信息进行解密并执行所述功能。For example, there may be provided a non-transitory computer-readable medium storing a program that, when an application requests personal information, performs determination whether to protect the information set for each application based on information about pre-stored personal information. A program for personal information, encrypting personal information based on the determination result and providing the encrypted personal information to the application, when receiving an execution request for a function related to the encrypted personal information from the application, decrypting the encrypted personal information and executing said function.

非暂时性可记录介质是指可半永久地存储数据的介质。例如,可在非暂时性可记录介质(诸如,CD、DVD、硬盘、蓝光盘、USB、记忆卡、ROM等)中存储并提供上述的各种示例实施例和程序。A non-transitory recordable medium refers to a medium that can store data semi-permanently. For example, the various exemplary embodiments and programs described above can be stored and provided in a non-transitory recordable medium such as CD, DVD, hard disk, Blu-ray disc, USB, memory card, ROM, and the like.

尽管在上述的关于电子设备的框图中没有示出总线,但是可通过总线执行在电子设备的每个元件之间的通信。此外,每个装置还可包括执行上述各种步骤的处理器(诸如CPU、微处理器等)。Although the bus is not shown in the above-mentioned block diagrams regarding the electronic device, communication between each element of the electronic device may be performed through the bus. In addition, each device may further include a processor (such as a CPU, a microprocessor, etc.) that performs the various steps described above.

上述示例实施例和优点仅是示例并不将被解释为限制本公开。本教导可被容易地应用于其他各类型的设备。此外,对本公开的示例实施例的描述旨在说明,并不限制权利要求的范围,并且许多替换、修改和变化对本领域的技术人员是显而易见的。The above-described example embodiments and advantages are examples only and are not to be construed as limiting the present disclosure. The present teachings can be readily applied to other types of devices. Furthermore, the description of the example embodiments of the present disclosure is intended to be illustrative, not to limit the scope of the claims, and many alternatives, modifications, and variations will be apparent to those skilled in the art.

Claims (15)

1.一种被配置为执行使用个人信息执行功能的至少一个应用的电子设备,所述设备包括:1. An electronic device configured to execute at least one application that performs a function using personal information, the device comprising: 存储器,被配置为存储个人信息,并且与个人信息的保护有关的信息针对每个应用被设置;a memory configured to store personal information, and information related to protection of personal information is set for each application; 处理器,被配置为响应于从应用接收到对于个人信息的请求,基于设置的信息确定是否保护个人信息,基于确定结果对个人信息进行加密并向应用提供加密的个人信息,响应于从应用接收到对于与加密的个人信息有关的功能的执行请求,对加密的个人信息进行解密并执行所述功能。A processor configured to, in response to receiving a request for personal information from the application, determine whether to protect the personal information based on the set information, encrypt the personal information based on the determination result and provide the encrypted personal information to the application, in response to receiving from the application To an execution request for a function related to the encrypted personal information, the encrypted personal information is decrypted and the function is executed. 2.如权利要求1所述的电子设备,其中,处理器被配置为确定来自应用的请求是对于个人信息的请求还是执行所述功能的请求。2. The electronic device of claim 1, wherein the processor is configured to determine whether the request from the application is a request for personal information or a request to perform the function. 3.如权利要求1所述的电子设备,其中,处理器被配置为当应用请求个人信息时,基于与个人信息的保护有关的信息来确定是否保护个人信息,或者当由应用请求的个人信息是预设的个人信息时,基于与个人信息的保护有关的信息来确定是否保护个人信息。3. The electronic device according to claim 1, wherein the processor is configured to determine whether to protect the personal information based on information related to the protection of the personal information when the application requests the personal information, or when the personal information requested by the application When it is preset personal information, it is determined whether to protect the personal information based on the information related to the protection of the personal information. 4.如权利要求1所述的电子设备,其中,与个人信息的保护有关的信息包括关于不需要保护个人信息的应用的信息和关于不需要保护的个人信息的类型的信息。4. The electronic device of claim 1, wherein the information related to protection of the personal information includes information on applications that do not require protection of the personal information and information on types of the personal information that do not require protection. 5.如权利要求4所述的电子设备,其中,处理器被配置为基于关于不需要保护个人信息的应用的信息和关于不需要保护的个人信息的类型的信息来确定不保护由应用请求的个人信息,不对个人信息进行加密并向应用提供个人信息。5. The electronic device according to claim 4, wherein the processor is configured to determine not to protect the personal information requested by the application based on the information on the application that does not need to protect the personal information and the information on the type of the personal information that does not need to be protected. Personal information, do not encrypt personal information and provide personal information to the application. 6.如权利要求1所述的电子设备,还包括:6. The electronic device of claim 1, further comprising: 显示器,monitor, 其中,处理器被配置为在显示器上显示所述功能的执行结果。Wherein, the processor is configured to display the execution result of the function on the display. 7.如权利要求6所述的电子设备,其中,个人信息包括关于电子设备的位置的信息、联系人信息、关于照片文件的信息和关于消息的信息中的一个或更多个。7. The electronic device of claim 6, wherein the personal information includes one or more of information on a location of the electronic device, contact information, information on photo files, and information on messages. 8.如权利要求7所述的电子设备,其中,响应于从应用接收到对于联系人信息的请求,处理器被配置为对联系人信息进行加密并向应用提供加密的联系人信息,响应于从应用接收到对于与加密的联系人信息有关的功能的执行请求,处理器还被配置为对加密的联系人信息进行解密并在显示器上显示基于解密的联系人信息产生的联系人UI。8. The electronic device of claim 7 , wherein, in response to receiving a request for contact information from an application, the processor is configured to encrypt the contact information and provide the encrypted contact information to the application, in response to Receiving an execution request for a function related to the encrypted contact information from the application, the processor is further configured to decrypt the encrypted contact information and display a contact UI generated based on the decrypted contact information on the display. 9.如权利要求7所述的电子设备,其中,响应于从应用接收到对于基于加密的联系人信息的呼叫功能的执行请求,处理器被配置为对加密的联系人信息进行解密并执行呼叫功能。9. The electronic device of claim 7, wherein, in response to receiving from the application a request to perform a call function based on the encrypted contact information, the processor is configured to decrypt the encrypted contact information and perform the call Function. 10.如权利要求7所述的电子设备,其中,响应于从应用接收到对于位置信息的请求,处理器被配置为对位置信息进行加密并向应用提供加密的位置信息,响应于从应用接收到对于与加密的位置信息有关的功能的执行请求,处理器还被配置为对加密的位置信息进行解密并在显示器上显示基于解密的位置信息产生的地图屏幕。10. The electronic device of claim 7, wherein, in response to receiving a request for location information from an application, the processor is configured to encrypt the location information and provide the encrypted location information to the application, and in response to receiving a request from the application In response to an execution request for a function related to the encrypted location information, the processor is further configured to decrypt the encrypted location information and display a map screen generated based on the decrypted location information on the display. 11.一种控制执行使用个人信息执行功能的至少一个应用的电子设备的方法,所述方法包括:11. A method of controlling an electronic device executing at least one application that performs a function using personal information, the method comprising: 响应于从应用接收到对于个人信息的请求,基于预存储的信息确定是否保护个人信息,其中,与个人信息的保护有关的信息针对每个应用被设置;In response to receiving a request for personal information from an application, determining whether to protect the personal information based on pre-stored information, wherein information related to the protection of the personal information is set for each application; 基于确定结果对个人信息进行加密并向应用提供加密的个人信息,并且响应于从应用接收到对于与加密的个人信息有关的功能的执行请求,对加密的个人信息进行解密并执行所述功能。The personal information is encrypted based on the determination result and the encrypted personal information is provided to the application, and in response to receiving an execution request for a function related to the encrypted personal information from the application, the encrypted personal information is decrypted and the function is executed. 12.如权利要求11所述的方法,还包括:12. The method of claim 11, further comprising: 确定来自应用的请求是对于个人信息的请求还是执行所述功能的请求。It is determined whether the request from the application is a request for personal information or a request to perform the function. 13.如权利要求11所述的方法,其中,确定步骤包括:当应用请求个人信息时,基于与个人信息的保护有关的信息来确定是否保护个人信息,或当由应用请求的个人信息是预设的个人信息时,基于与个人信息的保护有关的信息来确定是否保护个人信息。13. The method according to claim 11, wherein the determining step comprises: when the application requests the personal information, determining whether to protect the personal information based on information related to the protection of the personal information, or when the personal information requested by the application is a predetermined When storing personal information, determine whether to protect personal information based on information related to the protection of personal information. 14.如权利要求11所述的方法,其中,与个人信息的保护有关的信息包括关于不需要保护个人信息的应用的信息和关于不需要保护的个人信息的类型的信息。14. The method of claim 11, wherein the information related to the protection of the personal information includes information on applications that do not require protection of the personal information and information on types of the personal information that do not require protection. 15.如权利要求14所述的方法,其中,提供步骤包括:基于关于不需要保护个人信息的应用的信息和关于不需要保护的个人信息的类型的信息来确定不保护由应用请求的个人信息,不对个人信息进行加密,并向应用提供个人信息。15. The method according to claim 14, wherein the providing step comprises: determining not to protect the personal information requested by the application based on information on the application not requiring protection of the personal information and information on the type of the personal information not requiring protection , does not encrypt personal information, and provides personal information to the app.
CN201610911018.6A 2016-10-19 2016-10-19 Electronic equipment and control method thereof Withdrawn CN106599712A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610911018.6A CN106599712A (en) 2016-10-19 2016-10-19 Electronic equipment and control method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610911018.6A CN106599712A (en) 2016-10-19 2016-10-19 Electronic equipment and control method thereof

Publications (1)

Publication Number Publication Date
CN106599712A true CN106599712A (en) 2017-04-26

Family

ID=58555656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610911018.6A Withdrawn CN106599712A (en) 2016-10-19 2016-10-19 Electronic equipment and control method thereof

Country Status (1)

Country Link
CN (1) CN106599712A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111567076A (en) * 2018-01-12 2020-08-21 三星电子株式会社 User terminal device, electronic device, system including the same, and control method
CN113220690A (en) * 2021-05-26 2021-08-06 青岛海尔科技有限公司 Target data storage method and device, storage medium and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130205404A1 (en) * 2009-02-02 2013-08-08 Yahoo! Inc. Protecting privacy of shared personal information
US20140101443A1 (en) * 2012-10-05 2014-04-10 Samsung Electronics Co., Ltd. Method and apparatus for selectively providing protection of screen information data
CN105719120A (en) * 2016-04-25 2016-06-29 成都蓉科联创科技有限责任公司 Method for encrypting privacy information on express waybills

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130205404A1 (en) * 2009-02-02 2013-08-08 Yahoo! Inc. Protecting privacy of shared personal information
US20140101443A1 (en) * 2012-10-05 2014-04-10 Samsung Electronics Co., Ltd. Method and apparatus for selectively providing protection of screen information data
CN105719120A (en) * 2016-04-25 2016-06-29 成都蓉科联创科技有限责任公司 Method for encrypting privacy information on express waybills

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111567076A (en) * 2018-01-12 2020-08-21 三星电子株式会社 User terminal device, electronic device, system including the same, and control method
CN111567076B (en) * 2018-01-12 2024-05-10 三星电子株式会社 User terminal device, electronic device, system including the same, and control method
CN113220690A (en) * 2021-05-26 2021-08-06 青岛海尔科技有限公司 Target data storage method and device, storage medium and electronic device

Similar Documents

Publication Publication Date Title
US10572674B2 (en) Terminal device and method for protecting information thereof
US10275581B2 (en) Method and apparatus for sharing content between electronic devices
CN107533419B (en) Terminal device and method for protecting information of terminal device
CN109074440B (en) Configuration for multi-factor event authorization
US20160087959A1 (en) Electronic device and method for processing data in electronic device
CN105278903B (en) Show equipment and its control method and server
US20150317979A1 (en) Method for displaying message and electronic device
KR102110257B1 (en) Electronic device controlling external device using dial and method thereof
US9851930B2 (en) Release codes with print job identifiers and directives
EP3298535B1 (en) Electronic apparatus and controlling method thereof
CN107111465A (en) Method for enabling communication between a user equipment browser and a local device
KR102144509B1 (en) Proximity communication method and apparatus
JP2013171420A (en) Management system, image forming apparatus, control method for image forming apparatus, and program
US20140355051A1 (en) Apparatus management system, electronic apparatus, apparatus management method, and computer readable recording medium storing an apparatus management program
US9628640B2 (en) Method for initial setup of image forming apparatus using near field communication and image forming apparatus for performing the same
KR20170070649A (en) Image forming apparuatus, cloud server, image forming system, and method for setting of connection with image forming apparatus
CN106599712A (en) Electronic equipment and control method thereof
JP2012248083A (en) Selection program, image processing device and computer
US11609722B2 (en) Storage medium and transmission device for transmitting a file determined to be in a correct file format
US20240126860A1 (en) One time link-based user authentication in image forming devices
KR102036075B1 (en) Method for transferring information on buisiness cards and user terminal thereof
CN108475367A (en) Method and apparatus for the instruction for showing the means of payment
WO2020214337A1 (en) Reducing avoidable transmissions of electronic message content
KR102372180B1 (en) Apparatas and method for offering safety of uniform resource locator in an electronic device
EP3939216B1 (en) Reducing avoidable transmissions of electronic message content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170426

WW01 Invention patent application withdrawn after publication