CN115203737A - Method for displaying data and electronic equipment - Google Patents
Method for displaying data and electronic equipment Download PDFInfo
- Publication number
- CN115203737A CN115203737A CN202210744946.3A CN202210744946A CN115203737A CN 115203737 A CN115203737 A CN 115203737A CN 202210744946 A CN202210744946 A CN 202210744946A CN 115203737 A CN115203737 A CN 115203737A
- Authority
- CN
- China
- Prior art keywords
- privacy
- data
- target
- privacy data
- private
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
本申请提供了一种显示数据的方法、电子设备,其中所述方法包括:获取目标参数,所述目标参数表征电子设备所处的使用场景;所述电子设备包括隐私文件,所述隐私文件包括至少两个隐私数据;基于目标参数,从所述至少两个隐私数据中确定出目标隐私数据;显示所述目标隐私数据。
The present application provides a method for displaying data and an electronic device, wherein the method includes: acquiring target parameters, where the target parameters represent a usage scenario in which the electronic device is located; the electronic device includes a privacy file, and the privacy file includes at least two privacy data; determining target privacy data from the at least two privacy data based on the target parameter; displaying the target privacy data.
Description
Technical Field
The present application relates to the field of display technologies, and in particular, to a method for displaying data and an electronic device.
Background
In practical applications, important documents, such as identity cards, social security cards, photos containing personal information, etc., are usually saved in a privacy space to secure the private documents. When in use, the important files can be used by a user who needs to input authentication information such as fingerprints and passwords. In the related art, the display of these privacy files is performed for the entire contents of the files, and thus, the privacy of the user cannot be effectively protected.
Disclosure of Invention
The present application provides a method of displaying data and an electronic device to solve at least the above technical problems in the related art.
The technical scheme of the embodiment of the application is realized as follows:
the embodiment of the application provides a method for displaying data, which comprises the following steps:
acquiring target parameters, wherein the target parameters represent a use scene where electronic equipment is located; the electronic device comprises a privacy file, the privacy file comprising at least two privacy data;
determining target privacy data from the at least two privacy data based on the target parameters;
and displaying the target privacy data.
In the foregoing scheme, the target privacy data is privacy data matched with the target parameter in all privacy data of the privacy file.
In the foregoing solution, the target privacy data is obtained by encrypting privacy data matched with the target parameter in all privacy data of a privacy file;
wherein the displaying the target privacy data comprises:
decrypting the target privacy data;
and displaying the decrypted data.
In the foregoing solution, each of the remaining privacy data of the at least two privacy data except the privacy data matched with the target parameter is encrypted.
In the foregoing solution, each of the private data matching the target parameter and the other private data is encrypted by using a respective encryption key.
In the foregoing solution, decrypting the target privacy data includes:
acquiring a target decryption key based on the encryption key of the private data matched with the target parameter;
and decrypting the target privacy data based on the target decryption key.
In the foregoing solution, the decrypting the target privacy data includes:
and decrypting the target privacy data based on the acquired physiological characteristic information of the preset user and/or the input character information.
In the foregoing solution, the privacy file is an image containing privacy data, and the target privacy data is a part of the entire content of the image.
An embodiment of the present application provides an electronic device, including:
the device comprises an acquisition unit, a processing unit and a display unit, wherein the acquisition unit is used for acquiring target parameters, and the target parameters represent the use scene of the electronic equipment; the electronic device comprises a privacy file, the privacy file comprising at least two privacy data;
a determining unit, configured to determine target privacy data from the at least two privacy data based on a target parameter;
and the display unit is used for displaying the target privacy data.
An embodiment of the present application provides an electronic device, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the aforementioned method of displaying data.
The application discloses a method for displaying data and an electronic device, wherein the method comprises the following steps: acquiring target parameters, wherein the target parameters represent a use scene where electronic equipment is located; the electronic device comprises a privacy file, the privacy file comprising at least two privacy data; determining target privacy data from the at least two privacy data based on the target parameters; and displaying the target privacy data. A technical support is provided for displaying the privacy data required under the use scene according to the use scene by the privacy file.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present application, nor do they limit the scope of the present application. Other features of the present application will become apparent from the following description.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present application will become readily apparent from the following detailed description, which proceeds with reference to the accompanying drawings. Several embodiments of the present application are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
in the drawings, like or corresponding reference characters designate like or corresponding parts.
FIG. 1 is a first schematic flow chart illustrating an implementation of a method for displaying data in an embodiment of the present application;
FIG. 2 is a schematic diagram illustrating a second implementation flow of the method for displaying data in the embodiment of the present application;
FIG. 3 is a block diagram illustrating an implementation of a method of displaying data in an embodiment of the present application;
FIG. 4 is a diagram illustrating the effect of saving a privacy file in an embodiment of the present application;
FIG. 5 is a schematic diagram illustrating a usage scenario in which an electronic device is located in an embodiment of the present application;
FIG. 6 is a schematic diagram illustrating a display of a portion of private data in a private file in an embodiment of the present application;
FIG. 7 is a diagram illustrating default and private elements in a privacy document in an embodiment of the application;
FIG. 8 is a first schematic diagram illustrating a composition structure of an electronic device in an embodiment of the present application;
fig. 9 shows a schematic structural diagram ii of the electronic device in the embodiment of the present application.
Detailed Description
In order to make the objects, features and advantages of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described in further detail with reference to the accompanying drawings, the described embodiments should not be considered as limiting the present application, and all other embodiments obtained by a person of ordinary skill in the art without making creative efforts fall within the protection scope of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
In the following description, references to the terms "first," "second," and the like, are intended only to distinguish similar objects and not to imply a particular order to the objects, it being understood that "first," "second," and the like may be interchanged under appropriate circumstances or a sequential order, such that the embodiments of the application described herein may be practiced in other than those illustrated or described herein.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the application.
It should be understood that, in the various embodiments of the present application, the size of the serial number of each implementation process does not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
The privacy document in the embodiment of the present application has a narrow definition and a broad definition. Wherein, the definition in the narrow sense: the privacy file comprises any reasonable certificate, file and the like which need privacy protection in practical application. Such as identification cards, social security cards, driver's licenses, passes, passports, and the like. Also for example, contracts, agreements, etc. written with confidential information. The broad definition is: the privacy file includes contents such as an image, a file, a video, and the like having any privacy information in addition to the aforementioned certificate, a file, and the like.
Compared with the scheme that the privacy file display in the related technology cannot guarantee the privacy of the user, the technical scheme of the embodiment of the application realizes the display of the target privacy data in the privacy file based on the target parameters, and provides a technical support for displaying the privacy data required in the use scene according to the use scene. The method and the device have the advantages that the privacy data in the privacy file are reasonably displayed according to the use scene of the electronic equipment, so that the privacy of the unnecessary privacy data in the use scene can be ensured, and the protection safety of the privacy data is improved.
The processing logic of the method for displaying data of the embodiments of the present application may be deployed in any reasonable electronic device. The electronic device may be a terminal or a server. The terminal includes, but is not limited to, a tablet computer, an all-in-one machine, a desktop computer, a mobile phone, a smart sound box, a smart watch, and the like. The server includes a general server, a cloud server, and the like.
As shown in fig. 1, an implementation flow of a method for displaying data according to an embodiment of the present application includes:
s101: acquiring target parameters, wherein the target parameters represent a use scene where the electronic equipment is located; the electronic device comprises a privacy file, the privacy file comprising at least two privacy data;
in this step, the private data may be data related to user personal information, company or unit personal information. The user personal information includes, but is not limited to, user name, gender, address, identification number, passport number, user photograph, etc. Company or unit personal information includes, but is not limited to, a corporate name, a shareholder name, a registered location, registered funds, etc.
The privacy file can be a file which embodies the privacy data in a text form, and can also be a file which embodies the privacy data in an image form, namely the privacy file is taken as an image. Typically, two or more private data are included in one private file.
In practical applications, privacy documents such as identification cards and medical insurance cards are generally used in different usage scenarios. For example, the identity card can be used in the use scenes of banks, real estate transaction halls, nucleic acid sampling places and the like. Medical insurance cards are used in hospitals, insurance companies, and other use scenarios.
S102: determining target privacy data from the at least two privacy data based on the target parameters;
in this step, the target privacy data is the privacy data that needs to be displayed in the use scene represented by the target parameter. Which may be one, or two or more than two privacy data matching the target parameter among all privacy data of the privacy file. And the privacy data matched with the target parameters are the privacy data which need to be displayed in the use scene characterized by the target parameters.
For example, if the target parameter characterizes the current usage scenario of the electronic device in the bank, the target privacy data matched with the target parameter may be a user name, an identification card number, and the like on the identification card. When displaying, the user name and the ID card number on the ID card can be displayed.
If the target parameter indicates that the current electronic device is in a usage scenario of a hospital, the target privacy data matched with the target parameter may be a patient name, a medical insurance card number, and the like on the medical insurance card. When displaying, the name of the patient and the number of the medical insurance card can be displayed.
The first correspondence may be a correspondence between the target parameter in different usage scenarios and the private data in the private file used in the usage scenario. When the target privacy data is used, the privacy data corresponding to the target parameters are read from the first corresponding relation and are used as the target privacy data under the target parameters.
It is understood that if the usage scenarios are different, the target privacy data determined based on the target parameters may be different. Therefore, the private data required to be displayed in each use scene can be displayed according to different use scenes.
S103: and displaying the target privacy data.
In this step, any reasonable manner may be employed to display the target private data. For example, taking a privacy file as an identity card as an example, the target privacy data is displayed in the form of the identity card. This can be understood as follows: the identity card is displayed, information on the identity card as target privacy data such as a user name and an identity card number can be displayed, and information which is not used as the target privacy data is not displayed or is displayed in a mosaic form. For example, the target privacy data to be displayed is displayed on the display screen according to a certain arrangement format, such as a format in which the user name is in front of the user and the identity card number is behind the user name. Or, the private data is displayed according to a random arrangement format, as long as the private data required to be displayed in the use scene is displayed.
In S101 to S103, for the privacy file, based on the target parameter representing the usage scenario in which the electronic device is located, the privacy data (target privacy data) that needs to be displayed in the usage scenario among all the privacy data of the privacy file is determined, and the privacy data that needs to be displayed in the usage scenario is displayed. A technical support is provided for displaying the privacy data required under the use scene according to the use scene by the privacy file. The method and the device have the advantages that the privacy data in the privacy file are reasonably displayed according to the use scene of the electronic equipment, so that the privacy of the unnecessary privacy data in the use scene can be ensured, and the protection safety of the privacy data is improved.
It should be noted that, for the same privacy file, the privacy data that needs to be displayed may be different in different usage scenarios. For this case, a correspondence relationship between the target parameter in different usage scenarios and the private data used in the usage scenario for the same privacy file may be set in advance as the first correspondence relationship. When the target privacy data is used, the privacy data corresponding to the acquired target parameters are read from the first corresponding relation and are used as the target privacy data under the target parameters. Therefore, in the embodiment of the application, the same privacy file can display different privacy data according to different use scenes.
When the privacy file is stored, the privacy data can be stored in a plaintext form. That is, the privacy data is plaintext data, i.e., data that is not encrypted, in the privacy file. The target privacy data determined based on the target parameters in the embodiment of the application may be one or more privacy data in the privacy file, or may also be plaintext data. The target privacy data as in S101 to S103 is plaintext data. And directly displaying the target privacy data under the condition that the target privacy data are determined based on the target parameters.
In addition, the target privacy data determined based on the target parameters may also be ciphertext data in consideration of (preservation) security and privacy of the data. That is, the target privacy data may be data obtained by encrypting privacy data that matches the target parameter among all privacy data of the privacy file (as shown in S1021 in fig. 2).
In this case, the private data used in each usage scenario needs to be encrypted, and then the corresponding relationship between the target parameter in different usage scenarios and the encrypted private data used in the usage scenario needs to be recorded as the second corresponding relationship. When the target parameter is used, the encrypted privacy data corresponding to the target parameter is read from the second corresponding relation and is used as the target privacy data under the target parameter.
Based on this, as shown in fig. 2, S103 includes:
s1031: decrypting the target privacy data;
s1032: and displaying the decrypted data.
In S101, S1021, S1031, and S1032, in order to improve the security of protecting the private data, the private data needs to be encrypted, and secure storage is realized. In order to realize normal display of the private data, the target private data is decrypted and then displayed in the case where the encrypted private data (target private data) is determined based on the target parameter. Therefore, the protection safety of the private data is improved, and the private data can be normally displayed. The normal display of private data herein may include at least one of the following two meanings: the private data is successfully displayed; the encrypted private data is displayed in the form of original data (private data itself, unencrypted), that is, the encrypted private data is restored.
It can be understood that the privacy data are encrypted in the embodiment of the application, so that the privacy data are safely stored in the electronic equipment, and the privacy files are normally used, so that the problem of privacy data leakage caused by malicious cracking of illegal persons can be effectively avoided.
In the above scheme, the decryption of the target privacy data may be implemented by one of the following implementation manners:
the implementation mode is as follows: and decrypting the target privacy data based on the collected physiological characteristic information of the preset user and/or the input character information.
In one implementation, the predetermined user may be a legitimate user of the electronic device, such as the owner. The character information may be the number, character, underline, asterisk, etc. character information input by the user. The physiological characteristic information includes, but is not limited to, the following: at least one of a fingerprint, a voiceprint, and an eye mask. And decrypting the target privacy data by using at least one of the physiological characteristic information of the fingerprint, the voiceprint and the eye mask of the owner. In this case, the physiological characteristic information of the owner may be regarded as a decryption password for decrypting the target privacy data. The physiological characteristic information is obtained by collecting fingerprints, voiceprints and eye masks based on a fingerprint identification module, a voiceprint identification module and an eye mask identification module of the electronic equipment. Here, both the inputted character information and the physiological characteristic information are used as decryption keys.
Compared with the second implementation mode, the first implementation mode is to decrypt the encrypted private data based on the character information and/or the physiological characteristic information input by the user, namely to decrypt the encrypted private data based on the participation of the user, so that the private data can be normally displayed.
The implementation mode two is as follows: acquiring a target decryption key based on the encryption key of the private data matched with the target parameter; and decrypting the target privacy data based on the target decryption key.
In implementation two, different key pairs are randomly generated. Typically, the number of key pairs generated is kept consistent with the number of private data in the privacy file. Each private data is assigned a key pair. Each key pair includes an encryption key and a decryption key. That is, each private data is assigned an encryption key and a decryption key constituting a key pair with the encryption key. Wherein the encryption key is used to encrypt the private data to which the encryption key is assigned. The decryption key is used to decrypt the encrypted private data.
Here, it can be understood that: and encrypting the private data matched with the target parameter by adopting an encryption key distributed to the private data matched with the target parameter. And taking a decryption key forming a key pair with the encryption key as a target decryption key, and decrypting the private data encrypted by the encryption key by using the target decryption key. In general, for a certain private data and a key pair allocated to the private data, the private data is encrypted by using an encryption key of the key pair, and the encrypted private data is decrypted by using a decryption key of the key pair.
The security protection of the private data can be improved by utilizing the encryption key for encryption, and unnecessary disclosure of the private data is effectively avoided. The decryption based on the decryption key realizes normal display of private data to be displayed in different use scenes, and improves user experience.
It is to be understood that, in the same usage scenario, the private data that matches the target parameter in all the private data of the private file may be encrypted data, and the other private data except the private data that matches the target parameter in all the private data may be plaintext data, that is, data that is not encrypted. The remaining privacy data of all privacy data of the privacy file except the privacy data matching the target parameter may also be encrypted.
For example, in a use scenario of a bank, for the privacy file of the identity card, assuming that the privacy data matched with the target parameter is a user name, an identity card number, and a user photo, the user name, the identity card number, the user photo, and the like on the identity card may all be encrypted, and the rest of the privacy data on the identity card, such as the gender, the birth date, the home address, and the like, may not be encrypted, may be used as plaintext data, and may also be encrypted. The scheme that all the privacy data on the identity card are encrypted can improve the protection safety of the privacy data on one hand, and on the other hand, the scheme can be adapted to the use scene that the privacy data such as sex, birth date and home address need to be displayed as the privacy data, so that the practicability is higher, and the scheme is easy to popularize in engineering.
According to the scheme that the private data matched with the target parameters in the private file and other private data except the private data matched with the target parameters need to be encrypted, the private data matched with the target parameters can be encrypted by adopting a certain encryption algorithm, and other private data can also be encrypted by adopting a certain encryption algorithm. The encryption algorithm used by the private data matched with the target parameter may be the same as or different from the encryption algorithm used by each of the other private data.
Encryption algorithms include, but are not limited to, the following: a Hash algorithm, a symmetric cryptosystem encryption (DES) algorithm, an RSA encryption algorithm, an Advanced Encryption Standard (AES) algorithm, etc.
The number of the private data matched with the target parameter may be two or more. The number of the remaining private data other than the private data matching the target parameter among all the private data of the private file may be two or more. The private data matched with the target parameter and/or the rest private data can be encrypted by the same encryption algorithm or different encryption algorithms.
According to the embodiment of the application, the security protection of the private data is realized by encrypting the private data, and malicious tampering is effectively avoided.
As an alternative, each of the private data matching the target parameter and the remaining private data is encrypted using a respective encryption key. That is, all the private data of the private file are encrypted with the respective encryption keys. And each private data in the private file is encrypted by adopting different encryption keys, so that the safety protection of the private data can be improved, and the malicious decryption of the private data is avoided.
The encryption key may be a different key randomly generated for each piece of private data, or an encryption key used to encrypt each piece of private data in a different key pair randomly generated for each piece of private data.
In the case where the encryption key randomly generates, for each piece of private data, an encryption key in a different key pair used to encrypt each piece of private data, decryption of the piece of private data that matches the target parameter may be performed using a decryption key in the key pair assigned to the piece of private data to decrypt the encrypted piece of private data.
In the case that the encryption key is a different key randomly generated for each private data, decryption of the private data matching the target parameter may be implemented based on the physiological characteristic information of the owner.
In the case where the remaining pieces of privacy data are encrypted, the remaining pieces of privacy data may not be displayed, or may be displayed in the form of a mosaic, or may be displayed as encrypted data, when displaying the decrypted privacy data matching the target parameter. So as to realize normal display of private data required under different use scenes.
As an alternative, the privacy document may be an image comprising privacy data, such as an image obtained by photographing or scanning an identification card or a health care card. Or, the image with the private data is shot in daily life. The image comprises two or two private data, such as user name, gender, identification card number, birth date, user photo, home address and the like on the identification card. Such as daily images containing the own license plate number, including daily images of landmarks near the own address. If the above privacy data is all the contents of the image, the target privacy data that needs to be displayed is a part of all the contents in the privacy image. In the case of regarding the aforementioned image as a private image, the present solution may implement display of part of the private content in the private image according to the usage scenario of the electronic device. A technical support is provided for displaying the private content required in the use scene according to the use scene by the private image.
In the embodiment of the application, the position and/or time of the electronic equipment can be acquired, and the target parameter is determined based on the position and/or time of the electronic equipment. The position of the electronic device can be known through a positioning module of the electronic device, such as a Global Positioning System (GPS). And if the GPS displays that the position where the electronic equipment is located at present is a bank, generating target parameters representing the use scene of the bank. And if the GPS displays that the current position of the electronic equipment is the hospital, generating target parameters representing the use scene of the hospital. The electronic device can know the time of the electronic device based on time synchronization with the network side, and the electronic device finds that the user usually does nucleic acid sampling at 7-8 points of tuesday through statistics of behavior tracks and/or behavior habits of the user for a period of time. If the electronic equipment knows that the current time is 7-8 points on Tuesday, the target parameters which characterize the use scene of the nucleic acid sampling points are generated. Therefore, the target parameters are accurately acquired, and the target privacy data are accurately determined and displayed based on the accurately acquired target parameters.
In practical applications, a plurality of private files such as identity cards, social security cards, driving licenses and the like exist. The privacy files needed to be used are different under different use scenes. Privacy files required to be used in different use scenes need to be preset. For example, in the use scene of a bank or a nucleic acid sampling point, the identity card is set as a privacy file in the use scene. For example, in a use scene of a hospital, the medical insurance card is set as a privacy file in the use scene.
The technical solution of the present application is further described below with reference to fig. 3 to 6.
The privacy file saving process in the technical scheme of the application is explained first.
Taking the privacy document as the identity card as an example, the privacy image of the identity card is obtained by means of photographing or scanning. Generally, the identity card includes several basic elements such as name, gender, ethnicity, birth date, address, photo, and identification card number. Each basic element is treated as a private data.
The electronic device randomly generates N different key pairs. N is a positive integer larger than 1, and the value of N is that the number of basic elements on the identity card is the same. Each key pair is assigned to a respective base element. As shown in fig. 3, a key pair 1 is assigned to a basic element of name, a key pair 2 is assigned to a basic element of gender, a key pair 3 is assigned to a basic element of nationality, a key pair 4 is assigned to a basic element of photograph, a key pair 5 is assigned to a basic element of identification number, and so on until all basic elements are assigned key pairs.
Each key pair includes an encryption key and a decryption key. And encrypting each basic element on the identity card by using the encryption key in each key pair. For example, the basic element name is encrypted with the encryption key in key pair 1, the basic element gender is encrypted with the encryption key in key pair 2, and so on until the last basic element is encrypted with the encryption key in key pair N.
And storing or storing each encrypted basic element in the electronic equipment. The storage or storage may be specifically that each basic element is stored in the privacy image of the identity card in an encrypted form, so that the encrypted storage of the privacy data is realized for subsequent use. In subsequent use, the same privacy image such as an identity card can display different privacy data according to different use scenes.
It is understood that the basic elements on the identification card are stored in an encrypted form in the privacy image of the identification card. Fig. 4 is a schematic diagram illustrating the preservation effect of each encrypted basic element in the privacy image. As shown in fig. 4, XXX, YYY, ZZZ, etc. in fig. 4 represent the presentation effect of encrypting each basic element on the identity card, in which form the electronic device saves the private image of the identity card.
In fig. 3, M usage scenarios of the identity card file are provided, where M is a positive integer greater than 1. For example, the identity card can be used in different use scenes such as banks, places, house property trading halls, nucleic acid sampling points and the like. Based on this, in the application scenario of fig. 5, the current location of the electronic device is displayed by the GPS as a silver behavior example, and when the current location is a bank, the electronic device generates a target parameter representing a usage scenario of the bank. The electronic equipment calls an identity card file in the privacy files to serve as the privacy file needed to be used in the use scene of the bank.
The electronic equipment reads a preset second corresponding relation, and if the second corresponding relation indicates that private data needing to be displayed on the identity card corresponding to the target parameter representing the use scene of the bank are a user name, an identity card number, a photo and other basic elements (target private data), the encrypted basic elements are decrypted by using decryption keys in key pairs distributed to the basic elements.
For example, the encrypted user name is decrypted using the decryption key in key pair 1; decrypting the encrypted photograph with the decryption key in key pair 4; the decryption key in key pair 5 decrypts the encrypted identification number.
And displaying the identity card under the condition of decrypting the basic elements needing to be displayed in the use scene of the bank. As shown in fig. 6, on the displayed id card, the decrypted basic elements such as the user's name, the id card number, and the photo are displayed in the form of plain text, and the remaining basic elements are displayed in the form of cipher text. The rest of the basic elements can also be displayed in a mosaic form, or the undecrypted basic elements are not displayed on the identity card.
When the identity card is regarded as the privacy image, and each basic element on the identity card is regarded as all the content of the privacy image, the above scheme realizes the display of part of all the content of the privacy image. Therefore, according to the technical scheme, the display of part of the privacy content in the privacy image can be realized according to the use scene of the electronic equipment.
For the private file of the identity card, if the use scene is different, if the use scene is a house property trading hall, and the name and the identity card number on the identity card file need to be used under the assumption that the use scene is the house property trading hall, the name and the identity card number are determined to be target private data, the name and the identity card number need to be decrypted and displayed, and the rest basic elements do not need to be decrypted. Therefore, the embodiment of the application provides a technical support for displaying different privacy data according to different use scenes of the privacy image.
The above decryption is performed by using the decryption key in the key pair. Besides, decryption of each basic element needing decryption can be carried out based on the acquired physiological characteristic information of the owner. That is, the physiological characteristic information of the owner can be regarded as the decryption password.
Illustratively, the decryption of each basic element needing decryption is realized under the condition that a fingerprint of the owner is acquired. That is, the fingerprint is a decryption key that decrypts all essential elements that need to be decrypted.
Or, under the condition of collecting different fingerprints of the owner, the decryption of the basic elements needing to be decrypted is realized one by one. If the index finger fingerprint is collected, the encrypted name is decrypted; and decrypting the encrypted identification card number under the condition of acquiring the middle finger fingerprint. Different fingerprints can be regarded as decryption passwords of different basic elements.
Or, two or more different decryption fingerprints of the basic elements needing to be decrypted are preset to be the same fingerprint, and the decryption fingerprints of the rest basic elements needing to be decrypted are the other fingerprints and the like.
The above case is an example in which all basic elements to be decrypted use the decryption key in the key pair to decrypt the physiological characteristic information. In addition, partial encrypted basic elements can be preset to be decrypted by adopting a decryption key, and partial encrypted basic elements are decrypted by adopting physiological characteristic information. For details, please refer to understanding.
It can be understood that, in the foregoing scheme, the security protection of the private data can be improved by using the encryption key for encryption, and unnecessary disclosure of the private data is effectively avoided. The private data which needs to be displayed under different use scenes is normally displayed based on decryption of the decryption key or the physiological characteristic information, and user experience is improved.
Generally speaking, in the application, a privacy file is divided into different elements (basic elements), then different keys (such as encryption keys) are used for encryption and storage, and when the privacy file needs to be used, only privacy data needed by a user are decrypted and displayed according to different use scenes.
The method and the device have the advantages that the risk that the whole privacy file, namely all privacy data in the privacy file, is displayed and has privacy disclosure in the related technology is different, only the privacy data needed by a user are decrypted and displayed according to different use scenes, the privacy disclosure risk can be reduced, and the privacy disclosure risk of an unreasonable user is avoided.
The scheme is that the electronic equipment automatically generates target parameters based on the position and/or time of the electronic equipment; and determining a scheme for the target privacy data based on the target parameters. In addition, it is considered that in practical use, there may be an unexpected use of privacy documents such as an identification card, a medical insurance card, and a driver's license. In view of the situation, the application also supports manual calling of the privacy files, manual selection and automatic display of privacy data expected to be displayed by users in the privacy files. The use experience of the user can be improved.
Illustratively, each basic element in the privacy files such as the identity card, the medical insurance card and the driver license is stored in the electronic equipment in an encrypted form. In a sudden usage scenario, the user manually selects and displays the privacy document, such as an identification card, that he or she desires. At this time, each basic element on the identity card displayed on the display screen of the electronic device is encrypted data, so that a user can select the required basic element on the display screen and input the specified physiological characteristic information to the electronic device. For example, the electronic device responds to the selection operation of the user, regards the selected basic elements on the display screen as private data needing to be decrypted, decrypts the basic elements needing to be decrypted under the condition that the specified fingerprint of the owner is acquired, and displays the decrypted basic elements, namely displays the restored basic elements.
Or, each time a user selects a basic element required by the user on the display screen, a fingerprint capable of decrypting the basic element is input into the electronic device, the electronic device determines privacy data required to be decrypted based on the selection operation, and decrypts and displays the basic element required to be decrypted based on the acquired fingerprint. The method realizes the one-by-one selection, one-by-one decryption and one-by-one display of the basic elements required by the method.
Of course, in the scheme of selecting one by one and decrypting one by one, the decrypted basic elements can be displayed simultaneously. E.g. the basic element and its previously decrypted basic element are displayed on the display screen simultaneously in case the last basic element is decrypted.
In the case where two or more basic elements to be decrypted are required, fingerprints of the same finger may be used between different basic elements to be decrypted, and fingerprints of different fingers may be used. It is also possible to use partial base elements with fingerprints of the same finger and partial base elements with fingerprints of different fingers. In the embodiment of the application, in addition to the fingerprint decryption, the voiceprint or the eye mask decryption can be used.
When two or more basic elements needing to be decrypted are decrypted, one of fingerprint, voiceprint and eye mask can be used for decryption, and at least two of the fingerprint, the voiceprint and the eye mask can be used for decryption in a mixed mode.
In summary, the technical scheme of the embodiment of the application can also realize decryption and normal display of the basic elements required by the user in the privacy file based on the participation of the user. Therefore, the technical scheme of the embodiment of the application has high practicability and wide application range.
The above scheme is to save each basic element in the privacy file in a ciphertext form. In practical applications, the basic elements in the privacy file can be saved in a clear text form. And reading the first corresponding relation when the target parameter is acquired, and reading the privacy data corresponding to the target parameter from the first corresponding relation as target privacy data. At this time, the target privacy data is plaintext data, and the display screen of the electronic device can directly display the target privacy data. Private data which is not needed in the use scene of the target parameter representation can be not displayed or displayed in a mosaic form. Therefore, only the private data required by the user is displayed according to the use scene, and the leakage risk of the unnecessary private data is reduced.
The technical solution of the present application will be further described below by taking fig. 7 as an example.
The privacy file is divided into basic elements (elements) as shown in fig. 7. Each basic element has two selectable labels (labels), one of which is a default label (Defaultlabel) and the other of which is a private label (privacylabel). The user may select one tab for each base element. The basic element selected as the Default tag needs to be encrypted and decrypted by using a Default key (Default key). The basic element selected as the private label needs to be encrypted and decrypted using a private key (Privacy key). Or, selected basic elements in all the basic elements are encrypted and decrypted by adopting a private key, and the rest basic elements which are not selected are encrypted and decrypted by adopting a default key by default. Each basic element can be selected according to actual use requirements. In some scenarios, all of the base elements may be selected as default tags, or all of the base elements may be selected as private tags.
For a scene that the privacy file is the identity card, in all basic elements of the identity card, the name and the identity card number can be used as elements with default labels. The remaining basic elements may be considered elements with private tags.
Secure or private spaces are opened up for the electronic device, and default and/or private keys are saved to the secure space. The default key and/or the private key may be read out of the secure space until the use decrypts the basic element as needed. The basic element with the default tag is decrypted using the default key and the basic element with the private tag is decrypted using the private key.
It can be understood that, because the security space or the private space has certain confidentiality and security, the security space is used for storing the default key and the private key, so that the security and the confidentiality of key storage can be improved, and malicious tampering of the key is avoided.
In addition, in order to enhance the access security of the secure space, an access password may be set in advance for the access of the secure space, and in the case where the access password input by the user is authenticated, the key stored in the secure space may be read. Thereby further enhancing security.
In this application scenario, the default key is derived from: and generating random numbers for each selected basic element as the default label in the secure space, and encrypting each generated random number by using an Elliptic Curve Cryptography (ECC) algorithm to obtain each default key. And correspondingly encrypting each selected basic element which is the default label by using each default key to obtain each encrypted default element (which is the basic element of the default label).
Illustratively, the basic elements of the default tag include an element 1 and an element 2, the random numbers generated for the element 1 and the element 2 are a random number 1 and a random number 2, and ECC encryption is performed on the random number 1 and the random number 2 to obtain a default key 1 and a default key 2, respectively. And encrypting the element 1 by using a default key 1, and encrypting the element 2 by using a default key 2 to obtain the data of the encrypted elements 1 and 2.
When the electronic equipment is used, if the operation of unlocking the electronic equipment, such as inputting a power-on password, is taken as an access password for entering the security space for the default element in the privacy file, the electronic equipment enters the security space under the condition that the access password input by the user is identified to be correct, and the default key 1 and the default key 2 are read from the security space. And decrypting the encrypted element 1 and the encrypted element 2 by using the default key 1 and the default key 2 respectively, and displaying the decrypted data. The Default documentation in fig. 7 is directly presented to the user, and the elements in the Default documentation, which are Default labels, are all displayed in clear text.
As can be seen from the foregoing, the default key in the application scenario is obtained from a random number automatically generated by the electronic device. The private key may be derived based on an input password collected by the electronic device. The private key is derived from: and acquiring the password input by the user, and encrypting the password input by the user by using an ECC algorithm to obtain each private key. And correspondingly encrypting each selected basic element which is the private label by using each private key to obtain each encrypted private element (the basic element which is the private label).
The password input by the user can be characters such as numbers, letters, underlines and the like, and can also be physiological characteristic information such as fingerprints, voice prints, eye masks and the like. In an implementation, in the case that the number of the private elements is two or more, each private element may be encrypted using a private key obtained based on the same user input password. Each private element may also correspond to a user-entered password, and each private element is encrypted using a private key obtained based on the user-entered password corresponding thereto. Or the partial private elements correspond to the same user input password, and are encrypted by adopting a private key obtained based on the same user input password. This is not particularly limited.
Exemplarily, the basic elements of the private tag include element 3, element 4, and element 5, the user input password corresponding to element 3 is the fingerprint of the finger 1, the user input password corresponding to element 4 is the fingerprint of the finger 2, and the user input password corresponding to element 5 is the fingerprint of the finger 3, and ECC encryption is performed on the fingerprints of the finger 1, the finger 2, and the finger 3 to obtain the private key 1, the private key 2, and the private key 3, respectively. The element 3 is encrypted by using the private key 1, the element 4 is encrypted by using the private key 2, and the element 5 is encrypted by using the private key 3, so that encrypted data of the elements 3, 4 and 5 are obtained.
When the private key is used, if the operation of unlocking the electronic equipment, such as inputting a power-on password, is taken as an access password for entering the secure space for the private elements in the private file, the private elements enter the secure space under the condition that the electronic equipment identifies that the access password input by the user is correct, and the private key 1, the private key 2 and the private key 3 are read from the secure space. And respectively decrypting the encrypted elements 3, 4 and 5 by using the private keys 1, 2 and 3, and displaying the decrypted data.
In the above scheme, the private elements to be displayed can be preset, and based on the setting, the private elements to be displayed are automatically selected and decrypted. In addition, for the private elements, the user can manually select the needed private elements in one usage scene, and decrypt the selected private elements after the manual selection.
In specific implementation, the electronic device may present, in the form of a menu, the identifier of the private element (such as "gender", "name family", and other words on the identity card) that may be manually selected by the user, and the user selects the basic element to be displayed or presented from the menu and clicks the identifier of the basic element to be displayed or presented. The electronic equipment identifies the private element which is selected by the user and needs to be displayed, acquires the access password, reads the private key capable of decrypting the or the selected private element from the secure space under the condition that the authentication of the access password is passed, decrypts by using the private key and displays the decrypted data. If the electronic device presents the Privacy documentation in FIG. 7 to the user, the Privacy documentation may contain both the default elements and the private elements selected by the user. The default elements and the private elements selected by the user are displayed in the Privacy documentation in clear text form.
The collected access password can be a collected password which is input by the user after being selected and is used for each selected private element. In case the access password passes, the private key of the selected private element is read from the secure space and decrypted and displayed.
The access password may be additionally collected by characters such as numbers and letters input by the user, or fingerprints, voice prints, eye masks and the like. And the user input password of the private key which is obtained by encrypting the private key by using an ECC algorithm in the private key derivation scheme can be used as the access password of the secure space without additional acquisition. One or more of the user input passwords of the private key routing scheme that require encryption using the ECC algorithm to obtain the private key are selected as the access password.
The number of access passwords of the secure space may be one, and after all of the selected private elements are selected, the user enters the selected access passwords. Alternatively, the access password of the secure space is multiple, for example, one access password is input after each private element is selected, or one access password is input after each two or more private elements are selected. The concrete is determined according to practical application.
In the scheme of inputting an access password after each selected private element, the access password input after each selected private element needs to be the user input password which needs to be encrypted by using an ECC algorithm to obtain the private key in the scheme of the private key derivation of each selected private element.
Illustratively, if element 3 is the private element in the private key origin scheme, its private key is obtained by encrypting the user fingerprint 1 using the ECC algorithm. If element 3 is selected by the user in manually selecting the private element to be displayed, the user needs to enter the fingerprint 1 as an access password for accessing the private key of element 3 in the secure space after selecting element 3.
That is, in a scheme in which an access password is input after each selection of a private element, the access password input after each selection of a private element may be used as a password for accessing the private key of the private element.
In the foregoing scheme, the private key of the private element desired to be displayed can be successfully accessed only if the correct access password is entered. A safety defense line is provided for the decryption of the private elements, the safe decryption of the private elements is realized, and the risk that private data is leaked can be effectively reduced.
The above input scheme for the access password is not limited to the process of manually selecting the private element to be displayed, and is also applicable to the scheme of automatically selecting the private element to be displayed and decrypting the private element.
It can be understood that, in the foregoing solution, the usage scenario in which the electronic device is located is determined by the location and/or time of the electronic device. For example, the location and/or time of the electronic device is used to distinguish the usage scenarios of the electronic device in a bank, a school, a property trading hall, a police station, etc. And then different privacy data can be displayed according to different use scenes.
In practical applications, in addition to distinguishing the usage scene of the electronic device according to the location and/or time of the electronic device, different usage scenes can be distinguished according to different objects of watching images, videos and texts. The object here mainly refers to a person. Different objects primarily refer to people in different roles. For example, adults, children, acquaintances, strangers, close-related ones of acquaintances, less-related ones of acquaintances, and the like. Since in practice there may be more than one role for each person, any reasonable role object may be within the scope of the embodiments of the present application.
According to the technical scheme, different use scenes can be distinguished according to different objects for watching images, videos and texts, the content to be displayed is determined from the privacy files according to the different objects, and the content to be displayed is displayed. Namely, the display of different contents in the privacy file is realized according to different usage scenarios. In short, different content in the privacy file may be displayed according to different objects.
In the technical scheme of the application, the privacy files can be images, videos, texts and the like. If the privacy file is a video, the video contains privacy content. The nursing content in the video conforming to the viewing object can be intercepted based on the role of the viewing object and displayed to the viewing object.
For example, for a video a containing contents such as care of a body privacy part of a child, care of a body privacy part of an adult, and care of a body privacy part of an elderly person, the electronic device may obtain whether the viewing object is a child, an adult, or an elderly person based on recognition of a face of the viewing object. And if the watching object is identified to be the child, determining the nursing content of the privacy part of the child in the video A as target privacy data, intercepting the video part of the nursing content of the privacy part of the child from the video A, and displaying the intercepted video part. If the watching object is identified to be the adult, the nursing content of the private part of the adult in the video A is determined to be target private data, a video part of the nursing content of the private part of the adult is intercepted from the video A, and the intercepted video part is displayed.
Different roles of the watching object and video content parts which belong to different roles and are watched by the watching object in the video A need to be correspondingly bound in advance, so that the content which is watched by the roles can be determined based on the roles of the watching objects, and further, the video part to be displayed is accurately intercepted from the video A.
If the privacy file is an image, the image contains privacy content. The electronic device may provide different image content in the same image for viewing by different viewing objects based on the role of the viewing object for the image.
Illustratively, the owner of the electronic device stands in front of a newly purchased private car to take a picture, and the picture contains the license plate number and the logo of the own car (the license plate number and the logo can be regarded as private information of the owner). The owner can release the photo on the network through the electronic equipment, such as a friend sending circle. For the photo issued by the owner on the network, the contents seen by the friends with different relationships in the circle of friends are different by using the technical scheme of the embodiment of the application. According to the intimacy degree of friends, the friends in the friend circle of the owner are divided into family, friends with relatively close relationship, friends with general relationship, less familiar friends and the like. The electronic device can learn the roles of the friends in the circle of friends based on the setting of the closeness of the owner to the friends. If one family member clicks the photo through the friend circle and wants to watch the photo, the electronic equipment knows the role of the person clicking the photo in the friend circle of the owner, the person is the family member, and the whole photo can be displayed to the family member. If a friend who has a general relationship clicks the photo through the circle of friends and wants to watch the photo, the electronic device knows the role of the person who clicks the photo in the circle of friends of the owner, who is a friend who has a general relationship, and can display other image parts except the license plate number and the car logo in the whole photo to the friend.
In this way, the image content that the viewing object should view can be determined based on the role of the viewing object.
The photos released in the friend circle can be face photos, the face photos are used as special privacy photos, and different image contents can be displayed according to the intimacy degree between the object of the friend circle who wants to watch the face photos and the owner. For example, if one family member clicks the face photograph through the circle of friends to want to watch, the electronic device learns the role of the person clicking the face photograph in the circle of friends of the owner, who is the family member, and can display the face photograph to the family member with a display effect of a native photograph (without beauty). If a friend clicks the face photo through the friend circle and wants to watch the face photo, the electronic equipment knows the role of the person clicking the face photo in the friend circle of the owner, the person is a friend with a general relationship, and the face photo can be displayed to the friend with the general relationship in the form of a beautiful photo. Different roles of the viewing object and images of display effects of the viewing objects belonging to different roles in the photos when the viewing objects view the photos can be correspondingly bound in advance. The different roles may be role identifications set by the user of the electronic device or the user of the application program for different user IDs (identifications), for example, family, friends, and the like.
As can be known from the foregoing, for the privacy file, with the technical solution of the embodiment of the present application, the display of different contents of the privacy file is implemented according to the identity of the viewing object, or the display of different contents of the privacy file is implemented according to the location and/or time of the electronic device. In summary, according to the technical scheme of the application, different contents in the privacy file can be displayed according to different use scenes.
According to an embodiment of the present application, there is provided an electronic device, as shown in fig. 8, including:
an obtaining unit 701, configured to obtain a target parameter, where the target parameter represents a usage scenario where an electronic device is located; the electronic device comprises a privacy file, the privacy file comprising at least two privacy data;
a determining unit 702, configured to determine target privacy data from the at least two privacy data based on the target parameter;
a display unit 703, configured to display the target privacy data.
In an optional scheme, the target privacy data is privacy data matched with the target parameters in all privacy data of the privacy file.
In an optional scheme, the target privacy data is obtained by encrypting privacy data matched with the target parameter in all privacy data of a privacy file;
wherein the determining unit 702 is further configured to:
decrypting the target privacy data;
and a display unit 703 for displaying the decrypted data.
In an optional scheme, the rest privacy data except the privacy data matched with the target parameter in the at least two privacy data are encrypted.
In an optional scheme, each of the private data matching the target parameter and the rest of private data is encrypted by using a respective encryption key.
In an optional aspect, the determining unit 702 is further configured to: acquiring a target decryption key based on the encryption key of the private data matched with the target parameter;
and decrypting the target privacy data based on the target decryption key.
In an optional aspect, the determining unit 702 is further configured to: and decrypting the target privacy data based on the acquired physiological characteristic information of the preset user.
In an optional scheme, the privacy file is a privacy image, and the target privacy data is a part of the whole content of the privacy image.
It should be noted that, in the electronic device according to the embodiment of the present application, because the principle of solving the problem of the electronic device is similar to that of the display method, the implementation process, the implementation principle, and the beneficial effects of the electronic device can be described by referring to the implementation process and the implementation principle of the method, and repeated details are not repeated.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
FIG. 9 illustrates a schematic block diagram of an example electronic device 800 that can be used to implement embodiments of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic devices may also represent various forms of mobile devices, such as personal digital processors, cellular telephones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 9, the apparatus 800 includes a computing unit 801 which can perform various appropriate actions and processes in accordance with a computer program stored in a Read Only Memory (ROM) 802 or a computer program loaded from a storage unit 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data required for the operation of the device 800 can also be stored. The calculation unit 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
A number of components in the device 800 are connected to the I/O interface 805, including: an input unit 806 such as a keyboard, a mouse, or the like; an output unit 807 such as various types of displays, speakers, and the like; a storage unit 808, such as a magnetic disk, optical disk, or the like; and a communication unit 809 such as a network card, modem, wireless communication transceiver, etc. The communication unit 809 allows the device 800 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present application may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program code, when executed by the processor or controller, causes the functions/acts specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this application, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user may provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210744946.3A CN115203737A (en) | 2022-06-27 | 2022-06-27 | Method for displaying data and electronic equipment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210744946.3A CN115203737A (en) | 2022-06-27 | 2022-06-27 | Method for displaying data and electronic equipment |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN115203737A true CN115203737A (en) | 2022-10-18 |
Family
ID=83578359
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210744946.3A Pending CN115203737A (en) | 2022-06-27 | 2022-06-27 | Method for displaying data and electronic equipment |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115203737A (en) |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102750465A (en) * | 2011-03-21 | 2012-10-24 | 微软公司 | Information privacy system and method |
| WO2015191872A1 (en) * | 2014-06-12 | 2015-12-17 | Alibaba Group Holding Limited | Managing confidential information |
| CN106357413A (en) * | 2016-11-02 | 2017-01-25 | 广东虹勤通讯技术有限公司 | Method and mobile terminal for fingerprint encryption number |
| CN106445294A (en) * | 2016-09-23 | 2017-02-22 | 维沃移动通信有限公司 | Control method of application program and mobile terminal |
| CN107347096A (en) * | 2017-07-07 | 2017-11-14 | 安徽大学 | Location privacy protection method based on cloud server |
| KR20220068363A (en) * | 2020-11-19 | 2022-05-26 | (주)성진하이텍 | Portable terminal having smart privacy protection function and method of protecting provacy using the same |
-
2022
- 2022-06-27 CN CN202210744946.3A patent/CN115203737A/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102750465A (en) * | 2011-03-21 | 2012-10-24 | 微软公司 | Information privacy system and method |
| WO2015191872A1 (en) * | 2014-06-12 | 2015-12-17 | Alibaba Group Holding Limited | Managing confidential information |
| CN106445294A (en) * | 2016-09-23 | 2017-02-22 | 维沃移动通信有限公司 | Control method of application program and mobile terminal |
| CN106357413A (en) * | 2016-11-02 | 2017-01-25 | 广东虹勤通讯技术有限公司 | Method and mobile terminal for fingerprint encryption number |
| CN107347096A (en) * | 2017-07-07 | 2017-11-14 | 安徽大学 | Location privacy protection method based on cloud server |
| KR20220068363A (en) * | 2020-11-19 | 2022-05-26 | (주)성진하이텍 | Portable terminal having smart privacy protection function and method of protecting provacy using the same |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12175002B2 (en) | Cloud-based system for protecting sensitive information in shared content | |
| US20230129693A1 (en) | Transaction authentication and verification using text messages and a distributed ledger | |
| US11611553B2 (en) | Online identity verification platform and process | |
| US20220407720A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
| US10810290B2 (en) | Robust method and an apparatus for authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates | |
| US9679126B2 (en) | Decryption device, method for decrypting and method and system for secure data transmission | |
| US10607035B2 (en) | Method of displaying content on a screen of an electronic processing device | |
| WO2018145127A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
| US20140253412A1 (en) | Method for Displaying Confidential Data on an Auxiliary Device | |
| US11620393B1 (en) | System and method for facilitating distributed peer to peer storage of data | |
| US9853955B2 (en) | Techniques for securing delivery of an audio message | |
| CN107395589A (en) | Finger print information acquisition methods and terminal | |
| USRE49968E1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
| Avdić | Use of biometrics in mobile banking security: case study of Croatian banks | |
| Mujeye | A survey on multi-factor authentication methods for mobile devices | |
| US20120272060A1 (en) | Electronic file delivering system, relevant mobile communication device, and relevant computer program product | |
| JP6518378B1 (en) | Authentication system, authentication method, and authentication program | |
| WO2016188079A1 (en) | Data storage method for terminal device and terminal device | |
| CN115203737A (en) | Method for displaying data and electronic equipment | |
| US20200226278A1 (en) | Secure document messaging system, device, and method using biometric authentication | |
| US11514144B1 (en) | Universal identification device | |
| GB2566043A (en) | A method of displaying content on a screen of an electronic processing device | |
| Terry | HIPAA and your mobile devices |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |