[go: up one dir, main page]

CN111756909A - Information protection method and system for electronic equipment, electronic equipment and storage device - Google Patents

Information protection method and system for electronic equipment, electronic equipment and storage device Download PDF

Info

Publication number
CN111756909A
CN111756909A CN201910244752.5A CN201910244752A CN111756909A CN 111756909 A CN111756909 A CN 111756909A CN 201910244752 A CN201910244752 A CN 201910244752A CN 111756909 A CN111756909 A CN 111756909A
Authority
CN
China
Prior art keywords
user
information
identification information
electronic equipment
electronic device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910244752.5A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201910244752.5A priority Critical patent/CN111756909A/en
Publication of CN111756909A publication Critical patent/CN111756909A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an information protection method and system of electronic equipment, the electronic equipment and a storage device, wherein the electronic equipment is provided with a normal use mode and an anti-borrowing mode, and the information protection method of the electronic equipment comprises the following steps: the electronic equipment acquires the identity identification information of a user; judging whether the identification information of the user is consistent with preset identification information or not; if the data are consistent with the preset data, entering the normal use mode; and if the two are not matched, entering the borrowing prevention mode. By the method, the use mode of the electronic equipment can be selected according to the user, so that other people can be prevented from normally using the electronic equipment.

Description

Information protection method and system for electronic equipment, electronic equipment and storage device
Technical Field
The present invention relates to the field of information protection technologies, and in particular, to an information protection method and system for an electronic device, and a storage device.
Background
Privacy is a focus of attention of people in the age of electronic information, and since a large amount of personal privacy or important personal information is often contained in our electronic equipment, information protection on the electronic equipment becomes very important and necessary.
Taking a mobile phone as an example, along with the continuous development of mobile communication technology, the mobile phone is more and more intelligent, but many functions in the mobile phone, such as short messages, phone books, memorandum, photos, sound recordings, e-mails, etc., all store private information of a mobile phone user, and are easily leaked if not properly protected. Sometimes, the mobile phone is not around itself, for example, when charging or being borrowed by others, and the like, it is often inconvenient for the mobile phone user because private information is unintentionally leaked.
Disclosure of Invention
The invention mainly solves the technical problem of how to prevent other people from normally using the electronic equipment so as to protect the privacy of the user of the equipment.
In order to solve the above technical problem, one technical solution adopted by the present invention is to provide an information protection method for an electronic device, where the electronic device is provided with a normal use mode and an anti-borrowing mode, and the method includes: the electronic equipment acquires the identity identification information of a user; judging whether the identification information of the user is consistent with preset identification information or not; if the data are consistent with the preset data, entering the normal use mode; and if the two are not matched, entering the borrowing prevention mode.
Wherein the identification information comprises user biological information; the judging whether the identification information of the user conforms to the preset identification information specifically comprises: and judging whether the user biological information of the user is preset biological information or not.
Wherein the user biometric information comprises at least one of: fingerprint information, facial feature information, and iris information.
Wherein, the electronic equipment acquires the identification information of the user, and specifically comprises: and acquiring the user biological information of the user by utilizing an acquisition component of the electronic equipment or a wearable device connected with the electronic equipment in the process of using the electronic equipment by the user.
Wherein, after the entering the anti-borrowing mode, the method comprises: the electronic equipment prompts an incoming call or abnormal state, or enables the electronic equipment to enter the abnormal state through preset operation.
Wherein after the entering the normal use mode, the method further comprises: and the electronic equipment receives a control instruction sent by the wearable equipment and switches to the borrowing prevention mode.
The control instruction is generated after the wearable device recognizes the gesture of the user and judges that the gesture of the user is matched with a preset gesture.
In order to solve the technical problem, another technical scheme adopted by the invention is to provide an information protection system of electronic equipment, which comprises the electronic equipment and wearable equipment which are connected, wherein the electronic equipment is provided with a normal use mode and an anti-borrowing mode; the electronic device is configured to: acquiring identity identification information of a user and judging whether the identity identification information of the user is consistent with preset identity identification information or not, entering a normal use mode when the identity identification information of the user is consistent with the preset identity identification information, and entering an anti-borrowing mode when the identity identification information of the user is not consistent with the preset identity identification information; receiving a control instruction sent by the wearable device, and entering the anti-borrowing mode; the wearable device is used for sending a control instruction to the electronic device so that the electronic device enters the borrowing prevention mode from the normal use mode.
In order to solve the above technical problem, another technical solution adopted by the present invention is to provide an electronic device, including a memory and a processor coupled to each other; the memory is used for storing program data; the processor executes the program data for implementing the method as described above.
In order to solve the above technical problem, another technical solution adopted by the present invention is to provide a storage device, which stores program data that can be executed to implement the method as described above.
The invention has the beneficial effects that: the electronic equipment is provided with a normal use mode and a borrowing prevention mode, the electronic equipment acquires identity identification information of a user and judges whether the identity identification information of the user conforms to preset identity identification information or not, the electronic equipment enters the normal use mode when the identity identification information of the user conforms to the preset identity identification information, and the electronic equipment enters the borrowing prevention mode when the identity identification information of the user does not conform to the preset identity identification information, so that the user who does not conform to the preset identity identification information can be prevented from entering the normal use mode and using the electronic equipment, and further the electronic equipment can be prevented from being normally used when other users borrow the electronic equipment from the user who conforms to the preset identity identification information, so that privacy information in the electronic equipment can not be leaked, and the safety of the information.
Drawings
Fig. 1 is a schematic flowchart of a first embodiment of an information protection method for an electronic device according to the present invention;
fig. 2 is a flowchart illustrating a second embodiment of an information protection method for an electronic device according to the present invention;
fig. 3 is a schematic flowchart of a third embodiment of an information protection method for an electronic device according to the present invention;
fig. 4 is a schematic flowchart of a fourth embodiment of an information protection method for an electronic device according to the present invention;
fig. 5 is a flowchart illustrating a fifth embodiment of an information protection method for an electronic device according to the present invention;
FIG. 6 is a schematic structural diagram of an embodiment of an information protection system of an electronic device according to the present invention;
FIG. 7 is a schematic structural diagram of an embodiment of an electronic device provided in the present invention;
FIG. 8 is a schematic structural diagram of an embodiment of a memory device provided in the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating an information protection method for an electronic device according to a first embodiment of the present invention. The electronic equipment in the application is provided with a normal use mode and an anti-borrowing mode, and the information protection method of the electronic equipment in the embodiment comprises the following steps:
step S101: the electronic equipment acquires the identification information of the user.
The electronic equipment can be a mobile phone or a tablet personal computer and other equipment capable of storing personal privacy or important personal information, and when a user uses the electronic equipment, the electronic equipment can acquire the identity identification information of the user. The obtaining operation of the electronic device may be active obtaining by the electronic device, for example, a triggering condition for obtaining the identification information of the user by the electronic device is preset in the electronic device, and the triggering condition is automatically triggered by the electronic device; the trigger condition may be triggered when the display screen of the electronic device is lit, may be triggered at a certain time interval, such as every 1 hour or any customized interval period, or may be triggered when an application request is received, for example, when the electronic device needs to open a certain software application, and the like. Or passively, such as requiring the user to actively enter his identification information into the electronic device prior to use.
Step S102: and judging whether the identification information of the user is consistent with the preset identification information. If the user identification information matches the preset identification information, step S103 is executed, and if the user identification information does not match the preset identification information, step S104 is executed.
It can be understood that the user prestores the identification information corresponding to the user who can normally use the electronic device in the electronic device, that is, the electronic device stores the preset identification information, after the electronic device acquires the identification information of the user, the identification information of the user can be compared with the preset identification information, and then whether the acquired identification information of the user is consistent with the preset identification information is judged.
Step S103: a normal use mode is entered.
In the application, after the electronic equipment acquires the identity identification information of the user and judges that the identity identification information of the user is consistent with the preset identity identification information, the electronic equipment can be normally used by the current user, and at the moment, the electronic equipment can enter a normal use mode; in the normal usage mode, the user can view all the content in the electronic device, including private or important content.
Step S104: enter the anti-borrowing mode.
Correspondingly, when the electronic equipment acquires the identity identification information of the user and judges that the identity identification information of the user does not accord with the preset identity identification information, the electronic equipment cannot be normally used by the current user, and the electronic equipment enters an anti-borrowing mode; in the borrowing prevention mode, the user cannot normally use the electronic device, for example, cannot view the content, especially the privacy or important content, in the electronic device.
In this embodiment, the electronic device is provided with a normal use mode and an anti-borrowing mode, the electronic device acquires the identity identification information of the user and judges whether the identity identification information of the user conforms to the preset identity identification information, the electronic device enters the normal use mode when the identity identification information of the user conforms to the preset identity identification information, and the electronic device enters the anti-borrowing mode when the identity identification information of the user does not conform to the preset identity identification information, so that the user who does not conform to the preset identity identification information can be prevented from entering the normal use mode and using the electronic device, and then the electronic device can be prevented from being borrowed by other users to the user who conforms to the preset identity identification information, so that the privacy information in the electronic device can.
Referring to fig. 2, fig. 2 is a flowchart illustrating an information protection method for an electronic device according to a second embodiment of the present invention. The identification information of the application comprises user biological information, and the information protection method of the electronic equipment comprises the following steps:
step S201: the electronic device acquires user biometric information of a user.
Step S202: and judging whether the user biological information of the user is preset biological information or not. If yes, go to step S203; if not, go to step S204.
It can be understood that, before the user uses the electronic device, the electronic device needs to verify the identity of the user, generally, the biological information of the user can relatively accurately prove the identity of the user, so that the electronic device can obtain the biological information of the user, and relatively accurately judge the identity of the user by judging whether the biological information of the user is the preset biological information.
Step S203: a normal use mode is entered.
If the electronic device determines that the user biological information of the user is the preset user biological information, it indicates that the current user is a preset person who can normally use the electronic device, and at this time, the electronic device can enter a normal use mode, and the current user can normally use the functions of the electronic device.
Step S204: enter the anti-borrowing mode.
If the electronic device determines that the user biological information of the user is not the preset user biological information, it indicates that the user is not the preset person who can normally use the electronic device, and at this time, the electronic device enters the anti-borrowing mode, and the user cannot normally use the electronic device.
It can be understood that, a user may set a certain security measure for the electronic device, for example, before the user uses the electronic device, the user needs to input a preset unlocking instruction for authentication; it is understood that the electronic device can authenticate the user in various ways, and generally, the authentication can be performed by inputting a password or inputting biological information of the user by the user. Generally, for the security of all information in the electronic device, people usually set a corresponding password for the electronic device, and the electronic device can be unlocked by inputting the preset password when the electronic device is used. In the application, when the user performs the identity authentication by inputting the biological information of the user, if the biological information of the user is the preset biological information, the current user can be shown to meet the requirement of using the electronic equipment, so that the electronic equipment can enter a normal use mode; when the user performs the identity authentication by inputting the password, the password information is not the preset biological information, which indicates that the current user does not meet the requirement of using the electronic device, so that the electronic device enters the anti-borrowing mode. Since the preset password can be given to other people by the user through text or dictation, other people can easily acquire the password, for example, when other people need to borrow the mobile phone of the user, because the mobile phone cannot be rejected, the user has to lend the mobile phone to other people, at the moment, the user can tell other people the unlocking password, other people can unlock the electronic equipment only by inputting the password, and the electronic device can only acquire password information input by others or user biological information of others, since the password information input by the other person or the biological information of the user of the other person are not preset biological information in the electronic device, the electronic device enters the borrowing prevention mode, so that the other person can be prevented from borrowing the electronic device, therefore, the privacy information in the electronic equipment is prevented from being revealed, and the information security of the electronic equipment is improved.
As an implementable manner, the user biological information of the present application may include at least one of fingerprint information, facial feature information, and iris information. It is understood that the user may set certain security measures for the electronic device, for example, the user needs to input a preset unlocking instruction for authentication before using the electronic device. In a specific implementation scenario, the electronic device is a mobile phone, and a user may generate or store some important or private information when using functions of a short message, a phonebook, a memo, an album, and the like in the mobile phone, and in order to avoid leakage of the private information, the user generally does not want the mobile phone of the user to be borrowed or viewed by others, so the user may perform appropriate permission setting on the use of the mobile phone of the user, for example, the user who inputs the preset biological information during unlocking may normally use or view the mobile phone. It can be understood that fingerprint unlocking refers to an unlocking mode of using fingerprint data of a user and performing record verification, generally, when the electronic device is used for the first time, a program in the electronic device can sample and input the fingerprint data of the user, when the electronic device is used by the user, the user needs to place a finger in a corresponding scanning area and wait for scanning comparison of the fingerprint, and the electronic device can be unlocked after matching; the face unlocking or iris unlocking is a mode that the electronic equipment scans and detects the face characteristics or iris characteristics of a user by using the camera device of the electronic equipment and can unlock the electronic equipment after the preset characteristics are met; these unlocking methods have certain limitations because they require verification of specific features on the user's body, and users can utilize these unlocking methods with higher limitations in order to protect private information in their own electronic devices. Therefore, when the user unlocks through fingerprints or face recognition or iris unlocking, the mobile phone can acquire fingerprint information, facial feature information or iris information of the user, and when the acquired fingerprint information, facial feature information or iris information is preset biological information in the mobile phone, the user is allowed to normally use or check the mobile phone, and then the mobile phone enters a normal use mode; and when the acquired fingerprint information or facial feature information or iris information is not preset biological information in the mobile phone, the user is not allowed to normally use or check the mobile phone, and then the mobile phone enters an anti-borrowing mode. By the mode, when the electronic equipment is not at the user side at some time, due to the fact that the user biological information is the fingerprint information or the facial feature information or the iris information, the electronic equipment needs to be unlocked through the fingerprint or the facial unlocking or the iris unlocking when being used, the user does not need to worry that other people unlock the electronic equipment to enter a normal use mode in the time when the user is not beside the electronic equipment, and the user does not need to worry that private information in the electronic equipment is acquired by other people.
Referring to fig. 3, fig. 3 is a flowchart illustrating an information protection method for an electronic device according to a third embodiment of the present invention. The information protection method of the electronic equipment comprises the following steps:
step S301: in the process of using the electronic equipment by a user, acquiring biological information of the user by utilizing an acquisition component of the electronic equipment or a wearable device connected with the electronic equipment.
It is understood that the user's biometric information may be actively or passively acquired during use of the electronic device by the user using an acquisition component of the electronic device or a wearable device connected to the electronic device. In a specific application scenario, when a user inputs a related unlocking instruction when unlocking the electronic equipment, the electronic equipment can acquire user biological information of the user through an acquisition component of the electronic equipment; for example, when the user unlocks through the fingerprint, the fingerprint receiving component of the electronic equipment can acquire the fingerprint information of the user, when the user unlocks through face recognition, the camera shooting component of the electronic equipment can acquire the facial feature information of the user, and when the user unlocks through the iris, the camera shooting component of the electronic equipment can acquire the iris information of the user. In another specific application scenario, a wearable device connected with an electronic device can also be utilized to acquire user biological information of a user; for example, when the user uses the electronic device, the wearable device wirelessly connected to the electronic device may acquire surrounding environment information, and there may be other user biological information in the environment information, it can be understood that the electronic device may be viewed by other users at this time, and therefore it is necessary to further determine whether the acquired user biological information is the preset biological information through step S302.
Step S302: and judging whether the user biological information of the user is preset biological information or not. If yes, go to step S303; if not, go to step S304.
Step S303: a normal use mode is entered.
Step S304: enter the anti-borrowing mode.
In this implementation scenario, steps S302 to S304 provided in this embodiment are substantially similar to steps S202 to S204 in the second embodiment of the information protection method for an electronic device provided in this application, and are not described herein again.
It is understood that, at some times, although the electronic device enters the normal use mode by acquiring the user biometric information of the user and determining that the user biometric information of the user is the preset biometric information, however, the person actually using the electronic device may not be the preset user, and in this case, the facial feature information of the current user needs to be further acquired during the use of the electronic device, and judging whether the facial feature information of the current user is the preset facial feature information or not, if so, then, the current user of the electronic device is determined to be the same as the preset user, and at this time, the electronic device can be kept in the normal use mode, if not, then, it is determined that the current user of the electronic device is different from the predetermined user, and in order to prevent people other than the predetermined user from using the electronic device, the electronic device is switched to the borrowing prevention mode.
In a specific implementation scene, fingerprint information and facial feature information of a user A are preset in the electronic equipment; the electronic equipment is unlocked by a user A in a fingerprint unlocking mode, the electronic equipment passively acquires fingerprint information of the user A and judges that the fingerprint information of the user A conforms to preset fingerprint information, the electronic equipment enters a normal use mode, the electronic equipment actively acquires facial feature information of the user A in the use process of the user A, judges that the facial feature information of the user A conforms to the preset facial feature information, and proves that the current user A conforms to the requirements, and the electronic equipment can be kept in the normal use mode; the electronic equipment is suddenly required to be borrowed by a user B, the user A cannot reject the requirement of the user B because the relationship between the user A and the user B is friendly, the user A only needs to borrow the electronic equipment to the user B, the user B still stays in an unlocking state and a normal use mode when borrowing the electronic equipment because the user A does not have time to relock the electronic equipment, then when the user B uses the electronic equipment, the electronic equipment actively acquires the facial feature information of the user B, the facial feature information of the user B is judged to be inconsistent with the preset facial feature information of the user A, at the moment, the electronic equipment switches the original normal use mode to an anti-borrowing mode, and therefore the user B is prevented from acquiring private information in the electronic equipment.
Referring to fig. 4, fig. 4 is a flowchart illustrating an information protection method for an electronic device according to a fourth embodiment of the present invention. The information protection method of the electronic device in the embodiment includes:
step S401: the electronic equipment acquires the identification information of the user.
Step S402: and judging whether the identification information of the user is consistent with the preset identification information. If the user identification information matches the preset identification information, step S403 is executed, and if the user identification information does not match the preset identification information, step S404 is executed.
Step S403: a normal use mode is entered.
Step S404: enter the anti-borrowing mode. And step S405 may be further performed.
In this implementation scenario, steps S401 to S404 provided in this embodiment are substantially similar to steps S101 to S104 in the first embodiment of the information protection method for an electronic device provided in this application, and are not described herein again.
Step S405: the electronic equipment prompts an incoming call or abnormal state, or enables the electronic equipment to enter the abnormal state through preset operation.
It can be understood that, after the electronic device enters the borrowing prevention mode, it indicates that the current user is not consistent with a preset user who allows to use the electronic device, and at this time, in order to prevent the current user from borrowing or checking the content in the electronic device, the electronic device may prompt that an incoming call is made or an abnormal state occurs, or make itself enter the abnormal state through a preset operation, so that the current user cannot borrow or check the content in the electronic device.
In a specific application scenario, when a user needs to borrow a mobile phone of the user, the user only needs to borrow the mobile phone to other people because the mobile phone is not rejected well, the user can tell the unlocking password to other people at the moment, other people unlock the mobile phone by inputting the password, then the mobile phone obtains the password information input by the user, and the mobile phone enters an anti-borrowing mode because the password information input by other people is not preset biological information in the mobile phone. After entering the borrowing prevention mode, the mobile phone can display incoming call display information of a preset mobile phone number, for example, incoming calls of a leader or a client are displayed, and at the moment, the user can refuse to borrow the mobile phone to other people by taking the incoming calls of the leader or the client as a borrowing port, so that other people can be prevented from borrowing the mobile phone; or after entering the borrowing prevention mode, the mobile phone can display a low-power state of low power, and at the moment, the user can refuse to borrow the mobile phone for other people by taking the insufficient power of the mobile phone as a borrowing port, so that the mobile phone can be prevented from being borrowed by other people, the private information in the mobile phone is ensured not to be leaked, and the information security of the mobile phone is improved. Or, after the user clicks the preset button or operates according to the preset operation through the preset button or the operation instruction, the electronic device may enter an abnormal state, such as a dead halt state or a low power automatic shutdown state, so that the current user cannot borrow or view the content in the electronic device.
Referring to fig. 5, fig. 5 is a flowchart illustrating a fifth embodiment of an information protection method for an electronic device according to the present invention. The information protection method of the electronic device in the embodiment includes:
step S501: the electronic equipment acquires the identification information of the user.
Step S502: and judging whether the identification information of the user is consistent with the preset identification information. If the user identification information matches the preset identification information, step S503 is executed, and if the user identification information does not match the preset identification information, step S504 is executed.
Step S503: a normal use mode is entered. And step S505 may be further performed.
Step S504: enter the anti-borrowing mode.
In this implementation scenario, steps S501 to S504 provided in this embodiment are substantially similar to steps S101 to S104 in the first embodiment of the information protection method for an electronic device provided in this application, and are not described here again.
Step S505: the electronic equipment receives the control instruction sent by the wearable equipment and switches to the borrowing prevention mode.
It can be understood that, when the electronic device enters the normal use mode, but the current user is not the owner of the electronic device, at this time, the owner of the electronic device cannot directly desire the electronic device for the current user for some reason, and then, in order to prevent the current user from using or viewing the content in the electronic device, the electronic device may receive a control instruction sent by a wearable device connected to the electronic device, and then switch to the anti-borrowing mode according to the control instruction, so that the current user cannot use or view the content in the electronic device.
Taking a mobile phone as an example, the control instruction may be an incoming call display instruction, and after receiving the incoming call display instruction sent by the wearable device, the mobile phone may display incoming call display information of a preset mobile phone number, such as displaying a leader or an incoming call of a client; the control instruction can also be a mobile phone state display instruction, and after the mobile phone receives the mobile phone state display instruction sent by the wearable device, the mobile phone can display low-battery states such as 'low-battery' and the like of the mobile phone, and can further display a shutdown state of 'automatic shutdown of low-battery', or directly display a dead halt state of a picture card. In a specific application scene, when other people need to borrow the mobile phone of the user, the user only needs to borrow the mobile phone for other people because the mobile phone is not rejected well, when other people normally use the mobile phone, the user can send a control instruction to the mobile phone through wearable equipment which is carried by the user and is in wireless connection with the mobile phone, and then the mobile phone enters an anti-borrowing mode after receiving the control instruction, so that the mobile phone can be prevented from being borrowed by other people, the private information in the mobile phone is ensured not to be leaked, and the safety of the information of the mobile phone is improved.
As an implementation manner, the control instruction may be generated by the wearable device after recognizing the gesture of the user and determining that the gesture of the user matches the preset gesture. It can be understood that a preset gesture capable of generating a control instruction is preset in the wearable device, and when the wearable device recognizes the gesture of the user and determines that the gesture of the user matches the preset gesture, a corresponding control instruction can be generated, and the control instruction is further sent to the electronic device. Of course, in other embodiments, the wearable device may also store a control instruction in advance, and the wearable device only needs to actively send the control instruction to the electronic device.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an embodiment of an information protection system of an electronic device according to the present invention. The information protection system of the electronic equipment comprises the electronic equipment 60 and the wearable equipment 62 which are connected, wherein the electronic equipment 60 is provided with a normal use mode and an anti-borrowing mode. The electronic device 60 is configured to: acquiring the identity identification information of a user and judging whether the identity identification information of the user is consistent with the preset identity identification information or not, entering a normal use mode when the identity identification information of the user is consistent with the preset identity identification information, and entering an anti-borrowing mode when the identity identification information of the user is inconsistent with the preset identity identification information; and receiving a control instruction sent by the wearable device 62, and entering an anti-borrowing mode. Wearable device 62 is configured to send control instructions to electronic device 60 to cause electronic device 60 to enter an anti-borrowing mode from a normal use mode.
The electronic device 60 can enter the borrowing prevention mode through two modes, one mode is to obtain the identification information of the user by itself and judge whether the identification information of the user conforms to the preset identification information, and enter the borrowing prevention mode when the identification information of the user does not conform to the preset identification information, the other mode is to obtain the identification information of the user by itself and judge whether the identification information of the user conforms to the preset identification information, and enter the normal use mode when the identification information of the user conforms to the preset identification information, and then send a control instruction to the electronic device 60 through the wearable device 62, and the electronic device 60 enters the borrowing prevention mode from the normal use mode. In the borrowing prevention mode, the current user cannot use or view the content in the electronic device 60, so that the privacy information in the electronic device 60 can be ensured not to be leaked, and the information security of the electronic device 60 is improved.
The specific process of the electronic device 60 and the wearable device 62 in the information protection system embodiment of the electronic device to implement the above functions may refer to the above method embodiment.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. The electronic device 70 in this application is an electronic device in the information protection method of the electronic device, where the electronic device 70 includes a memory 700 and a processor 702 coupled to each other, the memory 700 is used for storing program data, and the processor 702 executes the program data, so as to implement the following methods:
the processor 702 obtains the identification information of the user and determines whether the identification information of the user is consistent with the preset identification information; if the identity identification information of the user is consistent with the preset identity identification information, entering a normal use mode; and if the identification information of the user does not accord with the preset identification information, entering into an anti-borrowing mode. The memory 700 stores therein corresponding preset identification information.
Further, the identification information includes user biological information, and the preset identification information may include preset biological information; the processor 702 performs the above-mentioned determination of whether the user identification information matches the preset identification information, specifically including: the processor 702 determines whether the user biometric information of the user is the preset biometric information.
Further, the user biometric information may include at least one of: fingerprint information, facial feature information, and iris information.
As an implementation manner, the processor 702 performs the above-mentioned obtaining of the identification information of the user, which specifically includes: during use of the electronic device by the user, the processor 702 obtains the user biometric information of the user using an acquisition component of the electronic device or a wearable device connected to the electronic device. It is to be appreciated that the electronic device 70 can include an acquisition component coupled to the processor 702 that can acquire user biometric information of the user.
As a possible implementation manner, after the processor 702 executes the above entering the anti-borrowing mode, the method further includes: the processor 702 prompts an incoming call or an abnormal state, or enables the electronic device 70 to enter the abnormal state through a preset operation.
As an implementation manner, after the processor 702 performs the above-mentioned entering into the normal use mode, the method further includes: the processor 702 receives a control instruction sent by the wearable device and switches to the anti-borrowing mode.
Further, the control instruction is generated after the wearable device recognizes the gesture of the user and judges that the gesture of the user matches the preset gesture.
The specific process of implementing the above functions by the processor 702 and other components in the electronic device 70 embodiment of the present application may refer to the above method embodiment.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a memory device according to an embodiment of the present invention. The storage device 80 has stored therein program data 800, the program data 800 being executable to implement the information protection method of the electronic apparatus as described above. The storage device 80 may be a memory chip in an electronic device, a readable and writable storage tool such as an SD card, or an electronic device.
In the several embodiments provided in the present application, it should be understood that the disclosed method, apparatus, and device may be implemented in other ways. For example, the above-described device architecture implementations are merely illustrative, and for example, a division of a module or a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. An information protection method of an electronic device, wherein the electronic device is provided with a normal use mode and an anti-borrowing mode, the method comprising:
the electronic equipment acquires the identity identification information of a user;
judging whether the identification information of the user is consistent with preset identification information or not;
if the data are consistent with the preset data, entering the normal use mode;
and if the two are not matched, entering the borrowing prevention mode.
2. The information protection method according to claim 1, wherein the identification information includes user biometric information;
the judging whether the identification information of the user conforms to the preset identification information specifically comprises:
and judging whether the user biological information of the user is preset biological information or not.
3. The information protection method according to claim 2,
the user biometric information includes at least one of: fingerprint information, facial feature information, and iris information.
4. The information protection method according to claim 2, wherein the acquiring, by the electronic device, the identification information of the user specifically includes:
and acquiring the user biological information of the user by utilizing an acquisition component of the electronic equipment or a wearable device connected with the electronic equipment in the process of using the electronic equipment by the user.
5. The information protection method of claim 1, wherein after the entering the anti-borrowing mode, the method comprises:
the electronic equipment prompts an incoming call or abnormal state, or enables the electronic equipment to enter the abnormal state through preset operation.
6. The information protection method of claim 1, wherein after the entering the normal use mode, the method further comprises:
and the electronic equipment receives a control instruction sent by the wearable equipment and switches to the borrowing prevention mode.
7. The information protection method of claim 6, wherein the control instruction is generated by the wearable device after recognizing a gesture of a user and determining that the gesture of the user matches a preset gesture.
8. The information protection system of the electronic equipment is characterized by comprising the electronic equipment and the wearable equipment which are connected, wherein the electronic equipment is provided with a normal use mode and an anti-borrowing mode;
the electronic device is configured to: acquiring identity identification information of a user and judging whether the identity identification information of the user is consistent with preset identity identification information or not, entering a normal use mode when the identity identification information of the user is consistent with the preset identity identification information, and entering an anti-borrowing mode when the identity identification information of the user is not consistent with the preset identity identification information; receiving a control instruction sent by the wearable device, and entering the anti-borrowing mode;
the wearable device is used for sending a control instruction to the electronic device so that the electronic device enters the borrowing prevention mode from the normal use mode.
9. An electronic device comprising a memory and a processor coupled to each other;
the memory is used for storing program data;
the processor executes the program data for implementing the method according to any one of claims 1-7.
10. A storage device storing program data executable to implement a method according to any one of claims 1 to 7.
CN201910244752.5A 2019-03-28 2019-03-28 Information protection method and system for electronic equipment, electronic equipment and storage device Withdrawn CN111756909A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910244752.5A CN111756909A (en) 2019-03-28 2019-03-28 Information protection method and system for electronic equipment, electronic equipment and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910244752.5A CN111756909A (en) 2019-03-28 2019-03-28 Information protection method and system for electronic equipment, electronic equipment and storage device

Publications (1)

Publication Number Publication Date
CN111756909A true CN111756909A (en) 2020-10-09

Family

ID=72671568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910244752.5A Withdrawn CN111756909A (en) 2019-03-28 2019-03-28 Information protection method and system for electronic equipment, electronic equipment and storage device

Country Status (1)

Country Link
CN (1) CN111756909A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914127A (en) * 2012-12-31 2014-07-09 联想(北京)有限公司 Electronic device and control method thereof
CN104021398A (en) * 2014-06-16 2014-09-03 北京云视智通科技有限公司 Wearable intelligent device and method for assisting identity recognition
CN104794381A (en) * 2015-03-24 2015-07-22 百度在线网络技术(北京)有限公司 Method, device, equipment and system used for authentication
CN106682478A (en) * 2017-01-19 2017-05-17 珠海格力电器股份有限公司 Electronic equipment and login unlocking method thereof
CN107133509A (en) * 2017-04-28 2017-09-05 北京小米移动软件有限公司 Method for secret protection and equipment
CN107862187A (en) * 2017-10-20 2018-03-30 王媛玥 Intelligent electronic device use information monitoring system
CN108847012A (en) * 2018-04-26 2018-11-20 Oppo广东移动通信有限公司 Control method and related equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914127A (en) * 2012-12-31 2014-07-09 联想(北京)有限公司 Electronic device and control method thereof
CN104021398A (en) * 2014-06-16 2014-09-03 北京云视智通科技有限公司 Wearable intelligent device and method for assisting identity recognition
CN104794381A (en) * 2015-03-24 2015-07-22 百度在线网络技术(北京)有限公司 Method, device, equipment and system used for authentication
CN106682478A (en) * 2017-01-19 2017-05-17 珠海格力电器股份有限公司 Electronic equipment and login unlocking method thereof
CN107133509A (en) * 2017-04-28 2017-09-05 北京小米移动软件有限公司 Method for secret protection and equipment
CN107862187A (en) * 2017-10-20 2018-03-30 王媛玥 Intelligent electronic device use information monitoring system
CN108847012A (en) * 2018-04-26 2018-11-20 Oppo广东移动通信有限公司 Control method and related equipment

Similar Documents

Publication Publication Date Title
US20220385471A1 (en) Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal
US8224128B2 (en) Portable information terminal device
US20070009139A1 (en) Facial recognition device for a handheld electronic device and a method of using the same
CN104933351B (en) The treating method and apparatus of information security
CN104850827B (en) Fingerprint identification method and device
EP3163851A1 (en) User mode control method and system based on iris recognition technology for mobile terminal
EP3249570B1 (en) Method and device for providing prompt indicating loss of terminal
US20150161837A1 (en) Methods and systems for providing control of a device using a fingerprint sensor
US20180341953A1 (en) Method and apparatus for reporting loss of card or device associated with account number or stolen of account number
CN108781234B (en) Function control method and terminal
CN111935349B (en) Terminal-based information display method and device, terminal and storage medium
US20180341824A1 (en) Recognizing biological feature
CN105760734A (en) Safety protection method for terminal and terminal equipment
JP6267025B2 (en) Communication terminal and communication terminal authentication method
CN106295284A (en) A kind of information protecting method and mobile terminal
US10824706B2 (en) Portable electronic device for authenticating user and system and method associated therewith
US10515224B2 (en) Method, device and storage medium for printing information
CN107451445A (en) Screen unlocking method, terminal and storage medium
CN114341843A (en) Safety protection method and device, mobile terminal and storage medium
CN105574382A (en) Information protection method and terminal
JPWO2017208519A1 (en) Biometric authentication device, portable terminal device, control program
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
CN107786349B (en) Security management method and device for user account
JP2022189048A (en) Authentication system, authentication device, authentication method, and program
CN111756909A (en) Information protection method and system for electronic equipment, electronic equipment and storage device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201009