CN113496021A - Privacy protection method and device, wearable device and computer-readable storage medium - Google Patents
Privacy protection method and device, wearable device and computer-readable storage medium Download PDFInfo
- Publication number
- CN113496021A CN113496021A CN202010199800.6A CN202010199800A CN113496021A CN 113496021 A CN113496021 A CN 113496021A CN 202010199800 A CN202010199800 A CN 202010199800A CN 113496021 A CN113496021 A CN 113496021A
- Authority
- CN
- China
- Prior art keywords
- wearable device
- current user
- user
- feature
- comparison result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 239000013598 vector Substances 0.000 claims description 38
- 238000004590 computer program Methods 0.000 claims description 16
- 230000003993 interaction Effects 0.000 claims description 5
- QVGXLLKOCUKJST-UHFFFAOYSA-N atomic oxygen Chemical compound [O] QVGXLLKOCUKJST-UHFFFAOYSA-N 0.000 claims description 4
- 230000003542 behavioural effect Effects 0.000 claims description 4
- 239000008280 blood Substances 0.000 claims description 4
- 210000004369 blood Anatomy 0.000 claims description 4
- 229910052760 oxygen Inorganic materials 0.000 claims description 4
- 239000001301 oxygen Substances 0.000 claims description 4
- 230000006870 function Effects 0.000 description 34
- 238000010586 diagram Methods 0.000 description 6
- 239000011521 glass Substances 0.000 description 3
- 230000005021 gait Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 208000027418 Wounds and injury Diseases 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 208000014674 injury Diseases 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
本申请涉及一种隐私保护方法和装置、可穿戴设备、计算机可读存储介质,通过可穿戴设备获取当前用户的生物特征,将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果。当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。因为可穿戴设备本身就具有检测用户的生物特征的功能,因此,借助于特征对比的方式来判断当前用户是否为合法用户。从而,实现在判断出当前用户不是合法用户的情况下,控制可穿戴设备不支持隐私信息的访问。最终,使得当前用户不能够访问到该可穿戴设备隐私信息,实现了对个人信息的保护,提升了个人信息的安全性。
The present application relates to a privacy protection method and device, a wearable device, and a computer-readable storage medium. The wearable device obtains the biometrics of the current user, and compares the current user's biometrics with the biometrics pre-stored in the wearable device. Get the comparison result. When it is determined according to the comparison result that the current user is not a legitimate user, the control wearable device does not support access to private information. Because the wearable device itself has the function of detecting the biometric features of the user, it is determined whether the current user is a legitimate user by means of feature comparison. Therefore, in the case that it is determined that the current user is not a legitimate user, the wearable device is controlled not to support access to private information. Ultimately, the current user cannot access the private information of the wearable device, thereby realizing the protection of personal information and improving the security of personal information.
Description
技术领域technical field
本申请涉及计算机技术领域,特别是涉及一种隐私保护方法和装置、可穿戴设备、计算机可读存储介质。The present application relates to the field of computer technology, and in particular, to a privacy protection method and device, a wearable device, and a computer-readable storage medium.
背景技术Background technique
随着计算机技术的不断发展,各种各样的可穿戴设备也越来越受到人们的欢迎。其中,可穿戴设备指可直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。With the continuous development of computer technology, a variety of wearable devices are becoming more and more popular. Among them, a wearable device refers to a portable device that can be directly worn on the body or integrated into the user's clothes or accessories.
可穿戴设备可通过软件支持以及数据交互、云端交互来实现强大的功能,人们可随时随地从可穿戴设备上获取信息,可穿戴设备上这些便捷强大的功能将会对人们的生活、感知带来很大的转变。但是,如果可穿戴设备被机主用户之外的其他人使用时,机主用户的个人信息就存在泄露的风险,影响个人信息的安全性。Wearable devices can achieve powerful functions through software support, data interaction, and cloud interaction. People can obtain information from wearable devices anytime, anywhere. These convenient and powerful functions on wearable devices will bring people's life and perception. big shift. However, if the wearable device is used by someone other than the owner user, there is a risk of leakage of the owner user's personal information, which affects the security of the personal information.
因此,急需解决传统的可穿戴设备存在个人信息泄露风险的问题。Therefore, there is an urgent need to solve the problem of the risk of personal information leakage in traditional wearable devices.
发明内容SUMMARY OF THE INVENTION
本申请实施例提供一种隐私保护方法和装置、可穿戴设备、计算机可读存储介质,可以提升个人信息的安全性。The embodiments of the present application provide a privacy protection method and device, a wearable device, and a computer-readable storage medium, which can improve the security of personal information.
一种隐私保护方法,所述方法包括:A privacy protection method, the method includes:
通过可穿戴设备获取当前用户的生物特征;Obtain the biometrics of the current user through the wearable device;
将所述当前用户的生物特征与所述可穿戴设备中预存的生物特征进行比对得到比对结果;Comparing the biometric feature of the current user with the biometric feature pre-stored in the wearable device to obtain a comparison result;
当根据所述比对结果判断出所述当前用户不是合法用户时,则控制所述可穿戴设备不支持隐私信息的访问。When it is determined according to the comparison result that the current user is not a legitimate user, the wearable device is controlled to not support access to private information.
一种隐私保护装置,所述装置包括:A privacy protection device, the device includes:
生物特征获取模块,用于通过可穿戴设备获取当前用户的生物特征;A biometric acquisition module, used to acquire the current user's biometrics through a wearable device;
特征比对模块,用于将所述当前用户的生物特征与所述可穿戴设备中预存的生物特征进行比对得到比对结果;a feature comparison module, configured to compare the biometric features of the current user with the biometric features pre-stored in the wearable device to obtain a comparison result;
控制模块,用于当根据所述比对结果判断出所述当前用户不是合法用户时,则控制所述可穿戴设备不支持隐私信息的访问。A control module, configured to control the wearable device not to support access to private information when it is determined according to the comparison result that the current user is not a legitimate user.
一种可穿戴设备,包括存储器及处理器,所述存储器中储存有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器执行如上所述的隐私保护方法的步骤。A wearable device includes a memory and a processor, wherein a computer program is stored in the memory, and when the computer program is executed by the processor, the processor executes the steps of the above privacy protection method.
一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如上所述的隐私保护方法的步骤。A computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, implements the steps of the above-mentioned privacy protection method.
上述隐私保护方法和装置、可穿戴设备、计算机可读存储介质,通过可穿戴设备获取当前用户的生物特征,将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果。当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。因为可穿戴设备本身就具有检测用户的生物特征的功能,因此,借助于特征对比的方式来判断当前用户是否为合法用户。从而,实现在判断出当前用户不是合法用户的情况下,控制可穿戴设备不支持隐私信息的访问。最终,使得当前用户不能够访问到该可穿戴设备隐私信息,实现了对个人信息的保护,提升了个人信息的安全性。The above privacy protection method and device, wearable device, and computer-readable storage medium, obtain the biometrics of the current user through the wearable device, and compare the biometrics of the current user with the biometrics pre-stored in the wearable device to obtain a comparison result . When it is determined according to the comparison result that the current user is not a legitimate user, the control wearable device does not support access to private information. Because the wearable device itself has the function of detecting the biometric features of the user, whether the current user is a legitimate user is determined by means of feature comparison. Therefore, in the case that it is determined that the current user is not a legitimate user, the wearable device is controlled not to support access to private information. Ultimately, the current user cannot access the private information of the wearable device, thereby realizing the protection of personal information and improving the security of personal information.
附图说明Description of drawings
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following briefly introduces the accompanying drawings required for the description of the embodiments or the prior art. Obviously, the drawings in the following description are only These are some embodiments of the present application. For those of ordinary skill in the art, other drawings can also be obtained based on these drawings without any creative effort.
图1为一个实施例中隐私保护方法的应用环境图;Fig. 1 is the application environment diagram of the privacy protection method in one embodiment;
图2为一个实施例中隐私保护方法的流程图;2 is a flowchart of a privacy protection method in one embodiment;
图3为一个实施例中可穿戴设备上两种模式的示意图;3 is a schematic diagram of two modes on a wearable device in one embodiment;
图4为另一个实施例中隐私保护方法的流程图;4 is a flowchart of a privacy protection method in another embodiment;
图5为再一个实施例中隐私保护方法的流程图;5 is a flowchart of a privacy protection method in yet another embodiment;
图6为一个具体的实施例中隐私保护方法的流程图;6 is a flowchart of a privacy protection method in a specific embodiment;
图7为一个实施例中隐私保护装置的结构框图;7 is a structural block diagram of a privacy protection device in one embodiment;
图8为一个实施例中可穿戴设备的内部结构示意图。FIG. 8 is a schematic diagram of the internal structure of a wearable device in one embodiment.
具体实施方式Detailed ways
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.
可以理解,本申请所使用的术语“第一”、“第二”等可在本文中用于描述各种元件,但这些元件不受这些术语限制。这些术语仅用于将第一个元件与另一个元件区分。举例来说,在不脱离本申请的范围的情况下,可以将第一模式称为第二模式,且类似地,可将第二模式称为第一模式。第一模式和第二模式两者都是模式,但其不是同一模式。It will be understood that the terms "first", "second", etc. used in this application may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish a first element from another element. For example, a first mode could be referred to as a second mode, and, similarly, a second mode could be referred to as a first mode, without departing from the scope of this application. Both the first mode and the second mode are modes, but they are not the same mode.
图1为一个实施例中隐私保护方法的应用场景图。如图1所示,该应用环境包括可穿戴设备120和电子设备140。可穿戴设备120可以隐私保护通过可穿戴设备获取当前用户的生物特征,将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果,当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。可以理解的是,上述可穿戴设备120不限于是各种以手腕为支撑的watch(手表)类(包括手表和腕带等产品),以脚为支撑的shoes(鞋)类(包括鞋、袜子或者将来的其他腿上佩戴产品),以头部为支撑的Glass(眼镜)类(包括眼镜、头盔、头带等),以及智能服装、书包、拐杖、配饰等各类非主流产品形态等。上述电子设备140可以不限于是各种手机、平板电脑等。FIG. 1 is an application scenario diagram of a privacy protection method in one embodiment. As shown in FIG. 1 , the application environment includes a
图2为一个实施例中隐私保护方法的流程图。本实施例中的隐私保护方法,以运行于图1中的可穿戴设备上为例进行描述。如图2所示,隐私保护方法包括步骤220至步骤260。其中,FIG. 2 is a flowchart of a privacy protection method in one embodiment. The privacy protection method in this embodiment is described by taking running on the wearable device in FIG. 1 as an example. As shown in FIG. 2 , the privacy protection method includes
步骤220,通过可穿戴设备获取当前用户的生物特征。Step 220: Obtain the biometric features of the current user through the wearable device.
将可穿戴设备佩戴在用户的身上,就可以通过可穿戴设备上的传感器获取到当前用户的生物特征。其中,生物特征指的是用户自身具备的唯一的、可测量、可识别的特征。当前用户指的是当前将可穿戴设备佩戴在身上的用户。When the wearable device is worn on the user's body, the biometric characteristics of the current user can be obtained through the sensors on the wearable device. Among them, the biometrics refers to the unique, measurable and identifiable features possessed by the user. The current user refers to the user who currently wears the wearable device.
步骤240,将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果。
其中,可穿戴设备一般会在使用之初会录入机主用户的生物特征,当然,也可以在任何时候录入机主用户的生物特征,本申请对此不做限定。这些所录入的机主用户的生物特征就是可穿戴设备中预存的生物特征,机主用户可以对可穿戴设备中预存的生物特征进行更新。然后,在可穿戴设备使用的过程中,因为会出现机主用户忘记设置锁屏密码或锁屏密码泄露的情况,而使得非机主用户有机会获取到机主用户的隐私信息,从而造成个人信息泄露。所以,为了解决这个问题,本申请实施例提出了一种隐私保护方法,将通过可穿戴设备所获取的当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果,从而根据比对结果就可以判断出当前用户是否为合法用户,从而可以采取措施以保护用户的隐私信息。Among them, the wearable device will generally enter the biometric characteristics of the owner user at the beginning of use, and of course, the biometric characteristics of the owner user can also be entered at any time, which is not limited in this application. The entered biometric features of the owner user are the biometric features pre-stored in the wearable device, and the owner user can update the biometric features pre-stored in the wearable device. Then, in the process of using the wearable device, because the owner user forgets to set the lock screen password or the lock screen password is leaked, the non-owner user has the opportunity to obtain the owner user's private information, thus causing personal injury. Information disclosure. Therefore, in order to solve this problem, an embodiment of the present application proposes a privacy protection method, which compares the biometric features of the current user obtained through the wearable device with the biometric features pre-stored in the wearable device to obtain a comparison result, thereby obtaining a comparison result. According to the comparison result, it can be determined whether the current user is a legitimate user, so that measures can be taken to protect the user's private information.
步骤260,当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。
在根据比对结果就可以判断出当前用户是否为合法用户时,若判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。可穿戴设备上可以提供基本功能,例如,时间显示、计步、天气信息等,这些基本功能一般不会涉及到隐私信息。当然,可穿戴设备上也可以提供相比较于基本功能高级的功能,例如,通话、即时通讯、交易、提醒事项等,这些高级功能一般就会涉及到隐私信息。因此,根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持这些高级功能。从而,就可以实现判断出当前用户不是合法用户时,则当前用户通过可穿戴设备就不可以访问到隐私信息。When it can be determined whether the current user is a legal user according to the comparison result, and if it is determined that the current user is not a legal user, the control wearable device does not support access to private information. Wearable devices can provide basic functions, such as time display, step counting, weather information, etc. These basic functions generally do not involve private information. Of course, wearable devices can also provide advanced functions compared to basic functions, such as calls, instant messaging, transactions, reminders, etc. These advanced functions generally involve private information. Therefore, when it is determined according to the comparison result that the current user is not a legitimate user, the control wearable device does not support these advanced functions. Therefore, when it is determined that the current user is not a legitimate user, the current user cannot access private information through the wearable device.
本申请实施例中,通过可穿戴设备获取当前用户的生物特征,将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果。当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。因为可穿戴设备本身就具有检测用户的生物特征的功能,因此,借助于特征对比的方式来判断当前用户是否为合法用户,不会耗费额外的软硬件成本,且准确性较高。从而,实现在判断出当前用户不是合法用户的情况下,控制可穿戴设备不支持隐私信息的访问。最终,使得当前用户不能够访问到该可穿戴设备隐私信息,实现了对个人信息的保护,提升了个人信息的安全性。In the embodiment of the present application, the biometric feature of the current user is obtained through the wearable device, and the biometric feature of the current user is compared with the biometric feature pre-stored in the wearable device to obtain a comparison result. When it is determined according to the comparison result that the current user is not a legitimate user, the control wearable device does not support access to private information. Because the wearable device itself has the function of detecting the biometric features of the user, it is more accurate to judge whether the current user is a legitimate user by means of feature comparison without costing additional software and hardware. Therefore, in the case that it is determined that the current user is not a legitimate user, the wearable device is controlled not to support access to private information. Ultimately, the current user cannot access the private information of the wearable device, thereby realizing the protection of personal information and improving the security of personal information.
在一个实施例中,可穿戴设备可在第一模式及第二模式之间切换,在第一模式下支持隐私信息的访问,在第二模式下不支持隐私信息的访问;In one embodiment, the wearable device can be switched between a first mode and a second mode, in which access to private information is supported in the first mode, and access to private information is not supported in the second mode;
当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问,包括:When it is judged that the current user is not a legitimate user according to the comparison result, the control wearable device does not support access to private information, including:
当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备从第一模式切换至第二模式。When it is determined according to the comparison result that the current user is not a legitimate user, the wearable device is controlled to switch from the first mode to the second mode.
如图3所示,可穿戴设备上有两种模式,且可穿戴设备可在第一模式及第二模式之间切换。可穿戴设备上的第一模式可以称之为正常模式,在该正常模式下可穿戴设备上运行第一系统。可穿戴设备上的第二模式可以称之为省电模式,在该省电模式下可穿戴设备上运行第二系统。其中,第一系统可支持高级功能,第二系统不可支持高级功能,只能保证基础功能的实现。这里的基本功能,例如时间显示、计步、天气信息等,这些基本功能一般不会涉及到隐私信息。相应的,这里的高级的功能,例如通话、即时通讯、交易、提醒事项等,这些高级功能一般就会涉及到隐私信息。As shown in FIG. 3 , there are two modes on the wearable device, and the wearable device can switch between the first mode and the second mode. The first mode on the wearable device may be referred to as a normal mode, in which the first system is run on the wearable device. The second mode on the wearable device may be referred to as a power saving mode, in which the second system runs on the wearable device. Among them, the first system can support advanced functions, and the second system cannot support advanced functions, and can only ensure the realization of basic functions. The basic functions here, such as time display, step counting, weather information, etc., generally do not involve private information. Correspondingly, the advanced functions here, such as calls, instant messaging, transactions, reminders, etc., generally involve private information.
其中,第一系统一般运行在主处理器上,例如中央处理器(Central ProcessUnit;CPU)上,而第二系统则运行在协处理器上,例如微控制单元(Microcontroller Unit,MCU)上。MCU是对CPU的频率、规格、内存等做适当缩减所得,因此,MCU在性能上比CPU差,功耗上显然也比CPU低。Wherein, the first system generally runs on a main processor, such as a central processing unit (Central ProcessUnit; CPU), and the second system runs on a coprocessor, such as a microcontroller unit (Microcontroller Unit, MCU). The MCU is obtained by appropriately reducing the frequency, specifications, and memory of the CPU. Therefore, the performance of the MCU is worse than that of the CPU, and the power consumption is obviously lower than that of the CPU.
此处,第一系统可具体指的是Android系统、ios系统、symbian系统、WindowsPhone系统或其他可运行在可穿戴设备上支持高级功能的系统,本申请对第一系统不做具体限定。第二系统不可支持高级功能,只能保证基础功能的实现,对于可穿戴设备来说第二系统可以是RTOS系统,当然,本申请对第二系统不做具体限定。Here, the first system may specifically refer to an Android system, an ios system, a symbian system, a Windows Phone system, or other systems that can run on a wearable device to support advanced functions, and the application does not specifically limit the first system. The second system cannot support advanced functions, and can only ensure the realization of basic functions. For wearable devices, the second system may be an RTOS system. Of course, this application does not specifically limit the second system.
因为可穿戴设备可在第一模式及第二模式之间切换,所以当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备从第一模式切换至第二模式。即控制可穿戴设备从正常模式切换至省电模式。Because the wearable device can be switched between the first mode and the second mode, when it is determined according to the comparison result that the current user is not a legitimate user, the wearable device is controlled to switch from the first mode to the second mode. That is, the wearable device is controlled to switch from the normal mode to the power saving mode.
本申请实施例中,当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备从正常模式切换至省电模式。在该正常模式下可穿戴设备上运行第一系统,在该省电模式下可穿戴设备上运行第二系统。因为第一系统可以支持高级功能,而第二系统不可支持高级功能,只能保证基础功能的实现,这些基本功能一般不会涉及到隐私信息。所以,当可穿戴设备切换至省电模式后,省电模式中根本就不会涉及到隐私信息,因此就不会造成隐私信息的泄露。In the embodiment of the present application, when it is determined according to the comparison result that the current user is not a legitimate user, the wearable device is controlled to switch from the normal mode to the power saving mode. The first system is run on the wearable device in the normal mode, and the second system is run on the wearable device in the power saving mode. Because the first system can support advanced functions, but the second system cannot support advanced functions, and can only ensure the realization of basic functions, which generally do not involve private information. Therefore, when the wearable device is switched to the power-saving mode, the power-saving mode will not involve private information at all, so that the leakage of private information will not be caused.
在一个实施例中,如图4所示,提供了一种隐私保护方法,还包括:In one embodiment, as shown in Figure 4, a privacy protection method is provided, further comprising:
步骤280,当根据比对结果判断出当前用户是合法用户时,则控制可穿戴设备支持隐私信息的访问。
具体的,通过可穿戴设备获取当前用户的生物特征,将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果。当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。当根据比对结果判断出当前用户是合法用户时,则控制可穿戴设备支持隐私信息的访问。Specifically, the biometric feature of the current user is obtained through the wearable device, and the biometric feature of the current user is compared with the biometric feature pre-stored in the wearable device to obtain a comparison result. When it is determined according to the comparison result that the current user is not a legitimate user, the control wearable device does not support access to private information. When it is determined that the current user is a legitimate user according to the comparison result, the wearable device is controlled to support access to private information.
本申请实施例中,因为可穿戴设备本身就具有检测用户的生物特征的功能,因此,借助于特征对比的方式来判断当前用户是否为合法用户,不会耗费额外的软硬件成本,且准确性较高。从而,实现在判断出当前用户不是合法用户的情况下,控制可穿戴设备不支持隐私信息的访问,在判断出当前用户是合法用户的情况下,控制可穿戴设备支持隐私信息的访问。最终,使得不是合法用户的当前用户不能够访问到该可穿戴设备隐私信息,实现了对个人信息的保护,提升了个人信息的安全性。同时使得是合法用户的当前用户,在保证安全性的前提下,能够及时获取到隐私信息,不影响合法用户的正产使用。In the embodiment of the present application, because the wearable device itself has the function of detecting the biometric features of the user, the method of feature comparison to determine whether the current user is a legitimate user will not cost additional software and hardware costs, and the accuracy higher. Therefore, when it is determined that the current user is not a legal user, the wearable device is controlled to not support access to private information, and when it is determined that the current user is a legal user, the wearable device is controlled to support access to private information. Finally, the current user who is not a legal user cannot access the private information of the wearable device, thereby realizing the protection of personal information and improving the security of personal information. At the same time, current users who are legitimate users can obtain private information in a timely manner under the premise of ensuring security, without affecting the legitimate use of legitimate users.
在一个实施例中,生物特征包括生物特征对应的特征向量;通过可穿戴设备获取当前用户的生物特征,包括:In one embodiment, the biometrics include feature vectors corresponding to the biometrics; obtaining the biometrics of the current user through the wearable device includes:
通过可穿戴设备采集当前用户的生物特征的信号;Collect the biometric signal of the current user through the wearable device;
根据当前用户的生物特征的信号,计算生物特征对应的特征向量。According to the biometric signal of the current user, a feature vector corresponding to the biometric feature is calculated.
具体的,通过可穿戴设备采集当前用户的生物特征时,实际上采集到的是生物特征对应的信号。例如,当生物特征为心电特征时,则实际上采集到的心电信号;当生物特征为心率特征时,则实际上采集到的心率信号,本申请中不限于以上两种信号。本申请中可以是仅采集一种生物特征,当然,也可以是采集多种生物特征。Specifically, when the wearable device collects the biometrics of the current user, what is actually collected is the signal corresponding to the biometrics. For example, when the biological feature is an electrocardiographic feature, the actually collected electrocardiographic signal; when the biological feature is a heart rate feature, the actually collected heart rate signal is not limited to the above two signals in this application. In this application, only one biological feature may be collected, and of course, multiple biological features may also be collected.
在采集到了当前用户的生物特征的信号之后,根据当前用户的生物特征的信号,计算生物特征对应的特征向量。生物特征对应的特征向量具体包括所计算出的生物特征的信号对应的时域特征数据和频域特征数据,本申请中对此不作限定。After the signal of the biometric feature of the current user is collected, a feature vector corresponding to the biometric feature is calculated according to the signal of the biometric feature of the current user. The feature vector corresponding to the biological feature specifically includes time-domain feature data and frequency-domain feature data corresponding to the calculated signal of the biological feature, which is not limited in this application.
本申请实施例中,通过可穿戴设备采集当前用户的生物特征的信号,根据当前用户的生物特征的信号,计算生物特征对应的特征向量。将生物特征的信号转换为特征向量,通过以数据形式表示的特征向量就可以对当前用户的生物特征进行进一步精确地计算。从而,提高所判断出当前用户是否为合法用户的准确性。In the embodiment of the present application, the wearable device collects the signal of the biometric feature of the current user, and calculates the feature vector corresponding to the biometric feature according to the signal of the current user's biometric feature. The biometric signal is converted into a feature vector, and the biometric feature of the current user can be further accurately calculated through the feature vector represented in the form of data. Therefore, the accuracy of determining whether the current user is a legitimate user is improved.
接前一个实施例,将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果,包括:Continuing from the previous embodiment, comparing the biometrics of the current user with the biometrics pre-stored in the wearable device to obtain a comparison result, including:
将当前用户的生物特征对应的特征向量,与可穿戴设备中预存的生物特征对应的特征向量进行相似度比对得到比对结果。A comparison result is obtained by comparing the feature vector corresponding to the biometric feature of the current user with the feature vector corresponding to the biometric feature pre-stored in the wearable device.
如图5所示,提供了一种隐私信息保护方法,包括:As shown in Figure 5, a privacy information protection method is provided, including:
步骤520,通过可穿戴设备采集当前用户的生物特征的信号;Step 520, collecting the biometric signal of the current user through the wearable device;
步骤540,根据当前用户的生物特征的信号,计算生物特征对应的特征向量。Step 540: Calculate the feature vector corresponding to the biometric feature according to the signal of the current user's biometric feature.
步骤560,将当前用户的生物特征对应的特征向量,与可穿戴设备中预存的生物特征对应的特征向量进行相似度比对得到比对结果。Step 560: Compare the similarity between the feature vector corresponding to the biometric feature of the current user and the feature vector corresponding to the biometric feature pre-stored in the wearable device to obtain a comparison result.
步骤580,当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。
具体的,生物特征包括生物特征对应的特征向量,通过可穿戴设备采集当前用户的生物特征的信号,根据当前用户的生物特征的信号,计算生物特征对应的特征向量。将当前用户的生物特征对应的特征向量,与可穿戴设备中预存的生物特征对应的特征向量进行相似度比对得到比对结果。基于对比结果判断当前用户是否为合法用户,当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。当根据比对结果判断出当前用户是合法用户时,则控制可穿戴设备支持隐私信息的访问。Specifically, the biological feature includes a feature vector corresponding to the biological feature, the wearable device collects the signal of the current user's biological feature, and calculates the feature vector corresponding to the biological feature according to the signal of the current user's biological feature. A comparison result is obtained by comparing the feature vector corresponding to the biometric feature of the current user with the feature vector corresponding to the biometric feature pre-stored in the wearable device. Whether the current user is a legal user is determined based on the comparison result, and when it is determined that the current user is not a legal user according to the comparison result, the wearable device is controlled to not support access to private information. When it is determined that the current user is a legitimate user according to the comparison result, the wearable device is controlled to support access to private information.
与所采集的生物特征对应的特征向量具体包括所计算出的生物特征的信号对应的时域特征数据和频域特征数据对应,可穿戴设备中预存的生物特征对应的特征向量是机主用户的同一生物特征的信号对应的时域特征数据和频域特征数据。然后,就可以通过将时域特征数据和频域特征数据进行相似性对比,得到比对结果,例如相似度值。从而,基于对比结果就可以来进行判断当前用户是否为合法用户。当然,在进行相似度比较的时候,可以是仅对一个生物特征对应的特征向量来进行对比得到相似度值,也可以是对多个生物特征对应的特征向量分别进行对比,得到相似度均值。The feature vector corresponding to the collected biometrics specifically includes the corresponding time-domain feature data and frequency-domain feature data corresponding to the calculated biometric signal, and the feature vector corresponding to the biometrics pre-stored in the wearable device is that of the owner user. The time-domain feature data and the frequency-domain feature data corresponding to the signals of the same biological feature. Then, a comparison result, such as a similarity value, can be obtained by comparing the similarity between the time-domain feature data and the frequency-domain feature data. Thus, based on the comparison result, it can be determined whether the current user is a legitimate user. Of course, when comparing the similarity, the similarity value can be obtained by comparing only the feature vector corresponding to one biological feature, or the average similarity value can be obtained by comparing the feature vectors corresponding to multiple biological features respectively.
可穿戴设备上预设了相似度阈值,将所计算出的相似度值与相似度阈值进行比较,当所计算出的相似度值超过该相似度阈值,则就判断出当前用户是合法用户,不对可穿戴设备做出控制。当所计算出的相似度值未超过该相似度阈值,则就判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。A similarity threshold is preset on the wearable device, and the calculated similarity value is compared with the similarity threshold. When the calculated similarity value exceeds the similarity threshold, it is determined that the current user is a legitimate user. Wearables take control. When the calculated similarity value does not exceed the similarity threshold, it is determined that the current user is not a legitimate user, and the wearable device is controlled to not support access to private information.
本申请实施例中,通过可穿戴设备所采集的是当前用户的生物特征对应的特征向量,相应地,可穿戴设备中预存的是机主用户同一生物特征对应的特征向量。因此,将当前用户的生物特征对应的特征向量,与可穿戴设备中预存的生物特征对应的特征向量进行相似度比对得到比对结果。因为是将以数据形式表示的特征向量与特征向量之间进行对比,就可以提高比对过程的精确性。从而,提高所判断出当前用户是否为合法用户的准确性,并最终提升用户个人信息的安全性。In the embodiment of the present application, what is collected by the wearable device is the feature vector corresponding to the biometric feature of the current user, and correspondingly, the feature vector corresponding to the same biometric feature of the host user is pre-stored in the wearable device. Therefore, the feature vector corresponding to the biometric feature of the current user is compared with the feature vector corresponding to the biometric feature pre-stored in the wearable device to obtain a comparison result. Because the eigenvectors in the form of data are compared with the eigenvectors, the accuracy of the comparison process can be improved. Therefore, the accuracy of determining whether the current user is a legitimate user is improved, and the security of the user's personal information is finally improved.
在一个实施例中,通过可穿戴设备获取当前用户的生物特征,包括:In one embodiment, obtaining the biometrics of the current user through the wearable device includes:
当可穿戴设备接收到隐私消息时,通过可穿戴设备获取当前用户的生物特征。When the wearable device receives the privacy message, the wearable device obtains the biometric characteristics of the current user.
具体的,一般情况下,可穿戴设备需要进行解锁才能够使用可穿戴设备的高级功能,例如,通话、即时通讯、交易、提醒事项等,这些高级功能一般就会涉及到隐私信息。而解锁的认证信息(例如解锁密码、解锁指纹、解锁面孔等)一般不容易被别人窃取,所以当可穿戴设备被不是合法用户的使用者使用时,该使用者主动获取到机主用户的隐私信息的可能性较小。Specifically, in general, the wearable device needs to be unlocked to be able to use the advanced functions of the wearable device, such as calls, instant messaging, transactions, reminders, etc. These advanced functions generally involve private information. The unlocked authentication information (such as unlocking password, unlocking fingerprint, unlocking face, etc.) is generally not easy to be stolen by others, so when the wearable device is used by a user who is not a legitimate user, the user actively obtains the privacy of the owner user Information is less likely.
但是当可穿戴设备接收到发送来的隐私消息时,就会发生隐私信息泄露。例如,可穿戴设备接收到来电、新消息、新通知等,在接收到来电的情况下,直接就会在显示屏上显示出来,这样就会发生隐私信息泄露。在接收到新消息、新通知等的情况下,一般会在显示屏上显示提示,这样就会发生隐私信息泄露。且若机主用户设置可以在显示屏上直接显示新消息、新通知等的内容的话,就会泄露更多的隐私信息。However, when the wearable device receives the sent privacy message, privacy information leakage occurs. For example, when a wearable device receives an incoming call, new message, new notification, etc., when an incoming call is received, it will be displayed directly on the display screen, which will lead to the leakage of private information. In the case of receiving a new message, a new notification, etc., a prompt will generally be displayed on the display screen, so that privacy information leakage will occur. And if the owner user can set the content of new messages, new notifications, etc. to be displayed directly on the display screen, more private information will be leaked.
因此,提供了一种隐私保护方法,当可穿戴设备接收到隐私消息时,再通过可穿戴设备获取当前用户的生物特征。将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果。当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。而在可穿戴设备未接收到隐私消息时,就不需要通过可穿戴设备获取当前用户的生物特征,以及进行后续的合法用户的判断。例如,对于一些虹膜、指纹、用户面孔这种可以瞬间获取的生物特征,就可以当可穿戴设备接收到隐私消息时,再通过可穿戴设备获取当前用户的生物特征。Therefore, a privacy protection method is provided. When the wearable device receives the privacy message, the wearable device obtains the biometric characteristics of the current user. The comparison result is obtained by comparing the biometrics of the current user with the biometrics pre-stored in the wearable device. When it is determined according to the comparison result that the current user is not a legitimate user, the control wearable device does not support access to private information. However, when the wearable device does not receive the privacy message, there is no need to obtain the biometric characteristics of the current user through the wearable device, and to make subsequent judgments of legitimate users. For example, for some biometric features such as iris, fingerprint, and user face that can be obtained instantly, when the wearable device receives a private message, the wearable device can obtain the current user's biometric feature.
当然,还提供了一种隐私保护方法,通过可穿戴设备获取当前用户的生物特征,当可穿戴设备接收到隐私消息时,再将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果。当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。例如,对于一些心电特征、心率特征、血氧饱和度、行为特征(步态特征)等生物特征,需要通过对一段时间内的数据进行统计分析才能够得到,因此,当用户佩戴上可穿戴设备之后,就会统计当前用户的生物特征,以便当可穿戴设备接收到隐私消息时,再将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果。当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。Of course, a privacy protection method is also provided, which obtains the biometrics of the current user through the wearable device, and then compares the biometrics of the current user with the biometrics pre-stored in the wearable device when the wearable device receives the privacy message. Compare the results. When it is determined according to the comparison result that the current user is not a legitimate user, the control wearable device does not support access to private information. For example, some biological features such as ECG features, heart rate features, blood oxygen saturation, behavioral features (gait features), etc. can only be obtained by statistical analysis of the data over a period of time. Therefore, when the user wears a wearable After the device is installed, the biometrics of the current user will be counted, so that when the wearable device receives the privacy message, the biometrics of the current user will be compared with the biometrics pre-stored in the wearable device to obtain a comparison result. When it is determined according to the comparison result that the current user is not a legitimate user, the control wearable device does not support access to private information.
本申请实施例中,提出了当可穿戴设备接收到隐私信息的情况下,来通过生物特征比对的方式,当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。从而,可以在可穿戴设备未接收到隐私信息的情况下,不对可穿戴设备做出控制,避免了出于机主用户本意的借给他人使用时,却不能够正常使用的情况出现。In the embodiment of this application, it is proposed to compare the biometrics when the wearable device receives private information. When it is determined that the current user is not a legitimate user according to the comparison result, the wearable device is controlled not to support Access to Private Information. Therefore, when the wearable device does not receive the private information, the wearable device can not be controlled, so as to avoid the situation that the wearable device cannot be used normally when it is lent to others for use by the owner user's original intention.
在一个实施例中,第二模式的耗电量小于第一模式的耗电量。In one embodiment, the power consumption of the second mode is less than the power consumption of the first mode.
请参考图3所示,可穿戴设备上有两种模式,且可穿戴设备可在第一模式及第二模式之间切换。可穿戴设备上的第一模式可以称之为正常模式,在该正常模式下可穿戴设备上运行第一系统。可穿戴设备上的第二模式可以称之为省电模式,在该省电模式下可穿戴设备上运行第二系统。其中,第一系统可支持高级功能,第二系统不可支持高级功能,只能保证基础功能的实现。这里的基本功能,例如时间显示、计步、天气信息等,这些基本功能一般不会涉及到隐私信息。相应的,这里的高级的功能,例如通话、即时通讯、交易、提醒事项等,这些高级功能一般就会涉及到隐私信息。Please refer to FIG. 3 , there are two modes on the wearable device, and the wearable device can switch between the first mode and the second mode. The first mode on the wearable device may be referred to as a normal mode, in which the first system is run on the wearable device. The second mode on the wearable device may be referred to as a power saving mode, in which the second system runs on the wearable device. Among them, the first system can support advanced functions, and the second system cannot support advanced functions, and can only ensure the realization of basic functions. The basic functions here, such as time display, step counting, weather information, etc., generally do not involve private information. Correspondingly, the advanced functions here, such as calls, instant messaging, transactions, reminders, etc., generally involve private information.
其中,第一系统一般运行在主处理器上,例如中央处理器(Central ProcessUnit;CPU)上,而第二系统则运行在协处理器上,例如微控制单元(Microcontroller Unit,MCU)上。MCU是对CPU的频率、规格、内存等做适当缩减所得,因此,MCU在性能上比CPU差,功耗上显然也比CPU低。显然,第二模式的耗电量小于第一模式的耗电量。Wherein, the first system generally runs on a main processor, such as a central processing unit (Central ProcessUnit; CPU), and the second system runs on a coprocessor, such as a microcontroller unit (Microcontroller Unit, MCU). The MCU is obtained by appropriately reducing the frequency, specifications, and memory of the CPU. Therefore, the performance of the MCU is worse than that of the CPU, and the power consumption is obviously lower than that of the CPU. Obviously, the power consumption of the second mode is smaller than that of the first mode.
此处,第一系统可具体指的是Android系统、ios系统、symbian系统、WindowsPhone系统或其他可运行在可穿戴设备上支持高级功能的系统,本申请对第一系统不做具体限定。第二系统不可支持高级功能,只能保证基础功能的实现,对于可穿戴设备来说第二系统可以是RTOS系统,当然,本申请对第二系统不做具体限定。Here, the first system may specifically refer to an Android system, an ios system, a symbian system, a Windows Phone system, or other systems that can run on a wearable device to support advanced functions, and the application does not specifically limit the first system. The second system cannot support advanced functions, and can only ensure the realization of basic functions. For wearable devices, the second system may be an RTOS system. Of course, this application does not specifically limit the second system.
因为可穿戴设备可在第一模式及第二模式之间切换,所以当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备从第一模式切换至第二模式。即控制可穿戴设备从正常模式切换至省电模式。Because the wearable device can be switched between the first mode and the second mode, when it is determined according to the comparison result that the current user is not a legitimate user, the wearable device is controlled to switch from the first mode to the second mode. That is, the wearable device is controlled to switch from the normal mode to the power saving mode.
本申请实施例中,当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备从第一模式切换至第二模式。第二模式中不会涉及到隐私信息,因此就不会造成隐私信息的泄露。且第二模式的耗电量小于第一模式的耗电量,如此就可以延长可穿戴设备的使用时长。若此时可穿戴设备是处于丢失状态,则就可以延长寻找时间,增大了寻找回来的机会。In the embodiment of the present application, when it is determined according to the comparison result that the current user is not a legitimate user, the wearable device is controlled to switch from the first mode to the second mode. In the second mode, no private information is involved, so no leakage of private information will be caused. In addition, the power consumption of the second mode is smaller than that of the first mode, so that the use time of the wearable device can be prolonged. If the wearable device is in a lost state at this time, the search time can be extended, and the chance of finding it back can be increased.
在一个实施例中,隐私信息包括交互信息。In one embodiment, the private information includes interaction information.
本申请实施例中,通过可穿戴设备获取当前用户的生物特征,将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果。当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。这里,隐私信息包括通话、即时通讯、交易、提醒事项等交互信息。最终,使得当前用户不能够访问到该可穿戴设备上交互信息类的隐私信息,实现了对个人信息的保护,提升了个人信息的安全性。In the embodiment of the present application, the biometric feature of the current user is obtained through the wearable device, and the biometric feature of the current user is compared with the biometric feature pre-stored in the wearable device to obtain a comparison result. When it is determined according to the comparison result that the current user is not a legitimate user, the control wearable device does not support access to private information. Here, the private information includes interactive information such as calls, instant messaging, transactions, and reminders. Finally, the current user cannot access private information such as interactive information on the wearable device, thereby realizing the protection of personal information and improving the security of personal information.
在一个实施例中,生物特征包括生理特征或行为特征,生理特征包括心电特征、心率特征、血氧饱和度、指纹、虹膜中任意多种特征的组合。In one embodiment, the biological features include physiological features or behavioral features, and the physiological features include any combination of electrocardiographic features, heart rate features, blood oxygen saturation, fingerprints, and iris.
这里的行为特征,可以包括用户的行走步态等特征,当然,本申请对此不做限定。The behavior feature here may include features such as the user's walking gait, which, of course, is not limited in this application.
本申请实施例中,将可穿戴设备佩戴在用户的身上,就可以通过可穿戴设备上的传感器获取到当前用户的生物特征。这里,可以是获取某一种生物特征,也可以是获取多种生物特征,本申请对此不做限定。在进行相似度比较的时候,可以是仅对一个生物特征对应的特征向量来进行对比得到相似度值,也可以是对多个生物特征对应的特征向量分别进行对比,得到相似度均值。显然,通过多个生物特征对应的特征向量分别进行对比,得到相似度均值,并判断当前用户是否为合法用户的准确率更高,并最终提升用户个人信息的安全性。In this embodiment of the present application, when the wearable device is worn on the user's body, the biometric feature of the current user can be acquired through a sensor on the wearable device. Here, it may be to acquire a certain biological feature, or it may be to acquire multiple biological features, which is not limited in this application. When comparing the similarity, the similarity value may be obtained by comparing only the feature vector corresponding to one biological feature, or the average similarity value may be obtained by comparing the feature vectors corresponding to multiple biological features respectively. Obviously, by comparing the feature vectors corresponding to multiple biometrics, the average similarity is obtained, and the accuracy of judging whether the current user is a legitimate user is higher, and ultimately the security of the user's personal information is improved.
在一个具体的实施例中,如图6所示,提供了一种隐私保护方法,包括以下步骤:In a specific embodiment, as shown in Figure 6, a privacy protection method is provided, comprising the following steps:
步骤602,可穿戴设备接收到来电;
步骤604,通过可穿戴设备获取当前用户的心电特征或心率特征的信号;
步骤606,根据当前用户的心电特征或心率特征的信号,计算心电特征或心率特征对应的特征向量;
步骤608,将当前用户的心电特征或心率特征对应的特征向量,与可穿戴设备中预存的心电特征或心率特征对应的特征向量进行相似度比对,得到相似度值;
步骤610,判断所计算出的相似度值是否大于相似度阈值,相似度阈值为可穿戴设备上预设的阈值;若是,则进入步骤612;若否,则进入步骤614;
步骤612,判断出当前用户是合法用户,不对可穿戴设备做出控制;
步骤614,判断出当前用户不是合法用户时,则控制可穿戴设备不进行来电提醒,且触发从正常模式进入省电模式。
本申请实施例中,通过可穿戴设备获取当前用户的心电特征或心率特征,将当前用户的心电特征或心率特征与可穿戴设备中预存的心电特征或心率特征进行比对得到比对结果。当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不进行来电提醒,且触发从正常模式进入省电模式,在省电模式下不支持隐私信息的访问。因为可穿戴设备本身就具有检测用户的心电特征或心率特征的功能,因此,借助于特征对比的方式来判断当前用户是否为合法用户,不会耗费额外的软硬件成本,且准确性较高。从而,实现在判断出当前用户不是合法用户的情况下,控制可穿戴设备不支持隐私信息的访问。最终,使得当前用户不能够访问到该可穿戴设备隐私信息,实现了对个人信息的保护,提升了个人信息的安全性。In the embodiment of the present application, the current user's ECG characteristics or heart rate characteristics are obtained through the wearable device, and the current user's ECG characteristics or heart rate characteristics are compared with those pre-stored in the wearable device. result. When it is determined that the current user is not a legitimate user according to the comparison result, the wearable device is controlled not to remind the incoming call, and triggers to enter the power saving mode from the normal mode, and access to private information is not supported in the power saving mode. Because the wearable device itself has the function of detecting the user's ECG characteristics or heart rate characteristics, it will not cost extra hardware and software costs to judge whether the current user is a legitimate user by means of feature comparison, and the accuracy is high . Therefore, in the case that it is determined that the current user is not a legitimate user, the wearable device is controlled not to support access to private information. Ultimately, the current user cannot access the private information of the wearable device, thereby realizing the protection of personal information and improving the security of personal information.
应该理解的是,虽然图6的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图6中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the various steps in the flowchart of FIG. 6 are displayed in sequence according to the arrows, these steps are not necessarily executed in sequence according to the sequence indicated by the arrows. Unless explicitly stated herein, the execution of these steps is not strictly limited to the order, and these steps may be performed in other orders. Moreover, at least a part of the steps in FIG. 6 may include multiple sub-steps or multiple stages. These sub-steps or stages are not necessarily executed and completed at the same time, but may be executed at different times. The execution of these sub-steps or stages The sequence is also not necessarily sequential, but may be performed alternately or alternately with other steps or sub-steps of other steps or at least a portion of a phase.
在一个实施例中,如图7所示,还提供了一种隐私保护装置700,该装置包括:In one embodiment, as shown in FIG. 7, a privacy protection device 700 is also provided, and the device includes:
生物特征获取模块720,用于通过可穿戴设备获取当前用户的生物特征;a
特征比对模块740,用于将当前用户的生物特征与可穿戴设备中预存的生物特征进行比对得到比对结果;The
控制模块760,用于当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备不支持隐私信息的访问。The
在一个实施例中,可穿戴设备可在第一模式及第二模式之间切换,在第一模式下支持隐私信息的访问,在第二模式下不支持隐私信息的访问;控制模块760,还用于当根据比对结果判断出当前用户不是合法用户时,则控制可穿戴设备从第一模式切换至第二模式。In one embodiment, the wearable device can be switched between a first mode and a second mode, in which the access to private information is supported in the first mode, and the access to private information is not supported in the second mode; the
在一个实施例中,控制模块760,还用于当根据比对结果判断出当前用户是合法用户时,则控制可穿戴设备支持隐私信息的访问。In one embodiment, the
在一个实施例中,生物特征包括生物特征对应的特征向量;通过可穿戴设备获取当前用户的生物特征,生物特征获取模块720,还用于通过可穿戴设备采集当前用户的生物特征的信号;根据当前用户的生物特征的信号,计算生物特征对应的特征向量。In one embodiment, the biometrics include a feature vector corresponding to the biometrics; the biometrics of the current user is acquired through the wearable device, and the
在一个实施例中,特征比对模块740,还用于将当前用户的生物特征对应的特征向量,与可穿戴设备中预存的生物特征对应的特征向量进行相似度比对得到比对结果。In one embodiment, the
在一个实施例中,生物特征获取模块720,还用于当可穿戴设备接收到隐私消息时,通过可穿戴设备获取当前用户的生物特征。In one embodiment, the
在一个实施例中,第二模式的耗电量小于第一模式的耗电量。In one embodiment, the power consumption of the second mode is less than the power consumption of the first mode.
在一个实施例中,隐私信息包括交互信息。In one embodiment, the private information includes interaction information.
在一个实施例中,生物特征包括生理特征或行为特征,生理特征包括心电特征、心率特征、血氧饱和度、指纹、虹膜中任意多种特征的组合。In one embodiment, the biological features include physiological features or behavioral features, and the physiological features include any combination of electrocardiographic features, heart rate features, blood oxygen saturation, fingerprints, and iris.
上述隐私保护装置中各个模块的划分仅用于举例说明,在其他实施例中,可将隐私保护装置按照需要划分为不同的模块,以完成上述隐私保护装置的全部或部分功能。The division of each module in the above privacy protection device is only used for illustration. In other embodiments, the privacy protection device may be divided into different modules as required to complete all or part of the functions of the above privacy protection device.
关于隐私保护装置的具体限定可以参见上文中对于隐私保护方法的限定,在此不再赘述。上述隐私保护装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。For the specific limitation of the privacy protection device, reference may be made to the limitation of the privacy protection method above, which will not be repeated here. Each module in the above privacy protection device may be implemented in whole or in part by software, hardware and combinations thereof. The above modules can be embedded in or independent of the processor in the computer device in the form of hardware, or stored in the memory in the computer device in the form of software, so that the processor can call and execute the operations corresponding to the above modules.
图8为一个实施例中可穿戴设备的内部结构示意图。如图8所示,该可穿戴设备包括通过系统总线连接的处理器和存储器。其中,该处理器用于提供计算和控制能力,支撑整个可穿戴设备的运行。存储器可包括非易失性存储介质及内存储器。非易失性存储介质存储有操作系统和计算机程序。该计算机程序可被处理器所执行,以用于实现以下各个实施例所提供的一种隐私保护方法。内存储器为非易失性存储介质中的操作系统计算机程序提供高速缓存的运行环境。FIG. 8 is a schematic diagram of the internal structure of a wearable device in one embodiment. As shown in Figure 8, the wearable device includes a processor and a memory connected through a system bus. Among them, the processor is used to provide computing and control capabilities to support the operation of the entire wearable device. The memory may include non-volatile storage media and internal memory. The nonvolatile storage medium stores an operating system and a computer program. The computer program can be executed by the processor to implement a privacy protection method provided by the following embodiments. Internal memory provides a cached execution environment for operating system computer programs in non-volatile storage media.
本申请实施例中提供的隐私保护装置中的各个模块的实现可为计算机程序的形式。该计算机程序可在可穿戴设备上运行。该计算机程序构成的程序模块可存储在可穿戴设备的存储器上。该计算机程序被处理器执行时,实现本申请实施例中所描述方法的步骤。The implementation of each module in the privacy protection apparatus provided in the embodiments of the present application may be in the form of a computer program. The computer program can be run on the wearable device. The program modules formed by the computer program can be stored on the memory of the wearable device. When the computer program is executed by the processor, the steps of the methods described in the embodiments of the present application are implemented.
本申请实施例还提供了一种计算机可读存储介质。一个或多个包含计算机可执行指令的非易失性计算机可读存储介质,当计算机可执行指令被一个或多个处理器执行时,使得处理器执行隐私保护方法的步骤。Embodiments of the present application also provide a computer-readable storage medium. One or more non-volatile computer-readable storage media containing computer-executable instructions, when executed by one or more processors, cause the processors to perform the steps of the privacy-preserving method.
一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行隐私保护方法。A computer program product containing instructions, when executed on a computer, causes the computer to perform a privacy-preserving method.
本申请实施例所使用的对存储器、存储、数据库或其它介质的任何引用可包括非易失性和/或易失性存储器。合适的非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM),它用作外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDR SDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)。Any reference to a memory, storage, database, or other medium as used in embodiments of the present application may include non-volatile and/or volatile memory. Suitable nonvolatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory. Volatile memory may include random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in various forms such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), Memory Bus (Rambus) Direct RAM (RDRAM), Direct Memory Bus Dynamic RAM (DRDRAM), and Memory Bus Dynamic RAM (RDRAM).
以上实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对本申请专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。The above examples only represent several embodiments of the present application, and the descriptions thereof are relatively specific and detailed, but should not be construed as a limitation on the scope of the patent of the present application. It should be pointed out that for those skilled in the art, without departing from the concept of the present application, several modifications and improvements can be made, which all belong to the protection scope of the present application. Therefore, the scope of protection of the patent of the present application shall be subject to the appended claims.
Claims (12)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010199800.6A CN113496021A (en) | 2020-03-20 | 2020-03-20 | Privacy protection method and device, wearable device and computer-readable storage medium |
PCT/CN2021/075142 WO2021184991A1 (en) | 2020-03-20 | 2021-02-04 | Privacy protection method and apparatus, wearable device, and computer-readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010199800.6A CN113496021A (en) | 2020-03-20 | 2020-03-20 | Privacy protection method and device, wearable device and computer-readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113496021A true CN113496021A (en) | 2021-10-12 |
Family
ID=77768330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010199800.6A Pending CN113496021A (en) | 2020-03-20 | 2020-03-20 | Privacy protection method and device, wearable device and computer-readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113496021A (en) |
WO (1) | WO2021184991A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023142743A1 (en) * | 2022-01-26 | 2023-08-03 | Oppo广东移动通信有限公司 | Device unlocking method and apparatus, electronic device and computer-readable storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103699825A (en) * | 2012-09-27 | 2014-04-02 | Lg电子株式会社 | Display apparatus and method for operating the same |
CN105204931A (en) * | 2014-06-11 | 2015-12-30 | 联发科技(新加坡)私人有限公司 | Low-power wearable equipment and multi-operation system switching, communication and management method thereof |
CN105243341A (en) * | 2015-06-05 | 2016-01-13 | 深圳金澜汉源科技有限公司 | Information security electronic equipment and application architecture |
CN105701383A (en) * | 2015-12-30 | 2016-06-22 | 魅族科技(中国)有限公司 | Function triggering method, device and terminal |
CN106293071A (en) * | 2016-07-28 | 2017-01-04 | 宇龙计算机通信科技(深圳)有限公司 | The mode switching method of a kind of wearable device and wearable device |
CN106909821A (en) * | 2017-01-20 | 2017-06-30 | 奇酷互联网络科技(深圳)有限公司 | The control method of terminal, device and terminal device |
CN106960147A (en) * | 2017-04-11 | 2017-07-18 | 广东小天才科技有限公司 | Privacy information protection method and device and user equipment |
CN108038360A (en) * | 2017-11-15 | 2018-05-15 | 维沃移动通信有限公司 | The switching method and mobile terminal of a kind of operational mode |
CN108537025A (en) * | 2018-03-29 | 2018-09-14 | 广东欧珀移动通信有限公司 | Privacy protection method and device, computer readable storage medium and terminal |
CN110414198A (en) * | 2019-08-07 | 2019-11-05 | Oppo(重庆)智能科技有限公司 | A kind of privacy application guard method, device and computer readable storage medium |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105678539A (en) * | 2016-01-11 | 2016-06-15 | 广东小天才科技有限公司 | NFC payment method of wearable device |
CN107528691A (en) * | 2016-06-21 | 2017-12-29 | 中兴通讯股份有限公司 | Communication security control method and wearable device |
KR102288302B1 (en) * | 2017-07-03 | 2021-08-10 | 삼성전자주식회사 | Authentication method and authentication apparatus using infrared ray(ir) image |
KR102520199B1 (en) * | 2018-07-23 | 2023-04-11 | 삼성전자주식회사 | Electronic apparatus and controlling method thereof |
-
2020
- 2020-03-20 CN CN202010199800.6A patent/CN113496021A/en active Pending
-
2021
- 2021-02-04 WO PCT/CN2021/075142 patent/WO2021184991A1/en active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103699825A (en) * | 2012-09-27 | 2014-04-02 | Lg电子株式会社 | Display apparatus and method for operating the same |
CN105204931A (en) * | 2014-06-11 | 2015-12-30 | 联发科技(新加坡)私人有限公司 | Low-power wearable equipment and multi-operation system switching, communication and management method thereof |
CN105243341A (en) * | 2015-06-05 | 2016-01-13 | 深圳金澜汉源科技有限公司 | Information security electronic equipment and application architecture |
CN105701383A (en) * | 2015-12-30 | 2016-06-22 | 魅族科技(中国)有限公司 | Function triggering method, device and terminal |
CN106293071A (en) * | 2016-07-28 | 2017-01-04 | 宇龙计算机通信科技(深圳)有限公司 | The mode switching method of a kind of wearable device and wearable device |
CN106909821A (en) * | 2017-01-20 | 2017-06-30 | 奇酷互联网络科技(深圳)有限公司 | The control method of terminal, device and terminal device |
CN106960147A (en) * | 2017-04-11 | 2017-07-18 | 广东小天才科技有限公司 | Privacy information protection method and device and user equipment |
CN108038360A (en) * | 2017-11-15 | 2018-05-15 | 维沃移动通信有限公司 | The switching method and mobile terminal of a kind of operational mode |
CN108537025A (en) * | 2018-03-29 | 2018-09-14 | 广东欧珀移动通信有限公司 | Privacy protection method and device, computer readable storage medium and terminal |
CN110414198A (en) * | 2019-08-07 | 2019-11-05 | Oppo(重庆)智能科技有限公司 | A kind of privacy application guard method, device and computer readable storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023142743A1 (en) * | 2022-01-26 | 2023-08-03 | Oppo广东移动通信有限公司 | Device unlocking method and apparatus, electronic device and computer-readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2021184991A1 (en) | 2021-09-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10599862B2 (en) | Wearable device multi-mode system | |
CN107592419B (en) | Display screen awakening method, device and mobile terminal based on fingerprint sensor | |
KR102354586B1 (en) | Method for controlling according to state and electronic device thereof | |
US20180314536A1 (en) | Method and apparatus for invoking function in application | |
US9866555B2 (en) | Maintaining user authentications with common trusted devices | |
EP2879095B1 (en) | Method, apparatus and terminal device for image processing | |
CN107113611B (en) | User authentication confidence based on multiple devices | |
TWI698800B (en) | Information image display method and device | |
JP2018513438A (en) | Asset accessibility with continuous authentication for mobile devices | |
WO2020078094A1 (en) | Unlocking method and apparatus, and door lock | |
CN106709301A (en) | Intelligent watch and locking control method and device for intelligent wearable equipment | |
CN110472504A (en) | A kind of method and apparatus of recognition of face | |
CN108804006A (en) | Unlocking method, device, equipment and storage medium for wearable equipment | |
US20190386988A1 (en) | Biometric user's authentication | |
US20180012005A1 (en) | System, Method, and Apparatus for Personal Identification | |
CN107391993A (en) | A kind of unlocked by fingerprint method and unlocked by fingerprint system based on intelligent terminal | |
CN106446627A (en) | Method and device for carrying out identity authentication at electronic terminal | |
CN110049490B (en) | Safety protection method and device for wearable equipment, wearable equipment and medium | |
US11507652B2 (en) | Protecting communication devices from unwanted access | |
WO2021184991A1 (en) | Privacy protection method and apparatus, wearable device, and computer-readable storage medium | |
CN108537025B (en) | Privacy protection method and device, computer readable storage medium and terminal | |
CN108628434A (en) | A kind of wearable device induction Verification System and method | |
US20220414194A1 (en) | Method and system for user authentication | |
CN112016071A (en) | Unlocking method, device and readable storage medium based on verifier state and environment | |
CN115146254A (en) | Unlocking method and device, wearable device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |