[go: up one dir, main page]

CN115080938A - Privacy protection method, system, computer equipment and readable storage medium - Google Patents

Privacy protection method, system, computer equipment and readable storage medium Download PDF

Info

Publication number
CN115080938A
CN115080938A CN202210656153.6A CN202210656153A CN115080938A CN 115080938 A CN115080938 A CN 115080938A CN 202210656153 A CN202210656153 A CN 202210656153A CN 115080938 A CN115080938 A CN 115080938A
Authority
CN
China
Prior art keywords
privacy
protection
identity authentication
data
privacy protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210656153.6A
Other languages
Chinese (zh)
Inventor
王世栋
陈明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yancheng Hongshi Intelligent Technology Co ltd
Original Assignee
Yancheng Hongshi Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yancheng Hongshi Intelligent Technology Co ltd filed Critical Yancheng Hongshi Intelligent Technology Co ltd
Priority to CN202210656153.6A priority Critical patent/CN115080938A/en
Publication of CN115080938A publication Critical patent/CN115080938A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及隐私保护技术领域,具体公开了一种隐私保护方法、系统、计算机设备及可读存储介质,所述隐私保护方法包括以下步骤;一、用户通过预设的身份认证方式进行身份认证,若认证通过,进入隐私保护模式;否则进入虚拟操作环境;二、用户操作设定的隐私保护数据,系统将所有隐私数据自动复制到隐私空间,记录下所有的操作记录;三、用户退出隐私模式,系统根据步骤2中的记录下来的操作记录,删除原位置的隐私数据;本发明实施例提供的隐私保护方法在具备降低被攻击的风险的同时还具备抵御暴力攻击的优势。

Figure 202210656153

The invention relates to the technical field of privacy protection, and specifically discloses a privacy protection method, a system, a computer device and a readable storage medium. The privacy protection method includes the following steps: 1. A user performs identity authentication through a preset identity authentication method, If the authentication is passed, enter the privacy protection mode; otherwise, enter the virtual operating environment; 2. The user operates the privacy protection data set by the system, and the system automatically copies all privacy data to the privacy space and records all operation records; 3. The user exits the privacy mode , the system deletes the privacy data in the original location according to the operation record recorded in step 2; the privacy protection method provided by the embodiment of the present invention has the advantage of resisting brute force attacks while reducing the risk of being attacked.

Figure 202210656153

Description

Privacy protection method, system, computer equipment and readable storage medium
Technical Field
The invention relates to the technical field of privacy protection, in particular to a privacy protection method, a privacy protection system, computer equipment and a readable storage medium.
Background
Along with the frequent occurrence of information security events, privacy protection becomes a topic which is more and more emphasized by people, especially the information protection of mobile terminals, and people urgently need a set of effective, safe and comprehensive privacy protection scheme.
In the prior art, privacy protection is implemented by manually adding a protection object in an encrypted or isolated manner, including: contacts (short messages, call records), photos, files, etc., for static protection. Static protection means that the protection mode is fixed and unchangeable, and the mode is unchangeable and is easy to be attacked by violence. Because the protection of the information needs to be manually added in advance, the information is often ignored due to forgetting or complicated operation and other factors, so that information leakage is caused.
In view of the above-mentioned problems in the background art, the present invention is directed to a privacy protecting method, system, computer device and readable storage medium.
Disclosure of Invention
Embodiments of the present invention provide a privacy protection method, system, computer device, and readable storage medium, so as to achieve automatic protection of privacy content, and provide security and rapidness.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions:
a privacy protection method is applied to a computer device with an operation display screen, and comprises the following steps:
the user performs identity authentication in a preset identity authentication mode, if the authentication is passed, the user enters a privacy protection mode, otherwise, the user enters a virtual operating environment;
the user operates the set privacy protection data, the system automatically copies all the privacy data to the privacy space, and records all the operation records; and
the user exits the privacy mode, and the system deletes the privacy data of the original position according to the recorded operation record in S200.
As a further limitation of the technical solution of the embodiment of the present invention, a method is formed in which the user performs identity authentication in a preset identity authentication manner, and if the authentication is passed, the method enters a privacy protection mode, otherwise, the method enters a virtual operating environment, and includes the following specific steps:
when the identity preset by the user needs to be authenticated, a camera on computer equipment can be used for photographing and identifying a face image of the user, an operator can be used for inputting a verification password to perform identity authentication, and similarly, fingerprint information of the user can also be used for performing identification authentication;
when the identity authentication fails, a virtual operating environment generated by the process protection module is entered, and the virtual operating environment is consistent with the operating environment for correct identity authentication, so that the risk of cracking can be reduced to the maximum extent; when the identity authentication fails for many times and continuously for an illegal person, the system adopts related operations such as time delay, locking and the like, and finally protects the data in a data destruction mode.
A privacy protection system for use with a computer device having an operating display screen, the privacy protection system comprising:
the privacy space module 11 is used for providing functions such as privacy data storage, privacy data management and related settings, and is an entrance of all privacy protection modules;
the process protection and action module 12 is used for protecting illegal access and attempted attack behaviors which may occur to the maximum extent in the operation process of the private data, and provides functions including identity authentication, virtual operation environment, attack detection, data destruction and the like;
a position information protection and action module 13, which is used for providing a protection function for the GPS position information;
a contact protection and action module 14, configured to provide a protection function related to a contact, including contents such as a call record, a caller id display, and a short message;
a multimedia protection and action module 15, which is used for providing the protection function of the files such as characters, audio, video, multimedia and the like; and
and a file protection and action module 16 for providing protection functions for other types of files.
A computer device comprising an operating display, a memory, a processor and a computer program, wherein the memory has stored therein the computer program which, when executed by the processor, causes the processor to carry out the steps of the anti-face recognition method.
A readable storage medium having stored thereon a computer program which, when executed by a processor, causes the processor to carry out the steps of the anti-face recognition method.
Compared with the prior art, the invention has the beneficial effects that:
the privacy protection method provided by the embodiment of the invention has the advantages of reducing the attacked risk and resisting the violent attack on the one hand, and enables the user to set the automatic addition of the protection content on the other hand, so that the method is safe and quick; more importantly, the privacy content can be protected more comprehensively and completely in the use process of an operator.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
Fig. 1 is a flowchart of a privacy protection method according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a privacy protection system according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a computer device in an embodiment of the present invention.
Fig. 4 is a schematic diagram illustrating a connection relationship between a readable storage medium and a processor in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that, although the terms first, second, etc. may be used herein to describe various functional blocks in embodiments of the present invention, these functional blocks should not be limited by these terms. These terms are only used to distinguish one type of functional module from another. For example, a first determination module may also be referred to as a second determination module without necessarily requiring or implying any such actual relationship or order between such entities or operations without departing from the scope of embodiments of the present invention. Similarly, the second determination module may also be referred to as the first determination module. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
It can be understood that, along with the frequent occurrence of events of information security, privacy protection becomes a topic that people pay more and more attention to, especially, information protection of mobile terminal, and people urgently need a set of effective, safe, comprehensive privacy protection scheme, and in the prior art, privacy protection is in an encrypted or isolated manner, and protection objects are manually added, including: contacts (short messages, call records), photos, files, etc., for static protection. Static protection means that the protection mode is fixed and unchangeable, and the mode is unchangeable and is easy to be attacked by violence. Because the protection of the information needs to be manually added with the protection content in advance, the protection content is often ignored due to factors such as forgetting or complicated operation, and the like, so that the information leakage is caused, and in addition, the original protection content is not complete and comprehensive, and the like, which are defects existing in the prior art;
in the prior art, privacy protected content is protected by manually adding a protected object in an encrypted or isolated manner, including: contacts (short messages, call records), photos, files, etc., for static protection;
this approach has the following disadvantages: firstly, the device is easy to be attacked by violence; secondly, the protection of the information needs to manually add protection content in advance, and the information is often ignored due to forgetting or complicated operation and other factors, so that information leakage is caused; thirdly, the original protection content is incomplete and comprehensive;
in the embodiment of the invention, after the identity authentication of the operator is wrong, the operator enters the virtual operating environment, so that information leakage is prevented, the attack risk is reduced, and the protection content can be automatically added in the privacy protection mode;
in this way, the following advantages exist: firstly, the risk of being attacked is reduced, and meanwhile, violent attack can be resisted; secondly, the user can set to automatically add the protection content, so that the method is safe and fast; thirdly, the privacy content is protected more comprehensively and completely.
Examples
Fig. 1 shows a flowchart of a privacy protection method provided in an embodiment of the present invention, where the privacy protection method is applied to a computer device with an operation display screen, where the computer device may be a mobile phone, a notebook, or other communication devices, and is not particularly limited, and the privacy protection method is detailed as follows:
and S100, the user performs identity authentication in a preset identity authentication mode, if the authentication is passed, the user enters a privacy protection mode, and otherwise, the user enters a virtual operating environment.
In the embodiment of the invention, when the identity preset by the user needs to be authenticated, the camera on the computer equipment can be used for photographing and identifying the face image of the user, the verification password can be input by an operator for identity authentication, and similarly, the fingerprint information of the user can also be used for identification authentication; it can be understood that the authentication of the user in the embodiment of the present invention is performed in various ways, such as facial authentication, password authentication, fingerprint authentication, and the authentication of the user can be flexibly set according to actual needs, and is not limited herein;
when identity authentication is performed, when the identity authentication fails, the conventional method is to pop up a corresponding failure prompt, which causes a problem that an information is essentially revealed to an illegal person: the terminal has private data present thereon. Therefore, the target of attack can be easily locked by the stealer, and brute force cracking can be implemented.
In the embodiment of the invention, in order to prevent the situation, when the identity authentication fails, a virtual operating environment generated by a process protection module is entered, and the virtual operating environment is consistent with the operating environment of correct identity authentication, so that the risk of being cracked can be reduced to the maximum extent; when the identity authentication fails for many times and continuously for an illegal person, the system adopts related operations such as time delay, locking and the like, and finally protects the data in a data destruction mode.
Step S200, the user operates the set privacy protection data, the system automatically copies all privacy data to the privacy space, and records all operation records.
In the embodiment of the invention, a user enters a privacy space after passing identity authentication, and then virtual position information is set; meanwhile, the protection is mainly carried out in an isolated mode aiming at the passing of the record and the short message, and the display of the incoming call and the short message notification are mainly carried out in a simulated mode; in order to prevent the information of the incoming call from being leaked, the incoming call can be set to be displayed as other numbers and names; files such as characters, audio, video, multimedia and the like generated in the operation process are mainly protected in an isolation and encryption mode, and a user can enter a privacy space, manually add protected contents, or automatically add protected contents by entering a privacy mode;
in step S300, the user exits the privacy mode, and the system deletes the privacy data of the original position according to the recorded operation record in step S200.
Fig. 2 shows a privacy protection system according to a further embodiment of the present invention, which is applied to a computer device having a display screen, where the privacy protection system 10 includes:
the privacy space module 11 is used for providing functions of privacy data storage, privacy data management, related settings and the like, and is an entrance of all privacy protection modules;
the process protection and action module 12 is used for protecting illegal access and attempted attack behaviors which may occur to the maximum extent in the operation process of the private data, and provides functions including identity authentication, virtual operation environment, attack detection, data destruction and the like.
In the embodiment of the present invention, in order to protect the private data to the maximum extent, the following processing is performed for the following specific situations: (1) when identity authentication is performed, when the identity authentication fails, the conventional method is to pop up a corresponding failure prompt, which causes a problem that an information is essentially revealed to an illegal person: the terminal has private data present thereon. Therefore, the target of attack can be easily locked by the stealer, and brute force cracking can be implemented. In order to prevent the situation, when the identity authentication fails, a virtual operating environment generated by a process protection module can be entered, and the virtual operating environment is consistent with the operating environment of correct identity authentication, so that the risk of cracking can be reduced to the maximum extent; (2) when identity authentication fails for an illegal person for multiple times and continuously, the system adopts related operations such as time delay, locking and the like, and finally protects the data in a data destruction mode;
a position information protection and action module 13, which is used for providing a protection function for the GPS position information;
in the embodiment of the present invention, the position information protection and action module 13 simulates a false position information mainly by a simulation mode, so as to prevent the position information from leaking; and the user enters the privacy space after passing the identity authentication, and then sets the virtual position information.
A contact protection and action module 14, configured to provide a protection function related to a contact, including contents such as a call record, a caller id display, and a short message;
in the embodiment of the present invention, the contact protection and action module 14 mainly performs protection in an isolated manner for the record and the short message, and displays the incoming call and performs short message notification in an analog manner, for example, chinese movement (10086) for a specific contact is displayed on a phonebook, and when the incoming call is set, other numbers and names are displayed to prevent the incoming call information from being leaked. After passing the identity authentication, the user enters a privacy space and performs related setting;
and the multimedia protection and action module 15 is used for providing the protection function of the files of characters, audio, video, multimedia and the like.
In the embodiment of the present invention, the multimedia protection and action module 15 mainly performs protection in an isolated and encrypted manner. The user can manually add the protected content by entering the privacy space, and can automatically add the protected content by entering the privacy mode, namely the privacy protection method is provided by the invention.
And a file protection and action module 16 for providing protection functions for other types of files.
In the embodiment of the present invention, the file protection and action module 16 mainly performs protection in an isolation and encryption manner, and a user may enter a privacy space and then add protected contents manually, or may automatically add protected contents by entering a privacy mode.
Fig. 3 shows a schematic structural diagram of a computer device provided in an embodiment of the present invention, the computer device includes an operation display 18, a memory 20, a processor 19, and a computer program 21, where the memory 20 stores the computer program 21, and when the computer program 21 is executed by the processor 19, the processor 19 is caused to execute the steps of the privacy protection method.
It is understood that, in the preferred embodiment provided by the present invention, the computer device may also be a notebook computer, a Personal Digital Assistant (PDA), a mobile phone, or other devices capable of communicating.
Fig. 4 shows a schematic diagram of a readable storage medium 22, on which a computer program 21 is stored, according to an embodiment of the present invention, where the computer program 25, when executed by the processor 19, causes the processor 19 to perform the steps of the privacy protecting method.
Illustratively, a computer program can be partitioned into one or more modules, which are stored in memory and executed by a processor to implement the present invention. One or more of the modules may be a series of computer program instruction segments capable of performing certain functions, which are used to describe the execution of the computer program in the terminal device. For example, the computer program may be divided into units or modules of the berth-status display system provided by the various system embodiments described above.
Those skilled in the art will appreciate that the above description of the terminal device is merely exemplary and not limiting, and that more or fewer components than those described above may be included, or certain components may be combined, or different components may be included, such as input output devices, network access devices, buses, etc.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like, which is the control center of the terminal equipment and connects the various parts of the entire user terminal using various interfaces and lines.
The memory may be used to store computer programs and/or modules, and the processor may implement various functions of the terminal device by operating or executing the computer programs and/or modules stored in the memory and calling data stored in the memory. The memory mainly comprises a storage program area and a storage data area, wherein the storage program area can store an operating system, application programs (such as an information acquisition template display function, a product information publishing function and the like) required by at least one function and the like; the storage data area may store data created according to the use of the berth-state display system (e.g., product information acquisition templates corresponding to different product types, product information that needs to be issued by different product providers, etc.), and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The terminal device integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the modules/units in the system according to the above embodiments may be implemented by a computer program, which may be stored in a computer-readable storage medium and used by a processor to implement the functions of the system embodiments. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, U.S. disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution media, and the like.
The human face anti-recognition method provided by the embodiment of the invention obtains the human face image to be recognized in front of the display screen; extracting regional characteristic information in the face image; matching the regional characteristic information with a preset human face characteristic database; confirming the identity information of a face image to be recognized; acquiring regional characteristic information of the confirmed face image, replacing the regional characteristic information to generate target face information, identifying the target face information by using detection equipment, and storing the target face information when the detection equipment cannot identify the target face information; therefore, the face image information can be protected in the process of face recognition of people, and the information safety of people is guaranteed.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (5)

1.一种隐私保护方法,应用于具有操作显示屏的计算机设备,其特征在于,所述方法包括:1. A privacy protection method, applied to a computer device with an operation display screen, wherein the method comprises: 用户通过预设的身份认证方式进行身份认证,若认证通过,进入隐私保护模式,否则,进入虚拟操作环境;The user performs identity authentication through the preset identity authentication method. If the authentication is passed, the privacy protection mode is entered; otherwise, the virtual operating environment is entered; 用户操作设定的隐私保护数据,系统将所有隐私数据自动复制到隐私空间,记录下所有的操作记录;以及For the privacy protection data set by the user's operation, the system will automatically copy all the privacy data to the privacy space, and record all the operation records; and 用户退出隐私模式,系统根据步骤二中的记录下来的操作记录,删除原位置的隐私数据。The user exits the privacy mode, and the system deletes the privacy data in the original location according to the operation record recorded in step 2. 2.根据权利要求1所述的隐私保护方法,其特征在于,形成所述用户通过预设的身份认证方式进行身份认证,若认证通过,进入隐私保护模式,否则,进入虚拟操作环境的方法包括以下具体步骤:2. The privacy protection method according to claim 1, wherein the user is formed to perform identity authentication through a preset identity authentication method, and if the authentication is passed, the privacy protection mode is entered, otherwise, the method for entering the virtual operating environment comprises: The following specific steps: 当需要进行用户预设的身份实现认证时,可以利用计算机设备上的摄像头对着用户的人脸图像进行拍照识别,可以利用操作者输入验证密码进行身份认证,同样,也可以利用用户的指纹信息进行识别认证;When the user's preset identity needs to be authenticated, the camera on the computer device can be used to take a photo of the user's face image for identification, the operator can input the verification password for identity authentication, and similarly, the user's fingerprint information can also be used. carry out identification and authentication; 在当身份认证失败的时候,会进入一个由过程保护模块产生的虚拟操作环境,该虚拟操作环境与正确身份认证的操作环境一致,这样就能最大限度降低被破解的风险;对非法者多次、连续出现身份认证失败时,系统将采取延时、锁定等相关操作,最终以销毁数据的方式来对数据进行保护。When the identity authentication fails, it will enter a virtual operating environment generated by the process protection module, which is consistent with the operating environment of the correct identity authentication, so as to minimize the risk of being cracked; , When the identity authentication fails continuously, the system will take related operations such as delay and lock, and finally protect the data by destroying the data. 3.一种隐私保护系统,其特征在于,应用于具有操作显示屏的计算机设备,隐私保护系统包括:3. A privacy protection system, characterized in that, applied to a computer device with an operation display screen, the privacy protection system comprising: 隐私空间模块11,用于提供隐私数据存放、隐私数据管理、相关设置等功能,是所有隐私保护模块的入口;The privacy space module 11 is used to provide functions such as privacy data storage, privacy data management, and related settings, and is the entrance of all privacy protection modules; 过程保护与作用模块12,用于指在隐私数据操作过程中,对可能出现的非法访问、试图攻击的行为进行最大限度的保护,提供了包括身份认证、虚拟操作环境、攻击检测、数据销毁等功能;The process protection and action module 12 is used to protect the possible illegal access and attempted attacks to the greatest extent during the operation of private data, and provides services including identity authentication, virtual operating environment, attack detection, data destruction, etc. Function; 位置信息保护与作用模块13,用于提供对GPS位置信息的保护功能;The location information protection and function module 13 is used to provide the protection function for GPS location information; 联系人保护与作用模块14,用于提供与联系人有关的,包括通话记录、来电显示、短信等内容的保护功能;The contact protection and action module 14 is used to provide protection functions related to contacts, including call records, caller ID, text messages, etc.; 多媒体保护与作用模块15,用于提供文字、音频、视频、多媒体的等文件的保护功能;以及The multimedia protection and action module 15 is used to provide protection functions for text, audio, video, multimedia and other files; and 文件保护与作用模块16,用于提供其他类型文件的保护功能。The file protection and action module 16 is used to provide protection functions for other types of files. 4.一种计算机设备,其特征在于,包括操作显示屏、存储器、处理器以及计算机程序,其中所述存储器中存储有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器执行权利要求1-2任一项权利要求所述隐私保护方法的步骤。4. A computer device, characterized in that it comprises an operation display screen, a memory, a processor and a computer program, wherein the memory stores a computer program, and when the computer program is executed by the processor, the processing The device executes the steps of the privacy protection method described in any one of claims 1-2. 5.一种可读存储介质,其特征在于,所述可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时,使得所述处理器执行权利要求1-2任一项权利要求所述隐私保护方法的步骤。5. A readable storage medium, characterized in that, a computer program is stored on the readable storage medium, and when the computer program is executed by a processor, the processor causes the processor to execute any one of claims 1-2 Steps of the described privacy-preserving method are required.
CN202210656153.6A 2022-06-10 2022-06-10 Privacy protection method, system, computer equipment and readable storage medium Pending CN115080938A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210656153.6A CN115080938A (en) 2022-06-10 2022-06-10 Privacy protection method, system, computer equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210656153.6A CN115080938A (en) 2022-06-10 2022-06-10 Privacy protection method, system, computer equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN115080938A true CN115080938A (en) 2022-09-20

Family

ID=83251843

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210656153.6A Pending CN115080938A (en) 2022-06-10 2022-06-10 Privacy protection method, system, computer equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN115080938A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020112161A1 (en) * 2001-02-13 2002-08-15 Thomas Fred C. Method and system for software authentication in a computer system
CN105208211A (en) * 2015-09-29 2015-12-30 努比亚技术有限公司 Privacy protection device and method and mobile terminal
CN109978549A (en) * 2019-02-19 2019-07-05 北京三快在线科技有限公司 Identify the secondary method and apparatus distributed telephone numbers, storage medium
CN111274607A (en) * 2020-01-20 2020-06-12 福建奇点时空数字科技有限公司 Mobile application data privacy protection method based on virtual machine
CN113836509A (en) * 2021-09-23 2021-12-24 百度在线网络技术(北京)有限公司 Information acquisition method and device, electronic equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020112161A1 (en) * 2001-02-13 2002-08-15 Thomas Fred C. Method and system for software authentication in a computer system
CN105208211A (en) * 2015-09-29 2015-12-30 努比亚技术有限公司 Privacy protection device and method and mobile terminal
CN109978549A (en) * 2019-02-19 2019-07-05 北京三快在线科技有限公司 Identify the secondary method and apparatus distributed telephone numbers, storage medium
CN111274607A (en) * 2020-01-20 2020-06-12 福建奇点时空数字科技有限公司 Mobile application data privacy protection method based on virtual machine
CN113836509A (en) * 2021-09-23 2021-12-24 百度在线网络技术(北京)有限公司 Information acquisition method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US12299164B2 (en) Data security compliance for mobile device applications
US20220385471A1 (en) Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal
US20180198619A1 (en) A securing apparatus for an application in an electronic device and method thereof
Zolkin et al. Problems of personal data and information protection in corporate computer networks
US9800577B2 (en) Method and apparatus for controlling communications terminal and corresponding communications terminal
Kuhn 147 million social security numbers for sale: Developing data protection legislation after mass cybersecurity breaches
US10764049B2 (en) Method for determining approval for access to gate through network, and server and computer-readable recording media using the same
CN113221095A (en) Application program protection method and device, electronic equipment and storage medium
US7975309B2 (en) Systems and methods for securing data in an electronic apparatus
Patel et al. A survey on mobile digital forensic: Taxonomy, tools, and challenges
WO2016145849A1 (en) Short message security management method, device and terminal
CN106326709A (en) Intelligent terminal security processing method and device
Penney et al. Law enforcement access to encrypted data: Legislative responses and the Charter
Gasiokwu et al. GDPR safeguards for facial recognition technology: A critical analysis
CN108540591B (en) Address book management method, address book management device and electronic device
CN115080938A (en) Privacy protection method, system, computer equipment and readable storage medium
Weber Warning-Weak Password: The Courts' Indecipherable Approach to Encryption and the Fifth Amendment
CN114357466A (en) System safe operation management method, handheld financial terminal and computer readable storage medium
CN114117539A (en) Data protection method and device
US20200026866A1 (en) Method and device for covering private data
US20060101275A1 (en) Presence sensing information security
US11151274B2 (en) Enhanced computer objects security
US20200242256A1 (en) Electronic communications device and messaging application therefor
Kamran et al. Existing Cyber Laws and their role in legal aspects of cybercrime in Pakistan
TW201546643A (en) Scenario-based security method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20220920