Disclosure of Invention
Embodiments of the present invention provide a privacy protection method, system, computer device, and readable storage medium, so as to achieve automatic protection of privacy content, and provide security and rapidness.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions:
a privacy protection method is applied to a computer device with an operation display screen, and comprises the following steps:
the user performs identity authentication in a preset identity authentication mode, if the authentication is passed, the user enters a privacy protection mode, otherwise, the user enters a virtual operating environment;
the user operates the set privacy protection data, the system automatically copies all the privacy data to the privacy space, and records all the operation records; and
the user exits the privacy mode, and the system deletes the privacy data of the original position according to the recorded operation record in S200.
As a further limitation of the technical solution of the embodiment of the present invention, a method is formed in which the user performs identity authentication in a preset identity authentication manner, and if the authentication is passed, the method enters a privacy protection mode, otherwise, the method enters a virtual operating environment, and includes the following specific steps:
when the identity preset by the user needs to be authenticated, a camera on computer equipment can be used for photographing and identifying a face image of the user, an operator can be used for inputting a verification password to perform identity authentication, and similarly, fingerprint information of the user can also be used for performing identification authentication;
when the identity authentication fails, a virtual operating environment generated by the process protection module is entered, and the virtual operating environment is consistent with the operating environment for correct identity authentication, so that the risk of cracking can be reduced to the maximum extent; when the identity authentication fails for many times and continuously for an illegal person, the system adopts related operations such as time delay, locking and the like, and finally protects the data in a data destruction mode.
A privacy protection system for use with a computer device having an operating display screen, the privacy protection system comprising:
the privacy space module 11 is used for providing functions such as privacy data storage, privacy data management and related settings, and is an entrance of all privacy protection modules;
the process protection and action module 12 is used for protecting illegal access and attempted attack behaviors which may occur to the maximum extent in the operation process of the private data, and provides functions including identity authentication, virtual operation environment, attack detection, data destruction and the like;
a position information protection and action module 13, which is used for providing a protection function for the GPS position information;
a contact protection and action module 14, configured to provide a protection function related to a contact, including contents such as a call record, a caller id display, and a short message;
a multimedia protection and action module 15, which is used for providing the protection function of the files such as characters, audio, video, multimedia and the like; and
and a file protection and action module 16 for providing protection functions for other types of files.
A computer device comprising an operating display, a memory, a processor and a computer program, wherein the memory has stored therein the computer program which, when executed by the processor, causes the processor to carry out the steps of the anti-face recognition method.
A readable storage medium having stored thereon a computer program which, when executed by a processor, causes the processor to carry out the steps of the anti-face recognition method.
Compared with the prior art, the invention has the beneficial effects that:
the privacy protection method provided by the embodiment of the invention has the advantages of reducing the attacked risk and resisting the violent attack on the one hand, and enables the user to set the automatic addition of the protection content on the other hand, so that the method is safe and quick; more importantly, the privacy content can be protected more comprehensively and completely in the use process of an operator.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that, although the terms first, second, etc. may be used herein to describe various functional blocks in embodiments of the present invention, these functional blocks should not be limited by these terms. These terms are only used to distinguish one type of functional module from another. For example, a first determination module may also be referred to as a second determination module without necessarily requiring or implying any such actual relationship or order between such entities or operations without departing from the scope of embodiments of the present invention. Similarly, the second determination module may also be referred to as the first determination module. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
It can be understood that, along with the frequent occurrence of events of information security, privacy protection becomes a topic that people pay more and more attention to, especially, information protection of mobile terminal, and people urgently need a set of effective, safe, comprehensive privacy protection scheme, and in the prior art, privacy protection is in an encrypted or isolated manner, and protection objects are manually added, including: contacts (short messages, call records), photos, files, etc., for static protection. Static protection means that the protection mode is fixed and unchangeable, and the mode is unchangeable and is easy to be attacked by violence. Because the protection of the information needs to be manually added with the protection content in advance, the protection content is often ignored due to factors such as forgetting or complicated operation, and the like, so that the information leakage is caused, and in addition, the original protection content is not complete and comprehensive, and the like, which are defects existing in the prior art;
in the prior art, privacy protected content is protected by manually adding a protected object in an encrypted or isolated manner, including: contacts (short messages, call records), photos, files, etc., for static protection;
this approach has the following disadvantages: firstly, the device is easy to be attacked by violence; secondly, the protection of the information needs to manually add protection content in advance, and the information is often ignored due to forgetting or complicated operation and other factors, so that information leakage is caused; thirdly, the original protection content is incomplete and comprehensive;
in the embodiment of the invention, after the identity authentication of the operator is wrong, the operator enters the virtual operating environment, so that information leakage is prevented, the attack risk is reduced, and the protection content can be automatically added in the privacy protection mode;
in this way, the following advantages exist: firstly, the risk of being attacked is reduced, and meanwhile, violent attack can be resisted; secondly, the user can set to automatically add the protection content, so that the method is safe and fast; thirdly, the privacy content is protected more comprehensively and completely.
Examples
Fig. 1 shows a flowchart of a privacy protection method provided in an embodiment of the present invention, where the privacy protection method is applied to a computer device with an operation display screen, where the computer device may be a mobile phone, a notebook, or other communication devices, and is not particularly limited, and the privacy protection method is detailed as follows:
and S100, the user performs identity authentication in a preset identity authentication mode, if the authentication is passed, the user enters a privacy protection mode, and otherwise, the user enters a virtual operating environment.
In the embodiment of the invention, when the identity preset by the user needs to be authenticated, the camera on the computer equipment can be used for photographing and identifying the face image of the user, the verification password can be input by an operator for identity authentication, and similarly, the fingerprint information of the user can also be used for identification authentication; it can be understood that the authentication of the user in the embodiment of the present invention is performed in various ways, such as facial authentication, password authentication, fingerprint authentication, and the authentication of the user can be flexibly set according to actual needs, and is not limited herein;
when identity authentication is performed, when the identity authentication fails, the conventional method is to pop up a corresponding failure prompt, which causes a problem that an information is essentially revealed to an illegal person: the terminal has private data present thereon. Therefore, the target of attack can be easily locked by the stealer, and brute force cracking can be implemented.
In the embodiment of the invention, in order to prevent the situation, when the identity authentication fails, a virtual operating environment generated by a process protection module is entered, and the virtual operating environment is consistent with the operating environment of correct identity authentication, so that the risk of being cracked can be reduced to the maximum extent; when the identity authentication fails for many times and continuously for an illegal person, the system adopts related operations such as time delay, locking and the like, and finally protects the data in a data destruction mode.
Step S200, the user operates the set privacy protection data, the system automatically copies all privacy data to the privacy space, and records all operation records.
In the embodiment of the invention, a user enters a privacy space after passing identity authentication, and then virtual position information is set; meanwhile, the protection is mainly carried out in an isolated mode aiming at the passing of the record and the short message, and the display of the incoming call and the short message notification are mainly carried out in a simulated mode; in order to prevent the information of the incoming call from being leaked, the incoming call can be set to be displayed as other numbers and names; files such as characters, audio, video, multimedia and the like generated in the operation process are mainly protected in an isolation and encryption mode, and a user can enter a privacy space, manually add protected contents, or automatically add protected contents by entering a privacy mode;
in step S300, the user exits the privacy mode, and the system deletes the privacy data of the original position according to the recorded operation record in step S200.
Fig. 2 shows a privacy protection system according to a further embodiment of the present invention, which is applied to a computer device having a display screen, where the privacy protection system 10 includes:
the privacy space module 11 is used for providing functions of privacy data storage, privacy data management, related settings and the like, and is an entrance of all privacy protection modules;
the process protection and action module 12 is used for protecting illegal access and attempted attack behaviors which may occur to the maximum extent in the operation process of the private data, and provides functions including identity authentication, virtual operation environment, attack detection, data destruction and the like.
In the embodiment of the present invention, in order to protect the private data to the maximum extent, the following processing is performed for the following specific situations: (1) when identity authentication is performed, when the identity authentication fails, the conventional method is to pop up a corresponding failure prompt, which causes a problem that an information is essentially revealed to an illegal person: the terminal has private data present thereon. Therefore, the target of attack can be easily locked by the stealer, and brute force cracking can be implemented. In order to prevent the situation, when the identity authentication fails, a virtual operating environment generated by a process protection module can be entered, and the virtual operating environment is consistent with the operating environment of correct identity authentication, so that the risk of cracking can be reduced to the maximum extent; (2) when identity authentication fails for an illegal person for multiple times and continuously, the system adopts related operations such as time delay, locking and the like, and finally protects the data in a data destruction mode;
a position information protection and action module 13, which is used for providing a protection function for the GPS position information;
in the embodiment of the present invention, the position information protection and action module 13 simulates a false position information mainly by a simulation mode, so as to prevent the position information from leaking; and the user enters the privacy space after passing the identity authentication, and then sets the virtual position information.
A contact protection and action module 14, configured to provide a protection function related to a contact, including contents such as a call record, a caller id display, and a short message;
in the embodiment of the present invention, the contact protection and action module 14 mainly performs protection in an isolated manner for the record and the short message, and displays the incoming call and performs short message notification in an analog manner, for example, chinese movement (10086) for a specific contact is displayed on a phonebook, and when the incoming call is set, other numbers and names are displayed to prevent the incoming call information from being leaked. After passing the identity authentication, the user enters a privacy space and performs related setting;
and the multimedia protection and action module 15 is used for providing the protection function of the files of characters, audio, video, multimedia and the like.
In the embodiment of the present invention, the multimedia protection and action module 15 mainly performs protection in an isolated and encrypted manner. The user can manually add the protected content by entering the privacy space, and can automatically add the protected content by entering the privacy mode, namely the privacy protection method is provided by the invention.
And a file protection and action module 16 for providing protection functions for other types of files.
In the embodiment of the present invention, the file protection and action module 16 mainly performs protection in an isolation and encryption manner, and a user may enter a privacy space and then add protected contents manually, or may automatically add protected contents by entering a privacy mode.
Fig. 3 shows a schematic structural diagram of a computer device provided in an embodiment of the present invention, the computer device includes an operation display 18, a memory 20, a processor 19, and a computer program 21, where the memory 20 stores the computer program 21, and when the computer program 21 is executed by the processor 19, the processor 19 is caused to execute the steps of the privacy protection method.
It is understood that, in the preferred embodiment provided by the present invention, the computer device may also be a notebook computer, a Personal Digital Assistant (PDA), a mobile phone, or other devices capable of communicating.
Fig. 4 shows a schematic diagram of a readable storage medium 22, on which a computer program 21 is stored, according to an embodiment of the present invention, where the computer program 25, when executed by the processor 19, causes the processor 19 to perform the steps of the privacy protecting method.
Illustratively, a computer program can be partitioned into one or more modules, which are stored in memory and executed by a processor to implement the present invention. One or more of the modules may be a series of computer program instruction segments capable of performing certain functions, which are used to describe the execution of the computer program in the terminal device. For example, the computer program may be divided into units or modules of the berth-status display system provided by the various system embodiments described above.
Those skilled in the art will appreciate that the above description of the terminal device is merely exemplary and not limiting, and that more or fewer components than those described above may be included, or certain components may be combined, or different components may be included, such as input output devices, network access devices, buses, etc.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like, which is the control center of the terminal equipment and connects the various parts of the entire user terminal using various interfaces and lines.
The memory may be used to store computer programs and/or modules, and the processor may implement various functions of the terminal device by operating or executing the computer programs and/or modules stored in the memory and calling data stored in the memory. The memory mainly comprises a storage program area and a storage data area, wherein the storage program area can store an operating system, application programs (such as an information acquisition template display function, a product information publishing function and the like) required by at least one function and the like; the storage data area may store data created according to the use of the berth-state display system (e.g., product information acquisition templates corresponding to different product types, product information that needs to be issued by different product providers, etc.), and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The terminal device integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the modules/units in the system according to the above embodiments may be implemented by a computer program, which may be stored in a computer-readable storage medium and used by a processor to implement the functions of the system embodiments. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, U.S. disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution media, and the like.
The human face anti-recognition method provided by the embodiment of the invention obtains the human face image to be recognized in front of the display screen; extracting regional characteristic information in the face image; matching the regional characteristic information with a preset human face characteristic database; confirming the identity information of a face image to be recognized; acquiring regional characteristic information of the confirmed face image, replacing the regional characteristic information to generate target face information, identifying the target face information by using detection equipment, and storing the target face information when the detection equipment cannot identify the target face information; therefore, the face image information can be protected in the process of face recognition of people, and the information safety of people is guaranteed.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.