Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A privacy information protection method, mobile terminal and wearable device

A privacy information and mobile terminal technology, applied in transmission systems, electrical components, etc., can solve security threats and other issues

Active Publication Date: 2019-03-22
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The problem with the above-mentioned method is that if there is a device present to monitor the above-mentioned communication process, it is easy to obtain the above-mentioned preset password, resulting in a great threat to security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy information protection method, mobile terminal and wearable device
  • A privacy information protection method, mobile terminal and wearable device
  • A privacy information protection method, mobile terminal and wearable device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The invention provides a privacy information protection method, figure 1 It shows a flow chart of Embodiment 1 of the privacy information protection method of the present invention, including:

[0045] Step S101: When receiving the private information, send a user identity verification request and a random value to the wearable device;

[0046] When the mobile terminal receives the private information, it sends a user authentication request and a generated random value to the matching wearable device.

[0047] Step S102: Receive user identity verification result information fed back by the wearable device, determine whether the user identity has passed the verification, if yes, go to step S104, otherwise go to step S103;

[0048] Step S103: Lock the viewing authority of the private information;

[0049] When the user identity is not verified, the current user identity of the wearable device is not trusted, and the permission to view private information is locked to pr...

Embodiment 2

[0060] The present invention also provides a mobile terminal, figure 2 A schematic structural diagram of a mobile terminal according to Embodiment 2 of the present invention is shown, including:

[0061] An identity confirmation sending unit 101, configured to send a user identity verification request and a random value to the wearable device when receiving private information;

[0062] An identity verification confirmation unit 102, configured to receive user identity verification result information fed back by the wearable device, and determine whether the user identity has passed the verification;

[0063] The first authority locking unit 103 is configured to lock the viewing authority of the private information when it is determined that the user identity has not passed the verification;

[0064] The signature information acquisition unit 104 is configured to receive the signature information and the signature information verification request sent by the wearable device ...

Embodiment 3

[0074] The invention also provides a privacy information protection method, image 3 It shows a flow chart of the privacy information protection method in Embodiment 3 of the present invention, including:

[0075] Step S201: Receive the user identity verification request and a random value sent by the mobile terminal, perform identity verification on the current user, and judge whether the verification is passed, if yes, go to step S203, otherwise go to step S202;

[0076] The wearable device receives the user identity verification request and random value of the mobile terminal, and the identity verification of the current user can be performed by obtaining the current user's biological information, such as fingerprints, etc., and judging whether the biological information matches the pre-stored biological information. , it is determined that the user identity has passed the authentication, otherwise it is determined that the user identity has not passed the authentication. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private information protection method, a mobile terminal and a wearable device. The mobile terminal receives private information and sends a user identity authentication request and a random value to the wearable device; the wearable device authenticates a user identity; when it is determined that the user identity authentication is failed, the mobile terminal locks the viewing rights of the private information; when it is determined that the user identity authentication is successful, the wearable device uses a preset private key to encrypt the random value, thus obtaining signing information; the mobile terminal authenticates whether the signing information is correct or not; when it is determined that the signing information is correct, the viewing rights of the private information is obtained; when it is determined that the signing information is incorrect, the viewing rights of the private information is locked; and the information is encrypted by using an asymmetric encryption scheme. A communication process is prevented from being monitored, therefore, the information is protected, and the user private information of the terminal can be protected efficiently and securely.

Description

technical field [0001] The invention relates to the field of information protection, in particular to a privacy information protection method, a mobile terminal and a wearable device. Background technique [0002] There is a lot of private information related to users stored on mobile smart terminals, such as chat records, text messages, mobile commerce, etc., which users do not want to be displayed to unauthorized persons. In the existing technical solution, private information can only be displayed or opened by detecting a bound wearable device within the preset range of the current mobile terminal. [0003] However, the user of the wearable device may not be the user himself. In order to solve this problem, after the mobile terminal detects that there is a wearable device bound to it nearby, it requires the wearable device to confirm the user's identity through biometric technology. Only when the user is the owner of the mobile terminal can display or open the private in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/0846H04L63/10
Inventor 钟焰涛傅文治蒋罗
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products