CN115203737A - Method and electronic device for displaying data - Google Patents
Method and electronic device for displaying data Download PDFInfo
- Publication number
- CN115203737A CN115203737A CN202210744946.3A CN202210744946A CN115203737A CN 115203737 A CN115203737 A CN 115203737A CN 202210744946 A CN202210744946 A CN 202210744946A CN 115203737 A CN115203737 A CN 115203737A
- Authority
- CN
- China
- Prior art keywords
- privacy
- data
- target
- private
- privacy data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
本申请提供了一种显示数据的方法、电子设备,其中所述方法包括:获取目标参数,所述目标参数表征电子设备所处的使用场景;所述电子设备包括隐私文件,所述隐私文件包括至少两个隐私数据;基于目标参数,从所述至少两个隐私数据中确定出目标隐私数据;显示所述目标隐私数据。
The present application provides a method for displaying data and an electronic device, wherein the method includes: acquiring target parameters, where the target parameters represent a usage scenario in which the electronic device is located; the electronic device includes a privacy file, and the privacy file includes at least two privacy data; determining target privacy data from the at least two privacy data based on the target parameter; displaying the target privacy data.
Description
技术领域technical field
本申请涉及显示技术领域,尤其涉及一种显示数据的方法和电子设备。The present application relates to the field of display technology, and in particular, to a method and electronic device for displaying data.
背景技术Background technique
实际应用中,对于一些重要文件,比如身份证、社保卡、包含有个人信息的照片等,通常会其将保存到隐私空间,以实现对隐私文件的安全保护。在使用时,需要输入指纹、密码等认证信息方可实现对这些重要文件的使用。相关技术中,对这些隐私文件的显示,均是进行文件全部内容的显示,如此,用户的隐私无法得到有效保护。In practical applications, for some important documents, such as ID cards, social security cards, photos containing personal information, etc., they are usually saved in a private space to realize the security protection of private documents. When using, it is necessary to input authentication information such as fingerprints and passwords to realize the use of these important documents. In the related art, the display of these private files is to display the entire contents of the files, so that the privacy of the user cannot be effectively protected.
发明内容SUMMARY OF THE INVENTION
本申请提供了一种显示数据的方法和电子设备,以至少解决相关技术中存在的以上技术问题。The present application provides a method and electronic device for displaying data to at least solve the above technical problems existing in the related art.
本申请实施例的技术方案是这样实现的:The technical solutions of the embodiments of the present application are implemented as follows:
本申请实施例提供一种显示数据的方法,包括:Embodiments of the present application provide a method for displaying data, including:
获取目标参数,所述目标参数表征电子设备所处的使用场景;所述电子设备包括隐私文件,所述隐私文件包括至少两个隐私数据;acquiring target parameters, where the target parameters represent the usage scenario in which the electronic device is located; the electronic device includes a privacy file, and the privacy file includes at least two privacy data;
基于目标参数,从所述至少两个隐私数据中确定出目标隐私数据;determining target privacy data from the at least two privacy data based on the target parameter;
显示所述目标隐私数据。The target privacy data is displayed.
前述方案中,所述目标隐私数据为隐私文件的所有隐私数据中与所述目标参数匹配的隐私数据。In the foregoing solution, the target privacy data is the privacy data matching the target parameter among all the privacy data in the privacy file.
前述方案中,所述目标隐私数据是对隐私文件的所有隐私数据中与所述目标参数匹配的隐私数据进行加密而得到的数据;In the aforementioned scheme, the target privacy data is the data obtained by encrypting the privacy data matching the target parameter in all the privacy data of the privacy file;
其中,所述显示所述目标隐私数据包括:Wherein, the displaying the target privacy data includes:
对所述目标隐私数据进行解密;decrypting the target privacy data;
显示解密后的数据。Display the decrypted data.
前述方案中,所述至少两个隐私数据中除与所述目标参数匹配的隐私数据之外的其余各隐私数据被加密。In the foregoing solution, the remaining privacy data of the at least two privacy data except the privacy data matching the target parameter are encrypted.
前述方案中,在与所述目标参数匹配的隐私数据和所述其余各隐私数据中的每个隐私数据采用各自的加密密钥被加密。In the foregoing solution, each of the private data matching the target parameter and the remaining private data is encrypted with its own encryption key.
前述方案中,对所述目标隐私数据进行解密,包括:In the foregoing scheme, decrypting the target privacy data includes:
基于与所述目标参数匹配的隐私数据的加密密钥,获取目标解密密钥;Obtain the target decryption key based on the encryption key of the private data matching the target parameter;
基于目标解密密钥,对所述目标隐私数据进行解密。The target private data is decrypted based on the target decryption key.
前述方案中,所述对目标隐私数据进行解密,包括:In the foregoing scheme, the decryption of the target privacy data includes:
基于采集到的预设用户的生理特征信息和/或输入的字符信息,对所述目标隐私数据进行解密。The target privacy data is decrypted based on the collected physiological characteristic information of the preset user and/or the input character information.
前述方案中,所述隐私文件为包含隐私数据的图像,所述目标隐私数据为所述图像的全部内容中的部分内容。In the foregoing solution, the privacy file is an image containing privacy data, and the target privacy data is part of the entire content of the image.
本申请实施例提供一种电子设备,包括:The embodiment of the present application provides an electronic device, including:
获取单元,用于获取目标参数,所述目标参数表征电子设备所处的使用场景;所述电子设备包括隐私文件,所述隐私文件包括至少两个隐私数据;an acquisition unit, configured to acquire a target parameter, where the target parameter represents a usage scenario in which the electronic device is located; the electronic device includes a privacy file, and the privacy file includes at least two privacy data;
确定单元,用于基于目标参数,从所述至少两个隐私数据中确定出目标隐私数据;a determining unit, configured to determine the target privacy data from the at least two privacy data based on the target parameter;
显示单元,用于显示所述目标隐私数据。a display unit, used for displaying the target privacy data.
本申请实施例提供一种电子设备,包括:The embodiment of the present application provides an electronic device, including:
至少一个处理器;以及at least one processor; and
与所述至少一个处理器通信连接的存储器;其中,a memory communicatively coupled to the at least one processor; wherein,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行前述的显示数据的方法。The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the aforementioned method of displaying data.
本申请的显示数据的方法和电子设备,其中所述方法包括:获取目标参数,所述目标参数表征电子设备所处的使用场景;所述电子设备包括隐私文件,所述隐私文件包括至少两个隐私数据;基于目标参数,从所述至少两个隐私数据中确定出目标隐私数据;显示所述目标隐私数据。为隐私文件根据使用场景显示该使用场景下需要的隐私数据提供了一种技术支持。The method for displaying data and the electronic device of the present application, wherein the method includes: acquiring target parameters, where the target parameters represent a usage scenario in which the electronic device is located; the electronic device includes a privacy file, and the privacy file includes at least two privacy data; determining target privacy data from the at least two privacy data based on the target parameter; displaying the target privacy data. Provides a technical support for the privacy file to display the privacy data required in the usage scenario according to the usage scenario.
应当理解,本部分所描述的内容并非旨在标识本申请的实施例的关键或重要特征,也不用于限制本申请的范围。本申请的其它特征将通过以下的说明书而变得容易理解。It should be understood that the content described in this section is not intended to identify key or critical features of the embodiments of the application, nor is it intended to limit the scope of the application. Other features of the present application will become readily understood from the following description.
附图说明Description of drawings
通过参考附图阅读下文的详细描述,本申请示例性实施方式的上述以及其他目的、特征和优点将变得易于理解。在附图中,以示例性而非限制性的方式示出了本申请的若干实施方式,其中:The above and other objects, features and advantages of exemplary embodiments of the present application will become readily understood by reading the following detailed description with reference to the accompanying drawings. In the accompanying drawings, several embodiments of the present application are shown by way of example and not limitation, wherein:
在附图中,相同或对应的标号表示相同或对应的部分。In the drawings, the same or corresponding reference numerals denote the same or corresponding parts.
图1示出了本申请实施例中显示数据的方法的实现流程示意图一;FIG. 1 shows a schematic diagram 1 of the implementation flow of the method for displaying data in the embodiment of the present application;
图2示出了本申请实施例中显示数据的方法的实现流程示意图二;FIG. 2 shows a schematic diagram 2 of the implementation flow of the method for displaying data in the embodiment of the present application;
图3示出了本申请实施例中显示数据的方法的实现框图;Fig. 3 shows the implementation block diagram of the method for displaying data in the embodiment of the present application;
图4示出了本申请实施例中一隐私文件的保存效果示意图;FIG. 4 shows a schematic diagram of the preservation effect of a privacy file in the embodiment of the present application;
图5示出了本申请实施例中电子设备所处的使用场景的示意图;FIG. 5 shows a schematic diagram of a usage scenario where an electronic device is located in an embodiment of the present application;
图6示出了本申请实施例中一隐私文件中部分隐私数据的显示示意图;6 shows a schematic diagram of displaying part of privacy data in a privacy file in an embodiment of the present application;
图7示出了本申请实施例中隐私文件中默认元素和私有元素的示意图;7 shows a schematic diagram of a default element and a private element in the privacy file in the embodiment of the present application;
图8示出了本申请实施例中电子设备的组成结构示意图一;FIG. 8 shows a schematic diagram 1 of the composition structure of the electronic device in the embodiment of the present application;
图9示出了本申请实施例中电子设备的组成结构示意图二。FIG. 9 shows a second schematic diagram of the composition structure of the electronic device in the embodiment of the present application.
具体实施方式Detailed ways
为使本申请的目的、特征、优点能够更加的明显和易懂,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而非全部实施例。基于本申请中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。In order to make the purpose, features and advantages of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described The embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without creative efforts shall fall within the protection scope of this application.
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地详细描述,所描述的实施例不应视为对本申请的限制,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本申请保护的范围。In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described in further detail below with reference to the accompanying drawings. All other embodiments obtained under the premise of creative work fall within the scope of protection of the present application.
在以下的描述中,涉及到“一些实施例”,其描述了所有可能实施例的子集,但是可以理解,“一些实施例”可以是所有可能实施例的相同子集或不同子集,并且可以在不冲突的情况下相互结合。In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" can be the same or a different subset of all possible embodiments, and Can be combined with each other without conflict.
在以下的描述中,所涉及的术语“第一\第二”仅仅是区别类似的对象,不代表针对对象的特定排序,可以理解地,“第一\第二”在允许的情况下可以互换特定的顺序或先后次序,以使这里描述的本申请实施例能够以除了在这里图示或描述的以外的顺序实施。In the following description, the term "first\second" involved is only to distinguish similar objects, and does not represent a specific ordering of objects. It is understood that "first\second" can be mutually The specific order or sequence may be changed to enable the embodiments of the application described herein to be implemented in sequences other than those illustrated or described herein.
除非另有定义,本文所使用的所有的技术和科学术语与属于本申请的技术领域的技术人员通常理解的含义相同。本文中所使用的术语只是为了描述本申请实施例的目的,不是旨在限制本申请。Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein are only for the purpose of describing the embodiments of the present application, and are not intended to limit the present application.
应理解,在本申请的各种实施例中,各实施过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that, in the various embodiments of the present application, the size of the serial numbers of each implementation process does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not be dealt with in the embodiments of the present application. implementation constitutes any limitation.
本申请实施例中的隐私文件具有狭义的定义和广义的定义。其中,狭义的定义:隐私文件包括实际应用中任何合理的需要进行隐私保护的证件、文件等。例如,身份证、社保卡、驾照、通行证、护照等。还例如,写有机密信息的合同、协议等。广义的定义是:隐私文件除了包括前述的证件、文件等,还包括具有任何隐私信息的图像、文件、视频等内容。The privacy document in the embodiments of the present application has a narrow definition and a broad definition. Among them, the narrow definition: privacy documents include any documents, documents, etc. that are reasonably required for privacy protection in practical applications. For example, ID cards, social security cards, driver's licenses, passes, passports, etc. Also, for example, contracts, agreements, etc., in which confidential information is written. In a broad sense, privacy files include not only the aforementioned certificates, documents, etc., but also images, files, videos and other contents with any privacy information.
与相关技术中的隐私文件的显示无法保证用户的隐私性的方案相比,本申请实施例的技术方案-基于目标参数实现对隐私文件中的目标隐私数据的显示,为根据使用场景显示该使用场景下需要的隐私数据提供了一种技术支持。实现了根据电子设备所处的使用场景对隐私文件中的隐私数据进行合理显示,由此可保证使用场景下不需要的隐私数据的隐私性,提高对隐私数据的保护安全性。Compared with the solution in the related art in which the display of the privacy file cannot guarantee the privacy of the user, the technical solution of the embodiment of the present application - realizing the display of the target privacy data in the privacy file based on the target parameter, is to display the usage according to the usage scenario. The privacy data required in the scenario provides a technical support. Reasonable display of the private data in the privacy file is realized according to the usage scenario of the electronic device, thereby ensuring the privacy of the private data that is not required in the usage scenario, and improving the protection security of the private data.
本申请实施例的显示数据的方法的处理逻辑可部署于任何合理的电子设备中。该电子设备可以是终端或服务器。其中,终端包括但不限定于平板电脑、一体机、台式机、手机、智能音箱、智能手表等。服务器包括普通服务器、云服务器等。The processing logic of the method for displaying data according to the embodiment of the present application may be deployed in any reasonable electronic device. The electronic device may be a terminal or a server. The terminals include but are not limited to tablet computers, all-in-one computers, desktop computers, mobile phones, smart speakers, smart watches, and the like. Servers include ordinary servers, cloud servers, and the like.
本申请实施例的显示数据的方法的一实现流程,如图1所示,所述方法包括:An implementation process of the method for displaying data according to the embodiment of the present application, as shown in FIG. 1 , the method includes:
S101:获取目标参数,所述目标参数表征电子设备所处的使用场景;所述电子设备包括隐私文件,所述隐私文件包括至少两个隐私数据;S101: Acquire a target parameter, where the target parameter represents a usage scenario in which the electronic device is located; the electronic device includes a privacy file, and the privacy file includes at least two privacy data;
本步骤中,隐私数据可以是涉及到用户个人信息、公司或单位个人信息的数据。其中,用户个人信息包括但不仅限定于用户姓名、性别、住址、身份证号、护照号、用户照片等。公司或单位个人信息包括但不仅限定于法人名称、股东名称、注册地点、注册资金等。In this step, the private data may be data related to user personal information, company or unit personal information. Wherein, the user's personal information includes but is not limited to the user's name, gender, address, ID number, passport number, user photo, etc. The personal information of a company or unit includes, but is not limited to, the name of the legal person, the name of the shareholder, the place of registration, the registered capital, etc.
隐私文件可以是以文字形式体现以上隐私数据的文件,还可以是以图像形式体现隐私数据的文件即隐私文件为图像。通常,一个隐私文件中包括两个或两个以上的隐私数据。The privacy file may be a file that embodies the above privacy data in the form of text, or may be a file that embodies the privacy data in the form of an image, that is, a privacy file as an image. Usually, one privacy file includes two or more privacy data.
在实际应用中,诸如身份证、医保卡等隐私文件通常在不同的使用场景去使用。如身份证会在银行、房产交易大厅、核酸采样处等使用场景中使用。医保卡会在医院、保险公司等使用场景中使用。In practical applications, privacy documents such as ID cards and medical insurance cards are usually used in different usage scenarios. For example, ID cards will be used in banks, real estate trading halls, nucleic acid sampling offices and other usage scenarios. Medical insurance cards will be used in hospitals, insurance companies and other usage scenarios.
S102:基于目标参数,从所述至少两个隐私数据中确定出目标隐私数据;S102: Determine target privacy data from the at least two privacy data based on target parameters;
本步骤中,目标隐私数据是目标参数表征的使用场景下需要进行显示的隐私数据。其可以是隐私文件的所有隐私数据中与目标参数匹配的一个、或两个及以上的隐私数据。与目标参数匹配的隐私数据为在目标参数表征的使用场景下需要进行显示的隐私数据。In this step, the target privacy data is the privacy data that needs to be displayed in the usage scenario represented by the target parameter. It can be one, or two or more private data matching the target parameter in all the private data of the private file. The private data matching the target parameter is the private data that needs to be displayed in the usage scenario represented by the target parameter.
示例性地,如果目标参数表征当前电子设备在银行的使用场景中,则与目标参数匹配的目标隐私数据可以是身份证上的用户姓名、身份证号等。在显示时,可对身份证上的用户姓名、身份证号进行显示。Exemplarily, if the target parameter represents the current usage scenario of the electronic device in a bank, the target privacy data matching the target parameter may be the user's name, ID number, etc. on the ID card. When displaying, the user name and ID number on the ID card can be displayed.
如果目标参数表征当前电子设备处在医院的使用场景中,则与目标参数匹配的目标隐私数据可以是医保卡上的患者姓名、医保卡号等。在显示时,可对医保卡上的患者姓名、医保卡号进行显示。If the target parameter indicates that the current electronic device is used in a hospital, the target privacy data matching the target parameter may be the patient's name, medical insurance card number, etc. on the medical insurance card. When displaying, the patient's name and medical insurance card number on the medical insurance card can be displayed.
可预先设置不同使用场景下目标参数与该使用场景下会使用到的隐私文件中的隐私数据之间的对应关系,作为第一对应关系。待到使用时,从第一对应关系中读取与目标参数对应的隐私数据作为该目标参数下的目标隐私数据即可。The correspondence between the target parameters in different usage scenarios and the privacy data in the privacy files to be used in the usage scenarios may be preset as the first correspondence. When in use, the private data corresponding to the target parameter can be read from the first correspondence relationship as the target private data under the target parameter.
可以理解,如果使用场景不同,则基于目标参数确定出的目标隐私数据可能会存在不同。基于此,可根据不同的使用场景实现对各使用场景下需要显示的隐私数据的显示。It can be understood that if the usage scenarios are different, the target privacy data determined based on the target parameters may be different. Based on this, the display of the private data that needs to be displayed in each usage scenario can be realized according to different usage scenarios.
S103:显示所述目标隐私数据。S103: Display the target privacy data.
本步骤中,可采用任何合理的方式进行目标隐私数据的显示。例如,以隐私文件为身份证为例,以身份证形式进行目标隐私数据的显示。这种情况下可理解为:显示的是身份证,身份证上作为目标隐私数据的信息如用户姓名和身份证号可被显示,未被作为目标隐私数据的信息不被显示或以马赛克的形式进行显示。还例如,将需要显示的目标隐私数据按照一定的排列格式显示在显示屏上,如以用户姓名在前、身份证号在后的格式进行显示。或者,按照随机的排列格式进行显示,只要使用场景下需要显示的隐私数据均被显示即可。In this step, the target privacy data can be displayed in any reasonable manner. For example, taking a privacy document as an ID card as an example, the target privacy data is displayed in the form of an ID card. In this case, it can be understood as: the ID card is displayed, the information on the ID card as the target privacy data such as the user name and ID number can be displayed, and the information that is not used as the target privacy data is not displayed or in the form of mosaic to display. For another example, the target privacy data that needs to be displayed is displayed on the display screen according to a certain arrangement format, such as the format of the user's name in the front and the ID number in the back. Alternatively, it is displayed in a random arrangement format, as long as all the private data that needs to be displayed in the usage scenario are displayed.
S101~S103中,对于隐私文件来说,可基于表征电子设备所处使用场景的目标参数,确定出隐私文件的所有隐私数据中在该使用场景下需要显示的隐私数据(目标隐私数据),并对该使用场景下需要显示的隐私数据进行显示。为隐私文件根据使用场景显示该使用场景下需要的隐私数据提供了一种技术支持。实现了根据电子设备所处的使用场景对隐私文件中的隐私数据进行合理显示,由此可保证使用场景下不需要的隐私数据的隐私性,提高对隐私数据的保护安全性。In S101-S103, for the privacy file, the privacy data (target privacy data) that needs to be displayed in the usage scene among all the privacy data of the privacy file may be determined based on the target parameter representing the usage scene of the electronic device, and Display the private data that needs to be displayed in the usage scenario. Provides a technical support for the privacy file to display the privacy data required in the usage scenario according to the usage scenario. Reasonable display of the private data in the privacy file is realized according to the usage scenario of the electronic device, thereby ensuring the privacy of the private data that is not required in the usage scenario, and improving the protection security of the private data.
需要说明的是,针对同一隐私文件,可能不同使用场景下需要显示的隐私数据不同。针对这种情况,可预先设置针对同一隐私文件的、在不同使用场景下目标参数与该使用场景下会使用到的隐私数据之间的对应关系,作为第一对应关系。待到使用时,从第一对应关系中读取与获取到的目标参数对应的隐私数据作为该目标参数下的目标隐私数据即可。由此可见,本申请实施例中,同一隐私文件可根据不同使用场景实现对不同隐私数据的显示。It should be noted that, for the same privacy file, the privacy data that needs to be displayed in different usage scenarios may be different. In response to this situation, a correspondence relationship between target parameters in different usage scenarios and privacy data to be used in the usage scenario for the same privacy file may be preset as the first correspondence relationship. When it is used, the privacy data corresponding to the acquired target parameter can be read from the first correspondence relationship as the target privacy data under the target parameter. It can be seen that, in the embodiment of the present application, the same privacy file can display different privacy data according to different usage scenarios.
本申请实施例中在对隐私文件进行保存时,可将隐私数据以明文数据的形式进行保存。即,隐私数据在隐私文件中是明文数据,即不被加密的数据。本申请实施例中基于目标参数确定出的目标隐私数据可以是隐私文件中的一个或多个隐私数据,可以也是明文数据。如S101~S103中的目标隐私数据为明文数据。在基于目标参数确定出目标隐私数据的情况下直接进行目标隐私数据的显示。In the embodiment of the present application, when the privacy file is saved, the privacy data may be saved in the form of plaintext data. That is, the private data in the private file is plaintext data, that is, data that is not encrypted. The target privacy data determined based on the target parameter in this embodiment of the present application may be one or more privacy data in the privacy file, or may also be plaintext data. For example, the target privacy data in S101 to S103 is plaintext data. The display of the target private data is directly performed when the target private data is determined based on the target parameters.
此外,考虑到数据的(保存)安全性和隐私性,基于目标参数确定出的目标隐私数据还可以是密文数据。即,目标隐私数据可以是对隐私文件的所有隐私数据中与目标参数匹配的隐私数据进行加密而得到的数据(如图2中的S1021所示)。In addition, considering the (saving) security and privacy of the data, the target privacy data determined based on the target parameters may also be ciphertext data. That is, the target privacy data may be data obtained by encrypting the privacy data matching the target parameter among all the privacy data in the privacy file (as shown in S1021 in FIG. 2 ).
针对这种情况,需要先对各使用场景下会使用到的隐私数据进行加密,然后记录不同使用场景下目标参数与该使用场景下会使用到的经加密的隐私数据之间的对应关系,作为第二对应关系。待到使用时,从第二对应关系中读取与目标参数对应的经加密的隐私数据作为该目标参数下的目标隐私数据即可。In response to this situation, it is necessary to encrypt the private data that will be used in each usage scenario, and then record the correspondence between the target parameters in different usage scenarios and the encrypted private data that will be used in the usage scenario, as The second correspondence. When it is used, the encrypted privacy data corresponding to the target parameter can be read from the second correspondence relationship as the target privacy data under the target parameter.
基于此,如图2所示,S103包括:Based on this, as shown in Figure 2, S103 includes:
S1031:对目标隐私数据进行解密;S1031: Decrypt the target privacy data;
S1032:显示解密后的数据。S1032: Display the decrypted data.
在S101、S1021、S1031和S1032中,为提高对隐私数据的保护安全性,需对隐私数据进行加密,实现了安全保存。为实现对隐私数据的正常显示,在基于目标参数确定出经加密的隐私数据(目标隐私数据)的情况下,对目标隐私数据进行解密后再显示。由此,不仅提高了对隐私数据的保护安全性,还实现了隐私数据的正常显示。这里的隐私数据的正常显示可包括以下两种含义中的至少之一:隐私数据被成功显示;加密后的隐私数据是以原数据(隐私数据本身、未加密的)的形式进行的显示,即对加密后的隐私数据进行还原。In S101 , S1021 , S1031 and S1032 , in order to improve the protection security of private data, it is necessary to encrypt the private data to realize safe storage. In order to realize the normal display of the private data, when the encrypted private data (target private data) is determined based on the target parameters, the target private data is decrypted and then displayed. Thereby, not only the protection security of private data is improved, but also the normal display of private data is realized. The normal display of private data here may include at least one of the following two meanings: the private data is successfully displayed; the encrypted private data is displayed in the form of the original data (private data itself, unencrypted), that is Restore encrypted private data.
可以理解,本申请实施例中对隐私数据进行加密,是为了实现对隐私数据在电子设备中的安全保存,以便对隐私文件进行正常使用,如此可有效避免由于不法人员恶意被破解而导致的隐私数据泄露的问题。It can be understood that the encryption of the privacy data in the embodiment of the present application is to realize the safe preservation of the privacy data in the electronic device, so that the privacy file can be used normally, so that the privacy caused by the malicious cracking of the unscrupulous person can be effectively avoided. The problem of data leakage.
上述方案中,对目标隐私数据进行解密可以采用如下其中之一的实现方式来实现:In the above solution, the decryption of the target privacy data can be implemented by one of the following implementation methods:
实现方式一:基于采集到的预设用户的生理特征信息和/或输入的字符信息,对目标隐私数据进行解密。Implementation mode 1: Decrypt the target privacy data based on the collected physiological characteristic information of the preset user and/or the input character information.
在实现方式一中,预设用户可以是电子设备的合理使用者,如机主本人。字符信息可以为用户输入的数字、字符、下划线、星号等字符信息。生理特征信息包括但不限定于以下所述:指纹、声纹、眼膜中的至少之一。利用机主本人的指纹、声纹和眼膜中的至少之一生理特征信息对目标隐私数据进行解密。这种情况下,机主本人的生理特征信息可视为对目标隐私数据进行解密的解密密码。其中,生理特征信息基于电子设备的指纹识别模块、声纹识别模块、眼膜识别模块对指纹、声纹、眼膜进行采集而得到。此处的输入的字符信息和生理特征信息均作为解密密钥来使用。In
与下述的实现方式二相比,实现方式一中是基于用户输入的字符信息和/或生理特征信息实现的加密隐私数据的解密,即基于用户的参与,实现了对加密隐私数据的解密,从而实现隐私数据的正常显示。Compared with the following
实现方式二:基于与目标参数匹配的隐私数据的加密密钥,获取目标解密密钥;基于目标解密密钥,对所述目标隐私数据进行解密。Implementation mode 2: Based on the encryption key of the private data matching the target parameter, obtain the target decryption key; based on the target decryption key, decrypt the target private data.
在实现方式二中,随机生成不同的密钥对。通常,生成的密钥对的数量与隐私文件中的隐私数据的数量保持一致。为每个隐私数据分配一个密钥对。每个密钥对中包括一个加密密钥和一个解密密钥。即,为每个隐私数据分配一个加密密钥以及与该加密密钥构成一个密钥对的解密密钥。其中,加密密钥用于对被分配有该加密密钥的隐私数据进行加密。解密密钥用于对经加密的该隐私数据进行解密。In the second implementation, different key pairs are randomly generated. Usually, the number of generated key pairs is consistent with the amount of private data in the private file. Assign a key pair to each private data. Each key pair includes an encryption key and a decryption key. That is, each private data is assigned an encryption key and a decryption key that forms a key pair with the encryption key. The encryption key is used to encrypt the private data to which the encryption key is allocated. The decryption key is used to decrypt the encrypted private data.
此处,可以理解为:通过采用为与目标参数匹配的隐私数据分配的加密密钥,对与目标参数匹配的隐私数据进行加密。将与该加密密钥构成一个密钥对的解密密钥作为目标解密密钥,采用目标解密密钥解密被该加密密钥加密后的隐私数据。通俗来讲,针对某个隐私数据以及为该隐私数据分配的密钥对,利用该密钥对的加密密钥对该隐私数据进行加密,再利用该密钥对的解密密钥对该加密后的隐私数据进行解密。Here, it can be understood that the private data matching the target parameter is encrypted by using the encryption key allocated for the private data matching the target parameter. The decryption key that forms a key pair with the encryption key is used as the target decryption key, and the target decryption key is used to decrypt the private data encrypted by the encryption key. Generally speaking, for a certain privacy data and the key pair allocated for the privacy data, use the encryption key of the key pair to encrypt the privacy data, and then use the decryption key of the key pair to encrypt the encrypted data. decrypt the private data.
其中,利用加密密钥进行加密可提高对隐私数据的安全保护,有效避免了隐私数据的不必要泄露。基于解密密钥的解密实现了不同使用场景下需要显示的隐私数据的正常显示,提高了用户体验。Among them, using the encryption key for encryption can improve the security protection of the private data, and effectively avoid unnecessary leakage of the private data. The decryption based on the decryption key realizes the normal display of the private data that needs to be displayed in different usage scenarios, and improves the user experience.
可以理解,在同一使用场景中,隐私文件的所有隐私数据中与目标参数匹配的隐私数据可以是被加密的数据,所有隐私数据中除与目标参数匹配的隐私数据之外的其余各隐私数据可以是明文数据,即是不被加密的数据。隐私文件的所有隐私数据中除与目标参数匹配的隐私数据之外的其余各隐私数据也可被加密。It can be understood that in the same usage scenario, the private data matching the target parameters in all the private data of the privacy file can be encrypted data, and the remaining private data in all the private data except the private data matching the target parameters can be. It is plaintext data, that is, data that is not encrypted. All the private data in the private file except the private data matching the target parameter may also be encrypted.
示例性地,在银行的使用场景中,针对身份证这个隐私文件,假定与目标参数匹配的隐私数据为用户姓名、身份证号和用户照片,则身份证上的用户姓名、身份证号和用户照片等均可被加密,身份证上的其余隐私数据如性别、出生日期和家庭住址等可不被加密,作为明文数据来使用,也可被加密。身份证上的其余隐私数据被加密的方案,一方面可提高对隐私数据的保护安全性,另一方面可适配于需要将性别、出生日期和家庭住址等隐私数据作为需要显示的隐私数据的使用场景,实用性更强,方案在工程上易于推广。Exemplarily, in the usage scenario of a bank, for the privacy document of the ID card, assuming that the privacy data matching the target parameters are the user name, ID number and user photo, then the user name, ID number and user photo on the ID card are Photos, etc. can be encrypted, and the remaining private data on the ID card, such as gender, date of birth, and home address, may not be encrypted, but can be used as plaintext data or encrypted. The scheme in which the remaining private data on the ID card is encrypted, on the one hand, can improve the security of the protection of private data, and on the other hand, it can be adapted to the privacy data that needs to be displayed such as gender, date of birth, and home address. The usage scenario is more practical, and the solution is easy to promote in engineering.
针对隐私文件中的与目标参数匹配的隐私数据和除与目标参数匹配的隐私数据之外的其余各隐私数据均需要被加密的方案,与目标参数匹配的隐私数据可采用一定的加密算法进行加密,其余各隐私数据也可采用一定的加密算法进行加密。其中,与目标参数匹配的隐私数据采用的加密算法和其余各隐私数据采用的加密算法可以相同,也可以不同。For the scheme in which the private data matching the target parameters in the privacy file and the other private data except the private data matching the target parameters need to be encrypted, the private data matching the target parameters can be encrypted by using a certain encryption algorithm , and the rest of the private data can also be encrypted by a certain encryption algorithm. The encryption algorithm used for the privacy data matching the target parameter and the encryption algorithm used for the other privacy data may be the same or different.
加密算法包括但不仅限定于以下所述:哈什(Hash)算法、对称密码体制加密(DES)算法、RSA加密算法、高级加密标准(AES)算法等。Encryption algorithms include but are not limited to the following: Hash algorithm, Symmetric Cryptosystem Encryption (DES) algorithm, RSA encryption algorithm, Advanced Encryption Standard (AES) algorithm and the like.
与目标参数匹配的隐私数据的数量可以为两个或两个以上。隐私文件的所有隐私数据中除与目标参数匹配的隐私数据之外的其余隐私数据的数量可以为两个或两个以上。与目标参数匹配的隐私数据之间、和/或其余各隐私数据之间可采用相同的加密算法进行加密,或者采用不同的加密算法进行加密。The number of private data matching the target parameters can be two or more. The number of the remaining private data except the private data matching the target parameter among all the private data of the private file may be two or more. The private data matching the target parameters and/or the remaining private data may be encrypted by using the same encryption algorithm, or encrypted by using different encryption algorithms.
本申请实施例中隐私数据的加密实现了对隐私数据的安全保护,有效避免恶意篡改。The encryption of the private data in the embodiment of the present application realizes the security protection of the private data, and effectively avoids malicious tampering.
作为一个可选方案,在与目标参数匹配的隐私数据和其余各隐私数据中的每个隐私数据采用各自的加密密钥被加密。即,隐私文件的所有隐私数据采用各自的加密密钥进行加密。隐私文件中的各隐私数据采用不同的加密密钥进行加密,可提高对隐私数据的安全保护性,避免对隐私数据的恶意破解。As an optional solution, each of the private data matching the target parameter and the remaining private data is encrypted with its own encryption key. That is, all private data of the private file are encrypted with their respective encryption keys. Each privacy data in the privacy file is encrypted with different encryption keys, which can improve the security protection of the privacy data and avoid malicious cracking of the privacy data.
其中,加密密钥可以是为各隐私数据随机生成的不同的密钥,或者为各隐私数据随机生成不同的密钥对中的用来对各隐私数据进行加密的加密密钥。The encryption key may be a different key randomly generated for each private data, or an encryption key used to encrypt each private data in a different key pair randomly generated for each private data.
在加密密钥为各隐私数据随机生成不同的密钥对中的用来对各隐私数据进行加密的加密密钥的情况下,对与目标参数匹配的隐私数据的解密可采用为该隐私数据分配的密钥对中的解密密钥对该加密的隐私数据进行解密。In the case where the encryption key is an encryption key used to encrypt each private data in a different key pair randomly generated for each private data, the decryption of the private data matching the target parameters can be performed by assigning the private data to the private data. The decryption key in the key pair decrypts the encrypted private data.
在加密密钥为各隐私数据随机生成的不同的密钥的情况下,对与目标参数匹配的隐私数据的解密可采用基于机主本人的生理特征信息的方式实现对加密的隐私数据的解密。In the case where the encryption key is a different key randomly generated for each private data, the decryption of the private data matching the target parameters can be realized by the way based on the host's own physiological characteristic information to realize the decryption of the encrypted private data.
在其余各隐私数据被加密的情况下,在显示经解密的与目标参数匹配的隐私数据时,其余各隐私数据可以不显示、或者以马赛克的形式显示、或者以加密后的数据进行显示。以实现对不同使用场景下需要的隐私数据的正常显示。When the remaining private data is encrypted, when displaying the decrypted private data matching the target parameters, the remaining private data may not be displayed, or displayed in the form of mosaic, or displayed as encrypted data. In order to realize the normal display of private data required in different usage scenarios.
作为一个可选方案,隐私文件可以为包括隐私数据的图像,如对身份证、医保卡进行拍照或扫描而得到的图像。或者,为日常生活中拍进有隐私数据的图像。所述图像中包括两个或两个隐私数据,如身份证上的用户姓名、性别、身份证号、出生日期、用户照片、家庭住址等。如包含有自家车牌号的日常图像,包括有自家地址附近地标的日常图像。如果将以上隐私数据为图像的所有内容,则需要显示的目标隐私数据为隐私图像中所有内容中的部分内容。在将前述的图像视为隐私图像的情况下,本方案可根据电子设备的使用场景实现对隐私图像中的部分隐私内容的显示。为隐私图像可根据使用场景显示该使用场景下需要的隐私内容提供了一种技术支持。As an optional solution, the privacy file may be an image including privacy data, such as an image obtained by taking a photo or scanning an ID card or a medical insurance card. Or, take pictures with private data for everyday life. The image includes two or two private data, such as the user's name, gender, ID number, date of birth, user photo, home address, etc. on the ID card. For example, everyday images that include your own license plate number, include everyday images of landmarks near your home address. If the above privacy data is all the content of the image, the target privacy data that needs to be displayed is a part of all the content in the privacy image. In the case where the aforementioned image is regarded as a privacy image, this solution can realize the display of part of the privacy content in the privacy image according to the usage scenario of the electronic device. A technical support is provided for the privacy image to display the privacy content required in the usage scenario according to the usage scenario.
本申请实施例中,可获取电子设备所处的位置和/或时间,基于电子设备所处的位置和/或时间,确定出目标参数。可通过电子设备的定位模块如全球定位系统(GPS)实现对电子设备所处位置的获知。如果GPS显示电子设备当前所处的位置为银行,则生成表征处于银行这一使用场景的目标参数。如果GPS显示电子设备当前所处的位置为医院,则生成表征处于医院这一使用场景的目标参数。电子设备可基于与网络侧的时间同步获知自身所处的时间,电子设备通过对用户一段时间的行为轨迹和/或行为习惯的统计,发现用户通常在周二的7点-8点去做核酸采样。如果电子设备获知当前所处的时间如周二的7点-8点,则生成表征处于核酸采样点这一使用场景的目标参数。由此实现了对目标参数的准确获取,从而基于准确获取的目标参数实现对目标隐私数据的准确确定与显示。In this embodiment of the present application, the location and/or time of the electronic device may be acquired, and the target parameter may be determined based on the location and/or time of the electronic device. The location of the electronic device can be known through a positioning module of the electronic device, such as a global positioning system (GPS). If the GPS shows that the current location of the electronic device is a bank, target parameters representing the usage scenario of being in a bank are generated. If the GPS shows that the current location of the electronic device is a hospital, target parameters representing the usage scenario of being in a hospital are generated. The electronic device can know the time of itself based on the time synchronization with the network side. The electronic device finds out that the user usually does nucleic acid sampling between 7:00 and 8:00 on Tuesday through statistics of the user's behavioral trajectory and/or behavioral habits for a period of time. . If the electronic device knows the current time, such as 7:00-8:00 on Tuesday, it generates target parameters representing the usage scenario of being at the nucleic acid sampling point. In this way, the accurate acquisition of the target parameters is achieved, thereby realizing accurate determination and display of the target privacy data based on the accurately acquired target parameters.
因为实际应用中隐私文件有多个,如有身份证、社保卡、驾照等。不同使用场景下需要使用的隐私文件不同。需要预先设置在不同使用场景下需要使用的隐私文件。如在银行或核酸采样点的使用场景下,设置身份证为这种使用场景下的隐私文件。如在医院的使用场景下,设置医保卡为这种使用场景下的隐私文件。Because there are many privacy documents in practical applications, such as ID cards, social security cards, driver's licenses, etc. Different privacy files need to be used in different usage scenarios. The privacy files that need to be used in different usage scenarios need to be preset. For example, in the usage scenarios of banks or nucleic acid sampling sites, set the ID card as the privacy document in this usage scenario. For example, in the usage scenario of a hospital, set the medical insurance card as a privacy file in this usage scenario.
下面结合图3-图6对本申请技术方案做进一步说明。The technical solution of the present application will be further described below with reference to FIGS. 3 to 6 .
先对本申请技术方案中的隐私文件的保存过程进行说明。First, the storage process of the privacy file in the technical solution of the present application will be described.
以隐私文件为身份证为例,通过拍照或扫描的方式得到身份证这一隐私图像。通常,身份证上包括姓名、性别、民族、出生日期、住址、照片和身份证号等几个基本元素。视每个基本元素均为一个隐私数据。Taking the private document as an ID card as an example, the private image of the ID card is obtained by taking a photo or scanning it. Usually, the ID card includes several basic elements such as name, gender, ethnicity, date of birth, address, photo and ID number. Treat each basic element as a piece of private data.
电子设备随机生成N个不同的密钥对。N为大于1的正整数,N的取值为身份证上的基本元素的数量相同。将每个密钥对分配给各个基本元素。结合图3所示,密钥对1分配给姓名这一基本元素、密钥对2分配给性别这一基本元素,密钥对3分配给民族这一基本元素,密钥对4分配给照片这一基本元素,密钥对5分配给身份证号这一基本元素,以此类推,直至所有基本元素均被分配了密钥对。The electronic device randomly generates N different key pairs. N is a positive integer greater than 1, and the value of N is the same as the number of basic elements on the ID card. Assign each key pair to each base element. As shown in Figure 3,
每个密钥对包括一个加密密钥和一个解密密钥。利用各个密钥对中的加密密钥对身份证上的各基本元素进行加密。例如,利用密钥对1中的加密密钥对姓名这一基本元素进行加密,利用密钥对2中的加密密钥对性别这一基本元素进行加密,以此类推,直至利用密钥对N中的加密密钥对最后一个基本元素进行加密。Each key pair includes an encryption key and a decryption key. Each basic element on the ID card is encrypted using the encryption key in each key pair. For example, the basic element of name is encrypted with the encryption key in
将经加密后的各基本元素保存或存储到电子设备中。这种保存或存储具体可以是各基本元素以加密的形式在身份证这一隐私图像中进行保存,从而实现了对隐私数据的加密保存,以备后续使用。后续使用中同一隐私文件如身份证这一隐私图像可根据不同的使用场景进行不同隐私数据的显示。Save or store the encrypted basic elements in the electronic device. Specifically, the storage or storage may be that each basic element is stored in the private image of the ID card in an encrypted form, thereby realizing the encrypted storage of the private data for subsequent use. In subsequent use, the privacy image of the same privacy document, such as an ID card, can display different privacy data according to different usage scenarios.
可以理解,身份证上的各基本元素在身份证这一隐私图像中是以加密形式进行的保存。图4为各加密后的基本元素在隐私图像中的保存效果示意图。如图4所示,图4中的XXX、YYY、ZZZ等表示对身份证上的各个基本元素进行加密后的呈现效果,电子设备以这种形式对身份证这个隐私图像进行保存。It can be understood that the basic elements on the ID card are stored in encrypted form in the privacy image of the ID card. FIG. 4 is a schematic diagram of the preservation effect of each encrypted basic element in a private image. As shown in Figure 4, XXX, YYY, ZZZ, etc. in Figure 4 represent the presentation effect after encrypting each basic element on the ID card, and the electronic device saves the privacy image of the ID card in this form.
图3所示中、提供了身份证文件的M个使用场景,M为大于1的正整数。如身份证可在银行、派出所、房产交易大厅、核酸采样点等不同的使用场景下使用。基于此,在图5所处的应用场景中,以GPS显示电子设备当前所处的位置为银行为例,在当前所处位置为银行的情况下,电子设备生成表征处于银行这一使用场景的目标参数。电子设备调用多个隐私文件中的身份证文件,作为银行这一使用场景中需要使用的隐私文件。As shown in FIG. 3, M usage scenarios of the ID card file are provided, where M is a positive integer greater than 1. For example, ID cards can be used in different usage scenarios such as banks, police stations, real estate trading halls, and nucleic acid sampling points. Based on this, in the application scenario shown in FIG. 5 , the current location of the electronic device displayed by GPS is taken as an example of a bank. In the case where the current location is a bank, the electronic device generates a usage scenario that represents the usage scenario of the bank. target parameter. The electronic device calls the ID card files in the multiple privacy files as the privacy files that need to be used in the usage scenario of the bank.
电子设备读取预先设置的第二对应关系,如果第二对应关系中说明与表征银行这一使用场景的目标参数对应的身份证上的需要显示的隐私数据为用户姓名、身份证号、照片等几个基本元素(目标隐私数据),则利用为这几个基本元素分配的密钥对中的解密密钥对这几个加密的基本元素进行解密。The electronic device reads the preset second correspondence, if the second correspondence states that the private data to be displayed on the ID card corresponding to the target parameter representing the usage scenario of the bank is the user's name, ID number, photo, etc. For several basic elements (target privacy data), the encrypted basic elements are decrypted by using the decryption key in the key pair allocated for these basic elements.
例如,利用密钥对1中的解密密钥对加密的用户姓名进行解密;利用密钥对4中的解密密钥对加密的照片进行解密;密钥对5中的解密密钥对加密的身份证号进行解密。For example, decrypt the encrypted user name with the decryption key in
对银行这一使用场景下的需要显示的基本元素进行解密的情况下,将身份证进行显示。如图6所示,在显示的身份证上,被解密的基本元素如用户姓名、身份证号和照片以明文的形式进行显示,其余基本元素以密文形式进行显示。其余基本元素还可以以马赛克的形式进行显示,或身份证上不显示未经解密的基本元素。In the case of decrypting the basic elements that need to be displayed in the usage scenario of the bank, the ID card is displayed. As shown in Figure 6, on the displayed ID card, the decrypted basic elements such as user name, ID number and photo are displayed in plaintext, and the remaining basic elements are displayed in ciphertext. The rest of the basic elements can also be displayed in the form of mosaic, or the basic elements without decryption are not displayed on the ID card.
在将身份证视为隐私图像,身份证上的各基本元素视为隐私图像的所有内容时,以上方案中实现了隐私图像所有内容中的部分内容的显示。可见,本申请技术方案可根据电子设备的使用场景实现对隐私图像中的部分隐私内容的显示。When the ID card is regarded as a privacy image, and the basic elements on the ID card are regarded as all the content of the privacy image, the above scheme realizes the display of part of all the content of the privacy image. It can be seen that the technical solution of the present application can realize the display of part of the privacy content in the privacy image according to the usage scenario of the electronic device.
针对身份证这一隐私文件,如果使用场景不同,如使用场景为房产交易大厅,假定这一使用场景下需要使用身份证文件上的姓名和身份证号,则确定姓名和身份证号为目标隐私数据,则需要对姓名和身份证号进行解密并显示,其余基本元素无需解密。可见,本申请实施例为隐私图像根据不同的使用场景显示不同的隐私数据提供了一种技术支持。For the privacy document of the ID card, if the usage scenario is different, such as the real estate transaction hall, assuming that the name and ID number on the ID card file need to be used in this usage scenario, the name and ID number are determined as the target privacy data, the name and ID number need to be decrypted and displayed, and the rest of the basic elements do not need to be decrypted. It can be seen that the embodiments of the present application provide a technical support for the private image to display different private data according to different usage scenarios.
以上的解密采用的是密钥对中的解密密钥进行的解密。除此之外,还可以基于采集到的机主本人的生理特征信息进行各个需要解密的基本元素的解密。即,机主本人的生理特征信息可视为解密密码。The above decryption adopts the decryption performed by the decryption key in the key pair. In addition, each basic element that needs to be decrypted can also be decrypted based on the collected physiological characteristic information of the owner. That is, the physiological characteristic information of the owner himself can be regarded as a decryption password.
示例性地,采集到机主本人的一个指纹的情况下,实现对各个需要解密的基本元素的解密。即,该指纹为解密所有需要解密的基本元素的解密密码。Exemplarily, when a fingerprint of the owner himself is collected, the decryption of each basic element that needs to be decrypted is implemented. That is, the fingerprint is the decryption password for decrypting all basic elements that need to be decrypted.
或者,采集到机主本人的不同指纹的情况下,逐个实现对各个需要解密的基本元素的解密。如采集到食指指纹时,对加密后的姓名进行解密;采集到中指指纹的情况下,对加密后的身份证号码进行解密。不同指纹可看成不同基本元素的解密密码。Alternatively, when different fingerprints of the owner himself are collected, decryption of each basic element that needs to be decrypted is implemented one by one. For example, when the fingerprint of the index finger is collected, the encrypted name is decrypted; when the fingerprint of the middle finger is collected, the encrypted ID number is decrypted. Different fingerprints can be regarded as decryption passwords for different basic elements.
或者,预先设置两个或多个不同的需要解密的基本元素的解密指纹为同一个指纹,其余需要解密的基本元素的解密指纹是另一指纹等。Alternatively, the decryption fingerprints of two or more different basic elements that need to be decrypted are preset as the same fingerprint, and the decryption fingerprints of the other basic elements that need to be decrypted are another fingerprint.
以上情况为全部需要解密的基本元素均采用密钥对中的解密密钥对生理特征信息进行解密为例。除此之外,还可以预先设置部分加密后的基本元素采用解密密钥的方式进行解密,部分加密后的基本元素采用生理特征信息的方式进行解密。具体不赘述,请参照理解。The above situation is that all basic elements that need to be decrypted use the decryption key in the key pair to decrypt the physiological characteristic information as an example. In addition, it can also be preset that some encrypted basic elements are decrypted by means of a decryption key, and some encrypted basic elements are decrypted by means of physiological characteristic information. Please refer to understanding.
可以理解,前述方案中,利用加密密钥进行加密可提高对隐私数据的安全保护,有效避免了隐私数据的不必要泄露。基于解密密钥或生理特征信息解密实现了不同使用场景下需要显示的隐私数据的正常显示,提高了用户体验。It can be understood that, in the foregoing solution, using an encryption key for encryption can improve the security protection of private data, and effectively avoid unnecessary leakage of private data. Decryption based on the decryption key or physiological feature information realizes the normal display of private data that needs to be displayed in different usage scenarios, and improves user experience.
通俗来讲,本申请中,把隐私文件分割成不同的element(基本元素),然后使用不同的key(如加密密钥)加密并保存,在需要使用的时候,根据不同的使用场景,只解密用户需要的隐私数据并显示。Generally speaking, in this application, the privacy file is divided into different elements (basic elements), then encrypted and saved with different keys (such as encryption keys), and only decrypted according to different usage scenarios when needed. The privacy data required by the user is displayed.
与相关技术中显示整个隐私文件即隐私文件中的全部隐私数据的被显示具有隐私泄露的风险不同,本方案中根据不同的使用场景只解密用户需要的隐私数据并显示,可减少隐私泄露风险,避免非合理用户对隐私的窥探。Different from the display of the entire privacy file, that is, all the privacy data in the privacy file in the related art, there is a risk of privacy leakage. In this solution, only the privacy data required by the user is decrypted and displayed according to different usage scenarios, which can reduce the risk of privacy leakage. Avoid unreasonable users' privacy snooping.
前述方案为电子设备基于自身所处位置和/或时间,自动生成目标参数;并基于目标参数确定目标隐私数据的方案。此外,考虑到在实际应用中,可能存在有身份证、医保卡和驾照等隐私文件的在意想不到的情况下被使用。针对这种情况下,本申请还支持对隐私文件的手动调用、隐私文件中用户期望显示的隐私数据的手动选取和自动显示。可提高用户的使用体验。The aforementioned solution is a solution in which the electronic device automatically generates target parameters based on its own location and/or time; and determines target privacy data based on the target parameters. In addition, considering that in practical applications, there may be private documents such as ID cards, medical insurance cards, and driver's licenses that are used in unexpected situations. In this case, the present application also supports manual invocation of the privacy file, manual selection and automatic display of the privacy data that the user desires to display in the privacy file. It can improve the user experience.
示例性地,身份证、医保卡和驾照等隐私文件中的各基本元素以加密的形式保存在电子设备中。在一个突发的使用场景中,用户手动选择其需要的隐私文件如身份证并显示。因为此时电子设备显示屏显示的身份证上的各基本元素为加密后的数据,所以用户可在显示屏上选取其需要的基本元素,再向电子设备输入指定生理特征信息。如,电子设备响应用户的选取操作,将显示屏上被选取的基本元素视为需要被解密的隐私数据,并在采集到机主本人的指定指纹的情况下,实现对其需要解密的基本元素的解密,并显示解密后的基本元素,即将还原后的基本元素进行显示。Exemplarily, each basic element in privacy documents such as ID cards, medical insurance cards, and driver's licenses is stored in an electronic device in an encrypted form. In a sudden usage scenario, the user manually selects the privacy document he needs, such as an ID card, and displays it. Because the basic elements on the ID card displayed on the display screen of the electronic device are encrypted data, the user can select the basic elements he needs on the display screen, and then input the specified physiological characteristic information into the electronic device. For example, in response to the user's selection operation, the electronic device regards the selected basic elements on the display as private data that needs to be decrypted, and realizes the basic elements that need to be decrypted when the designated fingerprint of the owner is collected. decryption, and display the decrypted basic elements, that is, the restored basic elements will be displayed.
或者,用户在显示屏上每选取一个其需要的基本元素,向电子设备输入一个可解密该基本元素的指纹,电子设备基于选取操作确定需要解密的隐私数据,并基于采集到的指纹对需要解密的基本元素进行解密并显示。实现了其需要的基本元素的逐个选取、逐个解密与逐个显示。Alternatively, each time the user selects a basic element on the display screen, a fingerprint that can decrypt the basic element is input to the electronic device. The basic elements are decrypted and displayed. It realizes the one-by-one selection, one-by-one decryption and one-by-one display of the basic elements it needs.
当然,在逐个选取、逐个解密的方案,解密后的基本元素还可以同时显示。如,在最后一个基本元素被解密的情况下该基本元素及其在前被解密的基本元素同时被显示在显示屏上。Of course, in the scheme of selecting and decrypting one by one, the decrypted basic elements can also be displayed at the same time. For example, in the case where the last basic element is decrypted, the basic element and its previous decrypted basic elements are simultaneously displayed on the display screen.
在需要解密的基本元素为两个或两个以上的情况下,不同的需要解密的基本元素之间可以使用同一手指的指纹,可以使用不同手指的指纹。还可以部分基本元素使用同一手指的指纹,部分基本元素使用不同手指的指纹。本申请实施例中,除了可以使用指纹进行解密,还可以使用声纹或眼膜进行解密。When there are two or more basic elements to be decrypted, the fingerprint of the same finger or the fingerprints of different fingers can be used between different basic elements to be decrypted. It is also possible to use fingerprints of the same finger for some basic elements, and fingerprints of different fingers for some basic elements. In this embodiment of the present application, in addition to using a fingerprint for decryption, a voiceprint or an eye mask can also be used for decryption.
在对两个或两个以上需要解密的基本元素进行解密时,可使用指纹、声纹和眼膜中的其中之一去解密,还可以三者中的至少两者混用去解密。When decrypting two or more basic elements that need to be decrypted, one of fingerprint, voiceprint and eye mask can be used for decryption, or at least two of the three can be mixed for decryption.
综上,本申请实施例的技术方案还可基于用户的参与,实现对隐私文件中用户需要的基本元素的解密和正常显示。由此可见,本申请实施例的技术方案实用性高,适用范围广。To sum up, the technical solutions of the embodiments of the present application can also realize decryption and normal display of basic elements required by the user in the privacy file based on the user's participation. It can be seen that the technical solutions of the embodiments of the present application have high practicability and wide application range.
以上方案是以密文形式进行隐私文件中的各基本元素的保存。在实际应用中,还可以以明文形式进行隐私文件中的各基本元素的保存。在获取到目标参数的情况下,读取第一对应关系,从第一对应关系中读取与目标参数对应的隐私数据作为目标隐私数据。此时的目标隐私数据为明文数据,电子设备的显示屏可直接显示目标隐私数据。对于在目标参数表征的使用场景下不需要的隐私数据,可以不显示,或以马赛克的形式进行显示。以此实现了根据使用场景只显示用户需要的隐私数据,减少不需要的隐私数据的泄露风险。The above scheme is to save the basic elements in the privacy file in the form of ciphertext. In practical applications, each basic element in the privacy file can also be stored in plaintext. When the target parameter is acquired, the first correspondence is read, and the privacy data corresponding to the target parameter is read from the first correspondence as the target privacy data. At this time, the target privacy data is plaintext data, and the display screen of the electronic device can directly display the target privacy data. For the private data that is not required in the usage scenario represented by the target parameter, it may not be displayed, or it may be displayed in the form of a mosaic. In this way, only the private data required by the user is displayed according to the usage scenario, and the risk of leakage of unnecessary private data is reduced.
下面以图7所示为例,对本申请技术方案进行进一步说明。The technical solution of the present application will be further described below by taking the example shown in FIG. 7 .
将隐私文件进行基本元素(element)的划分,如图7所示。每个基本元素可供选择的标签(label)具有两种,其中一种为默认标签(Defaultlabel),另外一种为私有标签(privacylabel)。用户可为每个基本元素选择一个标签。被选择为默认标签的基本元素需采用默认密钥(Default key)进行加密和解密。被选择为私有标签的基本元素需采用私有密钥(Privacy key)进行加密和解密。或者,在全部基本元素中被选中的基本元素采用私有密钥进行加密和解密,其余未被选中的基本元素默认采用默认密钥进行加密和解密。每个基本元素可根据实际使用需求进行标签的选择。在一些场景中,可选择全部基本元素作为默认标签、或者选择全部基本元素作为私有标签。The privacy file is divided into basic elements, as shown in Figure 7. There are two kinds of labels (labels) available for each basic element, one of which is the default label (Defaultlabel) and the other is the private label (privacylabel). The user can select a label for each basic element. The basic element selected as the default label needs to be encrypted and decrypted with the default key (Default key). The basic elements selected as private labels need to be encrypted and decrypted with a private key (Privacy key). Alternatively, the selected basic elements among all the basic elements are encrypted and decrypted by using the private key, and the remaining non-selected basic elements are encrypted and decrypted by default using the default key. Labels can be selected for each basic element according to actual usage requirements. In some scenarios, all base elements may be selected as default labels, or all base elements may be selected as private labels.
针对隐私文件为身份证的场景,在身份证的全部基本元素中,姓名和身份证号可作为具有默认标签的元素。其余基本元素可视为具有私有标签的元素。For the scenario where the privacy document is an ID card, among all the basic elements of the ID card, the name and ID number can be used as elements with default labels. The rest of the base elements can be considered as elements with private tags.
为电子设备开辟安全(secure)空间或私有空间,将默认密钥和/或私有密钥保存至安全空间。待到使用如需要对基本元素进行解密时,可从安全空间中读取出默认密钥和/或私有密钥。利用默认密钥对具有默认标签的基本元素进行解密,利用私有密钥对具有私有标签的基本元素进行解密。Create a secure space or private space for the electronic device, and save the default key and/or the private key in the secure space. The default key and/or the private key can be read from the secure space until the base element is decrypted if required for use. The base element with the default label is decrypted with the default key, and the base element with the private label is decrypted with the private key.
可以理解,由于安全空间或私有空间具有一定的保密性和安全性,利用安全空间对默认密钥和私有密钥进行保存,可提高密钥保存的安全性和保密性,避免密钥的恶意被篡改。It can be understood that since the safe space or private space has certain confidentiality and security, using the safe space to save the default key and private key can improve the security and confidentiality of key storage and avoid malicious keys. tamper.
此外,为加强安全空间的访问安全性,可预先为安全空间的访问设置访问密码,在用户输入的访问密码被认证通过的情况下,方可读取保存在安全空间中的密钥。以此来进一步增强安全性。In addition, in order to strengthen the access security of the safe space, an access password can be set for the access to the safe space in advance, and the key stored in the safe space can be read only when the access password input by the user is authenticated and passed. This further enhances security.
本应用场景中,默认密钥的由来是:在secure空间为每个被选中为默认标签的基本元素生成随机数,使用椭圆加密(ECC)算法对生成的各个随机数进行加密,得到各个默认密钥。使用各个默认密钥对每个被选中的为默认标签的基本元素进行对应加密,得到各个加密后的默认元素(为默认标签的基本元素)。In this application scenario, the origin of the default key is: in the secure space, a random number is generated for each basic element selected as the default label, and each generated random number is encrypted using the elliptic encryption (ECC) algorithm to obtain each default key. key. Each selected basic element of the default label is encrypted correspondingly using each default key to obtain each encrypted default element (the basic element of the default label).
示例性地,默认标签的基本元素包括元素1和元素2,为元素1、元素2生成的随机数为随机数1、随机数2,对随机数1、随机数2分别进行ECC加密得到默认密钥1、默认密钥2。使用默认密钥1对元素1进行加密,使用默认密钥2对元素2进行加密,得到元素1、元素2被加密后的数据。Exemplarily, the basic elements of the default label include
待到使用时,对于隐私文件中的默认元素,如果将解锁电子设备的操作如输入开机密码作为进入安全空间的访问密码,在电子设备识别用户输入的访问密码正确的情况下,进入安全空间,从安全空间中读取默认密钥1、默认密钥2。使用默认密钥1、默认密钥2分别对加密后的元素1、元素2进行解密,并将解密后的数据进行显示。直接给用户呈现图7中的Default documentation(默认元素文件),在Default documentation中为defaultlabel的element均以明文形式进行显示。When it is used, for the default element in the privacy file, if the operation of unlocking the electronic device, such as inputting the power-on password, is used as the access password for entering the safe space, and the electronic device recognizes that the access password entered by the user is correct, the user can enter the safe space. Read
从前述内容可见,本应用场景中默认密钥是由基于电子设备自动生成的随机数而得到的。私有密钥可基于电子设备采集到的输入密码而得到。私有密钥是的由来是:采集用户输入的密码,使用ECC算法对用户输入的密码进行加密,得到各个私有密钥。使用各个私有密钥对每个被选中的为私有标签的基本元素进行对应加密,得到各个加密后的私有元素(为私有标签的基本元素)。It can be seen from the foregoing that the default key in this application scenario is obtained based on a random number automatically generated by the electronic device. The private key can be obtained based on the input password collected by the electronic device. The origin of the private key is: collect the password entered by the user, encrypt the password entered by the user with the ECC algorithm, and obtain each private key. Each selected basic element of the private label is correspondingly encrypted using each private key to obtain each encrypted private element (the basic element of the private label).
其中,用户输入的密码可以是数字、字母、下划线等字符,还可以是生理特征信息,如指纹、声纹、眼膜等。在实现上,在私有元素的数量为两个或两个以上的情况下,可采用基于同一用户输入密码得到的私有密钥对各个私有元素进行加密。还可以每个私有元素对应一个用户输入密码,每个私有元素采用基于与其对应的用户输入密码而得到的私有密钥进行加密。或者,部分私有元素对应同一用户输入密码,部分私有元素采用基于该同一用户输入密码而得到的私有密钥进行加密。对此不作具体限定。The password input by the user may be characters such as numbers, letters, and underscores, and may also be physiological characteristic information, such as fingerprints, voiceprints, and eye masks. In terms of implementation, when the number of private elements is two or more, each private element can be encrypted by using a private key obtained based on a password entered by the same user. It is also possible that each private element corresponds to a user-input password, and each private element is encrypted with a private key obtained based on the corresponding user-input password. Alternatively, some of the private elements correspond to the same user's input password, and some of the private elements are encrypted with a private key obtained based on the same user's input of the password. This is not specifically limited.
示例性地,私有标签的基本元素包括元素3、元素4和元素5,元素3对应的用户输入密码为手指1的指纹、元素4对应的用户输入密码为手指2的指纹、元素5对应的用户输入密码为手指3的指纹,对手指1、手指2、手指3的指纹分别进行ECC加密得到私有密钥1、私有密钥2、私有密钥3。使用私有密钥1对元素3进行加密,使用私有密钥2对元素4进行加密,使用私有密钥3对元素5进行加密,得到元素3、元素4、元素5被加密后的数据。Exemplarily, the basic elements of the private label include
待到使用时,对于隐私文件中的私有元素,如果将解锁电子设备的操作如输入开机密码作为进入安全空间的访问密码,在电子设备识别用户输入的访问密码正确的情况下,进入安全空间,从安全空间中读取私有密钥1、私有密钥2和私有密钥3。使用私有密钥1、私有密钥2、私有密钥3分别对加密后的元素3、元素4、元素5进行解密,并将解密后的数据进行显示。When it is in use, for the private element in the privacy file, if the operation of unlocking the electronic device, such as inputting the power-on password as the access password for entering the safe space, enters the safe space when the electronic device recognizes that the access password entered by the user is correct,
以上方案中,需要显示的私有元素可预先设置好,基于该设置,自动选中需要显示的私有元素,并进行解密。此外,对于私有元素,用户可对其处于一个使用场景下的需要的私有元素进行手动选择,在手动选择后对选择的私有元素进行解密。In the above solution, the private elements to be displayed can be preset, and based on the settings, the private elements to be displayed are automatically selected and decrypted. In addition, for the private element, the user can manually select the desired private element in a usage scenario, and decrypt the selected private element after the manual selection.
在具体实现上,电子设备可通过菜单的形式将可供用户手动选择的私有元素的标识(如身份证上的“性别”、“名族”等字样)进行呈现,用户从菜单中选择需要显示或展示的基本元素,点击需要显示或展示的基本元素的标识。电子设备识别被用户选中需要显示的私有元素,采集访问密码,在访问密码认证通过的情况下,从安全空间中读取可解密这个或这些被选中的私有元素的私有密钥,利用私有密钥进行解密并显示解密后的数据。如电子设备为用户呈现图7中的Privacy documentation(私有元素文件),Privacydocumentation可既包含默认元素、又包含用户选中的私有元素。默认元素和用户选中的私有元素在Privacy documentation中以明文形式进行显示。In terms of specific implementation, the electronic device can present the identifiers of private elements that can be manually selected by the user (such as words such as "gender", "name family", etc. on the ID card) in the form of a menu, and the user selects from the menu to be displayed or the basic element to be displayed, click the logo of the basic element that needs to be displayed or displayed. The electronic device identifies the private element selected by the user and needs to be displayed, collects the access password, and reads the private key from the secure space that can decrypt this or these selected private elements when the access password authentication passes, and uses the private key Decrypt and display the decrypted data. If the electronic device presents the Privacy documentation (private element file) in FIG. 7 to the user, the Privacy documentation may contain both default elements and private elements selected by the user. Default elements and user-selected private elements are shown in clear text in the Privacy documentation.
其中,采集的访问密码可以是采集到的针对每个被选中的私有元素、用户在选中后而输入的密码。在访问密码通过的情况下,则从安全空间读取被选中的私有元素的私有密钥并解密和显示。The collected access password may be the collected password for each selected private element and input by the user after selection. When the access code is passed, the private key of the selected private element is read from the secure space and decrypted and displayed.
访问密码可以是额外采集用户输入的数字、字母等字符、或指纹、声纹、眼膜等作为访问密码。还可以无需进行额外采集,将私有密钥由来方案中需要使用ECC算法加密而得到私有密钥的用户输入密码作为对安全空间的访问密码即可。选择私有密钥由来方案中需要使用ECC算法加密而得到私有密钥的用户输入密码中的一个或多个作为访问密码。The access password may be additionally collected numbers, letters and other characters input by the user, or fingerprints, voiceprints, eye masks, etc. as the access password. It is also possible to use the user input password that needs to be encrypted with the ECC algorithm to obtain the private key in the private key origin scheme as the access password to the secure space without additional collection. One or more of the user input passwords that need to be encrypted with the ECC algorithm to obtain the private key in the private key origin scheme are selected as the access password.
安全空间的访问密码的数量可以是一个,在全部被选中的私有元素被选中后,用户输入被选中的访问密码。或者,安全空间的访问密码为多个,如每选中一个私有元素之后输入一个访问密码,或者每选中两个或多个私有元素之后输入一个访问密码。具体根据实际应用而定。The number of access passwords for the safe space may be one, and after all the selected private elements are selected, the user inputs the selected access password. Alternatively, there are multiple access passwords for the safe space, for example, one access password is input after each private element is selected, or one access password is input after each two or more private elements are selected. It depends on the actual application.
在每选中一个私有元素之后输入一个访问密码的方案中,每选中一个私有元素之后输入的访问密码需为每个被选中的私有元素的私有密钥由来方案中需要使用ECC算法加密而得到该私有密钥的用户输入密码。In the scheme of entering an access password after each selected private element, the access password entered after each selected private element must be the origin of the private key of each selected private element. In the scheme, the ECC algorithm needs to be encrypted to obtain the private key The user of the key enters the password.
示例性地,如果在私有密钥由来方案中,元素3作为私有元素,其私有密钥是使用ECC算法对用户指纹1进行加密而得到的。如果在手动选择需要显示的私有元素中用户选择了元素3,则在选中元素3后,用户需输入指纹1,作为访问安全空间中的元素3的私有密钥的访问密码。Exemplarily, if in the private key origin scheme,
即,在每选中一个私有元素之后输入一个访问密码的方案中,每选中一个私有元素之后输入的访问密码可作为访问该私有元素的私有密钥的密码。That is, in the scheme of inputting an access password after each selection of a private element, the access password input after each selection of a private element can be used as the password for accessing the private key of the private element.
前述方案中,只有输入正确的访问密码的情况下,才可成功访问到想要显示的私有元素的私有密钥。为私有元素的解密提供了一道安全防线,实现了对私有元素的安全解密,可有效减少隐私数据被泄露的风险。In the aforementioned solution, only when the correct access password is input, the private key of the private element to be displayed can be successfully accessed. It provides a security line of defense for the decryption of private elements, realizes the secure decryption of private elements, and can effectively reduce the risk of private data being leaked.
以上关于访问密码的输入方案不限定于手动选中需要显示的私有元素的过程中,还适用于自动选中需要显示的私有元素并解密的方案。The above input scheme for the access password is not limited to the process of manually selecting the private element to be displayed, but also applies to the scheme of automatically selecting and decrypting the private element to be displayed.
可以理解,前述方案中,是以电子设备所处的位置和/或时间来确定电子设备所处的使用场景的。如,以电子设备所处的位置和/或时间来区分电子设备处于银行、学校、房产交易大厅、警局等何种使用场景中。进而实现根据不同的使用场景显示不同的隐私数据。It can be understood that, in the foregoing solution, the location and/or time where the electronic device is located is used to determine the usage scene where the electronic device is located. For example, the location and/or time of the electronic device can be used to distinguish which usage scenarios the electronic device is in, such as a bank, a school, a real estate transaction hall, or a police station. In this way, different privacy data can be displayed according to different usage scenarios.
在实际应用中,除了可以根据电子设备所处的位置和/或时间来区分电子设备所处的使用场景,还可以根据观看图像、视频、文本的对象的不同来区分不同的使用场景。这里的对象主要指的是人。不同对象主要是指处于不同角色的人。例如,大人、小孩、熟人、陌生人、熟人中关系亲密的人、熟人中关系不亲密的人等。由于在实际应用中每个人可能不止是一个角色,所以任何合理的角色对象均可位于本申请实施例的保护范围内。In practical applications, in addition to differentiating usage scenarios where the electronic device is located according to the location and/or time of the electronic device, different usage scenarios can also be differentiated according to different objects for viewing images, videos, and texts. The object here mainly refers to people. Different objects mainly refer to people in different roles. For example, adults, children, acquaintances, strangers, close acquaintances, non-close acquaintances, etc. Since each person may have more than one role in practical applications, any reasonable role object may be within the protection scope of the embodiments of the present application.
本申请的技术方案,可以根据观看图像、视频、文本的对象的不同来区分不同的使用场景,根据不同的对象从隐私文件中确定出需要显示的内容,对需要显示的内容进行显示。即,根据不同的使用场景实现对隐私文件中的不同内容的显示。简言之,可根据不同的对象来显示隐私文件中的不同内容。The technical solution of the present application can distinguish different usage scenarios according to different objects of viewing images, videos and texts, determine the content to be displayed from the privacy file according to different objects, and display the content to be displayed. That is, the display of different contents in the privacy file is realized according to different usage scenarios. In short, different contents in the privacy file can be displayed according to different objects.
本申请技术方案中,隐私文件可以是图像、视频、文本等。如果隐私文件为视频,视频中含有隐私内容。可基于观看对象的角色,对视频中符合观看对象的护理内容进行截取,并显示给该观看对象。In the technical solution of the present application, the privacy file may be an image, a video, a text, or the like. If the private file is a video, the video contains private content. Based on the role of the viewing object, the nursing content in the video that matches the viewing object can be intercepted and displayed to the viewing object.
示例性地,针对包含有小孩的身体隐私部位的护理、大人的身体隐私部位的护理和老人的身体隐私部位的护理等内容的视频A,电子设备可基于对观看对象的人脸的识别得到观看对象为小孩、大人、还是老年人。如果识别为观看对象是小孩,则确定视频A中小孩的隐私部位的护理内容为目标隐私数据,从视频A中截取出小孩的隐私部位的护理内容的视频部分,并显示截取的视频部分。如果识别为观看对象是大人,则确定视频A中大人的隐私部位的护理内容为目标隐私数据,从视频A中截取出大人的隐私部位的护理内容的视频部分,并显示截取的视频部分。Exemplarily, for video A that includes nursing of the private parts of the body of children, nursing of the private parts of the body of adults, nursing of the private parts of the elderly, etc., the electronic device can be viewed based on the recognition of the face of the viewing object. The target is children, adults, or the elderly. If it is identified that the viewing object is a child, the nursing content of the child's private part in video A is determined as the target privacy data, the video part of the nursing content of the child's private part is intercepted from video A, and the intercepted video part is displayed. If it is recognized that the viewing object is an adult, the nursing content of the adult's private part in the video A is determined as the target privacy data, the video part of the nursing content of the adult's private part is cut out from the video A, and the intercepted video part is displayed.
其中,需要预先将观看对象的不同角色与视频A中属于不同角色的观看对象应该看的视频内容部分进行对应绑定,如此,便可基于观看对象的角色实现对该角色应该观看的内容的确定,进而从视频A中实现要显示视频部分的准确截取。Among them, it is necessary to bind the different roles of the viewing objects in advance with the video content parts that the viewing objects belonging to different roles should watch in video A, so that the content that the viewing objects should watch can be determined based on the roles of the viewing objects. , and then realize the accurate interception of the video part to be displayed from the video A.
如果隐私文件为图像,图像中含有隐私内容。可基于对该图像的观看对象的角色,电子设备提供对同一图像中不同图像内容,以供不同观看对象的观看。If the private file is an image, the image contains private content. Based on the roles of the viewing objects for the image, the electronic device may provide different image content in the same image for viewing by different viewing objects.
示例性地,电子设备的机主本人站在了新购买的私家车面前拍了一张照片,该照片中含有自家车的车牌号和车标(车牌号和车标可视为机主本人的隐私信息)。机主本人可通过电子设备将该照片发布于网络上,如通过发朋友圈的方式在网络上发布。对于机主本人在网络上发布的这张照片,利用本申请实施例的技术方案,朋友圈中不同关系的朋友看到的内容不同。按照朋友的亲密程度,将机主本人的朋友圈中的朋友划分为家人、关系比较亲密的朋友、关系一般的朋友和不太熟悉的朋友等。电子设备可基于机主本人对朋友的亲密程度的设定而获知朋友圈中各个朋友的角色。如果一位家人通过朋友圈点击了该张照片,想要观看,则电子设备获知点击该照片的人在机主本人的朋友圈中的角色,其为家人,则可将整个照片显示给家人。如果一位关系一般的朋友通过朋友圈点击了该张照片,想要观看,则电子设备获知点击该照片的人在机主本人的朋友圈中的角色,其为关系一般的朋友,则可将整个照片中除了车牌号和车标之外的其他图像部分显示给该朋友。Exemplarily, the owner of the electronic device stands in front of the newly purchased private car and takes a photo, which contains the license plate number and logo of the car (the license plate number and logo can be regarded as the owner's own). privacy information). The owner himself can publish the photo on the Internet through an electronic device, such as publishing it on the Internet by sending it to a circle of friends. For this photo published by the owner himself on the Internet, using the technical solutions of the embodiments of the present application, friends with different relationships in the circle of friends see different content. According to the degree of intimacy of the friends, the friends in the owner's own circle of friends are divided into family members, relatively close friends, ordinary friends, and unfamiliar friends. The electronic device can learn the roles of each friend in the circle of friends based on the setting of the intimacy of the owner to the friend. If a family member clicks the photo through the circle of friends and wants to watch it, the electronic device will know the role of the person who clicked the photo in the owner's circle of friends, which is a family member, and can display the entire photo to the family member. If a friend with a general relationship clicks on the photo through a circle of friends and wants to watch it, the electronic device will know the role of the person who clicked the photo in the owner's circle of friends. The rest of the image in the entire photo, except for the license plate number and emblem, is shown to the friend.
其中,需要预先将观看对象的不同角色与照片中属于不同角色的观看对象应该看的内容部分进行对应绑定,如此,便可基于观看对象的角色实现对该角色应该观看的图像内容的确定。Wherein, different roles of the viewing object need to be bound in advance correspondingly to the content parts that the viewing objects belonging to different roles should watch in the photo, so that the image content that the viewing object should watch can be determined based on the role of the viewing object.
朋友圈中发布的照片可以是人脸照片,人脸照片作为一种特殊的隐私照片,也可根据朋友圈中想要观看人脸照片的对象与机主本人的亲密程度显示不同的图像内容。示例性地,如果一位家人通过朋友圈点击了人脸照片,想要观看,则电子设备获知点击该人脸照片的人在机主本人的朋友圈中的角色,其为家人,则可将人脸照片以原生照(未经过美颜)的显示效果显示给家人。如果一位朋友通过朋友圈点击了人脸照片,想要观看,则电子设备获知点击该人脸照片的人在机主本人的朋友圈中的角色,其为关系一般的朋友,则可将人脸照片以经过美颜的照片显示给关系一般的朋友。其中,可预先将观看对象的不同角色与照片中属于不同角色的观看对象观看该照片时的显示效果的图像进行对应绑定。其中,不同的角色可以该电子化设备的用户或者该应用程序的用户针对不同的用户ID(标识)设定的角色标识,例如,家人、朋友等。The photos published in the circle of friends can be face photos. As a special kind of private photos, face photos can also display different image content according to the intimacy of the person who wants to view the face photos in the circle of friends and the owner. Exemplarily, if a family member clicks a face photo through a circle of friends and wants to watch it, the electronic device learns the role of the person who clicked the face photo in the owner's own circle of friends, who is a family member, and can then The face photo is displayed to the family in the display effect of the original photo (without beauty treatment). If a friend clicks a face photo through a circle of friends and wants to watch it, the electronic device will know the role of the person who clicked the face photo in the owner's circle of friends. The face photo is displayed to friends in general relationship as a beautified photo. Wherein, different characters of the viewing object may be bound in advance correspondingly to the images of the display effect when viewing objects belonging to different roles in the photo are viewing the photo. Wherein, different roles may be role identifiers set by the user of the electronic device or the user of the application program for different user IDs (identifications), such as family members, friends, and the like.
从前述内容可知,对于隐私文件,利用本申请实施例的技术方案,根据观看对象的身份实现对隐私文件的不同内容的显示,或者根据电子设备所处的位置和/或时间实现对隐私文件的不同内容的显示。总结而言,利用本申请技术方案,可根据不同的使用场景实现对隐私文件中的不同内容的显示。As can be seen from the foregoing, for privacy files, the technical solutions of the embodiments of the present application are used to display different contents of the privacy files according to the identity of the viewing object, or realize the display of the privacy files according to the location and/or time of the electronic device. Display of different content. To sum up, with the technical solutions of the present application, the display of different contents in the privacy file can be realized according to different usage scenarios.
根据本申请实施例,本申请提供一种电子设备,如图8所示,所述电子设备包括:According to an embodiment of the present application, the present application provides an electronic device, as shown in FIG. 8 , the electronic device includes:
获取单元701,用于获取目标参数,所述目标参数表征电子设备所处的使用场景;所述电子设备包括隐私文件,所述隐私文件包括至少两个隐私数据;an obtaining
确定单元702,用于基于目标参数,从所述至少两个隐私数据中确定出目标隐私数据;a determining
显示单元703,用于显示所述目标隐私数据。A
在一个可选的方案中,所述目标隐私数据为隐私文件的所有隐私数据中与所述目标参数匹配的隐私数据。In an optional solution, the target privacy data is the privacy data matching the target parameter among all the privacy data in the privacy file.
在一个可选的方案中,所述目标隐私数据是对隐私文件的所有隐私数据中与所述目标参数匹配的隐私数据进行加密而得到的数据;In an optional solution, the target privacy data is data obtained by encrypting the privacy data matching the target parameter in all the privacy data of the privacy file;
其中,所述确定单元702还用于:Wherein, the determining
对所述目标隐私数据进行解密;decrypting the target privacy data;
显示单元703,用于显示解密后的数据。The
在一个可选的方案中,所述至少两个隐私数据中除与所述目标参数匹配的隐私数据之外的其余各隐私数据被加密。In an optional solution, the remaining privacy data of the at least two privacy data except the privacy data matching the target parameter are encrypted.
在一个可选的方案中,在与所述目标参数匹配的隐私数据和所述其余各隐私数据中的每个隐私数据采用各自的加密密钥被加密。In an optional solution, each of the private data matching the target parameter and the remaining private data is encrypted with a respective encryption key.
在一个可选的方案中,所述确定单元702还用于:基于与所述目标参数匹配的隐私数据的加密密钥,获取目标解密密钥;In an optional solution, the determining
基于目标解密密钥,对所述目标隐私数据进行解密。The target private data is decrypted based on the target decryption key.
在一个可选的方案中,所述确定单元702还用于:基于采集到的预设用户的生理特征信息,对所述目标隐私数据进行解密。In an optional solution, the determining
在一个可选的方案中,所述隐私文件为隐私图像,所述目标隐私数据为所述隐私图像的全部内容中的部分内容。In an optional solution, the privacy file is a privacy image, and the target privacy data is part of the entire content of the privacy image.
需要说明的是,本申请实施例的电子设备,由于该电子设备解决问题的原理与前述的显示方法相似,因此,电子设备的实施过程及实施原理、有益效果均可以参见前述方法的实施过程及实施原理描述,重复之处不再赘述。It should be noted that, in the electronic device of the embodiment of the present application, since the principle of solving the problem of the electronic device is similar to the aforementioned display method, the implementation process, implementation principle, and beneficial effects of the electronic device can all refer to the implementation process and the aforementioned method. The implementation principle is described, and the repetition will not be repeated.
根据本申请的实施例,本申请还提供了一种电子设备和一种可读存储介质。According to the embodiments of the present application, the present application further provides an electronic device and a readable storage medium.
图9示出了可以用来实施本申请的实施例的示例电子设备800的示意性框图。电子设备旨在表示各种形式的数字计算机,诸如,膝上型计算机、台式计算机、工作台、个人数字助理、服务器、刀片式服务器、大型计算机、和其它适合的计算机。电子设备还可以表示各种形式的移动装置,诸如,个人数字处理、蜂窝电话、智能电话、可穿戴设备和其它类似的计算装置。本文所示的部件、它们的连接和关系、以及它们的功能仅仅作为示例,并且不意在限制本文中描述的和/或者要求的本申请的实现。FIG. 9 shows a schematic block diagram of an example
如图9所示,设备800包括计算单元801,其可以根据存储在只读存储器(ROM)802中的计算机程序或者从存储单元808加载到随机访问存储器(RAM)803中的计算机程序,来执行各种适当的动作和处理。在RAM 803中,还可存储设备800操作所需的各种程序和数据。计算单元801、ROM 802以及RAM 803通过总线804彼此相连。输入/输出(I/O)接口805也连接至总线804。As shown in FIG. 9 , the
设备800中的多个部件连接至I/O接口805,包括:输入单元806,例如键盘、鼠标等;输出单元807,例如各种类型的显示器、扬声器等;存储单元808,例如磁盘、光盘等;以及通信单元809,例如网卡、调制解调器、无线通信收发机等。通信单元809允许设备800通过诸如因特网的计算机网络和/或各种电信网络与其他设备交换信息/数据。Various components in the
计算单元801可以是各种具有处理和计算能力的通用和/或专用处理组件。计算单元801的一些示例包括但不限于中央处理单元(CPU)、图形处理单元(GPU)、各种专用的人工智能(AI)计算芯片、各种运行机器学习模型算法的计算单元、数字信号处理器(DSP)、以及任何适当的处理器、控制器、微控制器等。计算单元801执行上文所描述的各个方法和处理,例如显示数据的方法。例如,在一些实施例中,显示数据的方法可被实现为计算机软件程序,其被有形地包含于机器可读介质,例如存储单元808。在一些实施例中,计算机程序的部分或者全部可以经由ROM 802和/或通信单元809而被载入和/或安装到设备800上。当计算机程序加载到RAM 803并由计算单元801执行时,可以执行上文描述的显示数据的方法的一个或多个步骤。备选地,在其他实施例中,计算单元801可以通过其他任何适当的方式(例如,借助于固件)而被配置为执行显示数据的方法。
本文中以上描述的系统和技术的各种实施方式可以在数字电子电路系统、集成电路系统、场可编程门阵列(FPGA)、专用集成电路(ASIC)、专用标准产品(ASSP)、芯片上系统的系统(SOC)、负载可编程逻辑设备(CPLD)、计算机硬件、固件、软件、和/或它们的组合中实现。这些各种实施方式可以包括:实施在一个或者多个计算机程序中,该一个或者多个计算机程序可在包括至少一个可编程处理器的可编程系统上执行和/或解释,该可编程处理器可以是专用或者通用可编程处理器,可以从存储系统、至少一个输入装置、和至少一个输出装置接收数据和指令,并且将数据和指令传输至该存储系统、该至少一个输入装置、和该至少一个输出装置。Various implementations of the systems and techniques described herein above may be implemented in digital electronic circuitry, integrated circuit systems, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), application specific standard products (ASSPs), systems on chips system (SOC), load programmable logic device (CPLD), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include being implemented in one or more computer programs executable and/or interpretable on a programmable system including at least one programmable processor that The processor, which may be a special purpose or general-purpose programmable processor, may receive data and instructions from a storage system, at least one input device, and at least one output device, and transmit data and instructions to the storage system, the at least one input device, and the at least one output device an output device.
用于实施本申请的方法的程序代码可以采用一个或多个编程语言的任何组合来编写。这些程序代码可以提供给通用计算机、专用计算机或其他可编程数据处理装置的处理器或控制器,使得程序代码当由处理器或控制器执行时使流程图和/或框图中所规定的功能/操作被实施。程序代码可以完全在机器上执行、部分地在机器上执行,作为独立软件包部分地在机器上执行且部分地在远程机器上执行或完全在远程机器或服务器上执行。Program code for implementing the methods of the present application may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer or other programmable data processing apparatus, such that the program code, when executed by the processor or controller, performs the functions/functions specified in the flowcharts and/or block diagrams. Action is implemented. The program code may execute entirely on the machine, partly on the machine, partly on the machine and partly on a remote machine as a stand-alone software package or entirely on the remote machine or server.
在本申请的上下文中,机器可读介质可以是有形的介质,其可以包含或存储以供指令执行系统、装置或设备使用或与指令执行系统、装置或设备结合地使用的程序。机器可读介质可以是机器可读信号介质或机器可读储存介质。机器可读介质可以包括但不限于电子的、磁性的、光学的、电磁的、红外的、或半导体系统、装置或设备,或者上述内容的任何合适组合。机器可读存储介质的更具体示例会包括基于一个或多个线的电气连接、便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或快闪存储器)、光纤、便捷式紧凑盘只读存储器(CD-ROM)、光学储存设备、磁储存设备、或上述内容的任何合适组合。In the context of this application, a machine-readable medium may be a tangible medium that may contain or store the program for use by or in connection with the instruction execution system, apparatus or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. Machine-readable media may include, but are not limited to, electronic, magnetic, optical, electromagnetic, infrared, or semiconductor systems, devices, or devices, or any suitable combination of the foregoing. More specific examples of machine-readable storage media would include one or more wire-based electrical connections, portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM or flash memory), fiber optics, compact disk read only memory (CD-ROM), optical storage, magnetic storage, or any suitable combination of the foregoing.
为了提供与用户的交互,可以在计算机上实施此处描述的系统和技术,该计算机具有:用于向用户显示信息的显示装置(例如,CRT(阴极射线管)或者LCD(液晶显示器)监视器);以及键盘和指向装置(例如,鼠标或者轨迹球),用户可以通过该键盘和该指向装置来将输入提供给计算机。其它种类的装置还可以用于提供与用户的交互;例如,提供给用户的反馈可以是任何形式的传感反馈(例如,视觉反馈、听觉反馈、或者触觉反馈);并且可以用任何形式(包括声输入、语音输入或者、触觉输入)来接收来自用户的输入。To provide interaction with a user, the systems and techniques described herein may be implemented on a computer having a display device (eg, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user ); and a keyboard and pointing device (eg, a mouse or trackball) through which a user can provide input to the computer. Other kinds of devices can also be used to provide interaction with the user; for example, the feedback provided to the user can be any form of sensory feedback (eg, visual feedback, auditory feedback, or tactile feedback); and can be in any form (including acoustic input, voice input, or tactile input) to receive input from the user.
可以将此处描述的系统和技术实施在包括后台部件的计算系统(例如,作为数据服务器)、或者包括中间件部件的计算系统(例如,应用服务器)、或者包括前端部件的计算系统(例如,具有图形用户界面或者网络浏览器的用户计算机,用户可以通过该图形用户界面或者该网络浏览器来与此处描述的系统和技术的实施方式交互)、或者包括这种后台部件、中间件部件、或者前端部件的任何组合的计算系统中。可以通过任何形式或者介质的数字数据通信(例如,通信网络)来将系统的部件相互连接。通信网络的示例包括:局域网(LAN)、广域网(WAN)和互联网。The systems and techniques described herein may be implemented on a computing system that includes back-end components (eg, as a data server), or a computing system that includes middleware components (eg, an application server), or a computing system that includes front-end components (eg, a user computer having a graphical user interface or web browser through which a user may interact with implementations of the systems and techniques described herein), or including such backend components, middleware components, Or any combination of front-end components in a computing system. The components of the system may be interconnected by any form or medium of digital data communication (eg, a communication network). Examples of communication networks include: Local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
计算机系统可以包括客户端和服务器。客户端和服务器一般远离彼此并且通常通过通信网络进行交互。通过在相应的计算机上运行并且彼此具有客户端-服务器关系的计算机程序来产生客户端和服务器的关系。服务器可以是云服务器,也可以为分布式系统的服务器,或者是结合了区块链的服务器。A computer system can include clients and servers. Clients and servers are generally remote from each other and usually interact through a communication network. The relationship of client and server arises by computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, a distributed system server, or a server combined with blockchain.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above are only specific embodiments of the present application, but the protection scope of the present application is not limited to this. should be covered within the scope of protection of this application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210744946.3A CN115203737A (en) | 2022-06-27 | 2022-06-27 | Method and electronic device for displaying data |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210744946.3A CN115203737A (en) | 2022-06-27 | 2022-06-27 | Method and electronic device for displaying data |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN115203737A true CN115203737A (en) | 2022-10-18 |
Family
ID=83578359
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210744946.3A Pending CN115203737A (en) | 2022-06-27 | 2022-06-27 | Method and electronic device for displaying data |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115203737A (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2015191872A1 (en) * | 2014-06-12 | 2015-12-17 | Alibaba Group Holding Limited | Managing confidential information |
| CN106357413A (en) * | 2016-11-02 | 2017-01-25 | 广东虹勤通讯技术有限公司 | Method and mobile terminal for fingerprint encryption number |
| CN106445294A (en) * | 2016-09-23 | 2017-02-22 | 维沃移动通信有限公司 | Control method of application program and mobile terminal |
| KR20220068363A (en) * | 2020-11-19 | 2022-05-26 | (주)성진하이텍 | Portable terminal having smart privacy protection function and method of protecting provacy using the same |
-
2022
- 2022-06-27 CN CN202210744946.3A patent/CN115203737A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2015191872A1 (en) * | 2014-06-12 | 2015-12-17 | Alibaba Group Holding Limited | Managing confidential information |
| CN106445294A (en) * | 2016-09-23 | 2017-02-22 | 维沃移动通信有限公司 | Control method of application program and mobile terminal |
| CN106357413A (en) * | 2016-11-02 | 2017-01-25 | 广东虹勤通讯技术有限公司 | Method and mobile terminal for fingerprint encryption number |
| KR20220068363A (en) * | 2020-11-19 | 2022-05-26 | (주)성진하이텍 | Portable terminal having smart privacy protection function and method of protecting provacy using the same |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20230129693A1 (en) | Transaction authentication and verification using text messages and a distributed ledger | |
| CN114026823B (en) | Computer system for processing anonymous data and method of operating the same | |
| US10944563B2 (en) | Blockchain systems and methods for user authentication | |
| EP3750094B1 (en) | Systems and methods for use in managing digital identities | |
| US10885170B1 (en) | Methods, systems, and storage media for managing patient information using a blockchain network | |
| US10410016B1 (en) | Cloud-based system for protecting sensitive information in shared content | |
| CN110462658B (en) | System and method for providing digital identity records to verify the identity of a user | |
| US10810290B2 (en) | Robust method and an apparatus for authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates | |
| CN112422291B (en) | A social network engine based on zero-knowledge environment | |
| US9799029B2 (en) | Securely receiving data input at a computing device without storing the data locally | |
| Avdić | Use of biometrics in mobile banking security: case study of Croatian banks | |
| US12321470B2 (en) | Data management system, data management method, and non-transitory computer readable medium | |
| CN115203737A (en) | Method and electronic device for displaying data | |
| CN105281916A (en) | Portable password system | |
| WO2023233173A1 (en) | Implementing self-sovereign identity (ssi) based on configurable individual profiles generated real-time from private attributes stored in the personal secure elements of the users | |
| JP2020102741A (en) | Authentication system, authentication method, and authentication program | |
| US20240340339A1 (en) | Peer-to-peer identity verification | |
| US12470552B1 (en) | Secure data processing using data packages generated by edge devices | |
| US20230208634A1 (en) | Key management method and apparatus | |
| US20240297789A1 (en) | Consensual third party identification system architecture | |
| ES2972041T3 (en) | A computer system and method of operation thereof to handle anonymous data | |
| Zhu | A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |