User data protection method, device, equipment and storage medium

文档序号:153363 发布日期:2021-10-26 浏览:28次 中文

阅读说明:本技术 用户数据的保护方法、装置、设备及存储介质 (User data protection method, device, equipment and storage medium ) 是由 王知明 于 2021-06-07 设计创作,主要内容包括:本公开提供一种用户数据的保护方法、装置、设备及存储介质,涉及通信技术领域,能够在信息安全要求高的场景中有效保证用户数据的安全性。具体技术方案为:接收移动零终端发送的音频信号;对音频信号进行分析,并根据分析结果判断移动零终端是否处于疑似不安全场景;在确定移动零终端处于疑似不安全场景时,进入应急处理模式。本发明用于数据保护。(The disclosure provides a method, a device, equipment and a storage medium for protecting user data, relates to the technical field of communication, and can effectively guarantee the security of the user data in a scene with high information security requirement. The specific technical scheme is as follows: receiving an audio signal sent by a mobile zero terminal; analyzing the audio signal, and judging whether the mobile zero terminal is in a suspected unsafe scene according to an analysis result; and when the mobile zero terminal is determined to be in a suspected unsafe scene, entering an emergency treatment mode. The invention is used for data protection.)

1. A method for protecting user data, the method comprising:

receiving an audio signal sent by a mobile zero terminal, wherein the audio signal is an audio signal in the current environment collected by the mobile zero terminal;

analyzing the audio signal, and judging whether the mobile zero terminal is in a suspected unsafe scene according to an analysis result;

and when the mobile zero terminal is determined to be in a suspected unsafe scene, entering an emergency treatment mode.

2. The method of claim 1, wherein analyzing the audio signal and determining whether the mobile zero terminal is in a suspected unsafe scenario according to the analysis result comprises:

preprocessing the audio signal to obtain a preprocessed audio signal;

extracting a characteristic vector from the preprocessed audio signal;

inputting the extracted feature vector into a pre-trained neural network model, and judging whether the audio signal is abnormal audio through the neural network model;

and when the audio signal is abnormal audio, determining that the mobile zero terminal is in a suspected unsafe scene.

3. The method of claim 1, wherein entering an emergency treatment mode upon determining that the mobile zero terminal is in a suspected unsafe scenario comprises:

directly entering an emergency treatment mode; or, when receiving the information that the user confirms that the mobile zero terminal is in an unsafe scene, entering an emergency processing mode;

the emergency processing mode comprises: interrupting the transmission of the image to the mobile zero terminal, or transmitting a preset screen saver image to the mobile zero terminal; or, an emergency switching request is sent to a safety switching management platform, so that the safety switching management platform disconnects the current virtual machine from the mobile zero terminal according to the emergency switching request, and connects the mobile zero terminal with the safety virtual machine.

4. The method of claim 1, further comprising:

and setting an entrance for exiting the emergency treatment mode, wherein the entrance for exiting the emergency treatment mode comprises a preset button or a key displayed on the screen image of the mobile zero terminal.

5. The method of claim 4, wherein upon receiving a trigger sent by the mobile terminal to exit the emergency treatment mode, the method further comprises:

receiving to-be-verified information sent by the mobile zero terminal, wherein the to-be-verified information comprises voice information and face dynamic information;

and after the information to be verified is verified, the emergency processing mode is released and the normal mode is recovered.

6. The method of claim 5, wherein the deactivating the emergency processing mode and reverting to the normal mode after the information to be verified is verified comprises:

when the information to be verified is voice information, acquiring a voice password and voice characteristics of a current user according to the voice information;

judging whether the voice password is an appointed voice password or not, and judging whether the voice characteristics of the current user are matched with the pre-stored voice characteristics or not;

and when the voice password is the appointed voice password and the voice characteristics of the current user are matched with the pre-stored voice characteristics, the emergency treatment mode is released and the normal mode is recovered.

7. The method of claim 5, wherein the deactivating the emergency processing mode and reverting to the normal mode after the information to be verified is verified comprises:

when the information to be verified is face dynamic information, face information and face actions of a current user are obtained according to the face dynamic information;

judging whether the face information of the current user is matched with the face information stored in advance or not, and judging whether the face action meets the requirement or not;

and when the face information of the current user is matched with the face information stored in advance and the face action meets the requirement, the emergency treatment mode is released and the normal mode is recovered.

8. An apparatus for protecting user data, comprising:

the receiving module is used for receiving an audio signal sent by the mobile zero terminal, wherein the audio signal is an audio signal in the current environment collected by the mobile zero terminal;

the analysis and judgment module is used for analyzing the audio signal and judging whether the mobile zero terminal is in a suspected unsafe scene according to an analysis result;

and the processing module is used for entering an emergency processing mode when the mobile zero terminal is determined to be in a suspected unsafe scene.

9. A device for protecting user data, characterized in that it comprises a processor and a memory, in which is stored at least one computer instruction, which is loaded and executed by said processor to implement the steps performed in the method for protecting user data according to any one of claims 1 to 7.

10. A computer-readable storage medium, having stored thereon at least one computer instruction, which is loaded and executed by a processor to perform the steps performed in the method for protecting user data according to any one of claims 1 to 7.

Technical Field

The present disclosure relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a storage medium for protecting user data.

Background

With the development of technology, mobile terminals will be developed to be thinner and lighter in the future, and at present, a solution for a mobile zero terminal, that is, a terminal only needs to have a screen, a simple CPU and a memory, an image receiving and decoding module for processing an image, and a reverse control processing module is proposed, which can greatly simplify the size and configuration of the mobile terminal. All programs of the mobile zero terminal run in the cloud server, the mobile zero terminal operates corresponding application programs through accessing the server and controls the corresponding application programs through reverse control, and the server sends real-time pictures to the mobile zero terminal, so that the mobile zero terminal operates locally.

The mobile zero terminal has the natural property that the zero terminal is not stored in a secret mode, so that the safety of information is enhanced beneficially. However, the mobile zero terminal has mobility and convenience, and particularly in some scenes with high information security requirements, the information security of the mobile zero terminal has huge hidden dangers.

Disclosure of Invention

The embodiment of the disclosure provides a method, a device, equipment and a storage medium for protecting user data, which can effectively ensure the security of the user data in a scene with high information security requirements. The technical scheme is as follows:

according to a first aspect of the embodiments of the present disclosure, there is provided a method for protecting user data, the method including:

receiving an audio signal sent by the mobile zero terminal, wherein the audio signal is an audio signal in the current environment collected by the mobile zero terminal;

analyzing the audio signal, and judging whether the mobile zero terminal is in a suspected unsafe scene according to an analysis result;

and when the mobile zero terminal is determined to be in a suspected unsafe scene, entering an emergency treatment mode.

The method comprises the steps of judging whether the mobile zero terminal is in a suspected unsafe scene or not by identifying the audio signal of the current environment where the mobile zero terminal is located, entering an emergency processing mode when the mobile zero terminal is determined to be in the suspected unsafe scene, identifying the environment where the mobile zero terminal is located, and effectively ensuring the safety of user data in a scene with high information safety requirement.

In one embodiment, analyzing the audio signal and determining whether the mobile zero terminal is in a suspected unsafe scene according to the analysis result includes:

preprocessing the audio signal to obtain a preprocessed audio signal;

extracting a characteristic vector from the preprocessed audio signal;

inputting the extracted feature vector into a pre-trained neural network model, and judging whether the audio signal is abnormal audio through the neural network model;

and when the audio signal is abnormal audio, determining that the mobile zero terminal is in a suspected unsafe scene.

In one embodiment, upon determining that the mobile zero terminal is in a suspected unsafe scenario, entering the emergency treatment mode includes:

directly entering an emergency treatment mode; or, when receiving the information that the user confirms that the mobile zero terminal is in an unsafe scene, entering an emergency processing mode;

the emergency treatment mode comprises the following steps: interrupting the transmission of the image to the mobile zero terminal, or transmitting a preset screen saver image to the mobile zero terminal; or, an emergency switching request is sent to the safety switching management platform, so that the safety switching management platform disconnects the current virtual machine from the mobile zero terminal according to the emergency switching request, and connects the mobile zero terminal with the safety virtual machine.

In one embodiment, the method further comprises:

and setting an entry for exiting the emergency treatment mode, wherein the entry for exiting the emergency treatment mode comprises a preset button or a key displayed on a screen image of the mobile zero terminal.

In one embodiment, upon receiving a trigger operation sent by the mobile zero terminal to exit the emergency treatment mode, the method further includes:

receiving information to be verified sent by a mobile zero terminal, wherein the information to be verified comprises voice information and face dynamic information;

and after the information to be verified passes the verification, the emergency processing mode is released and the normal mode is recovered.

In one embodiment, after the information to be verified is verified, the emergency processing mode is released, and the recovery to the normal mode includes:

when the information to be verified is voice information, acquiring a voice password and voice characteristics of a current user according to the voice information;

judging whether the voice password is an appointed voice password or not, and judging whether the voice characteristics of the current user are matched with the pre-stored voice characteristics or not;

and when the voice password is the designated voice password and the voice characteristics of the current user are matched with the pre-stored voice characteristics, the emergency processing mode is released and the normal mode is recovered.

In one embodiment, after the information to be verified is verified, the emergency processing mode is released, and the recovery to the normal mode includes:

when the information to be verified is face dynamic information, face information and face actions of a current user are obtained according to the face dynamic information;

judging whether the face information of the current user is matched with the face information stored in advance, and judging whether the face action meets the requirement;

and when the face information of the current user is matched with the face information stored in advance and the face action meets the requirement, the emergency treatment mode is released and the normal mode is recovered.

According to a second aspect of the embodiments of the present disclosure, there is provided a protection apparatus for user data, including:

the receiving module is used for receiving the audio signal sent by the mobile zero terminal, wherein the audio signal is the audio signal in the current environment collected by the mobile zero terminal;

the analysis and judgment module is used for analyzing the audio signal and judging whether the mobile zero terminal is in a suspected unsafe scene according to an analysis result;

and the processing module is used for entering an emergency processing mode when the mobile zero terminal is determined to be in a suspected unsafe scene.

According to a third aspect of the embodiments of the present disclosure, there is provided a device for protecting user data, the device for protecting user data includes a processor and a memory, the memory stores at least one computer instruction, and the instruction is loaded and executed by the processor to implement the steps performed in the method for protecting user data described in the first aspect and any embodiment of the first aspect.

According to a fourth aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium, in which at least one computer instruction is stored, the instruction being loaded and executed by a processor to implement the steps performed in the method for protecting user data described in the first aspect and any embodiment of the first aspect.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.

Drawings

The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.

Fig. 1 is a flowchart of a method for protecting user data according to an embodiment of the present disclosure;

fig. 2 is a schematic diagram of a system for protecting user data according to an embodiment of the present disclosure;

fig. 3 is a structural diagram of a user data protection device according to an embodiment of the present disclosure;

fig. 4 is a structural diagram of a user data protection device according to an embodiment of the present disclosure;

fig. 5 is a structural diagram of a user data protection device according to an embodiment of the present disclosure.

Detailed Description

Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.

An embodiment of the present disclosure provides a user data protection method, as shown in fig. 1, the user data protection method includes the following steps:

101. and receiving the audio signal sent by the mobile zero terminal.

In the embodiment of the present disclosure, the audio signal is an audio signal in the current environment collected by the mobile zero terminal. Specifically, the mobile zero terminal may collect an audio signal of the current environment according to a preset frequency, and send the collected audio signal to the corresponding virtual machine.

102. And analyzing the audio signal, and judging whether the mobile zero terminal is in a suspected unsafe scene according to an analysis result.

In the embodiment of the present disclosure, analyzing the audio signal, and determining whether the mobile zero terminal is in a suspected unsafe scene according to the analysis result includes: preprocessing the audio signal to obtain a preprocessed audio signal; extracting a characteristic vector from the preprocessed audio signal; inputting the extracted feature vector into a pre-trained neural network model, and judging whether the audio signal is abnormal audio through the neural network model; and when the audio signal is abnormal audio, determining that the mobile zero terminal is in a suspected unsafe scene.

For a pre-trained neural network model, a large amount of audio data of abnormal sounds can be collected in advance, each piece of audio data is preprocessed, and feature vector extraction is carried out on the preprocessed audio data; and then, obtaining a feature vector library of abnormal sounds according to the extracted feature vectors, continuously inputting the feature vectors in the feature vector library of the abnormal sounds as training data into a pre-established neural network model for training, and obtaining a trained neural network model after a large amount of training, wherein the trained neural network model has the capability of identifying abnormal audio signals.

Specifically, when receiving an audio signal sent by the mobile zero terminal, the virtual machine performs preprocessing such as noise removal on the audio signal to obtain a preprocessed audio signal, and extracts a feature vector from the preprocessed audio signal; after the audio data after extracting the feature vectors is input into a pre-trained neural network model, whether the audio signals are abnormal audio is identified through the model, and the abnormal audio includes but is not limited to: explosion sound, glass crushing sound, personnel distress sound and the like; and when the audio signal is abnormal audio, determining that the mobile zero terminal is in a suspected unsafe scene.

103. And when the mobile zero terminal is determined to be in a suspected unsafe scene, entering an emergency treatment mode.

In the embodiment of the disclosure, when it is determined that the mobile zero terminal is in a suspected unsafe scene, the emergency processing mode may be directly entered, or when information that the user confirms that the mobile zero terminal is in the unsafe scene is received, the emergency processing mode may be entered. Wherein, the emergency treatment mode includes: interrupting the transmission of the image to the mobile zero terminal, or transmitting a preset screen saver image to the mobile zero terminal; or, an emergency switching request is sent to the safety switching management platform, so that the safety switching management platform disconnects the current virtual machine from the mobile zero terminal according to the emergency switching request, and connects the mobile zero terminal with the safety virtual machine. It should be noted that the secure virtual machine is a virtual machine that does not have any confidential data. Therefore, the data of the current user can be ensured not to be leaked through the three modes.

In one example, when it is determined that the mobile zero terminal is in a suspected unsafe scene, the virtual machine may send inquiry information about whether the mobile zero terminal is in the unsafe scene to the mobile zero terminal, and if the user determines that the mobile zero terminal is in the unsafe scene, the mobile zero terminal sends information that the user confirms that the mobile zero terminal is in the unsafe scene to the virtual machine, and at this time, the virtual machine enters an emergency processing mode. The reason for the secondary confirmation by the user is: since there are some possible disturbing sounds (such as tv sounds, cup-breaking sounds, etc.), which are determined as abnormal sounds when they are used as audio signals, it cannot be fully determined that the current scene is not safe, and thus a secondary confirmation is required.

Further, the method further comprises: and setting an entry for exiting the emergency treatment mode, wherein the entry for exiting the emergency treatment mode comprises a preset button or a key displayed on a screen image of the mobile zero terminal.

When a user clicks a preset button or a key displayed on a screen image of the mobile zero terminal, the mobile zero terminal sends a triggering operation of exiting the emergency processing mode clicked by the user to the virtual machine, and at the moment, the virtual machine can directly remove the emergency processing mode and restore the normal mode; and the safety verification of the information to be verified can be carried out by receiving the information to be verified sent by the mobile zero terminal, wherein the information to be verified comprises voice information and face dynamic information, the emergency processing mode is released after the information to be verified passes the verification, and the normal mode is recovered.

In a first example, when the information to be verified is voice information, acquiring a voice password and voice characteristics of a current user according to the voice information; judging whether the voice password is an appointed voice password or not, and judging whether the voice characteristics of the current user are matched with the pre-stored voice characteristics or not; and when the voice password is the designated voice password and the voice characteristics of the current user are matched with the pre-stored voice characteristics, the emergency processing mode is released and the normal mode is recovered.

In a second example, when the information to be verified is face dynamic information, face information and face actions of a current user are obtained according to the face dynamic information; judging whether the face information of the current user is matched with the face information stored in advance, and judging whether the face action meets the requirement; and when the face information of the current user is matched with the face information stored in advance and the face action meets the requirement, the emergency treatment mode is released and the normal mode is recovered.

The voice verification described in the first example and the face verification described in the second example may be performed separately or simultaneously, and may be specifically selected according to actual situations.

According to the user data protection method provided by the embodiment of the disclosure, whether the mobile zero terminal is in a suspected unsafe scene is judged by identifying the audio signal of the current environment where the mobile zero terminal is located, and when the mobile zero terminal is determined to be in the suspected unsafe scene, the mobile zero terminal enters the emergency processing mode, and the environment where the mobile zero terminal is located can be identified, so that the safety of user data is effectively ensured in a scene with high information safety requirements.

Based on the user data protection method provided by the embodiment corresponding to fig. 1, another embodiment of the present disclosure provides a user data protection method, which can be applied to the user data protection system shown in fig. 2, where the system architecture includes: the system comprises a cloud server and at least one mobile zero terminal, wherein at least one virtual machine runs in the cloud server. In fig. 2, n mobile terminals and n virtual machines are taken as examples for illustration. The cloud server allocates a virtual machine to each mobile zero terminal, the mobile zero terminals acquire corresponding application services by connecting the corresponding virtual machines, and the mobile zero terminals and the virtual machines are in communication connection through the Internet (Internet) or a Local Area Network (LAN). Specifically, after the mobile zero terminal acquires the desktop image of the virtual machine, a reverse control instruction is generated by operating the desktop image, after the reverse control instruction is sent to the virtual machine, the virtual machine locally executes corresponding processing to operate the desktop, and the virtual machine continuously sends the generated desktop image to the mobile zero terminal in real time, so that for a mobile zero terminal user, the virtual machine located in the cloud can be continuously accessed based on the desktop image received by local operation.

Based on the above framework, the invention provides a user data protection method for a mobile zero terminal. The method mainly comprises the following steps:

201. after the mobile zero terminal is connected with the corresponding virtual machine on the cloud server, the desktop display image sent by the virtual machine to the mobile zero terminal is continuously received, and the received image is reversely operated.

202. The mobile zero terminal continuously collects audio signals, the collected audio signals are uploaded to the virtual machine, and the virtual machine analyzes the collected audio signals to judge whether the mobile zero terminal is in a suspected unsafe scene.

The mobile zero terminal can collect audio signals according to preset frequency and send the collected audio signals to the corresponding virtual machines. For how the virtual machine judges whether the mobile zero terminal is in a suspected unsafe scene, the following specific steps can be executed:

and S11, preprocessing the acquired audio signal by the virtual machine.

The preprocessing includes removing noise.

And S12, extracting a feature vector from the preprocessed audio signal.

S13, inputting the extracted feature vectors into a pre-trained neural network model, and judging whether the current audio signal is an abnormal audio signal or not through the neural network model; if so, determining that the mobile zero terminal is in a suspected unsafe scene.

Specifically, a large amount of collected audio data of abnormal sounds can be preprocessed in advance, and then feature vector extraction is performed; then, obtaining a feature vector library of the abnormal sound according to the extracted feature vector; and then, continuously inputting the feature vectors in the abnormal sound feature vector library as training data into a pre-established neural network model for training, and obtaining a final target model after a large amount of training. The target model has the capability of identifying and classifying abnormal audio signals. In practical implementation, the pre-established neural network model may be an SVM model.

After the audio data after extracting the feature vectors is input into a pre-trained neural network model, whether the current audio signal is abnormal audio or not can be identified through the model. Specifically, the sounds represented by the abnormal audio include, but are not limited to: the sound of an explosion, the sound of glass breaking, the sound of a person calling for help, etc.

203. When the mobile zero terminal is determined to be in a suspected unsafe scene through voice recognition, two processing modes are available:

the first mode is as follows: and directly entering an emergency treatment mode, and setting an entrance for exiting the emergency treatment mode.

The second mode is as follows: and performing secondary confirmation, determining that the emergency room is in an unsafe scene at present, entering an emergency treatment mode, and providing an entrance for exiting the emergency treatment mode.

Specifically, after entering the emergency processing mode, the virtual machine interrupts the transmission of the image to the current mobile zero terminal; or, transmitting a preset screen saver image to the current mobile zero terminal; or the cloud server switches the virtual machine, and switches the virtual machine currently connected with the mobile zero terminal into another preset safe virtual machine without any private information; through the three ways, the data of the current user can be ensured not to be leaked.

The specific process for implementing virtual machine switching is as follows:

and S21, the virtual machine initiates an emergency switching request to a safety switching management platform in the cloud server.

S22, the safety switching management platform after receiving the emergency switching request executes the safety switching of the virtual machine in the following mode:

the safety switching management platform disconnects the connection state of the mobile zero terminal and the current virtual machine, and then the current mobile zero terminal is connected with the safety virtual machine; the safety virtual machine is a virtual machine which is preset in the cloud server and is similar to a common virtual machine, but does not have any confidential data. Under the condition of a dangerous disclosure scene, the safety of user data can be ensured by switching the virtual machines, and interference can be generated on illegal secret stealing personnel.

Preferably, as in the second mode, before entering the emergency processing mode, a second confirmation is performed to determine that the current mobile zero terminal is indeed in an unsafe situation. The reason why the secondary confirmation is performed is: when the identification result is an abnormal sound signal, it cannot be completely determined that the scene is not safe at present due to possible interferences (such as television sound, glass breakage caused by accidents, and the like), and secondary confirmation is required.

For the entry to exit the emergency treatment mode, there may be a preset button or a button displayed on the screen image. When the user clicks a button or presses a key to trigger exit from the emergency processing mode, security verification is required. Among these, security verification includes but is not limited to: requiring the user to input a specified voice password (which may be randomly generated), dynamic face recognition that performs a specified action on the user.

In order to realize voice verification, voice data of a user needs to be collected in advance, voice characteristics of the user are analyzed, and then whether the voice is the sound of the owner or not and whether the input audio is the specified voice password or not are determined based on voice characteristic comparison; in addition, in order to perform face verification, a face image of the user needs to be acquired in advance, so that whether the current face image is matched with the face features of the owner is determined through a face comparison algorithm, and meanwhile, whether the action of the face of the user meets the requirement needs to be judged. After passing the safety verification, the current emergency treatment mode can be released and the normal mode can be recovered. In the normal mode, the virtual machine normally transmits pictures to the mobile zero terminal, and meanwhile, the mobile zero terminal can perform reverse control.

According to the method for protecting the user data, whether the mobile zero terminal is in a suspected unsafe scene or not is judged by identifying the audio signal of the current environment where the mobile zero terminal is located, and when the mobile zero terminal is determined to be in the suspected unsafe scene, an emergency processing mode is entered, the environment where the mobile zero terminal is located can be identified, so that the safety of the user data is effectively guaranteed in a scene with high information safety requirements.

Based on the protection method for user data described in the embodiment corresponding to fig. 1, the following is an embodiment of the apparatus of the present disclosure, which may be used to execute the embodiment of the method of the present disclosure.

An embodiment of the present disclosure provides a protection device for user data, as shown in fig. 3, the protection device 30 for user data includes: a receiving module 301, an analyzing and judging module 302 and a processing module 303;

the receiving module 301 is configured to receive an audio signal sent by the mobile zero terminal, where the audio signal is an audio signal in a current environment where the mobile zero terminal is located and is collected by the mobile zero terminal;

the analysis and judgment module 302 is configured to analyze the audio signal and judge whether the mobile zero terminal is in a suspected unsafe scene according to an analysis result;

and the processing module 303 is configured to enter an emergency processing mode when it is determined that the mobile zero terminal is in a suspected unsafe scene.

In one embodiment, as shown in FIG. 4, the analysis and determination module 302 includes:

the preprocessing unit 3021 is configured to preprocess the audio signal to obtain a preprocessed audio signal;

an extracting unit 3022, configured to extract a feature vector from the preprocessed audio signal;

the judging unit 3023 inputs the extracted feature vector into a pre-trained neural network model, and judges whether the audio signal is an abnormal audio signal through the neural network model;

the determining unit 3024 is configured to determine that the mobile zero terminal is in a suspected unsafe scene when the audio signal is an abnormal audio.

In one embodiment, as shown in fig. 5, the protection device 30 for user data further includes: a sending module 304;

the processing module 303 is configured to directly enter an emergency processing mode when it is determined that the mobile zero terminal is in a suspected unsafe scene; or, when receiving the information that the user confirms that the mobile zero terminal is in an unsafe scene, entering an emergency processing mode;

a sending module 304, configured to interrupt transmission of an image to the mobile terminal, or transmit a preset screen saver image to the mobile terminal; or, an emergency switching request is sent to the safety switching management platform, so that the safety switching management platform disconnects the current virtual machine from the mobile zero terminal according to the emergency switching request, and connects the mobile zero terminal with the safety virtual machine.

In one embodiment, the processing module 303 is configured to set an entry for exiting the emergency treatment mode, where the entry for exiting the emergency treatment mode includes a preset button or a key displayed on the screen image of the mobile terminal.

In one embodiment, the receiving module 301 is configured to receive information to be verified sent by the mobile zero terminal when receiving a trigger operation sent by the mobile zero terminal to exit the emergency processing mode, where the information to be verified includes voice information and face dynamic information;

and the processing module 303 is configured to, after the information to be verified passes the verification, remove the emergency processing mode and restore to the normal mode.

In an embodiment, the processing module 303 is configured to, when the information to be authenticated is voice information, obtain a voice password and a voice feature of a current user according to the voice information; judging whether the voice password is an appointed voice password or not, and judging whether the voice characteristics of the current user are matched with the pre-stored voice characteristics or not; and when the voice password is the designated voice password and the voice characteristics of the current user are matched with the pre-stored voice characteristics, the emergency processing mode is released and the normal mode is recovered.

In one embodiment, the processing module 303 is configured to, when the information to be verified is face dynamic information, obtain face information and a face action of a current user according to the face dynamic information; judging whether the face information of the current user is matched with the face information stored in advance, and judging whether the face action meets the requirement; and when the face information of the current user is matched with the face information stored in advance and the face action meets the requirement, the emergency treatment mode is released and the normal mode is recovered.

The protection device for user data provided by the embodiment of the disclosure judges whether the mobile zero terminal is in a suspected unsafe scene by identifying the audio signal of the current environment where the mobile zero terminal is located, and enters the emergency processing mode when the mobile zero terminal is determined to be in the suspected unsafe scene, so that the environment where the mobile zero terminal is located can be identified, and the security of the user data can be effectively ensured in a scene with high information security requirements.

The embodiment of the present disclosure further provides a user data protection device, where the user data protection device includes a receiver, a transmitter, a memory, and a processor, where the transmitter and the memory are respectively connected to the processor, the memory stores at least one computer instruction, and the processor is configured to load and execute the at least one computer instruction, so as to implement the user data protection method described in the embodiment corresponding to fig. 1.

Based on the protection method for user data described in the embodiment corresponding to fig. 1, an embodiment of the present disclosure further provides a computer-readable storage medium, for example, the non-transitory computer-readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The storage medium stores computer instructions for executing the method for protecting user data described in the embodiment corresponding to fig. 1, which is not described herein again.

It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.

Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

14页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种软硬件结合的电脑文件安全防护系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类