1. Technical Field
The present disclosure relates to data security technologies, and more particularly, to a data secrecy method and an electronic device using the data secrecy method.
2. Description of Related Art
Electronic devices, such as smart phones, mobile internet devices, digital cameras, or portable computers, store private data. In some particular situations, such as when the electronic device is used by the families or friends of an owner of the electronic device, the private data may be discovered, which may cause unexpected problems to the owner. Therefore, there is room for improvement in the art.
The components in the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of at least one embodiment. In the drawings, like reference numerals designate corresponding parts throughout the various views.
Reference will be made to the drawings to describe various embodiments.
The data secrecy system 100 may include a plurality of programs in the form of one or more computerized instructions stored in the storage 102 and executed by the processor 101 to perform operations of the electronic device 10. In the embodiment, the data secrecy system 100 includes a detection module 110, a first notification module 120, a phrase processing module 130, an access authentication module 140, and a control module 150. In general, the word “module”, as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a programming language, such as, Java, C, or assembly. One or more software instructions in the modules may be embedded in firmware, such as in an erasable programmable read only memory (EPROM). The modules described herein may be implemented as either software and/or hardware modules and may be stored in any type of non-transitory computer-readable medium or other storage device. Some non-limiting examples of non-transitory computer-readable medium include CDs, DVDs, BLU-RAY, flash memory, and hard disk drives.
After the display 104 of the electronic device 10 locks (e.g., the electronic device 10 cannot receive external input through the display 104), the detection module 110 detects, in real-time, whether a screen unlocking interface of the electronic device 10 is activated by a user. In one embodiment, the screen unlocking interface is a particular graphic user interface (GUI) of the electronic device 10, which is used to unlock the display 104.
The first notification module 120 notifies the user to input phrase to unlock the display 104, when the screen unlocking interface is activated. In the embodiment, the first notification module 120 may display notification information on the display 104 to notify the user to input phrase corresponding to the displayed information. The notification information may be a text message, a picture, or a recorded vocal sound. In one embodiment, the notification information is a text message, such as “Please say the password”.
The phrase processing module 130 controls the recorder 103 to record the phrase input by the user, and analyzes the recorded phrase to extract characteristics of the recorded phrase.
The access authentication module 140 determines a privilege level for the user to access all or some functions of the electronic device 10 according to the characteristics of the recorded phrase. In the embodiment, the electronic device 10 may provide different privilege levels to access different functions of the electronic device 10 according to different characteristics. For example, a full access level may be provided for accessing all functions of the electronic device 10. A partial access level may be provided for accessing some of predetermined functions (e.g., game applications, and phone and web functions) of the electronic device 10.
Table 1 shows a relationship between the privilege levels and reference characteristics. When a frequency of the recorded phrase matches a predetermined standard frequency, and the characteristics of the recorded phrase include a first keyword (e.g., “owner”), the full access level may be determined for the user and the user can access to all functions (i.e., all resources and applications) of the electronic device 10. When the frequency of the recorded phrase does not match the standard frequency, but the characteristics of the recorded phrase include a second keyword (e.g., “friend”), the user may have access to a game level for access to only games of the electronic device 10. When the frequency of the recorded phrase does not match the standard frequency, but the characteristics of the recorded phrase include a third keyword (e.g., “family”), the user may have an access to only use a phone call function and a message function of the electronic device 10. And when the frequency of the recorded phrase does not match the standard frequency, but the characteristics of the recorded phrase include a fourth keyword (e.g., colleague), the user may have an access for only accessing to an “Internet” function of the electronic device 10.
The control module 150 controls the electronic device 10 to work according to the determined privilege level of the user, such as releasing all or a part of predetermined functions to be accessed by the user according to the privilege level of the user. In the embodiment, if the privilege level of the user is the full access level, all of functions of the electronic device 10 can be accessed by the user; if the privilege level of the user the partial access level, only a part of predetermined functions (e.g. phone function, web function) of the electronic device 10 can be accessed by the user.
The first notification module 220 notifies the user to say a first phrase to unlock the display 204, when the display 204 unlocking interface is activated. In the embodiment, the first notification module 220 may display first notification information on the display 204 to notify the user to speak corresponding to the displayed information. The first notification information may be a text message, a picture, or a recorded vocal sound. In one embodiment, the notification information is a text message, such as “Please say ‘Hello.’”
The phrase processing module 230 controls the recorder 203 to record the first phrase inputted by the user, and analyzes the first phrase to extract a voice frequency of the first phrase.
The owner identification module 270 identifies whether the user is the owner of the electronic device 20 according to the voice frequency of the first phrase. In the embodiment, the owner identification module 270 may compare the voice frequency of the first phrase with a reference frequency of the owner stored in the storage 202. When the voice frequency of the first phrase matches the reference frequency, the user is identified to be the owner; when the voice frequency of the first phrase does not match the reference frequency of the owner, the user is determined not to be the owner.
The second notification module 260 notifies the user to input a second phrase. The second notification module 260 displays a second notification information to notify the user to say a second thing, and the second notification information may be a text message, a picture, or a recorded vocal sound as well as the first notification information. In one embodiment, the second notification information is a text, such as “Please say the password.”
The phrase processing module 230 extracts one or more spoken words from the second phrase. The phrase processing module 230 may extract the one or more spoken words by analyzing the second phrase using known speech recognition (SR) technologies.
The access authentication module 240 determines a privilege level for the user to access all or a part of functions of the electronic device 20 according to the spoken words extracted from the second phrase. In the embodiment, the electronic device 20 may provide different privilege levels to access different functions of the electronic device 20 according to different characteristics. For example, a full access level may be provided for accessing all functions of the electronic device 20. A partial access level may be provided for accessing a part of predetermined functions (e.g., game applications, and phone and web functions) of the electronic device 20.
The access authentication module 240 searches a table 2 as shown below to determine the privilege level for the user according to the spoken words of the second phrase, when the user is the owner. Table 2 shows a relationship between the privilege levels and a plurality of keywords. When the spoken words of the second phrase include a first keyword (e.g. “owner”), the full access level may be determined for the user and the user can access to all functions (i.e., all resources and applications) of the electronic device 20. When the spoken words of the second phrase include a second keyword (e.g., “friend”), the user may have an access to a game level for access to only games of the electronic device 20. When the spoken words of the second phrase include a third keyword (e.g., “family”), the user may have an access to only use a phone call function and a message function of the electronic device 20. And when the spoken words of the second phrase include a fourth keyword (e.g., “colleague”), the user may have an access for only accessing to an “Internet” function of the electronic device 20.
The access authentication module 240 searches a table 3 as shown below to determine the privilege level for the user according to the spoken words of the second phrase, when the user is not the owner. Table 3 shows a relationship between the privilege levels and a plurality of keywords. When the spoken words of the second phrase include a second keyword (e.g., “friend”), the user may have an access to a game level for access to only games of the electronic device 20. When the spoken words of the second phrase include a third keyword (e.g., “family”), the user may have an access to only use a phone call function and a message function of the electronic device 20. And when the spoken words of the second phrase include a fourth keyword (e.g., “colleague”), the user may have an access for only accessing to an “Internet” function of the electronic device 20.
In step S101, after the display 104 of the electronic device 10 has been locked, the detection module 110 detects whether a screen unlocking interface of the electronic device 10 is activated by a user in real-time. And when the screen unlocking interface of the device 10 is activated, the first notification module 120 notifies the user to input a phrase.
In step S102, the phrase processing module 130 controls the recorder 103 to record what is spoken by the user, and analyzes the recorded phrase to extract characteristics of the recorded phrase.
In step S103, the access authentication module 140 determines a privilege level for the user to access all or a part of functions of the electronic device 10 according to the characteristics of the recorded phrase.
In step S104, the control module 150 controls the electronic device 10 to work according to the determined privilege level of the user. In the embodiment, if the privilege level of the user is the full access level, all of functions of the electronic device 10 can be accessed by the user; if the privilege level of the user the partial access level, only a part of predetermined functions (e.g. phone function, web function) of the electronic device 10 can be accessed by the user.
In step S201, after the display 104 of the electronic device 20 has been locked, the detection module 210 detects whether a screen unlocking interface of the electronic device 20 is activated by a user in real-time. When the screen unlocking interface is activated, the first notification module 220 notifies the user to input a first phrase to unlock the display 204.
In step S202, the phrase processing module 230 controls the recorder 203 to record a first phrase inputted by the user, and analyzes the first phrase to extract a voice frequency of the first phrase, and then the owner identification module 270 identifies whether the user is the owner of the electronic device 20. The owner identification module 270 compares the voice frequency of the first phrase with a reference frequency of the owner stored in the storage 202. When the voice frequency of the first phrase matches the reference frequency of the owner, the user is identified to be the owner, otherwise, the user is determined not to be the owner.
In step S203, the second notification module 260 notifies the user to input a second phrase, and then the access authentication module 240 determines a privilege level for the user to access all or a part of functions of the electronic device 20 according to the spoken words of the second phrase. The access authentication module 240 searches the table 2 to provide privilege levels according to the spoken words of the second phrase, when the user is the owner. The access authentication module 240 searches the table 3 to provide privilege levels according to the spoken words of the second phrase, when the user is not the owner.
In step S204, the control module 250 controls the electronic device 20 to work according to the determined privilege level of the user. In the embodiment, if the privilege level of the user is the full access level, all of functions of the electronic device 20 can be accessed by the user; if the privilege level of the user the partial access level, only some predetermined functions (e.g. phone function, web function) of the electronic device 20 can be accessed by the user.
In summary, the data secrecy system allows different levels of functionality to be accessed on the electronic device, depending on particular biometric considerations. Thus, the security of the privacy is improved.
It is to be understood that even though numerous characteristics and advantages of the present embodiments have been set forth in the foregoing description, with details of the structures and functions of the embodiments, the disclosure is illustrative only; and changes may be made in detail, especially in the matters of arrangement of parts within the principles of the embodiments to the full extent indicated by the broad general meaning of the terms in which the appended claims are expressed.
Number | Date | Country | Kind |
---|---|---|---|
2012101416227 | May 2012 | CN | national |