CN105208211B - A kind of privacy protection device, method and mobile terminal - Google Patents

A kind of privacy protection device, method and mobile terminal Download PDF

Info

Publication number
CN105208211B
CN105208211B CN201510634547.1A CN201510634547A CN105208211B CN 105208211 B CN105208211 B CN 105208211B CN 201510634547 A CN201510634547 A CN 201510634547A CN 105208211 B CN105208211 B CN 105208211B
Authority
CN
China
Prior art keywords
fingerprint
parameter
mobile terminal
module
fingerprint parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510634547.1A
Other languages
Chinese (zh)
Other versions
CN105208211A (en
Inventor
张翘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201510634547.1A priority Critical patent/CN105208211B/en
Publication of CN105208211A publication Critical patent/CN105208211A/en
Application granted granted Critical
Publication of CN105208211B publication Critical patent/CN105208211B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The present invention discloses a kind of privacy protection device, method and mobile terminal, which is characterized in that the privacy protection device includes: acquisition module, for after mobile terminal releases screen lock state, obtaining the fingerprint parameter that touch operation carries in real time;Authentication module, for the fingerprint parameter to be compared with fingerprint database;Control module, for when the fingerprint parameter is matched with the fingerprint parameter in blacklist fingerprint database, control mobile terminal to enter predetermined analog mode operation.Display module, for showing default picture after entering predetermined analog mode operation.In the above manner, solve the problems, such as user faced in communication mobile terminal have to be used by others but do not want to allow other people using when how to avoid embarrassment.

Description

A kind of privacy protection device, method and mobile terminal
Technical field
The present invention relates to fields of communication technology, eventually more specifically to a kind of privacy protection device, method and movement End.
Background technique
With the rapid development of intelligent terminal technology, mobile phone, laptop, digit broadcasting receiver, PDA (a number Word assistant), PAD (tablet computer), the popularization degree of the mobile terminals such as PMP (portable media player) and navigation device it is more next It is higher.Currently, guest mode is usually arranged in the privacy in order to guarantee mobile terminal, mobile terminal.User needs to visitor's mould Default access is arranged in formula, other people can operate under default access mode.
However, but existing for fear of interpersonal relationships in reality, it has to mobile phone is temporarily met at the case where other people use, when When user has little time to open guest mode, mobile phone unlocks after state, and any institute that mobile phone can be used per capita is functional, with And check the user data etc. of mobile phone storage, at this moment big inconvenience can be caused to user;Even if user opens guest mode, But user still may and displeased mobile phone transfer to other people to use for a long time.In the prior art, only by guest mode hardly possible To take into account friendly communication experience and personal secrets.
Summary of the invention
The main purpose of the present invention is to provide a kind of privacy protection device, method and mobile terminals, it is intended to solve user In communication mobile terminal have to be used by others but do not want to allow other people using when how to avoid awkward problem.
To achieve the above object, the present invention provides a kind of privacy protection device, which includes:
Module is obtained, for after releasing screen lock state, obtaining the fingerprint parameter that touch operation carries in real time;
Authentication module, for comparing the fingerprint parameter in the fingerprint parameter and fingerprint database obtained in real time Right, the fingerprint database includes: blacklist fingerprint database and white list fingerprint database;
Optionally, the authentication module, the runing time or default remind of display for being also used to verify predetermined analog mode are believed Whether the runing time after breath reaches threshold value;
Control module, for the fingerprint parameter in the fingerprint parameter obtained in real time and blacklist fingerprint database Timing, control mobile terminal enter predetermined analog mode operation;It is also used in the fingerprint parameter and white list obtained in real time When fingerprint parameter in fingerprint database matches, predetermined analog mode operation is exited.
Optionally, the control module, for when the fingerprint parameter obtained in real time and blacklist fingerprint database and When fingerprint parameter in white list fingerprint database all mismatches, judge whether to receive into guest mode instruction, if do not had Have, then control mobile terminal and enter predetermined analog mode operation, if so, then controlling mobile terminal enters guest mode operation.
Optionally, the control module is also used to control guest mode with the first default access mode operation.
Display module, for showing that default shutdown is dynamic after reaching first threshold in the time for entering predetermined analog mode operation It draws.
Optionally, the display module, for showing default electricity and/or default prompting letter in predetermined analog mode Breath;
Optionally, the display module is also used to showing that the time of default electricity and/or default prompting message reaches the Show that shutdown animation, the second threshold are less than first threshold after two threshold values;
Optionally, the display module shows that not enough power supply automatic shutdown mentions after being lower than threshold value for the default electricity It wakes up;
Optionally, the default prompting message that the display module is also used to show includes: system crash automatic shutdown or interior Depositing has expired automatic shutdown.
To achieve the above object, the present invention also provides a kind of method for secret protection, which is characterized in that the secret protection side Method includes:
After releasing screen lock state, fingerprint parameter entrained by touch operation is obtained in real time;
Compare the fingerprint parameter in the fingerprint parameter and fingerprint database obtained in real time, the fingerprint database packet It includes: blacklist fingerprint database and white list fingerprint database;
When the fingerprint parameter obtained in real time is matched with the fingerprint parameter of blacklist fingerprint database, into default mould Simulation models operation;
Optionally, when in the fingerprint parameter obtained in real time and blacklist fingerprint database and white list fingerprint database Fingerprint parameter when all mismatching, judge whether to receive and instructed into guest mode, if it is not, into predetermined analog mould Formula operation is run if so, then entering guest mode;The guest mode further include: with the first default access mode operation.
Optionally, default electricity and/or default prompting message are shown;It calculates the default electricity of display and/or presets prompting Time value when reaching second threshold, show default shutdown animation.
Optionally, the default prompting message, further includes: show the prompting message of default not enough power supply automatic shutdown;It is aobvious Show that system crash automatic shutdown or memory have expired auto-off reminding information.
When the time value for entering predetermined analog mode reaches first threshold, default shutdown animation is shown, it is default in display It shuts down after animation, is not responding to the operation requests for carrying current finger print parameter, the second threshold is less than first threshold;
After entering predetermined analog mode, if the fingerprint parameter of the fingerprint parameter obtained in real time and white list fingerprint database When matching, predetermined analog mode is exited.
The present invention discloses a kind of privacy protection device, method and mobile terminal, which is characterized in that the privacy protection device It include: acquisition module, for after mobile terminal contacts screen lock state, obtaining the fingerprint parameter that touch operation carries in real time;It tests Module is demonstrate,proved, for the fingerprint parameter to be compared with preset fingerprint database;Control module, in the fingerprint parameter When matching with the fingerprint parameter in blacklist fingerprint database, control mobile terminal enters predetermined analog mode operation.Show mould Block, for showing default shutdown animation after reaching threshold value into the predetermined analog mode operation time.In the above manner, solving User faced in communication mobile terminal have to be used by others but do not want to allow other people using when avoid awkward problem.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware structural diagram of Fig. 1 mobile terminal of each embodiment to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the functional block diagram for the privacy protection device that first embodiment of the invention provides;
Fig. 4 is the electricity display unit schematic diagram for the display module 40 that third embodiment of the invention provides;
Fig. 5 is that the electricity for the display module 40 that third embodiment of the invention provides reminds display unit schematic diagram;
Fig. 6 is the default prompting display unit schematic diagram for the display module 40 that third embodiment of the invention provides;
Fig. 7 is the method for secret protection flow chart that fourth embodiment of the invention provides;
Fig. 8 is the method for secret protection flow chart that fifth embodiment of the invention provides;
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the present invention is realized in description with reference to the drawings.In subsequent description, use For indicate element such as " module ", " component " or " unit " suffix only for being conducive to explanation of the invention, itself There is no specific meanings.Therefore, " module " can be used mixedly with " component ".
Mobile terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as moving Phone, smart phone, laptop, digit broadcasting receiver, PDA (personal digital assistant), PAD (tablet computer), PMP The mobile terminal of (portable media player), navigation device etc. and such as number TV, desktop computer etc. are consolidated Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that in addition to being used in particular for moving Except the element of purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Fig. 1 to realize the present invention the mobile terminal of each embodiment hardware configuration signal.
Mobile terminal 100 may include wireless communication unit 110, A/V (audio/video) input unit 120, user's input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power supply unit 190 Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups shown Part.More or fewer components can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more components, allows mobile terminal 100 and wireless communication system Or the radio communication between network.For example, wireless communication unit may include broadcasting reception module 111, mobile communication module 112, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel Relevant information.Broadcast channel may include satellite channel and/or terrestrial channel.Broadcast management server, which can be, to be generated and sent The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information And send it to the server of terminal.Broadcast singal may include TV broadcast singal, radio signals, data broadcasting Signal etc..Moreover, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Closing information can also provide via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 receives.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of digital multimedia broadcasting (DMB) Program guide (EPG), digital video broadcast-handheld (DVB-H) electronic service guidebooks (ESG) etc. form and exist.Broadcast Receiving module 111 can receive signal broadcast by using various types of broadcast systems.Particularly, broadcasting reception module 111 It can be wide by using such as multimedia broadcasting-ground (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video It broadcasts-holds (DVB-H), the Radio Data System of forward link media (MediaFLO@), received terrestrial digital broadcasting integrated service (ISDB-T) etc. digit broadcasting system receives digital broadcasting.Broadcasting reception module 111, which may be constructed such that, to be adapted to provide for extensively Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via the received broadcast singal of broadcasting reception module 111 and/ Or broadcast related information can store in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal may include that voice is logical Talk about signal, video calling signal or according to text and/or Multimedia Message transmission and/or received various types of data.
The Wi-Fi (Wireless Internet Access) of the support mobile terminal of wireless Internet module 113.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved in the module may include WLAN (Wireless LAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting short range communication.Some examples of short-range communication technology include indigo plant Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the location information of mobile terminal.Location information module Typical case be GPS (global positioning system).According to current technology, GPS module 115, which calculates, comes from three or more satellites Range information and correct time information and the Information application triangulation for calculating, thus according to longitude, latitude Highly accurately calculate three-dimensional current location information.Currently, it is defended for the method for calculating position and temporal information using three Star and the error that calculated position and temporal information are corrected by using an other satellite.In addition, GPS module 115 It can be by Continuous plus current location information in real time come calculating speed information.
A/V input unit 120 is for receiving audio or video signal.A/V input unit 120 may include 121 He of camera Microphone 1220, camera 121 is to the static map obtained in video acquisition mode or image capture mode by image capture apparatus The image data of piece or video is handled.Treated, and picture frame may be displayed on display unit 151.At camera 121 Picture frame after reason can store in memory 160 (or other storage mediums) or carry out via wireless communication unit 110 It sends, two or more cameras 1210 can be provided according to the construction of mobile terminal.Microphone 122 can be in telephone relation mould Sound (audio data) is received via microphone in formula, logging mode, speech recognition mode etc. operational mode, and can be incited somebody to action Such acoustic processing is audio data.Audio that treated (voice) data can be converted in the case where telephone calling model For the format output that can be sent to mobile communication base station via mobile communication module 112.Various types can be implemented in microphone 122 Noise eliminate (or inhibit) algorithm with eliminate noise that (or inhibition) generates during sending and receiving audio signal or Person's interference.
The order that user input unit 130 can be inputted according to user generates key input data to control each of mobile terminal Kind operation.User input unit 130 allows user to input various types of information, and may include keyboard, metal dome, touch Plate (for example, the sensitive component of detection due to the variation of resistance, pressure, capacitor etc. caused by being contacted), idler wheel, rocking bar etc. Deng.Particularly, when touch tablet is superimposed upon in the form of layer on display unit 151, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (for example, mobile terminal 100 opens or closes shape State), the position of mobile terminal 100, user is for the presence or absence of contact (that is, touch input) of mobile terminal 100, mobile terminal 100 orientation, the acceleration or deceleration movement of mobile terminal 100 and direction etc., and generate for controlling mobile terminal 100 The order of operation or signal.For example, sensing unit 140 can sense when mobile terminal 100 is embodied as sliding-type mobile phone The sliding-type phone is to open or close.In addition, sensing unit 140 be able to detect power supply unit 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 may include that proximity sensor 141 will combine below Touch screen is described this.
Interface unit 170 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be storage and use each of mobile terminal 100 for verifying user It plants information and may include subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) Etc..In addition, the device (hereinafter referred to as " identification device ") with identification module can take the form of smart card, therefore, know Other device can be connect via port or other attachment devices with mobile terminal 100.Interface unit 170, which can be used for receiving, to be come from The input (for example, data information, electric power etc.) of external device (ED) and the input received is transferred in mobile terminal 100 One or more elements can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connect with external base, interface unit 170 may be used as allowing will be electric by it Power, which is provided from pedestal to the path or may be used as of mobile terminal 100, allows the various command signals inputted from pedestal to pass through it It is transferred to the path of mobile terminal.The various command signals or electric power inputted from pedestal, which may be used as mobile terminal for identification, is The no signal being accurately fitted on pedestal.Output unit 150 is configured to provide with vision, audio and/or tactile manner defeated Signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.) out.Output unit 150 may include display Unit 151, audio output module 152, alarm modules 153 etc..
Display unit 151 may be displayed on the information handled in mobile terminal 100.For example, when mobile terminal 100 is in electricity When talking about call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file Downloading etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling mode Or when image capture mode, display unit 151 can show captured image and/or received image, show video or figure Picture and the UI or GUI of correlation function etc..
Meanwhile when display unit 151 and touch tablet in the form of layer it is superposed on one another to form touch screen when, display unit 151 may be used as input unit and output device.Display unit 151 may include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user to watch from outside, this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific Desired embodiment, mobile terminal 100 may include two or more display modules (or other display devices), for example, moving Dynamic terminal may include external display module (not shown) and internal display module (not shown).Touch screen can be used for detecting touch Input pressure and touch input position and touch input area.
Audio output module 152 can mobile terminal be in call signal reception pattern, call mode, logging mode, It is when under the isotypes such as speech recognition mode, broadcast reception mode, wireless communication unit 110 is received or in memory 160 The audio data transducing audio signal of middle storage and to export be sound.Moreover, audio output module 152 can provide and movement The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that terminal 100 executes. Audio output module 152 may include loudspeaker, buzzer etc..
Alarm modules 153 can provide output notifying event to mobile terminal 100.Typical event can be with Including calling reception, message sink, key signals input, touch input etc..Other than audio or video output, alarm modules 153 can provide output in different ways with the generation of notification event.For example, alarm modules 153 can be in the form of vibration Output is provided, when receiving calling, message or some other entrance communications (incomingcommunication), alarm mould Block 153 can provide tactile output (that is, vibration) to notify to user.By providing such tactile output, even if When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm modules 153 The output of the generation of notification event can be provided via display unit 151 or audio output module 152.
Memory 160 can store the software program etc. of the processing and control operation that are executed by controller 180, Huo Zheke Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And And memory 160 can store about the vibrations of various modes and audio signal exported when touching and being applied to touch screen Data.
Memory 160 may include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, more Media card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..Moreover, mobile terminal 100 can execute memory with by network connection The network storage device of 160 store function cooperates.
The overall operation of the usually control mobile terminal of controller 180.For example, controller 180 executes and voice communication, data Communication, video calling etc. relevant control and processing.In addition, controller 180 may include for reproducing (or playback) more matchmakers The multi-media module 181 of volume data, multi-media module 181 can construct in controller 180, or can be structured as and control Device 180 separates.Controller 180 can be with execution pattern identifying processing, by the handwriting input executed on the touchscreen or picture It draws input and is identified as character or image.
Power supply unit 190 receives external power or internal power under the control of controller 180 and provides operation each member Electric power appropriate needed for part and component.
Various embodiments described herein can be to use the calculating of such as computer software, hardware or any combination thereof Machine readable medium is implemented.Hardware is implemented, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), controller, microcontroller, microprocessor, is designed to execute function described herein processor At least one of electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180. For software implementation, the embodiment of such as process or function can with allow to execute the individual of at least one functions or operations Software module is implemented.Software code can by the software application (or program) write with any programming language appropriate Lai Implement, software code can store in memory 160 and be executed by controller 180.
So far, oneself is through describing mobile terminal according to its function.In the following, for the sake of brevity, will description such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc., which is used as, to be shown Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that using via frame or grouping send data it is all if any Line and wireless communication system and satellite-based communication system operate.
Referring now to Fig. 2 description communication system that wherein mobile terminal according to the present invention can operate.
Different air interface and/or physical layer can be used in such communication system.For example, used by communication system Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system System (UMTS) (particularly, long term evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under The description in face is related to cdma communication system, but such introduction is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system may include multiple mobile terminals 100, multiple base stations (BS) 270, base station Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN) 290 form interface.MSC280 is also structured to form interface with the BSC275 that can be couple to base station 270 via back haul link. Back haul link can be constructed according to any in several known interfaces, and the interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system may include multiple BSC2750 as shown in Figure 2.
Each BS270 can service one or more subregions (or region), by multidirectional antenna or the day of direction specific direction Each subregion of line covering is radially far from BS270.Alternatively, each subregion can be by two or more for diversity reception Antenna covering.Each BS270, which may be constructed such that, supports multiple frequency distribution, and the distribution of each frequency has specific frequency spectrum (for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed, which intersects, can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly indicating single BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Alternatively, each subregion of specific BS270 can be claimed For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to the mobile terminal operated in system by broadcsting transmitter (BT) 295 100.Broadcasting reception module 111 as shown in Figure 1 is arranged at mobile terminal 100 to receive the broadcast sent by BT295 Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.The help of satellite 300 positions multiple mobile terminals At least one of 100.
In Fig. 2, multiple satellites 300 are depicted, it is understood that, it is useful to can use any number of satellite acquisition Location information.GPS module 115 as shown in Figure 1 is generally configured to cooperate with satellite 300 to obtain desired positioning and believe Breath.It substitutes GPS tracking technique or except GPS tracking technique, the other of the position that can track mobile terminal can be used Technology.In addition, at least one 300 property of can choose of GPS satellite or extraly processing satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminals 100 Signal.Mobile terminal 100 usually participates in call, information receiving and transmitting and other types of communication.Certain base station 270 is received each anti- It is handled in specific BS270 to link signal.The data of acquisition are forwarded to relevant BSC275.BSC provides call The mobile management function of resource allocation and the coordination including the soft switching process between BS270.The number that BSC275 will also be received According to MSC280 is routed to, the additional route service for forming interface with PSTN290 is provided.Similarly, PSTN290 with MSC280 forms interface, and MSC and BSC275 form interface, and BSC275 controls BS270 correspondingly with by forward link signals It is sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration and communication system, each implementation of method for network access of the invention is proposed Example.Method for network access of the invention accesses wireless network after obtaining wireless network signal and mobile network signals parallel And mobile network, i.e., it is surfed the Internet simultaneously using wireless network and mobile network.Wherein, wireless network such as WIFI network, it is mobile Network such as 2G/3G/4G network.
The side that middle synchronization is either surfed the Internet using wireless network or surfed the Internet using mobile network compared with the existing technology Formula, the mode that the present invention uses wireless network and mobile network to surf the Internet simultaneously, so that network access is more flexible, and is able to satisfy use The diversified online demand in family, widens network bandwidth, promotes the online experience of user.
Based on above-mentioned mobile terminal hardware configuration and communication system, it is described in detail below by way of specific embodiment.
Embodiment one
The present invention provides a kind of privacy protection device, described hidden in first embodiment provided by the invention referring to Fig. 3 Private protective device includes:
Acquisition module 10, for after mobile terminal releases screen lock state where it, acquisition to receive operation and asks in real time Seek the fingerprint parameter of carrying.
Privacy protection device provided in an embodiment of the present invention is mainly used in mobile phone, laptop, Digital Broadcasting Receiver Device, PDA (personal digital assistant), PAD (tablet computer), PMP (portable media player), navigation device etc. are mobile eventually End, it is intended to so that mobile terminal under the premise of meeting safety, can be improved privacy and communication experience.
It should be noted that mobile terminal is after releasing screen lock state, and when detecting user's operation, automatic trigger fingerprint Input request, the fingerprint input request can be handled by special fingerprint sensor, can also be by being covered on mobile terminal surface Fingerprint identification device processing.
Authentication module 20, the fingerprint parameter in fingerprint parameter and fingerprint database for being obtained to the acquisition module 10 It is compared, the fingerprint database includes: blacklist fingerprint database and white list fingerprint database;It is also used to verify default The runing time of simulation model shows whether the runing time after default prompting message reaches threshold value.
In the present embodiment, authentication module 20 after obtaining module 10 and getting the fingerprint parameter that the operation requests carry, Operation is compared with the fingerprint parameter in fingerprint database to the fingerprint parameter of acquisition.Specifically, mobile terminal is local It is stored with fingerprint parameter database, authentication module 20 gets the fingerprint parameter of the operation requests carrying obtaining module 10 Afterwards, the blacklist fingerprint database and white list fingerprint number in the fingerprint parameter and the fingerprint parameter database that will acquire It is compared according to library;Fingerprint parameter in the white list fingerprint database in the fingerprint parameter and the fingerprint database Timing is verified;The fingerprint parameter in blacklist fingerprint database in the fingerprint parameter and the fingerprint database Timing, verifying do not pass through.Such as:
It obtains module 10 and gets the fingerprint parameter that the operation requests carry, which includes the finger of corresponding user Line size, streakline width and fold information etc.;Authentication module 20 will acquire the fingerprint parameter and the finger that module 10 is got The fingerprint parameter of line database purchase is compared, in the fingerprint parameter and the blacklist fingerprint that the acquisition module 10 obtains When fingerprint parameter in database matches, verifying does not pass through;Fingerprint parameter and the white name in acquisition module 10 acquisition When fingerprint parameter in single fingerprint database matches, it is verified.Wherein, matching refers to the fingerprint size of any two fingerprint parameter It is identical, streakline width is identical and fold information is identical;Alternatively, the similarity of the fingerprint size of any two fingerprint parameter meets one Determine threshold value, the similarity of streakline width meets certain threshold value and the similarity of fold information meets certain threshold value.
Control module 30, for obtaining the fingerprint in the fingerprint parameter and blacklist fingerprint database that module 10 obtains When parameter matches, control mobile terminal enters predetermined analog mode operation;It is also used in the fingerprint parameter for obtaining the acquisition of module 10 When matching with the fingerprint parameter in white list fingerprint database, predetermined analog mode operation is exited.
In the present embodiment, the fingerprint parameter in the fingerprint parameter and blacklist fingerprint database that module 10 obtains is being obtained When matching, control module 30 controls mobile terminal and enters predetermined analog mode operation;In the fingerprint parameter for obtaining the acquisition of module 10 When matching with the fingerprint parameter in white list fingerprint database, control module 30 controls mobile terminal and exits predetermined analog mode fortune Row.It takes the mobile phone as an example, after mobile phone releases screen lock state, and when detecting the operation requests based on the mobile phone, obtains module 10 obtain the fingerprint parameter that the operation requests carry, and authentication module 20 will acquire fingerprint parameter and the local of the acquisition of module 10 Fingerprint parameter in fingerprint database is compared, and when being verified, control module 30 controls mobile phone and enters Normal Mode Operation, It is obstructed out-of-date to verify, and control module 30 controls mobile phone and enters the operation of predetermined analog mode;When mobile phone enters predetermined analog mode fortune After row, when acquisition module 10 detects new operation requests, 20 pairs of authentication module obtain the operation requests that modules 10 obtain and carry Fingerprint parameter be compared with the fingerprint parameter in fingerprint database, when being verified, control module 30 control mobile phone exit Predetermined analog mode, verify it is obstructed it is out-of-date continue keep predetermined analog mode.
Display module 40, for showing default shutdown after reaching first threshold in the time for entering predetermined analog mode operation Animation.
In the present embodiment, display module 40 show content be and nonterminal time of day, be in order to display terminal because This and shut down, the shutdown is the false shutdown after display shutdown animation.
The privacy protection device that the present embodiment proposes obtains touch operation after mobile terminal releases screen lock state in real time The fingerprint parameter of carrying;The fingerprint parameter is compared with the fingerprint parameter in fingerprint database;In the fingerprint parameter When matching with the fingerprint parameter in blacklist fingerprint database, mobile terminal enters predetermined analog mode operation.It is default entering Simulation model runing time shows default shutdown animation after reaching threshold value.In the above manner, solving user face in communication Face mobile terminal have to be used by others but do not want to allow other people using when avoid awkward problem, improve communication experience.
Embodiment two
Further, it is based on first embodiment, proposes the second embodiment of the present invention, in the present embodiment, the privacy Protective device, further includes:
Control module 30, for when the fingerprint parameter obtained in real time and blacklist fingerprint database and white list fingerprint When fingerprint parameter in database all mismatches, judge whether to receive into guest mode instruction, if it is not, control moves Dynamic terminal enters predetermined analog mode operation, if so, then controlling mobile terminal enters guest mode operation.
In the present embodiment, privacy protection device gets the fingerprint ginseng of the operation requests carrying obtaining module 10 in real time After number, the fingerprint parameter of 20 pairs of authentication module acquisitions is compared with the fingerprint parameter in fingerprint database;When acquisition mould When the fingerprint parameter that block 10 obtains in real time is matched with the fingerprint parameter in the blacklist fingerprint database in fingerprint database, verifying Do not pass through, control module 30 controls mobile terminal and enters predetermined analog mode;When the fingerprint parameter that acquisition module 10 obtains in real time It when being matched with the fingerprint parameter in the white list fingerprint database in fingerprint database, is verified, the control of control module 30 moves Dynamic terminal exits the operation of predetermined analog mode or continues Normal Mode Operation;When obtain the fingerprint parameter that obtains in real time of module 10 with When fingerprint parameter in fingerprint database all mismatches, judge whether user opens guest mode, if so, into visitor's mould Formula, if it is not, then entering predetermined analog mode.Obtain the fingerprint ginseng in the fingerprint parameter and fingerprint database that module 10 obtains in real time The unmatched situation of all fingerprint parameters when number all mismatches, in fingerprint parameter and fingerprint database including acquisition.
Control module 30 is also used to control guest mode with the first default access mode operation.
In the present embodiment, the first default access mode of guest mode and the default limiting mode of predetermined analog mode are different, But it is all set by the user.For example, the home subscriber is after the set interface for entering visitor's permission mode, it is logical by choosing Words application (system application of mobile terminal) and short message apply (system application of mobile terminal), are set to prohibit The system application only used;Mobile phone is when entering the operation of visitor's permission mode, hiding talk application and short message application automatically Icon;Alternatively, being not responding to the operation that any user starts the talk application and/or short message application.Predetermined analog mould The default access mode of formula can also set access authority through the above way.
The privacy protection device that the present embodiment proposes obtains touch operation after mobile terminal releases screen lock state in real time The fingerprint parameter of carrying;The fingerprint parameter is compared with preset fingerprint database;For working as the finger obtained in real time When fingerprint parameter in line parameter and blacklist fingerprint database and white list fingerprint database all mismatches, judge whether to receive It is instructed to guest mode is entered, if it is not, control mobile terminal enters predetermined analog mode operation, if so, then controlling Mobile terminal enters guest mode operation.In the above manner, user is made to can choose whether that stranger is allowed to use mobile phone Preset function realizes the protection to privacy.
Embodiment three
Further, it is based on the first reality and/or second embodiment, proposes the third embodiment of the present invention, referring to Fig. 4 and figure 5 and Fig. 6, the display module 40 further include:
The display module 40 is used for, and default electricity and/or default prompting message are shown in predetermined analog mode;Aobvious Show and shows shutdown animation after the time of default electricity and/or default prompting message reaches threshold value;The default electricity is lower than threshold value Not enough power supply auto-off reminding is shown afterwards;System crash automatic shutdown or memory have expired automatic shutdown.
In the present embodiment, the default electricity is analog electrical energy value, is lower than practical charge value, in order to allow blacklist fingerprint The owner sees that mobile terminal is shutdown animation to be shown because of low battery, and shut down, as shown in figure Fig. 4 and Fig. 5.It is described pre- If prompting message includes, active user's low battery automatic shutdown or system crash automatic shutdown or memory is reminded to expire automatically Shutdown etc., as shown in Figure 6.
It should be noted that not showing low battery auto-off reminding when the default electricity is higher than 5%.It is described aobvious Show and show shutdown animation after the time of default electricity and/or default prompting message reaches threshold value, the threshold value is set by the user.
It is obstructed out-of-date that the present embodiment is verified in fingerprint parameter, by the default electricity of display and default electricity prompting message or in advance If it is automatic shutdown because of mobile terminal low battery or system crash that prompting message, which learns active user, to reach not Allow particular person or stranger to use the purpose of mobile terminal, so as to avoid be required to borrow mobile terminal and not for fear of communication The embarrassment that do not borrow is obtained, communication experience is improved.
Example IV
Referring to Fig. 7, in fourth embodiment provided by the invention, method for secret protection of the present invention includes following step It is rapid:
S10 after releasing screen lock state, obtains fingerprint parameter entrained by touch operation in real time;
Method for secret protection provided in an embodiment of the present invention is mainly used in mobile phone, laptop, Digital Broadcasting Receiver Device, PDA (personal digital assistant), PAD (tablet computer), PMP (portable media player), navigation device etc. are mobile eventually End, it is intended to so that mobile terminal under the premise of meeting safety, can be improved privacy and communication experience.
It should be noted that mobile terminal is after releasing screen lock state, and when detecting operation requests, automatic trigger fingerprint Sensor typing fingerprint parameter, the operation requests carry the fingerprint parameter information of fingerprint sensor typing.The fingerprint sensing Device is distributed in the part of the surface or all surfaces of mobile terminal.
S20 compares the fingerprint parameter in the fingerprint parameter and fingerprint database obtained in real time;The fingerprint database It include: blacklist fingerprint database and white list fingerprint database;
In the present embodiment, privacy protection device is after getting the fingerprint parameter that the operation requests carry, to acquisition The fingerprint parameter carries out that operation is compared with the fingerprint parameter in local fingerprint database.Specifically, mobile terminal is local It is stored with fingerprint database, the fingerprint parameter database includes blacklist fingerprint database and white list fingerprint database, is connect It receives in blacklist fingerprint database after the operation of fingerprint parameter, verifying does not pass through;It receives in white list fingerprint database After the operation of fingerprint parameter, it is verified.Such as:
It includes the fingerprint size of corresponding user, line that privacy protection device, which gets the fingerprint parameter that the operation requests carry, Line width and fold information etc.;What the fingerprint parameter and the local fingerprint database that privacy protection device will acquire stored Fingerprint parameter is compared, and the fingerprint in the fingerprint parameter and blacklist fingerprint database that the privacy protection device obtains is joined When number matching, verifying does not pass through;In the fingerprint parameter and the white list fingerprint database that the privacy protection device obtains Fingerprint parameter matching when, be verified.Wherein, matching refers to that the fingerprint size of any two fingerprint parameter is identical, streakline width Identical and fold information is identical;Alternatively, to meet certain threshold value, streakline wide for the similarity of the fingerprint size of any two fingerprint parameter Narrow similarity meets certain threshold value and the similarity of fold information meets certain threshold value.
S30, when the fingerprint parameter obtained in real time is matched with the fingerprint parameter of blacklist fingerprint database, into pre- If simulation model is run;
In the present embodiment, it should be noted that for the mobile terminal when with predetermined analog mode operation, limitation user can With the accessible local user data of the application program, the system function that can be used of limitation user and limitation user that use Deng to realize the protection to the mobile terminal home subscriber privacy.
S40 shows default shutdown animation when the time for entering predetermined analog mode reaching first threshold, pre- in display If after the animation that shuts down, being not responding to the operation requests for carrying current finger print parameter;After entering predetermined analog mode, if in real time When the fingerprint parameter of acquisition is matched with the fingerprint parameter of white list fingerprint database, S10 is entered step.
In the present embodiment, it should be noted that after display shutdown animation, terminal is in false off-mode, receives operation After request, needs the fingerprint parameter carried to operation requests to be compared with the fingerprint parameter in white list fingerprint database, test After card passes through, touch operation could be responded, is otherwise not responding to.
Present embodiment discloses a kind of method for secret protection, the method for secret protection includes: to release to lock in mobile terminal After screen state, the fingerprint parameter that behaviour's request carries is obtained in real time;It is obstructed out-of-date to verify in the fingerprint parameter, into predetermined analog Mode operation;Entrained fingerprint parameter is verified when receiving new operation requests, and predetermined analog is exited when being verified Mode simultaneously enters S10 step, verifies and obstructed out-of-date is not responding to the operation.In the above manner, solving user face in communication Face mobile terminal have to be used by others but do not want to allow other people using when avoid awkward problem, improve communication experience.
Embodiment five
Further, it is based on fourth embodiment, proposes the fifth embodiment of the present invention, in the present embodiment, reference Fig. 8, After above-mentioned steps S10, the method for secret protection, S20 is compared in the fingerprint parameter and fingerprint database obtained in real time Fingerprint parameter, further includes:
S201 is when in the fingerprint parameter obtained in real time and blacklist fingerprint database and white list fingerprint database When fingerprint parameter all mismatches, S202 judges whether to receive to be instructed into guest mode, and S2022 is if it is not, enter pre- If simulation model is run, S2021 is run if so, then entering guest mode.
In the present embodiment, it should be noted that the fingerprint parameter and blacklist fingerprint database and white list obtained in real time The all unmatched situation of fingerprint parameter in fingerprint database is the case where active user is stranger, the active user's Fingerprint did not occurred at the terminal or active user's fingerprint occurred in terminal, but was not paid close attention to by terminal attaching people.
The method for secret protection that the present embodiment proposes obtains touch operation after mobile terminal releases screen lock state in real time The fingerprint parameter of carrying;The fingerprint parameter is compared with preset fingerprint database;For working as the finger obtained in real time When fingerprint parameter in line parameter and blacklist fingerprint database and white list fingerprint database all mismatches, judge whether to receive It is instructed to guest mode is entered, if it is not, control mobile terminal enters predetermined analog mode operation, if so, then controlling Mobile terminal enters guest mode operation.In the above manner, user is made to can choose whether that stranger is allowed to use mobile phone Preset function realizes the protection to privacy.
Embodiment six
Further, it is based on first embodiment, proposes the sixth embodiment of the present invention, in the present embodiment, above-mentioned steps S30 includes:
When showing that default electricity and/or the default time for reminding operation reach second threshold, default shutdown animation is shown.
In the present embodiment, for example, into the electricity that after predetermined analog mode, terminal is shown as active user uses the time Growth and reduce, when the predetermined analog mode reaches second threshold, show that default prompting message not enough power supply is closed automatically Machine.
In the present embodiment, when the default electricity of display is higher than 5%, reach the second threshold in the predetermined analog mode operation time When value, display system collapse automatic shutdown or memory, which expire, shows the animation that shuts down after the prompting messages such as automatic shutdown.
The present embodiment fingerprint parameter verify it is obstructed out-of-date, by show predetermined analog picture make active user learn be because The automatic shutdown for mobile terminal low battery or system crash does not allow particular person or stranger whole using movement to reach The purpose at end improves communication experience so as to avoid being required to borrow mobile terminal and the embarrassment borrowed of having to for fear of communication.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (7)

1. a kind of privacy protection device, which is characterized in that the privacy protection device includes:
Module is obtained, for after releasing screen lock state, obtaining the fingerprint parameter that touch operation carries in real time;
Authentication module, for the fingerprint parameter obtained in real time to be compared with the fingerprint parameter in fingerprint database, institute Stating fingerprint database includes blacklist fingerprint database and white list fingerprint database;
Control module, for being matched in the fingerprint parameter obtained in real time with the fingerprint parameter in blacklist fingerprint database When, control mobile terminal enters predetermined analog mode operation;It is also used to refer in the fingerprint parameter obtained in real time with white list When fingerprint parameter in line database matches, predetermined analog mode operation is exited;
Display module, for after entering predetermined analog mode operation, when the time value of calculating reaches second threshold, display to be pre- If electricity and/or default prompting message;It is also used to show after the time for entering predetermined analog mode operation reaches first threshold Default shutdown animation;The second threshold is less than first threshold.
2. privacy protection device as described in claim 1, which is characterized in that the control module is used for, and is obtained in real time when described When the fingerprint parameter in fingerprint parameter and blacklist fingerprint database and white list fingerprint database taken all mismatches, judgement is No receive instructs into guest mode, if it is not, control mobile terminal enters predetermined analog mode operation, if so, It then controls mobile terminal and enters guest mode operation;
The control module is also used to, and controls guest mode with the first default access mode operation.
3. privacy protection device as claimed in claim 1 or 2, which is characterized in that the display module is also used to default in entrance After simulation model operation, when the time value of calculating reaches third threshold value, display system collapses and shows shutdown animation.
4. a kind of method for secret protection, which is characterized in that the method for secret protection includes:
After releasing screen lock state, fingerprint parameter entrained by touch operation is obtained in real time;
Compare the fingerprint parameter in the fingerprint parameter and fingerprint database obtained in real time;
The fingerprint database includes: blacklist fingerprint database and white list fingerprint database;
When the fingerprint parameter obtained in real time is matched with the fingerprint parameter of blacklist fingerprint database, into predetermined analog mould Formula operation;
Calculate the time value for entering predetermined analog mode, when the time value of calculating reaches second threshold, show default electricity and/ Or default prompting message;When time value reaches first threshold, default shutdown animation is shown, after the default shutdown animation of display, It is not responding to carry the operation requests of current finger print parameter;The second threshold is less than first threshold;
After entering predetermined analog mode, if the fingerprint parameter obtained in real time is matched with the fingerprint parameter of white list fingerprint database When, exit predetermined analog mode.
5. method for secret protection as claimed in claim 4, which is characterized in that when the fingerprint parameter obtained in real time and black name When fingerprint parameter in single fingerprint database and white list fingerprint database all mismatches, judge whether to receive into visitor's mould Formula instruction, if it is not, being run into predetermined analog mode operation if so, then entering guest mode;
The guest mode that enters is run further include: with the first default access mode operation.
6. method for secret protection as described in claim 4 or 5, which is characterized in that further include: it is transported entering predetermined analog mode After row, when the time value of calculating reaches third threshold value,
Display system collapses and shows shutdown animation.
7. a kind of mobile terminal, which is characterized in that including privacy protection device as claimed any one in claims 1 to 3.
CN201510634547.1A 2015-09-29 2015-09-29 A kind of privacy protection device, method and mobile terminal Active CN105208211B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510634547.1A CN105208211B (en) 2015-09-29 2015-09-29 A kind of privacy protection device, method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510634547.1A CN105208211B (en) 2015-09-29 2015-09-29 A kind of privacy protection device, method and mobile terminal

Publications (2)

Publication Number Publication Date
CN105208211A CN105208211A (en) 2015-12-30
CN105208211B true CN105208211B (en) 2019-02-12

Family

ID=54955629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510634547.1A Active CN105208211B (en) 2015-09-29 2015-09-29 A kind of privacy protection device, method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105208211B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105828232A (en) * 2016-03-31 2016-08-03 乐视控股(北京)有限公司 Earphone work mode selection method and apparatus
CN105809007A (en) * 2016-03-31 2016-07-27 宇龙计算机通信科技(深圳)有限公司 Privacy protection method and device
CN105975853A (en) * 2016-05-25 2016-09-28 宇龙计算机通信科技(深圳)有限公司 Safe operation scene setting method and device and terminal
CN106156552A (en) * 2016-06-28 2016-11-23 青岛海信移动通信技术股份有限公司 A kind of unlocking method and a device of mobile device
CN106682618A (en) * 2016-12-27 2017-05-17 努比亚技术有限公司 Fingerprint identification method and mobile terminal
CN107133509A (en) * 2017-04-28 2017-09-05 北京小米移动软件有限公司 Method for secret protection and equipment
CN107402710B (en) * 2017-07-13 2020-12-08 上海读客数字信息技术有限公司 Privacy information protection method, mobile terminal and computer readable storage medium
CN107609363B (en) * 2017-10-20 2020-09-11 维沃移动通信有限公司 Unlocking method and mobile terminal
CN109257481A (en) * 2018-07-26 2019-01-22 深圳市沃特沃德股份有限公司 The method and device of multi-user operation control

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534502A (en) * 2008-03-12 2009-09-16 中兴通讯股份有限公司 Mobile phone camouflaging method
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN104036174A (en) * 2014-07-03 2014-09-10 南昌欧菲生物识别技术有限公司 Method and device for achieving child safety lock by means of fingerprint identification
CN104598792A (en) * 2014-12-29 2015-05-06 深圳市金立通信设备有限公司 Terminal
CN104915582A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Unlocking method and unlocking device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130136173A (en) * 2012-06-04 2013-12-12 삼성전자주식회사 Method for providing fingerprint based shortcut key, machine-readable storage medium and portable terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534502A (en) * 2008-03-12 2009-09-16 中兴通讯股份有限公司 Mobile phone camouflaging method
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN104036174A (en) * 2014-07-03 2014-09-10 南昌欧菲生物识别技术有限公司 Method and device for achieving child safety lock by means of fingerprint identification
CN104598792A (en) * 2014-12-29 2015-05-06 深圳市金立通信设备有限公司 Terminal
CN104915582A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Unlocking method and unlocking device

Also Published As

Publication number Publication date
CN105208211A (en) 2015-12-30

Similar Documents

Publication Publication Date Title
CN105208211B (en) A kind of privacy protection device, method and mobile terminal
CN105100476B (en) A kind of mobile terminal unlocking device and method
CN106231087B (en) A kind of method and apparatus of front and back sides dual-screen display device false-touch prevention
CN104915582B (en) unlocking method and device
CN105376062B (en) A kind of communication security exchange method, apparatus and system
CN104850443B (en) A kind of method and mobile terminal for closing error starting application program
CN104850799B (en) The method and mobile terminal of a kind of data in hiding mobile terminal
CN104636030B (en) Method and device for starting application programs and mobile terminal
CN106572439B (en) Terminal tracing method, device and mobile terminal
CN105138874B (en) Unlocking screen control device and method
CN105138400B (en) Application program self-starting management method and device
CN106027804A (en) Unlocking method and unlocking apparatus of mobile terminal
CN105095708B (en) A kind of unlocking method and device of mobile terminal
CN105099701B (en) A kind of method of terminal and terminal authentication
CN105939517B (en) A kind of method and apparatus preventing mobile terminal access pseudo-base station
CN104735254B (en) terminal screen locking method and system
CN106778212B (en) A kind of mobile terminal and control method
CN105049582B (en) A kind of save set of calling record, method and display methods
CN104820797B (en) Using the management method and device of account
CN106412328B (en) A kind of method and apparatus obtaining field feedback
CN105302457B (en) Terminal control method and device
CN104883454B (en) A kind of display control method and display control terminal
CN106952090A (en) Payment verification device and method
CN104837122B (en) Multi-party communications method, terminal and system
CN106227454B (en) A kind of touch trajectory detection system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant