CN105279400A - Mobile terminal security management method and mobile terminal - Google Patents

Mobile terminal security management method and mobile terminal Download PDF

Info

Publication number
CN105279400A
CN105279400A CN201410822971.4A CN201410822971A CN105279400A CN 105279400 A CN105279400 A CN 105279400A CN 201410822971 A CN201410822971 A CN 201410822971A CN 105279400 A CN105279400 A CN 105279400A
Authority
CN
China
Prior art keywords
mobile terminal
user model
information
finger print
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410822971.4A
Other languages
Chinese (zh)
Inventor
唐勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Communication Software Co Ltd Of Dongguan City Bubukao
Original Assignee
Communication Software Co Ltd Of Dongguan City Bubukao
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Communication Software Co Ltd Of Dongguan City Bubukao filed Critical Communication Software Co Ltd Of Dongguan City Bubukao
Priority to CN201410822971.4A priority Critical patent/CN105279400A/en
Publication of CN105279400A publication Critical patent/CN105279400A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides a mobile terminal security management method. The method comprises the following steps of: receiving an input information, wherein the input information comprises a digital information or a first fingerprint information; if the input information is matched with a preset first verification information, controlling the mobile terminal to unlock and enter in a user mode 1; and after the mobile terminal enters in the user mode 1, if the mobile terminal receives a second fingerprint information and the second fingerprint information is matched with a preset second verification information, controlling the mobile terminal to switch to a user mode 2 from the user mode 1. The embodiment of the invention also provides a mobile terminal. The user mode 2 provided by the embodiment of the invention adopts multiple information identification verification, thus, the mobile terminal has high security.

Description

Mobile terminal safety management method and mobile terminal
Technical field
The present invention relates to a kind of mobile terminal safety management method based on finger print information and mobile terminal.
Background technology
At present, finger print information recognition technology is widely used in mobile terminal, as cipher authentication or identification, to substitute traditional code characters input, can save loaded down with trivial details Password Input link.
The existing mobile terminal based on finger print information recognition technology, usually a heavy identification proof procedure is only provided with, and only have a kind of user model corresponding with this authentication, once finger print information is obtained by social engineering by other people, private data so in mobile terminal is then easily stolen by others, and security is not high enough.
Summary of the invention
For the private data overcome in prior art in mobile terminal is easily stolen by others, the problem that security is not high enough, the embodiment of the present invention provides a kind of mobile terminal safety management method on the one hand, comprising:
Receive input information, described input information comprises numerical information or the first finger print information;
If described input information matches with the first authorization information preset, then control described mobile terminal and unlock access customer pattern one of going forward side by side;
After described mobile terminal enters user model one, if receive the second finger print information, and described second finger print information matches with the second authorization information preset, then control described mobile terminal and enter user model two from user model one.
On the other hand, embodiments provide a kind of mobile terminal, comprising:
Receiver module, for receiving input information, this input information comprises numerical information or the first finger print information;
First judge module, for judging whether described input information mates with the first authorization information preset;
First control module, unlocks for controlling described mobile terminal access customer pattern one of going forward side by side;
Second judge module, for after described mobile terminal enters user model one, if when described receiver module receives the second finger print information, judges whether the second finger print information mates with the second authorization information preset;
Second control module, enters described user model two for controlling described mobile terminal from described user model one.
User model is divided into user model one and user model two by the embodiment of the present invention, different user pattern can distribute different user authority, enter the input information that user model one need meet reception to match with the first authorization information preset, and enter user model two, except the input information and the first default authorization information that need meet reception match, satisfied second finger print information is also needed to match with the second authorization information preset, namely for user model two, adopt multiple identities information identification checking, even if other people obtain multiple finger print information by social engineering, also which authorization information cannot be confirmed formerly, which authorization information is rear, the private data that effectively can solve mobile terminal in prior art is easily stolen by others, the problem that security is not high enough.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the first embodiment of mobile terminal safety management method of the present invention;
Fig. 2 is the schematic flow sheet of the second embodiment of mobile terminal safety management method of the present invention;
Fig. 3 is the schematic flow sheet of the 3rd embodiment of mobile terminal safety management method of the present invention;
Fig. 4 is the structural representation of the first embodiment of mobile terminal of the present invention;
Fig. 5 is the structural representation of the second embodiment of mobile terminal of the present invention;
Fig. 6 is the structural representation of the 3rd embodiment of mobile terminal of the present invention.
Embodiment
In order to make technical matters solved by the invention, technical scheme and beneficial effect clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Fig. 1, be the schematic flow sheet of the first embodiment of mobile terminal safety management method of the present invention, this mobile terminal safety management method comprises:
Step S101, receive input information, described input information comprises numerical information or the first finger print information.
In this step, the reception of described first finger print information, or any fingerprint identification devices such as formula can be slipped over receive by the existing push type that is attached on mobile terminal, its installation site is not limited in any one fixed position on mobile terminal, mobile terminal carries out fingerprint collecting carry out communicating as long as can be attached to system, independently fingerprint identification device can be installed additional at mobile terminal back or both sides according to the actual needs of type in manufacturer.
Step S102, if described input information matches with the first authorization information preset, then controls described mobile terminal and unlocks access customer pattern one of going forward side by side.
In this step, described the first default authorization information is that mobile terminal owner presets generation.
In this step, user model, only stores some data that are common, non-secret once.Meanwhile, at user model once, user can carry out correlation function operation to mobile terminal, but any data under user model two are all invisible, and any data under user model two cannot be checked.
Step S103, after described mobile terminal enters user model one, if receive the second finger print information, and described second finger print information matches with the second authorization information preset, then control described mobile terminal and enter user model two from user model one.
In this step, described reception second finger print information can be set in the designated time, and the designated time can according to circumstances set, and described the second default authorization information is equally also that mobile terminal owner presets generation.
In this step, user model stores private data two times, user model two times, user also can browse user model data once, and the data that user model data once can be upgraded under user model two, also the data under user model two can be become user model data once.So just process the data security grade in mobile terminal flexibly, and be Password Input reciprocal process when user decreases a lot of encryption and decryption, user does not need to set complicated password yet, does not need to remember password and worried yet, need not be more worry password loss and worrying.
User model is divided into user model one and user model two by the embodiment of the present invention, different user pattern can distribute different user authority, enter the input information that user model one need meet reception to match with the first authorization information preset, and enter user model two, except the input information and the first default authorization information that need meet reception match, satisfied second finger print information is also needed to match with the second authorization information preset, namely for user model two, adopt multiple identities information identification checking, even if other people obtain multiple finger print information by social engineering, also which authorization information cannot be confirmed formerly, which authorization information is rear, the private data that effectively can solve mobile terminal in prior art is easily stolen by others, the problem that security is not high enough.
Fig. 2, be the schematic flow sheet of the second embodiment of mobile terminal safety management method of the present invention, this mobile terminal safety management method comprises:
Step S201, what receive user's input points numerical coding one to one with user.
In this step, described numerical coding is not less than 2 characters.
Step S202, receives two finger print informations of user's successively input.
In this step, the reception of two finger print informations of described priority input, or any fingerprint identification devices such as formula can be slipped over receive by the existing push type that is attached on mobile terminal, its installation site is not limited in any one fixed position on mobile terminal, mobile terminal carries out fingerprint collecting carry out communicating as long as can be attached to system, independently fingerprint identification device can be installed additional at mobile terminal back or both sides according to the actual needs of type in manufacturer.
Step S203, user model one unlocked by fingerprint password is generated according to described two finger print information sequential combination, according to described two finger print information backward combination producing user model two unlocked by fingerprint passwords, the two numerical coding sequential combination corresponding according to described two finger print informations generate user model one digital solution lock cipher, the two numerical coding backward combination producing user model two digital solution lock ciphers corresponding according to described two finger print informations.Described first authorization information comprises described user model one unlocked by fingerprint password and described user model one digital solution lock cipher, and described second authorization information is described user model two unlocked by fingerprint password.
In this step, the user model one unlocked by fingerprint password of generation is formed by two finger print information sequential combination, and the user model two unlocked by fingerprint password generated is combined by two finger print information backwards.Particularly, two numerical codings that such as described two finger print informations of user's input are corresponding are respectively 34 and 87, then the user model one digital solution lock cipher generated is 3487, and the user model two digital solution lock cipher of generation is 8734.This user model one digital solution lock cipher and user model two digital solution lock cipher are used for the unblock under the specific lock machine state only receiving numerical ciphers.
Step S204, receive input information, described input information comprises numerical information or the first finger print information.
In this step, the reception of described first finger print information, or any fingerprint identification devices such as formula can be slipped over receive by the existing push type that is attached on mobile terminal, its installation site is not limited in any one fixed position on mobile terminal, mobile terminal carries out fingerprint collecting carry out communicating as long as can be attached to system, independently fingerprint identification device can be installed additional at mobile terminal back or both sides according to the actual needs of type in manufacturer.
Step S205, if described input information matches with the first authorization information preset, then controls described mobile terminal and unlocks access customer pattern one of going forward side by side.
In this step, described the first default authorization information is that mobile terminal owner presets generation.
In this step, user model, only stores some data that are common, non-secret once.Meanwhile, at user model once, user can carry out correlation function operation to mobile terminal, but any data under user model two are all invisible, and any data under user model two cannot be checked.
Step S206, after described mobile terminal enters user model one, if receive the second finger print information, and described second finger print information matches with the second authorization information preset, then control described mobile terminal and enter user model two from user model one.
In this step, described reception second finger print information can be set in the designated time, and the designated time can according to circumstances set, and described the second default authorization information is equally also that mobile terminal owner presets generation.
In this step, user model stores private data two times, user model two times, user also can browse user model data once, and the data that user model data once can be upgraded under user model two, also the data under user model two can be become user model data once.So just process the data security grade in mobile terminal flexibly, and be Password Input reciprocal process when user decreases a lot of encryption and decryption, user does not need to set complicated password yet, does not need to remember password and worried yet, need not be more worry password loss and worrying.
User model is divided into user model one and user model two by the embodiment of the present invention, after entering user model one, can not defeated numerical ciphers, and finger-print cipher can only be inputted and just can enter user model two.Meanwhile, under specific lock machine state, unlock by user model one digital solution lock cipher and user model two digital solution lock cipher.Can available protecting private data, security is high.
Fig. 3, be the schematic flow sheet of the 3rd embodiment of mobile terminal safety management method of the present invention, this mobile terminal safety management method comprises:
Step S301, receive input information, described input information comprises numerical information or the first finger print information.
In this step, the reception of described first finger print information, or any fingerprint identification devices such as formula can be slipped over receive by the existing push type that is attached on mobile terminal, its installation site is not limited in any one fixed position on mobile terminal, mobile terminal carries out fingerprint collecting carry out communicating as long as can be attached to system, independently fingerprint identification device can be installed additional at mobile terminal back or both sides according to the actual needs of type in manufacturer.
Step S302, judges whether described input information and described the first default authorization information match.
In this step, described the first default authorization information is that mobile terminal owner presets generation.
If the judged result of step S302 is yes, then flow process enters step S306; Otherwise flow process enters step S303.
Step S303, adds up not matching times one.
In this step, the not statistics of matching times one, is mainly used for the number of times calculating input information errors.
Step S304, described in judgement, whether matching times one is not greater than preset value one.
If the judged result of step S304 is yes, then flow process enters step S305; Otherwise flow process returns step S301.
Step S305, controls described mobile terminal and enters specific lock machine state, and described specific lock machine state is the lock machine state only receiving numerical ciphers.
In this step, the input of finger print information shields, and cannot input finger print information again, now, can only receive the user model one digital solution lock cipher that generates in advance and user model two digital solution lock cipher unlocks.
Step S306, controls described mobile terminal and unlocks and to go forward side by side access customer pattern one, and described in arranging not matching times one be zero.
In this step, user model, only stores some data that are common, non-secret once.Meanwhile, at user model once, user can carry out correlation function operation to mobile terminal, but any data under user model two are all invisible, and any data under user model two cannot be checked.
In this step, described in arranging, matching times one is not zero, mainly in order to reset the not matching times of statistics.
Step S307, judges whether to receive the second finger print information and judge whether described second finger print information mates with the second authorization information preset.
In this step, described the second default authorization information is equally also that mobile terminal owner presets generation.
Step S308, adds up not matching times two.
In this step, the not statistics of matching times two, is mainly used for the number of times of the second finger print information mistake calculating input.
Step S309, described in judgement, whether matching times two is not greater than preset value two.
If the judged result of step S309 is yes, then flow process enters step S310; Otherwise flow process returns step S307.
Data under described user model two are backuped to high in the clouds and delete from mobile terminal by step S310.
Step S311, controls described mobile terminal and enters user model two from user model one, and described in arranging not matching times two be zero.
In this step, user model stores private data two times, user model two times, user also can browse user model data once, and the data that user model data once can be upgraded under user model two, also the data under user model two can be become user model data once.So just process the data security grade in mobile terminal flexibly, and be Password Input reciprocal process when user decreases a lot of encryption and decryption, user does not need to set complicated password yet, does not need to remember password and worried yet, need not be more worry password loss and worrying.
In this step, described in arranging, matching times two is not zero, mainly in order to reset the not matching times of statistics.
User model is divided into user model one and user model two by the embodiment of the present invention, after entering user model one, can not defeated numerical ciphers, and finger-print cipher can only be inputted and just can enter user model two.Meanwhile, once input information not matching times reach the upper limit, mobile terminal then enters specific lock machine state, under specific lock machine state, can only be unlocked by user model one digital solution lock cipher and user model two digital solution lock cipher.Can available protecting private data, security is high.
Detailed introduction is done to the embodiment of mobile terminal safety management method of the present invention above.Below the device (i.e. mobile terminal) corresponding to said method is further elaborated.Wherein, mobile terminal can be mobile phone, panel computer, MP3, MP4 or notebook computer etc.
Fig. 4 is the structural representation of the first embodiment of mobile terminal of the present invention, and this mobile terminal 100 comprises receiver module 110, first judge module 120, first control module 130, second judge module 140 and the second control module 150.
Described receiver module 110, for receiving input information, this input information comprises numerical information or the first finger print information.
Described first judge module 120, for judging whether described input information mates with the first authorization information preset.
Described first control module 130, unlocks for controlling described mobile terminal access customer pattern one of going forward side by side.
Described second judge module 140, for after described mobile terminal enters user model one, if when described receiver module receives the second finger print information, judges whether the second finger print information mates with the second authorization information preset.
Described second control module 150, enters described user model two for controlling described mobile terminal from described user model one.
User model is divided into user model one and user model two by the embodiment of the present invention, different user pattern can distribute different user authority, enter the input information that user model one need meet reception to match with the first authorization information preset, and enter user model two, except the input information and the first default authorization information that need meet reception match, satisfied second finger print information is also needed to match with the second authorization information preset, namely for user model two, adopt multiple identities information identification checking, even if other people obtain multiple finger print information by social engineering, also which authorization information cannot be confirmed formerly, which authorization information is rear, the private data that effectively can solve mobile terminal in prior art is easily stolen by others, the problem that security is not high enough.
Fig. 5, be the structural representation of the second embodiment of mobile terminal of the present invention, this mobile terminal 200 comprises receiver module 210, first judge module 220, first control module 230, second judge module 240, second control module 250 and secret generation module 260.
Described receiver module 210, for receiving input information, this input information comprises numerical information or the first finger print information.
Described first judge module 220, for judging whether described input information mates with the first authorization information preset.
Described first control module 230, unlocks for controlling described mobile terminal access customer pattern one of going forward side by side.
Described second judge module 240, for after described mobile terminal enters user model one, if when described receiver module receives the second finger print information, judges whether the second finger print information mates with the second authorization information preset.
Described second control module 250, enters described user model two for controlling described mobile terminal from described user model one.
Described secret generation module 260, comprising:
Receive digital units, for receive user input point numerical coding one to one with user.
Receive fingerprint unit, for receiving two finger print informations of user's successively input.
Unlocked by fingerprint password generation unit, for generating user model one unlocked by fingerprint password, according to described two finger print information backward combination producing user model two unlocked by fingerprint passwords according to described two finger print information sequential combination.
Digital solution lock cipher generation unit, generates user model one digital solution lock cipher, the two numerical coding backward combination producing user model two digital solution lock ciphers corresponding according to described two finger print informations for the two numerical coding sequential combination corresponding according to described two finger print informations.
User model is divided into user model one and user model two by the embodiment of the present invention, after entering user model one, can not defeated numerical ciphers, and finger-print cipher can only be inputted and just can enter user model two.Meanwhile, under specific lock machine state, unlock by user model one digital solution lock cipher and user model two digital solution lock cipher.Can available protecting private data, security is high.
Fig. 6, be the structural representation of the 3rd embodiment of mobile terminal of the present invention, this mobile terminal 300 comprises receiver module 301, first judge module 302, first control module 303, second judge module 304, second control module 305, secret generation module 306, control that specific lock machine block of state 307, first arranges module 308, backup removing module 309 and second arranges module 310.
Described receiver module 301, for receiving input information, this input information comprises numerical information or the first finger print information.
Described first judge module 302, for judging whether described input information mates with the first authorization information preset.
Described first control module 303, unlocks for controlling described mobile terminal access customer pattern one of going forward side by side.
Described second judge module 304, for after described mobile terminal enters user model one, if when described receiver module receives the second finger print information, judges whether the second finger print information mates with the second authorization information preset.
Described second control module 305, enters described user model two for controlling described mobile terminal from described user model one.
Described secret generation module 306, comprising:
Receive digital units, for receive user input point numerical coding one to one with user.
Receive fingerprint unit, for receiving two finger print informations of user's successively input.
Unlocked by fingerprint password generation unit, for generating user model one unlocked by fingerprint password, according to described two finger print information backward combination producing user model two unlocked by fingerprint passwords according to described two finger print information sequential combination.
Digital solution lock cipher generation unit, generates user model one digital solution lock cipher, the two numerical coding backward combination producing user model two digital solution lock ciphers corresponding according to described two finger print informations for the two numerical coding sequential combination corresponding according to described two finger print informations.
The specific lock machine block of state 307 of described control, comprising:
First statistic unit, for adding up described input information and the described default unmatched number of times of the first authorization information.
First judging unit, for judging whether the not matching times that described first statistic unit obtains is greater than described preset value one.
Enter specific lock machine state cell, the not matching times for judging at the first judging unit is greater than described preset value for the moment, controls described mobile terminal and enters specific lock machine state.
Described first arranges module 308, and for matching in described input information and the first authorization information preset, control the unblock of described mobile terminal and go forward side by side access customer pattern for the moment, the not matching times arranging described first statistic unit is zero.
Described backup removing module 309, comprising:
Second statistic unit, for adding up described second finger print information and the unmatched number of times of the second authorization information preset.
Second judging unit, for judging whether the not matching times that described second statistic unit obtains is greater than described preset value two.
Backup delete cells, for described second judging unit judge matching times is not greater than described preset value two time, the data under described user model two are backuped to high in the clouds and delete from mobile terminal.
Described second arranges module 310, at the described mobile terminal of control from after user model one enters user model two, the not matching times arranging described second statistic unit is zero.
User model is divided into user model one and user model two by the embodiment of the present invention, after entering user model one, can not defeated numerical ciphers, and finger-print cipher can only be inputted and just can enter user model two.Meanwhile, once input information not matching times reach the upper limit, mobile terminal then enters specific lock machine state, under specific lock machine state, can only be unlocked by user model one digital solution lock cipher and user model two digital solution lock cipher.Can available protecting private data, security is high.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
Be one or more embodiments provided in conjunction with particular content as mentioned above, do not assert that specific embodiment of the invention is confined to these explanations.Method all and of the present invention, structure etc. are approximate, identical, or for making some technology deduction or replace under concept thereof of the present invention, all should be considered as protection scope of the present invention.

Claims (12)

1. a mobile terminal safety management method, is characterized in that, comprising:
Receive input information, described input information comprises numerical information or the first finger print information;
If described input information matches with the first authorization information preset, then control described mobile terminal and unlock access customer pattern one of going forward side by side;
After described mobile terminal enters user model one, if receive the second finger print information, and described second finger print information matches with the second authorization information preset, then control described mobile terminal and enter user model two from user model one.
2. mobile terminal safety management method as claimed in claim 1, is characterized in that, before the step of described reception input information, also comprise:
What receive user's input points numerical coding one to one with user;
Receive two finger print informations of user's successively input;
User model one unlocked by fingerprint password is generated according to described two finger print information sequential combination, according to described two finger print information backward combination producing user model two unlocked by fingerprint passwords, the two numerical coding sequential combination corresponding according to described two finger print informations generate user model one digital solution lock cipher, the two numerical coding backward combination producing user model two digital solution lock ciphers corresponding according to described two finger print informations;
Described first authorization information comprises described user model one unlocked by fingerprint password and described user model one digital solution lock cipher, and described second authorization information is described user model two unlocked by fingerprint password.
3. mobile terminal safety management method as claimed in claim 1 or 2, is characterized in that, after the step of described reception input information, also comprise:
Judge whether described input information and described the first default authorization information match;
If do not mate, then add up not matching times one, and judge described in not matching times one whether be greater than preset value one;
If be greater than described preset value one, then control described mobile terminal and enter specific lock machine state, described specific lock machine state is the lock machine state only receiving numerical ciphers.
4. mobile terminal safety management method as claimed in claim 3, is characterized in that, if described input information matches with the first authorization information preset, then controls the step that described mobile terminal unlocks access customer pattern one of going forward side by side, also comprises:
Described in arranging, matching times one is not zero.
5. mobile terminal safety management method as claimed in claim 1 or 2, is characterized in that, after described step after described mobile terminal enters user model one, also comprise:
If described second finger print information does not mate with the second authorization information preset, then add up not matching times two;
Described in judgement, whether matching times two is not greater than preset value two;
If be greater than described preset value two, then the data under described user model two backuped to high in the clouds and delete from mobile terminal.
6. mobile terminal safety management method as claimed in claim 5, is characterized in that, the described mobile terminal of described control, from after user model one enters the step of user model two, also comprises:
Described in arranging, matching times two is not zero.
7. a mobile terminal, is characterized in that, comprising:
Receiver module, for receiving input information, this input information comprises numerical information or the first finger print information;
First judge module, for judging whether described input information mates with the first authorization information preset;
First control module, unlocks for controlling described mobile terminal access customer pattern one of going forward side by side;
Second judge module, for after described mobile terminal enters user model one, if when described receiver module receives the second finger print information, judges whether the second finger print information mates with the second authorization information preset;
Second control module, enters described user model two for controlling described mobile terminal from described user model one.
8. mobile terminal as claimed in claim 7, it is characterized in that, also comprise secret generation module, described secret generation module comprises:
Receive digital units, for receive user input point numerical coding one to one with user;
Receive fingerprint unit, for receiving two finger print informations of user's successively input;
Unlocked by fingerprint password generation unit, for generating user model one unlocked by fingerprint password, according to described two finger print information backward combination producing user model two unlocked by fingerprint passwords according to described two finger print information sequential combination;
Digital solution lock cipher generation unit, generates user model one digital solution lock cipher, the two numerical coding backward combination producing user model two digital solution lock ciphers corresponding according to described two finger print informations for the two numerical coding sequential combination corresponding according to described two finger print informations.
9. mobile terminal as claimed in claim 7 or 8, is characterized in that, also comprise and control specific lock machine block of state, the specific lock machine block of state of described control comprises:
First statistic unit, for adding up described input information and the described default unmatched number of times of the first authorization information;
First judging unit, for judging whether the not matching times that described first statistic unit obtains is greater than described preset value one;
Enter specific lock machine state cell, the not matching times for judging at the first judging unit is greater than described preset value for the moment, controls described mobile terminal and enters specific lock machine state.
10. mobile terminal as claimed in claim 9, it is characterized in that, also comprise first and module is set, for matching in described input information and the first authorization information preset, control the unblock of described mobile terminal and go forward side by side access customer pattern for the moment, the not matching times arranging described first statistic unit is zero.
11. mobile terminals as claimed in claim 7 or 8, it is characterized in that, also comprise backup removing module, described backup removing module comprises:
Second statistic unit, for adding up described second finger print information and the unmatched number of times of the second authorization information preset;
Second judging unit, for judging whether the not matching times that described second statistic unit obtains is greater than described preset value two;
Backup delete cells, for described second judging unit judge matching times is not greater than described preset value two time, the data under described user model two are backuped to high in the clouds and delete from mobile terminal.
12. mobile terminals as claimed in claim 11, is characterized in that, also comprise second and arrange module, at the described mobile terminal of control from after user model one enters user model two, the not matching times arranging described second statistic unit is zero.
CN201410822971.4A 2014-12-22 2014-12-22 Mobile terminal security management method and mobile terminal Pending CN105279400A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410822971.4A CN105279400A (en) 2014-12-22 2014-12-22 Mobile terminal security management method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410822971.4A CN105279400A (en) 2014-12-22 2014-12-22 Mobile terminal security management method and mobile terminal

Publications (1)

Publication Number Publication Date
CN105279400A true CN105279400A (en) 2016-01-27

Family

ID=55148403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410822971.4A Pending CN105279400A (en) 2014-12-22 2014-12-22 Mobile terminal security management method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105279400A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530101A (en) * 2016-02-29 2016-04-27 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method and device
CN105871886A (en) * 2016-05-11 2016-08-17 深圳市金立通信设备有限公司 Application access permission control method and terminal
CN106203019A (en) * 2016-07-21 2016-12-07 北京光年无限科技有限公司 A kind of user ID authentication method for robot and robot
CN106295411A (en) * 2016-08-19 2017-01-04 芜湖市振华戎科智能科技有限公司 A kind of U dish method for managing security
CN106778134A (en) * 2016-12-09 2017-05-31 北京小米移动软件有限公司 terminal control method and device
CN106951768A (en) * 2017-05-10 2017-07-14 广东欧珀移动通信有限公司 The ageing control method of unlocked by fingerprint, device, mobile terminal and storage medium
CN107993259A (en) * 2017-11-27 2018-05-04 维沃移动通信有限公司 A kind of alarm clock method for closing, device and mobile terminal
CN108052808A (en) * 2017-11-28 2018-05-18 苏州市东皓计算机系统工程有限公司 A kind of computer booting verification method
CN108961084A (en) * 2018-07-07 2018-12-07 北京精友世纪软件技术有限公司 A kind of AI car damage identification Claims Resolution system and method for supporting cell phone client
CN108985024A (en) * 2017-06-04 2018-12-11 苹果公司 In response to attempting to access that the authentication techniques of sensitive information
WO2018227584A1 (en) * 2017-06-16 2018-12-20 深圳市汇顶科技股份有限公司 Method, device, and equipment for fingerprint recognition
CN111241516A (en) * 2020-01-16 2020-06-05 南京悠淼科技有限公司 Information safety protection method and system for intelligent manufacturing system
CN115206006A (en) * 2022-06-23 2022-10-18 浙江骑客机器人科技有限公司 Electric vehicle and unlocking method thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004881A (en) * 2010-11-24 2011-04-06 东莞宇龙通信科技有限公司 Mobile terminal and switching device and method of working modes thereof
CN103377364A (en) * 2012-04-16 2013-10-30 鸿富锦精密工业(深圳)有限公司 Fingerprint verification method for electronic device and system
CN103440446A (en) * 2013-08-23 2013-12-11 广东欧珀移动通信有限公司 Protective unlocking operating method and device of private content of intelligent terminal
CN103595719A (en) * 2013-11-15 2014-02-19 清华大学 Authentication method and system based on fingerprints
CN103646202A (en) * 2013-12-09 2014-03-19 东南大学 Fingerprint information coding encryption and application method
WO2014052069A1 (en) * 2012-09-28 2014-04-03 Intel Corporation Allowing varied device access based on different levels of unlocking mechanisms
CN104050406A (en) * 2014-07-03 2014-09-17 南昌欧菲生物识别技术有限公司 Method and terminal equipment for carrying out authentication through fingerprint combinations

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004881A (en) * 2010-11-24 2011-04-06 东莞宇龙通信科技有限公司 Mobile terminal and switching device and method of working modes thereof
CN103377364A (en) * 2012-04-16 2013-10-30 鸿富锦精密工业(深圳)有限公司 Fingerprint verification method for electronic device and system
WO2014052069A1 (en) * 2012-09-28 2014-04-03 Intel Corporation Allowing varied device access based on different levels of unlocking mechanisms
CN103440446A (en) * 2013-08-23 2013-12-11 广东欧珀移动通信有限公司 Protective unlocking operating method and device of private content of intelligent terminal
CN103595719A (en) * 2013-11-15 2014-02-19 清华大学 Authentication method and system based on fingerprints
CN103646202A (en) * 2013-12-09 2014-03-19 东南大学 Fingerprint information coding encryption and application method
CN104050406A (en) * 2014-07-03 2014-09-17 南昌欧菲生物识别技术有限公司 Method and terminal equipment for carrying out authentication through fingerprint combinations

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530101B (en) * 2016-02-29 2019-06-11 宇龙计算机通信科技(深圳)有限公司 A kind of fingerprint method for authenticating and device
CN105530101A (en) * 2016-02-29 2016-04-27 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method and device
CN105871886A (en) * 2016-05-11 2016-08-17 深圳市金立通信设备有限公司 Application access permission control method and terminal
CN106203019A (en) * 2016-07-21 2016-12-07 北京光年无限科技有限公司 A kind of user ID authentication method for robot and robot
CN106203019B (en) * 2016-07-21 2019-12-24 北京光年无限科技有限公司 User identity verification method for robot and robot
CN106295411A (en) * 2016-08-19 2017-01-04 芜湖市振华戎科智能科技有限公司 A kind of U dish method for managing security
CN106778134A (en) * 2016-12-09 2017-05-31 北京小米移动软件有限公司 terminal control method and device
CN106951768A (en) * 2017-05-10 2017-07-14 广东欧珀移动通信有限公司 The ageing control method of unlocked by fingerprint, device, mobile terminal and storage medium
CN106951768B (en) * 2017-05-10 2020-01-10 Oppo广东移动通信有限公司 Fingerprint unlocking timeliness control method and device, mobile terminal and storage medium
CN108985024A (en) * 2017-06-04 2018-12-11 苹果公司 In response to attempting to access that the authentication techniques of sensitive information
US11537699B2 (en) 2017-06-04 2022-12-27 Apple Inc. Authentication techniques in response to attempts to access sensitive information
WO2018227584A1 (en) * 2017-06-16 2018-12-20 深圳市汇顶科技股份有限公司 Method, device, and equipment for fingerprint recognition
CN107993259A (en) * 2017-11-27 2018-05-04 维沃移动通信有限公司 A kind of alarm clock method for closing, device and mobile terminal
CN108052808A (en) * 2017-11-28 2018-05-18 苏州市东皓计算机系统工程有限公司 A kind of computer booting verification method
CN108961084A (en) * 2018-07-07 2018-12-07 北京精友世纪软件技术有限公司 A kind of AI car damage identification Claims Resolution system and method for supporting cell phone client
CN111241516A (en) * 2020-01-16 2020-06-05 南京悠淼科技有限公司 Information safety protection method and system for intelligent manufacturing system
CN111241516B (en) * 2020-01-16 2022-09-27 江苏古卓科技有限公司 Information safety protection method and system for intelligent manufacturing system
CN115206006A (en) * 2022-06-23 2022-10-18 浙江骑客机器人科技有限公司 Electric vehicle and unlocking method thereof

Similar Documents

Publication Publication Date Title
CN105279400A (en) Mobile terminal security management method and mobile terminal
CN105117912A (en) Anti-reinstallation-after-stolen mobile terminal and anti-reinstallation-after-stolen method therefor
CN102025506A (en) User authentication method and device
CN101968774A (en) Device and method for storing mobile data safely
CN102904719A (en) USB (universal serial bus)-key and application method thereof
CN103034417A (en) Unlocking method for touch screen and terminal equipment
US9667412B2 (en) Key, system and method of unlocking electronic device using the key
CN105610871B (en) A kind of vehicle input-output control system and control method based on semi-on-line key
CN101140605A (en) Data safety reading method and safety storage apparatus thereof
CN108900296B (en) Secret key storage method based on biological feature identification
CN103538561A (en) Automobile starting control system and method
CN103559435A (en) Method and device for controlling debugging ports of terminal equipment
CN105279460A (en) Method and device for starting USB (Universal Serial Bus) debugging mode interface, and terminal
CN103729605A (en) Password input method based on touch screen, and touch terminal
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN105516136A (en) Authority management method, device and system
CN101753301A (en) Fingerprint dynamic password ID authentication device and the implementation method thereof
CN101945246A (en) Method, device and equipment for authenticating passwords
CN112744181B (en) Method for configuring vehicle control authority based on NFC (near field communication) equipment
CN102118748A (en) Mobile phone integrated with security module
CN105516500A (en) Method and system for selecting device mode
US20150143512A1 (en) Iris key, system and method of unlocking electronic device using the iris key
CN105069361A (en) Safety access method and system for privacy space
US20170337788A1 (en) Electronic device and anti-theft method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160127

RJ01 Rejection of invention patent application after publication