CN105468938A - Mobile terminal and security control method thereof - Google Patents

Mobile terminal and security control method thereof Download PDF

Info

Publication number
CN105468938A
CN105468938A CN201510790997.XA CN201510790997A CN105468938A CN 105468938 A CN105468938 A CN 105468938A CN 201510790997 A CN201510790997 A CN 201510790997A CN 105468938 A CN105468938 A CN 105468938A
Authority
CN
China
Prior art keywords
user
auricle image
mobile terminal
hidden function
default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510790997.XA
Other languages
Chinese (zh)
Other versions
CN105468938B (en
Inventor
杨燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201510790997.XA priority Critical patent/CN105468938B/en
Publication of CN105468938A publication Critical patent/CN105468938A/en
Application granted granted Critical
Publication of CN105468938B publication Critical patent/CN105468938B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a mobile terminal and a security control method thereof. The security control method comprises the following steps: obtaining a user auricle image of a user currently holding the mobile terminal; judging whether a preset auricle image consistent with the user auricle image is locally stored; if the judging result is positive, displaying a private application program related to the preset auricle image consistent with the user auricle image; and if the judging result is negative, hiding a private application program related to the preset auricle image inconsistent with the user auricle image. Through the manner, the private application programs can be more securely protected from being peeped by other people.

Description

Mobile terminal and method of controlling security thereof
Technical field
The present invention relates to the security fields of electronic equipment, particularly relate to a kind of mobile terminal and method of controlling security thereof.
Background technology
At present; mobile terminal in use; more unavoidable other users can touch mobile terminal; the privacy application program of such user (owner) (such as pays relevant program; the program that note is correlated with, program that photograph album is relevant etc.) just can not be protected accordingly to a certain extent, easily by other people pry.On the other hand, when mobile terminal is lost, wish that some secret application programs are protected accordingly.
The mode of existing usual employing password authentification is protected these secret application programs; but the security of password is not enough; be easy to be cracked in the password dictionary of limited number of time; and password is easily forgotten; be difficult to after owner forgets Password again manipulate mobile terminal, bring great inconvenience to user.
Therefore, need to provide a kind of mobile terminal and method of controlling security thereof, to solve the problems of the technologies described above.
Summary of the invention
The technical matters that the present invention mainly solves is to provide a kind of mobile terminal and method of controlling security thereof, and protection secret application program that can be safer is not stolen a glance at by other people.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: the method for controlling security providing a kind of mobile terminal, and method of controlling security comprises: obtain the current user's auricle image holding the user of mobile terminal; Judge whether this locality stores the default auricle image consistent with user's auricle image; If then show the secret application program of consistent default auricle image association, then hide the secret application program that the default auricle image inconsistent with user's auricle image associates if not.
Wherein, obtain current hold user's auricle image of the user of mobile terminal before comprise: setting program hidden function, comprising unlatching or the closedown of setting program hidden function;
Whether determining program hidden function is opened, and performs the current step holding user's auricle image of the user of mobile terminal of acquisition when opening, and does not perform obtain the current step holding user's auricle image of the user of mobile terminal when not opening.
Wherein, setting program hidden function also comprises: arrange secret the application list, and wherein secret the application list comprises at least one secret application program.
Wherein, also comprise before setting program hidden function: judge to ask the user of setting program hidden function whether to have permission setting program hidden function.
Wherein, judge that asking the user of setting program hidden function whether to have permission setting program hidden function comprises: the auricle image obtaining request setting program hidden function user, judge whether this locality stores the default auricle image consistent with the auricle image of user, if exist, enter the interface of setting program hidden function, if do not exist, judge whether user has permission by other safety verifications and arrange, if user is not by other safety verifications, forbid that user carries out the setting of program hidden function, if by other safety verifications, enter the interface of setting program hidden function.
Wherein, other safety verifications are password authentification, fingerprint authentication, iris verification, voice authentication or heartbeat checking.
Wherein, obtain current hold user's auricle image of the user of mobile terminal before also comprise: enroll the default auricle image of at least one user to be registered and be stored to this locality, and create the secret the application list associated with default auricle image, wherein secret the application list comprises at least one secret application program.
Wherein, the unlatching of setting program hidden function or closedown comprise: the program hidden function controlling mobile terminal is beyond the clouds opened or closed; Judge that asking the user of setting program hidden function whether to have permission setting program hidden function comprises: judge beyond the clouds to ask the user of setting program hidden function whether to have permission setting program hidden function.
For solving the problems of the technologies described above, another technical solution used in the present invention is: provide a kind of mobile terminal, mobile terminal comprises: auricle image collection module, for obtaining the current user's auricle image holding the user of mobile terminal; Memory module, for storing default auricle image; Whether auricle image comparison module, store the default auricle image consistent with user's auricle image for judging in memory module; Application management module, show the secret application program that described default auricle image unanimously associates during for storing the default auricle image consistent with described user's auricle image in a storage module, and during for not storing the default auricle image consistent with user's auricle image in a storage module, then hide the secret application program that the default auricle image inconsistent with user's auricle image associate.
Wherein, mobile terminal is mobile phone, panel computer or palm PC.
The invention has the beneficial effects as follows: the situation being different from prior art, the present invention, by obtaining the current user's auricle image holding the user of mobile terminal, then judges whether this locality stores the default auricle image consistent with user's auricle image; If then show the secret application program of consistent default auricle image association; then hide the secret application program that the default auricle image inconsistent with user's auricle image associates if not; by the way, the protection secret application program that the present invention can be safer is not stolen a glance at by other people.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the method for controlling security of mobile terminal of the present invention;
Fig. 2 is the module diagram of mobile terminal of the present invention.
Embodiment
Below in conjunction with drawings and Examples, the present invention will be described in detail.
Refer to Fig. 1, Fig. 1 is the process flow diagram of the method for controlling security of mobile terminal of the present invention.In the present embodiment, the method for controlling security of mobile terminal comprises the following steps:
Step S11: obtain the current user's auricle image holding the user of mobile terminal.
In step s 11, such as, the current user's auricle image holding the user of mobile terminal is obtained by the camera of mobile terminal.
Step S12: judge whether this locality stores the default auricle image consistent with user's auricle image.
In step s 12, judge whether mobile terminal this locality stores the default auricle image consistent with the user's auricle obtained in step S11.
Step S13: if then show the secret application program of consistent default auricle image association; Then hide the secret application program that the default auricle image inconsistent with user's auricle image associates if not.
In step s 13, in the ear picture database that mobile terminal this locality is preset, the default auricle image of search is compared one by one, find the secret application program showing consistent default auricle image association during consistent default auricle image, if can not find consistent default auricle image, then hide and preset the secret application program that in ear picture database, the default auricle image inconsistent with user's auricle head portrait associates.
Preferably, step S11 obtain current hold user's auricle image of the user of mobile terminal before also comprise: enroll the default auricle image of at least one user to be registered and be stored to this locality, and create the secret the application list associated with default auricle image, wherein secret the application list comprises at least one secret application program.Enroll the default auricle image of at least one user to be registered and be stored to the default ear picture database of local formation.
Be described for following table, association the application list that each default auricle image of enrolling in advance is corresponding.
The first situation we only allow for default ear picture database the default auricle image that a user is set, namely use the user of this mobile terminal to enroll one individual after dispatching from the factory first and preset auricle image, and association secret the application list of correspondence, namely this user is the owner of mobile terminal.In this case, the current user's auricle image holding the user of mobile terminal is obtained; Judge whether this locality stores the default auricle image (namely judge the current user that hold mobile terminal be owner) consistent with user's auricle image, if then show the secret application program (if then showing the secret application program associated with the default auricle image of owner) of consistent default auricle image association, then hide the secret application program (namely hiding the secret application program associated with the default auricle image of owner) that the default auricle image inconsistent with user's auricle image associates if not.
The second situation we to have the default auricle image of two or more users in the ear picture database preset.In this case, the current user's auricle image holding the user of mobile terminal is obtained; Judge whether this locality stores the default auricle image (namely judge whether the current user that hold mobile terminal enrolled preset auricle image to local) consistent with user's auricle image, if then show the secret application program (if then showing the secret application program of this consistent default auricle image association) of consistent default auricle image association, then hide the secret application program (namely hiding the secret application program that local these default auricle images inconsistent with the auricle image of this user stored associate) that the default auricle image inconsistent with user's auricle image associates if not.
Preferably, step S11 obtain current hold user's auricle image of the user of mobile terminal before comprise: setting program hidden function, comprising unlatching or the closedown of setting program hidden function; Whether determining program hidden function is opened, and the current step holding user's auricle image of the user of mobile terminal of step S11 acquisition is performed when opening, do not perform step S11 when not opening and obtain the current step holding user's auricle image of the user of mobile terminal.
Preferably, setting program hidden function also comprises: arrange secret the application list, and wherein secret the application list comprises at least one secret application program.Here secret the application list is set, be preferably amendment, upgrade the inside secret application program, such as add or delete.
Preferably, also comprise before setting program hidden function: judge to ask the user of setting program hidden function whether to have permission setting program hidden function.
Preferably, judge that asking the user of setting program hidden function whether to have permission setting program hidden function comprises: the auricle image obtaining request setting program hidden function user, judge whether this locality stores the default auricle image consistent with the auricle image of user, if exist, enter the interface of setting program hidden function, if do not exist, judge whether user has permission by other safety verifications and arrange, if user is not by other safety verifications, forbid that user carries out the setting of program hidden function, if by other safety verifications, enter the interface of setting program hidden function.
Preferably, other safety verifications are password authentification, fingerprint authentication, iris verification, voice authentication or heartbeat checking.
In other examples, the unlatching of setting program hidden function or closedown comprise: the program hidden function controlling mobile terminal is beyond the clouds opened or closed; Judge that asking the user of setting program hidden function whether to have permission setting program hidden function comprises: judge beyond the clouds to ask the user of setting program hidden function whether to have permission setting program hidden function.When mobile terminal is lost, opening program hidden function can be carried out by this function.Specific implementation is: mobile terminal uploads default ear picture database in associated high in the clouds, when user needs Long-distance Control, the user's auricle image uploaded in real time by other mobile terminals and the default ear picture database in high in the clouds are contrasted, during as contrasted to the default auricle image unanimously arrived, the instruction that then can send corresponding On/Off program hidden function operates, as do not contrasted corresponding default auricle image, then can not send On/Off instruction to the mobile terminal lost
Refer to Fig. 2, Fig. 2 is the module diagram of mobile terminal of the present invention.In the present embodiment, mobile terminal comprises auricle image collection module 11, memory module 12, auricle image comparison module 13 and application management module 14.
Auricle image collection module 11 is for obtaining the current user's auricle image holding the user of mobile terminal.
Memory module 12 is for storing default auricle image.
Whether auricle image comparison module 13, store the default auricle image consistent with user's auricle image for judging in memory module.
Application management module 14, show the secret application program that described default auricle image unanimously associates during for storing the default auricle image consistent with described user's auricle image in a storage module, and during for not storing the default auricle image consistent with user's auricle image in a storage module, then hide the secret application program that the default auricle image inconsistent with user's auricle image associate.
Preferably, mobile terminal is mobile phone, panel computer or palm PC.
Preferably, auricle image collection module 11 for acquisition is current hold user's auricle image of the user of mobile terminal before enroll the default auricle image of at least one user to be registered and be stored to this locality, and create the secret the application list associated with default auricle image, wherein secret the application list comprises at least one secret application program.Enroll the default auricle image of at least one user to be registered and be stored to the default ear picture database of local formation.
Preferably, mobile terminal also acquisition current hold user's auricle image of the user of mobile terminal before setting program hidden function, comprising unlatching or the closedown of setting program hidden function.
Preferably, whether mobile terminal also determining program hidden function is opened, and auricle image collection module 11 obtains the current user's auricle image holding the user of mobile terminal when opening, when not opening, auricle image collection module 11 does not obtain the current user's auricle image holding the user of mobile terminal.
Preferably, arrange module also for arranging secret the application list, wherein secret the application list comprises at least one secret application program.Here secret the application list is set, be preferably amendment, upgrade the inside secret application program, such as add or delete.
Preferably, mobile terminal also judges to ask the user of setting program hidden function whether to have permission setting program hidden function.
Preferably, mobile terminal judges that asking the user of setting program hidden function whether to have permission setting program hidden function is specially: auricle image collection module 11 obtains the auricle image of request setting program hidden function user, auricle image comparison module 13 judges whether this locality stores the default auricle image consistent with the auricle image of user, if exist, enter the interface of setting program hidden function, if do not exist, judge whether user has permission by other safety verifications and arrange, if user is not by other safety verifications, forbid that user carries out the setting of program hidden function, if by other safety verifications, enter the interface of setting program hidden function.
Preferably, other safety verifications are password authentification, fingerprint authentication, iris verification, voice authentication or heartbeat checking.
In other examples, the unlatching of setting program hidden function or closedown comprise: the program hidden function controlling mobile terminal is beyond the clouds opened or closed; Judge that asking the user of setting program hidden function whether to have permission setting program hidden function comprises: judge beyond the clouds to ask the user of setting program hidden function whether to have permission setting program hidden function.When mobile terminal is lost, opening program hidden function can be carried out by this function.Specific implementation is: mobile terminal uploads default ear picture database in associated high in the clouds, when user needs Long-distance Control, the user's auricle image uploaded in real time by other mobile terminals and the default ear picture database in high in the clouds are contrasted, during as contrasted to the default auricle image unanimously arrived, the instruction that then can send corresponding On/Off program hidden function operates, as do not contrasted corresponding default auricle image, then can not send On/Off instruction to the mobile terminal lost.
Be different from prior art, the present invention, by obtaining the current user's auricle image holding the user of mobile terminal, then judges whether this locality stores the default auricle image consistent with user's auricle image; If then show the secret application program of consistent default auricle image association; then hide the secret application program that the default auricle image inconsistent with user's auricle image associates if not; by the way, the protection secret application program that the present invention can be safer is not stolen a glance at by other people.
The foregoing is only embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize instructions of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. a method of controlling security for mobile terminal, is characterized in that, described method of controlling security comprises:
Obtain the current user's auricle image holding the user of described mobile terminal;
Judge whether this locality stores the default auricle image consistent with described user's auricle image;
If then show the secret application program of described default auricle image association unanimously, then hide the secret application program that the default auricle image inconsistent with described user's auricle image associates if not.
2. method of controlling security as claimed in claim 1, is characterized in that, described acquisition is current hold user's auricle image of the user of described mobile terminal before comprise:
Setting program hidden function, comprising unlatching or the closedown of setting program hidden function;
Judge whether described program hidden function is opened, and the current step holding user's auricle image of the user of described mobile terminal of acquisition is performed when opening, do not perform when not opening and obtain the current step holding user's auricle image of the user of described mobile terminal.
3. method of controlling security as claimed in claim 2, it is characterized in that, setting program hidden function also comprises:
Arrange secret the application list, wherein said secret the application list comprises at least one secret application program.
4. method of controlling security as claimed in claim 2, is characterized in that, also comprise before described setting program hidden function:
Judge to ask the user of setting program hidden function whether to have permission setting program hidden function.
5. method of controlling security as claimed in claim 4, is characterized in that, judges that asking the user of setting program hidden function whether to have permission setting program hidden function comprises:
Obtain the auricle image of request setting program hidden function user, judge whether this locality stores the default auricle image consistent with the auricle image of described user, if exist, enter the interface of setting program hidden function, if do not exist, judge whether described user has permission by other safety verifications and arrange, if described user is not by other safety verifications described, forbid that described user carries out the setting of program hidden function, if by other safety verifications described, enter the interface of setting program hidden function.
6. method of controlling security as claimed in claim 5, is characterized in that, other safety verifications described are password authentification, fingerprint authentication, iris verification, voice authentication or heartbeat checking.
7. method of controlling security as claimed in claim 1, is characterized in that, described acquisition is current hold user's auricle image of the user of described mobile terminal before also comprise:
Enroll the default auricle image of at least one user to be registered and be stored to this locality, and creating the secret the application list associated with described default auricle image, wherein said secret the application list comprises at least one secret application program.
8. method of controlling security as claimed in claim 2, it is characterized in that, unlatching or the closedown of setting program hidden function comprise:
The program hidden function controlling mobile terminal is beyond the clouds opened or is closed;
Describedly judge that asking the user of setting program hidden function whether to have permission setting program hidden function comprises:
Judge beyond the clouds to ask the user of setting program hidden function whether to have permission setting program hidden function.
9. a mobile terminal, is characterized in that, described mobile terminal comprises:
Auricle image collection module, for obtaining the current user's auricle image holding the user of described mobile terminal;
Memory module, for storing default auricle image;
Whether auricle image comparison module, store the default auricle image consistent with user's auricle image for judging in described memory module;
Application management module, show the secret application program that described default auricle image unanimously associates during for storing the default auricle image consistent with described user's auricle image in described memory module, and during for not storing the default auricle image consistent with described user's auricle image in described memory module, then hide the secret application program that the default auricle image inconsistent with described user's auricle image associate.
10. mobile terminal as claimed in claim 9, it is characterized in that, described mobile terminal is mobile phone, panel computer or palm PC.
CN201510790997.XA 2015-11-16 2015-11-16 Mobile terminal and security control method thereof Active CN105468938B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510790997.XA CN105468938B (en) 2015-11-16 2015-11-16 Mobile terminal and security control method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510790997.XA CN105468938B (en) 2015-11-16 2015-11-16 Mobile terminal and security control method thereof

Publications (2)

Publication Number Publication Date
CN105468938A true CN105468938A (en) 2016-04-06
CN105468938B CN105468938B (en) 2021-02-26

Family

ID=55606628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510790997.XA Active CN105468938B (en) 2015-11-16 2015-11-16 Mobile terminal and security control method thereof

Country Status (1)

Country Link
CN (1) CN105468938B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127009A (en) * 2016-06-30 2016-11-16 宇龙计算机通信科技(深圳)有限公司 The display packing of a kind of icon and terminal
CN106228047A (en) * 2016-07-15 2016-12-14 宇龙计算机通信科技(深圳)有限公司 A kind of application icon processing method and terminal unit

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120297184A1 (en) * 2011-05-20 2012-11-22 Lockheed Martin Corporation Cloud computing method and system
CN103677638A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for processing private documents
CN103699825A (en) * 2012-09-27 2014-04-02 Lg电子株式会社 Display apparatus and method for operating the same
CN103886240A (en) * 2014-04-11 2014-06-25 快车科技有限公司 Method and device for improving equipment security through multi-fingerprint identification
US8850546B1 (en) * 2012-09-30 2014-09-30 Emc Corporation Privacy-preserving user attribute release and session management
CN104700010A (en) * 2013-12-05 2015-06-10 腾讯科技(深圳)有限公司 Personal information protection method and protection device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120297184A1 (en) * 2011-05-20 2012-11-22 Lockheed Martin Corporation Cloud computing method and system
CN103699825A (en) * 2012-09-27 2014-04-02 Lg电子株式会社 Display apparatus and method for operating the same
US8850546B1 (en) * 2012-09-30 2014-09-30 Emc Corporation Privacy-preserving user attribute release and session management
CN104700010A (en) * 2013-12-05 2015-06-10 腾讯科技(深圳)有限公司 Personal information protection method and protection device
CN103677638A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for processing private documents
CN103886240A (en) * 2014-04-11 2014-06-25 快车科技有限公司 Method and device for improving equipment security through multi-fingerprint identification

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
丁明跃主编: "《物联网识别技术》", 31 July 2012 *
李雅娟 等: "基于耳廓特征的生物识别新技术", 《计算机应用于软件》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127009A (en) * 2016-06-30 2016-11-16 宇龙计算机通信科技(深圳)有限公司 The display packing of a kind of icon and terminal
CN106127009B (en) * 2016-06-30 2019-01-11 宇龙计算机通信科技(深圳)有限公司 A kind of display methods and terminal of icon
CN106228047A (en) * 2016-07-15 2016-12-14 宇龙计算机通信科技(深圳)有限公司 A kind of application icon processing method and terminal unit
CN106228047B (en) * 2016-07-15 2019-04-12 宇龙计算机通信科技(深圳)有限公司 A kind of application icon processing method and terminal device

Also Published As

Publication number Publication date
CN105468938B (en) 2021-02-26

Similar Documents

Publication Publication Date Title
CN104933342B (en) A kind of picture inspection method and mobile terminal
EP3214563B1 (en) Apparatus and method for improving security of terminal
WO2016082229A1 (en) Identity authentication method and wearable device
CN104778416B (en) A kind of information concealing method and terminal
CN103455761B (en) File encryption and decryption method and device and electronic device
CN105205370A (en) Safety protection method for mobile terminal, mobile terminal, safety system and application method
CN102638790A (en) Password control method, device and system
US10016083B1 (en) Secure mailbox and a mailbox application in a connected user device
EP3249570B1 (en) Method and device for providing prompt indicating loss of terminal
CN106650361A (en) Unblocking method and device
CN108551550A (en) Image control, the filming control method of camera applications, device and electronic equipment
CN105787319B (en) Portable terminal based on iris recognition and method thereof
US20120093374A1 (en) Electronic device and method for identifying use by unauthorized users
US11681419B2 (en) Method for disguising a computer system's login interface
WO2016119341A1 (en) Method and device for implementing multi-user login mode, and computer storage medium
CN105468938A (en) Mobile terminal and security control method thereof
CN106909814A (en) Divulgence prevention method and anti-terminal of divulging a secret
CN101488859A (en) Network security authentication system based on handwriting recognition and implementing method thereof
WO2018006349A1 (en) Method and system for verifying user entry based on picture password
CN108073820A (en) Security processing, device and the mobile terminal of data
WO2018006326A1 (en) Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password
JP2020004424A (en) Method and device for protecting privacy of mobile terminal and mobile terminal
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
CN105844137B (en) Device and method for identifying picture browsing operation authority
WO2018006325A1 (en) Method and system for verifying user entrance

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant