CN103020503A - Terminal and user identity authentication method - Google Patents
Terminal and user identity authentication method Download PDFInfo
- Publication number
- CN103020503A CN103020503A CN201210555400XA CN201210555400A CN103020503A CN 103020503 A CN103020503 A CN 103020503A CN 201210555400X A CN201210555400X A CN 201210555400XA CN 201210555400 A CN201210555400 A CN 201210555400A CN 103020503 A CN103020503 A CN 103020503A
- Authority
- CN
- China
- Prior art keywords
- user
- terminal
- centralized control
- control district
- traffic operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a terminal. The terminal comprises a region setting unit, a region detecting unit, a user identity judgment unit and an information transmitting unit, wherein the region setting unit is used for setting at least one centralized control region on a screen interface of the terminal; the region detection unit is used for detecting whether at least one execution step realized through the centralized control region exists in communication operation when the communication operation is performed in the terminal; the user identity judgment unit is used for judging a current user to be an authorized user when a detection result of the region detection unit exists, and otherwise, judging the current user to be an illegal user; and the information transmitting unit is used for transmitting alarm information to a target object of the communication operation when the current user is the illegal user. The invention also provides a user identity authentication method. Through the technical scheme provided by the invention, the identity of a user who performs the communication operation currently can be authorized effectively; the target object of the communication operation is informed when the identity of the user does not pass the authorization; and therefore, the terminal is prevented from being utilized by the illegal user after the user terminal is lost.
Description
Technical field
The present invention relates to identity identification technical field, in particular to the verification method of a kind of terminal and a kind of user identity.
Background technology
After user's mobile phone was picked up by the lawless person or obtains by improper means, the lawless person may carry out communication with the contact person that stores in the mobile phone, may therefore cause mobile phone owner or contact person's privacy to reveal or damage to property etc.
In correlation technique, can pass through face recognition, fingerprint recognition or other people body characteristics recognition technology and detect current whether owner, but the technology such as the face recognition of terminal, fingerprint recognition to be still in the stage of improving at present, discrimination is not high.
Therefore, need a kind of verification method of New Consumers identity, can effectively verify the current user identity that communicates operation, and not by checking the time, inform the destination object of traffic operation, utilized by the lawless person afterwards to avoid user terminal to lose.
Summary of the invention
The present invention just is being based on the problems referred to above, a kind of verification method of New Consumers identity has been proposed, can effectively verify the current user identity that communicates operation, and at the destination object of not informing traffic operation by when checking, be utilized by the lawless person afterwards to avoid user terminal to lose.
In view of this, the present invention proposes a kind of terminal, comprising: the region division unit is used at the screen interface of described terminal at least one centralized control district being set; Whether the zone detecting unit is used for occuring in the situation of traffic operation in described terminal, detect to exist at least one execution in step to realize by described centralized control district in the described traffic operation; The user identity judging unit is used for judging that the active user is authorized user, otherwise being judged to be the disabled user in the situation of testing result for existence of described regional detecting unit; Information transmitting unit, being used for described active user is in disabled user's the situation, to the destination object transmission information warning of described traffic operation.
In this technical scheme, by integrated to the function of operation, the user need to not seek control button or control area at the diverse location of whole terminal interface, can carry out user friendly operating process in this centralized control district for all operations that can carry out of current interface or terminal.Particularly, can operating function or the already present functionality controls under the different interfaces of terminal be obtained, (be generally that the user commonly uses for the whole or specified portions in aforesaid operations function or the functionality controls so, can be pre-if the User Defined setting by manufacturer), can be by corresponding virtual key be set in the centralized control district, so that the user is when choosing these virtual keys, can realize original operating function equally, or when the user marks corresponding gesture track in the centralized control district after, also can realize original function.Because no matter current interface is standby interface or the function interface of certain application program, can demonstrate the centralized control district at terminal interface, and in the centralized control district, demonstrate virtual key or receive user's gesture track, thereby realize the control to current interface, needn't be owing to variation and the difference at interface, user's operation has been simplified in the selection of function button so that the user has to carry out at the diverse location of screen.The precalculated position here can be the default zone that system default or user arrange.The centralized control district here can be for single or multiple, can how much arranging or automatically regulating according to user's setting, current action required function.Need to prove that here " setting " do not represent and must show, as long as can user's touch-control order be received.
The traffic operation here refers to exist sending of signal of communication, and has the specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone is the called party, the destination object of note, mail etc. is the addressee, and the destination object of social network information is the social network-i i-platform (such as sending out status information etc.) that makes up of the webserver or the addressee in the social networks (such as for certain good friend's information-reply etc.).The user can arrange such as in the process of whole traffic operation, must exist at least an operation in the centralized control district, to finish, or whole operating process all must be finished in the centralized control district, especially when the centralized control district be not when residing on the screen interface of terminal, the disabled user is probably directly at the enterprising line operate of application interface so, thereby the identity that sticks one's chin out, be convenient to real authorized user (such as the owner) and destination object and go and find out what's going on, avoid causing further loss.
In technique scheme, preferably, also comprise: the interface detecting unit is to realize by communication interface corresponding to described traffic operation for occur in the situation of traffic operation, detect whether have at least one execution in step in the described traffic operation in described terminal; Wherein, described user identity judging unit is in the situation of existence in the testing result of described regional detecting unit and described interface detecting unit, judges that described active user is authorized user, otherwise is judged to be the disabled user.
In this technical scheme, when the user can be set in traffic operation, must jointly carry out in conjunction with application interface and centralized control district, especially reside on the screen interface of terminal when the centralized control district, or after the application interface that enters traffic operation, in the situation of centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, also comprise: the communication type judging unit is used for judging whether described traffic operation is used for sending communication information; Described information transmitting unit comprises: information is added subelement, and the judged result that is used at described communication type judging unit is in the situation that is, described information warning is added in the described communication information; Send the control subelement, be used in the described communication type judging unit situation that the determination result is NO, directly described information warning being sent to described destination object.
In this technical scheme, in the situations such as note, mail, social network information, can produce communication information, can receive short message content, Mail Contents or the social network information content etc. that can be used for showing such as destination object, therefore information warning directly can be added in the communication information.And in the situations such as conversation, then just send the signal of communication that is used for being connected to the other side, can not transmit the information content, therefore can send information warning by modes such as independent note, mails, and the destination object terminal can be resolved the content of the note that receives, mail etc., when parsing information warning, can directly show at call interface, with timely prompting user.
In technique scheme, preferably, also comprise: the operation setting unit is used for according to the operation setting order that receives the operation of arousing to described centralized control district being set; The unit is aroused in the zone, be used for detect with described situation of arousing the operational motion that operation is complementary under, arouse described centralized control district in the current interface of described terminal.
In this technical scheme, owing to must operate in conjunction with the centralized control district, thereby can be by the arouse operation of User Defined to the centralized control district, thereby be conducive to promote privacy.
In technique scheme, preferably, also comprise: the step setting unit is used for according to the step that receives order being set, for the traffic operation in the described terminal arranges the key operation step that at least one is associated; Wherein, described user identity judging unit comprises in the situation of described key operation step in described at least one execution in step that realizes by described centralized control district, judges that described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, the user can specify some or a plurality of steps to realize in the centralized control district, " dial-out " or " transmission " operation such as final step, or any other steps in the traffic operation process, so that the user can arrange according to the operating habit etc. of self, be convenient to user's operation, and be conducive to promote the validity of authentication and the safe coefficient of privacy of user.
According to another aspect of the invention, also proposed a kind of verification method of user identity, having comprised: step 202 arranges at least one centralized control district at the screen interface of terminal; Traffic operation when occuring in the described terminal, if at least one execution in step of described traffic operation is judged that then the active user is authorized user, otherwise is judged to be the disabled user by the realization of described centralized control district in step 204; Step 206, if described active user is the disabled user, then the destination object to described traffic operation sends information warning.
In this technical scheme, by integrated to the function of operation, the user need to not seek control button or control area at the diverse location of whole terminal interface, can carry out user friendly operating process in this centralized control district for all operations that can carry out of current interface or terminal.Particularly, can operating function or the already present functionality controls under the different interfaces of terminal be obtained, (be generally that the user commonly uses for the whole or specified portions in aforesaid operations function or the functionality controls so, can be pre-if the User Defined setting by manufacturer), can be by corresponding virtual key be set in the centralized control district, so that the user is when choosing these virtual keys, can realize original operating function equally, or when the user marks corresponding gesture track in the centralized control district after, also can realize original function.Because no matter current interface is standby interface or the function interface of certain application program, can demonstrate the centralized control district at terminal interface, and in the centralized control district, demonstrate virtual key or receive user's gesture track, thereby realize the control to current interface, needn't be owing to variation and the difference at interface, user's operation has been simplified in the selection of function button so that the user has to carry out at the diverse location of screen.The precalculated position here can be the default zone that system default or user arrange.The centralized control district here can be for single or multiple, can how much arranging or automatically regulating according to user's setting, current action required function.Need to prove that here " setting " do not represent and must show, as long as can user's touch-control order be received.
The traffic operation here refers to exist sending of signal of communication, and has the specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone is the called party, the destination object of note, mail etc. is the addressee, and the destination object of social network information is the social network-i i-platform (such as sending out status information etc.) that makes up of the webserver or the addressee in the social networks (such as for certain good friend's information-reply etc.).The user can arrange such as in the process of whole traffic operation, must exist at least an operation in the centralized control district, to finish, or whole operating process all must be finished in the centralized control district, especially when the centralized control district be not when residing on the screen interface of terminal, the disabled user is probably directly at the enterprising line operate of application interface so, thereby the identity that sticks one's chin out, be convenient to real authorized user (such as the owner) and destination object and go and find out what's going on, avoid causing further loss.
In technique scheme, preferably, described step 204 also comprises: if at least one described execution in step realizes by described centralized control district, and at least one described execution in step is to realize by communication interface corresponding to described traffic operation, judge that then described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, when the user can be set in traffic operation, must jointly carry out in conjunction with application interface and centralized control district, especially reside on the screen interface of terminal when the centralized control district, or after the application interface that enters traffic operation, in the situation of centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, described step 206 also comprises: judge whether described traffic operation is used for sending communication information, if, then described information warning is added in the described communication information, otherwise directly described information warning is sent to described destination object.
In this technical scheme, in the situations such as note, mail, social network information, can produce communication information, can receive short message content, Mail Contents or the social network information content etc. that can be used for showing such as destination object, therefore information warning directly can be added in the communication information.And in the situations such as conversation, then just send the signal of communication that is used for being connected to the other side, can not transmit the information content, therefore can send information warning by modes such as independent note, mails, and the destination object terminal can be resolved the content of the note that receives, mail etc., when parsing information warning, can directly show at call interface, with timely prompting user.
In technique scheme, preferably, also comprise: according to the operation setting order that receives, the operation of arousing to described centralized control district is set; And described step 204 also comprises: operate the operational motion that is complementary if detect with described arousing, then arouse described centralized control district in the current interface of described terminal.
In this technical scheme, owing to must operate in conjunction with the centralized control district, thereby can be by the arouse operation of User Defined to the centralized control district, thereby be conducive to promote privacy.
In technique scheme, preferably, before the described step 204, also comprise: according to the step that receives order is set, for the traffic operation in the described terminal arranges the key operation step that at least one is associated; And in described step 204, if comprise described key operation step in described at least one execution in step by the realization of described centralized control district, judge that then described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, the user can specify some or a plurality of steps to realize in the centralized control district, " dial-out " or " transmission " operation such as final step, or any other steps in the traffic operation process, so that the user can arrange according to the operating habit etc. of self, be convenient to user's operation, and be conducive to promote the validity of authentication and the safe coefficient of privacy of user.
By above technical scheme, can effectively verify the current user identity that communicates operation, and at the destination object of not informing traffic operation by when checking, utilized by the lawless person afterwards to avoid user terminal to lose.
Description of drawings
Fig. 1 shows the according to an embodiment of the invention block diagram of terminal;
Fig. 2 shows the according to an embodiment of the invention process flow diagram of the verification method of user identity;
Fig. 3 A to Fig. 3 C shows the surface chart of according to an embodiment of the invention user identity being verified and being warned;
Fig. 4 shows the process flow diagram of according to an embodiment of the invention user identity being verified.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments the present invention is further described in detail.Need to prove that in the situation of not conflicting, the application's embodiment and the feature among the embodiment can make up mutually.
A lot of details have been set forth in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not subjected to the restriction of following public specific embodiment.
Fig. 1 shows the according to an embodiment of the invention block diagram of terminal.
As shown in Figure 1, terminal 100 according to an embodiment of the invention, comprising: region division unit 102 is used at the screen interface of described terminal 100 at least one centralized control district being set; Whether zone detecting unit 104 is used for occuring in the situation of traffic operation in described terminal 100, detect to exist at least one execution in step to realize by described centralized control district in the described traffic operation; User identity judging unit 106 is used for judging that the active user is authorized user, otherwise being judged to be the disabled user in the situation of testing result for existence of described regional detecting unit 104; Information transmitting unit 108, being used for described active user is in disabled user's the situation, to the destination object transmission information warning of described traffic operation.
In this technical scheme, by integrated to the function of operation, the user need to not seek control button or control area at the diverse location of whole terminal interface, all operations that can carry out for current interface or terminal 100 can be carried out user friendly operating process in this centralized control district.Particularly, can operating function or the already present functionality controls under the terminal 100 different interfaces be obtained, (be generally that the user commonly uses for the whole or specified portions in aforesaid operations function or the functionality controls so, can be pre-if the User Defined setting by manufacturer), can be by corresponding virtual key be set in the centralized control district, so that the user is when choosing these virtual keys, can realize original operating function equally, or when the user marks corresponding gesture track in the centralized control district after, also can realize original function.Because no matter current interface is standby interface or the function interface of certain application program, can demonstrate the centralized control district at terminal interface, and in the centralized control district, demonstrate virtual key or receive user's gesture track, thereby realize the control to current interface, needn't be owing to variation and the difference at interface, user's operation has been simplified in the selection of function button so that the user has to carry out at the diverse location of screen.The precalculated position here can be the default zone that system default or user arrange.The centralized control district here can be for single or multiple, can how much arranging or automatically regulating according to user's setting, current action required function.Need to prove that here " setting " do not represent and must show, as long as can user's touch-control order be received.
The traffic operation here refers to exist sending of signal of communication, and has the specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone is the called party, the destination object of note, mail etc. is the addressee, and the destination object of social network information is the social network-i i-platform (such as sending out status information etc.) that makes up of the webserver or the addressee in the social networks (such as for certain good friend's information-reply etc.).The user can arrange such as in the process of whole traffic operation, must exist at least an operation in the centralized control district, to finish, or whole operating process all must be finished in the centralized control district, especially when the centralized control district be not when residing on the screen interface of terminal 100, the disabled user is probably directly at the enterprising line operate of application interface so, thereby the identity that sticks one's chin out, be convenient to real authorized user (such as the owner) and destination object and go and find out what's going on, avoid causing further loss.
In technique scheme, preferably, also comprise: interface detecting unit 110 is to realize by communication interface corresponding to described traffic operation for occur in the situation of traffic operations, detect whether have at least one execution in step in the described traffic operation in described terminal 100; Wherein, described user identity judging unit 106 is in the situation of existence in the testing result of described regional detecting unit 104 and described interface detecting unit 110, judges that described active user is authorized user, otherwise is judged to be the disabled user.
In this technical scheme, when the user can be set in traffic operation, must jointly carry out in conjunction with application interface and centralized control district, especially reside on the screen interface of terminal when the centralized control district, or after the application interface that enters traffic operation, in the situation of centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, also comprise: communication type judging unit 112 is used for judging whether described traffic operation is used for sending communication information; Described information transmitting unit 108 comprises: information is added subelement 1082, and the judged result that is used at described communication type judging unit 112 is in the situation that is, described information warning is added in the described communication information; Send control subelement 1084, be used in described communication type judging unit 112 situation that the determination result is NO, directly described information warning being sent to described destination object.
In this technical scheme, in the situations such as note, mail, social network information, can produce communication information, can receive short message content, Mail Contents or the social network information content etc. that can be used for showing such as destination object, therefore information warning directly can be added in the communication information.And in the situations such as conversation, then just send the signal of communication that is used for being connected to the other side, can not transmit the information content, therefore can send information warning by modes such as independent note, mails, and the destination object terminal can be resolved the content of the note that receives, mail etc., when parsing information warning, can directly show at call interface, with timely prompting user.
In technique scheme, preferably, also comprise: operation setting unit 114 is used for according to the operation setting order that receives the operation of arousing to described centralized control district being set; Unit 116 is aroused in the zone, be used for detect with described situation of arousing the operational motion that operation is complementary under, arouse described centralized control district in the current interface of described terminal 100.
In this technical scheme, owing to must operate in conjunction with the centralized control district, thereby can be by the arouse operation of User Defined to the centralized control district, thereby be conducive to promote privacy.
In technique scheme, preferably, also comprise: step setting unit 118 is used for according to the step that receives order being set, for the traffic operation in the described terminal 100 arranges the key operation step that at least one is associated; Wherein, described user identity judging unit 106 comprises in the situation of described key operation step in described at least one execution in step that realizes by described centralized control district, judges that described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, the user can specify some or a plurality of steps to realize in the centralized control district, " dial-out " or " transmission " operation such as final step, or any other steps in the traffic operation process, so that the user can arrange according to the operating habit etc. of self, be convenient to user's operation, and be conducive to promote the validity of authentication and the safe coefficient of privacy of user.
Fig. 2 shows the according to an embodiment of the invention process flow diagram of the verification method of user identity.
As shown in Figure 2, the verification method of user identity according to an embodiment of the invention comprises: step 202 arranges at least one centralized control district at the screen interface of terminal; Traffic operation when occuring in the described terminal, if at least one execution in step of described traffic operation is judged that then the active user is authorized user, otherwise is judged to be the disabled user by the realization of described centralized control district in step 204; Step 206, if described active user is the disabled user, then the destination object to described traffic operation sends information warning.
In this technical scheme, by integrated to the function of operation, the user need to not seek control button or control area at the diverse location of whole terminal interface, can carry out user friendly operating process in this centralized control district for all operations that can carry out of current interface or terminal.Particularly, can operating function or the already present functionality controls under the different interfaces of terminal be obtained, (be generally that the user commonly uses for the whole or specified portions in aforesaid operations function or the functionality controls so, can be pre-if the User Defined setting by manufacturer), can be by corresponding virtual key be set in the centralized control district, so that the user is when choosing these virtual keys, can realize original operating function equally, or when the user marks corresponding gesture track in the centralized control district after, also can realize original function.Because no matter current interface is standby interface or the function interface of certain application program, can demonstrate the centralized control district at terminal interface, and in the centralized control district, demonstrate virtual key or receive user's gesture track, thereby realize the control to current interface, needn't be owing to variation and the difference at interface, user's operation has been simplified in the selection of function button so that the user has to carry out at the diverse location of screen.The precalculated position here can be the default zone that system default or user arrange.The centralized control district here can be for single or multiple, can how much arranging or automatically regulating according to user's setting, current action required function.Need to prove that here " setting " do not represent and must show, as long as can user's touch-control order be received.
The traffic operation here refers to exist sending of signal of communication, and has the specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone is the called party, the destination object of note, mail etc. is the addressee, and the destination object of social network information is the social network-i i-platform (such as sending out status information etc.) that makes up of the webserver or the addressee in the social networks (such as for certain good friend's information-reply etc.).The user can arrange such as in the process of whole traffic operation, must exist at least an operation in the centralized control district, to finish, or whole operating process all must be finished in the centralized control district, especially when the centralized control district be not when residing on the screen interface of terminal, the disabled user is probably directly at the enterprising line operate of application interface so, thereby the identity that sticks one's chin out, be convenient to real authorized user (such as the owner) and destination object and go and find out what's going on, avoid causing further loss.
In technique scheme, preferably, described step 204 also comprises: if at least one described execution in step realizes by described centralized control district, and at least one described execution in step is to realize by communication interface corresponding to described traffic operation, judge that then described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, when the user can be set in traffic operation, must jointly carry out in conjunction with application interface and centralized control district, especially reside on the screen interface of terminal when the centralized control district, or after the application interface that enters traffic operation, in the situation of centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, described step 206 also comprises: judge whether described traffic operation is used for sending communication information, if, then described information warning is added in the described communication information, otherwise directly described information warning is sent to described destination object.
In this technical scheme, in the situations such as note, mail, social network information, can produce communication information, can receive short message content, Mail Contents or the social network information content etc. that can be used for showing such as destination object, therefore information warning directly can be added in the communication information.And in the situations such as conversation, then just send the signal of communication that is used for being connected to the other side, can not transmit the information content, therefore can send information warning by modes such as independent note, mails, and the destination object terminal can be resolved the content of the note that receives, mail etc., when parsing information warning, can directly show at call interface, with timely prompting user.
In technique scheme, preferably, also comprise: according to the operation setting order that receives, the operation of arousing to described centralized control district is set; And described step 204 also comprises: operate the operational motion that is complementary if detect with described arousing, then arouse described centralized control district in the current interface of described terminal.
In this technical scheme, owing to must operate in conjunction with the centralized control district, thereby can be by the arouse operation of User Defined to the centralized control district, thereby be conducive to promote privacy.
In technique scheme, preferably, before the described step 204, also comprise: according to the step that receives order is set, for the traffic operation in the described terminal arranges the key operation step that at least one is associated; And in described step 204, if comprise described key operation step in described at least one execution in step by the realization of described centralized control district, judge that then described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, the user can specify some or a plurality of steps to realize in the centralized control district, " dial-out " or " transmission " operation such as final step, or any other steps in the traffic operation process, so that the user can arrange according to the operating habit etc. of self, be convenient to user's operation, and be conducive to promote the validity of authentication and the safe coefficient of privacy of user.
Below in conjunction with Fig. 3 A to Fig. 3 C, take note and conversation as example, subscriber authentication in the traffic operation process and processing mode thereof are elaborated, and wherein, Fig. 3 A to Fig. 3 C shows the surface chart of according to an embodiment of the invention user identity being verified and being warned.
Suppose that the user sends note by terminal.As shown in Figure 3A, in the note transmission interface of terminal, centralized control district 302 is set, and sends the functionality controls 304A that the interface disposes originally based on note, the identical functionality controls 304B of configuration in centralized control district 302.
At first, centralized control district 302 is presented at note to send on the interface automatically, also can be aroused after user input instruction.Obviously, for the situation that needs the user manually to arouse, can arouse instruction by Extraordinary is set, such as specific gesture track etc., can guarantee to a certain extent that other people can't arouse centralized control district 302 authorized user (owner) itself except terminal.
Simultaneously, after if the 302 automatic appearance of centralized control district or quilt are aroused, the user can only operate control by functionality controls 304A, can only operate control by functionality controls 304B, also can binding function control 304A and functionality controls 304B operate together control.
Based on above 2 points, then the user can arrange the decision procedure of authentication, as at least one times the operation must be to finish by centralized control district 302, or all operations all must be finished by centralized control district 302, or in the process of a note transmission, must not only use functionality controls 304A but also used functionality controls 304B, or the given step in the step that note sends must be finished by centralized control district 302 (can be a step or a plurality of step, such as must click " transmission " in centralized control district 302) etc.
Can verify active user's identity by the way.If active user's identity by checking, then can be added some information warnings in the note that sends, thereby to the prompting of being correlated with of the destination object of communication.Specifically shown in Fig. 3 B, when the destination object of communication receives note, in short message content, added the information warning 306 of " doubtful disabled user ", to point out this destination object, avoided having dust thrown into the eyes.
Certainly, in the process for traffic operations such as making a phone call, because target terminal does not receive the content information of similar note etc., therefore, can by modes such as note, mails information warning be sent to target terminal separately.In a kind of situation, the user can by checking these notes, mail etc. in communication process or behind the end of conversation, go and find out what's going on; In the another kind of situation, target terminal can detect by the content to note or mail etc., when finding to include information warning, opens this note or mail in current interface immediately, or adopt the mode shown in Fig. 3 C, directly extract information warning 306 and be presented on the call interface.
Fig. 4 shows the process flow diagram of according to an embodiment of the invention user identity being verified.
As shown in Figure 4, the flow process of according to an embodiment of the invention user identity being verified comprises:
Step 402 when communicating operation, enters relevant traffic operation interface, and judges whether the user arouses the centralized control district, if arouse, then enters step 404, otherwise enters step 410.The authorized user of terminal can be by arranging the mode of arousing, thereby avoid the disabled user to arouse the centralized control district.
Step 406 judges whether the user carries out function control in the centralized control district.If then enter step 408, otherwise enter step 410.
Step 408 judges that the active user is authorized user, carries out corresponding control function, and does not send information warning.
Step 410 judges that the active user is the disabled user, carries out corresponding control function, and sends information warning.
Certainly, in the determining step of step 406, also can adopt other judgment mode, whether such as meeting: operation must be finished by the centralized control district at least one times, or all operations are all finished by the centralized control district, or not only used the functionality controls in the current interface but also used functionality controls in the centralized control district, or the step of the one or more appointments in whole operating process must finish by the centralized control district, judges thereby user identity made more accurately.
More than be described with reference to the accompanying drawings technical scheme of the present invention, consider in correlation technique, face recognition, fingerprint recognition or other people body characteristics recognition technology are still in the stage of improving, discrimination is not high, therefore, the invention provides the verification method of a kind of terminal and a kind of user identity, can effectively verify the current user identity that communicates operation, and at the destination object of not informing traffic operation by when checking, utilized by the lawless person afterwards to avoid user terminal to lose.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a terminal is characterized in that, comprising:
The region division unit is used at the screen interface of described terminal at least one centralized control district being set;
Whether the zone detecting unit is used for occuring in the situation of traffic operation in described terminal, detect to exist at least one execution in step to realize by described centralized control district in the described traffic operation;
The user identity judging unit is used for judging that the active user is authorized user, otherwise being judged to be the disabled user in the situation of testing result for existence of described regional detecting unit;
Information transmitting unit, being used for described active user is in disabled user's the situation, to the destination object transmission information warning of described traffic operation.
2. terminal according to claim 1 is characterized in that, also comprises:
The interface detecting unit is to realize by communication interface corresponding to described traffic operation for occur in the situation of traffic operation, detect whether have at least one execution in step in the described traffic operation in described terminal;
Wherein, described user identity judging unit is in the situation of existence in the testing result of described regional detecting unit and described interface detecting unit, judges that described active user is authorized user, otherwise is judged to be the disabled user.
3. terminal according to claim 1 is characterized in that, also comprises:
The communication type judging unit is used for judging whether described traffic operation is used for sending communication information;
Described information transmitting unit comprises:
Information is added subelement, and the judged result that is used at described communication type judging unit is in the situation that is, described information warning is added in the described communication information;
Send the control subelement, be used in the described communication type judging unit situation that the determination result is NO, directly described information warning being sent to described destination object.
4. each described terminal in 3 according to claim 1 is characterized in that, also comprises:
The operation setting unit is used for according to the operation setting order that receives the operation of arousing to described centralized control district being set;
The unit is aroused in the zone, be used for detect with described situation of arousing the operational motion that operation is complementary under, arouse described centralized control district in the current interface of described terminal.
5. each described terminal in 3 according to claim 1 is characterized in that, also comprises:
The step setting unit is used for according to the step that receives order being set, for the traffic operation in the described terminal arranges the key operation step that at least one is associated;
Wherein, described user identity judging unit comprises in the situation of described key operation step in described at least one execution in step that realizes by described centralized control district, judges that described active user is authorized user, otherwise be judged to be the disabled user.
6. the verification method of a user identity is characterized in that, comprising:
Step 202 arranges at least one centralized control district at the screen interface of terminal;
Traffic operation when occuring in the described terminal, if at least one execution in step of described traffic operation is judged that then the active user is authorized user, otherwise is judged to be the disabled user by the realization of described centralized control district in step 204;
Step 206, if described active user is the disabled user, then the destination object to described traffic operation sends information warning.
7. the verification method of user identity according to claim 6 is characterized in that, described step 204 also comprises:
If at least one described execution in step realizes by described centralized control district, and at least one described execution in step is to realize by communication interface corresponding to described traffic operation, judges that then described active user is authorized user, otherwise is judged to be the disabled user.
8. the verification method of user identity according to claim 6 is characterized in that, described step 206 also comprises:
Judge whether described traffic operation is used for sending communication information, if then described information warning is added in the described communication information, otherwise directly described information warning is sent to described destination object.
9. the verification method of each described user identity in 8 according to claim 6 is characterized in that, also comprises:
According to the operation setting order that receives, the operation of arousing to described centralized control district is set; And
Described step 204 also comprises:
If detect with described arousing and operate the operational motion that is complementary, then arouse described centralized control district in the current interface of described terminal.
10. the verification method of each described user identity in 8 according to claim 6 is characterized in that, before the described step 204, also comprises:
According to the step that receives order is set, for the traffic operation in the described terminal arranges the key operation step that at least one is associated; And
In described step 204, if comprise described key operation step in described at least one execution in step by the realization of described centralized control district, judge that then described active user is authorized user, otherwise be judged to be the disabled user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210555400.XA CN103020503B (en) | 2012-12-19 | 2012-12-19 | The verification method of terminal and user identity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210555400.XA CN103020503B (en) | 2012-12-19 | 2012-12-19 | The verification method of terminal and user identity |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103020503A true CN103020503A (en) | 2013-04-03 |
CN103020503B CN103020503B (en) | 2015-11-18 |
Family
ID=47969100
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210555400.XA Expired - Fee Related CN103020503B (en) | 2012-12-19 | 2012-12-19 | The verification method of terminal and user identity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103020503B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106331281A (en) * | 2016-08-11 | 2017-01-11 | 努比亚技术有限公司 | Mobile terminal and information processing method |
CN109816935A (en) * | 2019-03-18 | 2019-05-28 | 深圳市道格恒通科技有限公司 | A kind of anti-reminding method, device and smart phone indulged in |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001230858A (en) * | 2000-02-17 | 2001-08-24 | Mitsubishi Electric Corp | Mobile phone system and mobile phone |
US20050221799A1 (en) * | 2004-03-30 | 2005-10-06 | Tervo Timo P | Smart terminal remote lock and format |
CN1798196A (en) * | 2004-12-31 | 2006-07-05 | 乐金电子(中国)研究开发中心有限公司 | Out-calling restriction setup method of mobile communication terminal |
CN100337504C (en) * | 2004-09-24 | 2007-09-12 | 华为技术有限公司 | Intelligent alarming method of personal mobile terminal |
CN101330692A (en) * | 2008-07-29 | 2008-12-24 | Tcl天一移动通信(深圳)有限公司 | Mobile phone with lose-proof function and method for preventing mobile phone from losing |
CN100502599C (en) * | 2003-10-10 | 2009-06-17 | 高延飞 | Security management method for mobile phone |
CN101707642A (en) * | 2009-09-30 | 2010-05-12 | 宇龙计算机通信科技(深圳)有限公司 | Intelligent antitheft method, terminal and system |
CN102375949A (en) * | 2010-08-18 | 2012-03-14 | Lg电子株式会社 | Mobile terminal and method for controlling method thereof |
-
2012
- 2012-12-19 CN CN201210555400.XA patent/CN103020503B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001230858A (en) * | 2000-02-17 | 2001-08-24 | Mitsubishi Electric Corp | Mobile phone system and mobile phone |
CN100502599C (en) * | 2003-10-10 | 2009-06-17 | 高延飞 | Security management method for mobile phone |
US20050221799A1 (en) * | 2004-03-30 | 2005-10-06 | Tervo Timo P | Smart terminal remote lock and format |
CN100337504C (en) * | 2004-09-24 | 2007-09-12 | 华为技术有限公司 | Intelligent alarming method of personal mobile terminal |
CN1798196A (en) * | 2004-12-31 | 2006-07-05 | 乐金电子(中国)研究开发中心有限公司 | Out-calling restriction setup method of mobile communication terminal |
CN101330692A (en) * | 2008-07-29 | 2008-12-24 | Tcl天一移动通信(深圳)有限公司 | Mobile phone with lose-proof function and method for preventing mobile phone from losing |
CN101707642A (en) * | 2009-09-30 | 2010-05-12 | 宇龙计算机通信科技(深圳)有限公司 | Intelligent antitheft method, terminal and system |
CN102375949A (en) * | 2010-08-18 | 2012-03-14 | Lg电子株式会社 | Mobile terminal and method for controlling method thereof |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106331281A (en) * | 2016-08-11 | 2017-01-11 | 努比亚技术有限公司 | Mobile terminal and information processing method |
CN109816935A (en) * | 2019-03-18 | 2019-05-28 | 深圳市道格恒通科技有限公司 | A kind of anti-reminding method, device and smart phone indulged in |
Also Published As
Publication number | Publication date |
---|---|
CN103020503B (en) | 2015-11-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105631275B (en) | information display method, information display device and terminal | |
CN102780813A (en) | Mobile terminal-based alarm method and system | |
CN102831682B (en) | System and method for remotely opening door based on mobile phone short message | |
CN104537291A (en) | Screen interface unlocking method and screen interface unlocking device | |
CN105120122A (en) | Alarm method and device | |
CN105722090A (en) | Control method and device for automatically identifying pseudo base station | |
JPWO2005069675A1 (en) | Telephone countermeasure device and telephone countermeasure method when using telephone while driving | |
CN105844744A (en) | Password authentication method and password lock | |
CN105573623A (en) | Help seeking method based on fingerprint identification | |
CN204168365U (en) | Mobile phone and car machine communication connecting system | |
CN105513179A (en) | Unlocking method and device, as well as intelligent lock | |
CN108475504A (en) | Communication device | |
CN105681154A (en) | Method and device for sending message in instant messaging software | |
CN104700050A (en) | Mobile terminal safety positioning method and device | |
CN104506711A (en) | Communication information processing method and device for terminal | |
CN107396328B (en) | Calling method of terminal and related equipment | |
US9866665B2 (en) | Method for operating a communication system, and communication system | |
CN104573463A (en) | System switching method, system switching device and terminal | |
CN103079009A (en) | Anti-theft method for mobile phone and anti-theft mobile phone | |
CN106231534A (en) | Mobile terminal and the number of writing thereof and method of disannuling a call, device | |
CN104168361A (en) | Communication method, communication device, server and communication system | |
CN104407708A (en) | Notice prompting method, notice prompting device, terminal and notice prompting system | |
CN103020503B (en) | The verification method of terminal and user identity | |
CN108702422B (en) | Incoming call management method and device for one number and multiple terminals, managed equipment and server | |
CN102300000A (en) | Friendly hinting method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20151118 Termination date: 20211219 |