CN103020503A - Terminal and user identity authentication method - Google Patents

Terminal and user identity authentication method Download PDF

Info

Publication number
CN103020503A
CN103020503A CN201210555400XA CN201210555400A CN103020503A CN 103020503 A CN103020503 A CN 103020503A CN 201210555400X A CN201210555400X A CN 201210555400XA CN 201210555400 A CN201210555400 A CN 201210555400A CN 103020503 A CN103020503 A CN 103020503A
Authority
CN
China
Prior art keywords
user
terminal
centralized control
control district
traffic operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210555400XA
Other languages
Chinese (zh)
Other versions
CN103020503B (en
Inventor
杨丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201210555400.XA priority Critical patent/CN103020503B/en
Publication of CN103020503A publication Critical patent/CN103020503A/en
Application granted granted Critical
Publication of CN103020503B publication Critical patent/CN103020503B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a terminal. The terminal comprises a region setting unit, a region detecting unit, a user identity judgment unit and an information transmitting unit, wherein the region setting unit is used for setting at least one centralized control region on a screen interface of the terminal; the region detection unit is used for detecting whether at least one execution step realized through the centralized control region exists in communication operation when the communication operation is performed in the terminal; the user identity judgment unit is used for judging a current user to be an authorized user when a detection result of the region detection unit exists, and otherwise, judging the current user to be an illegal user; and the information transmitting unit is used for transmitting alarm information to a target object of the communication operation when the current user is the illegal user. The invention also provides a user identity authentication method. Through the technical scheme provided by the invention, the identity of a user who performs the communication operation currently can be authorized effectively; the target object of the communication operation is informed when the identity of the user does not pass the authorization; and therefore, the terminal is prevented from being utilized by the illegal user after the user terminal is lost.

Description

The verification method of terminal and user identity
Technical field
The present invention relates to identity identification technical field, in particular to the verification method of a kind of terminal and a kind of user identity.
Background technology
After user's mobile phone was picked up by the lawless person or obtains by improper means, the lawless person may carry out communication with the contact person that stores in the mobile phone, may therefore cause mobile phone owner or contact person's privacy to reveal or damage to property etc.
In correlation technique, can pass through face recognition, fingerprint recognition or other people body characteristics recognition technology and detect current whether owner, but the technology such as the face recognition of terminal, fingerprint recognition to be still in the stage of improving at present, discrimination is not high.
Therefore, need a kind of verification method of New Consumers identity, can effectively verify the current user identity that communicates operation, and not by checking the time, inform the destination object of traffic operation, utilized by the lawless person afterwards to avoid user terminal to lose.
Summary of the invention
The present invention just is being based on the problems referred to above, a kind of verification method of New Consumers identity has been proposed, can effectively verify the current user identity that communicates operation, and at the destination object of not informing traffic operation by when checking, be utilized by the lawless person afterwards to avoid user terminal to lose.
In view of this, the present invention proposes a kind of terminal, comprising: the region division unit is used at the screen interface of described terminal at least one centralized control district being set; Whether the zone detecting unit is used for occuring in the situation of traffic operation in described terminal, detect to exist at least one execution in step to realize by described centralized control district in the described traffic operation; The user identity judging unit is used for judging that the active user is authorized user, otherwise being judged to be the disabled user in the situation of testing result for existence of described regional detecting unit; Information transmitting unit, being used for described active user is in disabled user's the situation, to the destination object transmission information warning of described traffic operation.
In this technical scheme, by integrated to the function of operation, the user need to not seek control button or control area at the diverse location of whole terminal interface, can carry out user friendly operating process in this centralized control district for all operations that can carry out of current interface or terminal.Particularly, can operating function or the already present functionality controls under the different interfaces of terminal be obtained, (be generally that the user commonly uses for the whole or specified portions in aforesaid operations function or the functionality controls so, can be pre-if the User Defined setting by manufacturer), can be by corresponding virtual key be set in the centralized control district, so that the user is when choosing these virtual keys, can realize original operating function equally, or when the user marks corresponding gesture track in the centralized control district after, also can realize original function.Because no matter current interface is standby interface or the function interface of certain application program, can demonstrate the centralized control district at terminal interface, and in the centralized control district, demonstrate virtual key or receive user's gesture track, thereby realize the control to current interface, needn't be owing to variation and the difference at interface, user's operation has been simplified in the selection of function button so that the user has to carry out at the diverse location of screen.The precalculated position here can be the default zone that system default or user arrange.The centralized control district here can be for single or multiple, can how much arranging or automatically regulating according to user's setting, current action required function.Need to prove that here " setting " do not represent and must show, as long as can user's touch-control order be received.
The traffic operation here refers to exist sending of signal of communication, and has the specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone is the called party, the destination object of note, mail etc. is the addressee, and the destination object of social network information is the social network-i i-platform (such as sending out status information etc.) that makes up of the webserver or the addressee in the social networks (such as for certain good friend's information-reply etc.).The user can arrange such as in the process of whole traffic operation, must exist at least an operation in the centralized control district, to finish, or whole operating process all must be finished in the centralized control district, especially when the centralized control district be not when residing on the screen interface of terminal, the disabled user is probably directly at the enterprising line operate of application interface so, thereby the identity that sticks one's chin out, be convenient to real authorized user (such as the owner) and destination object and go and find out what's going on, avoid causing further loss.
In technique scheme, preferably, also comprise: the interface detecting unit is to realize by communication interface corresponding to described traffic operation for occur in the situation of traffic operation, detect whether have at least one execution in step in the described traffic operation in described terminal; Wherein, described user identity judging unit is in the situation of existence in the testing result of described regional detecting unit and described interface detecting unit, judges that described active user is authorized user, otherwise is judged to be the disabled user.
In this technical scheme, when the user can be set in traffic operation, must jointly carry out in conjunction with application interface and centralized control district, especially reside on the screen interface of terminal when the centralized control district, or after the application interface that enters traffic operation, in the situation of centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, also comprise: the communication type judging unit is used for judging whether described traffic operation is used for sending communication information; Described information transmitting unit comprises: information is added subelement, and the judged result that is used at described communication type judging unit is in the situation that is, described information warning is added in the described communication information; Send the control subelement, be used in the described communication type judging unit situation that the determination result is NO, directly described information warning being sent to described destination object.
In this technical scheme, in the situations such as note, mail, social network information, can produce communication information, can receive short message content, Mail Contents or the social network information content etc. that can be used for showing such as destination object, therefore information warning directly can be added in the communication information.And in the situations such as conversation, then just send the signal of communication that is used for being connected to the other side, can not transmit the information content, therefore can send information warning by modes such as independent note, mails, and the destination object terminal can be resolved the content of the note that receives, mail etc., when parsing information warning, can directly show at call interface, with timely prompting user.
In technique scheme, preferably, also comprise: the operation setting unit is used for according to the operation setting order that receives the operation of arousing to described centralized control district being set; The unit is aroused in the zone, be used for detect with described situation of arousing the operational motion that operation is complementary under, arouse described centralized control district in the current interface of described terminal.
In this technical scheme, owing to must operate in conjunction with the centralized control district, thereby can be by the arouse operation of User Defined to the centralized control district, thereby be conducive to promote privacy.
In technique scheme, preferably, also comprise: the step setting unit is used for according to the step that receives order being set, for the traffic operation in the described terminal arranges the key operation step that at least one is associated; Wherein, described user identity judging unit comprises in the situation of described key operation step in described at least one execution in step that realizes by described centralized control district, judges that described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, the user can specify some or a plurality of steps to realize in the centralized control district, " dial-out " or " transmission " operation such as final step, or any other steps in the traffic operation process, so that the user can arrange according to the operating habit etc. of self, be convenient to user's operation, and be conducive to promote the validity of authentication and the safe coefficient of privacy of user.
According to another aspect of the invention, also proposed a kind of verification method of user identity, having comprised: step 202 arranges at least one centralized control district at the screen interface of terminal; Traffic operation when occuring in the described terminal, if at least one execution in step of described traffic operation is judged that then the active user is authorized user, otherwise is judged to be the disabled user by the realization of described centralized control district in step 204; Step 206, if described active user is the disabled user, then the destination object to described traffic operation sends information warning.
In this technical scheme, by integrated to the function of operation, the user need to not seek control button or control area at the diverse location of whole terminal interface, can carry out user friendly operating process in this centralized control district for all operations that can carry out of current interface or terminal.Particularly, can operating function or the already present functionality controls under the different interfaces of terminal be obtained, (be generally that the user commonly uses for the whole or specified portions in aforesaid operations function or the functionality controls so, can be pre-if the User Defined setting by manufacturer), can be by corresponding virtual key be set in the centralized control district, so that the user is when choosing these virtual keys, can realize original operating function equally, or when the user marks corresponding gesture track in the centralized control district after, also can realize original function.Because no matter current interface is standby interface or the function interface of certain application program, can demonstrate the centralized control district at terminal interface, and in the centralized control district, demonstrate virtual key or receive user's gesture track, thereby realize the control to current interface, needn't be owing to variation and the difference at interface, user's operation has been simplified in the selection of function button so that the user has to carry out at the diverse location of screen.The precalculated position here can be the default zone that system default or user arrange.The centralized control district here can be for single or multiple, can how much arranging or automatically regulating according to user's setting, current action required function.Need to prove that here " setting " do not represent and must show, as long as can user's touch-control order be received.
The traffic operation here refers to exist sending of signal of communication, and has the specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone is the called party, the destination object of note, mail etc. is the addressee, and the destination object of social network information is the social network-i i-platform (such as sending out status information etc.) that makes up of the webserver or the addressee in the social networks (such as for certain good friend's information-reply etc.).The user can arrange such as in the process of whole traffic operation, must exist at least an operation in the centralized control district, to finish, or whole operating process all must be finished in the centralized control district, especially when the centralized control district be not when residing on the screen interface of terminal, the disabled user is probably directly at the enterprising line operate of application interface so, thereby the identity that sticks one's chin out, be convenient to real authorized user (such as the owner) and destination object and go and find out what's going on, avoid causing further loss.
In technique scheme, preferably, described step 204 also comprises: if at least one described execution in step realizes by described centralized control district, and at least one described execution in step is to realize by communication interface corresponding to described traffic operation, judge that then described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, when the user can be set in traffic operation, must jointly carry out in conjunction with application interface and centralized control district, especially reside on the screen interface of terminal when the centralized control district, or after the application interface that enters traffic operation, in the situation of centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, described step 206 also comprises: judge whether described traffic operation is used for sending communication information, if, then described information warning is added in the described communication information, otherwise directly described information warning is sent to described destination object.
In this technical scheme, in the situations such as note, mail, social network information, can produce communication information, can receive short message content, Mail Contents or the social network information content etc. that can be used for showing such as destination object, therefore information warning directly can be added in the communication information.And in the situations such as conversation, then just send the signal of communication that is used for being connected to the other side, can not transmit the information content, therefore can send information warning by modes such as independent note, mails, and the destination object terminal can be resolved the content of the note that receives, mail etc., when parsing information warning, can directly show at call interface, with timely prompting user.
In technique scheme, preferably, also comprise: according to the operation setting order that receives, the operation of arousing to described centralized control district is set; And described step 204 also comprises: operate the operational motion that is complementary if detect with described arousing, then arouse described centralized control district in the current interface of described terminal.
In this technical scheme, owing to must operate in conjunction with the centralized control district, thereby can be by the arouse operation of User Defined to the centralized control district, thereby be conducive to promote privacy.
In technique scheme, preferably, before the described step 204, also comprise: according to the step that receives order is set, for the traffic operation in the described terminal arranges the key operation step that at least one is associated; And in described step 204, if comprise described key operation step in described at least one execution in step by the realization of described centralized control district, judge that then described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, the user can specify some or a plurality of steps to realize in the centralized control district, " dial-out " or " transmission " operation such as final step, or any other steps in the traffic operation process, so that the user can arrange according to the operating habit etc. of self, be convenient to user's operation, and be conducive to promote the validity of authentication and the safe coefficient of privacy of user.
By above technical scheme, can effectively verify the current user identity that communicates operation, and at the destination object of not informing traffic operation by when checking, utilized by the lawless person afterwards to avoid user terminal to lose.
Description of drawings
Fig. 1 shows the according to an embodiment of the invention block diagram of terminal;
Fig. 2 shows the according to an embodiment of the invention process flow diagram of the verification method of user identity;
Fig. 3 A to Fig. 3 C shows the surface chart of according to an embodiment of the invention user identity being verified and being warned;
Fig. 4 shows the process flow diagram of according to an embodiment of the invention user identity being verified.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments the present invention is further described in detail.Need to prove that in the situation of not conflicting, the application's embodiment and the feature among the embodiment can make up mutually.
A lot of details have been set forth in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not subjected to the restriction of following public specific embodiment.
Fig. 1 shows the according to an embodiment of the invention block diagram of terminal.
As shown in Figure 1, terminal 100 according to an embodiment of the invention, comprising: region division unit 102 is used at the screen interface of described terminal 100 at least one centralized control district being set; Whether zone detecting unit 104 is used for occuring in the situation of traffic operation in described terminal 100, detect to exist at least one execution in step to realize by described centralized control district in the described traffic operation; User identity judging unit 106 is used for judging that the active user is authorized user, otherwise being judged to be the disabled user in the situation of testing result for existence of described regional detecting unit 104; Information transmitting unit 108, being used for described active user is in disabled user's the situation, to the destination object transmission information warning of described traffic operation.
In this technical scheme, by integrated to the function of operation, the user need to not seek control button or control area at the diverse location of whole terminal interface, all operations that can carry out for current interface or terminal 100 can be carried out user friendly operating process in this centralized control district.Particularly, can operating function or the already present functionality controls under the terminal 100 different interfaces be obtained, (be generally that the user commonly uses for the whole or specified portions in aforesaid operations function or the functionality controls so, can be pre-if the User Defined setting by manufacturer), can be by corresponding virtual key be set in the centralized control district, so that the user is when choosing these virtual keys, can realize original operating function equally, or when the user marks corresponding gesture track in the centralized control district after, also can realize original function.Because no matter current interface is standby interface or the function interface of certain application program, can demonstrate the centralized control district at terminal interface, and in the centralized control district, demonstrate virtual key or receive user's gesture track, thereby realize the control to current interface, needn't be owing to variation and the difference at interface, user's operation has been simplified in the selection of function button so that the user has to carry out at the diverse location of screen.The precalculated position here can be the default zone that system default or user arrange.The centralized control district here can be for single or multiple, can how much arranging or automatically regulating according to user's setting, current action required function.Need to prove that here " setting " do not represent and must show, as long as can user's touch-control order be received.
The traffic operation here refers to exist sending of signal of communication, and has the specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone is the called party, the destination object of note, mail etc. is the addressee, and the destination object of social network information is the social network-i i-platform (such as sending out status information etc.) that makes up of the webserver or the addressee in the social networks (such as for certain good friend's information-reply etc.).The user can arrange such as in the process of whole traffic operation, must exist at least an operation in the centralized control district, to finish, or whole operating process all must be finished in the centralized control district, especially when the centralized control district be not when residing on the screen interface of terminal 100, the disabled user is probably directly at the enterprising line operate of application interface so, thereby the identity that sticks one's chin out, be convenient to real authorized user (such as the owner) and destination object and go and find out what's going on, avoid causing further loss.
In technique scheme, preferably, also comprise: interface detecting unit 110 is to realize by communication interface corresponding to described traffic operation for occur in the situation of traffic operations, detect whether have at least one execution in step in the described traffic operation in described terminal 100; Wherein, described user identity judging unit 106 is in the situation of existence in the testing result of described regional detecting unit 104 and described interface detecting unit 110, judges that described active user is authorized user, otherwise is judged to be the disabled user.
In this technical scheme, when the user can be set in traffic operation, must jointly carry out in conjunction with application interface and centralized control district, especially reside on the screen interface of terminal when the centralized control district, or after the application interface that enters traffic operation, in the situation of centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, also comprise: communication type judging unit 112 is used for judging whether described traffic operation is used for sending communication information; Described information transmitting unit 108 comprises: information is added subelement 1082, and the judged result that is used at described communication type judging unit 112 is in the situation that is, described information warning is added in the described communication information; Send control subelement 1084, be used in described communication type judging unit 112 situation that the determination result is NO, directly described information warning being sent to described destination object.
In this technical scheme, in the situations such as note, mail, social network information, can produce communication information, can receive short message content, Mail Contents or the social network information content etc. that can be used for showing such as destination object, therefore information warning directly can be added in the communication information.And in the situations such as conversation, then just send the signal of communication that is used for being connected to the other side, can not transmit the information content, therefore can send information warning by modes such as independent note, mails, and the destination object terminal can be resolved the content of the note that receives, mail etc., when parsing information warning, can directly show at call interface, with timely prompting user.
In technique scheme, preferably, also comprise: operation setting unit 114 is used for according to the operation setting order that receives the operation of arousing to described centralized control district being set; Unit 116 is aroused in the zone, be used for detect with described situation of arousing the operational motion that operation is complementary under, arouse described centralized control district in the current interface of described terminal 100.
In this technical scheme, owing to must operate in conjunction with the centralized control district, thereby can be by the arouse operation of User Defined to the centralized control district, thereby be conducive to promote privacy.
In technique scheme, preferably, also comprise: step setting unit 118 is used for according to the step that receives order being set, for the traffic operation in the described terminal 100 arranges the key operation step that at least one is associated; Wherein, described user identity judging unit 106 comprises in the situation of described key operation step in described at least one execution in step that realizes by described centralized control district, judges that described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, the user can specify some or a plurality of steps to realize in the centralized control district, " dial-out " or " transmission " operation such as final step, or any other steps in the traffic operation process, so that the user can arrange according to the operating habit etc. of self, be convenient to user's operation, and be conducive to promote the validity of authentication and the safe coefficient of privacy of user.
Fig. 2 shows the according to an embodiment of the invention process flow diagram of the verification method of user identity.
As shown in Figure 2, the verification method of user identity according to an embodiment of the invention comprises: step 202 arranges at least one centralized control district at the screen interface of terminal; Traffic operation when occuring in the described terminal, if at least one execution in step of described traffic operation is judged that then the active user is authorized user, otherwise is judged to be the disabled user by the realization of described centralized control district in step 204; Step 206, if described active user is the disabled user, then the destination object to described traffic operation sends information warning.
In this technical scheme, by integrated to the function of operation, the user need to not seek control button or control area at the diverse location of whole terminal interface, can carry out user friendly operating process in this centralized control district for all operations that can carry out of current interface or terminal.Particularly, can operating function or the already present functionality controls under the different interfaces of terminal be obtained, (be generally that the user commonly uses for the whole or specified portions in aforesaid operations function or the functionality controls so, can be pre-if the User Defined setting by manufacturer), can be by corresponding virtual key be set in the centralized control district, so that the user is when choosing these virtual keys, can realize original operating function equally, or when the user marks corresponding gesture track in the centralized control district after, also can realize original function.Because no matter current interface is standby interface or the function interface of certain application program, can demonstrate the centralized control district at terminal interface, and in the centralized control district, demonstrate virtual key or receive user's gesture track, thereby realize the control to current interface, needn't be owing to variation and the difference at interface, user's operation has been simplified in the selection of function button so that the user has to carry out at the diverse location of screen.The precalculated position here can be the default zone that system default or user arrange.The centralized control district here can be for single or multiple, can how much arranging or automatically regulating according to user's setting, current action required function.Need to prove that here " setting " do not represent and must show, as long as can user's touch-control order be received.
The traffic operation here refers to exist sending of signal of communication, and has the specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone is the called party, the destination object of note, mail etc. is the addressee, and the destination object of social network information is the social network-i i-platform (such as sending out status information etc.) that makes up of the webserver or the addressee in the social networks (such as for certain good friend's information-reply etc.).The user can arrange such as in the process of whole traffic operation, must exist at least an operation in the centralized control district, to finish, or whole operating process all must be finished in the centralized control district, especially when the centralized control district be not when residing on the screen interface of terminal, the disabled user is probably directly at the enterprising line operate of application interface so, thereby the identity that sticks one's chin out, be convenient to real authorized user (such as the owner) and destination object and go and find out what's going on, avoid causing further loss.
In technique scheme, preferably, described step 204 also comprises: if at least one described execution in step realizes by described centralized control district, and at least one described execution in step is to realize by communication interface corresponding to described traffic operation, judge that then described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, when the user can be set in traffic operation, must jointly carry out in conjunction with application interface and centralized control district, especially reside on the screen interface of terminal when the centralized control district, or after the application interface that enters traffic operation, in the situation of centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, described step 206 also comprises: judge whether described traffic operation is used for sending communication information, if, then described information warning is added in the described communication information, otherwise directly described information warning is sent to described destination object.
In this technical scheme, in the situations such as note, mail, social network information, can produce communication information, can receive short message content, Mail Contents or the social network information content etc. that can be used for showing such as destination object, therefore information warning directly can be added in the communication information.And in the situations such as conversation, then just send the signal of communication that is used for being connected to the other side, can not transmit the information content, therefore can send information warning by modes such as independent note, mails, and the destination object terminal can be resolved the content of the note that receives, mail etc., when parsing information warning, can directly show at call interface, with timely prompting user.
In technique scheme, preferably, also comprise: according to the operation setting order that receives, the operation of arousing to described centralized control district is set; And described step 204 also comprises: operate the operational motion that is complementary if detect with described arousing, then arouse described centralized control district in the current interface of described terminal.
In this technical scheme, owing to must operate in conjunction with the centralized control district, thereby can be by the arouse operation of User Defined to the centralized control district, thereby be conducive to promote privacy.
In technique scheme, preferably, before the described step 204, also comprise: according to the step that receives order is set, for the traffic operation in the described terminal arranges the key operation step that at least one is associated; And in described step 204, if comprise described key operation step in described at least one execution in step by the realization of described centralized control district, judge that then described active user is authorized user, otherwise be judged to be the disabled user.
In this technical scheme, the user can specify some or a plurality of steps to realize in the centralized control district, " dial-out " or " transmission " operation such as final step, or any other steps in the traffic operation process, so that the user can arrange according to the operating habit etc. of self, be convenient to user's operation, and be conducive to promote the validity of authentication and the safe coefficient of privacy of user.
Below in conjunction with Fig. 3 A to Fig. 3 C, take note and conversation as example, subscriber authentication in the traffic operation process and processing mode thereof are elaborated, and wherein, Fig. 3 A to Fig. 3 C shows the surface chart of according to an embodiment of the invention user identity being verified and being warned.
Suppose that the user sends note by terminal.As shown in Figure 3A, in the note transmission interface of terminal, centralized control district 302 is set, and sends the functionality controls 304A that the interface disposes originally based on note, the identical functionality controls 304B of configuration in centralized control district 302.
At first, centralized control district 302 is presented at note to send on the interface automatically, also can be aroused after user input instruction.Obviously, for the situation that needs the user manually to arouse, can arouse instruction by Extraordinary is set, such as specific gesture track etc., can guarantee to a certain extent that other people can't arouse centralized control district 302 authorized user (owner) itself except terminal.
Simultaneously, after if the 302 automatic appearance of centralized control district or quilt are aroused, the user can only operate control by functionality controls 304A, can only operate control by functionality controls 304B, also can binding function control 304A and functionality controls 304B operate together control.
Based on above 2 points, then the user can arrange the decision procedure of authentication, as at least one times the operation must be to finish by centralized control district 302, or all operations all must be finished by centralized control district 302, or in the process of a note transmission, must not only use functionality controls 304A but also used functionality controls 304B, or the given step in the step that note sends must be finished by centralized control district 302 (can be a step or a plurality of step, such as must click " transmission " in centralized control district 302) etc.
Can verify active user's identity by the way.If active user's identity by checking, then can be added some information warnings in the note that sends, thereby to the prompting of being correlated with of the destination object of communication.Specifically shown in Fig. 3 B, when the destination object of communication receives note, in short message content, added the information warning 306 of " doubtful disabled user ", to point out this destination object, avoided having dust thrown into the eyes.
Certainly, in the process for traffic operations such as making a phone call, because target terminal does not receive the content information of similar note etc., therefore, can by modes such as note, mails information warning be sent to target terminal separately.In a kind of situation, the user can by checking these notes, mail etc. in communication process or behind the end of conversation, go and find out what's going on; In the another kind of situation, target terminal can detect by the content to note or mail etc., when finding to include information warning, opens this note or mail in current interface immediately, or adopt the mode shown in Fig. 3 C, directly extract information warning 306 and be presented on the call interface.
Fig. 4 shows the process flow diagram of according to an embodiment of the invention user identity being verified.
As shown in Figure 4, the flow process of according to an embodiment of the invention user identity being verified comprises:
Step 402 when communicating operation, enters relevant traffic operation interface, and judges whether the user arouses the centralized control district, if arouse, then enters step 404, otherwise enters step 410.The authorized user of terminal can be by arranging the mode of arousing, thereby avoid the disabled user to arouse the centralized control district.
Step 404, situation according to current interface, in the centralized control district, show the functionality controls that is complementary with it, such as sending in the interface in note, the functionality controls such as " transmission ", " interpolation annex " are set, in contact person interface, the functionality controls such as " sending short messages ", " dialing ", " editor " are set.
Step 406 judges whether the user carries out function control in the centralized control district.If then enter step 408, otherwise enter step 410.
Step 408 judges that the active user is authorized user, carries out corresponding control function, and does not send information warning.
Step 410 judges that the active user is the disabled user, carries out corresponding control function, and sends information warning.
Certainly, in the determining step of step 406, also can adopt other judgment mode, whether such as meeting: operation must be finished by the centralized control district at least one times, or all operations are all finished by the centralized control district, or not only used the functionality controls in the current interface but also used functionality controls in the centralized control district, or the step of the one or more appointments in whole operating process must finish by the centralized control district, judges thereby user identity made more accurately.
More than be described with reference to the accompanying drawings technical scheme of the present invention, consider in correlation technique, face recognition, fingerprint recognition or other people body characteristics recognition technology are still in the stage of improving, discrimination is not high, therefore, the invention provides the verification method of a kind of terminal and a kind of user identity, can effectively verify the current user identity that communicates operation, and at the destination object of not informing traffic operation by when checking, utilized by the lawless person afterwards to avoid user terminal to lose.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a terminal is characterized in that, comprising:
The region division unit is used at the screen interface of described terminal at least one centralized control district being set;
Whether the zone detecting unit is used for occuring in the situation of traffic operation in described terminal, detect to exist at least one execution in step to realize by described centralized control district in the described traffic operation;
The user identity judging unit is used for judging that the active user is authorized user, otherwise being judged to be the disabled user in the situation of testing result for existence of described regional detecting unit;
Information transmitting unit, being used for described active user is in disabled user's the situation, to the destination object transmission information warning of described traffic operation.
2. terminal according to claim 1 is characterized in that, also comprises:
The interface detecting unit is to realize by communication interface corresponding to described traffic operation for occur in the situation of traffic operation, detect whether have at least one execution in step in the described traffic operation in described terminal;
Wherein, described user identity judging unit is in the situation of existence in the testing result of described regional detecting unit and described interface detecting unit, judges that described active user is authorized user, otherwise is judged to be the disabled user.
3. terminal according to claim 1 is characterized in that, also comprises:
The communication type judging unit is used for judging whether described traffic operation is used for sending communication information;
Described information transmitting unit comprises:
Information is added subelement, and the judged result that is used at described communication type judging unit is in the situation that is, described information warning is added in the described communication information;
Send the control subelement, be used in the described communication type judging unit situation that the determination result is NO, directly described information warning being sent to described destination object.
4. each described terminal in 3 according to claim 1 is characterized in that, also comprises:
The operation setting unit is used for according to the operation setting order that receives the operation of arousing to described centralized control district being set;
The unit is aroused in the zone, be used for detect with described situation of arousing the operational motion that operation is complementary under, arouse described centralized control district in the current interface of described terminal.
5. each described terminal in 3 according to claim 1 is characterized in that, also comprises:
The step setting unit is used for according to the step that receives order being set, for the traffic operation in the described terminal arranges the key operation step that at least one is associated;
Wherein, described user identity judging unit comprises in the situation of described key operation step in described at least one execution in step that realizes by described centralized control district, judges that described active user is authorized user, otherwise be judged to be the disabled user.
6. the verification method of a user identity is characterized in that, comprising:
Step 202 arranges at least one centralized control district at the screen interface of terminal;
Traffic operation when occuring in the described terminal, if at least one execution in step of described traffic operation is judged that then the active user is authorized user, otherwise is judged to be the disabled user by the realization of described centralized control district in step 204;
Step 206, if described active user is the disabled user, then the destination object to described traffic operation sends information warning.
7. the verification method of user identity according to claim 6 is characterized in that, described step 204 also comprises:
If at least one described execution in step realizes by described centralized control district, and at least one described execution in step is to realize by communication interface corresponding to described traffic operation, judges that then described active user is authorized user, otherwise is judged to be the disabled user.
8. the verification method of user identity according to claim 6 is characterized in that, described step 206 also comprises:
Judge whether described traffic operation is used for sending communication information, if then described information warning is added in the described communication information, otherwise directly described information warning is sent to described destination object.
9. the verification method of each described user identity in 8 according to claim 6 is characterized in that, also comprises:
According to the operation setting order that receives, the operation of arousing to described centralized control district is set; And
Described step 204 also comprises:
If detect with described arousing and operate the operational motion that is complementary, then arouse described centralized control district in the current interface of described terminal.
10. the verification method of each described user identity in 8 according to claim 6 is characterized in that, before the described step 204, also comprises:
According to the step that receives order is set, for the traffic operation in the described terminal arranges the key operation step that at least one is associated; And
In described step 204, if comprise described key operation step in described at least one execution in step by the realization of described centralized control district, judge that then described active user is authorized user, otherwise be judged to be the disabled user.
CN201210555400.XA 2012-12-19 2012-12-19 The verification method of terminal and user identity Expired - Fee Related CN103020503B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210555400.XA CN103020503B (en) 2012-12-19 2012-12-19 The verification method of terminal and user identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210555400.XA CN103020503B (en) 2012-12-19 2012-12-19 The verification method of terminal and user identity

Publications (2)

Publication Number Publication Date
CN103020503A true CN103020503A (en) 2013-04-03
CN103020503B CN103020503B (en) 2015-11-18

Family

ID=47969100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210555400.XA Expired - Fee Related CN103020503B (en) 2012-12-19 2012-12-19 The verification method of terminal and user identity

Country Status (1)

Country Link
CN (1) CN103020503B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331281A (en) * 2016-08-11 2017-01-11 努比亚技术有限公司 Mobile terminal and information processing method
CN109816935A (en) * 2019-03-18 2019-05-28 深圳市道格恒通科技有限公司 A kind of anti-reminding method, device and smart phone indulged in

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001230858A (en) * 2000-02-17 2001-08-24 Mitsubishi Electric Corp Mobile phone system and mobile phone
US20050221799A1 (en) * 2004-03-30 2005-10-06 Tervo Timo P Smart terminal remote lock and format
CN1798196A (en) * 2004-12-31 2006-07-05 乐金电子(中国)研究开发中心有限公司 Out-calling restriction setup method of mobile communication terminal
CN100337504C (en) * 2004-09-24 2007-09-12 华为技术有限公司 Intelligent alarming method of personal mobile terminal
CN101330692A (en) * 2008-07-29 2008-12-24 Tcl天一移动通信(深圳)有限公司 Mobile phone with lose-proof function and method for preventing mobile phone from losing
CN100502599C (en) * 2003-10-10 2009-06-17 高延飞 Security management method for mobile phone
CN101707642A (en) * 2009-09-30 2010-05-12 宇龙计算机通信科技(深圳)有限公司 Intelligent antitheft method, terminal and system
CN102375949A (en) * 2010-08-18 2012-03-14 Lg电子株式会社 Mobile terminal and method for controlling method thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001230858A (en) * 2000-02-17 2001-08-24 Mitsubishi Electric Corp Mobile phone system and mobile phone
CN100502599C (en) * 2003-10-10 2009-06-17 高延飞 Security management method for mobile phone
US20050221799A1 (en) * 2004-03-30 2005-10-06 Tervo Timo P Smart terminal remote lock and format
CN100337504C (en) * 2004-09-24 2007-09-12 华为技术有限公司 Intelligent alarming method of personal mobile terminal
CN1798196A (en) * 2004-12-31 2006-07-05 乐金电子(中国)研究开发中心有限公司 Out-calling restriction setup method of mobile communication terminal
CN101330692A (en) * 2008-07-29 2008-12-24 Tcl天一移动通信(深圳)有限公司 Mobile phone with lose-proof function and method for preventing mobile phone from losing
CN101707642A (en) * 2009-09-30 2010-05-12 宇龙计算机通信科技(深圳)有限公司 Intelligent antitheft method, terminal and system
CN102375949A (en) * 2010-08-18 2012-03-14 Lg电子株式会社 Mobile terminal and method for controlling method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331281A (en) * 2016-08-11 2017-01-11 努比亚技术有限公司 Mobile terminal and information processing method
CN109816935A (en) * 2019-03-18 2019-05-28 深圳市道格恒通科技有限公司 A kind of anti-reminding method, device and smart phone indulged in

Also Published As

Publication number Publication date
CN103020503B (en) 2015-11-18

Similar Documents

Publication Publication Date Title
CN105631275B (en) information display method, information display device and terminal
CN102780813A (en) Mobile terminal-based alarm method and system
CN102831682B (en) System and method for remotely opening door based on mobile phone short message
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
CN105120122A (en) Alarm method and device
CN105722090A (en) Control method and device for automatically identifying pseudo base station
JPWO2005069675A1 (en) Telephone countermeasure device and telephone countermeasure method when using telephone while driving
CN105844744A (en) Password authentication method and password lock
CN105573623A (en) Help seeking method based on fingerprint identification
CN204168365U (en) Mobile phone and car machine communication connecting system
CN105513179A (en) Unlocking method and device, as well as intelligent lock
CN108475504A (en) Communication device
CN105681154A (en) Method and device for sending message in instant messaging software
CN104700050A (en) Mobile terminal safety positioning method and device
CN104506711A (en) Communication information processing method and device for terminal
CN107396328B (en) Calling method of terminal and related equipment
US9866665B2 (en) Method for operating a communication system, and communication system
CN104573463A (en) System switching method, system switching device and terminal
CN103079009A (en) Anti-theft method for mobile phone and anti-theft mobile phone
CN106231534A (en) Mobile terminal and the number of writing thereof and method of disannuling a call, device
CN104168361A (en) Communication method, communication device, server and communication system
CN104407708A (en) Notice prompting method, notice prompting device, terminal and notice prompting system
CN103020503B (en) The verification method of terminal and user identity
CN108702422B (en) Incoming call management method and device for one number and multiple terminals, managed equipment and server
CN102300000A (en) Friendly hinting method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151118

Termination date: 20211219