CN103020503B - The verification method of terminal and user identity - Google Patents
The verification method of terminal and user identity Download PDFInfo
- Publication number
- CN103020503B CN103020503B CN201210555400.XA CN201210555400A CN103020503B CN 103020503 B CN103020503 B CN 103020503B CN 201210555400 A CN201210555400 A CN 201210555400A CN 103020503 B CN103020503 B CN 103020503B
- Authority
- CN
- China
- Prior art keywords
- user
- centralized control
- control district
- terminal
- traffic operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a kind of terminal, comprising: area setting unit, at least one centralized control district is set on the screen interface in described terminal; Region detection unit, for there is traffic operation in described terminal, detect in described traffic operation whether exist at least one perform step realized by described centralized control district; User identity judging unit, for the testing result at described region detection unit for depositing in case, judging that active user is as authorized user, otherwise being judged to be disabled user; Information transmitting unit, for when described active user is disabled user, the destination object to described traffic operation sends information warning.The invention allows for a kind of verification method of user identity.By technical scheme of the present invention, effectively can verify the current user identity carrying out traffic operation, and not by informing the destination object of traffic operation during checking, be utilized by lawless person after losing to avoid user terminal.
Description
Technical field
The present invention relates to identity identification technical field, in particular to the verification method of a kind of terminal and a kind of user identity.
Background technology
After the mobile phone of user is picked up by lawless person or obtained by improper means, lawless person may carry out communication with the contact person that stores in mobile phone, therefore may cause the privacy leakage or damage to property etc. of mobile phone owner or contact person.
In the related, whether be owner, but the technology such as face recognition, fingerprint recognition of terminal is still in the stage of improving at present if can detect current by face recognition, fingerprint recognition or other people body characteristics recognition technology, discrimination is not high.
Therefore, need a kind of verification method of new user identity, effectively can verify the current user identity carrying out traffic operation, and not by informing the destination object of traffic operation during checking, utilized by lawless person after losing to avoid user terminal.
Summary of the invention
The present invention is just based on the problems referred to above, propose a kind of verification method of new user identity, effectively can verify the current user identity carrying out traffic operation, and not by informing the destination object of traffic operation during checking, be utilized by lawless person after losing to avoid user terminal.
In view of this, the present invention proposes a kind of terminal, comprising: area setting unit, at least one centralized control district is set on the screen interface in described terminal; Region detection unit, for there is traffic operation in described terminal, detect in described traffic operation whether exist at least one perform step realized by described centralized control district; User identity judging unit, for the testing result at described region detection unit for depositing in case, judging that active user is as authorized user, otherwise being judged to be disabled user; Information transmitting unit, for when described active user is disabled user, the destination object to described traffic operation sends information warning.
In this technical scheme, by the function i ntegration to operation, user does not need to find at the diverse location of whole terminal interface to control button or control area, and all operations that can carry out for current interface or terminal can be carried out in this centralized control district, user friendly operating process.Particularly, can obtain the operating function under the different interface of terminal or already present functionality controls, so the whole or specified portions in aforesaid operations function or functionality controls (is generally that user commonly uses, can be arranged by factory default or User Defined), can by arranging corresponding virtual key in centralized control district, make user when choosing these virtual keys, original operating function can be realized equally, or after user marks corresponding gesture path in centralized control district, also can realize original function.Due to no matter, current interface is the function interface of standby interface or certain application program, centralized control district can be demonstrated on terminal interface, and in centralized control district, demonstrate the gesture path of virtual key or reception user, thus the control realized current interface, need not due to the change at interface and difference, make user have to carry out at the diverse location of screen the selection of function button, simplify user operation.Here precalculated position can be the default zone that system default or user are arranged.Here centralized control district can be single or multiple, can carry out arranging or automatically regulating according to the number of the setting of user, current action required function.It should be noted that, " setting " here does not represent and must show, as long as can receive the touch-control order of user.
Here traffic operation refers to there is sending of signal of communication, and there is specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone and called party, the destination object of note, mail etc. and addressee, the addressee's (such as the information-reply etc. of certain good friend) in the social network-i i-platform (such as sending out status information etc.) that the destination object of social network information and the webserver build or social networks.User can arrange such as in the process of whole traffic operation, at least must there is an operation to complete in centralized control district, or whole operating process all must complete in centralized control district, especially when centralized control district be not reside in terminal screen interface on time, so disabled user is probably direct at the enterprising line operate of application interface, thus the identity sticked one's chin out, be convenient to real authorized user (as owner) and destination object is gone and found out what's going on, avoid causing further loss.
In technique scheme, preferably, also comprise: Interface detection unit, for traffic operation occurring in described terminal, detecting in described traffic operation and whether there is at least one to perform step be realized by communication interface corresponding to described traffic operation; Wherein, described user identity judging unit is in the testing result of described region detection unit and described Interface detection unit to be deposited in case, judges that described active user is as authorized user, otherwise is judged to be disabled user.
In this technical scheme, when user can be set in traffic operation, must connected applications interface and centralized control district jointly carry out, especially when centralized control district resides on the screen interface of terminal, or after the application interface entering traffic operation, when centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, also comprise: communication type judging unit, for judging that whether described traffic operation is for sending communication information; Described information transmitting unit comprises: information adds subelement, for when the judged result of described communication type judging unit is for being, is added into by described information warning in described communication information; Send and control subelement, for when the judged result of described communication type judging unit is no, directly described information warning is sent to described destination object.
In this technical scheme, for in the situations such as note, mail, social network information, can produce communication information, such as destination object can receive short message content, Mail Contents or the social network information content etc. that can be used for showing, therefore information warning directly can be added in communication information.And in the situations such as call, then just send the signal of communication for being connected to the other side, the information content can not be transmitted, therefore information warning can be sent by modes such as independent note, mails, and destination object terminal can be resolved the content of the note received, mail etc., when parsing information warning, can directly show on call interface, to point out user in time.
In technique scheme, preferably, also comprise: operation setting unit, for according to the operation setting order that receives, arrange and operation is aroused to described centralized control district; Unit is aroused in region, for when detect with described arouse the operational motion operating and match, the current interface of described terminal is aroused described centralized control district.
In this technical scheme, owing to must operate in conjunction with centralized control district, thus can arouse operation by User Defined to centralized control district, thus be conducive to promoting privacy.
In technique scheme, preferably, also comprise: step setting unit, for according to the step setting command received, for the traffic operation in described terminal arranges at least one key operation step be associated; Wherein, described user identity judging unit, when at least one execution step comprises described key operation step described in being realized by described centralized control district, judges that described active user is as authorized user, otherwise is judged to be disabled user.
In this technical scheme, user can specify some or multiple step must realize in centralized control district, " dial-out " or " transmission " operation of such as final step, or other steps any in communication operations, user can be arranged according to the operating habit etc. of self, be convenient to user operation, and be conducive to promoting the validity of authentication and the safe coefficient of privacy of user.
According to another aspect of the invention, also proposed a kind of verification method of user identity, comprising: step 202, the screen interface of terminal arranges at least one centralized control district; Step 204, when there is traffic operation in described terminal, being realized by described centralized control district if at least one of described traffic operation performs step, then judging that active user is as authorized user, otherwise be judged to be disabled user; Step 206, if described active user is disabled user, then the destination object to described traffic operation sends information warning.
In this technical scheme, by the function i ntegration to operation, user does not need to find at the diverse location of whole terminal interface to control button or control area, and all operations that can carry out for current interface or terminal can be carried out in this centralized control district, user friendly operating process.Particularly, can obtain the operating function under the different interface of terminal or already present functionality controls, so the whole or specified portions in aforesaid operations function or functionality controls (is generally that user commonly uses, can be arranged by factory default or User Defined), can by arranging corresponding virtual key in centralized control district, make user when choosing these virtual keys, original operating function can be realized equally, or after user marks corresponding gesture path in centralized control district, also can realize original function.Due to no matter, current interface is the function interface of standby interface or certain application program, centralized control district can be demonstrated on terminal interface, and in centralized control district, demonstrate the gesture path of virtual key or reception user, thus the control realized current interface, need not due to the change at interface and difference, make user have to carry out at the diverse location of screen the selection of function button, simplify user operation.Here precalculated position can be the default zone that system default or user are arranged.Here centralized control district can be single or multiple, can carry out arranging or automatically regulating according to the number of the setting of user, current action required function.It should be noted that, " setting " here does not represent and must show, as long as can receive the touch-control order of user.
Here traffic operation refers to there is sending of signal of communication, and there is specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone and called party, the destination object of note, mail etc. and addressee, the addressee's (such as the information-reply etc. of certain good friend) in the social network-i i-platform (such as sending out status information etc.) that the destination object of social network information and the webserver build or social networks.User can arrange such as in the process of whole traffic operation, at least must there is an operation to complete in centralized control district, or whole operating process all must complete in centralized control district, especially when centralized control district be not reside in terminal screen interface on time, so disabled user is probably direct at the enterprising line operate of application interface, thus the identity sticked one's chin out, be convenient to real authorized user (as owner) and destination object is gone and found out what's going on, avoid causing further loss.
In technique scheme, preferably, described step 204 also comprises: realized by described centralized control district if perform step described at least one, and to perform step described at least one be realized by communication interface corresponding to described traffic operation, then judge that described active user is as authorized user, otherwise be judged to be disabled user.
In this technical scheme, when user can be set in traffic operation, must connected applications interface and centralized control district jointly carry out, especially when centralized control district resides on the screen interface of terminal, or after the application interface entering traffic operation, when centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, described step 206 also comprises: judge that whether described traffic operation is for sending communication information, if, then described information warning is added in described communication information, otherwise directly described information warning is sent to described destination object.
In this technical scheme, for in the situations such as note, mail, social network information, can produce communication information, such as destination object can receive short message content, Mail Contents or the social network information content etc. that can be used for showing, therefore information warning directly can be added in communication information.And in the situations such as call, then just send the signal of communication for being connected to the other side, the information content can not be transmitted, therefore information warning can be sent by modes such as independent note, mails, and destination object terminal can be resolved the content of the note received, mail etc., when parsing information warning, can directly show on call interface, to point out user in time.
In technique scheme, preferably, also comprise: according to the operation setting order received, arrange and operation is aroused to described centralized control district; And described step 204 also comprises: arouse with described the operational motion operating and match if detect, then arouse described centralized control district in the current interface of described terminal.
In this technical scheme, owing to must operate in conjunction with centralized control district, thus can arouse operation by User Defined to centralized control district, thus be conducive to promoting privacy.
In technique scheme, preferably, before described step 204, also comprise: according to the step setting command received, for the traffic operation in described terminal arranges at least one key operation step be associated; And in described step 204, if at least one execution step comprises described key operation step described in being realized by described centralized control district, then judge that described active user is as authorized user, otherwise be judged to be disabled user.
In this technical scheme, user can specify some or multiple step must realize in centralized control district, " dial-out " or " transmission " operation of such as final step, or other steps any in communication operations, user can be arranged according to the operating habit etc. of self, be convenient to user operation, and be conducive to promoting the validity of authentication and the safe coefficient of privacy of user.
By above technical scheme, effectively can verify the current user identity carrying out traffic operation, and not by informing the destination object of traffic operation during checking, be utilized by lawless person after losing to avoid user terminal.
Accompanying drawing explanation
Fig. 1 shows the block diagram of terminal according to an embodiment of the invention;
Fig. 2 shows the process flow diagram of the verification method of user identity according to an embodiment of the invention;
Fig. 3 A to Fig. 3 C shows the surface chart verified user identity according to an embodiment of the invention and warn;
Fig. 4 shows according to an embodiment of the invention to the process flow diagram that user identity is verified.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 1, terminal 100 according to an embodiment of the invention, comprising: area setting unit 102, arranges at least one centralized control district on the screen interface in described terminal 100; Region detection unit 104, for there is traffic operation in described terminal 100, detect in described traffic operation whether exist at least one perform step realized by described centralized control district; User identity judging unit 106, for the testing result at described region detection unit 104 for depositing in case, judging that active user is as authorized user, otherwise being judged to be disabled user; Information transmitting unit 108, for when described active user is disabled user, the destination object to described traffic operation sends information warning.
In this technical scheme, by the function i ntegration to operation, user does not need to find at the diverse location of whole terminal interface to control button or control area, all operations that can carry out for current interface or terminal 100 can be carried out in this centralized control district, user friendly operating process.Particularly, can obtain the operating function under the different interface of terminal 100 or already present functionality controls, so the whole or specified portions in aforesaid operations function or functionality controls (is generally that user commonly uses, can be arranged by factory default or User Defined), can by arranging corresponding virtual key in centralized control district, make user when choosing these virtual keys, original operating function can be realized equally, or after user marks corresponding gesture path in centralized control district, also can realize original function.Due to no matter, current interface is the function interface of standby interface or certain application program, centralized control district can be demonstrated on terminal interface, and in centralized control district, demonstrate the gesture path of virtual key or reception user, thus the control realized current interface, need not due to the change at interface and difference, make user have to carry out at the diverse location of screen the selection of function button, simplify user operation.Here precalculated position can be the default zone that system default or user are arranged.Here centralized control district can be single or multiple, can carry out arranging or automatically regulating according to the number of the setting of user, current action required function.It should be noted that, " setting " here does not represent and must show, as long as can receive the touch-control order of user.
Here traffic operation refers to there is sending of signal of communication, and there is specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone and called party, the destination object of note, mail etc. and addressee, the addressee's (such as the information-reply etc. of certain good friend) in the social network-i i-platform (such as sending out status information etc.) that the destination object of social network information and the webserver build or social networks.User can arrange such as in the process of whole traffic operation, at least must there is an operation to complete in centralized control district, or whole operating process all must complete in centralized control district, especially when centralized control district be not reside in terminal 100 screen interface on time, so disabled user is probably direct at the enterprising line operate of application interface, thus the identity sticked one's chin out, be convenient to real authorized user (as owner) and destination object is gone and found out what's going on, avoid causing further loss.
In technique scheme, preferably, also comprise: Interface detection unit 110, for traffic operation occurring in described terminal 100, detecting in described traffic operation and whether there is at least one to perform step be realized by communication interface corresponding to described traffic operation; Wherein, described user identity judging unit 106 is in the testing result of described region detection unit 104 and described Interface detection unit 110 to be deposited in case, judges that described active user is as authorized user, otherwise is judged to be disabled user.
In this technical scheme, when user can be set in traffic operation, must connected applications interface and centralized control district jointly carry out, especially when centralized control district resides on the screen interface of terminal, or after the application interface entering traffic operation, when centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, also comprise: communication type judging unit 112, for judging that whether described traffic operation is for sending communication information; Described information transmitting unit 108 comprises: information adds subelement 1082, for when the judged result of described communication type judging unit 112 is for being, is added into by described information warning in described communication information; Send and control subelement 1084, for when the judged result of described communication type judging unit 112 is no, directly described information warning is sent to described destination object.
In this technical scheme, for in the situations such as note, mail, social network information, can produce communication information, such as destination object can receive short message content, Mail Contents or the social network information content etc. that can be used for showing, therefore information warning directly can be added in communication information.And in the situations such as call, then just send the signal of communication for being connected to the other side, the information content can not be transmitted, therefore information warning can be sent by modes such as independent note, mails, and destination object terminal can be resolved the content of the note received, mail etc., when parsing information warning, can directly show on call interface, to point out user in time.
In technique scheme, preferably, also comprise: operation setting unit 114, for according to the operation setting order that receives, arrange and operation is aroused to described centralized control district; Unit 116 is aroused in region, for when detect with described arouse the operational motion operating and match, the current interface of described terminal 100 is aroused described centralized control district.
In this technical scheme, owing to must operate in conjunction with centralized control district, thus can arouse operation by User Defined to centralized control district, thus be conducive to promoting privacy.
In technique scheme, preferably, also comprise: step setting unit 118, for according to the step setting command received, for the traffic operation in described terminal 100 arranges at least one key operation step be associated; Wherein, described user identity judging unit 106, when at least one execution step comprises described key operation step described in being realized by described centralized control district, judges that described active user is as authorized user, otherwise is judged to be disabled user.
In this technical scheme, user can specify some or multiple step must realize in centralized control district, " dial-out " or " transmission " operation of such as final step, or other steps any in communication operations, user can be arranged according to the operating habit etc. of self, be convenient to user operation, and be conducive to promoting the validity of authentication and the safe coefficient of privacy of user.
Fig. 2 shows the process flow diagram of the verification method of user identity according to an embodiment of the invention.
As shown in Figure 2, the verification method of user identity, comprising: step 202 according to an embodiment of the invention, and the screen interface of terminal arranges at least one centralized control district; Step 204, when there is traffic operation in described terminal, being realized by described centralized control district if at least one of described traffic operation performs step, then judging that active user is as authorized user, otherwise be judged to be disabled user; Step 206, if described active user is disabled user, then the destination object to described traffic operation sends information warning.
In this technical scheme, by the function i ntegration to operation, user does not need to find at the diverse location of whole terminal interface to control button or control area, and all operations that can carry out for current interface or terminal can be carried out in this centralized control district, user friendly operating process.Particularly, can obtain the operating function under the different interface of terminal or already present functionality controls, so the whole or specified portions in aforesaid operations function or functionality controls (is generally that user commonly uses, can be arranged by factory default or User Defined), can by arranging corresponding virtual key in centralized control district, make user when choosing these virtual keys, original operating function can be realized equally, or after user marks corresponding gesture path in centralized control district, also can realize original function.Due to no matter, current interface is the function interface of standby interface or certain application program, centralized control district can be demonstrated on terminal interface, and in centralized control district, demonstrate the gesture path of virtual key or reception user, thus the control realized current interface, need not due to the change at interface and difference, make user have to carry out at the diverse location of screen the selection of function button, simplify user operation.Here precalculated position can be the default zone that system default or user are arranged.Here centralized control district can be single or multiple, can carry out arranging or automatically regulating according to the number of the setting of user, current action required function.It should be noted that, " setting " here does not represent and must show, as long as can receive the touch-control order of user.
Here traffic operation refers to there is sending of signal of communication, and there is specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone and called party, the destination object of note, mail etc. and addressee, the addressee's (such as the information-reply etc. of certain good friend) in the social network-i i-platform (such as sending out status information etc.) that the destination object of social network information and the webserver build or social networks.User can arrange such as in the process of whole traffic operation, at least must there is an operation to complete in centralized control district, or whole operating process all must complete in centralized control district, especially when centralized control district be not reside in terminal screen interface on time, so disabled user is probably direct at the enterprising line operate of application interface, thus the identity sticked one's chin out, be convenient to real authorized user (as owner) and destination object is gone and found out what's going on, avoid causing further loss.
In technique scheme, preferably, described step 204 also comprises: realized by described centralized control district if perform step described at least one, and to perform step described at least one be realized by communication interface corresponding to described traffic operation, then judge that described active user is as authorized user, otherwise be judged to be disabled user.
In this technical scheme, when user can be set in traffic operation, must connected applications interface and centralized control district jointly carry out, especially when centralized control district resides on the screen interface of terminal, or after the application interface entering traffic operation, when centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, described step 206 also comprises: judge that whether described traffic operation is for sending communication information, if, then described information warning is added in described communication information, otherwise directly described information warning is sent to described destination object.
In this technical scheme, for in the situations such as note, mail, social network information, can produce communication information, such as destination object can receive short message content, Mail Contents or the social network information content etc. that can be used for showing, therefore information warning directly can be added in communication information.And in the situations such as call, then just send the signal of communication for being connected to the other side, the information content can not be transmitted, therefore information warning can be sent by modes such as independent note, mails, and destination object terminal can be resolved the content of the note received, mail etc., when parsing information warning, can directly show on call interface, to point out user in time.
In technique scheme, preferably, also comprise: according to the operation setting order received, arrange and operation is aroused to described centralized control district; And described step 204 also comprises: arouse with described the operational motion operating and match if detect, then arouse described centralized control district in the current interface of described terminal.
In this technical scheme, owing to must operate in conjunction with centralized control district, thus can arouse operation by User Defined to centralized control district, thus be conducive to promoting privacy.
In technique scheme, preferably, before described step 204, also comprise: according to the step setting command received, for the traffic operation in described terminal arranges at least one key operation step be associated; And in described step 204, if at least one execution step comprises described key operation step described in being realized by described centralized control district, then judge that described active user is as authorized user, otherwise be judged to be disabled user.
In this technical scheme, user can specify some or multiple step must realize in centralized control district, " dial-out " or " transmission " operation of such as final step, or other steps any in communication operations, user can be arranged according to the operating habit etc. of self, be convenient to user operation, and be conducive to promoting the validity of authentication and the safe coefficient of privacy of user.
Below in conjunction with Fig. 3 A to Fig. 3 C, for note and call, be described in detail to the subscriber authentication in communication operations and processing mode thereof, wherein, Fig. 3 A to Fig. 3 C shows the surface chart verified user identity according to an embodiment of the invention and warn.
Assuming that user sends note by terminal.As shown in Figure 3A, in the short message sending interface of terminal, centralized control district 302 is set, and based on the functionality controls 304A that short message sending interface configures originally, in centralized control district 302, configures identical functionality controls 304B.
First, centralized control district 302 is presented on short message sending interface automatically, also can be aroused after user input instruction.Obviously, the situation of manually arousing for needing user, personalized can arouse instruction, such as specific gesture path etc. by arranging, can guarantee that other people cannot arouse centralized control district 302 except the authorized user (owner) of terminal itself to a certain extent.
Simultaneously, if centralized control district 302 automatically occurs or after being aroused, user can carry out operation by means of only functionality controls 304A and control, and can carry out operation control by means of only functionality controls 304B, also can carry out operation control by binding function control 304A together with functionality controls 304B.
Based on above 2 points, then user can arrange the decision procedure of authentication, must be completed by centralized control district 302 as operated at least one times, or all operations all must be completed by centralized control district 302, or not only functionality controls 304A must be employed but also employ functionality controls 304B in the process of a short message sending, or the given step in the step of short message sending must be completed by centralized control district 302 (can be a step or multiple step, such as must click " transmission " in centralized control district 302) etc.
Can verify the identity of active user by the way.If the identity of active user is not by checking, then can add some information warnings in the note sent, thus relevant prompting is carried out to the destination object of communication.Specifically as shown in Figure 3 B, when the destination object communicated receives note, in short message content, with the addition of the information warning 306 of " doubtful disabled user ", to point out this destination object, avoid having dust thrown into the eyes.
Certainly, in the process for traffic operations such as making a phone call, because target terminal does not receive the content information of similar note etc., therefore, separately through the mode such as note, mail, information warning can be sent to target terminal.In a kind of situation, user by checking these note, mails etc. in communication process or after end of conversation, can go and find out what's going on; In another kind of situation, target terminal by detecting the content of note or mail etc., when finding to include information warning, can open this note or mail immediately in current interface, or adopting the mode shown in Fig. 3 C, extracting directly information warning 306 is also presented on call interface.
Fig. 4 shows according to an embodiment of the invention to the process flow diagram that user identity is verified.
As shown in Figure 4, according to an embodiment of the invention the flow process that user identity is verified is comprised:
Step 402, when carrying out traffic operation, enters relevant traffic operation interface, and judges whether user arouses centralized control district, if arouse, then enter step 404, otherwise enter step 410.The authorized user of terminal can by arranging the mode of arousing, thus avoid disabled user to arouse centralized control district.
Step 404, according to the situation of current interface, the functionality controls matched with it is shown in centralized control district, such as in short message sending interface, the functionality controls such as " transmission ", " interpolation annex " is set, in contact person interface, the functionality controls such as " sending short messages ", " dialing ", " editor " is set.
Step 406, judge user whether in centralized control district n-back test control.If so, then enter step 408, otherwise enter step 410.
Step 408, judges that active user is as authorized user, performs corresponding controlling functions, and does not send information warning.
Step 410, judges that active user is as disabled user, performs corresponding controlling functions, and sends information warning.
Certainly, in the determining step of step 406, also other judgment mode can be adopted, such as whether meet: operation must be completed by centralized control district at least one times, or all operations are all completed by centralized control district, or not only employ the functionality controls in current interface but also employ the functionality controls in centralized control district, or the one or more steps of specifying in whole operating process must be completed by centralized control district, thus make user identity and judging more accurately.
More than be described with reference to the accompanying drawings technical scheme of the present invention, consider in the related, face recognition, fingerprint recognition or other people body characteristics recognition technology are still in the stage of improving, discrimination is not high, therefore, the invention provides the verification method of a kind of terminal and a kind of user identity, effectively can verify the current user identity carrying out traffic operation, and not by informing the destination object of traffic operation during checking, utilized by lawless person after losing to avoid user terminal.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (6)
1. a demo plant for user identity, is characterized in that, comprising:
Area setting unit, for arranging at least one centralized control district on the screen interface of terminal;
Region detection unit, for there is traffic operation in described terminal, detect in described traffic operation whether exist at least one perform step realized by described centralized control district;
User identity judging unit, for the testing result at described region detection unit for depositing in case, judging that active user is as authorized user, otherwise being judged to be disabled user;
Information transmitting unit, for when described active user is disabled user, the destination object to described traffic operation sends information warning;
Interface detection unit, for traffic operation occurring in described terminal, detecting in described traffic operation and whether there is at least one to perform step be realized by communication interface corresponding to described traffic operation;
Wherein, described user identity judging unit is in the testing result of described region detection unit and described Interface detection unit to be deposited in case, judges that described active user is as authorized user, otherwise is judged to be disabled user;
The demo plant of described user identity also comprises:
Communication type judging unit, for judging that whether described traffic operation is for sending communication information;
Described information transmitting unit comprises:
Information adds subelement, for when the judged result of described communication type judging unit is for being, is added into by described information warning in described communication information;
Send and control subelement, for when the judged result of described communication type judging unit is no, directly described information warning is sent to described destination object; And
Described centralized control district comprises functionality controls, and wherein, described functionality controls is corresponding with described communication interface.
2. the demo plant of user identity according to claim 1, is characterized in that, also comprises:
Operation setting unit, for according to the operation setting order that receives, arranges and arouses operation to described centralized control district;
Unit is aroused in region, for when detect with described arouse the operational motion operating and match, the current interface of described terminal is aroused described centralized control district.
3. the demo plant of user identity according to claim 1, is characterized in that, also comprises:
Step setting unit, for according to the step setting command received, for the traffic operation in described terminal arranges at least one key operation step be associated;
Wherein, described user identity judging unit, when at least one execution step comprises described key operation step described in being realized by described centralized control district, judges that described active user is as authorized user, otherwise is judged to be disabled user.
4. a verification method for user identity, is characterized in that, comprising:
Step 202, the screen interface of terminal arranges at least one centralized control district;
Step 204, when there is traffic operation in described terminal, being realized by described centralized control district if at least one of described traffic operation performs step, then judging that active user is as authorized user, otherwise be judged to be disabled user;
Step 206, if described active user is disabled user, then the destination object to described traffic operation sends information warning;
Described step 204 also comprises:
If perform step described at least one to be realized by described centralized control district, and to perform step described at least one be realized by communication interface corresponding to described traffic operation, then judge that described active user is as authorized user, otherwise be judged to be disabled user;
Described step 206 also comprises:
Judge that whether described traffic operation is for sending communication information, is if so, then added into described information warning in described communication information, otherwise directly described information warning is sent to described destination object;
Described centralized control district comprises functionality controls, and wherein, described functionality controls is corresponding with described communication interface.
5. the verification method of user identity according to claim 4, is characterized in that, also comprises:
According to the operation setting order received, arrange and operation is aroused to described centralized control district; And
Described step 204 also comprises:
Arouse with described the operational motion operating and match if detect, then in the current interface of described terminal, arouse described centralized control district.
6. the verification method of user identity according to claim 4, is characterized in that, before described step 204, also comprises:
According to the step setting command received, for the traffic operation in described terminal arranges at least one key operation step be associated; And
In described step 204, if at least one execution step comprises described key operation step described in being realized by described centralized control district, then judge that described active user is as authorized user, otherwise be judged to be disabled user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210555400.XA CN103020503B (en) | 2012-12-19 | 2012-12-19 | The verification method of terminal and user identity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210555400.XA CN103020503B (en) | 2012-12-19 | 2012-12-19 | The verification method of terminal and user identity |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103020503A CN103020503A (en) | 2013-04-03 |
CN103020503B true CN103020503B (en) | 2015-11-18 |
Family
ID=47969100
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210555400.XA Expired - Fee Related CN103020503B (en) | 2012-12-19 | 2012-12-19 | The verification method of terminal and user identity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103020503B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106331281A (en) * | 2016-08-11 | 2017-01-11 | 努比亚技术有限公司 | Mobile terminal and information processing method |
CN109816935B (en) * | 2019-03-18 | 2020-10-30 | 深圳市道格恒通科技有限公司 | Drowning prevention prompting method and device and smart phone |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1798196A (en) * | 2004-12-31 | 2006-07-05 | 乐金电子(中国)研究开发中心有限公司 | Out-calling restriction setup method of mobile communication terminal |
CN100337504C (en) * | 2004-09-24 | 2007-09-12 | 华为技术有限公司 | Intelligent alarming method of personal mobile terminal |
CN101330692A (en) * | 2008-07-29 | 2008-12-24 | Tcl天一移动通信(深圳)有限公司 | Mobile phone with lose-proof function and method for preventing mobile phone from losing |
CN101707642A (en) * | 2009-09-30 | 2010-05-12 | 宇龙计算机通信科技(深圳)有限公司 | Intelligent antitheft method, terminal and system |
CN102375949A (en) * | 2010-08-18 | 2012-03-14 | Lg电子株式会社 | Mobile terminal and method for controlling method thereof |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001230858A (en) * | 2000-02-17 | 2001-08-24 | Mitsubishi Electric Corp | Mobile phone system and mobile phone |
CN100502599C (en) * | 2003-10-10 | 2009-06-17 | 高延飞 | Security management method for mobile phone |
US7184750B2 (en) * | 2004-03-30 | 2007-02-27 | Nokia Corporation | Smart terminal remote lock and format |
-
2012
- 2012-12-19 CN CN201210555400.XA patent/CN103020503B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100337504C (en) * | 2004-09-24 | 2007-09-12 | 华为技术有限公司 | Intelligent alarming method of personal mobile terminal |
CN1798196A (en) * | 2004-12-31 | 2006-07-05 | 乐金电子(中国)研究开发中心有限公司 | Out-calling restriction setup method of mobile communication terminal |
CN101330692A (en) * | 2008-07-29 | 2008-12-24 | Tcl天一移动通信(深圳)有限公司 | Mobile phone with lose-proof function and method for preventing mobile phone from losing |
CN101707642A (en) * | 2009-09-30 | 2010-05-12 | 宇龙计算机通信科技(深圳)有限公司 | Intelligent antitheft method, terminal and system |
CN102375949A (en) * | 2010-08-18 | 2012-03-14 | Lg电子株式会社 | Mobile terminal and method for controlling method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN103020503A (en) | 2013-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105631275B (en) | information display method, information display device and terminal | |
CN105573623A (en) | Help seeking method based on fingerprint identification | |
CN102780813A (en) | Mobile terminal-based alarm method and system | |
CN204168365U (en) | Mobile phone and car machine communication connecting system | |
CN104506711A (en) | Communication information processing method and device for terminal | |
CN104348977A (en) | Operating control method for mobile terminal, master terminal and slave terminal | |
CN107396328B (en) | Calling method of terminal and related equipment | |
CN105744064A (en) | Automatic communication help calling method, automatic communication help calling and terminal | |
CN105721699A (en) | Method and system for switching driving mode of mobile terminal | |
EP3048824A1 (en) | Call control method and system | |
CN106331982A (en) | Position information indication method and system | |
CN103020503B (en) | The verification method of terminal and user identity | |
CN104168361A (en) | Communication method, communication device, server and communication system | |
CN105827785A (en) | Method for establishing call connection, called terminal, and calling terminal | |
US20090111439A1 (en) | System and method for monitoring a monitored mobile phone | |
CN104378482A (en) | Mobile terminal address book updating method and system | |
CN105631281A (en) | Control method and control device based on fingerprint recognition | |
CN106453880B (en) | The method and mobile terminal of caller identification | |
CN108702422A (en) | Call management method, device, managed devices and the server of No.1 multiple terminals | |
CN105915709A (en) | Communication connection establishing method and terminal | |
CN105292020A (en) | Vehicle control method, vehicle control device and terminal | |
CN108200540A (en) | A kind of call answering method and device of communicating terminal | |
CN101098536A (en) | Method for tracking a lost mobile station | |
WO2014169676A1 (en) | Method and apparatus for information transmission | |
CN102905261A (en) | Contact information authentication requesting and receiving method and clients |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20151118 Termination date: 20211219 |