CN103020503B - The verification method of terminal and user identity - Google Patents

The verification method of terminal and user identity Download PDF

Info

Publication number
CN103020503B
CN103020503B CN201210555400.XA CN201210555400A CN103020503B CN 103020503 B CN103020503 B CN 103020503B CN 201210555400 A CN201210555400 A CN 201210555400A CN 103020503 B CN103020503 B CN 103020503B
Authority
CN
China
Prior art keywords
user
centralized control
control district
terminal
traffic operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210555400.XA
Other languages
Chinese (zh)
Other versions
CN103020503A (en
Inventor
杨丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201210555400.XA priority Critical patent/CN103020503B/en
Publication of CN103020503A publication Critical patent/CN103020503A/en
Application granted granted Critical
Publication of CN103020503B publication Critical patent/CN103020503B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a kind of terminal, comprising: area setting unit, at least one centralized control district is set on the screen interface in described terminal; Region detection unit, for there is traffic operation in described terminal, detect in described traffic operation whether exist at least one perform step realized by described centralized control district; User identity judging unit, for the testing result at described region detection unit for depositing in case, judging that active user is as authorized user, otherwise being judged to be disabled user; Information transmitting unit, for when described active user is disabled user, the destination object to described traffic operation sends information warning.The invention allows for a kind of verification method of user identity.By technical scheme of the present invention, effectively can verify the current user identity carrying out traffic operation, and not by informing the destination object of traffic operation during checking, be utilized by lawless person after losing to avoid user terminal.

Description

The verification method of terminal and user identity
Technical field
The present invention relates to identity identification technical field, in particular to the verification method of a kind of terminal and a kind of user identity.
Background technology
After the mobile phone of user is picked up by lawless person or obtained by improper means, lawless person may carry out communication with the contact person that stores in mobile phone, therefore may cause the privacy leakage or damage to property etc. of mobile phone owner or contact person.
In the related, whether be owner, but the technology such as face recognition, fingerprint recognition of terminal is still in the stage of improving at present if can detect current by face recognition, fingerprint recognition or other people body characteristics recognition technology, discrimination is not high.
Therefore, need a kind of verification method of new user identity, effectively can verify the current user identity carrying out traffic operation, and not by informing the destination object of traffic operation during checking, utilized by lawless person after losing to avoid user terminal.
Summary of the invention
The present invention is just based on the problems referred to above, propose a kind of verification method of new user identity, effectively can verify the current user identity carrying out traffic operation, and not by informing the destination object of traffic operation during checking, be utilized by lawless person after losing to avoid user terminal.
In view of this, the present invention proposes a kind of terminal, comprising: area setting unit, at least one centralized control district is set on the screen interface in described terminal; Region detection unit, for there is traffic operation in described terminal, detect in described traffic operation whether exist at least one perform step realized by described centralized control district; User identity judging unit, for the testing result at described region detection unit for depositing in case, judging that active user is as authorized user, otherwise being judged to be disabled user; Information transmitting unit, for when described active user is disabled user, the destination object to described traffic operation sends information warning.
In this technical scheme, by the function i ntegration to operation, user does not need to find at the diverse location of whole terminal interface to control button or control area, and all operations that can carry out for current interface or terminal can be carried out in this centralized control district, user friendly operating process.Particularly, can obtain the operating function under the different interface of terminal or already present functionality controls, so the whole or specified portions in aforesaid operations function or functionality controls (is generally that user commonly uses, can be arranged by factory default or User Defined), can by arranging corresponding virtual key in centralized control district, make user when choosing these virtual keys, original operating function can be realized equally, or after user marks corresponding gesture path in centralized control district, also can realize original function.Due to no matter, current interface is the function interface of standby interface or certain application program, centralized control district can be demonstrated on terminal interface, and in centralized control district, demonstrate the gesture path of virtual key or reception user, thus the control realized current interface, need not due to the change at interface and difference, make user have to carry out at the diverse location of screen the selection of function button, simplify user operation.Here precalculated position can be the default zone that system default or user are arranged.Here centralized control district can be single or multiple, can carry out arranging or automatically regulating according to the number of the setting of user, current action required function.It should be noted that, " setting " here does not represent and must show, as long as can receive the touch-control order of user.
Here traffic operation refers to there is sending of signal of communication, and there is specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone and called party, the destination object of note, mail etc. and addressee, the addressee's (such as the information-reply etc. of certain good friend) in the social network-i i-platform (such as sending out status information etc.) that the destination object of social network information and the webserver build or social networks.User can arrange such as in the process of whole traffic operation, at least must there is an operation to complete in centralized control district, or whole operating process all must complete in centralized control district, especially when centralized control district be not reside in terminal screen interface on time, so disabled user is probably direct at the enterprising line operate of application interface, thus the identity sticked one's chin out, be convenient to real authorized user (as owner) and destination object is gone and found out what's going on, avoid causing further loss.
In technique scheme, preferably, also comprise: Interface detection unit, for traffic operation occurring in described terminal, detecting in described traffic operation and whether there is at least one to perform step be realized by communication interface corresponding to described traffic operation; Wherein, described user identity judging unit is in the testing result of described region detection unit and described Interface detection unit to be deposited in case, judges that described active user is as authorized user, otherwise is judged to be disabled user.
In this technical scheme, when user can be set in traffic operation, must connected applications interface and centralized control district jointly carry out, especially when centralized control district resides on the screen interface of terminal, or after the application interface entering traffic operation, when centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, also comprise: communication type judging unit, for judging that whether described traffic operation is for sending communication information; Described information transmitting unit comprises: information adds subelement, for when the judged result of described communication type judging unit is for being, is added into by described information warning in described communication information; Send and control subelement, for when the judged result of described communication type judging unit is no, directly described information warning is sent to described destination object.
In this technical scheme, for in the situations such as note, mail, social network information, can produce communication information, such as destination object can receive short message content, Mail Contents or the social network information content etc. that can be used for showing, therefore information warning directly can be added in communication information.And in the situations such as call, then just send the signal of communication for being connected to the other side, the information content can not be transmitted, therefore information warning can be sent by modes such as independent note, mails, and destination object terminal can be resolved the content of the note received, mail etc., when parsing information warning, can directly show on call interface, to point out user in time.
In technique scheme, preferably, also comprise: operation setting unit, for according to the operation setting order that receives, arrange and operation is aroused to described centralized control district; Unit is aroused in region, for when detect with described arouse the operational motion operating and match, the current interface of described terminal is aroused described centralized control district.
In this technical scheme, owing to must operate in conjunction with centralized control district, thus can arouse operation by User Defined to centralized control district, thus be conducive to promoting privacy.
In technique scheme, preferably, also comprise: step setting unit, for according to the step setting command received, for the traffic operation in described terminal arranges at least one key operation step be associated; Wherein, described user identity judging unit, when at least one execution step comprises described key operation step described in being realized by described centralized control district, judges that described active user is as authorized user, otherwise is judged to be disabled user.
In this technical scheme, user can specify some or multiple step must realize in centralized control district, " dial-out " or " transmission " operation of such as final step, or other steps any in communication operations, user can be arranged according to the operating habit etc. of self, be convenient to user operation, and be conducive to promoting the validity of authentication and the safe coefficient of privacy of user.
According to another aspect of the invention, also proposed a kind of verification method of user identity, comprising: step 202, the screen interface of terminal arranges at least one centralized control district; Step 204, when there is traffic operation in described terminal, being realized by described centralized control district if at least one of described traffic operation performs step, then judging that active user is as authorized user, otherwise be judged to be disabled user; Step 206, if described active user is disabled user, then the destination object to described traffic operation sends information warning.
In this technical scheme, by the function i ntegration to operation, user does not need to find at the diverse location of whole terminal interface to control button or control area, and all operations that can carry out for current interface or terminal can be carried out in this centralized control district, user friendly operating process.Particularly, can obtain the operating function under the different interface of terminal or already present functionality controls, so the whole or specified portions in aforesaid operations function or functionality controls (is generally that user commonly uses, can be arranged by factory default or User Defined), can by arranging corresponding virtual key in centralized control district, make user when choosing these virtual keys, original operating function can be realized equally, or after user marks corresponding gesture path in centralized control district, also can realize original function.Due to no matter, current interface is the function interface of standby interface or certain application program, centralized control district can be demonstrated on terminal interface, and in centralized control district, demonstrate the gesture path of virtual key or reception user, thus the control realized current interface, need not due to the change at interface and difference, make user have to carry out at the diverse location of screen the selection of function button, simplify user operation.Here precalculated position can be the default zone that system default or user are arranged.Here centralized control district can be single or multiple, can carry out arranging or automatically regulating according to the number of the setting of user, current action required function.It should be noted that, " setting " here does not represent and must show, as long as can receive the touch-control order of user.
Here traffic operation refers to there is sending of signal of communication, and there is specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone and called party, the destination object of note, mail etc. and addressee, the addressee's (such as the information-reply etc. of certain good friend) in the social network-i i-platform (such as sending out status information etc.) that the destination object of social network information and the webserver build or social networks.User can arrange such as in the process of whole traffic operation, at least must there is an operation to complete in centralized control district, or whole operating process all must complete in centralized control district, especially when centralized control district be not reside in terminal screen interface on time, so disabled user is probably direct at the enterprising line operate of application interface, thus the identity sticked one's chin out, be convenient to real authorized user (as owner) and destination object is gone and found out what's going on, avoid causing further loss.
In technique scheme, preferably, described step 204 also comprises: realized by described centralized control district if perform step described at least one, and to perform step described at least one be realized by communication interface corresponding to described traffic operation, then judge that described active user is as authorized user, otherwise be judged to be disabled user.
In this technical scheme, when user can be set in traffic operation, must connected applications interface and centralized control district jointly carry out, especially when centralized control district resides on the screen interface of terminal, or after the application interface entering traffic operation, when centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, described step 206 also comprises: judge that whether described traffic operation is for sending communication information, if, then described information warning is added in described communication information, otherwise directly described information warning is sent to described destination object.
In this technical scheme, for in the situations such as note, mail, social network information, can produce communication information, such as destination object can receive short message content, Mail Contents or the social network information content etc. that can be used for showing, therefore information warning directly can be added in communication information.And in the situations such as call, then just send the signal of communication for being connected to the other side, the information content can not be transmitted, therefore information warning can be sent by modes such as independent note, mails, and destination object terminal can be resolved the content of the note received, mail etc., when parsing information warning, can directly show on call interface, to point out user in time.
In technique scheme, preferably, also comprise: according to the operation setting order received, arrange and operation is aroused to described centralized control district; And described step 204 also comprises: arouse with described the operational motion operating and match if detect, then arouse described centralized control district in the current interface of described terminal.
In this technical scheme, owing to must operate in conjunction with centralized control district, thus can arouse operation by User Defined to centralized control district, thus be conducive to promoting privacy.
In technique scheme, preferably, before described step 204, also comprise: according to the step setting command received, for the traffic operation in described terminal arranges at least one key operation step be associated; And in described step 204, if at least one execution step comprises described key operation step described in being realized by described centralized control district, then judge that described active user is as authorized user, otherwise be judged to be disabled user.
In this technical scheme, user can specify some or multiple step must realize in centralized control district, " dial-out " or " transmission " operation of such as final step, or other steps any in communication operations, user can be arranged according to the operating habit etc. of self, be convenient to user operation, and be conducive to promoting the validity of authentication and the safe coefficient of privacy of user.
By above technical scheme, effectively can verify the current user identity carrying out traffic operation, and not by informing the destination object of traffic operation during checking, be utilized by lawless person after losing to avoid user terminal.
Accompanying drawing explanation
Fig. 1 shows the block diagram of terminal according to an embodiment of the invention;
Fig. 2 shows the process flow diagram of the verification method of user identity according to an embodiment of the invention;
Fig. 3 A to Fig. 3 C shows the surface chart verified user identity according to an embodiment of the invention and warn;
Fig. 4 shows according to an embodiment of the invention to the process flow diagram that user identity is verified.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 1, terminal 100 according to an embodiment of the invention, comprising: area setting unit 102, arranges at least one centralized control district on the screen interface in described terminal 100; Region detection unit 104, for there is traffic operation in described terminal 100, detect in described traffic operation whether exist at least one perform step realized by described centralized control district; User identity judging unit 106, for the testing result at described region detection unit 104 for depositing in case, judging that active user is as authorized user, otherwise being judged to be disabled user; Information transmitting unit 108, for when described active user is disabled user, the destination object to described traffic operation sends information warning.
In this technical scheme, by the function i ntegration to operation, user does not need to find at the diverse location of whole terminal interface to control button or control area, all operations that can carry out for current interface or terminal 100 can be carried out in this centralized control district, user friendly operating process.Particularly, can obtain the operating function under the different interface of terminal 100 or already present functionality controls, so the whole or specified portions in aforesaid operations function or functionality controls (is generally that user commonly uses, can be arranged by factory default or User Defined), can by arranging corresponding virtual key in centralized control district, make user when choosing these virtual keys, original operating function can be realized equally, or after user marks corresponding gesture path in centralized control district, also can realize original function.Due to no matter, current interface is the function interface of standby interface or certain application program, centralized control district can be demonstrated on terminal interface, and in centralized control district, demonstrate the gesture path of virtual key or reception user, thus the control realized current interface, need not due to the change at interface and difference, make user have to carry out at the diverse location of screen the selection of function button, simplify user operation.Here precalculated position can be the default zone that system default or user are arranged.Here centralized control district can be single or multiple, can carry out arranging or automatically regulating according to the number of the setting of user, current action required function.It should be noted that, " setting " here does not represent and must show, as long as can receive the touch-control order of user.
Here traffic operation refers to there is sending of signal of communication, and there is specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone and called party, the destination object of note, mail etc. and addressee, the addressee's (such as the information-reply etc. of certain good friend) in the social network-i i-platform (such as sending out status information etc.) that the destination object of social network information and the webserver build or social networks.User can arrange such as in the process of whole traffic operation, at least must there is an operation to complete in centralized control district, or whole operating process all must complete in centralized control district, especially when centralized control district be not reside in terminal 100 screen interface on time, so disabled user is probably direct at the enterprising line operate of application interface, thus the identity sticked one's chin out, be convenient to real authorized user (as owner) and destination object is gone and found out what's going on, avoid causing further loss.
In technique scheme, preferably, also comprise: Interface detection unit 110, for traffic operation occurring in described terminal 100, detecting in described traffic operation and whether there is at least one to perform step be realized by communication interface corresponding to described traffic operation; Wherein, described user identity judging unit 106 is in the testing result of described region detection unit 104 and described Interface detection unit 110 to be deposited in case, judges that described active user is as authorized user, otherwise is judged to be disabled user.
In this technical scheme, when user can be set in traffic operation, must connected applications interface and centralized control district jointly carry out, especially when centralized control district resides on the screen interface of terminal, or after the application interface entering traffic operation, when centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, also comprise: communication type judging unit 112, for judging that whether described traffic operation is for sending communication information; Described information transmitting unit 108 comprises: information adds subelement 1082, for when the judged result of described communication type judging unit 112 is for being, is added into by described information warning in described communication information; Send and control subelement 1084, for when the judged result of described communication type judging unit 112 is no, directly described information warning is sent to described destination object.
In this technical scheme, for in the situations such as note, mail, social network information, can produce communication information, such as destination object can receive short message content, Mail Contents or the social network information content etc. that can be used for showing, therefore information warning directly can be added in communication information.And in the situations such as call, then just send the signal of communication for being connected to the other side, the information content can not be transmitted, therefore information warning can be sent by modes such as independent note, mails, and destination object terminal can be resolved the content of the note received, mail etc., when parsing information warning, can directly show on call interface, to point out user in time.
In technique scheme, preferably, also comprise: operation setting unit 114, for according to the operation setting order that receives, arrange and operation is aroused to described centralized control district; Unit 116 is aroused in region, for when detect with described arouse the operational motion operating and match, the current interface of described terminal 100 is aroused described centralized control district.
In this technical scheme, owing to must operate in conjunction with centralized control district, thus can arouse operation by User Defined to centralized control district, thus be conducive to promoting privacy.
In technique scheme, preferably, also comprise: step setting unit 118, for according to the step setting command received, for the traffic operation in described terminal 100 arranges at least one key operation step be associated; Wherein, described user identity judging unit 106, when at least one execution step comprises described key operation step described in being realized by described centralized control district, judges that described active user is as authorized user, otherwise is judged to be disabled user.
In this technical scheme, user can specify some or multiple step must realize in centralized control district, " dial-out " or " transmission " operation of such as final step, or other steps any in communication operations, user can be arranged according to the operating habit etc. of self, be convenient to user operation, and be conducive to promoting the validity of authentication and the safe coefficient of privacy of user.
Fig. 2 shows the process flow diagram of the verification method of user identity according to an embodiment of the invention.
As shown in Figure 2, the verification method of user identity, comprising: step 202 according to an embodiment of the invention, and the screen interface of terminal arranges at least one centralized control district; Step 204, when there is traffic operation in described terminal, being realized by described centralized control district if at least one of described traffic operation performs step, then judging that active user is as authorized user, otherwise be judged to be disabled user; Step 206, if described active user is disabled user, then the destination object to described traffic operation sends information warning.
In this technical scheme, by the function i ntegration to operation, user does not need to find at the diverse location of whole terminal interface to control button or control area, and all operations that can carry out for current interface or terminal can be carried out in this centralized control district, user friendly operating process.Particularly, can obtain the operating function under the different interface of terminal or already present functionality controls, so the whole or specified portions in aforesaid operations function or functionality controls (is generally that user commonly uses, can be arranged by factory default or User Defined), can by arranging corresponding virtual key in centralized control district, make user when choosing these virtual keys, original operating function can be realized equally, or after user marks corresponding gesture path in centralized control district, also can realize original function.Due to no matter, current interface is the function interface of standby interface or certain application program, centralized control district can be demonstrated on terminal interface, and in centralized control district, demonstrate the gesture path of virtual key or reception user, thus the control realized current interface, need not due to the change at interface and difference, make user have to carry out at the diverse location of screen the selection of function button, simplify user operation.Here precalculated position can be the default zone that system default or user are arranged.Here centralized control district can be single or multiple, can carry out arranging or automatically regulating according to the number of the setting of user, current action required function.It should be noted that, " setting " here does not represent and must show, as long as can receive the touch-control order of user.
Here traffic operation refers to there is sending of signal of communication, and there is specific aim object, such as phone, note, mail, social network information etc., wherein, the destination object of phone and called party, the destination object of note, mail etc. and addressee, the addressee's (such as the information-reply etc. of certain good friend) in the social network-i i-platform (such as sending out status information etc.) that the destination object of social network information and the webserver build or social networks.User can arrange such as in the process of whole traffic operation, at least must there is an operation to complete in centralized control district, or whole operating process all must complete in centralized control district, especially when centralized control district be not reside in terminal screen interface on time, so disabled user is probably direct at the enterprising line operate of application interface, thus the identity sticked one's chin out, be convenient to real authorized user (as owner) and destination object is gone and found out what's going on, avoid causing further loss.
In technique scheme, preferably, described step 204 also comprises: realized by described centralized control district if perform step described at least one, and to perform step described at least one be realized by communication interface corresponding to described traffic operation, then judge that described active user is as authorized user, otherwise be judged to be disabled user.
In this technical scheme, when user can be set in traffic operation, must connected applications interface and centralized control district jointly carry out, especially when centralized control district resides on the screen interface of terminal, or after the application interface entering traffic operation, when centralized control district meeting automatic spring, by certain operation complexity, promote the degree of functioning of checking.
In technique scheme, preferably, described step 206 also comprises: judge that whether described traffic operation is for sending communication information, if, then described information warning is added in described communication information, otherwise directly described information warning is sent to described destination object.
In this technical scheme, for in the situations such as note, mail, social network information, can produce communication information, such as destination object can receive short message content, Mail Contents or the social network information content etc. that can be used for showing, therefore information warning directly can be added in communication information.And in the situations such as call, then just send the signal of communication for being connected to the other side, the information content can not be transmitted, therefore information warning can be sent by modes such as independent note, mails, and destination object terminal can be resolved the content of the note received, mail etc., when parsing information warning, can directly show on call interface, to point out user in time.
In technique scheme, preferably, also comprise: according to the operation setting order received, arrange and operation is aroused to described centralized control district; And described step 204 also comprises: arouse with described the operational motion operating and match if detect, then arouse described centralized control district in the current interface of described terminal.
In this technical scheme, owing to must operate in conjunction with centralized control district, thus can arouse operation by User Defined to centralized control district, thus be conducive to promoting privacy.
In technique scheme, preferably, before described step 204, also comprise: according to the step setting command received, for the traffic operation in described terminal arranges at least one key operation step be associated; And in described step 204, if at least one execution step comprises described key operation step described in being realized by described centralized control district, then judge that described active user is as authorized user, otherwise be judged to be disabled user.
In this technical scheme, user can specify some or multiple step must realize in centralized control district, " dial-out " or " transmission " operation of such as final step, or other steps any in communication operations, user can be arranged according to the operating habit etc. of self, be convenient to user operation, and be conducive to promoting the validity of authentication and the safe coefficient of privacy of user.
Below in conjunction with Fig. 3 A to Fig. 3 C, for note and call, be described in detail to the subscriber authentication in communication operations and processing mode thereof, wherein, Fig. 3 A to Fig. 3 C shows the surface chart verified user identity according to an embodiment of the invention and warn.
Assuming that user sends note by terminal.As shown in Figure 3A, in the short message sending interface of terminal, centralized control district 302 is set, and based on the functionality controls 304A that short message sending interface configures originally, in centralized control district 302, configures identical functionality controls 304B.
First, centralized control district 302 is presented on short message sending interface automatically, also can be aroused after user input instruction.Obviously, the situation of manually arousing for needing user, personalized can arouse instruction, such as specific gesture path etc. by arranging, can guarantee that other people cannot arouse centralized control district 302 except the authorized user (owner) of terminal itself to a certain extent.
Simultaneously, if centralized control district 302 automatically occurs or after being aroused, user can carry out operation by means of only functionality controls 304A and control, and can carry out operation control by means of only functionality controls 304B, also can carry out operation control by binding function control 304A together with functionality controls 304B.
Based on above 2 points, then user can arrange the decision procedure of authentication, must be completed by centralized control district 302 as operated at least one times, or all operations all must be completed by centralized control district 302, or not only functionality controls 304A must be employed but also employ functionality controls 304B in the process of a short message sending, or the given step in the step of short message sending must be completed by centralized control district 302 (can be a step or multiple step, such as must click " transmission " in centralized control district 302) etc.
Can verify the identity of active user by the way.If the identity of active user is not by checking, then can add some information warnings in the note sent, thus relevant prompting is carried out to the destination object of communication.Specifically as shown in Figure 3 B, when the destination object communicated receives note, in short message content, with the addition of the information warning 306 of " doubtful disabled user ", to point out this destination object, avoid having dust thrown into the eyes.
Certainly, in the process for traffic operations such as making a phone call, because target terminal does not receive the content information of similar note etc., therefore, separately through the mode such as note, mail, information warning can be sent to target terminal.In a kind of situation, user by checking these note, mails etc. in communication process or after end of conversation, can go and find out what's going on; In another kind of situation, target terminal by detecting the content of note or mail etc., when finding to include information warning, can open this note or mail immediately in current interface, or adopting the mode shown in Fig. 3 C, extracting directly information warning 306 is also presented on call interface.
Fig. 4 shows according to an embodiment of the invention to the process flow diagram that user identity is verified.
As shown in Figure 4, according to an embodiment of the invention the flow process that user identity is verified is comprised:
Step 402, when carrying out traffic operation, enters relevant traffic operation interface, and judges whether user arouses centralized control district, if arouse, then enter step 404, otherwise enter step 410.The authorized user of terminal can by arranging the mode of arousing, thus avoid disabled user to arouse centralized control district.
Step 404, according to the situation of current interface, the functionality controls matched with it is shown in centralized control district, such as in short message sending interface, the functionality controls such as " transmission ", " interpolation annex " is set, in contact person interface, the functionality controls such as " sending short messages ", " dialing ", " editor " is set.
Step 406, judge user whether in centralized control district n-back test control.If so, then enter step 408, otherwise enter step 410.
Step 408, judges that active user is as authorized user, performs corresponding controlling functions, and does not send information warning.
Step 410, judges that active user is as disabled user, performs corresponding controlling functions, and sends information warning.
Certainly, in the determining step of step 406, also other judgment mode can be adopted, such as whether meet: operation must be completed by centralized control district at least one times, or all operations are all completed by centralized control district, or not only employ the functionality controls in current interface but also employ the functionality controls in centralized control district, or the one or more steps of specifying in whole operating process must be completed by centralized control district, thus make user identity and judging more accurately.
More than be described with reference to the accompanying drawings technical scheme of the present invention, consider in the related, face recognition, fingerprint recognition or other people body characteristics recognition technology are still in the stage of improving, discrimination is not high, therefore, the invention provides the verification method of a kind of terminal and a kind of user identity, effectively can verify the current user identity carrying out traffic operation, and not by informing the destination object of traffic operation during checking, utilized by lawless person after losing to avoid user terminal.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (6)

1. a demo plant for user identity, is characterized in that, comprising:
Area setting unit, for arranging at least one centralized control district on the screen interface of terminal;
Region detection unit, for there is traffic operation in described terminal, detect in described traffic operation whether exist at least one perform step realized by described centralized control district;
User identity judging unit, for the testing result at described region detection unit for depositing in case, judging that active user is as authorized user, otherwise being judged to be disabled user;
Information transmitting unit, for when described active user is disabled user, the destination object to described traffic operation sends information warning;
Interface detection unit, for traffic operation occurring in described terminal, detecting in described traffic operation and whether there is at least one to perform step be realized by communication interface corresponding to described traffic operation;
Wherein, described user identity judging unit is in the testing result of described region detection unit and described Interface detection unit to be deposited in case, judges that described active user is as authorized user, otherwise is judged to be disabled user;
The demo plant of described user identity also comprises:
Communication type judging unit, for judging that whether described traffic operation is for sending communication information;
Described information transmitting unit comprises:
Information adds subelement, for when the judged result of described communication type judging unit is for being, is added into by described information warning in described communication information;
Send and control subelement, for when the judged result of described communication type judging unit is no, directly described information warning is sent to described destination object; And
Described centralized control district comprises functionality controls, and wherein, described functionality controls is corresponding with described communication interface.
2. the demo plant of user identity according to claim 1, is characterized in that, also comprises:
Operation setting unit, for according to the operation setting order that receives, arranges and arouses operation to described centralized control district;
Unit is aroused in region, for when detect with described arouse the operational motion operating and match, the current interface of described terminal is aroused described centralized control district.
3. the demo plant of user identity according to claim 1, is characterized in that, also comprises:
Step setting unit, for according to the step setting command received, for the traffic operation in described terminal arranges at least one key operation step be associated;
Wherein, described user identity judging unit, when at least one execution step comprises described key operation step described in being realized by described centralized control district, judges that described active user is as authorized user, otherwise is judged to be disabled user.
4. a verification method for user identity, is characterized in that, comprising:
Step 202, the screen interface of terminal arranges at least one centralized control district;
Step 204, when there is traffic operation in described terminal, being realized by described centralized control district if at least one of described traffic operation performs step, then judging that active user is as authorized user, otherwise be judged to be disabled user;
Step 206, if described active user is disabled user, then the destination object to described traffic operation sends information warning;
Described step 204 also comprises:
If perform step described at least one to be realized by described centralized control district, and to perform step described at least one be realized by communication interface corresponding to described traffic operation, then judge that described active user is as authorized user, otherwise be judged to be disabled user;
Described step 206 also comprises:
Judge that whether described traffic operation is for sending communication information, is if so, then added into described information warning in described communication information, otherwise directly described information warning is sent to described destination object;
Described centralized control district comprises functionality controls, and wherein, described functionality controls is corresponding with described communication interface.
5. the verification method of user identity according to claim 4, is characterized in that, also comprises:
According to the operation setting order received, arrange and operation is aroused to described centralized control district; And
Described step 204 also comprises:
Arouse with described the operational motion operating and match if detect, then in the current interface of described terminal, arouse described centralized control district.
6. the verification method of user identity according to claim 4, is characterized in that, before described step 204, also comprises:
According to the step setting command received, for the traffic operation in described terminal arranges at least one key operation step be associated; And
In described step 204, if at least one execution step comprises described key operation step described in being realized by described centralized control district, then judge that described active user is as authorized user, otherwise be judged to be disabled user.
CN201210555400.XA 2012-12-19 2012-12-19 The verification method of terminal and user identity Expired - Fee Related CN103020503B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210555400.XA CN103020503B (en) 2012-12-19 2012-12-19 The verification method of terminal and user identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210555400.XA CN103020503B (en) 2012-12-19 2012-12-19 The verification method of terminal and user identity

Publications (2)

Publication Number Publication Date
CN103020503A CN103020503A (en) 2013-04-03
CN103020503B true CN103020503B (en) 2015-11-18

Family

ID=47969100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210555400.XA Expired - Fee Related CN103020503B (en) 2012-12-19 2012-12-19 The verification method of terminal and user identity

Country Status (1)

Country Link
CN (1) CN103020503B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331281A (en) * 2016-08-11 2017-01-11 努比亚技术有限公司 Mobile terminal and information processing method
CN109816935B (en) * 2019-03-18 2020-10-30 深圳市道格恒通科技有限公司 Drowning prevention prompting method and device and smart phone

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1798196A (en) * 2004-12-31 2006-07-05 乐金电子(中国)研究开发中心有限公司 Out-calling restriction setup method of mobile communication terminal
CN100337504C (en) * 2004-09-24 2007-09-12 华为技术有限公司 Intelligent alarming method of personal mobile terminal
CN101330692A (en) * 2008-07-29 2008-12-24 Tcl天一移动通信(深圳)有限公司 Mobile phone with lose-proof function and method for preventing mobile phone from losing
CN101707642A (en) * 2009-09-30 2010-05-12 宇龙计算机通信科技(深圳)有限公司 Intelligent antitheft method, terminal and system
CN102375949A (en) * 2010-08-18 2012-03-14 Lg电子株式会社 Mobile terminal and method for controlling method thereof

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001230858A (en) * 2000-02-17 2001-08-24 Mitsubishi Electric Corp Mobile phone system and mobile phone
CN100502599C (en) * 2003-10-10 2009-06-17 高延飞 Security management method for mobile phone
US7184750B2 (en) * 2004-03-30 2007-02-27 Nokia Corporation Smart terminal remote lock and format

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100337504C (en) * 2004-09-24 2007-09-12 华为技术有限公司 Intelligent alarming method of personal mobile terminal
CN1798196A (en) * 2004-12-31 2006-07-05 乐金电子(中国)研究开发中心有限公司 Out-calling restriction setup method of mobile communication terminal
CN101330692A (en) * 2008-07-29 2008-12-24 Tcl天一移动通信(深圳)有限公司 Mobile phone with lose-proof function and method for preventing mobile phone from losing
CN101707642A (en) * 2009-09-30 2010-05-12 宇龙计算机通信科技(深圳)有限公司 Intelligent antitheft method, terminal and system
CN102375949A (en) * 2010-08-18 2012-03-14 Lg电子株式会社 Mobile terminal and method for controlling method thereof

Also Published As

Publication number Publication date
CN103020503A (en) 2013-04-03

Similar Documents

Publication Publication Date Title
CN105631275B (en) information display method, information display device and terminal
CN105573623A (en) Help seeking method based on fingerprint identification
CN102780813A (en) Mobile terminal-based alarm method and system
CN204168365U (en) Mobile phone and car machine communication connecting system
CN104506711A (en) Communication information processing method and device for terminal
CN104348977A (en) Operating control method for mobile terminal, master terminal and slave terminal
CN107396328B (en) Calling method of terminal and related equipment
CN105744064A (en) Automatic communication help calling method, automatic communication help calling and terminal
CN105721699A (en) Method and system for switching driving mode of mobile terminal
EP3048824A1 (en) Call control method and system
CN106331982A (en) Position information indication method and system
CN103020503B (en) The verification method of terminal and user identity
CN104168361A (en) Communication method, communication device, server and communication system
CN105827785A (en) Method for establishing call connection, called terminal, and calling terminal
US20090111439A1 (en) System and method for monitoring a monitored mobile phone
CN104378482A (en) Mobile terminal address book updating method and system
CN105631281A (en) Control method and control device based on fingerprint recognition
CN106453880B (en) The method and mobile terminal of caller identification
CN108702422A (en) Call management method, device, managed devices and the server of No.1 multiple terminals
CN105915709A (en) Communication connection establishing method and terminal
CN105292020A (en) Vehicle control method, vehicle control device and terminal
CN108200540A (en) A kind of call answering method and device of communicating terminal
CN101098536A (en) Method for tracking a lost mobile station
WO2014169676A1 (en) Method and apparatus for information transmission
CN102905261A (en) Contact information authentication requesting and receiving method and clients

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151118

Termination date: 20211219