CN103391349B - Method of keeping secrets of terminal and terminal - Google Patents
Method of keeping secrets of terminal and terminal Download PDFInfo
- Publication number
- CN103391349B CN103391349B CN201210142145.6A CN201210142145A CN103391349B CN 103391349 B CN103391349 B CN 103391349B CN 201210142145 A CN201210142145 A CN 201210142145A CN 103391349 B CN103391349 B CN 103391349B
- Authority
- CN
- China
- Prior art keywords
- information
- terminal
- user
- protected
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention relates to the field of safety of a terminal device and provides a method for keeping secrets of a terminal. The method for keeping the secrets of the terminal includes the following steps that a password is set on the terminal and stored; the terminal obtains a user fingerprint by identifying the user fingerprint and stores the user fingerprint; information needing protection is selected as required and stored and the information needing protection is stored The invention provides the terminal. According to the technical scheme, the method for keeping the secrets of the terminal and the terminal can protect user privacy, greatly improve user experiences and achieve true information protection without any hiding presentation.
Description
Technical field
The present invention relates to terminal unit security technology area, particularly a kind of method of terminal realization secrecy, terminal.
Background technology
Along with the popularization of mobile Internet and smart mobile phone, the safety issue of mobile phone also increasingly highlights.Wireless interconnected
The development of net has promoted the quantity using mobile terminal Internet accesses such as mobile phones quickly to increase, the particularly fast sale of smart mobile phone, people
Got more and more using the mobile phone time of staying on the internet, the affairs of process also increase therewith, and the increase of mobile phone importance allows
User creates great concern to the safety problem of mobile phone.Information security has become the thing of cellphone subscriber's worry.
Most of mobile phones pass through cryptoguard individual privacy at present, also have the mode using fingerprint to protect individual privacy.Mesh
On front market, mobile phone is user setup cell phone password by the scheme of cryptoguard safety, after inputting accurate cell phone password,
Related cellphone information can demonstrate nothing left.Mobile phone is user setup finger-print cipher by the scheme of cryptoguard safety, works as user
After finger-print cipher coupling, related cellphone information can demonstrate nothing left.
The all not hommizations of above two scheme method, if after the correct password of user input or fingerprint, related
Cellphone information can demonstrate nothing left, can not fundamentally protect individual privacy.
As can be seen that both the above scheme is not preferred plan, reason is as follows:
The first scheme:After other people obtain cell phone password, all of information on mobile phone can be checked, for example:Important
Customer data, important note, mail etc..
Second scheme:The friend of head of a family or understanding allows after mobile phone owner input finger-print cipher, equally can look into
See the mobile phone upper all of information.For example:Friend plays for a long time and be unwilling to give back after finding interesting game on mobile phone, and affects to use
Family uses mobile phone etc..
Content of the invention
Present invention solves the technical problem that there are provided a kind of method that terminal realizes secrecy, to solve user in input
After password or fingerprint, related cellphone information can demonstrate nothing left, and can fundamentally protect the problem of individual privacy;The present invention
Additionally provide a kind of terminal.
For solving the above problems, the invention provides a kind of method that terminal realizes secrecy, including,
Password is arranged on terminal and is preserved;
Terminal passes through identifying user fingerprint, is preserved after obtaining user fingerprints;
Select as needed to need information to be protected, and preserve the need of selection information to be protected
In user input password, backstage is acquired to the fingerprint of user and contrasts, and shifts to an earlier date facilities according to user
Show corresponding information.
Further, methods described also includes,
After user input password, terminal-pair is than the password of the password inputting and setting, if unanimously entering next step, no
Then prompting user cipher is incorrect;
Terminal obtains user fingerprints information, the finger print information of acquisition is contrasted with the finger print information preserving before, such as
Fruit unanimously then calls the protected information of storage and shows, does not otherwise show protected information.
Above-mentioned method, wherein, the need information to be protected of described selection is the whole part applied or apply of terminal.
Present invention also offers a kind of terminal, including,
Encrypted message control module, for providing user to be configured password;
Encrypted message memory module, for preserving the password of user setup;
Finger print information control module, for being identified to the fingerprint of user input;
Finger print information memory module, for preserving the user fingerprints obtaining;
Protected information access module, selects to need information to be protected for setting;
Protected information preserving module, for preserving the need information to be protected selecting as needed;
Wherein, in user input password, backstage is acquired to the fingerprint of user and contrasts, and is arranged in advance according to user
Situation shows corresponding information.
Further, described terminal also includes,
Encrypted message control module, for the password that after user input password, contrast inputs and the password arranging, if
Consistent then call finger print information control module, otherwise prompting user cipher is incorrect;
Finger print information control module, for obtaining user fingerprints information, by the finger print information of acquisition and the finger preserving before
Stricture of vagina information is contrasted, if consistent, call protected information access module, does not otherwise show protected information;
Protected information access module, shows, for calling, the protected information preserving in protected information preserving module.
Above-mentioned terminal, wherein, the need information to be protected of described selection is the whole part applied or apply of terminal.
Using technical scheme, when user input password, backstage is acquired to the fingerprint of user, right
Shift to an earlier date facilities according to user shows corresponding cellphone information to ratio, not only protects privacy of user, also substantially increases user
Experience, achieves real information protection under the presentation of " not having any hiding ".
Brief description
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the present invention, this
Bright schematic description and description is used for explaining the present invention, does not constitute inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is first embodiment of the invention flow chart;
Fig. 2 is second embodiment of the invention structure chart.
Specific embodiment
In order that the technical problem to be solved, technical scheme and beneficial effect are clearer, clear, below tie
Close drawings and Examples, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only
In order to explain the present invention, it is not intended to limit the present invention.
As shown in figure 1, being first embodiment of the invention flow chart, there is provided a kind of method that terminal realizes secrecy, specifically
Including,
Step S101, arranges password in terminal and is preserved;
Step S102, terminal passes through identifying user fingerprint, is preserved after obtaining user fingerprints;
Step S103, selects to need information to be protected as needed, and the need information to be protected selecting is preserved.
The part that this shielded information can entirely be applied or apply, for example game the inside " indignation little
Bird ", " Very Important Person business card " inside contact person etc..
Further, as an embodiment, the method also includes,
Step S104, user input password, terminal-pair than input password with setting password, if unanimously entering next
Step, otherwise prompting user cipher is incorrect;
As an embodiment, this step also can be individually present, and now, after user input password, terminal-pair is than input
Password and the password of setting, if consistent, enter end-user interface, now and never call the protected information of storage, no
Then prompting user cipher is incorrect;
Step S105, terminal obtains user fingerprints information, and the finger print information of acquisition is entered with the finger print information preserving before
Row contrast, if consistent, call the protected information of storage and shows, otherwise do not show protected information.
As shown in Fig. 2 being second embodiment of the invention structure chart, there is provided a kind of terminal, including,
Encrypted message control module, for providing user to be configured password;
Encrypted message memory module, for preserving the password of user setup;
Finger print information control module, for being identified to the fingerprint of user input;
Finger print information memory module, for preserving the user fingerprints obtaining;
Protected information access module, selects to need information to be protected for setting;
Protected information preserving module, for preserving the need information to be protected selecting as needed.
Described terminal also includes,
Encrypted message control module, for the password that after user input password, contrast inputs and the password arranging, if
Consistent then call finger print information control module, otherwise prompting user cipher is incorrect;
Alternatively, encrypted message control module, after user input password, terminal-pair is than the password of input
With the password of setting, if consistent, enter end-user interface, now and never call the protected information of storage, otherwise point out
User cipher is incorrect;
Finger print information control module, for obtaining user fingerprints information, by the finger print information of acquisition and the finger preserving before
Stricture of vagina information is contrasted, if consistent, call protected information access module, does not otherwise show protected information;
Protected information access module, shows, for calling, the protected information preserving in protected information preserving module.
Described above illustrate and describes a preferred embodiment of the present invention, but as previously mentioned it should be understood that the present invention
Be not limited to form disclosed herein, be not to be taken as the exclusion to other embodiment, and can be used for various other combinations,
Modification and environment, and can be in invention contemplated scope described herein, by technology or the knowledge of above-mentioned teaching or association area
It is modified.And the change that those skilled in the art are carried out and change without departing from the spirit and scope of the present invention, then all should be at this
In the protection domain of bright claims.
Claims (6)
1. a kind of terminal realizes the method for secrecy it is characterised in that including,
Password is arranged on terminal and is preserved;
Terminal passes through identifying user fingerprint, is preserved after obtaining user fingerprints;
Select as needed to need information to be protected, and preserve the need of selection information to be protected;
In user input password, backstage is acquired to the fingerprint of user and contrasts, and shifts to an earlier date facilities according to user and shows
Corresponding information;
After user input password, terminal-pair, than the password of the password inputting and setting, if unanimously, enters terminal use circle
Face, now and never call the protected information of storage.
2. method according to claim 1 is it is characterised in that methods described also includes,
If the password of input is inconsistent with the password of setting, point out user cipher incorrect
Terminal obtains user fingerprints information, and the finger print information of acquisition is contrasted with the finger print information preserving before, if one
Cause then to call the protected information of storage and show, otherwise do not show protected information.
3. method according to claim 1 and 2 is it is characterised in that the need of described selection information to be protected is that terminal is whole
Individual application or a part for application.
4. a kind of terminal it is characterised in that include,
Encrypted message control module, for providing user to be configured password;
Encrypted message memory module, for preserving the password of user setup;
Finger print information control module, for being identified to the fingerprint of user input;
Finger print information memory module, for preserving the user fingerprints obtaining;
Protected information access module, selects to need information to be protected for setting;
Protected information preserving module, for preserving the need information to be protected selecting as needed;
Wherein, in user input password, backstage is acquired to the fingerprint of user and contrasts, and shifts to an earlier date facilities according to user
Show corresponding information;
Wherein, encrypted message control module, after user input password, terminal-pair than input password with setting password, such as
Fruit is consistent, then enter end-user interface, now and never call the protected information of storage.
5. terminal according to claim 4 is it is characterised in that encrypted message control module, if the password for input
Then prompting user cipher inconsistent with the password of setting is incorrect;
Finger print information control module, for obtaining user fingerprints information, by the finger print information of acquisition and the fingerprint letter preserving before
Breath is contrasted, if consistent, call protected information access module, does not otherwise show protected information;
Protected information access module, shows, for calling, the protected information preserving in protected information preserving module.
6. the terminal according to claim 4 or 5 is it is characterised in that the need of described selection information to be protected is that terminal is whole
Individual application or a part for application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210142145.6A CN103391349B (en) | 2012-05-09 | 2012-05-09 | Method of keeping secrets of terminal and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210142145.6A CN103391349B (en) | 2012-05-09 | 2012-05-09 | Method of keeping secrets of terminal and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103391349A CN103391349A (en) | 2013-11-13 |
CN103391349B true CN103391349B (en) | 2017-02-15 |
Family
ID=49535503
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210142145.6A Active CN103391349B (en) | 2012-05-09 | 2012-05-09 | Method of keeping secrets of terminal and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103391349B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106170794A (en) * | 2015-03-18 | 2016-11-30 | 华为技术有限公司 | A kind of information processing method and mobile terminal |
CN106339640A (en) * | 2016-08-29 | 2017-01-18 | 四川格锐乾图科技有限公司 | Anti-leakage double-system computer capable of effectively testing safety performance |
CN106326729A (en) * | 2016-08-29 | 2017-01-11 | 四川格锐乾图科技有限公司 | Intelligently-locked computer software secret leakage prevention system |
CN106407775A (en) * | 2016-08-29 | 2017-02-15 | 四川格锐乾图科技有限公司 | Leak-proof software protection system with upgraded CPU for data |
CN106355067A (en) * | 2016-08-29 | 2017-01-25 | 四川格锐乾图科技有限公司 | Software-based leak-proof communication system effectively preventing data loss |
CN106357866B (en) * | 2016-09-27 | 2019-08-20 | 维沃移动通信有限公司 | A kind of book management method and mobile intelligent terminal |
CN106771446B (en) * | 2016-11-28 | 2019-12-31 | 国网山东省电力公司济宁供电公司 | Intelligent ammeter box, electric quantity information display method and alarm system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1975789A (en) * | 2006-12-22 | 2007-06-06 | 重庆交通大学 | Multifunction entrance guard, monitoring and alarming comprehensive system |
CN101017584A (en) * | 2007-01-04 | 2007-08-15 | 凌敬连 | Method of fingerprint anti-theft used in bank deposit |
CN101035335A (en) * | 2007-02-13 | 2007-09-12 | 中电通信科技有限责任公司 | Mobile phone privacy protection method |
CN101483861A (en) * | 2008-12-17 | 2009-07-15 | 北京亿企通信息技术有限公司 | Method for mobile phone information safety protection |
CN102034060A (en) * | 2010-12-23 | 2011-04-27 | 东莞宇龙通信科技有限公司 | Method and system for controlling operation access, and mobile terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101549558B1 (en) * | 2009-03-18 | 2015-09-03 | 엘지전자 주식회사 | Mobile terminal and control method thereof |
-
2012
- 2012-05-09 CN CN201210142145.6A patent/CN103391349B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1975789A (en) * | 2006-12-22 | 2007-06-06 | 重庆交通大学 | Multifunction entrance guard, monitoring and alarming comprehensive system |
CN101017584A (en) * | 2007-01-04 | 2007-08-15 | 凌敬连 | Method of fingerprint anti-theft used in bank deposit |
CN101035335A (en) * | 2007-02-13 | 2007-09-12 | 中电通信科技有限责任公司 | Mobile phone privacy protection method |
CN101483861A (en) * | 2008-12-17 | 2009-07-15 | 北京亿企通信息技术有限公司 | Method for mobile phone information safety protection |
CN102034060A (en) * | 2010-12-23 | 2011-04-27 | 东莞宇龙通信科技有限公司 | Method and system for controlling operation access, and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN103391349A (en) | 2013-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103391349B (en) | Method of keeping secrets of terminal and terminal | |
CN104657674B (en) | The insulation blocking system and method for private data in a kind of mobile phone | |
CN103324893B (en) | The method and apparatus of secret protection | |
CN105068974B (en) | Information processing method and electronic equipment | |
CN105120047B (en) | The display methods and terminal of a kind of caller id information | |
CN104184705B (en) | Verification method, device, server, subscriber data center and system | |
CN106534572A (en) | Information display method and device and terminal | |
CN105988896B (en) | The backup method and device of a kind of mobile terminal data | |
CN102710847A (en) | Method for managing access of multiple visitors to mobile terminal | |
CN103678962B (en) | The method, apparatus and terminal of managing personal information | |
CN102223447B (en) | Method for hiding short message content and method for viewing short message and hidden short message | |
CN101827148A (en) | Fingerprint identification system applied to mobile phone and operating method thereof | |
US9455985B2 (en) | Method for secure key injection with biometric sensors | |
CN103559451A (en) | Method and device for protecting and displaying privacy information | |
CN106797561A (en) | A kind of identity identifying method and wearable device | |
CN106790926A (en) | A kind of contact management method and terminal | |
CN104200171B (en) | A kind of Virtual File System based on Information hiding | |
CN108509803B (en) | A kind of display methods and terminal device of application icon | |
CN106096437A (en) | A kind of certificate card managing device and method | |
CN103645838A (en) | Mobile terminal and unlocking method thereof | |
TWI581602B (en) | Mobile phone with hidden information and hiding method thereof | |
CN103533180A (en) | Set contact calling based method for unlocking mobile phone | |
CN102883323B (en) | A kind of method and apparatus of protection mobile terminal user's private data | |
CN107133507A (en) | A kind of privacy services system access method, device and mobile terminal | |
CN106648583A (en) | Information processing method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |