CN103391349B - Method of keeping secrets of terminal and terminal - Google Patents

Method of keeping secrets of terminal and terminal Download PDF

Info

Publication number
CN103391349B
CN103391349B CN201210142145.6A CN201210142145A CN103391349B CN 103391349 B CN103391349 B CN 103391349B CN 201210142145 A CN201210142145 A CN 201210142145A CN 103391349 B CN103391349 B CN 103391349B
Authority
CN
China
Prior art keywords
information
terminal
user
protected
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210142145.6A
Other languages
Chinese (zh)
Other versions
CN103391349A (en
Inventor
梁王乐文
叶飞
刘亮
王曦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201210142145.6A priority Critical patent/CN103391349B/en
Publication of CN103391349A publication Critical patent/CN103391349A/en
Application granted granted Critical
Publication of CN103391349B publication Critical patent/CN103391349B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to the field of safety of a terminal device and provides a method for keeping secrets of a terminal. The method for keeping the secrets of the terminal includes the following steps that a password is set on the terminal and stored; the terminal obtains a user fingerprint by identifying the user fingerprint and stores the user fingerprint; information needing protection is selected as required and stored and the information needing protection is stored The invention provides the terminal. According to the technical scheme, the method for keeping the secrets of the terminal and the terminal can protect user privacy, greatly improve user experiences and achieve true information protection without any hiding presentation.

Description

A kind of terminal realizes the method for secrecy, terminal
Technical field
The present invention relates to terminal unit security technology area, particularly a kind of method of terminal realization secrecy, terminal.
Background technology
Along with the popularization of mobile Internet and smart mobile phone, the safety issue of mobile phone also increasingly highlights.Wireless interconnected The development of net has promoted the quantity using mobile terminal Internet accesses such as mobile phones quickly to increase, the particularly fast sale of smart mobile phone, people Got more and more using the mobile phone time of staying on the internet, the affairs of process also increase therewith, and the increase of mobile phone importance allows User creates great concern to the safety problem of mobile phone.Information security has become the thing of cellphone subscriber's worry.
Most of mobile phones pass through cryptoguard individual privacy at present, also have the mode using fingerprint to protect individual privacy.Mesh On front market, mobile phone is user setup cell phone password by the scheme of cryptoguard safety, after inputting accurate cell phone password, Related cellphone information can demonstrate nothing left.Mobile phone is user setup finger-print cipher by the scheme of cryptoguard safety, works as user After finger-print cipher coupling, related cellphone information can demonstrate nothing left.
The all not hommizations of above two scheme method, if after the correct password of user input or fingerprint, related Cellphone information can demonstrate nothing left, can not fundamentally protect individual privacy.
As can be seen that both the above scheme is not preferred plan, reason is as follows:
The first scheme:After other people obtain cell phone password, all of information on mobile phone can be checked, for example:Important Customer data, important note, mail etc..
Second scheme:The friend of head of a family or understanding allows after mobile phone owner input finger-print cipher, equally can look into See the mobile phone upper all of information.For example:Friend plays for a long time and be unwilling to give back after finding interesting game on mobile phone, and affects to use Family uses mobile phone etc..
Content of the invention
Present invention solves the technical problem that there are provided a kind of method that terminal realizes secrecy, to solve user in input After password or fingerprint, related cellphone information can demonstrate nothing left, and can fundamentally protect the problem of individual privacy;The present invention Additionally provide a kind of terminal.
For solving the above problems, the invention provides a kind of method that terminal realizes secrecy, including,
Password is arranged on terminal and is preserved;
Terminal passes through identifying user fingerprint, is preserved after obtaining user fingerprints;
Select as needed to need information to be protected, and preserve the need of selection information to be protected
In user input password, backstage is acquired to the fingerprint of user and contrasts, and shifts to an earlier date facilities according to user Show corresponding information.
Further, methods described also includes,
After user input password, terminal-pair is than the password of the password inputting and setting, if unanimously entering next step, no Then prompting user cipher is incorrect;
Terminal obtains user fingerprints information, the finger print information of acquisition is contrasted with the finger print information preserving before, such as Fruit unanimously then calls the protected information of storage and shows, does not otherwise show protected information.
Above-mentioned method, wherein, the need information to be protected of described selection is the whole part applied or apply of terminal.
Present invention also offers a kind of terminal, including,
Encrypted message control module, for providing user to be configured password;
Encrypted message memory module, for preserving the password of user setup;
Finger print information control module, for being identified to the fingerprint of user input;
Finger print information memory module, for preserving the user fingerprints obtaining;
Protected information access module, selects to need information to be protected for setting;
Protected information preserving module, for preserving the need information to be protected selecting as needed;
Wherein, in user input password, backstage is acquired to the fingerprint of user and contrasts, and is arranged in advance according to user Situation shows corresponding information.
Further, described terminal also includes,
Encrypted message control module, for the password that after user input password, contrast inputs and the password arranging, if Consistent then call finger print information control module, otherwise prompting user cipher is incorrect;
Finger print information control module, for obtaining user fingerprints information, by the finger print information of acquisition and the finger preserving before Stricture of vagina information is contrasted, if consistent, call protected information access module, does not otherwise show protected information;
Protected information access module, shows, for calling, the protected information preserving in protected information preserving module.
Above-mentioned terminal, wherein, the need information to be protected of described selection is the whole part applied or apply of terminal.
Using technical scheme, when user input password, backstage is acquired to the fingerprint of user, right Shift to an earlier date facilities according to user shows corresponding cellphone information to ratio, not only protects privacy of user, also substantially increases user Experience, achieves real information protection under the presentation of " not having any hiding ".
Brief description
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the present invention, this Bright schematic description and description is used for explaining the present invention, does not constitute inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is first embodiment of the invention flow chart;
Fig. 2 is second embodiment of the invention structure chart.
Specific embodiment
In order that the technical problem to be solved, technical scheme and beneficial effect are clearer, clear, below tie Close drawings and Examples, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only In order to explain the present invention, it is not intended to limit the present invention.
As shown in figure 1, being first embodiment of the invention flow chart, there is provided a kind of method that terminal realizes secrecy, specifically Including,
Step S101, arranges password in terminal and is preserved;
Step S102, terminal passes through identifying user fingerprint, is preserved after obtaining user fingerprints;
Step S103, selects to need information to be protected as needed, and the need information to be protected selecting is preserved.
The part that this shielded information can entirely be applied or apply, for example game the inside " indignation little Bird ", " Very Important Person business card " inside contact person etc..
Further, as an embodiment, the method also includes,
Step S104, user input password, terminal-pair than input password with setting password, if unanimously entering next Step, otherwise prompting user cipher is incorrect;
As an embodiment, this step also can be individually present, and now, after user input password, terminal-pair is than input Password and the password of setting, if consistent, enter end-user interface, now and never call the protected information of storage, no Then prompting user cipher is incorrect;
Step S105, terminal obtains user fingerprints information, and the finger print information of acquisition is entered with the finger print information preserving before Row contrast, if consistent, call the protected information of storage and shows, otherwise do not show protected information.
As shown in Fig. 2 being second embodiment of the invention structure chart, there is provided a kind of terminal, including,
Encrypted message control module, for providing user to be configured password;
Encrypted message memory module, for preserving the password of user setup;
Finger print information control module, for being identified to the fingerprint of user input;
Finger print information memory module, for preserving the user fingerprints obtaining;
Protected information access module, selects to need information to be protected for setting;
Protected information preserving module, for preserving the need information to be protected selecting as needed.
Described terminal also includes,
Encrypted message control module, for the password that after user input password, contrast inputs and the password arranging, if Consistent then call finger print information control module, otherwise prompting user cipher is incorrect;
Alternatively, encrypted message control module, after user input password, terminal-pair is than the password of input With the password of setting, if consistent, enter end-user interface, now and never call the protected information of storage, otherwise point out User cipher is incorrect;
Finger print information control module, for obtaining user fingerprints information, by the finger print information of acquisition and the finger preserving before Stricture of vagina information is contrasted, if consistent, call protected information access module, does not otherwise show protected information;
Protected information access module, shows, for calling, the protected information preserving in protected information preserving module.
Described above illustrate and describes a preferred embodiment of the present invention, but as previously mentioned it should be understood that the present invention Be not limited to form disclosed herein, be not to be taken as the exclusion to other embodiment, and can be used for various other combinations, Modification and environment, and can be in invention contemplated scope described herein, by technology or the knowledge of above-mentioned teaching or association area It is modified.And the change that those skilled in the art are carried out and change without departing from the spirit and scope of the present invention, then all should be at this In the protection domain of bright claims.

Claims (6)

1. a kind of terminal realizes the method for secrecy it is characterised in that including,
Password is arranged on terminal and is preserved;
Terminal passes through identifying user fingerprint, is preserved after obtaining user fingerprints;
Select as needed to need information to be protected, and preserve the need of selection information to be protected;
In user input password, backstage is acquired to the fingerprint of user and contrasts, and shifts to an earlier date facilities according to user and shows Corresponding information;
After user input password, terminal-pair, than the password of the password inputting and setting, if unanimously, enters terminal use circle Face, now and never call the protected information of storage.
2. method according to claim 1 is it is characterised in that methods described also includes,
If the password of input is inconsistent with the password of setting, point out user cipher incorrect
Terminal obtains user fingerprints information, and the finger print information of acquisition is contrasted with the finger print information preserving before, if one Cause then to call the protected information of storage and show, otherwise do not show protected information.
3. method according to claim 1 and 2 is it is characterised in that the need of described selection information to be protected is that terminal is whole Individual application or a part for application.
4. a kind of terminal it is characterised in that include,
Encrypted message control module, for providing user to be configured password;
Encrypted message memory module, for preserving the password of user setup;
Finger print information control module, for being identified to the fingerprint of user input;
Finger print information memory module, for preserving the user fingerprints obtaining;
Protected information access module, selects to need information to be protected for setting;
Protected information preserving module, for preserving the need information to be protected selecting as needed;
Wherein, in user input password, backstage is acquired to the fingerprint of user and contrasts, and shifts to an earlier date facilities according to user Show corresponding information;
Wherein, encrypted message control module, after user input password, terminal-pair than input password with setting password, such as Fruit is consistent, then enter end-user interface, now and never call the protected information of storage.
5. terminal according to claim 4 is it is characterised in that encrypted message control module, if the password for input Then prompting user cipher inconsistent with the password of setting is incorrect;
Finger print information control module, for obtaining user fingerprints information, by the finger print information of acquisition and the fingerprint letter preserving before Breath is contrasted, if consistent, call protected information access module, does not otherwise show protected information;
Protected information access module, shows, for calling, the protected information preserving in protected information preserving module.
6. the terminal according to claim 4 or 5 is it is characterised in that the need of described selection information to be protected is that terminal is whole Individual application or a part for application.
CN201210142145.6A 2012-05-09 2012-05-09 Method of keeping secrets of terminal and terminal Active CN103391349B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210142145.6A CN103391349B (en) 2012-05-09 2012-05-09 Method of keeping secrets of terminal and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210142145.6A CN103391349B (en) 2012-05-09 2012-05-09 Method of keeping secrets of terminal and terminal

Publications (2)

Publication Number Publication Date
CN103391349A CN103391349A (en) 2013-11-13
CN103391349B true CN103391349B (en) 2017-02-15

Family

ID=49535503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210142145.6A Active CN103391349B (en) 2012-05-09 2012-05-09 Method of keeping secrets of terminal and terminal

Country Status (1)

Country Link
CN (1) CN103391349B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106170794A (en) * 2015-03-18 2016-11-30 华为技术有限公司 A kind of information processing method and mobile terminal
CN106339640A (en) * 2016-08-29 2017-01-18 四川格锐乾图科技有限公司 Anti-leakage double-system computer capable of effectively testing safety performance
CN106326729A (en) * 2016-08-29 2017-01-11 四川格锐乾图科技有限公司 Intelligently-locked computer software secret leakage prevention system
CN106407775A (en) * 2016-08-29 2017-02-15 四川格锐乾图科技有限公司 Leak-proof software protection system with upgraded CPU for data
CN106355067A (en) * 2016-08-29 2017-01-25 四川格锐乾图科技有限公司 Software-based leak-proof communication system effectively preventing data loss
CN106357866B (en) * 2016-09-27 2019-08-20 维沃移动通信有限公司 A kind of book management method and mobile intelligent terminal
CN106771446B (en) * 2016-11-28 2019-12-31 国网山东省电力公司济宁供电公司 Intelligent ammeter box, electric quantity information display method and alarm system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1975789A (en) * 2006-12-22 2007-06-06 重庆交通大学 Multifunction entrance guard, monitoring and alarming comprehensive system
CN101017584A (en) * 2007-01-04 2007-08-15 凌敬连 Method of fingerprint anti-theft used in bank deposit
CN101035335A (en) * 2007-02-13 2007-09-12 中电通信科技有限责任公司 Mobile phone privacy protection method
CN101483861A (en) * 2008-12-17 2009-07-15 北京亿企通信息技术有限公司 Method for mobile phone information safety protection
CN102034060A (en) * 2010-12-23 2011-04-27 东莞宇龙通信科技有限公司 Method and system for controlling operation access, and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101549558B1 (en) * 2009-03-18 2015-09-03 엘지전자 주식회사 Mobile terminal and control method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1975789A (en) * 2006-12-22 2007-06-06 重庆交通大学 Multifunction entrance guard, monitoring and alarming comprehensive system
CN101017584A (en) * 2007-01-04 2007-08-15 凌敬连 Method of fingerprint anti-theft used in bank deposit
CN101035335A (en) * 2007-02-13 2007-09-12 中电通信科技有限责任公司 Mobile phone privacy protection method
CN101483861A (en) * 2008-12-17 2009-07-15 北京亿企通信息技术有限公司 Method for mobile phone information safety protection
CN102034060A (en) * 2010-12-23 2011-04-27 东莞宇龙通信科技有限公司 Method and system for controlling operation access, and mobile terminal

Also Published As

Publication number Publication date
CN103391349A (en) 2013-11-13

Similar Documents

Publication Publication Date Title
CN103391349B (en) Method of keeping secrets of terminal and terminal
CN104657674B (en) The insulation blocking system and method for private data in a kind of mobile phone
CN103324893B (en) The method and apparatus of secret protection
CN105068974B (en) Information processing method and electronic equipment
CN105120047B (en) The display methods and terminal of a kind of caller id information
CN104184705B (en) Verification method, device, server, subscriber data center and system
CN106534572A (en) Information display method and device and terminal
CN105988896B (en) The backup method and device of a kind of mobile terminal data
CN102710847A (en) Method for managing access of multiple visitors to mobile terminal
CN103678962B (en) The method, apparatus and terminal of managing personal information
CN102223447B (en) Method for hiding short message content and method for viewing short message and hidden short message
CN101827148A (en) Fingerprint identification system applied to mobile phone and operating method thereof
US9455985B2 (en) Method for secure key injection with biometric sensors
CN103559451A (en) Method and device for protecting and displaying privacy information
CN106797561A (en) A kind of identity identifying method and wearable device
CN106790926A (en) A kind of contact management method and terminal
CN104200171B (en) A kind of Virtual File System based on Information hiding
CN108509803B (en) A kind of display methods and terminal device of application icon
CN106096437A (en) A kind of certificate card managing device and method
CN103645838A (en) Mobile terminal and unlocking method thereof
TWI581602B (en) Mobile phone with hidden information and hiding method thereof
CN103533180A (en) Set contact calling based method for unlocking mobile phone
CN102883323B (en) A kind of method and apparatus of protection mobile terminal user's private data
CN107133507A (en) A kind of privacy services system access method, device and mobile terminal
CN106648583A (en) Information processing method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant