CN104077512A - Personnel information safety management method and management device - Google Patents
Personnel information safety management method and management device Download PDFInfo
- Publication number
- CN104077512A CN104077512A CN201310097034.2A CN201310097034A CN104077512A CN 104077512 A CN104077512 A CN 104077512A CN 201310097034 A CN201310097034 A CN 201310097034A CN 104077512 A CN104077512 A CN 104077512A
- Authority
- CN
- China
- Prior art keywords
- unlocking manner
- user
- personal information
- system desktop
- security management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention provides a personnel information safety management method, which is used for managing personnel information in a user terminal, and comprises the following steps that: an unlocking mode of the user terminal is set according to instructions input by a user, and the personnel information specified by the user is marked into hidden information; the unlocking action of the user is detected; whether an unlocking mode corresponding to the unlocking action of the user is a first unlocking mode or not is detected; if so, a screen is unlocked in the first unlocking mode, and the operation enters a first system desktop; and if not, the screen is unlocked in a second unlocking mode, and the operation enters the second system desktop. In addition, the invention also provides a management device. The personnel information safety management method and the management device have the advantages that the secret leakage risk is lower, and the individual privacy of the user can be more effectively protected.
Description
Technical field
The present invention relates to personal information security administrative skill, relate in particular to a kind of personal information security management method and management devices.
Background technology
Along with scientific and technological development, the status that the user terminals such as mobile phone occupy in people's life is also more and more important.But owing to often storing the individual privacy information that a large amount of users does not wish that others knows in mobile phone, will bring irremediable loss to user once reveal, therefore how effectively to protect the userspersonal information in mobile phone is a great problem of industry always.
In prior art, be generally to adopt the method for unlock password to protect cellphone subscriber's personal information security; but utilizing unlock password itself is exactly the one behavior of divulging a secret; in the time that cellphone subscriber passes through unlock password; its behavior just equals to tell the individual privacy information that has cellie in this mobile phone of people around; virtually improve the risk that mobile phone is divulged a secret, reduced the validity of personal information security management in mobile phone.Therefore, how to reduce the risk of divulging a secret of the user terminals such as mobile phone, the validity that improves the personal information security management in user terminal is current problem in the urgent need to address.
Summary of the invention
In view of this, the invention provides a kind of personal information security management method and management devices, there is the lower risk of divulging a secret, the validity of higher safety management.
A kind of personal information security management method, for the personal information of managing user terminal, comprise: the unlocking manner that described user terminal is set according to the instruction of user's input, the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner; Detect described user's release action; Whether corresponding unlocking manner is moved in the release that judges described user is described the first unlocking manner; If so, according to described the first unlocking manner unlock screen, enter the first system desktop, described the first system desktop not show tags is hiding personal information; And if not,, according to described the second unlocking manner unlock screen, enter second system desktop, described in showing, described second system desktop is labeled as hiding personal information.
A kind of personal information security management devices, comprise: unlocking manner and information arrange module, for unlocking manner being set according to the instruction of user's input, the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner; User's release motion detection module, for detecting described user's release action; Whether unlocking manner judge module is described the first unlocking manner for judging that corresponding unlocking manner is moved in the described user's that described user's release motion detection module detects release; The first system desktop handover module, if be yes for described unlocking manner judge module judged result,, according to described the first unlocking manner unlock screen, enters the first system desktop, and described the first system desktop not show tags is hiding personal information; And second system desktop handover module, if be no for described unlocking manner judge module judged result,, according to described the second unlocking manner unlock screen, enter described second system desktop, described in described second system desktop shows, be labeled as hiding personal information.
Personal information security management method and management devices that the embodiment of the present invention provides, enter different system desktop by different unlocking manner unlock screens, utilize different system desktop to show different user profile, the action of having avoided people except the current user of user terminal to input password by user knows in this user terminal, whether there is userspersonal information, thereby reduce userspersonal information's the risk of divulging a secret in user terminal, and then improved the validity of the personal information security management in user terminal.
For above and other object of the present invention, feature and advantage can be become apparent, preferred embodiment cited below particularly, and coordinate appended graphicly, be described in detail below.
Brief description of the drawings
The process flow diagram of the personal information security management method that Fig. 1 provides for first embodiment of the invention.
The schematic diagram of the first system desktop in the personal information security management method that Fig. 2 provides for first embodiment of the invention.
The schematic diagram of second system desktop in the personal information security management method that Fig. 3 provides for first embodiment of the invention.
The process flow diagram of the personal information security management method that Fig. 4 provides for second embodiment of the invention.
The structural representation of the personal information security management devices that Fig. 5 provides for third embodiment of the invention.
The structural representation of the personal information security management devices that Fig. 6 provides for fourth embodiment of the invention.
Embodiment
Technological means and effect of taking for realizing predetermined goal of the invention for further setting forth the present invention, below in conjunction with accompanying drawing and preferred embodiment, to according to the specific embodiment of the present invention, structure, feature and effect thereof, be described in detail as follows.
The personal information security management method that the embodiment of the present invention provides can be applicable to the safety management of realization to the personal information in user terminal in user terminal, user terminal can comprise smart mobile phone, panel computer, E-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert compression standard audio frequency aspect 3), MP4(Moving Picture Experts Group Audio Layer IV, dynamic image expert compression standard audio frequency aspect 4) player, pocket computer on knee and desk-top computer etc.
The first embodiment
The process flow diagram of the personal information security management method that Fig. 1 provides for the first embodiment.As shown in Figure 1, the personal information security management method of the present embodiment comprises the following steps:
Step S11, the instruction of inputting according to user arranges the unlocking manner of described user terminal, and the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner.
The unlocking manner arranging according to the instruction of user's input is used for unlock screen in the time of user terminal screen screen locking, can comprise recognition of face unlocking manner, unlock password mode, fingerprint recognition unlocking manner, Application on Voiceprint Recognition unlocking manner, graphic code unlocking manner and gesture unlocking manner etc.In the embodiment of the present invention, user terminal can, according at least two kinds of different unlocking manners of instruction setting of user's input, comprise the first unlocking manner and the second unlocking manner.
Be understandable that, in other embodiments of the present invention, the first unlocking manner and the second unlocking manner can be also two groups of different unlocking pins.
Be understandable that, in other embodiments of the present invention, user terminal also can arrange two or more different unlocking manners according to the instruction of user's input.
Personal information refer to the owner of user terminal privately owned do not wish any information of being known by other people, can comprise: picture, note, audio frequency, text, address list, message registration etc.The above-mentioned any one or several information flags that user terminal can be specified user according to the instruction of user's input are for hiding, and being marked as hiding personal information will only show in particular system desktop.
Step S12, detects described user's release action.
Described user's release action can be two kinds, also i.e. the first release action and the second release action.Wherein, the first release action is corresponding with the first unlocking manner, the second release action is corresponding with the second unlocking manner, user terminal can be according to the corresponding relation of the default release action of user's instruction and unlocking manner, for example, user terminal can be set to the first unlocking manner according to user instruction slip gesture unlocking manner, and the action of user's touch screen is set to the release action corresponding with the first unlocking manner; Face recognition unlocking manner is set to the second unlocking manner, and the shooting shortcut action that user presses on user terminal is set to the release action corresponding with the second unlocking manner etc.Concrete set-up mode can change according to the hardware condition of user terminal, and the specific embodiment of the present invention is not as limit.
In other embodiments of the present invention, if the first unlocking manner and the second unlocking manner are two groups of different unlocking pins, it is simultaneously corresponding with the first unlocking manner and the second unlocking manner that user terminal can arrange a kind of release action according to the instruction of user's input.
Step S13, whether corresponding unlocking manner is moved in the release that judges described user is described the first unlocking manner.
User terminal judges according to the user's who detects in step S12 release action whether the unlocking manner that user selects is the first unlocking manner.For example, suppose user terminal in step S11 according to the gesture release that is set to slide of user instruction the first unlocking manner, the action of user's touch screen is set to the release action corresponding with the first unlocking manner,, in the time detecting the release action of user's touch screen, user terminal can be judged user according to the release action detecting and wish by slip gesture unlocking manner to be also that the first unlocking manner carrys out unlock screen.
If so, perform step S14: according to described the first unlocking manner unlock screen, enter the first system desktop, described the first system desktop not show tags is hiding personal information.
If it is the first unlocking manner that corresponding unlocking manner is moved in the release that judged result is user, user terminal is according to the first unlocking manner unlock screen arranging in step S11, for example, suppose that the first unlocking manner that user terminal arranges in step S11 is face recognition unlocking manner, move corresponding unlocking manner while being face recognition unlocking manner when judging user's release, the facial photo that user terminal calls camera takes user, and the facial photo photographing and default release photo are compared, if consistent, unlock screen, and enter the first system desktop.
The first system desktop can be for example conventional system desktop, corresponding with the first unlocking manner, only shows routine information on the first system desktop, and routine information can comprise that unmarked is the popular software information in hiding userspersonal information and user terminal.As shown in Figure 2, do not show and be labeled as hiding userspersonal information as my picture, my note, my application etc. at the first system desktop.When user terminal enters after the first system desktop; user can carry out with the first system desktop in the information-related operation that shows; because now desktop does not show and is marked as hiding userspersonal information; so the current operation person of user terminal also just cannot learn that the owner of user terminal does not want the personal information that allows other people know; thereby effectively protect the possessory individual privacy of user terminal, and then realized the safety management to user terminal personal information.
If not, perform step S15: according to described the second unlocking manner unlock screen, enter second system desktop, described in described second system desktop shows, be labeled as hiding personal information.
Second system desktop is special system desktop, corresponding with second system desktop, shows all information in user terminal on second system desktop.As shown in Figure 3, in second system desktop, can show that all information in user terminal comprise is labeled as hiding personal information as my picture, my note, my application etc., unmarked for other all information in hiding personal information and user terminal etc.When user terminal enters after second system desktop, can use all functions of this user terminal, see possessory all personal information of this user terminal.
It should be noted that, when user enters after second system desktop, user terminal acquiescence is to hide user at the newly-built personal information automatic mark of second system desktop, thus, in the time that entering the first system desktop again, user cannot see that user is in the newly-built personal information of second system desktop, therefore simplify user the operation of hiding userspersonal information has manually been set, thereby improved the convenience of userspersonal information's safety management in user terminal.
The personal information security management method that the embodiment of the present invention provides, enter different system desktop by different unlocking manner unlock screens, different system desktop shows different user profile, the action of having avoided people except the current user of user terminal to input password by user knows in this user terminal, whether there is userspersonal information, thereby reduce userspersonal information's the risk of divulging a secret in user terminal, and then improved the validity of the personal information security management in user terminal.
The second embodiment
The process flow diagram of the personal information security management method that Fig. 4 provides for second embodiment of the invention.As shown in Figure 4, the personal information security management method of the present embodiment comprises the following steps:
Step S21, response user's start-up command, starts described user terminal, enters described the first system desktop.
In embodiments of the present invention, user terminal responds after user's start-up command startup each time, all enter the first system desktop, also after i.e. each start, user terminal is not all hiding personal information to current user's show tags of user terminal, so can avoid the illegal user of user terminal to obtain the user's of user terminal personal information by the mode of switching on and shutting down, thereby improve the validity of the personal information security management in user terminal.
Step S22, according to the default initial password and instruction setting of user input or revise the unlocking manner of described user terminal, the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner.
User terminal receives the Modify password of user's input, and the Modify password receiving and default initial password are compared, if consistent, receives the instruction setting of user's input or the unlocking manner of amendment user terminal.Obtain the authority of amendment unlocking manner by input password, can avoid the illegal user of user terminal to obtain by revising the method for the second unlocking manner the authority that enters second system desktop, thereby further improve the validity of the personal information security management in user terminal.
Step S23, detects described user's release action.
This step can, with reference to the corresponding steps in the first embodiment, repeat no more here.
Step S24, whether corresponding unlocking manner is moved in the release that judges described user is described the first unlocking manner.
This step can, with reference to the corresponding steps in the first embodiment, repeat no more here.
If so, perform step S25, according to described the first unlocking manner unlock screen, enter the first system desktop, described the first system desktop not show tags is hiding personal information.
This step can, with reference to the corresponding steps in the first embodiment, repeat no more here.
If not, perform step S26, according to described the second unlocking manner unlock screen, enter second system desktop, described in described second system desktop shows, be labeled as hiding personal information.
This step can, with reference to the corresponding steps in the first embodiment, repeat no more here.
The personal information security management method that the embodiment of the present invention provides, enter different system desktop by different unlocking manner unlock screens, different system desktop shows different user profile, the action of having avoided people except the current user of user terminal to input password by user knows in this user terminal, whether there is userspersonal information, thereby reduce userspersonal information's the risk of divulging a secret in user terminal, and then improved the validity of the personal information security management in user terminal.
The 3rd embodiment
The structural representation of the personal information security management devices that Fig. 5 provides for the 3rd embodiment.The personal information security management devices that the present embodiment provides can be for realizing the personal information security management method in the first embodiment.As shown in Figure 5, personal information security management devices 10 comprises that unlocking manner and information arrange module 11, user's release motion detection module 12, unlocking manner judge module 13, the first system desktop handover module 14, second system desktop handover module 15.
Wherein, unlocking manner and information arrange module 11 for unlocking manner being set according to the instruction of user's input, and the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner.User's release motion detection module 12 is for detecting described user's release action.Whether unlocking manner judge module 13 moves corresponding unlocking manner for the described user's that judges described user's release motion detection module and detect release is described the first unlocking manner.If described unlocking manner judge module 13 judged results are yes, the first system desktop handover module 14, according to described the first unlocking manner unlock screen, enters the first system desktop, and described the first system desktop not show tags is hiding personal information.If described unlocking manner judge module 13 judged results are no, second system desktop handover module 15, according to described the second unlocking manner unlock screen, enters described second system desktop, described in described second system desktop shows, is labeled as hiding personal information.
Preferably, unlocking manner can comprise recognition of face unlocking manner, unlock password mode, fingerprint recognition unlocking manner, Application on Voiceprint Recognition unlocking manner, graphic code unlocking manner and gesture unlocking manner.Preferably, the first unlocking manner and the second unlocking manner can be also two groups of different unlocking pins.
Each Implement of Function Module of the present embodiment personal information security management devices 10 detailed process of function separately, refers to the particular content of above-mentioned Fig. 1 and middle description embodiment illustrated in fig. 2, repeats no more herein.
The personal information security management devices that the embodiment of the present invention provides, enter different system desktop by different unlocking manner unlock screens, different system desktop shows different user profile, the action of having avoided people except the current user of user terminal to input password by user knows in this user terminal, whether there is userspersonal information, thereby reduce userspersonal information's the risk of divulging a secret in user terminal, and then improved the validity of the personal information security management in user terminal.
The 4th embodiment
The structural representation of the personal information security management devices that Fig. 6 provides for the 4th embodiment.The personal information security management devices that the present embodiment provides can be for realizing the personal information security management method in the second embodiment.As shown in Figure 6, personal information security management devices 20 comprises that unlocking manner and information arrange module 21, user's release motion detection module 22, unlocking manner judge module 23, the first system desktop handover module 24, second system desktop handover module 25, start module 26, mark module 27, unlocking manner modified module 28.
Wherein, unlocking manner and information arrange module 21 for unlocking manner being set according to the instruction of user's input, and the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner.User's release motion detection module 22 is for detecting described user's release action.Whether unlocking manner judge module 23 moves corresponding unlocking manner for the described user's that judges described user's release motion detection module and detect release is described the first unlocking manner.If described unlocking manner judge module 23 judged results are yes, the first system desktop handover module 24, according to described the first unlocking manner unlock screen, enters the first system desktop, and described the first system desktop not show tags is hiding personal information.If described unlocking manner judge module 23 judged results are no, second system desktop handover module 25, according to described the second unlocking manner unlock screen, enters described second system desktop, described in described second system desktop shows, is labeled as hiding personal information.Start module 26 for starting described mobile device, enter described the first system desktop.Mark module 27 is for being labeled as hiding by described user in the newly-built personal information of described second system desktop.Unlocking manner modified module 28 is for revising described unlocking manner according to the default initial password of described user's input.
Each Implement of Function Module of the present embodiment personal information security management devices 20 detailed process of function separately, refers to the particular content of above-mentioned Fig. 1 and middle description embodiment illustrated in fig. 2, repeats no more herein.
The personal information security management devices that the embodiment of the present invention provides, enter different system desktop by different unlocking manner unlock screens, different system desktop shows different user profile, the action of having avoided people except the current user of user terminal to input password by user knows in this user terminal, whether there is userspersonal information, thereby reduce userspersonal information's the risk of divulging a secret in user terminal, and then improved the validity of the personal information security management in user terminal.
It should be noted that, each embodiment in this instructions all adopts the mode of going forward one by one to describe, and what each embodiment stressed is and the difference of other embodiment, between each embodiment identical similar part mutually referring to.For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part is referring to the part explanation of embodiment of the method.
It should be noted that, in this article, relational terms such as the first and second grades is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply and between these entities or operation, have the relation of any this reality or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby the process, method, article or the device that make to comprise a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or be also included as the intrinsic key element of this process, method, article or device.The in the situation that of more restrictions not, the key element being limited by statement " comprising ... ", and be not precluded within process, method, article or the device that comprises described key element and also have other identical element.
One of ordinary skill in the art will appreciate that all or part of step that realizes above-described embodiment can complete by hardware, also can carry out the hardware that instruction is relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
The above, it is only preferred embodiment of the present invention, not the present invention is done to any pro forma restriction, although the present invention discloses as above with preferred embodiment, but not in order to limit the present invention, any those skilled in the art, do not departing within the scope of technical solution of the present invention, when can utilizing the technology contents of above-mentioned announcement to make a little change or being modified to the equivalent embodiment of equivalent variations, in every case be not depart from technical solution of the present invention content, any simple modification of above embodiment being done according to technical spirit of the present invention, equivalent variations and modification, all still belong in the scope of technical solution of the present invention.
Claims (10)
1. a personal information security management method, for the personal information of managing user terminal, is characterized in that, comprising:
The unlocking manner that described user terminal is set according to the instruction of user's input, the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner;
Detect described user's release action;
Whether corresponding unlocking manner is moved in the release that judges described user is described the first unlocking manner;
If so, according to described the first unlocking manner unlock screen, enter the first system desktop, described the first system desktop not show tags is hiding personal information; And
If not,, according to described the second unlocking manner unlock screen, enter second system desktop, described in described second system desktop shows, be labeled as hiding personal information.
2. personal information security management method as claimed in claim 1, it is characterized in that, before being set in the described instruction according to user input, the step of unlocking manner also comprises: response user's start-up command, start described user terminal, and enter described the first system desktop.
3. personal information security management method as claimed in claim 1, is characterized in that, described method also comprises:
Described user is labeled as hiding in the newly-built personal information of described second system desktop.
4. personal information security management method as claimed in claim 1, is characterized in that, described method also comprises: revise described unlocking manner according to the default initial password of described user's input.
5. the personal information security management method as described in claim 1 to 4 any one, it is characterized in that, described unlocking manner at least comprises the one in following unlocking manner: recognition of face unlocking manner, unlock password mode, fingerprint recognition unlocking manner, Application on Voiceprint Recognition unlocking manner, graphic code unlocking manner and gesture unlocking manner.
6. a personal information security management devices, is characterized in that, comprising:
Unlocking manner and information arrange module, and for unlocking manner being set according to the instruction of user's input, the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner;
User's release motion detection module, for detecting described user's release action;
Whether unlocking manner judge module is described the first unlocking manner for judging that corresponding unlocking manner is moved in the described user's that described user's release motion detection module detects release;
The first system desktop handover module, if described unlocking manner judge module judged result is yes, described the first system desktop handover module, according to described the first unlocking manner unlock screen, enters the first system desktop, and described the first system desktop not show tags is hiding personal information; And
Second system desktop handover module, if described unlocking manner judge module judged result is no, described second system desktop handover module, according to described the second unlocking manner unlock screen, enters described second system desktop, described in described second system desktop shows, is labeled as hiding personal information.
7. personal information security management devices as claimed in claim 6, is characterized in that, described device also comprises startup module, for starting described mobile device, enters described the first system desktop.
8. personal information security management devices as claimed in claim 6, is characterized in that, described device also comprises mark module, for described user is labeled as hiding in the newly-built personal information of described second system desktop.
9. personal information security management devices as claimed in claim 6, is characterized in that, described device also comprises unlocking manner modified module, for revising described unlocking manner according to the default initial password of described user's input.
10. the personal information security management devices as described in claim 6 to 9 any one, it is characterized in that, described unlocking manner at least comprises the one in following unlocking manner: recognition of face unlocking manner, unlock password mode, fingerprint recognition unlocking manner, Application on Voiceprint Recognition unlocking manner, graphic code unlocking manner and gesture unlocking manner.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310097034.2A CN104077512B (en) | 2013-03-25 | 2013-03-25 | Personal information security management method and managing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310097034.2A CN104077512B (en) | 2013-03-25 | 2013-03-25 | Personal information security management method and managing device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104077512A true CN104077512A (en) | 2014-10-01 |
CN104077512B CN104077512B (en) | 2016-07-06 |
Family
ID=51598763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310097034.2A Active CN104077512B (en) | 2013-03-25 | 2013-03-25 | Personal information security management method and managing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104077512B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104158947A (en) * | 2014-07-30 | 2014-11-19 | 张剑文 | Mobile phone privacy protecting system |
CN104317517A (en) * | 2014-10-23 | 2015-01-28 | 苏州天平先进数字科技有限公司 | Touch screen terminal hidden unlocking method and system |
CN104318183A (en) * | 2014-11-18 | 2015-01-28 | 南京酷派软件技术有限公司 | Processing method and device for communication information of terminal |
CN105630277A (en) * | 2015-06-02 | 2016-06-01 | 南京酷派软件技术有限公司 | Screen unlocking method and unlocking device for terminal |
CN105989302A (en) * | 2015-02-27 | 2016-10-05 | 赵绩琪 | Multimode unlocking and multilevel privacy protection method based on intelligent terminal |
CN106548167A (en) * | 2016-12-09 | 2017-03-29 | 北京小米移动软件有限公司 | A kind of method and device of hiden application |
CN107092836A (en) * | 2017-03-29 | 2017-08-25 | 北京洋浦伟业科技发展有限公司 | A kind of data guard method and device based on system encryption |
CN107480501A (en) * | 2017-08-21 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | Unlocking method, mobile terminal and storage medium based on dual system |
CN107633197A (en) * | 2016-07-19 | 2018-01-26 | 仟融科技股份有限公司 | Method for passing authentication by fingerprint identification |
CN108008883A (en) * | 2016-10-31 | 2018-05-08 | 成都卫士通信息产业股份有限公司 | A kind of domain switch method of unlock interface, domain switching system and intelligent terminal |
CN108197454A (en) * | 2018-01-30 | 2018-06-22 | 努比亚技术有限公司 | A kind of method of access application, equipment and computer readable storage medium |
CN108460256A (en) * | 2018-01-18 | 2018-08-28 | 北京珠穆朗玛移动通信有限公司 | Data guard method, mobile terminal and device |
US10073959B2 (en) | 2015-06-19 | 2018-09-11 | International Business Machines Corporation | Secure authentication of users of devices using tactile and voice sequencing with feedback |
CN108769386A (en) * | 2018-05-03 | 2018-11-06 | 河海大学常州校区 | A kind of adaptive unlocking manner selection method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107124506A (en) * | 2017-04-12 | 2017-09-01 | 广东欧珀移动通信有限公司 | Unlocking method, device and mobile terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201360282Y (en) * | 2008-11-30 | 2009-12-09 | 青岛海信移动通信技术股份有限公司 | Mobile terminal keyboard locking device and mobile terminal with same |
CN101980131A (en) * | 2010-10-29 | 2011-02-23 | 东莞宇龙通信科技有限公司 | Unlocking method, system and communication terminal |
CN102375651A (en) * | 2010-08-13 | 2012-03-14 | Tcl集团股份有限公司 | Method for unlocking portable electronic equipment |
-
2013
- 2013-03-25 CN CN201310097034.2A patent/CN104077512B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201360282Y (en) * | 2008-11-30 | 2009-12-09 | 青岛海信移动通信技术股份有限公司 | Mobile terminal keyboard locking device and mobile terminal with same |
CN102375651A (en) * | 2010-08-13 | 2012-03-14 | Tcl集团股份有限公司 | Method for unlocking portable electronic equipment |
CN101980131A (en) * | 2010-10-29 | 2011-02-23 | 东莞宇龙通信科技有限公司 | Unlocking method, system and communication terminal |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104158947A (en) * | 2014-07-30 | 2014-11-19 | 张剑文 | Mobile phone privacy protecting system |
CN104317517A (en) * | 2014-10-23 | 2015-01-28 | 苏州天平先进数字科技有限公司 | Touch screen terminal hidden unlocking method and system |
CN104317517B (en) * | 2014-10-23 | 2018-02-06 | 苏州天平先进数字科技有限公司 | A kind of touch screen terminal hides unlocking method and system |
CN104318183A (en) * | 2014-11-18 | 2015-01-28 | 南京酷派软件技术有限公司 | Processing method and device for communication information of terminal |
CN105989302A (en) * | 2015-02-27 | 2016-10-05 | 赵绩琪 | Multimode unlocking and multilevel privacy protection method based on intelligent terminal |
CN105630277A (en) * | 2015-06-02 | 2016-06-01 | 南京酷派软件技术有限公司 | Screen unlocking method and unlocking device for terminal |
CN105630277B (en) * | 2015-06-02 | 2018-11-30 | 南京酷派软件技术有限公司 | Unlocking screen method and tripper for terminal |
US10073959B2 (en) | 2015-06-19 | 2018-09-11 | International Business Machines Corporation | Secure authentication of users of devices using tactile and voice sequencing with feedback |
CN107633197A (en) * | 2016-07-19 | 2018-01-26 | 仟融科技股份有限公司 | Method for passing authentication by fingerprint identification |
CN108008883A (en) * | 2016-10-31 | 2018-05-08 | 成都卫士通信息产业股份有限公司 | A kind of domain switch method of unlock interface, domain switching system and intelligent terminal |
CN106548167A (en) * | 2016-12-09 | 2017-03-29 | 北京小米移动软件有限公司 | A kind of method and device of hiden application |
CN107092836A (en) * | 2017-03-29 | 2017-08-25 | 北京洋浦伟业科技发展有限公司 | A kind of data guard method and device based on system encryption |
CN107480501A (en) * | 2017-08-21 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | Unlocking method, mobile terminal and storage medium based on dual system |
CN108460256A (en) * | 2018-01-18 | 2018-08-28 | 北京珠穆朗玛移动通信有限公司 | Data guard method, mobile terminal and device |
CN108197454A (en) * | 2018-01-30 | 2018-06-22 | 努比亚技术有限公司 | A kind of method of access application, equipment and computer readable storage medium |
CN108769386A (en) * | 2018-05-03 | 2018-11-06 | 河海大学常州校区 | A kind of adaptive unlocking manner selection method |
Also Published As
Publication number | Publication date |
---|---|
CN104077512B (en) | 2016-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104077512A (en) | Personnel information safety management method and management device | |
RU2666314C2 (en) | User terminal apparatus and corresponding control method | |
CN103108082B (en) | Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system | |
CN104077534B (en) | For providing the method and apparatus of the secret page | |
CN103023649A (en) | Method, device and equipment for protecting privacy information | |
US9483633B2 (en) | Method and terminal for authenticating a stlyus | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
CN105760737A (en) | Control method for applications and terminal | |
CN103902881A (en) | Method for managing security for applications and an electronic device thereof | |
CN101667234A (en) | Locking state conversion method, electronic device and computer program product | |
CN103902862A (en) | Mobile device management method and device and mobile device | |
CN102883050A (en) | Mobile terminal and unlocking method thereof | |
CN102693391A (en) | Display method and electronic equipment | |
CN104834460A (en) | Desktop display control method and device and mobile terminal | |
CN106203011A (en) | The method and apparatus entering operating system desktop | |
WO2017008415A1 (en) | Apparatus and method for launching mobile applications from a lock screen | |
CN105701420A (en) | Method for managing user data and terminal | |
CN103324875A (en) | Data protection system and method | |
CN104184874A (en) | Method for switching mobile phone modes based on multiple unlocking conditions, and mobile phone thereof | |
CN109376545A (en) | Method for secret protection and device | |
CN103294386B (en) | Electronic device and locking/unlocking method | |
KR20130082979A (en) | User personalized recommendation system based on fingerprint identification | |
CN104134024A (en) | Mobile terminal privacy protection method and system | |
CN104301539A (en) | Information protecting method | |
CN110581921B (en) | Control method and device for folding screen equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |