CN104077512A - Personnel information safety management method and management device - Google Patents

Personnel information safety management method and management device Download PDF

Info

Publication number
CN104077512A
CN104077512A CN201310097034.2A CN201310097034A CN104077512A CN 104077512 A CN104077512 A CN 104077512A CN 201310097034 A CN201310097034 A CN 201310097034A CN 104077512 A CN104077512 A CN 104077512A
Authority
CN
China
Prior art keywords
unlocking manner
user
personal information
system desktop
security management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310097034.2A
Other languages
Chinese (zh)
Other versions
CN104077512B (en
Inventor
叶颖华
侯月姣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310097034.2A priority Critical patent/CN104077512B/en
Publication of CN104077512A publication Critical patent/CN104077512A/en
Application granted granted Critical
Publication of CN104077512B publication Critical patent/CN104077512B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a personnel information safety management method, which is used for managing personnel information in a user terminal, and comprises the following steps that: an unlocking mode of the user terminal is set according to instructions input by a user, and the personnel information specified by the user is marked into hidden information; the unlocking action of the user is detected; whether an unlocking mode corresponding to the unlocking action of the user is a first unlocking mode or not is detected; if so, a screen is unlocked in the first unlocking mode, and the operation enters a first system desktop; and if not, the screen is unlocked in a second unlocking mode, and the operation enters the second system desktop. In addition, the invention also provides a management device. The personnel information safety management method and the management device have the advantages that the secret leakage risk is lower, and the individual privacy of the user can be more effectively protected.

Description

Personal information security management method and management devices
Technical field
The present invention relates to personal information security administrative skill, relate in particular to a kind of personal information security management method and management devices.
Background technology
Along with scientific and technological development, the status that the user terminals such as mobile phone occupy in people's life is also more and more important.But owing to often storing the individual privacy information that a large amount of users does not wish that others knows in mobile phone, will bring irremediable loss to user once reveal, therefore how effectively to protect the userspersonal information in mobile phone is a great problem of industry always.
In prior art, be generally to adopt the method for unlock password to protect cellphone subscriber's personal information security; but utilizing unlock password itself is exactly the one behavior of divulging a secret; in the time that cellphone subscriber passes through unlock password; its behavior just equals to tell the individual privacy information that has cellie in this mobile phone of people around; virtually improve the risk that mobile phone is divulged a secret, reduced the validity of personal information security management in mobile phone.Therefore, how to reduce the risk of divulging a secret of the user terminals such as mobile phone, the validity that improves the personal information security management in user terminal is current problem in the urgent need to address.
Summary of the invention
In view of this, the invention provides a kind of personal information security management method and management devices, there is the lower risk of divulging a secret, the validity of higher safety management.
A kind of personal information security management method, for the personal information of managing user terminal, comprise: the unlocking manner that described user terminal is set according to the instruction of user's input, the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner; Detect described user's release action; Whether corresponding unlocking manner is moved in the release that judges described user is described the first unlocking manner; If so, according to described the first unlocking manner unlock screen, enter the first system desktop, described the first system desktop not show tags is hiding personal information; And if not,, according to described the second unlocking manner unlock screen, enter second system desktop, described in showing, described second system desktop is labeled as hiding personal information.
A kind of personal information security management devices, comprise: unlocking manner and information arrange module, for unlocking manner being set according to the instruction of user's input, the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner; User's release motion detection module, for detecting described user's release action; Whether unlocking manner judge module is described the first unlocking manner for judging that corresponding unlocking manner is moved in the described user's that described user's release motion detection module detects release; The first system desktop handover module, if be yes for described unlocking manner judge module judged result,, according to described the first unlocking manner unlock screen, enters the first system desktop, and described the first system desktop not show tags is hiding personal information; And second system desktop handover module, if be no for described unlocking manner judge module judged result,, according to described the second unlocking manner unlock screen, enter described second system desktop, described in described second system desktop shows, be labeled as hiding personal information.
Personal information security management method and management devices that the embodiment of the present invention provides, enter different system desktop by different unlocking manner unlock screens, utilize different system desktop to show different user profile, the action of having avoided people except the current user of user terminal to input password by user knows in this user terminal, whether there is userspersonal information, thereby reduce userspersonal information's the risk of divulging a secret in user terminal, and then improved the validity of the personal information security management in user terminal.
For above and other object of the present invention, feature and advantage can be become apparent, preferred embodiment cited below particularly, and coordinate appended graphicly, be described in detail below.
Brief description of the drawings
The process flow diagram of the personal information security management method that Fig. 1 provides for first embodiment of the invention.
The schematic diagram of the first system desktop in the personal information security management method that Fig. 2 provides for first embodiment of the invention.
The schematic diagram of second system desktop in the personal information security management method that Fig. 3 provides for first embodiment of the invention.
The process flow diagram of the personal information security management method that Fig. 4 provides for second embodiment of the invention.
The structural representation of the personal information security management devices that Fig. 5 provides for third embodiment of the invention.
The structural representation of the personal information security management devices that Fig. 6 provides for fourth embodiment of the invention.
Embodiment
Technological means and effect of taking for realizing predetermined goal of the invention for further setting forth the present invention, below in conjunction with accompanying drawing and preferred embodiment, to according to the specific embodiment of the present invention, structure, feature and effect thereof, be described in detail as follows.
The personal information security management method that the embodiment of the present invention provides can be applicable to the safety management of realization to the personal information in user terminal in user terminal, user terminal can comprise smart mobile phone, panel computer, E-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert compression standard audio frequency aspect 3), MP4(Moving Picture Experts Group Audio Layer IV, dynamic image expert compression standard audio frequency aspect 4) player, pocket computer on knee and desk-top computer etc.
The first embodiment
The process flow diagram of the personal information security management method that Fig. 1 provides for the first embodiment.As shown in Figure 1, the personal information security management method of the present embodiment comprises the following steps:
Step S11, the instruction of inputting according to user arranges the unlocking manner of described user terminal, and the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner.
The unlocking manner arranging according to the instruction of user's input is used for unlock screen in the time of user terminal screen screen locking, can comprise recognition of face unlocking manner, unlock password mode, fingerprint recognition unlocking manner, Application on Voiceprint Recognition unlocking manner, graphic code unlocking manner and gesture unlocking manner etc.In the embodiment of the present invention, user terminal can, according at least two kinds of different unlocking manners of instruction setting of user's input, comprise the first unlocking manner and the second unlocking manner.
Be understandable that, in other embodiments of the present invention, the first unlocking manner and the second unlocking manner can be also two groups of different unlocking pins.
Be understandable that, in other embodiments of the present invention, user terminal also can arrange two or more different unlocking manners according to the instruction of user's input.
Personal information refer to the owner of user terminal privately owned do not wish any information of being known by other people, can comprise: picture, note, audio frequency, text, address list, message registration etc.The above-mentioned any one or several information flags that user terminal can be specified user according to the instruction of user's input are for hiding, and being marked as hiding personal information will only show in particular system desktop.
Step S12, detects described user's release action.
Described user's release action can be two kinds, also i.e. the first release action and the second release action.Wherein, the first release action is corresponding with the first unlocking manner, the second release action is corresponding with the second unlocking manner, user terminal can be according to the corresponding relation of the default release action of user's instruction and unlocking manner, for example, user terminal can be set to the first unlocking manner according to user instruction slip gesture unlocking manner, and the action of user's touch screen is set to the release action corresponding with the first unlocking manner; Face recognition unlocking manner is set to the second unlocking manner, and the shooting shortcut action that user presses on user terminal is set to the release action corresponding with the second unlocking manner etc.Concrete set-up mode can change according to the hardware condition of user terminal, and the specific embodiment of the present invention is not as limit.
In other embodiments of the present invention, if the first unlocking manner and the second unlocking manner are two groups of different unlocking pins, it is simultaneously corresponding with the first unlocking manner and the second unlocking manner that user terminal can arrange a kind of release action according to the instruction of user's input.
Step S13, whether corresponding unlocking manner is moved in the release that judges described user is described the first unlocking manner.
User terminal judges according to the user's who detects in step S12 release action whether the unlocking manner that user selects is the first unlocking manner.For example, suppose user terminal in step S11 according to the gesture release that is set to slide of user instruction the first unlocking manner, the action of user's touch screen is set to the release action corresponding with the first unlocking manner,, in the time detecting the release action of user's touch screen, user terminal can be judged user according to the release action detecting and wish by slip gesture unlocking manner to be also that the first unlocking manner carrys out unlock screen.
If so, perform step S14: according to described the first unlocking manner unlock screen, enter the first system desktop, described the first system desktop not show tags is hiding personal information.
If it is the first unlocking manner that corresponding unlocking manner is moved in the release that judged result is user, user terminal is according to the first unlocking manner unlock screen arranging in step S11, for example, suppose that the first unlocking manner that user terminal arranges in step S11 is face recognition unlocking manner, move corresponding unlocking manner while being face recognition unlocking manner when judging user's release, the facial photo that user terminal calls camera takes user, and the facial photo photographing and default release photo are compared, if consistent, unlock screen, and enter the first system desktop.
The first system desktop can be for example conventional system desktop, corresponding with the first unlocking manner, only shows routine information on the first system desktop, and routine information can comprise that unmarked is the popular software information in hiding userspersonal information and user terminal.As shown in Figure 2, do not show and be labeled as hiding userspersonal information as my picture, my note, my application etc. at the first system desktop.When user terminal enters after the first system desktop; user can carry out with the first system desktop in the information-related operation that shows; because now desktop does not show and is marked as hiding userspersonal information; so the current operation person of user terminal also just cannot learn that the owner of user terminal does not want the personal information that allows other people know; thereby effectively protect the possessory individual privacy of user terminal, and then realized the safety management to user terminal personal information.
If not, perform step S15: according to described the second unlocking manner unlock screen, enter second system desktop, described in described second system desktop shows, be labeled as hiding personal information.
Second system desktop is special system desktop, corresponding with second system desktop, shows all information in user terminal on second system desktop.As shown in Figure 3, in second system desktop, can show that all information in user terminal comprise is labeled as hiding personal information as my picture, my note, my application etc., unmarked for other all information in hiding personal information and user terminal etc.When user terminal enters after second system desktop, can use all functions of this user terminal, see possessory all personal information of this user terminal.
It should be noted that, when user enters after second system desktop, user terminal acquiescence is to hide user at the newly-built personal information automatic mark of second system desktop, thus, in the time that entering the first system desktop again, user cannot see that user is in the newly-built personal information of second system desktop, therefore simplify user the operation of hiding userspersonal information has manually been set, thereby improved the convenience of userspersonal information's safety management in user terminal.
The personal information security management method that the embodiment of the present invention provides, enter different system desktop by different unlocking manner unlock screens, different system desktop shows different user profile, the action of having avoided people except the current user of user terminal to input password by user knows in this user terminal, whether there is userspersonal information, thereby reduce userspersonal information's the risk of divulging a secret in user terminal, and then improved the validity of the personal information security management in user terminal.
The second embodiment
The process flow diagram of the personal information security management method that Fig. 4 provides for second embodiment of the invention.As shown in Figure 4, the personal information security management method of the present embodiment comprises the following steps:
Step S21, response user's start-up command, starts described user terminal, enters described the first system desktop.
In embodiments of the present invention, user terminal responds after user's start-up command startup each time, all enter the first system desktop, also after i.e. each start, user terminal is not all hiding personal information to current user's show tags of user terminal, so can avoid the illegal user of user terminal to obtain the user's of user terminal personal information by the mode of switching on and shutting down, thereby improve the validity of the personal information security management in user terminal.
Step S22, according to the default initial password and instruction setting of user input or revise the unlocking manner of described user terminal, the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner.
User terminal receives the Modify password of user's input, and the Modify password receiving and default initial password are compared, if consistent, receives the instruction setting of user's input or the unlocking manner of amendment user terminal.Obtain the authority of amendment unlocking manner by input password, can avoid the illegal user of user terminal to obtain by revising the method for the second unlocking manner the authority that enters second system desktop, thereby further improve the validity of the personal information security management in user terminal.
Step S23, detects described user's release action.
This step can, with reference to the corresponding steps in the first embodiment, repeat no more here.
Step S24, whether corresponding unlocking manner is moved in the release that judges described user is described the first unlocking manner.
This step can, with reference to the corresponding steps in the first embodiment, repeat no more here.
If so, perform step S25, according to described the first unlocking manner unlock screen, enter the first system desktop, described the first system desktop not show tags is hiding personal information.
This step can, with reference to the corresponding steps in the first embodiment, repeat no more here.
If not, perform step S26, according to described the second unlocking manner unlock screen, enter second system desktop, described in described second system desktop shows, be labeled as hiding personal information.
This step can, with reference to the corresponding steps in the first embodiment, repeat no more here.
The personal information security management method that the embodiment of the present invention provides, enter different system desktop by different unlocking manner unlock screens, different system desktop shows different user profile, the action of having avoided people except the current user of user terminal to input password by user knows in this user terminal, whether there is userspersonal information, thereby reduce userspersonal information's the risk of divulging a secret in user terminal, and then improved the validity of the personal information security management in user terminal.
The 3rd embodiment
The structural representation of the personal information security management devices that Fig. 5 provides for the 3rd embodiment.The personal information security management devices that the present embodiment provides can be for realizing the personal information security management method in the first embodiment.As shown in Figure 5, personal information security management devices 10 comprises that unlocking manner and information arrange module 11, user's release motion detection module 12, unlocking manner judge module 13, the first system desktop handover module 14, second system desktop handover module 15.
Wherein, unlocking manner and information arrange module 11 for unlocking manner being set according to the instruction of user's input, and the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner.User's release motion detection module 12 is for detecting described user's release action.Whether unlocking manner judge module 13 moves corresponding unlocking manner for the described user's that judges described user's release motion detection module and detect release is described the first unlocking manner.If described unlocking manner judge module 13 judged results are yes, the first system desktop handover module 14, according to described the first unlocking manner unlock screen, enters the first system desktop, and described the first system desktop not show tags is hiding personal information.If described unlocking manner judge module 13 judged results are no, second system desktop handover module 15, according to described the second unlocking manner unlock screen, enters described second system desktop, described in described second system desktop shows, is labeled as hiding personal information.
Preferably, unlocking manner can comprise recognition of face unlocking manner, unlock password mode, fingerprint recognition unlocking manner, Application on Voiceprint Recognition unlocking manner, graphic code unlocking manner and gesture unlocking manner.Preferably, the first unlocking manner and the second unlocking manner can be also two groups of different unlocking pins.
Each Implement of Function Module of the present embodiment personal information security management devices 10 detailed process of function separately, refers to the particular content of above-mentioned Fig. 1 and middle description embodiment illustrated in fig. 2, repeats no more herein.
The personal information security management devices that the embodiment of the present invention provides, enter different system desktop by different unlocking manner unlock screens, different system desktop shows different user profile, the action of having avoided people except the current user of user terminal to input password by user knows in this user terminal, whether there is userspersonal information, thereby reduce userspersonal information's the risk of divulging a secret in user terminal, and then improved the validity of the personal information security management in user terminal.
The 4th embodiment
The structural representation of the personal information security management devices that Fig. 6 provides for the 4th embodiment.The personal information security management devices that the present embodiment provides can be for realizing the personal information security management method in the second embodiment.As shown in Figure 6, personal information security management devices 20 comprises that unlocking manner and information arrange module 21, user's release motion detection module 22, unlocking manner judge module 23, the first system desktop handover module 24, second system desktop handover module 25, start module 26, mark module 27, unlocking manner modified module 28.
Wherein, unlocking manner and information arrange module 21 for unlocking manner being set according to the instruction of user's input, and the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner.User's release motion detection module 22 is for detecting described user's release action.Whether unlocking manner judge module 23 moves corresponding unlocking manner for the described user's that judges described user's release motion detection module and detect release is described the first unlocking manner.If described unlocking manner judge module 23 judged results are yes, the first system desktop handover module 24, according to described the first unlocking manner unlock screen, enters the first system desktop, and described the first system desktop not show tags is hiding personal information.If described unlocking manner judge module 23 judged results are no, second system desktop handover module 25, according to described the second unlocking manner unlock screen, enters described second system desktop, described in described second system desktop shows, is labeled as hiding personal information.Start module 26 for starting described mobile device, enter described the first system desktop.Mark module 27 is for being labeled as hiding by described user in the newly-built personal information of described second system desktop.Unlocking manner modified module 28 is for revising described unlocking manner according to the default initial password of described user's input.
Each Implement of Function Module of the present embodiment personal information security management devices 20 detailed process of function separately, refers to the particular content of above-mentioned Fig. 1 and middle description embodiment illustrated in fig. 2, repeats no more herein.
The personal information security management devices that the embodiment of the present invention provides, enter different system desktop by different unlocking manner unlock screens, different system desktop shows different user profile, the action of having avoided people except the current user of user terminal to input password by user knows in this user terminal, whether there is userspersonal information, thereby reduce userspersonal information's the risk of divulging a secret in user terminal, and then improved the validity of the personal information security management in user terminal.
It should be noted that, each embodiment in this instructions all adopts the mode of going forward one by one to describe, and what each embodiment stressed is and the difference of other embodiment, between each embodiment identical similar part mutually referring to.For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part is referring to the part explanation of embodiment of the method.
It should be noted that, in this article, relational terms such as the first and second grades is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply and between these entities or operation, have the relation of any this reality or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby the process, method, article or the device that make to comprise a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or be also included as the intrinsic key element of this process, method, article or device.The in the situation that of more restrictions not, the key element being limited by statement " comprising ... ", and be not precluded within process, method, article or the device that comprises described key element and also have other identical element.
One of ordinary skill in the art will appreciate that all or part of step that realizes above-described embodiment can complete by hardware, also can carry out the hardware that instruction is relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
The above, it is only preferred embodiment of the present invention, not the present invention is done to any pro forma restriction, although the present invention discloses as above with preferred embodiment, but not in order to limit the present invention, any those skilled in the art, do not departing within the scope of technical solution of the present invention, when can utilizing the technology contents of above-mentioned announcement to make a little change or being modified to the equivalent embodiment of equivalent variations, in every case be not depart from technical solution of the present invention content, any simple modification of above embodiment being done according to technical spirit of the present invention, equivalent variations and modification, all still belong in the scope of technical solution of the present invention.

Claims (10)

1. a personal information security management method, for the personal information of managing user terminal, is characterized in that, comprising:
The unlocking manner that described user terminal is set according to the instruction of user's input, the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner;
Detect described user's release action;
Whether corresponding unlocking manner is moved in the release that judges described user is described the first unlocking manner;
If so, according to described the first unlocking manner unlock screen, enter the first system desktop, described the first system desktop not show tags is hiding personal information; And
If not,, according to described the second unlocking manner unlock screen, enter second system desktop, described in described second system desktop shows, be labeled as hiding personal information.
2. personal information security management method as claimed in claim 1, it is characterized in that, before being set in the described instruction according to user input, the step of unlocking manner also comprises: response user's start-up command, start described user terminal, and enter described the first system desktop.
3. personal information security management method as claimed in claim 1, is characterized in that, described method also comprises:
Described user is labeled as hiding in the newly-built personal information of described second system desktop.
4. personal information security management method as claimed in claim 1, is characterized in that, described method also comprises: revise described unlocking manner according to the default initial password of described user's input.
5. the personal information security management method as described in claim 1 to 4 any one, it is characterized in that, described unlocking manner at least comprises the one in following unlocking manner: recognition of face unlocking manner, unlock password mode, fingerprint recognition unlocking manner, Application on Voiceprint Recognition unlocking manner, graphic code unlocking manner and gesture unlocking manner.
6. a personal information security management devices, is characterized in that, comprising:
Unlocking manner and information arrange module, and for unlocking manner being set according to the instruction of user's input, the personal information that described user is specified is labeled as hiding, and described unlocking manner comprises the first unlocking manner and the second unlocking manner;
User's release motion detection module, for detecting described user's release action;
Whether unlocking manner judge module is described the first unlocking manner for judging that corresponding unlocking manner is moved in the described user's that described user's release motion detection module detects release;
The first system desktop handover module, if described unlocking manner judge module judged result is yes, described the first system desktop handover module, according to described the first unlocking manner unlock screen, enters the first system desktop, and described the first system desktop not show tags is hiding personal information; And
Second system desktop handover module, if described unlocking manner judge module judged result is no, described second system desktop handover module, according to described the second unlocking manner unlock screen, enters described second system desktop, described in described second system desktop shows, is labeled as hiding personal information.
7. personal information security management devices as claimed in claim 6, is characterized in that, described device also comprises startup module, for starting described mobile device, enters described the first system desktop.
8. personal information security management devices as claimed in claim 6, is characterized in that, described device also comprises mark module, for described user is labeled as hiding in the newly-built personal information of described second system desktop.
9. personal information security management devices as claimed in claim 6, is characterized in that, described device also comprises unlocking manner modified module, for revising described unlocking manner according to the default initial password of described user's input.
10. the personal information security management devices as described in claim 6 to 9 any one, it is characterized in that, described unlocking manner at least comprises the one in following unlocking manner: recognition of face unlocking manner, unlock password mode, fingerprint recognition unlocking manner, Application on Voiceprint Recognition unlocking manner, graphic code unlocking manner and gesture unlocking manner.
CN201310097034.2A 2013-03-25 2013-03-25 Personal information security management method and managing device Active CN104077512B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310097034.2A CN104077512B (en) 2013-03-25 2013-03-25 Personal information security management method and managing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310097034.2A CN104077512B (en) 2013-03-25 2013-03-25 Personal information security management method and managing device

Publications (2)

Publication Number Publication Date
CN104077512A true CN104077512A (en) 2014-10-01
CN104077512B CN104077512B (en) 2016-07-06

Family

ID=51598763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310097034.2A Active CN104077512B (en) 2013-03-25 2013-03-25 Personal information security management method and managing device

Country Status (1)

Country Link
CN (1) CN104077512B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158947A (en) * 2014-07-30 2014-11-19 张剑文 Mobile phone privacy protecting system
CN104317517A (en) * 2014-10-23 2015-01-28 苏州天平先进数字科技有限公司 Touch screen terminal hidden unlocking method and system
CN104318183A (en) * 2014-11-18 2015-01-28 南京酷派软件技术有限公司 Processing method and device for communication information of terminal
CN105630277A (en) * 2015-06-02 2016-06-01 南京酷派软件技术有限公司 Screen unlocking method and unlocking device for terminal
CN105989302A (en) * 2015-02-27 2016-10-05 赵绩琪 Multimode unlocking and multilevel privacy protection method based on intelligent terminal
CN106548167A (en) * 2016-12-09 2017-03-29 北京小米移动软件有限公司 A kind of method and device of hiden application
CN107092836A (en) * 2017-03-29 2017-08-25 北京洋浦伟业科技发展有限公司 A kind of data guard method and device based on system encryption
CN107480501A (en) * 2017-08-21 2017-12-15 北京珠穆朗玛移动通信有限公司 Unlocking method, mobile terminal and storage medium based on dual system
CN107633197A (en) * 2016-07-19 2018-01-26 仟融科技股份有限公司 Method for passing authentication by fingerprint identification
CN108008883A (en) * 2016-10-31 2018-05-08 成都卫士通信息产业股份有限公司 A kind of domain switch method of unlock interface, domain switching system and intelligent terminal
CN108197454A (en) * 2018-01-30 2018-06-22 努比亚技术有限公司 A kind of method of access application, equipment and computer readable storage medium
CN108460256A (en) * 2018-01-18 2018-08-28 北京珠穆朗玛移动通信有限公司 Data guard method, mobile terminal and device
US10073959B2 (en) 2015-06-19 2018-09-11 International Business Machines Corporation Secure authentication of users of devices using tactile and voice sequencing with feedback
CN108769386A (en) * 2018-05-03 2018-11-06 河海大学常州校区 A kind of adaptive unlocking manner selection method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107124506A (en) * 2017-04-12 2017-09-01 广东欧珀移动通信有限公司 Unlocking method, device and mobile terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201360282Y (en) * 2008-11-30 2009-12-09 青岛海信移动通信技术股份有限公司 Mobile terminal keyboard locking device and mobile terminal with same
CN101980131A (en) * 2010-10-29 2011-02-23 东莞宇龙通信科技有限公司 Unlocking method, system and communication terminal
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201360282Y (en) * 2008-11-30 2009-12-09 青岛海信移动通信技术股份有限公司 Mobile terminal keyboard locking device and mobile terminal with same
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment
CN101980131A (en) * 2010-10-29 2011-02-23 东莞宇龙通信科技有限公司 Unlocking method, system and communication terminal

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158947A (en) * 2014-07-30 2014-11-19 张剑文 Mobile phone privacy protecting system
CN104317517A (en) * 2014-10-23 2015-01-28 苏州天平先进数字科技有限公司 Touch screen terminal hidden unlocking method and system
CN104317517B (en) * 2014-10-23 2018-02-06 苏州天平先进数字科技有限公司 A kind of touch screen terminal hides unlocking method and system
CN104318183A (en) * 2014-11-18 2015-01-28 南京酷派软件技术有限公司 Processing method and device for communication information of terminal
CN105989302A (en) * 2015-02-27 2016-10-05 赵绩琪 Multimode unlocking and multilevel privacy protection method based on intelligent terminal
CN105630277A (en) * 2015-06-02 2016-06-01 南京酷派软件技术有限公司 Screen unlocking method and unlocking device for terminal
CN105630277B (en) * 2015-06-02 2018-11-30 南京酷派软件技术有限公司 Unlocking screen method and tripper for terminal
US10073959B2 (en) 2015-06-19 2018-09-11 International Business Machines Corporation Secure authentication of users of devices using tactile and voice sequencing with feedback
CN107633197A (en) * 2016-07-19 2018-01-26 仟融科技股份有限公司 Method for passing authentication by fingerprint identification
CN108008883A (en) * 2016-10-31 2018-05-08 成都卫士通信息产业股份有限公司 A kind of domain switch method of unlock interface, domain switching system and intelligent terminal
CN106548167A (en) * 2016-12-09 2017-03-29 北京小米移动软件有限公司 A kind of method and device of hiden application
CN107092836A (en) * 2017-03-29 2017-08-25 北京洋浦伟业科技发展有限公司 A kind of data guard method and device based on system encryption
CN107480501A (en) * 2017-08-21 2017-12-15 北京珠穆朗玛移动通信有限公司 Unlocking method, mobile terminal and storage medium based on dual system
CN108460256A (en) * 2018-01-18 2018-08-28 北京珠穆朗玛移动通信有限公司 Data guard method, mobile terminal and device
CN108197454A (en) * 2018-01-30 2018-06-22 努比亚技术有限公司 A kind of method of access application, equipment and computer readable storage medium
CN108769386A (en) * 2018-05-03 2018-11-06 河海大学常州校区 A kind of adaptive unlocking manner selection method

Also Published As

Publication number Publication date
CN104077512B (en) 2016-07-06

Similar Documents

Publication Publication Date Title
CN104077512A (en) Personnel information safety management method and management device
RU2666314C2 (en) User terminal apparatus and corresponding control method
CN103108082B (en) Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system
CN104077534B (en) For providing the method and apparatus of the secret page
CN103023649A (en) Method, device and equipment for protecting privacy information
US9483633B2 (en) Method and terminal for authenticating a stlyus
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN105760737A (en) Control method for applications and terminal
CN103902881A (en) Method for managing security for applications and an electronic device thereof
CN101667234A (en) Locking state conversion method, electronic device and computer program product
CN103902862A (en) Mobile device management method and device and mobile device
CN102883050A (en) Mobile terminal and unlocking method thereof
CN102693391A (en) Display method and electronic equipment
CN104834460A (en) Desktop display control method and device and mobile terminal
CN106203011A (en) The method and apparatus entering operating system desktop
WO2017008415A1 (en) Apparatus and method for launching mobile applications from a lock screen
CN105701420A (en) Method for managing user data and terminal
CN103324875A (en) Data protection system and method
CN104184874A (en) Method for switching mobile phone modes based on multiple unlocking conditions, and mobile phone thereof
CN109376545A (en) Method for secret protection and device
CN103294386B (en) Electronic device and locking/unlocking method
KR20130082979A (en) User personalized recommendation system based on fingerprint identification
CN104134024A (en) Mobile terminal privacy protection method and system
CN104301539A (en) Information protecting method
CN110581921B (en) Control method and device for folding screen equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant