CN104134024A - Mobile terminal privacy protection method and system - Google Patents

Mobile terminal privacy protection method and system Download PDF

Info

Publication number
CN104134024A
CN104134024A CN201410357017.2A CN201410357017A CN104134024A CN 104134024 A CN104134024 A CN 104134024A CN 201410357017 A CN201410357017 A CN 201410357017A CN 104134024 A CN104134024 A CN 104134024A
Authority
CN
China
Prior art keywords
contact panel
verified
application data
unlocking pin
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410357017.2A
Other languages
Chinese (zh)
Other versions
CN104134024B (en
Inventor
惠方方
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201410357017.2A priority Critical patent/CN104134024B/en
Publication of CN104134024A publication Critical patent/CN104134024A/en
Application granted granted Critical
Publication of CN104134024B publication Critical patent/CN104134024B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Abstract

The invention discloses a mobile terminal privacy protection method and system. The method comprises the following steps: setting first application data and second application data, wherein the first application data corresponds to a preset second touch panel unlocking password, and the second application data corresponds to a preset screen touch panel unlocking password; obtaining a to-be-verified password input on a screen touch panel or a second touch panel, wherein the second touch panel is arranged on the back or the side surface of a mobile terminal; if the to-be-verified password is input from the second touch panel and the to-be-verified password is consistent with the preset second touch panel unlocking password, loading the first application data; and if the to-be-verified password is input from the screen touch panel and the to-be-verified password is consistent with the preset screen touch panel unlocking password, loading the second application data. For a user who is not an owner, since the second touch panel is hidden, the to-be-verified password is generally input through the screen touch panel so as to prevent the user privacy information of the owner from leaking.

Description

Method for protecting mobile terminal privacy and system
[technical field]
The present invention relates to information privacy protection field, particularly relate to a kind of method for protecting mobile terminal privacy and system.
[background technology]
Along with the fast development of mobile communication technology, mobile terminal (for example, mobile phone, personal digital assistant etc.), has become and in people's daily life, has carried out the important channel of information interchange and indispensable instrument.Owing to having stored a large number of users privacy information in mobile terminal, for ensureing the safety of described user privacy information, prevent its leakage, be necessary described user privacy information to protect.Along with the development of smart mobile phone, above-mentioned user privacy information has been not limited to short message, but a kind of any information relevant to particular contact or particular telephone number and user data of more broad sense comprises communication data, geographic position application data and other application datas etc. of message registration, short message, picture library, instant messaging.
At present, protection privacy information mode is normally encrypted certain application by fail-safe software, and in entering this application, must input correct password could use, otherwise cannot use this application.Conventionally owner browses mobile phone in order to take precautions against other people without permission in the situation that, but this mode easily causes all the better other people suspicion and is discontented with, very easily cause requirement owner to input proper password, thereby cause user privacy information not to be effectively protected, while owner needs to re-enter password at every turn and verifies in the time entering this application, if there are multiple application that are encrypted, in entering each application, needing to input password verifies, make complex operation, increase owner's operation steps and running time, cause owner to use inconvenience.
[summary of the invention]
Based on this; be necessary can not be effectively protected and the problem of complex operation for user privacy information; a kind of method for protecting mobile terminal privacy and system are provided; the method utilizes the second contact panel to carry out the locking and unlocking to the first application data, effectively protects owner's user privacy information also can reduce the operation steps of release.
A kind of method for protecting mobile terminal privacy, comprises step:
Set first application data corresponding with the second default contact panel unlocking pin and second application data corresponding with default screen contact panel unlocking pin;
Obtain the password to be verified in screen contact panel or the input of the second contact panel, wherein, described the second contact panel is located at back or the side of mobile terminal;
If described password to be verified is consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified, load described the first application data;
If described password to be verified is consistent with default screen contact panel unlocking pin from the input of screen contact panel and described password to be verified, load described the second application data.
Correspondingly, the present invention also provides a kind of mobile terminal intimacy protection system, comprising:
Setting module, for setting first application data corresponding with the second default contact panel unlocking pin and second application data corresponding with default screen contact panel unlocking pin;
Acquisition module, for obtaining the password to be verified in screen contact panel or the input of the second contact panel, wherein, described the second contact panel is located at back or the side of mobile terminal;
First judges load-on module, if consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified for described password to be verified, loads described the first application data;
Second judges load-on module, if consistent with default screen contact panel unlocking pin from the input of screen contact panel and described password to be verified for described password to be verified, loads described the second application data.
The present invention is first by setting first application data corresponding with the second default contact panel unlocking pin and second application data corresponding with default screen contact panel unlocking pin, then according to the obtained password to be verified in screen contact panel or the input of the second contact panel, if described password to be verified is consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified, load described the first application data, if described password to be verified is consistent with default screen contact panel unlocking pin from the input of screen contact panel and described password to be verified, load described the second application data.Because the second contact panel is arranged on back or the side of mobile terminal, more hiddenly and difficult found by user, so by the first application data being carried out to release at the second contact panel, in described password to be verified and consistent first application data that just loads of the second contact panel unlocking pin of presetting, therefore can effectively protect owner's user privacy information, for non-owner's user, because the second contact panel arranges hidden, be difficult to find, non-owner's user generally can input password to be verified at screen contact panel, and now, even if described password to be verified is consistent with default screen contact panel unlocking pin, what load is also the second application data, thereby avoid owner's user privacy information to reveal.Additionally, owner, also without being encrypted for each application, makes to have reduced the running time in the user privacy information that ensures owner.
[brief description of the drawings]
Fig. 1 is the process flow diagram of a kind of embodiment of method for protecting mobile terminal privacy of the present invention;
Fig. 2 is the structured flowchart of a kind of embodiment of mobile terminal intimacy protection system of the present invention.
[embodiment]
In order to make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, the present invention is described in further detail.
Refer to Fig. 1, it is the process flow diagram of a kind of embodiment of method for protecting mobile terminal privacy of the present invention.
A kind of method for protecting mobile terminal privacy, comprises step:
S101: set first application data corresponding with the second default contact panel unlocking pin and second application data corresponding with default screen contact panel unlocking pin;
Set the first application data and the second application data, wherein, described the first application data and the second application data are separate.Described the first application data preferably includes mobile terminal owner or mobile terminal is had to user's all application datas in use mobile terminal process of highest weight limit, for example, log-on message and the usage data etc. of short message, message registration, address list, picture library and mobile terminal application.Described the second application data preferably includes except mobile terminal owner or to mobile terminal and has user the highest weight limit application data in use mobile terminal process.
After setting the first application data and the second application data, set up the corresponding relation of the first application data and default the second contact panel unlocking pin, and set up the corresponding relation of the second application data and default screen contact panel unlocking pin.
S102: obtain the password to be verified in screen contact panel or the input of the second contact panel, wherein, described the second contact panel is located at back or the side of mobile terminal;
Obtain the password to be verified in screen contact panel or the input of the second contact panel.Wherein, for making the second contact panel enough hidden, described the second contact panel is preferably located at back or the side of mobile terminal.
For making the second contact panel can carry out other operations, be convenient to the second contact panel Function Extension, preferably, described the second contact panel is located at the back of mobile terminal.
For the user who guides non-owner inputs password to be verified by screen contact panel, before obtaining described password to be verified, if detect that unlock command is triggered, by the predefined screen contact panel release of screen display interface.If this user is not owner, generally can carry out release by screen contact panel release interface.Wherein, described unlock command can be that solution locking key or power key are pressed, and can be also the start process of mobile terminal, and those skilled in the art can also arrange other unlock commands.
S103: if described password to be verified is consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified, load described the first application data;
According to by the password of the second contact panel input, described the second contact panel unlocking pin being set in advance, wherein, described the second contact panel unlocking pin can comprise following one or more: pattern or character etc. that release slip instruction, character unlocking pin, finger-print cipher and the user of the second contact panel forms at the sliding trace of the second contact panel input.
In order to take into account protection effect and the release efficiency of described the second contact panel unlocking pin, preferably, described the second contact panel unlocking pin comprises pattern or the character that user forms at the sliding trace of the second contact panel input.
If described password to be verified is consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified, can think that this user is owner, now load the first application data.
If described password to be verified is inconsistent with the second default contact panel unlocking pin, still show predefined screen contact panel release interface by screen contact panel, the prompting interface that does not show password mistake to be verified or re-enter password to be verified etc.The user privacy information in order further to protect owner like this; for example; user A separates after locking key pressing when carrying out release; touch unintentionally the second contact panel; if screen contact panel has shown password mistake to be verified or has re-entered the prompting interface of password to be verified etc.; so just inform that this mobile terminal of user A is provided with the second contact panel unlocking pin, caused configuration information to be revealed.
S104: if described password to be verified is consistent with default screen contact panel unlocking pin from the input of screen contact panel and described password to be verified, load described the second application data.
If described password to be verified is inputted from screen contact panel, now check described password to be verified whether consistent with default screen contact panel unlocking pin, if unanimously, can think that this user is the second user, now load second application data corresponding with the second user.
Wherein, preferably, described screen contact panel unlocking pin comprises following one or more: screen contact panel slip instruction, screen contact panel pattern and password symbol.Those skilled in the art can also arrange the screen contact panel unlocking pin of other types.
The present invention is first by setting first application data corresponding with the second default contact panel unlocking pin and second application data corresponding with default screen contact panel unlocking pin, then according to the obtained password to be verified in screen contact panel or the input of the second contact panel, if described password to be verified is consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified, load described the first application data, if described password to be verified is consistent with default screen contact panel unlocking pin from the input of screen contact panel and described password to be verified, load described the second application data.Because the second contact panel is arranged on back or the side of mobile terminal, more hiddenly and difficult found by user, so by the first application data being carried out to release at the second contact panel, in described password to be verified and consistent first application data that just loads of the second contact panel unlocking pin of presetting, therefore can effectively protect owner's user privacy information, for non-owner's user, because the second contact panel arranges hidden, be difficult to find, non-owner's user generally can input password to be verified at screen contact panel, and now, even if described password to be verified is consistent with default screen contact panel unlocking pin, what load is also the second application data, thereby avoid owner's user privacy information to reveal.Additionally, owner, also without being encrypted for each application, makes to have reduced the running time in the user privacy information that ensures owner.
In one embodiment, specifically can comprise the following steps at above-mentioned steps S101.
S201: set up first user and the second user and first application data corresponding with first user and second application data corresponding with described the second user;
Mobile terminal is set to first user and the second user, and wherein said first user is mobile terminal owner or mobile terminal had to the user of high control authority, and described the second user is other users except mobile terminal owner.Then,, for first user, set up the first application data corresponding with first user; For the second user, set up second application data corresponding with described the second user.
For making the first application data and the second application data keep independent, can set up different user ID (Identity, identify label) to described first user and the second user respectively.
S202: set up the mapping relations of first user and default the second contact panel unlocking pin, and set up the mapping relations of the second user and default screen contact panel unlocking pin.
The mapping relations of the second contact panel unlocking pin of setting up first user and preset, because first user is corresponding with first user data, so correspondingly, have also just set up the corresponding relation of the first application data with the second contact panel unlocking pin of presetting.
Set up the mapping relations of the second user and default screen contact panel unlocking pin, because the second user is corresponding with the second user data, so correspondingly, also just set up the corresponding relation with default screen contact panel unlocking pin.
By setting up first user and the second user, and set up the mapping relations of first user and default the second contact panel unlocking pin, and set up the mapping relations of the second user and default screen contact panel unlocking pin, can distinguish easily and manage the first application data and the second application data, make the present invention be easier to realize by software.
In one embodiment, can specifically comprise step at above-mentioned steps S103.
S301: if described password to be verified is inputted from the second contact panel, calculate the similarity of described password to be verified and described the second contact panel unlocking pin according to similarity algorithm;
If described password to be tested is inputted from the second contact panel, illustrate that this user may be first user, for whether concrete this user of checking is first user, calculate the similarity of described password to be verified and described the second contact panel unlocking pin by similarity algorithm, then judge.
S302: if described similarity exceedes default similarity threshold, judge that described password to be verified is consistent with the second default contact panel unlocking pin, and load described the first application data.
If described similarity exceedes default similarity threshold, can judge that the password to be verified of this user's input is consistent with the second default contact panel unlocking pin, now, judge that this user is as first user, therefore load described the first application data.
By calculating the similarity of password to be verified and described the second contact panel unlocking pin, can accurately and fast judge that whether described password to be verified is consistent with the second default contact panel unlocking pin, make the present invention be easy to realize.
Refer to Fig. 2, it is the structured flowchart of a kind of embodiment of mobile terminal intimacy protection system of the present invention.
A kind of mobile terminal intimacy protection system, comprising:
Setting module 201, for setting first application data corresponding with the second default contact panel unlocking pin and second application data corresponding with default screen contact panel unlocking pin;
Set the first application data and the second application data by setting module 201, wherein, described the first application data and the second application data are separate.Described the first application data preferably includes mobile terminal owner or mobile terminal is had to user's all application datas in use mobile terminal process of highest weight limit, for example, log-on message and the usage data etc. of short message, message registration, address list, picture library and mobile terminal application.Described the second application data preferably includes except mobile terminal owner or to mobile terminal and has user the highest weight limit application data in use mobile terminal process.
After setting the first application data and the second application data, setting module 201 is set up the corresponding relation of the first application data and default the second contact panel unlocking pin, and sets up the corresponding relation of the first application data and default screen contact panel unlocking pin.
Acquisition module 202, for obtaining the password to be verified in screen contact panel or the input of the second contact panel, wherein, described the second contact panel is located at back or the side of mobile terminal;
Obtain the to be verified password of user in screen contact panel or the input of the second contact panel by acquisition module 202.Wherein, for making the second contact panel enough hidden, described the second contact panel is preferably located at back or the side of mobile terminal.
For making the second contact panel can carry out other operations, be convenient to the second contact panel Function Extension, preferably, described the second contact panel is located at the back of mobile terminal.
For the user who guides non-owner inputs password to be verified by screen contact panel, before obtaining described password to be verified, if detect that unlock command is triggered, by the predefined screen contact panel release of screen display interface.If this user is not owner, generally can carry out release by screen contact panel release interface.Wherein, described unlock command can be that solution locking key or power key are pressed, and can be also the start process of mobile terminal, and those skilled in the art can also arrange other unlock commands.
First judges load-on module 203, if consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified for described password to be verified, loads described the first application data;
According to by the password of the second contact panel input, described the second contact panel unlocking pin being set in advance, wherein, described the second contact panel unlocking pin can comprise following one or more: pattern or character etc. that release slip instruction, character unlocking pin, finger-print cipher and the user of the second contact panel forms at the sliding trace of the second contact panel input.In order to take into account protection effect and the release efficiency of described the second contact panel unlocking pin, preferably, described the second contact panel unlocking pin comprises pattern or the character that user forms at the sliding trace of the second contact panel input.
If described password to be verified is consistent with the second contact panel unlocking pin of presetting from the second contact panel input and described password to be verified, first judges that load-on module 203 can think that this user, as owner, now loads the first application data.
If described password to be verified is inconsistent with the second default contact panel unlocking pin, first judges that load-on module 203 still shows predefined screen contact panel release interface by screen contact panel, the prompting interface that does not show password mistake to be verified or re-enter password to be verified etc.First judges that it is the user privacy information in order further to protect owner that load-on module 203 does like this; for example; user A separates after locking key pressing when carrying out release; touch unintentionally the second contact panel; if screen contact panel has shown password mistake to be verified or has re-entered the prompting interface of password to be verified etc.; so just inform that this mobile terminal of user A is provided with the second contact panel unlocking pin, caused configuration information to be revealed.
Second judges load-on module 204, if consistent with default screen contact panel unlocking pin from the input of screen contact panel and described password to be verified for described password to be verified, loads described the second application data.
If described password to be verified is inputted from screen contact panel, now check described password to be verified whether consistent with default screen contact panel unlocking pin, if unanimously, can think that this user is the second user, now load second application data corresponding with the second user.
Wherein, preferably, described screen contact panel unlocking pin comprises following one or more: screen contact panel slip instruction, screen contact panel pattern and password symbol.Those skilled in the art can also arrange the screen contact panel unlocking pin of other types.
First the present invention sets first application data corresponding with the second default contact panel unlocking pin and second application data corresponding with default screen contact panel unlocking pin by setting module 201, then the password to be verified in screen contact panel or the input of the second contact panel obtaining according to acquisition module 202, if described password to be verified is consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified, first judges that load-on module 203 loads described the first application data, if described password to be verified is consistent with default screen contact panel unlocking pin from the input of screen contact panel and described password to be verified, second judges that load-on module 204 loads described the second application data.Because the second contact panel is arranged on back or the side of mobile terminal, more hiddenly and difficult found by user, so by the first application data being carried out to release at the second contact panel, in described password to be verified and consistent first application data that just loads of the second contact panel unlocking pin of presetting, therefore can effectively protect owner's user privacy information, for non-owner's user, because the second contact panel arranges hidden, be difficult to find, non-owner's user generally can input password to be verified at screen contact panel, and now, even if described password to be verified is consistent with default screen contact panel unlocking pin, what load is also the second application data, thereby avoid owner's user privacy information to reveal.Additionally, owner, also without being encrypted for each application, makes to have reduced the running time in the user privacy information that ensures owner.
In one embodiment, above-mentioned setting module 201, can comprise following submodule.
Application data is set up module, for setting up first user and the second user and first application data corresponding with first user and second application data corresponding with described the second user;
Set up module to set first user and the second user to mobile terminal by application data, wherein said first user is mobile terminal owner or mobile terminal had to the user of high control authority, and described the second user is other users except mobile terminal owner.Then,, for first user, set up the first application data corresponding with first user; For the second user, set up second application data corresponding with described the second user.
For making the first application data and the second application data keep independent, application data sets up module to set up different user ID (Identity, identify label) to described first user and the second user respectively.
Mapping block, for setting up the mapping relations of first user and default the second contact panel unlocking pin, and sets up the mapping relations of the second user and default screen contact panel unlocking pin.
Set up the mapping relations of first user and default the second contact panel unlocking pin by mapping block, because first user is corresponding with first user data, so correspondingly, also just set up the corresponding relation of the first application data with the second contact panel unlocking pin of presetting.
Set up the mapping relations of the second user and default screen contact panel unlocking pin by mapping block, because the second user is corresponding with the second user data, so correspondingly, also just set up the corresponding relation with default screen contact panel unlocking pin.
Set up module to set up first user and the second user by application data, and set up the mapping relations of first user and default the second contact panel unlocking pin by mapping block, and set up the mapping relations of the second user and default screen contact panel unlocking pin, can distinguish easily and manage the first application data and the second application data, make the present invention be easier to realize by software.
In one embodiment, judge that above-mentioned first load-on module specifically comprises following submodule.
Authentication module, if input from the second contact panel for described password to be verified, calculates the similarity of described password to be verified and described the second contact panel unlocking pin according to similarity algorithm;
If described password to be tested is inputted from the second contact panel, illustrate that this user may be first user, for whether concrete this user of checking is first user, authentication module calculates the similarity of described password to be verified and described the second contact panel unlocking pin by similarity algorithm, then judges.
Load-on module, if exceed default similarity threshold for described similarity, judges that described password to be verified is consistent with the second default contact panel unlocking pin, and loads described the first application data.
If described similarity exceedes default similarity threshold, load-on module can judge that the password to be verified of this user's input is consistent with the second default contact panel unlocking pin, now, load-on module judges that this user is as first user, and therefore load-on module loads described the first application data.
Calculate the similarity of password to be verified and described the second contact panel unlocking pin by authentication module, can accurately and fast judge that whether described password to be verified is consistent with the second default contact panel unlocking pin, make the present invention be easy to realize.
The above embodiment has only expressed several embodiment of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (10)

1. a method for protecting mobile terminal privacy, is characterized in that, comprises step:
Set first application data corresponding with the second default contact panel unlocking pin and second application data corresponding with default screen contact panel unlocking pin;
Obtain the password to be verified in screen contact panel or the input of the second contact panel, wherein, described the second contact panel is located at back or the side of mobile terminal;
If described password to be verified is consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified, load described the first application data;
If described password to be verified is consistent with default screen contact panel unlocking pin from the input of screen contact panel and described password to be verified, load described the second application data.
2. method for protecting mobile terminal privacy according to claim 1; it is characterized in that; in described setting first application data corresponding with the second default contact panel unlocking pin and the second application data step corresponding with default screen contact panel unlocking pin, specifically comprise:
Set up first user and the second user and first application data corresponding with first user and second application data corresponding with described the second user;
Set up the mapping relations of first user and default the second contact panel unlocking pin, and set up the mapping relations of the second user and default screen contact panel unlocking pin.
3. method for protecting mobile terminal privacy according to claim 1; it is characterized in that; if password described to be verified is consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified; the step of loading and described the first application data, specifically comprises:
If described password to be verified is inputted from the second contact panel, calculate the similarity of described password to be verified and described the second contact panel unlocking pin according to similarity algorithm;
If described similarity exceedes default similarity threshold, judge that described password to be verified is consistent with the second default contact panel unlocking pin, and load described the first application data.
4. method for protecting mobile terminal privacy according to claim 1, is characterized in that, described screen contact panel unlocking pin comprises following one or more: screen contact panel slip instruction, screen contact panel pattern and password symbol.
5. method for protecting mobile terminal privacy according to claim 1, is characterized in that, described the second contact panel unlocking pin comprises pattern or the character that user forms at the sliding trace of the second contact panel input.
6. a mobile terminal intimacy protection system, is characterized in that, comprising:
Setting module, for setting first application data corresponding with the second default contact panel unlocking pin and second application data corresponding with default screen contact panel unlocking pin;
Acquisition module, for obtaining the password to be verified in screen contact panel or the input of the second contact panel, wherein, described the second contact panel is located at back or the side of mobile terminal;
First judges load-on module, if consistent with the second default contact panel unlocking pin from the second contact panel input and described password to be verified for described password to be verified, loads described the first application data;
Second judges load-on module, if consistent with default screen contact panel unlocking pin from the input of screen contact panel and described password to be verified for described password to be verified, loads described the second application data.
7. mobile terminal intimacy protection system according to claim 6, is characterized in that, described setting module specifically comprises:
Application data is set up module, for setting up first user and the second user and first application data corresponding with first user and second application data corresponding with described the second user;
Mapping block, for setting up the mapping relations of first user and default the second contact panel unlocking pin, and sets up the mapping relations of the second user and default screen contact panel unlocking pin.
8. mobile terminal intimacy protection system according to claim 6, is characterized in that, described first judges that load-on module specifically comprises module quickly:
Authentication module, if input from the second contact panel for described password to be verified, calculates the similarity of described password to be verified and described the second contact panel unlocking pin according to similarity algorithm;
Load-on module, if exceed default similarity threshold for described similarity, judges that described password to be verified is consistent with the second default contact panel unlocking pin, and loads described the first application data.
9. mobile terminal intimacy protection system according to claim 6, is characterized in that, described screen contact panel unlocking pin comprises following one or more: screen contact panel slip instruction, screen contact panel pattern and password symbol.
10. mobile terminal intimacy protection system according to claim 6, is characterized in that, described the second contact panel unlocking pin comprises pattern or the character that user forms at the sliding trace of the second contact panel input.
CN201410357017.2A 2014-07-24 2014-07-24 Method for protecting mobile terminal privacy and system Expired - Fee Related CN104134024B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410357017.2A CN104134024B (en) 2014-07-24 2014-07-24 Method for protecting mobile terminal privacy and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410357017.2A CN104134024B (en) 2014-07-24 2014-07-24 Method for protecting mobile terminal privacy and system

Publications (2)

Publication Number Publication Date
CN104134024A true CN104134024A (en) 2014-11-05
CN104134024B CN104134024B (en) 2017-11-14

Family

ID=51806699

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410357017.2A Expired - Fee Related CN104134024B (en) 2014-07-24 2014-07-24 Method for protecting mobile terminal privacy and system

Country Status (1)

Country Link
CN (1) CN104134024B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279406A (en) * 2015-10-29 2016-01-27 东莞酷派软件技术有限公司 Method and device of application data safe access
CN105657169A (en) * 2016-01-05 2016-06-08 广东欧珀移动通信有限公司 Data protection method, device and mobile terminal
CN106127077A (en) * 2016-06-30 2016-11-16 成都中科创达软件有限公司 A kind of method protecting user privacy information and terminal
CN106682463A (en) * 2016-09-30 2017-05-17 北京小米移动软件有限公司 Unlocking method and device
CN108055380A (en) * 2017-11-23 2018-05-18 北京珠穆朗玛移动通信有限公司 Double screen unlocking method, mobile terminal and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855426B (en) * 2012-08-03 2015-09-09 广东欧珀移动通信有限公司 A kind of user management method based on Android
CN103793636B (en) * 2012-11-01 2017-12-22 华为技术有限公司 A kind of method of equipment and protection equipment privacy
CN103514394B (en) * 2012-12-10 2016-08-03 Tcl集团股份有限公司 The icon unlocking method of a kind of touch panel device and touch panel device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279406A (en) * 2015-10-29 2016-01-27 东莞酷派软件技术有限公司 Method and device of application data safe access
CN105279406B (en) * 2015-10-29 2018-07-27 东莞酷派软件技术有限公司 A kind of method and device using Data Access Security
CN105657169A (en) * 2016-01-05 2016-06-08 广东欧珀移动通信有限公司 Data protection method, device and mobile terminal
CN105657169B (en) * 2016-01-05 2019-02-19 Oppo广东移动通信有限公司 A kind of data guard method, device and mobile terminal
CN106127077A (en) * 2016-06-30 2016-11-16 成都中科创达软件有限公司 A kind of method protecting user privacy information and terminal
CN106127077B (en) * 2016-06-30 2019-04-23 成都中科创达软件有限公司 A kind of method and terminal for protecting user privacy information
CN106682463A (en) * 2016-09-30 2017-05-17 北京小米移动软件有限公司 Unlocking method and device
CN108055380A (en) * 2017-11-23 2018-05-18 北京珠穆朗玛移动通信有限公司 Double screen unlocking method, mobile terminal and storage medium

Also Published As

Publication number Publication date
CN104134024B (en) 2017-11-14

Similar Documents

Publication Publication Date Title
CN104077512B (en) Personal information security management method and managing device
EP2955617B1 (en) Method and device for unlocking screen, and terminal
US9483633B2 (en) Method and terminal for authenticating a stlyus
US20140245457A1 (en) Method and device for initiating privacy mode of data processing apparatus
CN101827148A (en) Fingerprint identification system applied to mobile phone and operating method thereof
WO2014131308A1 (en) Method and device for initiating privacy mode of data processing apparatus
CN104134024A (en) Mobile terminal privacy protection method and system
CN104715178A (en) Electronic device unlocking system and method
US20180198619A1 (en) A securing apparatus for an application in an electronic device and method thereof
CN102722663B (en) Handheld smart device data security protection method
CN105069333A (en) User domain access method, access system and terminal
US8706158B2 (en) Mobile phone for authenticating SIM card and method thereof
CN102883050A (en) Mobile terminal and unlocking method thereof
TWI629891B (en) A method and system for protecting private information of mobile terminal
CN103634482A (en) Safety protecting method for application software of portable intelligent equipment
CN103488918A (en) Application encrypting method and device for intelligent terminal
EP3688651A1 (en) Electronic device including display and method of encrypting and decrypting information
CN103324874A (en) Verification method and electronic device
CN103763091A (en) Encrypting method, decrypting method, encrypting device and decrypting device of application program
EP2840818B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN103870755A (en) Method and device for transferring files between multiple users of same electronic device
CN101415186A (en) Method for security protection of mobile phone information
CN104301539A (en) Information protecting method
CN202014304U (en) Mobile phone privacy protection system based on code authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171114