CN104573576B - A kind of screen locking guard method of mobile terminal and mobile terminal - Google Patents

A kind of screen locking guard method of mobile terminal and mobile terminal Download PDF

Info

Publication number
CN104573576B
CN104573576B CN201510016414.8A CN201510016414A CN104573576B CN 104573576 B CN104573576 B CN 104573576B CN 201510016414 A CN201510016414 A CN 201510016414A CN 104573576 B CN104573576 B CN 104573576B
Authority
CN
China
Prior art keywords
preset
mobile terminal
screen
password
locking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510016414.8A
Other languages
Chinese (zh)
Other versions
CN104573576A (en
Inventor
薛明博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING LOCOJOY TECHNOLOGY Co Ltd
Original Assignee
BEIJING LOCOJOY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING LOCOJOY TECHNOLOGY Co Ltd filed Critical BEIJING LOCOJOY TECHNOLOGY Co Ltd
Priority to CN201510016414.8A priority Critical patent/CN104573576B/en
Publication of CN104573576A publication Critical patent/CN104573576A/en
Application granted granted Critical
Publication of CN104573576B publication Critical patent/CN104573576B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The present invention provides the screen locking guard method of a kind of mobile terminal and mobile terminal, it is related to the communications field.This method includes:First detecting step:Detection mobile terminal whether there is the abnormal operation for meeting the first preset condition;First preset condition reflects the change of user operation habits;First screen locking step:If in the presence of into the first locking screen interface that unlocking pin is the first preset password.This method can be decision making according to the change of operating habit, carry out the screen locking of mobile terminal screen in non-native user's operation mobile terminal.

Description

A kind of screen locking guard method of mobile terminal and mobile terminal
Technical field
The present invention relates to the communications field, more particularly to the screen locking guard method of a kind of mobile terminal and mobile terminal.
Background technology
Effect of the mobile terminals such as mobile phone in people live increasingly is highlighted, especially with the stream of mobile-phone payment OK, the safety problem of mobile phone is also more and more important.In order to protect individual privacy and property safety, the mobile terminal of the prior art is set There is following screen locking function:After user presses screen locking key or screen locks automatically, inputting default password could unlock.
But there are following problems for the prior art:
1. when user's manual locking or non-operating time reaching threshold value, mobile terminal just carries out screen locking, therefore, it is impossible to Some non-native user's operations while operating in hand (such as taken under the non-screen lock state of mobile phone by other people) in special circumstances into The automatic locking of row so that the privacy of user is easily invaded, and property safety is on the hazard;
2. after other people obtain unlocking pin by abnormal approach, the important operation such as paying can also be carried out, to use Cause great loss in family.
The content of the invention
It is an object of the present invention to provide a kind of mobile terminal locked screen automatically when user operation habits change and The screen locking guard method of mobile terminal, to carry out screen locking protection automatically in non-native user's operation.
After the present invention one is further objective is that will cause the screen locking after user operation habits change to be unlocked, to paying Etc. the protection of important operation carry out degree higher.
Especially, the present invention provides a kind of screen locking guard method of mobile terminal, including:First detecting step:Detection The mobile terminal whether there is the abnormal operation for meeting the first preset condition;The first preset condition reflection user's operation is practised Used change;First screen locking step:If in the presence of into the first locking screen interface that unlocking pin is the first preset password.
Alternatively, first preset condition includes following one or more:The continuous use time reach first it is default when Between threshold value input method be switched to another input method, screen continuous lighting time exceed history continuously most long lighting time, The browser that the continuous use time reaches the second preset time threshold is switched to another browser.
Alternatively, the method further includes:First unlocked step:Detection user inputs close in the first locking screen interface Whether code is the first preset password, if so, then carrying out unlocking screen;Second detecting step:Detection is in the 3rd preset time threshold Interior, the mobile terminal whether there is the risky operation for meeting the second preset condition;Second screen locking step:If in the presence of not ringing The risky operation is answered, and enters the second locking screen interface that unlocking pin is the second preset password;Second unlocked step:Detection is used Whether the password that family inputs in the second locking screen interface is the second preset password, if so, then carrying out unlocking screen.
Alternatively, second preset condition includes following one or more:Open and pay class application, send comprising default The short message of keyword, store after deleting the short message, photo deletion, photo upload, automatic camera.
Alternatively, after having performed the second unlocked step, the first detecting step is performed.
Present invention also offers a kind of mobile terminal, including:First detection module, is configured to:Detect the mobile terminal With the presence or absence of the abnormal operation for meeting the first preset condition;The change of the first preset condition reflection user operation habits;The One screen lock module, is configured to:If in the presence of so that the mobile terminal enters first lock of the unlocking pin for the first preset password Shield interface.
Alternatively, first preset condition includes following one or more:The continuous use time reach first it is default when Between threshold value input method be switched to another input method, screen continuous lighting time exceed history continuously most long lighting time, The browser that the continuous use time reaches the second preset time threshold is switched to another browser.
Alternatively, the mobile terminal further includes:First unlocked state, is configured to:User is detected in the first screen locking circle Whether the password inputted in face is the first preset password, if so, then carrying out unlocking screen;Second detection module, is configured to:Detection In the 3rd preset time threshold, the mobile terminal whether there is the risky operation for meeting the second preset condition;Second screen locking Module, is configured to:If in the presence of so that the mobile terminal enters the second screen locking circle that unlocking pin is the second preset password Face;Second unlocked state, is configured to:Whether the password that detection user inputs in the second locking screen interface is the second preset password, If so, then carry out unlocking screen.
Alternatively, second preset condition includes following one or more:Open and pay class application, send comprising default The short message of keyword, store after deleting the short message, photo deletion, photo upload, automatic camera.
Alternatively, after second unlocked state carries out unlocking screen, the first detection module detection is described mobile whole End is with the presence or absence of the abnormal operation for meeting the first preset condition.
Due to there is the change for meeting reflection user operation habits in the screen locking guard method of the mobile terminal of the present invention Screen locking is carried out during the abnormal operation of the first preset condition, this method can be grasped according to the change of operating habit in non-native user Make to decision making during mobile terminal, the automatic screen locking for carrying out mobile terminal screen.
Further, the screen locking guard method of mobile terminal of the invention in the first locking screen interface due to can be unlocked Afterwards, into unlocking pin second locking screen interface different from the first unlocking pin when carrying out important operation in preset time, because This, can be after the operating habit for detecting user changes, and the protection to the operation carry out degree higher important to payment etc., keeps away Exempt to have stolen the first unlocking pin of user and carried out the important operation such as paying, so as to reduce invasion of privacy, transfer property Possibility.
According to the accompanying drawings will be brighter to the detailed description of the specific embodiment of the invention, those skilled in the art Above-mentioned and other purposes, the advantages and features of the present invention.
Brief description of the drawings
Some specific embodiments of detailed description of the present invention by way of example, and not by way of limitation with reference to the accompanying drawings hereinafter. Identical reference numeral denotes same or similar component or part in attached drawing.It should be appreciated by those skilled in the art that these What attached drawing was not necessarily drawn to scale.In attached drawing:
Fig. 1 is the flow chart of the screen locking guard method of mobile terminal according to an embodiment of the invention;
Fig. 2 is the structure diagram of mobile terminal according to an embodiment of the invention.
Embodiment
The exemplary embodiment of the present invention is more fully described below with reference to accompanying drawings.Although the present invention is shown in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without the implementation that should be illustrated here Example is limited.Conversely, there is provided these embodiments are to be able to thoroughly understand the present invention, and can be by the scope of the present invention Completely it is communicated to those skilled in the art.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with teaching based on this.As described above, required by constructing this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Fig. 1 is the flow chart of the screen locking guard method of mobile terminal according to an embodiment of the invention.Shown in Fig. 1 In embodiment, step 110 can be first carried out:Detection mobile terminal whether there is the abnormal operation for meeting the first preset condition. First preset condition reflects the change of user operation habits, and user operation habits here can be quantified as some concrete operations, It can include but is not limited to following one or more:The input method that the continuous use time reaches the first preset time threshold is cut It is changed to another input method, the continuous lighting time of screen exceedes history continuously most long lighting time, continuous use time reach the The browser of two preset time thresholds is switched to another browser.First preset condition can by producer's setting options, by with Family voluntarily selects to add.If abnormal operation is not present, step 110 is continued to execute;If there are abnormal operation, step is performed 120:Into the first locking screen interface that unlocking pin is the first preset password.The first locking screen interface herein unlocking pin (or Person says, the first preset password) unlocking pin by user setting of screen locking that can be carried with system is identical.It can also by with Family is separately set, and is allowed to the default unlocking pin for being different from the screen locking that system carries.
In the embodiment shown in fig. 1, after step 120, step 130 is performed:User is detected in the first locking screen interface Whether the password of input is the first preset password.If password is correct, step 140 is performed:Carry out unlocking screen;If password is not just Really, then the first locking screen interface is remained in.After step 140, step 150 is performed:Detection is in the 3rd preset time threshold (the 3rd preset time threshold can be, but not limited to as 5 minutes, it can also voluntarily be set by user according to the use habit of oneself Put), mobile terminal whether there is the risky operation for meeting the second preset condition.Step 110 is performed if it is not, then returning;If so, move Dynamic terminal is not responding to the risky operation, performs step 160:Into the second screen locking circle that unlocking pin is the second preset password Face, such as:In the 3rd preset time threshold, mobile terminal receives the instruction for deleting photo, then mobile terminal is not responding to delete The instruction of photo, and enter the second locking screen interface that unlocking pin is the second preset password.
It is to be appreciated that the first locking screen interface is to detect that the abnormal operation for occurring running counter to original subscriber's operating habit goes out Just occurring now, it is not very likely original subscriber that the change of this operating habit, which only reflects user, but at this time not Occur encroaching on the interests of original subscriber very big behavior (such as deleting the important informations such as short message, photo, paid);Second lock Screen interface is after the first locking screen interface is unlocked, and (such as 5 minutes) detect the interests to user in certain time threshold value Infringement very big behavior just occurs when occurring.As can be seen that degree of protection when the first locking screen interface occurs is relatively low, the second screen locking Degree of protection when interface occurs is higher, and in other words, the second locking screen interface corresponds to the safe class of higher.Therefore, the solution of the two Lock cipher should be different, i.e., the second preset password is different from the first preset password.If the two is identical, steal default close to first The people of code only inputs the i.e. executable payment of the first preset password twice, deletes the dangerous behaviour larger to user's degree of correlation such as short message Make.Only the two is set variant, could realize the delivery operation in a period of time after user operation habits change Carry out the protection of security level higher so that other people only steal at the same time can to the first preset password and the second preset password Carry out the risky operation such as paying in this case, reduce the possibility that risky operation (such as payment) stolen taker performs.
It is to be appreciated that the second preset condition is including but not limited to following one or more:Open and pay class application, hair Stored after sending the short message comprising preset keyword, deletion short message, photo deletion, photo upload, automatic camera.Second preset condition Can voluntarily it be added in advance by producer's setting options, user, such as user thinks to delete short message and open to pay class using heavier Will, then " deletion short message " and " open and pay class application " is selected in options menu and is added to the list of the second preset condition;When After being added to list, when performing step 150, when there is the operation for deleting short message and opening payment class application, carry out moving end Screen lock is held, and unlocking pin at this time is the second preset password different from the first preset password.
After step 160, step 170 is performed:Whether the password that detection user inputs in the second locking screen interface is second Preset password.Step 110 is performed if it is not, then returning;If so, then perform step 180:Carry out unlocking screen.Performed in step 180 After, return and perform step 110.In another embodiment of the present invention, after step 180 is finished, also can return to Perform step 150.
Fig. 2 is the structure diagram of mobile terminal according to an embodiment of the invention.In the embodiment shown in Figure 2, should Mobile terminal can at least include 210 and first screen lock module 220 of first detection module.The detection movement of first detection module 210 Terminal whether there is the abnormal operation for meeting the first preset condition.First preset condition reflects the change of user operation habits;If In the presence of the first screen lock module 220 is so that mobile terminal enters the first locking screen interface that unlocking pin is the first preset password.First Preset condition includes following any one:Continuous use the time reach the first preset time threshold input method be switched to it is another Input method, the continuous lighting time of screen exceed history continuously most long lighting time, continuous use time reach second it is default when Between the browser of threshold value be switched to another browser.
In the embodiment shown in Figure 2, which may also include:First unlocked state 230, the second detection module 240th, the second screen lock module 250, the second unlocked state 260.First unlocked state 230 detection user is defeated in the first locking screen interface Whether the password entered is the first preset password, if so, then carrying out unlocking screen;Second detection module 240 detects default the 3rd In time threshold, mobile terminal whether there is the risky operation for meeting the second preset condition;If in the presence of mobile terminal is not responding to institute Risky operation is stated, the second screen lock module 250 is so that mobile terminal enters the second screen locking circle that unlocking pin is the second preset password Face;Whether the password that the second unlocked state 260 detection user inputs in the second locking screen interface is the second preset password, if so, Then carry out unlocking screen.Second preset condition includes following any one:Open and pay class application, transmission includes preset keyword Short message, delete short message, photo deletion, photo upload, store after automatic camera.
It is to be appreciated that the unlocking pin of the embodiment of the present invention is not limited to word password, nine grids numerical ciphers, word Female password, password symbol, Chinese character sentence password, finger-print cipher etc., it can also be used for mobile phone solution screen locking including gesture password etc. Unlocking pin.
It should be appreciated that in order to simplify the present invention and help to understand one or more of each inventive aspect, it is right above The present invention exemplary embodiment description in, each feature of the invention be grouped together into sometimes single embodiment, figure or In person's descriptions thereof.However, the method for the invention should be construed to reflect following intention:I.e. claimed hair It is bright to require features more more than the feature being expressly recited in each claim.More precisely, such as claims institute As reflection, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows specific embodiment party Thus claims of formula are expressly incorporated in the embodiment, wherein each claim is in itself as the present invention's Separate embodiments.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and attached drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit requires, summary and attached drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be with hardware realization, or to be run on one or more processor Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice Microprocessor or digital signal processor (DSP) come realize in Web page display apparatus according to embodiments of the present invention some or The some or all functions of person's whole component.The present invention is also implemented as perform method as described herein one Divide either whole equipment or program of device (for example, computer program and computer program product).It is such to realize this hair Bright program can store on a computer-readable medium, or can have the form of one or more signal.It is such Signal can be downloaded from internet website and obtained, and either provided on carrier signal or provided in the form of any other.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
So far, although those skilled in the art will appreciate that detailed herein have shown and described multiple showing for the present invention Example property embodiment, still, without departing from the spirit and scope of the present invention, still can according to the present invention disclosure it is direct Determine or derive many other variations or modifications for meeting the principle of the invention.Therefore, the scope of the present invention is understood that and recognizes It is set to and covers other all these variations or modifications.

Claims (2)

  1. A kind of 1. screen locking guard method of mobile terminal, it is characterised in that including:
    First detecting step:Detect the mobile terminal and whether there is the abnormal operation for meeting the first preset condition;Described first Preset condition reflects the change of user operation habits, wherein, first preset condition includes following one or more:
    The input method that the continuous use time reaches the first preset time threshold is switched to another input method, the continuous of screen is lighted Time exceedes history, and continuously most long lighting time, continuous use time reach the browser of the second preset time threshold and are switched to Another browser;
    First screen locking step:If in the presence of into the first locking screen interface that unlocking pin is the first preset password;
    First unlocked step:Whether the password that detection user inputs in the first locking screen interface is the first preset password, if so, then Carry out unlocking screen;
    Second detecting step:In the 3rd preset time threshold, the mobile terminal presets bar with the presence or absence of meeting second for detection The risky operation of part;
    Second screen locking step:If in the presence of being not responding to risky operation instruction, and enter unlocking pin for the second preset password Second locking screen interface;
    Second unlocked step:Whether the password that detection user inputs in the second locking screen interface is the second preset password, if so, then Carry out unlocking screen;Wherein,
    Second preset password is different from first preset password;
    Second preset condition includes following one or more:
    Open and pay class application, send the short message comprising preset keyword, delete the short message, photo deletions, photo upload, certainly Move and stored after taking pictures;
    After having performed the second unlocked step, the first detecting step is performed.
  2. A kind of 2. mobile terminal, it is characterised in that including:
    First detection module, is configured to:Detect the mobile terminal and whether there is the abnormal operation for meeting the first preset condition;Institute The change of the first preset condition reflection user operation habits is stated, wherein, first preset condition includes following one or more:
    The input method that the continuous use time reaches the first preset time threshold is switched to another input method, the continuous of screen is lighted Time exceedes history, and continuously most long lighting time, continuous use time reach the browser of the second preset time threshold and are switched to Another browser;
    First screen lock module, is configured to:If in the presence of so that the mobile terminal enters unlocking pin for the first preset password First locking screen interface;
    First unlocked state, is configured to:Whether the password that detection user inputs in the first locking screen interface is the first preset password, If so, then carry out unlocking screen;
    Second detection module, is configured to:In the 3rd preset time threshold, the mobile terminal, which whether there is, meets second for detection The risky operation of preset condition;
    Second screen lock module, is configured to:If in the presence of so that the mobile terminal enters unlocking pin for the second preset password Second locking screen interface;
    Second unlocked state, is configured to:Whether the password that detection user inputs in the second locking screen interface is the second preset password, If so, then carry out unlocking screen;Wherein,
    Second preset password is different from first preset password;
    Second preset condition includes following one or more:
    Open and pay class application, send the short message comprising preset keyword, delete the short message, photo deletions, photo upload, certainly Move and stored after taking pictures;
    After second unlocked state carries out unlocking screen, the first detection module detects the mobile terminal with the presence or absence of symbol Close the abnormal operation of the first preset condition.
CN201510016414.8A 2015-01-13 2015-01-13 A kind of screen locking guard method of mobile terminal and mobile terminal Active CN104573576B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510016414.8A CN104573576B (en) 2015-01-13 2015-01-13 A kind of screen locking guard method of mobile terminal and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510016414.8A CN104573576B (en) 2015-01-13 2015-01-13 A kind of screen locking guard method of mobile terminal and mobile terminal

Publications (2)

Publication Number Publication Date
CN104573576A CN104573576A (en) 2015-04-29
CN104573576B true CN104573576B (en) 2018-04-27

Family

ID=53089609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510016414.8A Active CN104573576B (en) 2015-01-13 2015-01-13 A kind of screen locking guard method of mobile terminal and mobile terminal

Country Status (1)

Country Link
CN (1) CN104573576B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122639B (en) * 2016-02-25 2020-10-30 创新先进技术有限公司 Terminal control method and device
CN107423643A (en) * 2016-05-24 2017-12-01 中兴通讯股份有限公司 Terminal unlocking cipher control method and terminal
CN106936672A (en) * 2017-03-01 2017-07-07 杭州联络互动信息科技股份有限公司 The control method and terminal of gas-fired equipment
CN107346397B (en) 2017-06-20 2021-04-06 Oppo广东移动通信有限公司 Information processing method and related product

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635762A (en) * 2008-07-21 2010-01-27 晨星软件研发(深圳)有限公司 Protection setting method and protection relieving method for hand-held device
WO2012047412A1 (en) * 2010-10-04 2012-04-12 Microsoft Corporation Multiple-access-level lock screen
CN103678965A (en) * 2012-09-14 2014-03-26 百度在线网络技术(北京)有限公司 Method and device for protecting safety of mobile equipment
WO2014079139A1 (en) * 2012-11-26 2014-05-30 蓝盾信息安全技术股份有限公司 Method and system for protecting data of mobile terminal
CN104166813A (en) * 2014-07-11 2014-11-26 北京奇虎科技有限公司 Method and device for protecting privacy content in intelligent terminal based on screen lock

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635762A (en) * 2008-07-21 2010-01-27 晨星软件研发(深圳)有限公司 Protection setting method and protection relieving method for hand-held device
WO2012047412A1 (en) * 2010-10-04 2012-04-12 Microsoft Corporation Multiple-access-level lock screen
CN103678965A (en) * 2012-09-14 2014-03-26 百度在线网络技术(北京)有限公司 Method and device for protecting safety of mobile equipment
WO2014079139A1 (en) * 2012-11-26 2014-05-30 蓝盾信息安全技术股份有限公司 Method and system for protecting data of mobile terminal
CN104166813A (en) * 2014-07-11 2014-11-26 北京奇虎科技有限公司 Method and device for protecting privacy content in intelligent terminal based on screen lock

Also Published As

Publication number Publication date
CN104573576A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN104573576B (en) A kind of screen locking guard method of mobile terminal and mobile terminal
CN105631275B (en) information display method, information display device and terminal
CN102708141B (en) System and method for in-private browsing
CN104424444B (en) Hidden folder processing method, device and terminal
DE102017106294A1 (en) authentication
CN104156657B (en) The data inputting method of terminal, the message input device of terminal and terminal
CN107026935B (en) Mobile device and permission control method and device of mobile device
US9088896B2 (en) Mobile device password reset
CN104091119B (en) The guard method of a kind of mobile terminal and its data, protection system
CN105224194B (en) A kind of data processing method and terminal
CN105069333A (en) User domain access method, access system and terminal
CN105892820A (en) Icon display management method and device
CN106211164A (en) Terminal network changing method, terminal network switching device and terminal
Sanger et al. Signaling post-Snowden Era, new iPhone locks out NSA
CN110663041A (en) System and method for providing a user account through which a user can operate a computing device
CN105912911A (en) Method and system for managing application programs of mobile equipment
US8978150B1 (en) Data recovery service with automated identification and response to compromised user credentials
CN112311795A (en) Account management method and device and electronic equipment
CN113282364A (en) Display method, display device and electronic equipment
CN107292173A (en) File safety protection method, device and equipment
CN105653918A (en) Safe operation method, safe operation device and terminal
CN106293439A (en) Interface alternation method and device
CN105335169A (en) Method and apparatus for starting up communication in intelligent terminal
US20150020165A1 (en) System of executing application and method thereof
CN106332011B (en) Short message encryption communication method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant