CN105160274B - A kind of guard method of user data and terminal - Google Patents

A kind of guard method of user data and terminal Download PDF

Info

Publication number
CN105160274B
CN105160274B CN201510615266.1A CN201510615266A CN105160274B CN 105160274 B CN105160274 B CN 105160274B CN 201510615266 A CN201510615266 A CN 201510615266A CN 105160274 B CN105160274 B CN 105160274B
Authority
CN
China
Prior art keywords
terminal
user
data verification
determined
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510615266.1A
Other languages
Chinese (zh)
Other versions
CN105160274A (en
Inventor
刘东海
许奕波
吴殿清
汪智勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510615266.1A priority Critical patent/CN105160274B/en
Priority to PCT/CN2015/093517 priority patent/WO2017049732A1/en
Publication of CN105160274A publication Critical patent/CN105160274A/en
Application granted granted Critical
Publication of CN105160274B publication Critical patent/CN105160274B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of guard method of user data, including:When detecting operational order of the user in terminal, the domain environment that the terminal is currently run is determined;According to the domain environment currently run, the user is pointed out to carry out data verification according to operating process corresponding with the domain environment currently run, and determine the result of the data verification;When it is determined that the result of the data verification is is verified, the privacy mode of the terminal is entered, wherein, the user data under the privacy mode is in hidden state under other mode of operations.The embodiment of the invention also discloses a kind of protection terminal of user data.Using the embodiment of the present invention, the security of user data protection can be improved.

Description

A kind of guard method of user data and terminal
Technical field
The present invention relates to guard method and the terminal of electronic technology field, more particularly to a kind of user data.
Background technology
With the fast development of society, user data is more and more, therefore the security of user data in terminal is also got over Come higher.In the prior art scheme, system can have multiple domains, and different domain environment can isolate operation, and same area can be with Different user data are placed, multiple domains include security domain, and it is different that user can use different authority accounts to sign in Domain, and important user data is put into security domain, only owner can just have permission entrance, the user that other accounts are logged in Belong to visitor, visitor can only access the data in other domains;Or, user can set privacy mode in the terminal, will be important User data be put under privacy mode, the user data under privacy mode is invisible under other patterns, therefore can only enter Privacy mode can just check above-mentioned user data.But, both the above mode protects the method security of user data inadequate.
The content of the invention
The embodiment of the present invention provides guard method and the terminal of a kind of user data.The peace of protection user data can be improved Quan Xing.
The embodiments of the invention provide a kind of guard method of user data, including:
When detecting operational order of the user in terminal, the domain environment that the terminal is currently run is determined;
According to the domain environment currently run, the user is pointed out according to corresponding with the domain environment currently run Operating process carries out data verification, and determines the result of the data verification;
When it is determined that the result of the data verification is is verified, the privacy mode of the terminal is entered, wherein, institute State the user data under privacy mode and hidden state is under other mode of operations.
Wherein, it is described according to the domain environment currently run, point out the user according to the domain currently run The corresponding operating process of environment, which carries out data verification, to be included:
If it is determined that the domain environment currently run is security domain, then password is verified in prompting input first;
When the first checking password for detecting input is identical with the first preset password, the data verification is determined As a result it is to be verified.
Wherein, it is described according to the domain environment currently run, point out the user according to the domain currently run The corresponding operating process of environment, which carries out data verification, to be included:
If it is determined that the domain environment currently run is security domain, the circle when the user drags interface pallet is obtained The sliding speed and/or sliding distance of face pallet;
According to the sliding speed and/or the sliding distance of the interface pallet, the knot of the data verification is determined Really.
Wherein, it is described according to the domain environment currently run, point out the user according to the domain currently run The corresponding operating process of environment, which carries out data verification, to be included:
If it is determined that the domain environment currently run is non-secure domains, then password is verified in prompting input second;
When the second checking password for detecting input is identical with the second preset password, input biological characteristic is pointed out to test Demonstrate,prove information;
When detecting the biological characteristic validation information of input with default biometric templates information matches, it is determined that The result of the data verification is to be verified.
Wherein, the sliding speed and/or sliding distance according to the interface pallet, determines the knot of the data verification Fruit includes:
When the sliding speed of the interface pallet is more than the first predetermined threshold value and/or the sliding distance more than second Predetermined threshold value, determines the result of the data verification to be verified.
Correspondingly, the embodiments of the invention provide a kind of protection terminal of user data, including:
Context detection module, for when detecting operational order of the user in terminal, determining that the terminal is currently transported Capable domain environment;
Data Verification module, for according to the domain environment currently run, point out the user according to it is described current The corresponding operating process of domain environment of operation carries out data verification, and determines the result of the data verification;
Pattern enters module, for when it is determined that the result of the data verification is is verified, entering the terminal Privacy mode, wherein, user data under the privacy mode is in hidden state under other mode of operations.
Wherein, the Data Verification module include the first authentication unit, first authentication unit specifically for:
If it is determined that the domain environment currently run is security domain, then password is verified in prompting input first;
When the first checking password for detecting input is identical with the first preset password, the data verification is determined As a result it is to be verified.
Wherein, the Data Verification module include the second authentication unit, second authentication unit specifically for:
If it is determined that the domain environment currently run is security domain, the circle when the user drags interface pallet is obtained The sliding speed and/or sliding distance of face pallet;
According to the sliding speed and/or the sliding distance of the interface pallet, the knot of the data verification is determined Really.
Wherein, the Data Verification module include the 3rd authentication unit, the 3rd authentication unit specifically for:
If it is determined that the domain environment currently run is non-secure domains, then password is verified in prompting input second;
When the second checking password for detecting input is identical with the second preset password, input biological characteristic is pointed out to test Demonstrate,prove information;
When detecting the biological characteristic validation information of input with default biometric templates information matches, it is determined that The result of the data verification is to be verified.
Wherein, second authentication unit specifically for:
When the sliding speed of the interface pallet is more than the first predetermined threshold value and/or the sliding distance more than second Predetermined threshold value, determines the result of the data verification to be verified.
Implement the embodiment of the present invention, first when detecting operational order of the user in terminal, determine that terminal is currently transported Capable domain environment;Then according to the domain environment currently run, user is pointed out to be operated according to the domain environment with currently running is corresponding Flow carries out data verification, and determines the result of data verification;Finally when it is determined that the result of data verification is is verified, enter Enter the privacy mode to terminal, wherein, the user data under privacy mode is in hidden state under other mode of operations.Pass through Security domain, biological characteristic validation and privacy mode are combined, the security of user data protection is improved.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, being used required in being described below to embodiment Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for this area For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the guard method for user data that first embodiment of the invention is provided;
Fig. 2 is a kind of display schematic diagram at data verification interface provided in an embodiment of the present invention;
Fig. 3 is a kind of schematic flow sheet of the guard method for user data that second embodiment of the invention is provided;
Fig. 4 is a kind of structural representation of the protection terminal of user data provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Fig. 1 is refer to, Fig. 1 is a kind of flow signal of the guard method for user data that first embodiment of the invention is provided Figure.As illustrated, the method in the embodiment of the present invention includes:
S101, when detecting operational order of the user in terminal, determines the domain environment that the terminal is currently run.
In the specific implementation, system can run multiple domain environment, multiple domain environment include security domain, common domain and trip Play domain etc., different domains can isolate operation, and same area can not place different user data, and user can use different Authority account signs in different domains, and important user data is put into security domain, and only owner can just have permission entrance Security domain, the user that other accounts are logged in belongs to visitor, and visitor can only access the user data in other domains.On to terminal Application when being operated, the domain environment that terminal is currently run can be detected.
S102, according to the domain environment currently run, point out the user according to the domain environment currently run Corresponding operating process carries out data verification, and determines the result of the data verification.
In the specific implementation, the operational order of the entrance for privacy mode of user's input can be received, according to institute first The operational order of the entrance for privacy mode is stated, the checking interface of privacy mode is shown, then in checking circle of privacy mode Under face, the user is pointed out to carry out data verification according to operating process corresponding with the domain environment currently run.
Optionally, however, it is determined that the domain environment currently run is security domain, obtains and drags interface pallet in the user The sliding speed and/or sliding distance of Shi Suoshu interfaces pallet;According to the sliding speed of the interface pallet and/or described Sliding distance, determines the result of the data verification.Further, when the sliding speed of the interface pallet is more than first Predetermined threshold value and/or the sliding distance are more than the second predetermined threshold value, determine the result of the data verification to be verified.When The sliding speed of the interface pallet is not more than the first predetermined threshold value and the sliding distance is not more than the second default threshold During value, determine that the result of the data verification does not pass through for checking, user can be pointed out to drag interface pallet again.Wherein, boundary Face pallet can be rapid switch column or informing.
Optionally, however, it is determined that the domain environment currently run is security domain, then password is verified in prompting input first;Work as inspection Measure input the first checking password it is identical with the first preset password when, determine that the result of the data verification is led to for checking Cross.When the first checking password and the first preset password that detect input are differed, the knot of the data verification is determined Fruit does not pass through for checking, and user can be pointed out to re-enter checking password and carry out data verification, until the checking that user inputs is close Code is correct.In addition, if when the number of times that user re-enters checking password exceedes preset times, can be in preset time range Inside forbid user's input validation password.
For example:As shown in Fig. 2 Fig. 2 is the checking interface of privacy mode, checking interface includes two kinds of verification modes, first User can drag interface pallet to the lower section of terminal display interface, and at interface, pallet drags to the intermediate region of display interface When, complete the operating procedure of interface pallet and enter dial interface, point out user's input validation password, user's input validation Password and after clicking on " next step " button, when terminal determines that the checking password of input is correct, the result of data verification is tests Card passes through.Or, user can select dial interface, and input validation password can be carried out data verification.Move back if desired Go out the checking interface of privacy mode, " closing " button can be clicked on.
Optionally, however, it is determined that the domain environment currently run is non-secure domains, then password is verified in prompting input second;When Detect input it is described second checking password it is identical with the second preset password when, point out input biological characteristic validation information;When When detecting the biological characteristic validation information of input with default biometric templates information matches, determine that the data are tested The result of card is to be verified.Wherein, biological characteristic validation information can be fingerprint identifier, and biometric templates information can Think fingerprint template information.
S103, when it is determined that the result of the data verification is is verified, enters the privacy mode of the terminal, its In, the user data under the privacy mode is in hidden state under other mode of operations.
In the specific implementation, if it is determined that the domain environment currently run be security domain, detecting described the first of input When verifying that password is identical with the first preset password, the privacy mode of the terminal can be entered;Or in the interface pallet When the sliding speed is more than the first predetermined threshold value and/or the sliding distance more than the second predetermined threshold value, institute can be entered State the privacy mode of terminal.
Optionally, however, it is determined that the domain environment currently run is non-secure domains, is tested in detect input described second Demonstrate,prove password is identical with the second preset password and inputs the biological characteristic validation information and default biometric templates information During matching, the privacy mode of the terminal is entered.
In embodiments of the present invention, determine that terminal is currently transported when detecting operational order of the user in terminal first Capable domain environment;Then according to the domain environment currently run, user is pointed out to be operated according to the domain environment with currently running is corresponding Flow carries out data verification, and determines the result of data verification;Finally when it is determined that the result of data verification is is verified, enter Enter the privacy mode to terminal, wherein, the user data under privacy mode is in hidden state under other mode of operations.Pass through Security domain, biological characteristic validation and privacy mode are combined, the security of user data protection is improved.
Fig. 3 is refer to, Fig. 3 is a kind of flow signal of the guard method for user data that second embodiment of the invention is provided Figure.As illustrated, the method in the embodiment of the present invention includes:
S301, when detecting operational order of the user in terminal, determines the domain environment that the terminal is currently run.
In the specific implementation, system can run multiple domain environment, multiple domain environment include security domain, common domain and trip Play domain etc., different domains can isolate operation, and same area can not place different user data, and user can use different Authority account signs in different domains, and important user data is put into security domain, and only owner can just have permission entrance Security domain, the user that other accounts are logged in belongs to visitor, and visitor can only access the user data in other domains.On to terminal Application when being operated, the domain environment that terminal is currently run can be detected.
Password is verified in S302, however, it is determined that the domain environment currently run is non-secure domains, then prompting input second.Its In, non-secure domains can be common domain and game field etc..
In the specific implementation, the operational order of the entrance for privacy mode of user's input can be received, according to institute first The operational order of the entrance for privacy mode is stated, the checking interface of privacy mode is shown, then in checking circle of privacy mode Under face, password can be verified in dial interface prompt user input second.
S303 points out input biological special when the second checking password for detecting input is identical with the second preset password Levy checking information.Wherein, biological characteristic validation information can be fingerprint identifier.
In the specific implementation, when the second checking password and the second preset password that detect input are differed, can be with Prompting user re-enters checking password and carries out data verification, until the checking password that user inputs is correct.In addition, if user When the number of times for re-entering checking password exceedes preset times, interior in preset time range user's input validation can be forbidden close Code.
S304, when the biological characteristic validation information and default biometric templates information matches that detect input When, the result of the data verification is determined to be verified.
In the specific implementation, when the biological characteristic validation information and default biometric templates information that detect input During mismatch, determine that the result of the data verification does not pass through for checking, user can be pointed out to re-enter fingerprint identifier Verified.
S305, when it is determined that the result of the data verification is is verified, enters the privacy mode of the terminal, its In, the user data under the privacy mode is in hidden state under other mode of operations.
In the specific implementation, if it is determined that the domain environment currently run is non-secure domains, detecting described the of input The two biological characteristic validation information verified that passwords are identical with the second preset password and inputted and default biometric templates During information matches, the privacy mode of the terminal is entered.
In embodiments of the present invention, determine that terminal is currently transported when detecting operational order of the user in terminal first Capable domain environment;Then according to the domain environment currently run, user is pointed out to be operated according to the domain environment with currently running is corresponding Flow carries out data verification, and determines the result of data verification;Finally when it is determined that the result of data verification is is verified, enter Enter the privacy mode to terminal, wherein, the user data under privacy mode is in hidden state under other mode of operations.Pass through Security domain, biological characteristic validation and privacy mode are combined, the security of user data protection is improved.
Fig. 4 is refer to, Fig. 4 is a kind of structural representation of the protection terminal of user data provided in an embodiment of the present invention. As illustrated, the terminal in the embodiment of the present invention includes:
Context detection module 401, for when detecting operational order of the user in terminal, determining that the terminal is current The domain environment of operation.
In the specific implementation, system can run multiple domain environment, multiple domain environment include security domain, common domain and trip Play domain etc., different domains can isolate operation, and same area can not place different user data, and user can use different Authority account signs in different domains, and important user data is put into security domain, and only owner can just have permission entrance Security domain, the user that other accounts are logged in belongs to visitor, and visitor can only access the user data in other domains.On to terminal Application when being operated, the domain environment that terminal is currently run can be detected.
Data Verification module 402, for according to the domain environment currently run, pointing out the user to work as according to described The corresponding operating process of domain environment of preceding operation carries out data verification, and determines the result of the data verification.
In the specific implementation, the operational order of the entrance for privacy mode of user's input can be received, according to institute first The operational order of the entrance for privacy mode is stated, the checking interface of privacy mode is shown, then in checking circle of privacy mode Under face, the user is pointed out to carry out data verification according to operating process corresponding with the domain environment currently run.
Optionally, however, it is determined that the domain environment currently run is security domain, obtains and drags interface pallet in the user The sliding speed and/or sliding distance of Shi Suoshu interfaces pallet;According to the sliding speed of the interface pallet and/or described Sliding distance, determines the result of the data verification.Further, when the sliding speed of the interface pallet is more than first Predetermined threshold value and/or the sliding distance are more than the second predetermined threshold value, determine the result of the data verification to be verified.When The sliding speed of the interface pallet is not more than the first predetermined threshold value and the sliding distance is not more than the second default threshold During value, determine that the result of the data verification does not pass through for checking, user can be pointed out to drag interface pallet again.Wherein, boundary Face pallet can be rapid switch column or informing.
Optionally, however, it is determined that the domain environment currently run is security domain, then password is verified in prompting input first;Work as inspection Measure input the first checking password it is identical with the first preset password when, determine that the result of the data verification is led to for checking Cross.When the first checking password and the first preset password that detect input are differed, the knot of the data verification is determined Fruit does not pass through for checking, and user can be pointed out to re-enter checking password and carry out data verification, until the checking that user inputs is close Code is correct.In addition, if when the number of times that user re-enters checking password exceedes preset times, can be in preset time range Inside forbid user's input validation password.
For example:As shown in Fig. 2 Fig. 2 is the checking interface of privacy mode, checking interface includes two kinds of verification modes, first User can drag interface pallet to the lower section of terminal display interface, and at interface, pallet drags to the intermediate region of display interface When, complete the operating procedure of interface pallet and enter dial interface, point out user's input validation password, user's input validation Password and after clicking on " next step " button, when terminal determines that the checking password of input is correct, the result of data verification is tests Card passes through.Or, user can select dial interface, and input validation password can be carried out data verification.Move back if desired Go out the checking interface of privacy mode, " closing " button can be clicked on.
Optionally, first if it is determined that the domain environment currently run is non-secure domains, then the checking of prompting input second is close Code, wherein, non-secure domains can be common domain and game field etc..Then when the second checking password for detecting input When identical with the second preset password, input biological characteristic validation information is pointed out.Wherein, biological characteristic validation information can be fingerprint Checking information, when the second checking password and the second preset password that detect input are differed, can point out user weight New input validation password carries out data verification, until the checking password that user inputs is correct.Tested in addition, if user re-enters When the number of times for demonstrate,proving password exceedes preset times, interior in preset time range it can forbid user's input validation password.Finally when When detecting the biological characteristic validation information of input with default biometric templates information matches, determine that the data are tested The result of card is is verified, when the biological characteristic validation information and default biometric templates information that detect input During mismatch, determine that the result of the data verification does not pass through for checking, user can be pointed out to re-enter fingerprint identifier Verified.
Pattern enters module 403, for when it is determined that the result of the data verification is is verified, entering the end The privacy mode at end, wherein, the user data under the privacy mode is in hidden state under other mode of operations.
In the specific implementation, if it is determined that the domain environment currently run be security domain, detecting described the first of input When verifying that password is identical with the first preset password, the privacy mode of the terminal can be entered;Or in the interface pallet When the sliding speed is more than the first predetermined threshold value and/or the sliding distance more than the second predetermined threshold value, institute can be entered State the privacy mode of terminal.
Optionally, however, it is determined that the domain environment currently run is non-secure domains, is tested in detect input described second Demonstrate,prove password is identical with the second preset password and inputs the biological characteristic validation information and default biometric templates information During matching, the privacy mode of the terminal is entered.
In embodiments of the present invention, determine that terminal is currently transported when detecting operational order of the user in terminal first Capable domain environment;Then according to the domain environment currently run, user is pointed out to be operated according to the domain environment with currently running is corresponding Flow carries out data verification, and determines the result of data verification;Finally when it is determined that the result of data verification is is verified, enter Enter the privacy mode to terminal, wherein, the user data under privacy mode is in hidden state under other mode of operations.Pass through Security domain, biological characteristic validation and privacy mode are combined, the security of user data protection is improved.
It should be noted that for each foregoing embodiment of the method, in order to be briefly described, therefore it is all expressed as to one it is The combination of actions of row, but those skilled in the art should know, the present invention is not limited by described sequence of movement, because For according to the present invention, certain some step can be carried out sequentially or simultaneously using other.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily this hair Necessary to bright.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and is not described in some embodiment Part, may refer to the associated description of other embodiment.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage Medium can include:Flash disk, read-only storage (English:Read-Only Memory, referred to as:ROM), random access device (English Text:Random Access Memory, referred to as:RAM), disk or CD etc..
The content download method and relevant device that are there is provided above the embodiment of the present invention, system are described in detail, Specific case used herein is set forth to the principle and embodiment of the present invention, and the explanation of above example is to use Understand the method and its core concept of the present invention in help;Simultaneously for those of ordinary skill in the art, according to the present invention's Thought, will change in specific embodiments and applications, in summary, and this specification content should not be construed as Limitation of the present invention.

Claims (4)

1. a kind of guard method of user data, it is characterised in that methods described includes:
When detecting operational order of the user in terminal, the domain environment that the terminal is currently run is determined;
If it is determined that the domain environment currently run is security domain, the interface support when the user drags interface pallet is obtained The sliding speed and/or sliding distance of disk, and when the interface pallet the sliding speed be more than the first predetermined threshold value and/or The sliding distance is more than the second predetermined threshold value, determines the result of data verification to be verified;
When it is determined that the result of the data verification is is verified, the privacy mode of the terminal is entered, wherein, the private User data under close pattern is in hidden state under other mode of operations.
2. the method as described in claim 1, it is characterised in that described when detecting operational order of the user in terminal, After determining the domain environment that the terminal is currently run, in addition to:
If it is determined that the domain environment currently run is non-secure domains, then password is verified in prompting input second;
When the second checking password for detecting input is identical with the second preset password, input biological characteristic validation letter is pointed out Breath;
When detecting the biological characteristic validation information of input with default biometric templates information matches, it is determined that described The result of data verification is to be verified.
3. the protection terminal of a kind of user data, it is characterised in that the terminal includes:
Context detection module, for when detecting operational order of the user in terminal, determining what the terminal was currently run Domain environment;
Data Verification module, for if it is determined that the domain environment currently run is security domain, acquisition to drag boundary in the user The sliding speed and/or sliding distance of the interface pallet during pallet of face, and when the sliding speed of the interface pallet is big It is more than the second predetermined threshold value in the first predetermined threshold value and/or the sliding distance, determines the result of data verification to be verified;
Pattern enters module, for when it is determined that the result of the data verification is is verified, entering the private of the terminal Close pattern, wherein, the user data under the privacy mode is in hidden state under other mode of operations.
4. the terminal as described in right wants 3, it is characterised in that the Data Verification module includes the 3rd authentication unit, described the Three authentication units specifically for:
If it is determined that the domain environment currently run is non-secure domains, then password is verified in prompting input second;
When the second checking password for detecting input is identical with the second preset password, input biological characteristic validation letter is pointed out Breath;
When detecting the biological characteristic validation information of input with default biometric templates information matches, it is determined that described The result of data verification is to be verified.
CN201510615266.1A 2015-09-24 2015-09-24 A kind of guard method of user data and terminal Active CN105160274B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510615266.1A CN105160274B (en) 2015-09-24 2015-09-24 A kind of guard method of user data and terminal
PCT/CN2015/093517 WO2017049732A1 (en) 2015-09-24 2015-10-31 User data protection method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510615266.1A CN105160274B (en) 2015-09-24 2015-09-24 A kind of guard method of user data and terminal

Publications (2)

Publication Number Publication Date
CN105160274A CN105160274A (en) 2015-12-16
CN105160274B true CN105160274B (en) 2017-10-27

Family

ID=54801126

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510615266.1A Active CN105160274B (en) 2015-09-24 2015-09-24 A kind of guard method of user data and terminal

Country Status (2)

Country Link
CN (1) CN105160274B (en)
WO (1) WO2017049732A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631293A (en) * 2015-12-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Data access method, data access system and terminal
CN105787318B (en) * 2016-03-28 2018-09-14 宇龙计算机通信科技(深圳)有限公司 Access method, access mechanism and the mobile terminal of user domain
CN107395880B (en) * 2017-07-14 2021-05-28 腾讯科技(深圳)有限公司 Information display method and device and terminal
CN109635542B (en) 2018-11-30 2023-02-03 华为技术有限公司 Biological identification interaction method, graphical interaction interface and related device
CN111556063A (en) * 2020-05-06 2020-08-18 南京林业大学 Information safety reporting system based on intranet

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345963A (en) * 2008-08-15 2009-01-14 宇龙计算机通信科技(深圳)有限公司 Secrecy method, system and mobile terminal for private data

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427343A (en) * 2001-12-18 2003-07-02 阳庆电子股份有限公司 Device for preventing setting of equipment of software be used or altered by non authorized person
US20060129840A1 (en) * 2002-04-23 2006-06-15 Michael Milgramm Multiplatform independent biometric identification system
TWI525467B (en) * 2013-10-31 2016-03-11 萬國商業機器公司 Method and computer system for dynamically providing multi-dimensions based password/challenge authentication
CN104021358A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Anti-theft control method and device for mobile terminal
CN104200144A (en) * 2014-09-05 2014-12-10 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
CN104615927B (en) * 2014-12-31 2018-02-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safety verification device and terminal

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345963A (en) * 2008-08-15 2009-01-14 宇龙计算机通信科技(深圳)有限公司 Secrecy method, system and mobile terminal for private data

Also Published As

Publication number Publication date
WO2017049732A1 (en) 2017-03-30
CN105160274A (en) 2015-12-16

Similar Documents

Publication Publication Date Title
CN105160274B (en) A kind of guard method of user data and terminal
US20130229367A1 (en) Dynamic Patterns for Mobile Device Authentication
CN105335641B (en) A kind of auth method and device based on fingerprint recognition
CN106599716A (en) Message content protection method and device, and mobile terminal
CN102509044B (en) Mouse behavior characteristic-based password authentication method
CN105049607B (en) A kind of short message display method and mobile terminal
CN104954131B (en) The verification method and system of identifying code
CN104360812B (en) A kind of method and device of sliding unlock
CN109660556A (en) User log-in method, device, equipment and storage medium based on information security
CN104933339A (en) Unlocking control method and mobile terminal
CN106529269A (en) Security verification method and system
CN107644172A (en) The guard method of content displaying and device
CN106372470A (en) Method for reminding of inputting password and mobile terminal
CN106603241A (en) Unlocking method, apparatus and electronic device
CN104853030B (en) The method and mobile terminal of a kind of information processing
CN115827610A (en) Method and device for detecting effective load
CN106203174A (en) Application information processing method and device and electronic equipment
US9357388B2 (en) Symbol selection for swipe based authentication
CN107085694B (en) Information display processing method and device
CN104217153A (en) Information processing method and electronic equipment
CN107463814A (en) A kind of mobile terminal verification method, system and mobile terminal
CN105787318B (en) Access method, access mechanism and the mobile terminal of user domain
Yue Sensor-based mobile web fingerprinting and cross-site input inference attacks
WO2016075545A1 (en) Remote pin entry
CN105825118A (en) Terminal and method for unlocking based on compass and turntable

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant