CN105160274B - A kind of guard method of user data and terminal - Google Patents
A kind of guard method of user data and terminal Download PDFInfo
- Publication number
- CN105160274B CN105160274B CN201510615266.1A CN201510615266A CN105160274B CN 105160274 B CN105160274 B CN 105160274B CN 201510615266 A CN201510615266 A CN 201510615266A CN 105160274 B CN105160274 B CN 105160274B
- Authority
- CN
- China
- Prior art keywords
- terminal
- user
- data verification
- determined
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- User Interface Of Digital Computer (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of guard method of user data, including:When detecting operational order of the user in terminal, the domain environment that the terminal is currently run is determined;According to the domain environment currently run, the user is pointed out to carry out data verification according to operating process corresponding with the domain environment currently run, and determine the result of the data verification;When it is determined that the result of the data verification is is verified, the privacy mode of the terminal is entered, wherein, the user data under the privacy mode is in hidden state under other mode of operations.The embodiment of the invention also discloses a kind of protection terminal of user data.Using the embodiment of the present invention, the security of user data protection can be improved.
Description
Technical field
The present invention relates to guard method and the terminal of electronic technology field, more particularly to a kind of user data.
Background technology
With the fast development of society, user data is more and more, therefore the security of user data in terminal is also got over
Come higher.In the prior art scheme, system can have multiple domains, and different domain environment can isolate operation, and same area can be with
Different user data are placed, multiple domains include security domain, and it is different that user can use different authority accounts to sign in
Domain, and important user data is put into security domain, only owner can just have permission entrance, the user that other accounts are logged in
Belong to visitor, visitor can only access the data in other domains;Or, user can set privacy mode in the terminal, will be important
User data be put under privacy mode, the user data under privacy mode is invisible under other patterns, therefore can only enter
Privacy mode can just check above-mentioned user data.But, both the above mode protects the method security of user data inadequate.
The content of the invention
The embodiment of the present invention provides guard method and the terminal of a kind of user data.The peace of protection user data can be improved
Quan Xing.
The embodiments of the invention provide a kind of guard method of user data, including:
When detecting operational order of the user in terminal, the domain environment that the terminal is currently run is determined;
According to the domain environment currently run, the user is pointed out according to corresponding with the domain environment currently run
Operating process carries out data verification, and determines the result of the data verification;
When it is determined that the result of the data verification is is verified, the privacy mode of the terminal is entered, wherein, institute
State the user data under privacy mode and hidden state is under other mode of operations.
Wherein, it is described according to the domain environment currently run, point out the user according to the domain currently run
The corresponding operating process of environment, which carries out data verification, to be included:
If it is determined that the domain environment currently run is security domain, then password is verified in prompting input first;
When the first checking password for detecting input is identical with the first preset password, the data verification is determined
As a result it is to be verified.
Wherein, it is described according to the domain environment currently run, point out the user according to the domain currently run
The corresponding operating process of environment, which carries out data verification, to be included:
If it is determined that the domain environment currently run is security domain, the circle when the user drags interface pallet is obtained
The sliding speed and/or sliding distance of face pallet;
According to the sliding speed and/or the sliding distance of the interface pallet, the knot of the data verification is determined
Really.
Wherein, it is described according to the domain environment currently run, point out the user according to the domain currently run
The corresponding operating process of environment, which carries out data verification, to be included:
If it is determined that the domain environment currently run is non-secure domains, then password is verified in prompting input second;
When the second checking password for detecting input is identical with the second preset password, input biological characteristic is pointed out to test
Demonstrate,prove information;
When detecting the biological characteristic validation information of input with default biometric templates information matches, it is determined that
The result of the data verification is to be verified.
Wherein, the sliding speed and/or sliding distance according to the interface pallet, determines the knot of the data verification
Fruit includes:
When the sliding speed of the interface pallet is more than the first predetermined threshold value and/or the sliding distance more than second
Predetermined threshold value, determines the result of the data verification to be verified.
Correspondingly, the embodiments of the invention provide a kind of protection terminal of user data, including:
Context detection module, for when detecting operational order of the user in terminal, determining that the terminal is currently transported
Capable domain environment;
Data Verification module, for according to the domain environment currently run, point out the user according to it is described current
The corresponding operating process of domain environment of operation carries out data verification, and determines the result of the data verification;
Pattern enters module, for when it is determined that the result of the data verification is is verified, entering the terminal
Privacy mode, wherein, user data under the privacy mode is in hidden state under other mode of operations.
Wherein, the Data Verification module include the first authentication unit, first authentication unit specifically for:
If it is determined that the domain environment currently run is security domain, then password is verified in prompting input first;
When the first checking password for detecting input is identical with the first preset password, the data verification is determined
As a result it is to be verified.
Wherein, the Data Verification module include the second authentication unit, second authentication unit specifically for:
If it is determined that the domain environment currently run is security domain, the circle when the user drags interface pallet is obtained
The sliding speed and/or sliding distance of face pallet;
According to the sliding speed and/or the sliding distance of the interface pallet, the knot of the data verification is determined
Really.
Wherein, the Data Verification module include the 3rd authentication unit, the 3rd authentication unit specifically for:
If it is determined that the domain environment currently run is non-secure domains, then password is verified in prompting input second;
When the second checking password for detecting input is identical with the second preset password, input biological characteristic is pointed out to test
Demonstrate,prove information;
When detecting the biological characteristic validation information of input with default biometric templates information matches, it is determined that
The result of the data verification is to be verified.
Wherein, second authentication unit specifically for:
When the sliding speed of the interface pallet is more than the first predetermined threshold value and/or the sliding distance more than second
Predetermined threshold value, determines the result of the data verification to be verified.
Implement the embodiment of the present invention, first when detecting operational order of the user in terminal, determine that terminal is currently transported
Capable domain environment;Then according to the domain environment currently run, user is pointed out to be operated according to the domain environment with currently running is corresponding
Flow carries out data verification, and determines the result of data verification;Finally when it is determined that the result of data verification is is verified, enter
Enter the privacy mode to terminal, wherein, the user data under privacy mode is in hidden state under other mode of operations.Pass through
Security domain, biological characteristic validation and privacy mode are combined, the security of user data protection is improved.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, being used required in being described below to embodiment
Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for this area
For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the guard method for user data that first embodiment of the invention is provided;
Fig. 2 is a kind of display schematic diagram at data verification interface provided in an embodiment of the present invention;
Fig. 3 is a kind of schematic flow sheet of the guard method for user data that second embodiment of the invention is provided;
Fig. 4 is a kind of structural representation of the protection terminal of user data provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
Fig. 1 is refer to, Fig. 1 is a kind of flow signal of the guard method for user data that first embodiment of the invention is provided
Figure.As illustrated, the method in the embodiment of the present invention includes:
S101, when detecting operational order of the user in terminal, determines the domain environment that the terminal is currently run.
In the specific implementation, system can run multiple domain environment, multiple domain environment include security domain, common domain and trip
Play domain etc., different domains can isolate operation, and same area can not place different user data, and user can use different
Authority account signs in different domains, and important user data is put into security domain, and only owner can just have permission entrance
Security domain, the user that other accounts are logged in belongs to visitor, and visitor can only access the user data in other domains.On to terminal
Application when being operated, the domain environment that terminal is currently run can be detected.
S102, according to the domain environment currently run, point out the user according to the domain environment currently run
Corresponding operating process carries out data verification, and determines the result of the data verification.
In the specific implementation, the operational order of the entrance for privacy mode of user's input can be received, according to institute first
The operational order of the entrance for privacy mode is stated, the checking interface of privacy mode is shown, then in checking circle of privacy mode
Under face, the user is pointed out to carry out data verification according to operating process corresponding with the domain environment currently run.
Optionally, however, it is determined that the domain environment currently run is security domain, obtains and drags interface pallet in the user
The sliding speed and/or sliding distance of Shi Suoshu interfaces pallet;According to the sliding speed of the interface pallet and/or described
Sliding distance, determines the result of the data verification.Further, when the sliding speed of the interface pallet is more than first
Predetermined threshold value and/or the sliding distance are more than the second predetermined threshold value, determine the result of the data verification to be verified.When
The sliding speed of the interface pallet is not more than the first predetermined threshold value and the sliding distance is not more than the second default threshold
During value, determine that the result of the data verification does not pass through for checking, user can be pointed out to drag interface pallet again.Wherein, boundary
Face pallet can be rapid switch column or informing.
Optionally, however, it is determined that the domain environment currently run is security domain, then password is verified in prompting input first;Work as inspection
Measure input the first checking password it is identical with the first preset password when, determine that the result of the data verification is led to for checking
Cross.When the first checking password and the first preset password that detect input are differed, the knot of the data verification is determined
Fruit does not pass through for checking, and user can be pointed out to re-enter checking password and carry out data verification, until the checking that user inputs is close
Code is correct.In addition, if when the number of times that user re-enters checking password exceedes preset times, can be in preset time range
Inside forbid user's input validation password.
For example:As shown in Fig. 2 Fig. 2 is the checking interface of privacy mode, checking interface includes two kinds of verification modes, first
User can drag interface pallet to the lower section of terminal display interface, and at interface, pallet drags to the intermediate region of display interface
When, complete the operating procedure of interface pallet and enter dial interface, point out user's input validation password, user's input validation
Password and after clicking on " next step " button, when terminal determines that the checking password of input is correct, the result of data verification is tests
Card passes through.Or, user can select dial interface, and input validation password can be carried out data verification.Move back if desired
Go out the checking interface of privacy mode, " closing " button can be clicked on.
Optionally, however, it is determined that the domain environment currently run is non-secure domains, then password is verified in prompting input second;When
Detect input it is described second checking password it is identical with the second preset password when, point out input biological characteristic validation information;When
When detecting the biological characteristic validation information of input with default biometric templates information matches, determine that the data are tested
The result of card is to be verified.Wherein, biological characteristic validation information can be fingerprint identifier, and biometric templates information can
Think fingerprint template information.
S103, when it is determined that the result of the data verification is is verified, enters the privacy mode of the terminal, its
In, the user data under the privacy mode is in hidden state under other mode of operations.
In the specific implementation, if it is determined that the domain environment currently run be security domain, detecting described the first of input
When verifying that password is identical with the first preset password, the privacy mode of the terminal can be entered;Or in the interface pallet
When the sliding speed is more than the first predetermined threshold value and/or the sliding distance more than the second predetermined threshold value, institute can be entered
State the privacy mode of terminal.
Optionally, however, it is determined that the domain environment currently run is non-secure domains, is tested in detect input described second
Demonstrate,prove password is identical with the second preset password and inputs the biological characteristic validation information and default biometric templates information
During matching, the privacy mode of the terminal is entered.
In embodiments of the present invention, determine that terminal is currently transported when detecting operational order of the user in terminal first
Capable domain environment;Then according to the domain environment currently run, user is pointed out to be operated according to the domain environment with currently running is corresponding
Flow carries out data verification, and determines the result of data verification;Finally when it is determined that the result of data verification is is verified, enter
Enter the privacy mode to terminal, wherein, the user data under privacy mode is in hidden state under other mode of operations.Pass through
Security domain, biological characteristic validation and privacy mode are combined, the security of user data protection is improved.
Fig. 3 is refer to, Fig. 3 is a kind of flow signal of the guard method for user data that second embodiment of the invention is provided
Figure.As illustrated, the method in the embodiment of the present invention includes:
S301, when detecting operational order of the user in terminal, determines the domain environment that the terminal is currently run.
In the specific implementation, system can run multiple domain environment, multiple domain environment include security domain, common domain and trip
Play domain etc., different domains can isolate operation, and same area can not place different user data, and user can use different
Authority account signs in different domains, and important user data is put into security domain, and only owner can just have permission entrance
Security domain, the user that other accounts are logged in belongs to visitor, and visitor can only access the user data in other domains.On to terminal
Application when being operated, the domain environment that terminal is currently run can be detected.
Password is verified in S302, however, it is determined that the domain environment currently run is non-secure domains, then prompting input second.Its
In, non-secure domains can be common domain and game field etc..
In the specific implementation, the operational order of the entrance for privacy mode of user's input can be received, according to institute first
The operational order of the entrance for privacy mode is stated, the checking interface of privacy mode is shown, then in checking circle of privacy mode
Under face, password can be verified in dial interface prompt user input second.
S303 points out input biological special when the second checking password for detecting input is identical with the second preset password
Levy checking information.Wherein, biological characteristic validation information can be fingerprint identifier.
In the specific implementation, when the second checking password and the second preset password that detect input are differed, can be with
Prompting user re-enters checking password and carries out data verification, until the checking password that user inputs is correct.In addition, if user
When the number of times for re-entering checking password exceedes preset times, interior in preset time range user's input validation can be forbidden close
Code.
S304, when the biological characteristic validation information and default biometric templates information matches that detect input
When, the result of the data verification is determined to be verified.
In the specific implementation, when the biological characteristic validation information and default biometric templates information that detect input
During mismatch, determine that the result of the data verification does not pass through for checking, user can be pointed out to re-enter fingerprint identifier
Verified.
S305, when it is determined that the result of the data verification is is verified, enters the privacy mode of the terminal, its
In, the user data under the privacy mode is in hidden state under other mode of operations.
In the specific implementation, if it is determined that the domain environment currently run is non-secure domains, detecting described the of input
The two biological characteristic validation information verified that passwords are identical with the second preset password and inputted and default biometric templates
During information matches, the privacy mode of the terminal is entered.
In embodiments of the present invention, determine that terminal is currently transported when detecting operational order of the user in terminal first
Capable domain environment;Then according to the domain environment currently run, user is pointed out to be operated according to the domain environment with currently running is corresponding
Flow carries out data verification, and determines the result of data verification;Finally when it is determined that the result of data verification is is verified, enter
Enter the privacy mode to terminal, wherein, the user data under privacy mode is in hidden state under other mode of operations.Pass through
Security domain, biological characteristic validation and privacy mode are combined, the security of user data protection is improved.
Fig. 4 is refer to, Fig. 4 is a kind of structural representation of the protection terminal of user data provided in an embodiment of the present invention.
As illustrated, the terminal in the embodiment of the present invention includes:
Context detection module 401, for when detecting operational order of the user in terminal, determining that the terminal is current
The domain environment of operation.
In the specific implementation, system can run multiple domain environment, multiple domain environment include security domain, common domain and trip
Play domain etc., different domains can isolate operation, and same area can not place different user data, and user can use different
Authority account signs in different domains, and important user data is put into security domain, and only owner can just have permission entrance
Security domain, the user that other accounts are logged in belongs to visitor, and visitor can only access the user data in other domains.On to terminal
Application when being operated, the domain environment that terminal is currently run can be detected.
Data Verification module 402, for according to the domain environment currently run, pointing out the user to work as according to described
The corresponding operating process of domain environment of preceding operation carries out data verification, and determines the result of the data verification.
In the specific implementation, the operational order of the entrance for privacy mode of user's input can be received, according to institute first
The operational order of the entrance for privacy mode is stated, the checking interface of privacy mode is shown, then in checking circle of privacy mode
Under face, the user is pointed out to carry out data verification according to operating process corresponding with the domain environment currently run.
Optionally, however, it is determined that the domain environment currently run is security domain, obtains and drags interface pallet in the user
The sliding speed and/or sliding distance of Shi Suoshu interfaces pallet;According to the sliding speed of the interface pallet and/or described
Sliding distance, determines the result of the data verification.Further, when the sliding speed of the interface pallet is more than first
Predetermined threshold value and/or the sliding distance are more than the second predetermined threshold value, determine the result of the data verification to be verified.When
The sliding speed of the interface pallet is not more than the first predetermined threshold value and the sliding distance is not more than the second default threshold
During value, determine that the result of the data verification does not pass through for checking, user can be pointed out to drag interface pallet again.Wherein, boundary
Face pallet can be rapid switch column or informing.
Optionally, however, it is determined that the domain environment currently run is security domain, then password is verified in prompting input first;Work as inspection
Measure input the first checking password it is identical with the first preset password when, determine that the result of the data verification is led to for checking
Cross.When the first checking password and the first preset password that detect input are differed, the knot of the data verification is determined
Fruit does not pass through for checking, and user can be pointed out to re-enter checking password and carry out data verification, until the checking that user inputs is close
Code is correct.In addition, if when the number of times that user re-enters checking password exceedes preset times, can be in preset time range
Inside forbid user's input validation password.
For example:As shown in Fig. 2 Fig. 2 is the checking interface of privacy mode, checking interface includes two kinds of verification modes, first
User can drag interface pallet to the lower section of terminal display interface, and at interface, pallet drags to the intermediate region of display interface
When, complete the operating procedure of interface pallet and enter dial interface, point out user's input validation password, user's input validation
Password and after clicking on " next step " button, when terminal determines that the checking password of input is correct, the result of data verification is tests
Card passes through.Or, user can select dial interface, and input validation password can be carried out data verification.Move back if desired
Go out the checking interface of privacy mode, " closing " button can be clicked on.
Optionally, first if it is determined that the domain environment currently run is non-secure domains, then the checking of prompting input second is close
Code, wherein, non-secure domains can be common domain and game field etc..Then when the second checking password for detecting input
When identical with the second preset password, input biological characteristic validation information is pointed out.Wherein, biological characteristic validation information can be fingerprint
Checking information, when the second checking password and the second preset password that detect input are differed, can point out user weight
New input validation password carries out data verification, until the checking password that user inputs is correct.Tested in addition, if user re-enters
When the number of times for demonstrate,proving password exceedes preset times, interior in preset time range it can forbid user's input validation password.Finally when
When detecting the biological characteristic validation information of input with default biometric templates information matches, determine that the data are tested
The result of card is is verified, when the biological characteristic validation information and default biometric templates information that detect input
During mismatch, determine that the result of the data verification does not pass through for checking, user can be pointed out to re-enter fingerprint identifier
Verified.
Pattern enters module 403, for when it is determined that the result of the data verification is is verified, entering the end
The privacy mode at end, wherein, the user data under the privacy mode is in hidden state under other mode of operations.
In the specific implementation, if it is determined that the domain environment currently run be security domain, detecting described the first of input
When verifying that password is identical with the first preset password, the privacy mode of the terminal can be entered;Or in the interface pallet
When the sliding speed is more than the first predetermined threshold value and/or the sliding distance more than the second predetermined threshold value, institute can be entered
State the privacy mode of terminal.
Optionally, however, it is determined that the domain environment currently run is non-secure domains, is tested in detect input described second
Demonstrate,prove password is identical with the second preset password and inputs the biological characteristic validation information and default biometric templates information
During matching, the privacy mode of the terminal is entered.
In embodiments of the present invention, determine that terminal is currently transported when detecting operational order of the user in terminal first
Capable domain environment;Then according to the domain environment currently run, user is pointed out to be operated according to the domain environment with currently running is corresponding
Flow carries out data verification, and determines the result of data verification;Finally when it is determined that the result of data verification is is verified, enter
Enter the privacy mode to terminal, wherein, the user data under privacy mode is in hidden state under other mode of operations.Pass through
Security domain, biological characteristic validation and privacy mode are combined, the security of user data protection is improved.
It should be noted that for each foregoing embodiment of the method, in order to be briefly described, therefore it is all expressed as to one it is
The combination of actions of row, but those skilled in the art should know, the present invention is not limited by described sequence of movement, because
For according to the present invention, certain some step can be carried out sequentially or simultaneously using other.Secondly, those skilled in the art also should
Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily this hair
Necessary to bright.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and is not described in some embodiment
Part, may refer to the associated description of other embodiment.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage
Medium can include:Flash disk, read-only storage (English:Read-Only Memory, referred to as:ROM), random access device (English
Text:Random Access Memory, referred to as:RAM), disk or CD etc..
The content download method and relevant device that are there is provided above the embodiment of the present invention, system are described in detail,
Specific case used herein is set forth to the principle and embodiment of the present invention, and the explanation of above example is to use
Understand the method and its core concept of the present invention in help;Simultaneously for those of ordinary skill in the art, according to the present invention's
Thought, will change in specific embodiments and applications, in summary, and this specification content should not be construed as
Limitation of the present invention.
Claims (4)
1. a kind of guard method of user data, it is characterised in that methods described includes:
When detecting operational order of the user in terminal, the domain environment that the terminal is currently run is determined;
If it is determined that the domain environment currently run is security domain, the interface support when the user drags interface pallet is obtained
The sliding speed and/or sliding distance of disk, and when the interface pallet the sliding speed be more than the first predetermined threshold value and/or
The sliding distance is more than the second predetermined threshold value, determines the result of data verification to be verified;
When it is determined that the result of the data verification is is verified, the privacy mode of the terminal is entered, wherein, the private
User data under close pattern is in hidden state under other mode of operations.
2. the method as described in claim 1, it is characterised in that described when detecting operational order of the user in terminal,
After determining the domain environment that the terminal is currently run, in addition to:
If it is determined that the domain environment currently run is non-secure domains, then password is verified in prompting input second;
When the second checking password for detecting input is identical with the second preset password, input biological characteristic validation letter is pointed out
Breath;
When detecting the biological characteristic validation information of input with default biometric templates information matches, it is determined that described
The result of data verification is to be verified.
3. the protection terminal of a kind of user data, it is characterised in that the terminal includes:
Context detection module, for when detecting operational order of the user in terminal, determining what the terminal was currently run
Domain environment;
Data Verification module, for if it is determined that the domain environment currently run is security domain, acquisition to drag boundary in the user
The sliding speed and/or sliding distance of the interface pallet during pallet of face, and when the sliding speed of the interface pallet is big
It is more than the second predetermined threshold value in the first predetermined threshold value and/or the sliding distance, determines the result of data verification to be verified;
Pattern enters module, for when it is determined that the result of the data verification is is verified, entering the private of the terminal
Close pattern, wherein, the user data under the privacy mode is in hidden state under other mode of operations.
4. the terminal as described in right wants 3, it is characterised in that the Data Verification module includes the 3rd authentication unit, described the
Three authentication units specifically for:
If it is determined that the domain environment currently run is non-secure domains, then password is verified in prompting input second;
When the second checking password for detecting input is identical with the second preset password, input biological characteristic validation letter is pointed out
Breath;
When detecting the biological characteristic validation information of input with default biometric templates information matches, it is determined that described
The result of data verification is to be verified.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510615266.1A CN105160274B (en) | 2015-09-24 | 2015-09-24 | A kind of guard method of user data and terminal |
PCT/CN2015/093517 WO2017049732A1 (en) | 2015-09-24 | 2015-10-31 | User data protection method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510615266.1A CN105160274B (en) | 2015-09-24 | 2015-09-24 | A kind of guard method of user data and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105160274A CN105160274A (en) | 2015-12-16 |
CN105160274B true CN105160274B (en) | 2017-10-27 |
Family
ID=54801126
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510615266.1A Active CN105160274B (en) | 2015-09-24 | 2015-09-24 | A kind of guard method of user data and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105160274B (en) |
WO (1) | WO2017049732A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105631293A (en) * | 2015-12-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Data access method, data access system and terminal |
CN105787318B (en) * | 2016-03-28 | 2018-09-14 | 宇龙计算机通信科技(深圳)有限公司 | Access method, access mechanism and the mobile terminal of user domain |
CN107395880B (en) * | 2017-07-14 | 2021-05-28 | 腾讯科技(深圳)有限公司 | Information display method and device and terminal |
CN109635542B (en) | 2018-11-30 | 2023-02-03 | 华为技术有限公司 | Biological identification interaction method, graphical interaction interface and related device |
CN111556063A (en) * | 2020-05-06 | 2020-08-18 | 南京林业大学 | Information safety reporting system based on intranet |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101345963A (en) * | 2008-08-15 | 2009-01-14 | 宇龙计算机通信科技(深圳)有限公司 | Secrecy method, system and mobile terminal for private data |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427343A (en) * | 2001-12-18 | 2003-07-02 | 阳庆电子股份有限公司 | Device for preventing setting of equipment of software be used or altered by non authorized person |
US20060129840A1 (en) * | 2002-04-23 | 2006-06-15 | Michael Milgramm | Multiplatform independent biometric identification system |
TWI525467B (en) * | 2013-10-31 | 2016-03-11 | 萬國商業機器公司 | Method and computer system for dynamically providing multi-dimensions based password/challenge authentication |
CN104021358A (en) * | 2014-05-30 | 2014-09-03 | 可牛网络技术(北京)有限公司 | Anti-theft control method and device for mobile terminal |
CN104200144A (en) * | 2014-09-05 | 2014-12-10 | 可牛网络技术(北京)有限公司 | Method and system for improving safety of mobile terminal |
CN104615927B (en) * | 2014-12-31 | 2018-02-13 | 宇龙计算机通信科技(深圳)有限公司 | Multisystem safe verification method, multisystem safety verification device and terminal |
-
2015
- 2015-09-24 CN CN201510615266.1A patent/CN105160274B/en active Active
- 2015-10-31 WO PCT/CN2015/093517 patent/WO2017049732A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101345963A (en) * | 2008-08-15 | 2009-01-14 | 宇龙计算机通信科技(深圳)有限公司 | Secrecy method, system and mobile terminal for private data |
Also Published As
Publication number | Publication date |
---|---|
WO2017049732A1 (en) | 2017-03-30 |
CN105160274A (en) | 2015-12-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105160274B (en) | A kind of guard method of user data and terminal | |
US20130229367A1 (en) | Dynamic Patterns for Mobile Device Authentication | |
CN105335641B (en) | A kind of auth method and device based on fingerprint recognition | |
CN106599716A (en) | Message content protection method and device, and mobile terminal | |
CN102509044B (en) | Mouse behavior characteristic-based password authentication method | |
CN105049607B (en) | A kind of short message display method and mobile terminal | |
CN104954131B (en) | The verification method and system of identifying code | |
CN104360812B (en) | A kind of method and device of sliding unlock | |
CN109660556A (en) | User log-in method, device, equipment and storage medium based on information security | |
CN104933339A (en) | Unlocking control method and mobile terminal | |
CN106529269A (en) | Security verification method and system | |
CN107644172A (en) | The guard method of content displaying and device | |
CN106372470A (en) | Method for reminding of inputting password and mobile terminal | |
CN106603241A (en) | Unlocking method, apparatus and electronic device | |
CN104853030B (en) | The method and mobile terminal of a kind of information processing | |
CN115827610A (en) | Method and device for detecting effective load | |
CN106203174A (en) | Application information processing method and device and electronic equipment | |
US9357388B2 (en) | Symbol selection for swipe based authentication | |
CN107085694B (en) | Information display processing method and device | |
CN104217153A (en) | Information processing method and electronic equipment | |
CN107463814A (en) | A kind of mobile terminal verification method, system and mobile terminal | |
CN105787318B (en) | Access method, access mechanism and the mobile terminal of user domain | |
Yue | Sensor-based mobile web fingerprinting and cross-site input inference attacks | |
WO2016075545A1 (en) | Remote pin entry | |
CN105825118A (en) | Terminal and method for unlocking based on compass and turntable |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |