CN105208211B - A kind of privacy protection device, method and mobile terminal - Google Patents
A kind of privacy protection device, method and mobile terminal Download PDFInfo
- Publication number
- CN105208211B CN105208211B CN201510634547.1A CN201510634547A CN105208211B CN 105208211 B CN105208211 B CN 105208211B CN 201510634547 A CN201510634547 A CN 201510634547A CN 105208211 B CN105208211 B CN 105208211B
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- parameter
- mobile terminal
- module
- fingerprint parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Telephone Function (AREA)
Abstract
The present invention discloses a kind of privacy protection device, method and mobile terminal, which is characterized in that the privacy protection device includes: acquisition module, for after mobile terminal releases screen lock state, obtaining the fingerprint parameter that touch operation carries in real time;Authentication module, for the fingerprint parameter to be compared with fingerprint database;Control module, for when the fingerprint parameter is matched with the fingerprint parameter in blacklist fingerprint database, control mobile terminal to enter predetermined analog mode operation.Display module, for showing default picture after entering predetermined analog mode operation.In the above manner, solve the problems, such as user faced in communication mobile terminal have to be used by others but do not want to allow other people using when how to avoid embarrassment.
Description
Technical field
The present invention relates to fields of communication technology, eventually more specifically to a kind of privacy protection device, method and movement
End.
Background technique
With the rapid development of intelligent terminal technology, mobile phone, laptop, digit broadcasting receiver, PDA (a number
Word assistant), PAD (tablet computer), the popularization degree of the mobile terminals such as PMP (portable media player) and navigation device it is more next
It is higher.Currently, guest mode is usually arranged in the privacy in order to guarantee mobile terminal, mobile terminal.User needs to visitor's mould
Default access is arranged in formula, other people can operate under default access mode.
However, but existing for fear of interpersonal relationships in reality, it has to mobile phone is temporarily met at the case where other people use, when
When user has little time to open guest mode, mobile phone unlocks after state, and any institute that mobile phone can be used per capita is functional, with
And check the user data etc. of mobile phone storage, at this moment big inconvenience can be caused to user;Even if user opens guest mode,
But user still may and displeased mobile phone transfer to other people to use for a long time.In the prior art, only by guest mode hardly possible
To take into account friendly communication experience and personal secrets.
Summary of the invention
The main purpose of the present invention is to provide a kind of privacy protection device, method and mobile terminals, it is intended to solve user
In communication mobile terminal have to be used by others but do not want to allow other people using when how to avoid awkward problem.
To achieve the above object, the present invention provides a kind of privacy protection device, which includes:
Module is obtained, for after releasing screen lock state, obtaining the fingerprint parameter that touch operation carries in real time;
Authentication module, for comparing the fingerprint parameter in the fingerprint parameter and fingerprint database obtained in real time
Right, the fingerprint database includes: blacklist fingerprint database and white list fingerprint database;
Optionally, the authentication module, the runing time or default remind of display for being also used to verify predetermined analog mode are believed
Whether the runing time after breath reaches threshold value;
Control module, for the fingerprint parameter in the fingerprint parameter obtained in real time and blacklist fingerprint database
Timing, control mobile terminal enter predetermined analog mode operation;It is also used in the fingerprint parameter and white list obtained in real time
When fingerprint parameter in fingerprint database matches, predetermined analog mode operation is exited.
Optionally, the control module, for when the fingerprint parameter obtained in real time and blacklist fingerprint database and
When fingerprint parameter in white list fingerprint database all mismatches, judge whether to receive into guest mode instruction, if do not had
Have, then control mobile terminal and enter predetermined analog mode operation, if so, then controlling mobile terminal enters guest mode operation.
Optionally, the control module is also used to control guest mode with the first default access mode operation.
Display module, for showing that default shutdown is dynamic after reaching first threshold in the time for entering predetermined analog mode operation
It draws.
Optionally, the display module, for showing default electricity and/or default prompting letter in predetermined analog mode
Breath;
Optionally, the display module is also used to showing that the time of default electricity and/or default prompting message reaches the
Show that shutdown animation, the second threshold are less than first threshold after two threshold values;
Optionally, the display module shows that not enough power supply automatic shutdown mentions after being lower than threshold value for the default electricity
It wakes up;
Optionally, the default prompting message that the display module is also used to show includes: system crash automatic shutdown or interior
Depositing has expired automatic shutdown.
To achieve the above object, the present invention also provides a kind of method for secret protection, which is characterized in that the secret protection side
Method includes:
After releasing screen lock state, fingerprint parameter entrained by touch operation is obtained in real time;
Compare the fingerprint parameter in the fingerprint parameter and fingerprint database obtained in real time, the fingerprint database packet
It includes: blacklist fingerprint database and white list fingerprint database;
When the fingerprint parameter obtained in real time is matched with the fingerprint parameter of blacklist fingerprint database, into default mould
Simulation models operation;
Optionally, when in the fingerprint parameter obtained in real time and blacklist fingerprint database and white list fingerprint database
Fingerprint parameter when all mismatching, judge whether to receive and instructed into guest mode, if it is not, into predetermined analog mould
Formula operation is run if so, then entering guest mode;The guest mode further include: with the first default access mode operation.
Optionally, default electricity and/or default prompting message are shown;It calculates the default electricity of display and/or presets prompting
Time value when reaching second threshold, show default shutdown animation.
Optionally, the default prompting message, further includes: show the prompting message of default not enough power supply automatic shutdown;It is aobvious
Show that system crash automatic shutdown or memory have expired auto-off reminding information.
When the time value for entering predetermined analog mode reaches first threshold, default shutdown animation is shown, it is default in display
It shuts down after animation, is not responding to the operation requests for carrying current finger print parameter, the second threshold is less than first threshold;
After entering predetermined analog mode, if the fingerprint parameter of the fingerprint parameter obtained in real time and white list fingerprint database
When matching, predetermined analog mode is exited.
The present invention discloses a kind of privacy protection device, method and mobile terminal, which is characterized in that the privacy protection device
It include: acquisition module, for after mobile terminal contacts screen lock state, obtaining the fingerprint parameter that touch operation carries in real time;It tests
Module is demonstrate,proved, for the fingerprint parameter to be compared with preset fingerprint database;Control module, in the fingerprint parameter
When matching with the fingerprint parameter in blacklist fingerprint database, control mobile terminal enters predetermined analog mode operation.Show mould
Block, for showing default shutdown animation after reaching threshold value into the predetermined analog mode operation time.In the above manner, solving
User faced in communication mobile terminal have to be used by others but do not want to allow other people using when avoid awkward problem.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware structural diagram of Fig. 1 mobile terminal of each embodiment to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the functional block diagram for the privacy protection device that first embodiment of the invention provides;
Fig. 4 is the electricity display unit schematic diagram for the display module 40 that third embodiment of the invention provides;
Fig. 5 is that the electricity for the display module 40 that third embodiment of the invention provides reminds display unit schematic diagram;
Fig. 6 is the default prompting display unit schematic diagram for the display module 40 that third embodiment of the invention provides;
Fig. 7 is the method for secret protection flow chart that fourth embodiment of the invention provides;
Fig. 8 is the method for secret protection flow chart that fifth embodiment of the invention provides;
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the present invention is realized in description with reference to the drawings.In subsequent description, use
For indicate element such as " module ", " component " or " unit " suffix only for being conducive to explanation of the invention, itself
There is no specific meanings.Therefore, " module " can be used mixedly with " component ".
Mobile terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as moving
Phone, smart phone, laptop, digit broadcasting receiver, PDA (personal digital assistant), PAD (tablet computer), PMP
The mobile terminal of (portable media player), navigation device etc. and such as number TV, desktop computer etc. are consolidated
Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that in addition to being used in particular for moving
Except the element of purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Fig. 1 to realize the present invention the mobile terminal of each embodiment hardware configuration signal.
Mobile terminal 100 may include wireless communication unit 110, A/V (audio/video) input unit 120, user's input
Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power supply unit 190
Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups shown
Part.More or fewer components can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more components, allows mobile terminal 100 and wireless communication system
Or the radio communication between network.For example, wireless communication unit may include broadcasting reception module 111, mobile communication module
112, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel
Relevant information.Broadcast channel may include satellite channel and/or terrestrial channel.Broadcast management server, which can be, to be generated and sent
The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information
And send it to the server of terminal.Broadcast singal may include TV broadcast singal, radio signals, data broadcasting
Signal etc..Moreover, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Closing information can also provide via mobile communications network, and in this case, broadcast related information can be by mobile communication mould
Block 112 receives.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of digital multimedia broadcasting (DMB)
Program guide (EPG), digital video broadcast-handheld (DVB-H) electronic service guidebooks (ESG) etc. form and exist.Broadcast
Receiving module 111 can receive signal broadcast by using various types of broadcast systems.Particularly, broadcasting reception module 111
It can be wide by using such as multimedia broadcasting-ground (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video
It broadcasts-holds (DVB-H), the Radio Data System of forward link media (MediaFLO@), received terrestrial digital broadcasting integrated service
(ISDB-T) etc. digit broadcasting system receives digital broadcasting.Broadcasting reception module 111, which may be constructed such that, to be adapted to provide for extensively
Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via the received broadcast singal of broadcasting reception module 111 and/
Or broadcast related information can store in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one of server and/or receive from it radio signal.Such radio signal may include that voice is logical
Talk about signal, video calling signal or according to text and/or Multimedia Message transmission and/or received various types of data.
The Wi-Fi (Wireless Internet Access) of the support mobile terminal of wireless Internet module 113.The module can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved in the module may include WLAN (Wireless LAN) (Wi-Fi), Wibro
(WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting short range communication.Some examples of short-range communication technology include indigo plant
Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the location information of mobile terminal.Location information module
Typical case be GPS (global positioning system).According to current technology, GPS module 115, which calculates, comes from three or more satellites
Range information and correct time information and the Information application triangulation for calculating, thus according to longitude, latitude
Highly accurately calculate three-dimensional current location information.Currently, it is defended for the method for calculating position and temporal information using three
Star and the error that calculated position and temporal information are corrected by using an other satellite.In addition, GPS module 115
It can be by Continuous plus current location information in real time come calculating speed information.
A/V input unit 120 is for receiving audio or video signal.A/V input unit 120 may include 121 He of camera
Microphone 1220, camera 121 is to the static map obtained in video acquisition mode or image capture mode by image capture apparatus
The image data of piece or video is handled.Treated, and picture frame may be displayed on display unit 151.At camera 121
Picture frame after reason can store in memory 160 (or other storage mediums) or carry out via wireless communication unit 110
It sends, two or more cameras 1210 can be provided according to the construction of mobile terminal.Microphone 122 can be in telephone relation mould
Sound (audio data) is received via microphone in formula, logging mode, speech recognition mode etc. operational mode, and can be incited somebody to action
Such acoustic processing is audio data.Audio that treated (voice) data can be converted in the case where telephone calling model
For the format output that can be sent to mobile communication base station via mobile communication module 112.Various types can be implemented in microphone 122
Noise eliminate (or inhibit) algorithm with eliminate noise that (or inhibition) generates during sending and receiving audio signal or
Person's interference.
The order that user input unit 130 can be inputted according to user generates key input data to control each of mobile terminal
Kind operation.User input unit 130 allows user to input various types of information, and may include keyboard, metal dome, touch
Plate (for example, the sensitive component of detection due to the variation of resistance, pressure, capacitor etc. caused by being contacted), idler wheel, rocking bar etc.
Deng.Particularly, when touch tablet is superimposed upon in the form of layer on display unit 151, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (for example, mobile terminal 100 opens or closes shape
State), the position of mobile terminal 100, user is for the presence or absence of contact (that is, touch input) of mobile terminal 100, mobile terminal
100 orientation, the acceleration or deceleration movement of mobile terminal 100 and direction etc., and generate for controlling mobile terminal 100
The order of operation or signal.For example, sensing unit 140 can sense when mobile terminal 100 is embodied as sliding-type mobile phone
The sliding-type phone is to open or close.In addition, sensing unit 140 be able to detect power supply unit 190 whether provide electric power or
Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 may include that proximity sensor 141 will combine below
Touch screen is described this.
Interface unit 170 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Identification module can be storage and use each of mobile terminal 100 for verifying user
It plants information and may include subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM)
Etc..In addition, the device (hereinafter referred to as " identification device ") with identification module can take the form of smart card, therefore, know
Other device can be connect via port or other attachment devices with mobile terminal 100.Interface unit 170, which can be used for receiving, to be come from
The input (for example, data information, electric power etc.) of external device (ED) and the input received is transferred in mobile terminal 100
One or more elements can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connect with external base, interface unit 170 may be used as allowing will be electric by it
Power, which is provided from pedestal to the path or may be used as of mobile terminal 100, allows the various command signals inputted from pedestal to pass through it
It is transferred to the path of mobile terminal.The various command signals or electric power inputted from pedestal, which may be used as mobile terminal for identification, is
The no signal being accurately fitted on pedestal.Output unit 150 is configured to provide with vision, audio and/or tactile manner defeated
Signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.) out.Output unit 150 may include display
Unit 151, audio output module 152, alarm modules 153 etc..
Display unit 151 may be displayed on the information handled in mobile terminal 100.For example, when mobile terminal 100 is in electricity
When talking about call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file
Downloading etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling mode
Or when image capture mode, display unit 151 can show captured image and/or received image, show video or figure
Picture and the UI or GUI of correlation function etc..
Meanwhile when display unit 151 and touch tablet in the form of layer it is superposed on one another to form touch screen when, display unit
151 may be used as input unit and output device.Display unit 151 may include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
It is a kind of.Some in these displays may be constructed such that transparence to allow user to watch from outside, this is properly termed as transparent
Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific
Desired embodiment, mobile terminal 100 may include two or more display modules (or other display devices), for example, moving
Dynamic terminal may include external display module (not shown) and internal display module (not shown).Touch screen can be used for detecting touch
Input pressure and touch input position and touch input area.
Audio output module 152 can mobile terminal be in call signal reception pattern, call mode, logging mode,
It is when under the isotypes such as speech recognition mode, broadcast reception mode, wireless communication unit 110 is received or in memory 160
The audio data transducing audio signal of middle storage and to export be sound.Moreover, audio output module 152 can provide and movement
The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that terminal 100 executes.
Audio output module 152 may include loudspeaker, buzzer etc..
Alarm modules 153 can provide output notifying event to mobile terminal 100.Typical event can be with
Including calling reception, message sink, key signals input, touch input etc..Other than audio or video output, alarm modules
153 can provide output in different ways with the generation of notification event.For example, alarm modules 153 can be in the form of vibration
Output is provided, when receiving calling, message or some other entrance communications (incomingcommunication), alarm mould
Block 153 can provide tactile output (that is, vibration) to notify to user.By providing such tactile output, even if
When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm modules 153
The output of the generation of notification event can be provided via display unit 151 or audio output module 152.
Memory 160 can store the software program etc. of the processing and control operation that are executed by controller 180, Huo Zheke
Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And
And memory 160 can store about the vibrations of various modes and audio signal exported when touching and being applied to touch screen
Data.
Memory 160 may include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, more
Media card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access storage
Device (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..Moreover, mobile terminal 100 can execute memory with by network connection
The network storage device of 160 store function cooperates.
The overall operation of the usually control mobile terminal of controller 180.For example, controller 180 executes and voice communication, data
Communication, video calling etc. relevant control and processing.In addition, controller 180 may include for reproducing (or playback) more matchmakers
The multi-media module 181 of volume data, multi-media module 181 can construct in controller 180, or can be structured as and control
Device 180 separates.Controller 180 can be with execution pattern identifying processing, by the handwriting input executed on the touchscreen or picture
It draws input and is identified as character or image.
Power supply unit 190 receives external power or internal power under the control of controller 180 and provides operation each member
Electric power appropriate needed for part and component.
Various embodiments described herein can be to use the calculating of such as computer software, hardware or any combination thereof
Machine readable medium is implemented.Hardware is implemented, embodiment described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Programming gate array (FPGA), controller, microcontroller, microprocessor, is designed to execute function described herein processor
At least one of electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180.
For software implementation, the embodiment of such as process or function can with allow to execute the individual of at least one functions or operations
Software module is implemented.Software code can by the software application (or program) write with any programming language appropriate Lai
Implement, software code can store in memory 160 and be executed by controller 180.
So far, oneself is through describing mobile terminal according to its function.In the following, for the sake of brevity, will description such as folded form,
Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc., which is used as, to be shown
Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that using via frame or grouping send data it is all if any
Line and wireless communication system and satellite-based communication system operate.
Referring now to Fig. 2 description communication system that wherein mobile terminal according to the present invention can operate.
Different air interface and/or physical layer can be used in such communication system.For example, used by communication system
Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system
System (UMTS) (particularly, long term evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under
The description in face is related to cdma communication system, but such introduction is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system may include multiple mobile terminals 100, multiple base stations (BS) 270, base station
Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN)
290 form interface.MSC280 is also structured to form interface with the BSC275 that can be couple to base station 270 via back haul link.
Back haul link can be constructed according to any in several known interfaces, and the interface includes such as E1/T1, ATM, IP,
PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system may include multiple BSC2750 as shown in Figure 2.
Each BS270 can service one or more subregions (or region), by multidirectional antenna or the day of direction specific direction
Each subregion of line covering is radially far from BS270.Alternatively, each subregion can be by two or more for diversity reception
Antenna covering.Each BS270, which may be constructed such that, supports multiple frequency distribution, and the distribution of each frequency has specific frequency spectrum
(for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed, which intersects, can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver
System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly indicating single
BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Alternatively, each subregion of specific BS270 can be claimed
For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to the mobile terminal operated in system by broadcsting transmitter (BT) 295
100.Broadcasting reception module 111 as shown in Figure 1 is arranged at mobile terminal 100 to receive the broadcast sent by BT295
Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.The help of satellite 300 positions multiple mobile terminals
At least one of 100.
In Fig. 2, multiple satellites 300 are depicted, it is understood that, it is useful to can use any number of satellite acquisition
Location information.GPS module 115 as shown in Figure 1 is generally configured to cooperate with satellite 300 to obtain desired positioning and believe
Breath.It substitutes GPS tracking technique or except GPS tracking technique, the other of the position that can track mobile terminal can be used
Technology.In addition, at least one 300 property of can choose of GPS satellite or extraly processing satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminals 100
Signal.Mobile terminal 100 usually participates in call, information receiving and transmitting and other types of communication.Certain base station 270 is received each anti-
It is handled in specific BS270 to link signal.The data of acquisition are forwarded to relevant BSC275.BSC provides call
The mobile management function of resource allocation and the coordination including the soft switching process between BS270.The number that BSC275 will also be received
According to MSC280 is routed to, the additional route service for forming interface with PSTN290 is provided.Similarly, PSTN290 with
MSC280 forms interface, and MSC and BSC275 form interface, and BSC275 controls BS270 correspondingly with by forward link signals
It is sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration and communication system, each implementation of method for network access of the invention is proposed
Example.Method for network access of the invention accesses wireless network after obtaining wireless network signal and mobile network signals parallel
And mobile network, i.e., it is surfed the Internet simultaneously using wireless network and mobile network.Wherein, wireless network such as WIFI network, it is mobile
Network such as 2G/3G/4G network.
The side that middle synchronization is either surfed the Internet using wireless network or surfed the Internet using mobile network compared with the existing technology
Formula, the mode that the present invention uses wireless network and mobile network to surf the Internet simultaneously, so that network access is more flexible, and is able to satisfy use
The diversified online demand in family, widens network bandwidth, promotes the online experience of user.
Based on above-mentioned mobile terminal hardware configuration and communication system, it is described in detail below by way of specific embodiment.
Embodiment one
The present invention provides a kind of privacy protection device, described hidden in first embodiment provided by the invention referring to Fig. 3
Private protective device includes:
Acquisition module 10, for after mobile terminal releases screen lock state where it, acquisition to receive operation and asks in real time
Seek the fingerprint parameter of carrying.
Privacy protection device provided in an embodiment of the present invention is mainly used in mobile phone, laptop, Digital Broadcasting Receiver
Device, PDA (personal digital assistant), PAD (tablet computer), PMP (portable media player), navigation device etc. are mobile eventually
End, it is intended to so that mobile terminal under the premise of meeting safety, can be improved privacy and communication experience.
It should be noted that mobile terminal is after releasing screen lock state, and when detecting user's operation, automatic trigger fingerprint
Input request, the fingerprint input request can be handled by special fingerprint sensor, can also be by being covered on mobile terminal surface
Fingerprint identification device processing.
Authentication module 20, the fingerprint parameter in fingerprint parameter and fingerprint database for being obtained to the acquisition module 10
It is compared, the fingerprint database includes: blacklist fingerprint database and white list fingerprint database;It is also used to verify default
The runing time of simulation model shows whether the runing time after default prompting message reaches threshold value.
In the present embodiment, authentication module 20 after obtaining module 10 and getting the fingerprint parameter that the operation requests carry,
Operation is compared with the fingerprint parameter in fingerprint database to the fingerprint parameter of acquisition.Specifically, mobile terminal is local
It is stored with fingerprint parameter database, authentication module 20 gets the fingerprint parameter of the operation requests carrying obtaining module 10
Afterwards, the blacklist fingerprint database and white list fingerprint number in the fingerprint parameter and the fingerprint parameter database that will acquire
It is compared according to library;Fingerprint parameter in the white list fingerprint database in the fingerprint parameter and the fingerprint database
Timing is verified;The fingerprint parameter in blacklist fingerprint database in the fingerprint parameter and the fingerprint database
Timing, verifying do not pass through.Such as:
It obtains module 10 and gets the fingerprint parameter that the operation requests carry, which includes the finger of corresponding user
Line size, streakline width and fold information etc.;Authentication module 20 will acquire the fingerprint parameter and the finger that module 10 is got
The fingerprint parameter of line database purchase is compared, in the fingerprint parameter and the blacklist fingerprint that the acquisition module 10 obtains
When fingerprint parameter in database matches, verifying does not pass through;Fingerprint parameter and the white name in acquisition module 10 acquisition
When fingerprint parameter in single fingerprint database matches, it is verified.Wherein, matching refers to the fingerprint size of any two fingerprint parameter
It is identical, streakline width is identical and fold information is identical;Alternatively, the similarity of the fingerprint size of any two fingerprint parameter meets one
Determine threshold value, the similarity of streakline width meets certain threshold value and the similarity of fold information meets certain threshold value.
Control module 30, for obtaining the fingerprint in the fingerprint parameter and blacklist fingerprint database that module 10 obtains
When parameter matches, control mobile terminal enters predetermined analog mode operation;It is also used in the fingerprint parameter for obtaining the acquisition of module 10
When matching with the fingerprint parameter in white list fingerprint database, predetermined analog mode operation is exited.
In the present embodiment, the fingerprint parameter in the fingerprint parameter and blacklist fingerprint database that module 10 obtains is being obtained
When matching, control module 30 controls mobile terminal and enters predetermined analog mode operation;In the fingerprint parameter for obtaining the acquisition of module 10
When matching with the fingerprint parameter in white list fingerprint database, control module 30 controls mobile terminal and exits predetermined analog mode fortune
Row.It takes the mobile phone as an example, after mobile phone releases screen lock state, and when detecting the operation requests based on the mobile phone, obtains module
10 obtain the fingerprint parameter that the operation requests carry, and authentication module 20 will acquire fingerprint parameter and the local of the acquisition of module 10
Fingerprint parameter in fingerprint database is compared, and when being verified, control module 30 controls mobile phone and enters Normal Mode Operation,
It is obstructed out-of-date to verify, and control module 30 controls mobile phone and enters the operation of predetermined analog mode;When mobile phone enters predetermined analog mode fortune
After row, when acquisition module 10 detects new operation requests, 20 pairs of authentication module obtain the operation requests that modules 10 obtain and carry
Fingerprint parameter be compared with the fingerprint parameter in fingerprint database, when being verified, control module 30 control mobile phone exit
Predetermined analog mode, verify it is obstructed it is out-of-date continue keep predetermined analog mode.
Display module 40, for showing default shutdown after reaching first threshold in the time for entering predetermined analog mode operation
Animation.
In the present embodiment, display module 40 show content be and nonterminal time of day, be in order to display terminal because
This and shut down, the shutdown is the false shutdown after display shutdown animation.
The privacy protection device that the present embodiment proposes obtains touch operation after mobile terminal releases screen lock state in real time
The fingerprint parameter of carrying;The fingerprint parameter is compared with the fingerprint parameter in fingerprint database;In the fingerprint parameter
When matching with the fingerprint parameter in blacklist fingerprint database, mobile terminal enters predetermined analog mode operation.It is default entering
Simulation model runing time shows default shutdown animation after reaching threshold value.In the above manner, solving user face in communication
Face mobile terminal have to be used by others but do not want to allow other people using when avoid awkward problem, improve communication experience.
Embodiment two
Further, it is based on first embodiment, proposes the second embodiment of the present invention, in the present embodiment, the privacy
Protective device, further includes:
Control module 30, for when the fingerprint parameter obtained in real time and blacklist fingerprint database and white list fingerprint
When fingerprint parameter in database all mismatches, judge whether to receive into guest mode instruction, if it is not, control moves
Dynamic terminal enters predetermined analog mode operation, if so, then controlling mobile terminal enters guest mode operation.
In the present embodiment, privacy protection device gets the fingerprint ginseng of the operation requests carrying obtaining module 10 in real time
After number, the fingerprint parameter of 20 pairs of authentication module acquisitions is compared with the fingerprint parameter in fingerprint database;When acquisition mould
When the fingerprint parameter that block 10 obtains in real time is matched with the fingerprint parameter in the blacklist fingerprint database in fingerprint database, verifying
Do not pass through, control module 30 controls mobile terminal and enters predetermined analog mode;When the fingerprint parameter that acquisition module 10 obtains in real time
It when being matched with the fingerprint parameter in the white list fingerprint database in fingerprint database, is verified, the control of control module 30 moves
Dynamic terminal exits the operation of predetermined analog mode or continues Normal Mode Operation;When obtain the fingerprint parameter that obtains in real time of module 10 with
When fingerprint parameter in fingerprint database all mismatches, judge whether user opens guest mode, if so, into visitor's mould
Formula, if it is not, then entering predetermined analog mode.Obtain the fingerprint ginseng in the fingerprint parameter and fingerprint database that module 10 obtains in real time
The unmatched situation of all fingerprint parameters when number all mismatches, in fingerprint parameter and fingerprint database including acquisition.
Control module 30 is also used to control guest mode with the first default access mode operation.
In the present embodiment, the first default access mode of guest mode and the default limiting mode of predetermined analog mode are different,
But it is all set by the user.For example, the home subscriber is after the set interface for entering visitor's permission mode, it is logical by choosing
Words application (system application of mobile terminal) and short message apply (system application of mobile terminal), are set to prohibit
The system application only used;Mobile phone is when entering the operation of visitor's permission mode, hiding talk application and short message application automatically
Icon;Alternatively, being not responding to the operation that any user starts the talk application and/or short message application.Predetermined analog mould
The default access mode of formula can also set access authority through the above way.
The privacy protection device that the present embodiment proposes obtains touch operation after mobile terminal releases screen lock state in real time
The fingerprint parameter of carrying;The fingerprint parameter is compared with preset fingerprint database;For working as the finger obtained in real time
When fingerprint parameter in line parameter and blacklist fingerprint database and white list fingerprint database all mismatches, judge whether to receive
It is instructed to guest mode is entered, if it is not, control mobile terminal enters predetermined analog mode operation, if so, then controlling
Mobile terminal enters guest mode operation.In the above manner, user is made to can choose whether that stranger is allowed to use mobile phone
Preset function realizes the protection to privacy.
Embodiment three
Further, it is based on the first reality and/or second embodiment, proposes the third embodiment of the present invention, referring to Fig. 4 and figure
5 and Fig. 6, the display module 40 further include:
The display module 40 is used for, and default electricity and/or default prompting message are shown in predetermined analog mode;Aobvious
Show and shows shutdown animation after the time of default electricity and/or default prompting message reaches threshold value;The default electricity is lower than threshold value
Not enough power supply auto-off reminding is shown afterwards;System crash automatic shutdown or memory have expired automatic shutdown.
In the present embodiment, the default electricity is analog electrical energy value, is lower than practical charge value, in order to allow blacklist fingerprint
The owner sees that mobile terminal is shutdown animation to be shown because of low battery, and shut down, as shown in figure Fig. 4 and Fig. 5.It is described pre-
If prompting message includes, active user's low battery automatic shutdown or system crash automatic shutdown or memory is reminded to expire automatically
Shutdown etc., as shown in Figure 6.
It should be noted that not showing low battery auto-off reminding when the default electricity is higher than 5%.It is described aobvious
Show and show shutdown animation after the time of default electricity and/or default prompting message reaches threshold value, the threshold value is set by the user.
It is obstructed out-of-date that the present embodiment is verified in fingerprint parameter, by the default electricity of display and default electricity prompting message or in advance
If it is automatic shutdown because of mobile terminal low battery or system crash that prompting message, which learns active user, to reach not
Allow particular person or stranger to use the purpose of mobile terminal, so as to avoid be required to borrow mobile terminal and not for fear of communication
The embarrassment that do not borrow is obtained, communication experience is improved.
Example IV
Referring to Fig. 7, in fourth embodiment provided by the invention, method for secret protection of the present invention includes following step
It is rapid:
S10 after releasing screen lock state, obtains fingerprint parameter entrained by touch operation in real time;
Method for secret protection provided in an embodiment of the present invention is mainly used in mobile phone, laptop, Digital Broadcasting Receiver
Device, PDA (personal digital assistant), PAD (tablet computer), PMP (portable media player), navigation device etc. are mobile eventually
End, it is intended to so that mobile terminal under the premise of meeting safety, can be improved privacy and communication experience.
It should be noted that mobile terminal is after releasing screen lock state, and when detecting operation requests, automatic trigger fingerprint
Sensor typing fingerprint parameter, the operation requests carry the fingerprint parameter information of fingerprint sensor typing.The fingerprint sensing
Device is distributed in the part of the surface or all surfaces of mobile terminal.
S20 compares the fingerprint parameter in the fingerprint parameter and fingerprint database obtained in real time;The fingerprint database
It include: blacklist fingerprint database and white list fingerprint database;
In the present embodiment, privacy protection device is after getting the fingerprint parameter that the operation requests carry, to acquisition
The fingerprint parameter carries out that operation is compared with the fingerprint parameter in local fingerprint database.Specifically, mobile terminal is local
It is stored with fingerprint database, the fingerprint parameter database includes blacklist fingerprint database and white list fingerprint database, is connect
It receives in blacklist fingerprint database after the operation of fingerprint parameter, verifying does not pass through;It receives in white list fingerprint database
After the operation of fingerprint parameter, it is verified.Such as:
It includes the fingerprint size of corresponding user, line that privacy protection device, which gets the fingerprint parameter that the operation requests carry,
Line width and fold information etc.;What the fingerprint parameter and the local fingerprint database that privacy protection device will acquire stored
Fingerprint parameter is compared, and the fingerprint in the fingerprint parameter and blacklist fingerprint database that the privacy protection device obtains is joined
When number matching, verifying does not pass through;In the fingerprint parameter and the white list fingerprint database that the privacy protection device obtains
Fingerprint parameter matching when, be verified.Wherein, matching refers to that the fingerprint size of any two fingerprint parameter is identical, streakline width
Identical and fold information is identical;Alternatively, to meet certain threshold value, streakline wide for the similarity of the fingerprint size of any two fingerprint parameter
Narrow similarity meets certain threshold value and the similarity of fold information meets certain threshold value.
S30, when the fingerprint parameter obtained in real time is matched with the fingerprint parameter of blacklist fingerprint database, into pre-
If simulation model is run;
In the present embodiment, it should be noted that for the mobile terminal when with predetermined analog mode operation, limitation user can
With the accessible local user data of the application program, the system function that can be used of limitation user and limitation user that use
Deng to realize the protection to the mobile terminal home subscriber privacy.
S40 shows default shutdown animation when the time for entering predetermined analog mode reaching first threshold, pre- in display
If after the animation that shuts down, being not responding to the operation requests for carrying current finger print parameter;After entering predetermined analog mode, if in real time
When the fingerprint parameter of acquisition is matched with the fingerprint parameter of white list fingerprint database, S10 is entered step.
In the present embodiment, it should be noted that after display shutdown animation, terminal is in false off-mode, receives operation
After request, needs the fingerprint parameter carried to operation requests to be compared with the fingerprint parameter in white list fingerprint database, test
After card passes through, touch operation could be responded, is otherwise not responding to.
Present embodiment discloses a kind of method for secret protection, the method for secret protection includes: to release to lock in mobile terminal
After screen state, the fingerprint parameter that behaviour's request carries is obtained in real time;It is obstructed out-of-date to verify in the fingerprint parameter, into predetermined analog
Mode operation;Entrained fingerprint parameter is verified when receiving new operation requests, and predetermined analog is exited when being verified
Mode simultaneously enters S10 step, verifies and obstructed out-of-date is not responding to the operation.In the above manner, solving user face in communication
Face mobile terminal have to be used by others but do not want to allow other people using when avoid awkward problem, improve communication experience.
Embodiment five
Further, it is based on fourth embodiment, proposes the fifth embodiment of the present invention, in the present embodiment, reference Fig. 8,
After above-mentioned steps S10, the method for secret protection, S20 is compared in the fingerprint parameter and fingerprint database obtained in real time
Fingerprint parameter, further includes:
S201 is when in the fingerprint parameter obtained in real time and blacklist fingerprint database and white list fingerprint database
When fingerprint parameter all mismatches, S202 judges whether to receive to be instructed into guest mode, and S2022 is if it is not, enter pre-
If simulation model is run, S2021 is run if so, then entering guest mode.
In the present embodiment, it should be noted that the fingerprint parameter and blacklist fingerprint database and white list obtained in real time
The all unmatched situation of fingerprint parameter in fingerprint database is the case where active user is stranger, the active user's
Fingerprint did not occurred at the terminal or active user's fingerprint occurred in terminal, but was not paid close attention to by terminal attaching people.
The method for secret protection that the present embodiment proposes obtains touch operation after mobile terminal releases screen lock state in real time
The fingerprint parameter of carrying;The fingerprint parameter is compared with preset fingerprint database;For working as the finger obtained in real time
When fingerprint parameter in line parameter and blacklist fingerprint database and white list fingerprint database all mismatches, judge whether to receive
It is instructed to guest mode is entered, if it is not, control mobile terminal enters predetermined analog mode operation, if so, then controlling
Mobile terminal enters guest mode operation.In the above manner, user is made to can choose whether that stranger is allowed to use mobile phone
Preset function realizes the protection to privacy.
Embodiment six
Further, it is based on first embodiment, proposes the sixth embodiment of the present invention, in the present embodiment, above-mentioned steps
S30 includes:
When showing that default electricity and/or the default time for reminding operation reach second threshold, default shutdown animation is shown.
In the present embodiment, for example, into the electricity that after predetermined analog mode, terminal is shown as active user uses the time
Growth and reduce, when the predetermined analog mode reaches second threshold, show that default prompting message not enough power supply is closed automatically
Machine.
In the present embodiment, when the default electricity of display is higher than 5%, reach the second threshold in the predetermined analog mode operation time
When value, display system collapse automatic shutdown or memory, which expire, shows the animation that shuts down after the prompting messages such as automatic shutdown.
The present embodiment fingerprint parameter verify it is obstructed out-of-date, by show predetermined analog picture make active user learn be because
The automatic shutdown for mobile terminal low battery or system crash does not allow particular person or stranger whole using movement to reach
The purpose at end improves communication experience so as to avoid being required to borrow mobile terminal and the embarrassment borrowed of having to for fear of communication.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (7)
1. a kind of privacy protection device, which is characterized in that the privacy protection device includes:
Module is obtained, for after releasing screen lock state, obtaining the fingerprint parameter that touch operation carries in real time;
Authentication module, for the fingerprint parameter obtained in real time to be compared with the fingerprint parameter in fingerprint database, institute
Stating fingerprint database includes blacklist fingerprint database and white list fingerprint database;
Control module, for being matched in the fingerprint parameter obtained in real time with the fingerprint parameter in blacklist fingerprint database
When, control mobile terminal enters predetermined analog mode operation;It is also used to refer in the fingerprint parameter obtained in real time with white list
When fingerprint parameter in line database matches, predetermined analog mode operation is exited;
Display module, for after entering predetermined analog mode operation, when the time value of calculating reaches second threshold, display to be pre-
If electricity and/or default prompting message;It is also used to show after the time for entering predetermined analog mode operation reaches first threshold
Default shutdown animation;The second threshold is less than first threshold.
2. privacy protection device as described in claim 1, which is characterized in that the control module is used for, and is obtained in real time when described
When the fingerprint parameter in fingerprint parameter and blacklist fingerprint database and white list fingerprint database taken all mismatches, judgement is
No receive instructs into guest mode, if it is not, control mobile terminal enters predetermined analog mode operation, if so,
It then controls mobile terminal and enters guest mode operation;
The control module is also used to, and controls guest mode with the first default access mode operation.
3. privacy protection device as claimed in claim 1 or 2, which is characterized in that the display module is also used to default in entrance
After simulation model operation, when the time value of calculating reaches third threshold value, display system collapses and shows shutdown animation.
4. a kind of method for secret protection, which is characterized in that the method for secret protection includes:
After releasing screen lock state, fingerprint parameter entrained by touch operation is obtained in real time;
Compare the fingerprint parameter in the fingerprint parameter and fingerprint database obtained in real time;
The fingerprint database includes: blacklist fingerprint database and white list fingerprint database;
When the fingerprint parameter obtained in real time is matched with the fingerprint parameter of blacklist fingerprint database, into predetermined analog mould
Formula operation;
Calculate the time value for entering predetermined analog mode, when the time value of calculating reaches second threshold, show default electricity and/
Or default prompting message;When time value reaches first threshold, default shutdown animation is shown, after the default shutdown animation of display,
It is not responding to carry the operation requests of current finger print parameter;The second threshold is less than first threshold;
After entering predetermined analog mode, if the fingerprint parameter obtained in real time is matched with the fingerprint parameter of white list fingerprint database
When, exit predetermined analog mode.
5. method for secret protection as claimed in claim 4, which is characterized in that when the fingerprint parameter obtained in real time and black name
When fingerprint parameter in single fingerprint database and white list fingerprint database all mismatches, judge whether to receive into visitor's mould
Formula instruction, if it is not, being run into predetermined analog mode operation if so, then entering guest mode;
The guest mode that enters is run further include: with the first default access mode operation.
6. method for secret protection as described in claim 4 or 5, which is characterized in that further include: it is transported entering predetermined analog mode
After row, when the time value of calculating reaches third threshold value,
Display system collapses and shows shutdown animation.
7. a kind of mobile terminal, which is characterized in that including privacy protection device as claimed any one in claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510634547.1A CN105208211B (en) | 2015-09-29 | 2015-09-29 | A kind of privacy protection device, method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510634547.1A CN105208211B (en) | 2015-09-29 | 2015-09-29 | A kind of privacy protection device, method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105208211A CN105208211A (en) | 2015-12-30 |
CN105208211B true CN105208211B (en) | 2019-02-12 |
Family
ID=54955629
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510634547.1A Active CN105208211B (en) | 2015-09-29 | 2015-09-29 | A kind of privacy protection device, method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105208211B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105828232A (en) * | 2016-03-31 | 2016-08-03 | 乐视控股(北京)有限公司 | Earphone work mode selection method and apparatus |
CN105809007A (en) * | 2016-03-31 | 2016-07-27 | 宇龙计算机通信科技(深圳)有限公司 | Privacy protection method and device |
CN105975853A (en) * | 2016-05-25 | 2016-09-28 | 宇龙计算机通信科技(深圳)有限公司 | Safe operation scene setting method and device and terminal |
CN106156552A (en) * | 2016-06-28 | 2016-11-23 | 青岛海信移动通信技术股份有限公司 | A kind of unlocking method and a device of mobile device |
CN106682618A (en) * | 2016-12-27 | 2017-05-17 | 努比亚技术有限公司 | Fingerprint identification method and mobile terminal |
CN107133509A (en) * | 2017-04-28 | 2017-09-05 | 北京小米移动软件有限公司 | Method for secret protection and equipment |
CN107402710B (en) * | 2017-07-13 | 2020-12-08 | 上海读客数字信息技术有限公司 | Privacy information protection method, mobile terminal and computer readable storage medium |
CN107609363B (en) * | 2017-10-20 | 2020-09-11 | 维沃移动通信有限公司 | Unlocking method and mobile terminal |
CN109257481A (en) * | 2018-07-26 | 2019-01-22 | 深圳市沃特沃德股份有限公司 | The method and device of multi-user operation control |
CN115080938A (en) * | 2022-06-10 | 2022-09-20 | 盐城鸿石智能科技有限公司 | Privacy protection method, system, computer equipment and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101534502A (en) * | 2008-03-12 | 2009-09-16 | 中兴通讯股份有限公司 | Mobile phone camouflaging method |
CN103745147A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | System mode starting method and application program starting method and device |
CN104036174A (en) * | 2014-07-03 | 2014-09-10 | 南昌欧菲生物识别技术有限公司 | Method and device for achieving child safety lock by means of fingerprint identification |
CN104598792A (en) * | 2014-12-29 | 2015-05-06 | 深圳市金立通信设备有限公司 | Terminal |
CN104915582A (en) * | 2015-05-28 | 2015-09-16 | 努比亚技术有限公司 | Unlocking method and unlocking device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20130136173A (en) * | 2012-06-04 | 2013-12-12 | 삼성전자주식회사 | Method for providing fingerprint based shortcut key, machine-readable storage medium and portable terminal |
-
2015
- 2015-09-29 CN CN201510634547.1A patent/CN105208211B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101534502A (en) * | 2008-03-12 | 2009-09-16 | 中兴通讯股份有限公司 | Mobile phone camouflaging method |
CN103745147A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | System mode starting method and application program starting method and device |
CN104036174A (en) * | 2014-07-03 | 2014-09-10 | 南昌欧菲生物识别技术有限公司 | Method and device for achieving child safety lock by means of fingerprint identification |
CN104598792A (en) * | 2014-12-29 | 2015-05-06 | 深圳市金立通信设备有限公司 | Terminal |
CN104915582A (en) * | 2015-05-28 | 2015-09-16 | 努比亚技术有限公司 | Unlocking method and unlocking device |
Also Published As
Publication number | Publication date |
---|---|
CN105208211A (en) | 2015-12-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105208211B (en) | A kind of privacy protection device, method and mobile terminal | |
CN105100476B (en) | A kind of mobile terminal unlocking device and method | |
CN106231087B (en) | A kind of method and apparatus of front and back sides dual-screen display device false-touch prevention | |
CN104915582B (en) | unlocking method and device | |
CN105138874B (en) | Unlocking screen control device and method | |
CN104850443B (en) | A kind of method and mobile terminal for closing error starting application program | |
CN104850799B (en) | The method and mobile terminal of a kind of data in hiding mobile terminal | |
CN104636030B (en) | Method and device for starting application programs and mobile terminal | |
CN106572439B (en) | Terminal tracing method, device and mobile terminal | |
CN105095708B (en) | A kind of unlocking method and device of mobile terminal | |
CN105138400B (en) | Application program self-starting management method and device | |
CN106941565B (en) | Address list display method and mobile terminal | |
CN105138880B (en) | The processing unit and method of terminal operation data | |
CN105939517B (en) | A kind of method and apparatus preventing mobile terminal access pseudo-base station | |
CN104735254B (en) | terminal screen locking method and system | |
CN106778212B (en) | A kind of mobile terminal and control method | |
CN105049582B (en) | A kind of save set of calling record, method and display methods | |
CN104820797B (en) | Using the management method and device of account | |
CN104715262B (en) | A kind of utilization, which is taken pictures, realizes the method, device and mobile terminal of intelligent label function | |
CN106412328B (en) | A kind of method and apparatus obtaining field feedback | |
CN105302457B (en) | Terminal control method and device | |
CN104883454B (en) | A kind of display control method and display control terminal | |
CN106952090A (en) | Payment verification device and method | |
CN104837122B (en) | Multi-party communications method, terminal and system | |
CN106227454B (en) | A kind of touch trajectory detection system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |