CN105468938B - Mobile terminal and security control method thereof - Google Patents

Mobile terminal and security control method thereof Download PDF

Info

Publication number
CN105468938B
CN105468938B CN201510790997.XA CN201510790997A CN105468938B CN 105468938 B CN105468938 B CN 105468938B CN 201510790997 A CN201510790997 A CN 201510790997A CN 105468938 B CN105468938 B CN 105468938B
Authority
CN
China
Prior art keywords
user
auricle
image
preset
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510790997.XA
Other languages
Chinese (zh)
Other versions
CN105468938A (en
Inventor
杨燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201510790997.XA priority Critical patent/CN105468938B/en
Publication of CN105468938A publication Critical patent/CN105468938A/en
Application granted granted Critical
Publication of CN105468938B publication Critical patent/CN105468938B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a mobile terminal and a safety control method thereof, wherein the safety control method comprises the following steps: acquiring a user auricle image of a user currently holding a mobile terminal; judging whether a preset auricle image consistent with the user auricle image is stored locally; and if not, hiding the private application program associated with the preset auricle image inconsistent with the user auricle image. By the mode, the private application program can be protected from being stolen and seen by others more safely.

Description

Mobile terminal and security control method thereof
Technical Field
The present invention relates to the field of security of electronic devices, and in particular, to a mobile terminal and a security control method thereof.
Background
At present, in the use process of a mobile terminal, some other users cannot be prevented from contacting the mobile terminal, so that privacy application programs (such as payment related programs, short message related programs, photo album related programs and the like) of a user (owner) cannot be correspondingly protected to a certain extent, and the privacy application programs are easily snooped by others. On the other hand, when the mobile terminal is lost, it is desirable that some private applications are protected accordingly.
The existing mode of password verification is generally adopted to protect the private application programs, however, the password is not safe enough, the password dictionary is easy to crack for a limited time, the password is easy to forget, and the mobile terminal is difficult to control again after the owner forgets the password, so that great inconvenience is brought to the user.
Therefore, it is desirable to provide a mobile terminal and a security control method thereof to solve the above technical problems.
Disclosure of Invention
The invention mainly solves the technical problem of providing a mobile terminal and a security control method thereof, which can more safely protect private application programs from being stolen and seen by others.
In order to solve the technical problems, the invention adopts a technical scheme that: a security control method of a mobile terminal is provided, the security control method comprising: acquiring a user auricle image of a user currently holding a mobile terminal; judging whether a preset auricle image consistent with the user auricle image is stored locally; and if not, hiding the private application program associated with the preset auricle image inconsistent with the user auricle image.
The method for acquiring the user auricle image of the user currently holding the mobile terminal comprises the following steps: setting a program hiding function, wherein the program hiding function is started or closed;
and judging whether the program hiding function is started or not, executing the step of acquiring the user auricle image of the user currently holding the mobile terminal when the program hiding function is started, and not executing the step of acquiring the user auricle image of the user currently holding the mobile terminal when the program hiding function is not started.
Wherein, setting the program hiding function further comprises: a private application list is set, wherein the private application list includes at least one private application.
Wherein, still include before setting up the program hidden function: and judging whether the user requesting to set the program hiding function has the authority to set the program hiding function.
Wherein, judging whether the user who requests to set the program hiding function has the authority to set the program hiding function includes: acquiring an auricle image of a user requesting to set the program hiding function, judging whether a preset auricle image consistent with the auricle image of the user is stored locally, if so, entering an interface for setting the program hiding function, if not, judging whether the user has authority to set through other safety verification, if not, forbidding the user to set the program hiding function, and if so, entering the interface for setting the program hiding function.
Wherein, the other security verification is password verification, fingerprint verification, iris verification, voice verification or heartbeat verification.
Wherein, still include before obtaining the user's auricle image of the user who currently holds the mobile terminal: the method comprises the steps of recording preset auricle images of at least one user to be registered, storing the preset auricle images to the local, and creating a private application program list associated with the preset auricle images, wherein the private application program list comprises at least one private application program.
Wherein, setting the opening or closing of the program hiding function includes: controlling the opening or closing of a program hiding function of the mobile terminal at the cloud end; judging whether the user requesting to set the program hiding function has the authority to set the program hiding function comprises the following steps: and judging whether a user requesting to set the program hiding function has the authority to set the program hiding function at the cloud.
In order to solve the technical problem, the invention adopts another technical scheme that: there is provided a mobile terminal including: the mobile terminal comprises a pinna image acquisition module, a pinna image acquisition module and a control module, wherein the pinna image acquisition module is used for acquiring a user pinna image of a user who currently holds the mobile terminal; the storage module is used for storing a preset auricle image; the auricle image comparison module is used for judging whether a preset auricle image consistent with the user auricle image is stored in the storage module; and the application program management module is used for displaying the private application program associated with the consistent preset auricle image when the preset auricle image consistent with the user auricle image is stored in the storage module, and is used for hiding the private application program associated with the preset auricle image inconsistent with the user auricle image when the preset auricle image consistent with the user auricle image is not stored in the storage module.
The mobile terminal is a mobile phone, a tablet computer or a palm computer.
The invention has the beneficial effects that: different from the situation of the prior art, the method and the device have the advantages that the user auricle image of the user currently holding the mobile terminal is obtained, and then whether the preset auricle image consistent with the user auricle image is stored locally or not is judged; if the private application program associated with the preset auricle image is consistent with the preset auricle image, displaying the private application program associated with the preset auricle image which is inconsistent with the user auricle image, and otherwise hiding the private application program associated with the preset auricle image which is inconsistent with the user auricle image.
Drawings
Fig. 1 is a flowchart of a security control method of a mobile terminal of the present invention;
fig. 2 is a block diagram of a mobile terminal according to the present invention.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings and examples.
Referring to fig. 1, fig. 1 is a flowchart illustrating a security control method of a mobile terminal according to the present invention. In this embodiment, the security control method of the mobile terminal includes the following steps:
step S11: acquiring a user auricle image of a user currently holding the mobile terminal.
In step S11, for example, a user pinna image of a user currently holding the mobile terminal is acquired by a camera of the mobile terminal.
Step S12: and judging whether a preset auricle image consistent with the user auricle image is stored locally.
In step S12, it is determined whether the mobile terminal locally stores a preset auricle image consistent with the user auricle acquired in step S11.
Step S13: if so, displaying the consistent preset private application program associated with the auricle image; and if not, hiding the private application program associated with the preset auricle image inconsistent with the user auricle image.
In step S13, preset auricle images are searched in an auricle image database locally preset in the mobile terminal and compared one by one, a private application program associated with the preset auricle image that is consistent is displayed when the preset auricle image that is consistent is found, and if the preset auricle image that is consistent is not found, a private application program associated with the preset auricle image that is inconsistent with the user' S auricle head image in the preset auricle image database is hidden.
Preferably, before the step S11 of acquiring the user pinna image of the user currently holding the mobile terminal, the method further includes: the method comprises the steps of recording preset auricle images of at least one user to be registered, storing the preset auricle images to the local, and creating a private application program list associated with the preset auricle images, wherein the private application program list comprises at least one private application program. And recording preset auricle images of at least one user to be registered and storing the preset auricle images to a local preset auricle image database.
The following table is used as an example to illustrate that each pre-recorded preset pinna image is associated with one application list.
Figure BDA0000848539980000041
In the first case, the preset auricle image database only allows setting of a preset auricle image of a user, that is, a user who uses the mobile terminal for the first time after leaving a factory logs in a preset personal auricle image of the user, and associates a private application program list correspondingly, that is, the user is the owner of the mobile terminal. In this case, acquiring a user auricle image of a user currently holding the mobile terminal; judging whether a preset auricle image consistent with the user auricle image is stored locally (namely judging whether the user currently holding the mobile terminal is the owner), if so, displaying a private application program associated with the consistent preset auricle image (if so, displaying the private application program associated with the preset auricle image of the owner), and otherwise, hiding the private application program associated with the preset auricle image inconsistent with the user auricle image (namely, hiding the private application program associated with the preset auricle image of the owner).
In the second case, we take the preset auricle images of two or more users in the preset auricle image database as an example. In this case, acquiring a user auricle image of a user currently holding the mobile terminal; whether a preset auricle image consistent with the user auricle image is stored locally or not is judged (namely, whether the user who currently holds the mobile terminal has recorded the preset auricle image or not is judged to be local or not is judged), if yes, a private application program associated with the consistent preset auricle image is displayed (if yes, the private application program associated with the consistent preset auricle image is displayed), and if not, the private application program associated with the preset auricle image inconsistent with the user auricle image is hidden (namely, the private application programs associated with the preset auricle image inconsistent with the user auricle image and stored locally are hidden).
Preferably, the step S11 includes before the step of acquiring the user pinna image of the user currently holding the mobile terminal: setting a program hiding function, wherein the program hiding function is started or closed; and judging whether the program hiding function is turned on, executing the step of acquiring the user auricle image of the user currently holding the mobile terminal in the step of S11 when the program hiding function is turned on, and not executing the step of acquiring the user auricle image of the user currently holding the mobile terminal in the step of S11 when the program hiding function is not turned on.
Preferably, the setting program hiding function further includes: a private application list is set, wherein the private application list includes at least one private application. The set private application list is preferably used to modify or update the private application therein, such as adding or deleting.
Preferably, before setting the program hiding function, the method further comprises: and judging whether the user requesting to set the program hiding function has the authority to set the program hiding function.
Preferably, the determining whether the user requesting to set the program hiding function has the authority to set the program hiding function includes: acquiring an auricle image of a user requesting to set the program hiding function, judging whether a preset auricle image consistent with the auricle image of the user is stored locally, if so, entering an interface for setting the program hiding function, if not, judging whether the user has authority to set through other safety verification, if not, forbidding the user to set the program hiding function, and if so, entering the interface for setting the program hiding function.
Preferably, the other security verification is password verification, fingerprint verification, iris verification, voice verification or heartbeat verification.
In other embodiments, setting the program hiding function on or off includes: controlling the opening or closing of a program hiding function of the mobile terminal at the cloud end; judging whether the user requesting to set the program hiding function has the authority to set the program hiding function comprises the following steps: and judging whether a user requesting to set the program hiding function has the authority to set the program hiding function at the cloud. When the mobile terminal is lost, the function of opening the program hiding can be carried out through the function. The specific implementation mode is as follows: the mobile terminal uploads a preset auricle image database at the associated cloud end, when a user needs remote control, the user auricle images uploaded by other mobile terminals in real time are compared with the preset auricle image database at the cloud end, if the user auricle images are compared to the preset auricle images which are consistent, a corresponding instruction for opening/closing a program hiding function can be sent to operate, and if the user auricle images are not compared to the corresponding preset auricle images, an opening/closing instruction cannot be sent to the lost mobile terminal
Referring to fig. 2, fig. 2 is a block diagram of a mobile terminal according to the present invention. In the present embodiment, the mobile terminal includes a pinna image acquisition module 11, a storage module 12, a pinna image comparison module 13, and an application management module 14.
The auricle image acquiring module 11 is configured to acquire a user auricle image of a user currently holding the mobile terminal.
The storage module 12 is used for storing a preset auricle image.
And the auricle image comparison module 13 is used for judging whether the storage module stores a preset auricle image consistent with the user auricle image.
The application management module 14 is configured to display a private application associated with the preset auricle image that is consistent with the user auricle image when the preset auricle image that is consistent with the user auricle image is stored in the storage module, and hide a private application associated with the preset auricle image that is inconsistent with the user auricle image when the preset auricle image that is consistent with the user auricle image is not stored in the storage module.
Preferably, the mobile terminal is a mobile phone, a tablet computer or a palm computer.
Preferably, the auricle image acquiring module 11 is configured to record, before acquiring the user auricle image of the user currently holding the mobile terminal, at least one preset auricle image of the user to be registered, store the preset auricle image locally, and create a private application list associated with the preset auricle image, where the private application list includes at least one private application. And recording preset auricle images of at least one user to be registered and storing the preset auricle images to a local preset auricle image database.
Preferably, the mobile terminal further sets a program hiding function before acquiring the user auricle image of the user currently holding the mobile terminal, wherein the setting of the program hiding function is turned on or off.
Preferably, the mobile terminal further determines whether the program hiding function is turned on, and when turned on, the auricle image obtaining module 11 obtains an auricle image of the user currently holding the mobile terminal, and when not turned on, the auricle image obtaining module 11 does not obtain an auricle image of the user currently holding the mobile terminal.
Preferably, the setting module is further configured to set a private application list, where the private application list includes at least one private application. The set private application list is preferably used to modify or update the private application therein, such as adding or deleting.
Preferably, the mobile terminal further determines whether a user requesting to set the program hiding function has an authority to set the program hiding function.
Preferably, the mobile terminal determines whether the user requesting to set the program hiding function has the authority to set the program hiding function specifically as follows: the auricle image acquisition module 11 acquires an auricle image of a user requesting to set a program hiding function, the auricle image comparison module 13 judges whether a preset auricle image consistent with the auricle image of the user is stored locally, if the preset auricle image exists, the user enters an interface for setting the program hiding function, if the preset auricle image does not exist, the user is judged whether to have authority to set through other safety verification, if the user does not pass through other safety verification, the user is prohibited from setting the program hiding function, and if the user passes through other safety verification, the user enters the interface for setting the program hiding function.
Preferably, the other security verification is password verification, fingerprint verification, iris verification, voice verification or heartbeat verification.
In other embodiments, setting the program hiding function on or off includes: controlling the opening or closing of a program hiding function of the mobile terminal at the cloud end; judging whether the user requesting to set the program hiding function has the authority to set the program hiding function comprises the following steps: and judging whether a user requesting to set the program hiding function has the authority to set the program hiding function at the cloud. When the mobile terminal is lost, the function of opening the program hiding can be carried out through the function. The specific implementation mode is as follows: the mobile terminal uploads a preset auricle image database at the associated cloud end, when a user needs remote control, the user auricle images uploaded by other mobile terminals in real time are compared with the preset auricle image database at the cloud end, if the user auricle images are compared to the preset auricle images which are consistent, a corresponding instruction for opening/closing the program hiding function can be sent to operate, and if the user auricle images are not compared to the corresponding preset auricle images, an opening/closing instruction cannot be sent to the lost mobile terminal.
Different from the prior art, the method comprises the steps of acquiring the user auricle image of the user currently holding the mobile terminal, and then judging whether a preset auricle image consistent with the user auricle image is stored locally; if the private application program associated with the preset auricle image is consistent with the preset auricle image, displaying the private application program associated with the preset auricle image which is inconsistent with the user auricle image, and otherwise hiding the private application program associated with the preset auricle image which is inconsistent with the user auricle image.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (4)

1. A security control method of a mobile terminal, the security control method comprising:
under the condition that the mobile terminal is lost, acquiring an auricle image of a user requesting to set a program hiding function at a cloud end, judging whether the preset auricle image consistent with the auricle image of the user is stored in the cloud end, if so, entering an interface of the program hiding function, if not, judging whether the user has authority to set through other safety verification, if not, forbidding the user to set the program hiding function, and if so, entering the interface of the program hiding function, wherein the other safety verification is password verification, fingerprint verification, iris verification, voice verification or heartbeat verification;
setting a program hiding function, wherein the program hiding function is controlled to be started or closed at a cloud end, and a private application program list is set and comprises at least one private application program;
judging whether the program hiding function is started, executing the step of acquiring the user auricle image of the user currently holding the mobile terminal when the program hiding function is started, and not executing the step of acquiring the user auricle image of the user currently holding the mobile terminal when the program hiding function is not started;
acquiring a user auricle image of a user currently holding the mobile terminal;
judging whether a preset auricle image consistent with the user auricle image is stored locally;
and if the preset auricle image is not consistent with the user auricle image, hiding the private application program associated with the preset auricle image.
2. The security control method according to claim 1, wherein the obtaining of the user's auricle image of the user currently holding the mobile terminal further comprises:
recording preset auricle images of at least one user to be registered, storing the preset auricle images to the local, and creating a private application program list associated with the preset auricle images, wherein the private application program list comprises at least one private application program.
3. A mobile terminal, characterized in that the mobile terminal comprises:
the mobile terminal comprises a pinna image comparison module, a background image comparison module and a background image comparison module, wherein the pinna image comparison module is used for acquiring a pinna image of a user requesting to set a program hiding function at a cloud end under the condition that the mobile terminal is lost, judging whether the cloud end stores a preset pinna image consistent with the pinna image of the user or not, if the preset pinna image exists, entering an interface for setting the program hiding function, if the preset pinna image does not exist, judging whether the user has authority to set through other safety verifications, if the user does not pass the other safety verifications, forbidding the user to set the program hiding function, and if the user passes the other safety verifications, entering the interface for setting the program hiding function, wherein the other safety verifications are password verification, fingerprint;
the system comprises a function setting module, a function hiding module and a function hiding module, wherein the function setting module is used for setting a program hiding function, and comprises the steps of controlling the program hiding function to be opened or closed at a cloud end and setting a private application program list, and the private application program list comprises at least one private application program;
the auricle image comparison module is also used for judging whether the program hiding function is started or not;
the auricle image acquisition module is used for acquiring a user auricle image of a user currently holding the mobile terminal when the program hiding function is started;
the storage module is used for storing a preset auricle image;
the auricle image comparison module is used for judging whether a preset auricle image consistent with the user auricle image is stored in the storage module;
and the application program management module is used for displaying the private application program associated with the consistent preset auricle image when the preset auricle image consistent with the user auricle image is stored in the storage module, and is used for hiding the private application program associated with the preset auricle image inconsistent with the user auricle image when the preset auricle image consistent with the user auricle image is not stored in the storage module.
4. The mobile terminal of claim 3, wherein the mobile terminal is a mobile phone, a tablet computer, or a palm top computer.
CN201510790997.XA 2015-11-16 2015-11-16 Mobile terminal and security control method thereof Active CN105468938B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510790997.XA CN105468938B (en) 2015-11-16 2015-11-16 Mobile terminal and security control method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510790997.XA CN105468938B (en) 2015-11-16 2015-11-16 Mobile terminal and security control method thereof

Publications (2)

Publication Number Publication Date
CN105468938A CN105468938A (en) 2016-04-06
CN105468938B true CN105468938B (en) 2021-02-26

Family

ID=55606628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510790997.XA Active CN105468938B (en) 2015-11-16 2015-11-16 Mobile terminal and security control method thereof

Country Status (1)

Country Link
CN (1) CN105468938B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127009B (en) * 2016-06-30 2019-01-11 宇龙计算机通信科技(深圳)有限公司 A kind of display methods and terminal of icon
CN106228047B (en) * 2016-07-15 2019-04-12 宇龙计算机通信科技(深圳)有限公司 A kind of application icon processing method and terminal device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8850546B1 (en) * 2012-09-30 2014-09-30 Emc Corporation Privacy-preserving user attribute release and session management

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8762709B2 (en) * 2011-05-20 2014-06-24 Lockheed Martin Corporation Cloud computing method and system
KR102001913B1 (en) * 2012-09-27 2019-07-19 엘지전자 주식회사 Mobile Terminal and Operating Method for the Same
CN104700010B (en) * 2013-12-05 2021-06-01 腾讯科技(深圳)有限公司 Personal information protection method and protection device
CN103677638A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for processing private documents
CN103886240B (en) * 2014-04-11 2017-04-12 快车科技有限公司 Method and device for improving equipment security through multi-fingerprint identification

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8850546B1 (en) * 2012-09-30 2014-09-30 Emc Corporation Privacy-preserving user attribute release and session management

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于耳廓特征的生物识别新技术;李雅娟 等;《计算机应用于软件》;20070731;第24卷(第7期);第56-57、145页 *

Also Published As

Publication number Publication date
CN105468938A (en) 2016-04-06

Similar Documents

Publication Publication Date Title
EP3214563B1 (en) Apparatus and method for improving security of terminal
US8904498B2 (en) Biometric identification for mobile applications
WO2017143879A1 (en) File permission management method and device
US20200059703A1 (en) Method and device for generating content
WO2016082229A1 (en) Identity authentication method and wearable device
CN105787324A (en) Computer information security system
EP3249570B1 (en) Method and device for providing prompt indicating loss of terminal
JP2018517960A (en) Privacy protection method and protection device for mobile terminal, and mobile terminal
WO2016187940A1 (en) Information protecting method, mobile terminal and computer storage medium
CN103678979A (en) Method and device for intelligently hiding privacy data
WO2019196296A1 (en) Image control and camera application photography control method and apparatus, and electronic device
CN110049490B (en) Safety protection method and device for wearable equipment, wearable equipment and medium
WO2014173220A1 (en) Shutdown verification method and device
TWI779230B (en) Method, system, device and device for enabling biometric application function
CN105468938B (en) Mobile terminal and security control method thereof
KR20130082980A (en) User personalized recommendation system based on face-recognition
US20220221967A1 (en) Method for disguising a computer system's login interface
JP2015176555A (en) Communication terminal and method for authenticating communication terminal
CN105760075A (en) Operating record creating method and device and intelligent terminal
JP2022002103A (en) Privacy protecting method and protecting device for mobile terminal and mobile terminal
CN107786349B (en) Security management method and device for user account
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
CN105844137B (en) Device and method for identifying picture browsing operation authority
KR102539533B1 (en) Method and apparatus for preventing other people from photographing identification
US20240214208A1 (en) Techniques for providing a digital keychain for physical objects

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant