CN105701388A - Mobile phone software security setting method and system - Google Patents

Mobile phone software security setting method and system Download PDF

Info

Publication number
CN105701388A
CN105701388A CN201610104266.XA CN201610104266A CN105701388A CN 105701388 A CN105701388 A CN 105701388A CN 201610104266 A CN201610104266 A CN 201610104266A CN 105701388 A CN105701388 A CN 105701388A
Authority
CN
China
Prior art keywords
software
user
fingerprint authentication
mobile phone
setting method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610104266.XA
Other languages
Chinese (zh)
Inventor
吴伟东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610104266.XA priority Critical patent/CN105701388A/en
Publication of CN105701388A publication Critical patent/CN105701388A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6054Biometric subscriber identification

Abstract

The invention provides a mobile phone software security setting method and system. The method includes the following steps that software needing to be encrypted by a user is acquired; when the software is operated, the user is prompted to input fingerprint information; if fingerprint verification passes, the software is started. The technical scheme has the advantage of being high in security.

Description

Cell phone software security setting method and system
Technical field
The present invention relates to communication and smart mobile phone field, particularly relate to a kind of cell phone software security setting method and system。
Background technology
The appearance of smart mobile phone makes people that the communication mode in daily life changed, and along with popularizing of smart mobile phone, the software security of smart mobile phone also becomes an important problem, and the safety that existing mobile phone safe is arranged is not high。
Summary of the invention
A kind of cell phone software security setting method is provided, which solves the shortcoming that the handset security of prior art is not high。
On the one hand, it is provided that a kind of cell phone software security setting method, described method comprises the steps:
Obtain user and need the software of encryption;
When running this software, point out user's typing finger print information;
As fingerprint authentication passes through, then open this software。
Optionally, described method also includes:
As fingerprint authentication does not pass through, prompting user changes other verification modes。
Optionally, described method also includes:
The number of times of record user's checking and time。
Second aspect, it is provided that a kind of cell phone software security set system, described system includes:
Acquiring unit, needs the software of encryption for obtaining user;
Tip element, for when running this software, pointing out user's typing finger print information;
Authentication unit, passes through for such as fingerprint authentication, then opens this software。
Optionally, described system also includes:
Changing unit, do not pass through for such as fingerprint authentication, prompting user changes other verification modes。
Optionally, described system also includes:
Record unit, for recording number of times and the time of user's checking。
The technical scheme that the specific embodiment of the invention provides obtains user needs the software of encryption, when running this software, points out user's typing finger print information, as fingerprint authentication passes through, then opens this software, so it has the advantage improving software security。
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings。
Fig. 1 is the flow chart of a kind of cell phone software security setting method provided by the invention;
Fig. 2 is the structure chart of a kind of cell phone software security set system provided by the invention。
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments。Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention。
Consulting the flow chart of a kind of cell phone software security setting method that Fig. 1, Fig. 1 provide for the present invention the first better embodiment, the method is completed by mobile phone, and the method is as it is shown in figure 1, comprise the steps:
Step S101, acquisition user need the software of encryption;
Step S102, when run this software time, point out user's typing finger print information;
Step S103, as fingerprint authentication passes through, then open this software。
The technical scheme that the specific embodiment of the invention provides obtains user needs the software of encryption, when running this software, points out user's typing finger print information, as fingerprint authentication passes through, then opens this software, so it has the advantage improving software security。
Optionally, said method can also include after step s 103:
As fingerprint authentication does not pass through, prompting user changes other verification modes。
Optionally, said method can also include after step s 103:
The number of times of record user's checking and time。
Consulting a kind of cell phone software security set system that Fig. 2, Fig. 2 provide for the present invention the second better embodiment, this system is as in figure 2 it is shown, include:
Acquiring unit 201, needs the software of encryption for obtaining user;
Tip element 202, for when running this software, pointing out user's typing finger print information;
Authentication unit 203, passes through for such as fingerprint authentication, then opens this software。
The technical scheme that the specific embodiment of the invention provides obtains user needs the software of encryption, when running this software, points out user's typing finger print information, as fingerprint authentication passes through, then opens this software, so it has the advantage improving software security。
Optionally, said system can also include:
Changing unit 204, do not pass through for such as fingerprint authentication, prompting user changes other verification modes。
Optionally, said system can also include:
Record unit 205, for recording number of times and the time of user's checking。
It should be noted that, for aforesaid each method embodiment or embodiment, in order to be briefly described, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously。Secondly, those skilled in the art also should know, embodiment described in the specification or embodiment belong to preferred embodiment, necessary to involved action and the unit not necessarily present invention。
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, certain embodiment there is no the part described in detail, it is possible to referring to the associated description of other embodiments。
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete。
Unit in embodiment of the present invention device can merge according to actual needs, divides and delete。The feature of the different embodiments described in this specification and different embodiment can be carried out combining or combining by those skilled in the art。
Through the above description of the embodiments, those skilled in the art is it can be understood that can realize with hardware to the present invention, or firmware realizes, or their compound mode realizes。When implemented in software, it is possible to above-mentioned functions is stored in computer-readable medium or is transmitted as the one or more instructions on computer-readable medium or code。Computer-readable medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to any medium of transmission computer program from a place to another place。Storage medium can be any usable medium that computer can access。As example but be not limited to: computer-readable medium can include random access memory (RandomAccessMemory, RAM), read only memory (Read-OnlyMemory, ROM), EEPROM (ElectricallyErasableProgrammableRead-OnlyMemory, EEPROM), read-only optical disc (CompactDiscRead-OnlyMemory, or other optical disc storage CD-ROM), magnetic disk storage medium or other magnetic storage apparatus, or can be used in carrying or store the desired program code with instruction or data structure form can by any other medium of computer access。In addition。Any connection can be suitable become computer-readable medium。Such as, if software is to use coaxial cable, optical fiber cable, twisted-pair feeder, Digital Subscriber Line (DigitalSubscriberLine, DSL) or the wireless technology of such as infrared ray, radio and microwave etc from website, server or other remote source, then the wireless technology of coaxial cable, optical fiber cable, twisted-pair feeder, DSL or such as infrared ray, wireless and microwave etc include affiliated medium fixing in。As used in the present invention, dish (Disk) and dish (disc) include compression laser disc (CD), laser dish, laser disc, Digital Versatile Disc (DVD), floppy disk and Blu-ray Disc, the duplication data of the usual magnetic of its mid-game, dish then carrys out the duplication data of optics with laser。Above combination above should also be as including within the protection domain of computer-readable medium。
In a word, the foregoing is only the preferred embodiment of technical solution of the present invention, be not intended to limit protection scope of the present invention。All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention。

Claims (6)

1. a cell phone software security setting method, it is characterised in that described method comprises the steps: that obtaining user needs the software of encryption;
When running this software, point out user's typing finger print information;
As fingerprint authentication passes through, then open this software。
2. method according to claim 1, it is characterised in that described method also includes:
As fingerprint authentication does not pass through, prompting user changes other verification modes。
3. method according to claim 1, it is characterised in that described method also includes:
The number of times of record user's checking and time。
4. a cell phone software security set system, it is characterised in that described system includes:
Acquiring unit, needs the software of encryption for obtaining user;
Tip element, for when running this software, pointing out user's typing finger print information;
Authentication unit, passes through for such as fingerprint authentication, then opens this software。
5. system according to claim 4, it is characterised in that described system also includes:
Changing unit, do not pass through for such as fingerprint authentication, prompting user changes other verification modes。
6. system according to claim 4, it is characterised in that described system also includes:
Record unit, for recording number of times and the time of user's checking。
CN201610104266.XA 2016-02-25 2016-02-25 Mobile phone software security setting method and system Pending CN105701388A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610104266.XA CN105701388A (en) 2016-02-25 2016-02-25 Mobile phone software security setting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610104266.XA CN105701388A (en) 2016-02-25 2016-02-25 Mobile phone software security setting method and system

Publications (1)

Publication Number Publication Date
CN105701388A true CN105701388A (en) 2016-06-22

Family

ID=56223101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610104266.XA Pending CN105701388A (en) 2016-02-25 2016-02-25 Mobile phone software security setting method and system

Country Status (1)

Country Link
CN (1) CN105701388A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050097524A1 (en) * 2003-10-31 2005-05-05 Fujitsu Limited Information processing apparatus
CN102346831A (en) * 2011-10-31 2012-02-08 广东欧珀移动通信有限公司 Handheld device privacy encryption protection method of Android operating system
CN102567686A (en) * 2012-01-06 2012-07-11 上海凯卓信息科技有限公司 Security authentication method of application software of mobile terminal based on human body stable characteristics
CN104660613A (en) * 2015-03-16 2015-05-27 联想(北京)有限公司 Authentication method of user identification module and electronic equipment
CN105519087A (en) * 2015-10-23 2016-04-20 陈银芳 Cellphone safety setting method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050097524A1 (en) * 2003-10-31 2005-05-05 Fujitsu Limited Information processing apparatus
CN102346831A (en) * 2011-10-31 2012-02-08 广东欧珀移动通信有限公司 Handheld device privacy encryption protection method of Android operating system
CN102567686A (en) * 2012-01-06 2012-07-11 上海凯卓信息科技有限公司 Security authentication method of application software of mobile terminal based on human body stable characteristics
CN104660613A (en) * 2015-03-16 2015-05-27 联想(北京)有限公司 Authentication method of user identification module and electronic equipment
CN105519087A (en) * 2015-10-23 2016-04-20 陈银芳 Cellphone safety setting method and system

Similar Documents

Publication Publication Date Title
CN103516518A (en) Safety verification method and device
CN105849730A (en) Data capture method and system
CN107209678A (en) System and method for the adaptive clone of mobile device
US11947691B2 (en) Systems and methods for managing access rights for a copy of an original digital document
CN106294010A (en) The storage method and system of big data in distributed system
CN106293528A (en) Dropbox stores the method and system of big data
CN106294011A (en) The big date storage method of sort-type and system
CN106098070A (en) A kind of identity identifying method and network system
CN106250538A (en) Wechat is shared the method and system of big data
CN105519087A (en) Cellphone safety setting method and system
CN105701388A (en) Mobile phone software security setting method and system
CN106254662A (en) Interior of mobile phone control method and system
CN106294818A (en) Personalization realizes app sort method and system
CN106303036A (en) The hidden method of app and system under specific use scene
CN106331323A (en) Method and system for sorting apps according to place
CN106144800A (en) Mobile phone shakes the method and system controlling elevator
CN106453862A (en) Security setting method and system for handset software
CN106326875A (en) Security protection fingerprint recognition method and system
CN106295818A (en) Customization method and system when of English course
CN106331326A (en) Time-based method and system for dynamically adjusting hidden app
CN105787314A (en) Unlocking method and system of intelligent watch
CN106303035A (en) The method and system of app are hidden in mobile phone
CN106303040A (en) Different access times determine the method and system that app hides
CN106303033A (en) Different location realizes the method and system that app hides
CN106231111A (en) The method and system that dynamic implement app sequence adjusts

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160622

RJ01 Rejection of invention patent application after publication