CN105701388A - Mobile phone software security setting method and system - Google Patents
Mobile phone software security setting method and system Download PDFInfo
- Publication number
- CN105701388A CN105701388A CN201610104266.XA CN201610104266A CN105701388A CN 105701388 A CN105701388 A CN 105701388A CN 201610104266 A CN201610104266 A CN 201610104266A CN 105701388 A CN105701388 A CN 105701388A
- Authority
- CN
- China
- Prior art keywords
- software
- user
- fingerprint authentication
- mobile phone
- setting method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6054—Biometric subscriber identification
Abstract
The invention provides a mobile phone software security setting method and system. The method includes the following steps that software needing to be encrypted by a user is acquired; when the software is operated, the user is prompted to input fingerprint information; if fingerprint verification passes, the software is started. The technical scheme has the advantage of being high in security.
Description
Technical field
The present invention relates to communication and smart mobile phone field, particularly relate to a kind of cell phone software security setting method and system。
Background technology
The appearance of smart mobile phone makes people that the communication mode in daily life changed, and along with popularizing of smart mobile phone, the software security of smart mobile phone also becomes an important problem, and the safety that existing mobile phone safe is arranged is not high。
Summary of the invention
A kind of cell phone software security setting method is provided, which solves the shortcoming that the handset security of prior art is not high。
On the one hand, it is provided that a kind of cell phone software security setting method, described method comprises the steps:
Obtain user and need the software of encryption;
When running this software, point out user's typing finger print information;
As fingerprint authentication passes through, then open this software。
Optionally, described method also includes:
As fingerprint authentication does not pass through, prompting user changes other verification modes。
Optionally, described method also includes:
The number of times of record user's checking and time。
Second aspect, it is provided that a kind of cell phone software security set system, described system includes:
Acquiring unit, needs the software of encryption for obtaining user;
Tip element, for when running this software, pointing out user's typing finger print information;
Authentication unit, passes through for such as fingerprint authentication, then opens this software。
Optionally, described system also includes:
Changing unit, do not pass through for such as fingerprint authentication, prompting user changes other verification modes。
Optionally, described system also includes:
Record unit, for recording number of times and the time of user's checking。
The technical scheme that the specific embodiment of the invention provides obtains user needs the software of encryption, when running this software, points out user's typing finger print information, as fingerprint authentication passes through, then opens this software, so it has the advantage improving software security。
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings。
Fig. 1 is the flow chart of a kind of cell phone software security setting method provided by the invention;
Fig. 2 is the structure chart of a kind of cell phone software security set system provided by the invention。
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments。Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention。
Consulting the flow chart of a kind of cell phone software security setting method that Fig. 1, Fig. 1 provide for the present invention the first better embodiment, the method is completed by mobile phone, and the method is as it is shown in figure 1, comprise the steps:
Step S101, acquisition user need the software of encryption;
Step S102, when run this software time, point out user's typing finger print information;
Step S103, as fingerprint authentication passes through, then open this software。
The technical scheme that the specific embodiment of the invention provides obtains user needs the software of encryption, when running this software, points out user's typing finger print information, as fingerprint authentication passes through, then opens this software, so it has the advantage improving software security。
Optionally, said method can also include after step s 103:
As fingerprint authentication does not pass through, prompting user changes other verification modes。
Optionally, said method can also include after step s 103:
The number of times of record user's checking and time。
Consulting a kind of cell phone software security set system that Fig. 2, Fig. 2 provide for the present invention the second better embodiment, this system is as in figure 2 it is shown, include:
Acquiring unit 201, needs the software of encryption for obtaining user;
Tip element 202, for when running this software, pointing out user's typing finger print information;
Authentication unit 203, passes through for such as fingerprint authentication, then opens this software。
The technical scheme that the specific embodiment of the invention provides obtains user needs the software of encryption, when running this software, points out user's typing finger print information, as fingerprint authentication passes through, then opens this software, so it has the advantage improving software security。
Optionally, said system can also include:
Changing unit 204, do not pass through for such as fingerprint authentication, prompting user changes other verification modes。
Optionally, said system can also include:
Record unit 205, for recording number of times and the time of user's checking。
It should be noted that, for aforesaid each method embodiment or embodiment, in order to be briefly described, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously。Secondly, those skilled in the art also should know, embodiment described in the specification or embodiment belong to preferred embodiment, necessary to involved action and the unit not necessarily present invention。
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, certain embodiment there is no the part described in detail, it is possible to referring to the associated description of other embodiments。
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete。
Unit in embodiment of the present invention device can merge according to actual needs, divides and delete。The feature of the different embodiments described in this specification and different embodiment can be carried out combining or combining by those skilled in the art。
Through the above description of the embodiments, those skilled in the art is it can be understood that can realize with hardware to the present invention, or firmware realizes, or their compound mode realizes。When implemented in software, it is possible to above-mentioned functions is stored in computer-readable medium or is transmitted as the one or more instructions on computer-readable medium or code。Computer-readable medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to any medium of transmission computer program from a place to another place。Storage medium can be any usable medium that computer can access。As example but be not limited to: computer-readable medium can include random access memory (RandomAccessMemory, RAM), read only memory (Read-OnlyMemory, ROM), EEPROM (ElectricallyErasableProgrammableRead-OnlyMemory, EEPROM), read-only optical disc (CompactDiscRead-OnlyMemory, or other optical disc storage CD-ROM), magnetic disk storage medium or other magnetic storage apparatus, or can be used in carrying or store the desired program code with instruction or data structure form can by any other medium of computer access。In addition。Any connection can be suitable become computer-readable medium。Such as, if software is to use coaxial cable, optical fiber cable, twisted-pair feeder, Digital Subscriber Line (DigitalSubscriberLine, DSL) or the wireless technology of such as infrared ray, radio and microwave etc from website, server or other remote source, then the wireless technology of coaxial cable, optical fiber cable, twisted-pair feeder, DSL or such as infrared ray, wireless and microwave etc include affiliated medium fixing in。As used in the present invention, dish (Disk) and dish (disc) include compression laser disc (CD), laser dish, laser disc, Digital Versatile Disc (DVD), floppy disk and Blu-ray Disc, the duplication data of the usual magnetic of its mid-game, dish then carrys out the duplication data of optics with laser。Above combination above should also be as including within the protection domain of computer-readable medium。
In a word, the foregoing is only the preferred embodiment of technical solution of the present invention, be not intended to limit protection scope of the present invention。All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention。
Claims (6)
1. a cell phone software security setting method, it is characterised in that described method comprises the steps: that obtaining user needs the software of encryption;
When running this software, point out user's typing finger print information;
As fingerprint authentication passes through, then open this software。
2. method according to claim 1, it is characterised in that described method also includes:
As fingerprint authentication does not pass through, prompting user changes other verification modes。
3. method according to claim 1, it is characterised in that described method also includes:
The number of times of record user's checking and time。
4. a cell phone software security set system, it is characterised in that described system includes:
Acquiring unit, needs the software of encryption for obtaining user;
Tip element, for when running this software, pointing out user's typing finger print information;
Authentication unit, passes through for such as fingerprint authentication, then opens this software。
5. system according to claim 4, it is characterised in that described system also includes:
Changing unit, do not pass through for such as fingerprint authentication, prompting user changes other verification modes。
6. system according to claim 4, it is characterised in that described system also includes:
Record unit, for recording number of times and the time of user's checking。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610104266.XA CN105701388A (en) | 2016-02-25 | 2016-02-25 | Mobile phone software security setting method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610104266.XA CN105701388A (en) | 2016-02-25 | 2016-02-25 | Mobile phone software security setting method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105701388A true CN105701388A (en) | 2016-06-22 |
Family
ID=56223101
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610104266.XA Pending CN105701388A (en) | 2016-02-25 | 2016-02-25 | Mobile phone software security setting method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105701388A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050097524A1 (en) * | 2003-10-31 | 2005-05-05 | Fujitsu Limited | Information processing apparatus |
CN102346831A (en) * | 2011-10-31 | 2012-02-08 | 广东欧珀移动通信有限公司 | Handheld device privacy encryption protection method of Android operating system |
CN102567686A (en) * | 2012-01-06 | 2012-07-11 | 上海凯卓信息科技有限公司 | Security authentication method of application software of mobile terminal based on human body stable characteristics |
CN104660613A (en) * | 2015-03-16 | 2015-05-27 | 联想(北京)有限公司 | Authentication method of user identification module and electronic equipment |
CN105519087A (en) * | 2015-10-23 | 2016-04-20 | 陈银芳 | Cellphone safety setting method and system |
-
2016
- 2016-02-25 CN CN201610104266.XA patent/CN105701388A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050097524A1 (en) * | 2003-10-31 | 2005-05-05 | Fujitsu Limited | Information processing apparatus |
CN102346831A (en) * | 2011-10-31 | 2012-02-08 | 广东欧珀移动通信有限公司 | Handheld device privacy encryption protection method of Android operating system |
CN102567686A (en) * | 2012-01-06 | 2012-07-11 | 上海凯卓信息科技有限公司 | Security authentication method of application software of mobile terminal based on human body stable characteristics |
CN104660613A (en) * | 2015-03-16 | 2015-05-27 | 联想(北京)有限公司 | Authentication method of user identification module and electronic equipment |
CN105519087A (en) * | 2015-10-23 | 2016-04-20 | 陈银芳 | Cellphone safety setting method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103516518A (en) | Safety verification method and device | |
CN105849730A (en) | Data capture method and system | |
CN107209678A (en) | System and method for the adaptive clone of mobile device | |
US11947691B2 (en) | Systems and methods for managing access rights for a copy of an original digital document | |
CN106294010A (en) | The storage method and system of big data in distributed system | |
CN106293528A (en) | Dropbox stores the method and system of big data | |
CN106294011A (en) | The big date storage method of sort-type and system | |
CN106098070A (en) | A kind of identity identifying method and network system | |
CN106250538A (en) | Wechat is shared the method and system of big data | |
CN105519087A (en) | Cellphone safety setting method and system | |
CN105701388A (en) | Mobile phone software security setting method and system | |
CN106254662A (en) | Interior of mobile phone control method and system | |
CN106294818A (en) | Personalization realizes app sort method and system | |
CN106303036A (en) | The hidden method of app and system under specific use scene | |
CN106331323A (en) | Method and system for sorting apps according to place | |
CN106144800A (en) | Mobile phone shakes the method and system controlling elevator | |
CN106453862A (en) | Security setting method and system for handset software | |
CN106326875A (en) | Security protection fingerprint recognition method and system | |
CN106295818A (en) | Customization method and system when of English course | |
CN106331326A (en) | Time-based method and system for dynamically adjusting hidden app | |
CN105787314A (en) | Unlocking method and system of intelligent watch | |
CN106303035A (en) | The method and system of app are hidden in mobile phone | |
CN106303040A (en) | Different access times determine the method and system that app hides | |
CN106303033A (en) | Different location realizes the method and system that app hides | |
CN106231111A (en) | The method and system that dynamic implement app sequence adjusts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160622 |
|
RJ01 | Rejection of invention patent application after publication |