CN106127010A - The security setting method of terminal applies and the device of security set - Google Patents

The security setting method of terminal applies and the device of security set Download PDF

Info

Publication number
CN106127010A
CN106127010A CN201610518291.2A CN201610518291A CN106127010A CN 106127010 A CN106127010 A CN 106127010A CN 201610518291 A CN201610518291 A CN 201610518291A CN 106127010 A CN106127010 A CN 106127010A
Authority
CN
China
Prior art keywords
information
terminal
user
security
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610518291.2A
Other languages
Chinese (zh)
Inventor
黄师广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201610518291.2A priority Critical patent/CN106127010A/en
Publication of CN106127010A publication Critical patent/CN106127010A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to the security setting method of a kind of terminal applies and the device of security set.The method comprises the following steps: obtain the biological information of user;The biological information of described user is mated with presupposed information, the matching result whether mated;According to described matching result, application is carried out security set.By obtaining the biological information of user, carry out presupposed information coupling, and according to matching result, application is carried out security set, such that it is able to arrange different authorities for different user, avoid having no right the improper important information obtaining user of user, ensure that the possessory information security of mobile terminal, there is the advantage preventing leakage of information, using safety.

Description

The security setting method of terminal applies and the device of security set
Technical field
The present invention relates to security technology area, more particularly, it relates to the security setting method of a kind of terminal applies and peace The full device arranged.
Background technology
In recent years, along with expanding economy, traffic is more and more convenient, and the life radius of people becomes increasing.Mobile phone, The mobile subscriber terminals such as panel computer become the important tool of people's contact communication.
Along with the development of the intelligent mobile terminal such as mobile phone, panel computer, the function of terminal is improved various the most day by day, electricity The application of sub-mobile terminal becomes increasingly abundant especially, and the service and the information that are provided by people's life are more and more diversified.Especially , along with popularizing of mobile payment, the terminal applies that mobile terminal is installed in conjunction with a lot of payment functions, thus can bind bank The information such as card, the credit card.If mobile terminal is lost, it is likely to result in the most greatly the loss of property, such as mobile terminal and is used by other Family is found, can by running background should be used for obtain user profile, and then obtain bank card, the credit card or identification card number The important user profile such as code, thus move payment, steal the logon rights etc. of various application, to lost mobile terminal The owner brings immeasurable loss.
Summary of the invention
The technical problem to be solved in the present invention is, it is provided that a kind of can pacify according to the biological information of user The security setting method of the full terminal applies arranged and the device of security set.
The technical solution adopted for the present invention to solve the technical problems is: construct the security set side of a kind of terminal applies Method, comprises the following steps:
Obtain the biological information of user;
The biological information of described user is mated with presupposed information, the matching result whether mated;
According to described matching result, application is carried out security set.
Preferably, described biological information includes: fingerprint feature information, sound characteristic information, face characteristic information, rainbow One or more in film characteristic information;
Described presupposed information includes that the fingerprint presupposed information corresponding with described biological information, sound presets information, face are pre- If one or more in information, iris presupposed information.
Preferably, described method, before the step of the biological information of described acquisition user, also includes:
Under screen lock state, terminal determines and receives unlocking signal.
Preferably, described method, before the step of the biological information of described acquisition user, also includes:
Determine that described terminal is in talking state or uses the state of recording device.
Preferably, according to described matching result, application is carried out in the step of security set, including: when described coupling When result is no, empty the logon data of described application;Or
The logon data of described application is encrypted;Or
The default use authority of described application is set.
The present invention also provides for the device of a kind of security set, including:
Acquiring unit, for obtaining the biological information of user;
Matching unit, mates the biological information of described user with presupposed information, the coupling whether mated Result;
Unit is set, for according to described matching result, application is carried out security set.
Preferably, described biological information includes: fingerprint feature information, sound characteristic information, face characteristic information, rainbow One or more in film characteristic information;
Described presupposed information includes that the fingerprint presupposed information corresponding with described biological information, sound presets information, face are pre- If one or more in information, iris presupposed information;
Described matching unit is by described fingerprint feature information, sound characteristic information, face characteristic information, iris feature information respectively Mate with described fingerprint presupposed information, sound presets information, face presupposed information, iris presupposed information.
Preferably, the device of described security set also includes unlocking judging unit, be used for judging terminal under screen lock state, Whether receive unlocking signal;Wherein, described unlocking signal includes that user inputs by acting on the touch screen of described terminal Slip unlocking signal, click in unlocking signal, unlocked by fingerprint signal one or more;
Corresponding, described biological information includes fingerprint feature information;
Described acquiring unit includes fingerprint identification module, for identifying that described user acts on the described finger on described touch screen Stricture of vagina characteristic information.
Preferably, the device of security set also includes sound judging unit, be used for judging terminal whether be in talking state, Or under the state using recording device;
Wherein, described biological information includes sound characteristic information;
Described acquiring unit includes sound acquisition module, for obtaining the described sound characteristic information of user.
Preferably, the described unit that arranges includes:
Empty module, for when described matching result is no, empty the logon data of application;Or
Encrypting module, for when described matching result is no, is encrypted the logon data of application;Or
Priority assignation module, when described matching result is no, arranges the default use authority of application.
Implement the biological information that the method have the advantages that by obtaining user, carry out presupposed information Coupling, and according to matching result, application is carried out security set, such that it is able to arrange different power for different user Limit, it is to avoid have no right user improper obtain user important information, it is ensured that the possessory information security of mobile terminal, have anti- Only leakage of information, the advantage of use safety.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the schematic flow sheet of the first embodiment of the security setting method of the terminal applies of the present invention;
Fig. 2 is the schematic flow sheet of another embodiment of the security setting method of invention terminal applies;
Fig. 3 is the schematic flow sheet of another embodiment of the security setting method of invention terminal applies;
Fig. 4 is the schematic block diagram of the first embodiment of the device of security set of the present invention;
Fig. 5 is the schematic block diagram of another embodiment of the device of security set of the present invention;
Fig. 6 is the schematic block diagram of another embodiment of the device of security set of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
As shown in figs 1 to 6, at the dress of the security setting method and security set that the invention discloses a kind of terminal applies Put, by obtaining the biological information of user, carry out presupposed information coupling, and according to matching result, application is pacified Complete arrange, such that it is able to arrange different authorities for different user, it is to avoid have no right the improper weight obtaining user of user Want information, it is ensured that the possessory information security of mobile terminal, there is the advantage preventing leakage of information, using safety.Hereinafter divide It is not described in detail.
As it is shown in figure 1, be the schematic flow sheet of the first embodiment of the security setting method of the terminal applies of the present invention, should Method can apply in terminal.Wherein, terminal includes but not limited to have the smart mobile phone of communication function, panel computer, pen Remember the terminals such as this computer, palm PC, PAD.The operating system of electric terminal may include but be not limited to Android operation System, IOS operating system, Symbian (Saipan) operating system, Black Berry (blackberry) operating system, Windows Phone operating system etc..
As it is shown in figure 1, the security setting method of this terminal applies comprises the following steps:
S101: obtain the biological information of user.In the present embodiment, the biological information of user includes, but not It is limited to, one or more in fingerprint feature information, sound characteristic information, face characteristic information, iris feature information.Corresponding , terminal is provided with and gathers the fingerprint acquisition device of fingerprint feature information, the sound characteristic collection of collection sound characteristic information Device, the face characteristic harvester of collection face characteristic information, the iris feature harvester of collection iris feature information are logical The harvester crossing correspondence obtains the biological information of correspondence.It should be understood that the trigger collection of biological information, can To trigger in the way of different.
When terminal triggering carries out collecting biological feature information, trigger corresponding harvester and gather corresponding biological characteristic Information.Such as, when biological information is fingerprint feature information, trigger fingerprint acquisition device, such as the fingerprint arranged in terminal Identifying sensor, gather the fingerprint characteristic that user is pressed against on the display screen of terminal or touch screen, the fingerprint obtaining correspondence is special Reference ceases.
When biological information is sound characteristic information, trigger sound characteristic harvester, such as the wheat arranged in terminal Gram wind, when user carries out the operation such as voice call, recording, obtains corresponding voice by sound characteristic harvester and believes Number, obtain the sound characteristic information of correspondence.
When biological information is face characteristic information, trigger face characteristic harvester, such as taking the photograph of arranging in terminal As head, by face characteristic harvester, user is shot, it is thus achieved that the face picture of user, and according to face picture Analyze the face characteristic information obtaining correspondence.
When biological information is iris feature information, trigger iris feature harvester, such as taking the photograph of arranging in terminal As head, by iris feature harvester, the eyes of user are shot, it is thus achieved that the eyes picture of user, and according to eye Eyeball picture analyzing obtains the iris feature information of correspondence.
It should be understood that the biological information obtained can be one or more of above-mentioned biological information.Enter one Step, above-mentioned biological information priority rating be can be carried out, the biological information of correspondence, example obtained according to priority As, fingerprint feature information, sound characteristic information, face characteristic information, iris feature information are set preferentially the most successively Level, after the biological information obtaining higher priority, it is not necessary to obtain the biological information that priority is low, such that it is able to joint About terminal resource, improves efficiency.
S102: the biological information of user is mated with presupposed information, the matching result whether mated.
Wherein, this presupposed information includes the fingerprint presupposed information corresponding with biological information, sound presets information, face One or more in presupposed information, iris presupposed information.It should be understood that such presupposed information can be by the collection of terminal Device carries out collecting biological feature information to Terminal owner, presets letter as gathered fingerprint by the fingerprint acquisition device of terminal Breath, by sound characteristic harvester gather sound presets information, by face characteristic harvester gather face presupposed information, Gather iris presupposed information etc. by iris feature harvester, obtained the biological characteristic of correspondence by corresponding harvester Information;Then, the biological information of Terminal owner that will collect, it is stored in the storage device of terminal, as presetting Information, uses for subsequent match.
After getting the biological information of user, by by fingerprint feature information, sound characteristic information, face spy Reference breath, iris feature information respectively with fingerprint presupposed information, sound presets information, face presupposed information, iris presupposed information Mate, and obtain matching result.
Further, such biological information can be carried out priority rating, the biological characteristic at higher priority is believed After breath carries out mating correctly, stop coupling, it is not necessary to obtain and the biological information that priority is low is mated, such that it is able to Save terminal resource, improve efficiency.
The matching result obtained may include that when the biological information of the user gathered fails to match correspondence During presupposed information, it is judged that existing user is that terminal haves no right the owner, the matching result of output negative;Life when the user gathered When thing characteristic information matches the presupposed information of correspondence, it is judged that existing user is that terminal is correctly mated with access to person, output Matching result.
Further, it is also possible to according to the different users of terminal, different presupposed informations is set, such that it is able to according to The biological information of the user gathered mates with different presupposed informations, and then can obtain different coupling knots Really, application is carried out the security set (the most aftermentioned) of different stage.Such as, the owner to terminal arranges the first priority Presupposed information, the presupposed information that other legitimate users of terminal arrange the second priority (can certainly arrange more excellent First level), the biological information of acquisition is mated with various level presupposed information successively, after fitting through, defeated Go out the corresponding level matching result that the match is successful, and then can come application according to the different level matching results that the match is successful Carry out the security set of different stage.
S103: according to matching result, application is carried out security set.When matching result is for negative, empty in terminal The logon data of application, can empty logon data by deleting the user name of storage, login password etc. in terminal.Such as, Application in terminal is scanned for by the module that empties of terminal, obtain logon data temporary in the login page of application or with The logon data storage file that application is corresponding, stores file to this logon data or logon data and deletes, empty login number According to, it is ensured that the information security of Terminal owner.
Or, the logon data of application is encrypted, such as by arranging encryption key in the terminal, when judging coupling When result is for negative, call this encryption key, the information such as the login username applied, login password are encrypted, user After must inputting the key of correspondence, the information such as the user name of correspondence, login password could be obtained.Such as, the encrypting module of terminal Application in terminal is scanned for, obtains logon data temporary in the login page of application or the login corresponding with application Data storage file, calls the encryption key prestored, and this logon data or logon data is stored file and is encrypted, user After must inputting the key of correspondence, the logon data of correspondence could be obtained, it is ensured that the information security of Terminal owner.
Or, the default use authority of application is set, such as, the application in terminal is carried out by the priority assignation module of terminal Analyze, will the conventional func of application, such as reading information, conventional notification etc., the function that could use after logging in, as concluded the business, payment, Check that accounts information etc. is classified;When matching result is no, the authority of the conventional func of application is set by priority assignation module It is set to readable state, i.e. serviceable condition, and the priority assignation of the function that could use after being logged in by needs is constrained state, as Conclude the business, pay, check that the functions such as accounts information limit, it is impossible to user cannot be by open should be for obtaining.
When matching result is for correctly mating, the existing user of terminal judges be terminal with access to person, thus open terminal The use authority of application, user can normally use the various application of terminal.
Further, it is also possible to according to the different users of terminal, different presupposed informations is set, such that it is able to according to The biological information of the user gathered mates with different presupposed informations, and then can obtain different coupling knots Really, application is carried out the security set of different stage.
Such as, the owner of terminal arranging the security set of lowest level, when matching result is correct, i.e. user is During Terminal owner, all use authorities of open terminal applies, user can normally use the various application of terminal.
Other user to terminal arrange the security set of higher level, when matching result is other legitimate users Time, call the security set of this corresponding level, according to the open corresponding authority of this security set strategy, such as, pass through priority assignation It is readable state, i.e. serviceable condition that module arranges the priority assignation of the conventional func of application, and just can make after being logged in by needs The priority assignation of function be constrained state, as concluded the business, pay, checking, the functions such as accounts information limit, it is impossible to use Person cannot be by open should be for obtaining.
Terminal haves no right user arranges the security set of highest level, when matching result is for negative, does not the most close When the presupposed information of method user matches, call the security set of this highest level, utilize and empty module, encrypting module, power Limit arranges module etc., carries out emptying, encrypt or arrange authority etc. by the user data of application, protects, it is to avoid haves no right to make User obtains the log-on message of correspondence, improves the Information Security of Terminal owner.
The present embodiment, by obtaining the biological information of user, carries out presupposed information coupling, and according to matching result Application is carried out security set, such that it is able to arrange different authorities for different user, it is to avoid have no right user not When the important information obtaining user, it is ensured that the possessory information security of mobile terminal, have and prevent leakage of information, use safety Advantage.
As in figure 2 it is shown, be the schematic flow sheet of another embodiment of the security setting method of terminal applies of the present invention, with The difference of a upper embodiment is, also includes step S201: under at screen lock state before the biological information obtaining user, Terminal determines and receives unlocking signal.Concrete, when terminal is under screen lock state, when user needs to use, need elder generation It is unlocked operation, receives the unlocking signal of user input in terminal, if user is by acting on the touch screen of terminal When the slip unlocking signal of input, one or more clicked in unlocking signal, unlocked by fingerprint signal, determine and receive unblock letter Number, thus trigger the step of the biological information obtaining user.
Concrete, in terminal, storage has the unlocking signal prestored.When the capacitive touch screen of touch screen, when user leads to When crossing the touch screen that touch operation acts on terminal, obtained the motion rail of touch operation by the capacitance variations of sensing touch screen Mark, then movement locus is contrasted with the unlocking signal prestored, determine whether that unlocking signal inputs.
When the resistive touch screen of touch screen, when user acts on the touch screen of terminal by touch operation, The movement locus of touch operation is obtained by the change in resistance of sensing touch screen, then by movement locus and the unlocking signal prestored Contrast, determine whether that unlocking signal inputs.
Or, in terminal, storage has the unlocked by fingerprint information prestored, and terminal is provided with fingerprint Identification sensor, works as use When person touches fingerprint Identification sensor with finger, gather the finger print information of the finger of user, and believe with the unlocked by fingerprint prestored Breath contrasts, and determines whether that unlocking signal inputs.
When the action that decision person acts on touch screen is unlocking motion, trigger step S101: terminal obtains and uses The biological information of person.It should be understood that this step S101 is essentially identical with a upper embodiment, therefore do not repeat.
In the present embodiment, unlocking signal is the operation acting on touch screen, and the biological information of user can be Fingerprint feature information, such that it is able to user operation touch screen when, utilize touch screen special to the fingerprint gathering user Reference ceases, thus simplifies the collection of biological information, and the person of being not used discovers, and further improves the safety of terminal Property, it is ensured that the information security of Terminal owner.
Other steps of the present embodiment are essentially identical with a upper embodiment, therefore do not repeat.
As it is shown on figure 3, be the schematic flow sheet of another embodiment of the security setting method of terminal applies of the present invention, with The difference of first embodiment is, also includes step S301: determine that terminal is in before the biological information obtaining user Talking state or the state of use recording device.When determining that terminal is in talking state or uses recording state, triggering obtains Take step S101 of the biological information of user, it is possible to understand that, this step S101 is essentially identical with a upper embodiment, therefore Do not repeat.
Concrete, by judging whether terminal has the foundation of voice call, such as terminal to be sent out call request, and When receiving response, it is judged that terminal is in talking state;Or, when terminal receives call request and sends response, it is judged that eventually End is in talking state;Or, other application (as wechat, QQ or other instant messagings are applied) send call request, and are connecing When receiving response, it is judged that terminal is in talking state;Or, other application (as wechat, QQ or other instant messagings are applied) connect When receiving call request and send response, it is judged that terminal is in talking state.
Or, by judging whether are the recorder of terminal or other application (as wechat, QQ or other instant messagings are applied) Being in recording state, such as, terminal, by judging that the recording of recorder or other application identifies whether to be in enabled state, is sentenced Whether disconnected terminal uses the state of recording device.
Or, by judging the intensity of voice signal that the mike of terminal receives, determine whether voice Effectively input, such as, in terminal, storage has voice intensity threshold, and when the voice signal that mike receives, and analysis obtains language Tone signal intensity, and the voice signal intensity obtained is compared with the voice intensity threshold prestored, when the voice letter obtained When number intensity is more than the voice intensity threshold prestored, it is judged that whether terminal is in talking state or uses the shape of recording device State.
In the present embodiment, owing to have collected the acoustical signal of user, biological information can be sound characteristic letter Breath, corresponding presupposed information can be sound presets information.When determining that terminal is in talking state or uses recording device During state, gathered the sound characteristic information of user by sound acquisition modules such as the mikes of terminal, and with default sound Sound presupposed information carries out coupling contrast, it is thus achieved that matching result.
In the present embodiment, utilize user when call or recording, gather the sound characteristic information of user, thus simple Change the collection of biological information, and the person of being not used discovers, and further improves the safety of terminal, it is ensured that terminal institute The information security of the person of having.
Other steps of the present embodiment are essentially identical with a upper embodiment, therefore do not repeat.
As shown in Figure 4, it is the schematic block diagram of the first embodiment of the device of security set of the present invention, including acquiring unit 41, matching unit 42 and arrange unit 43 etc., utilizes the device of this security set terminal can be carried out security set, improves Interruption possessory Information Security.
Wherein, terminal includes but not limited to have the smart mobile phone of communication function, panel computer, notebook computer, palm The terminal such as computer, PAD.The operating system of electric terminal may include but be not limited to Android operating system, IOS operates system System, Symbian (Saipan) operating system, Black Berry (blackberry) operating system, Windows Phone operating system Etc..
This acquiring unit 41 is for obtaining the biological information of user.Biological information includes: fingerprint characteristic is believed One or more in breath, sound characteristic information, face characteristic information, iris feature information.Corresponding, terminal is provided with and adopts The fingerprint acquisition device of collection fingerprint feature information, the sound characteristic harvester of collection sound characteristic information, collection face characteristic The face characteristic harvester of information, the iris feature harvester of collection iris feature information, by corresponding harvester Obtain the biological information of correspondence;This acquiring unit 41 can gather corresponding life with the corresponding harvester of triggering terminal Thing characteristic information.
Concrete: when terminal triggering carries out collecting biological feature information, the harvester of triggering correspondence gathers corresponding Biological information.Such as, when biological information is fingerprint feature information, triggers fingerprint acquisition device, set as in terminal The fingerprint Identification sensor put, gathers the fingerprint characteristic that user is pressed against on the display screen of terminal or touch screen, obtains correspondence Fingerprint feature information.
When biological information is sound characteristic information, trigger sound characteristic harvester, such as the wheat arranged in terminal Gram wind, when user carries out the operation such as voice call, recording, obtains corresponding voice by sound characteristic harvester and believes Number, obtain the sound characteristic information of correspondence.
When biological information is face characteristic information, trigger face characteristic harvester, such as taking the photograph of arranging in terminal As head, by face characteristic harvester, user is shot, it is thus achieved that the face picture of user, and according to face picture Analyze the face characteristic information obtaining correspondence.
When biological information is iris feature information, trigger iris feature harvester, such as taking the photograph of arranging in terminal As head, by iris feature harvester, the eyes of user are shot, it is thus achieved that the eyes picture of user, and according to eye Eyeball picture analyzing obtains the iris feature information of correspondence.
It should be understood that the biological information obtained can be one or more of above-mentioned biological information.Enter one Step, above-mentioned biological information priority rating be can be carried out, the biological information of correspondence, example obtained according to priority As, fingerprint feature information, sound characteristic information, face characteristic information, iris feature information are set preferentially the most successively Level, after the biological information obtaining higher priority, it is not necessary to obtain the biological information that priority is low, such that it is able to joint About terminal resource, improves efficiency.
Whether this matching unit 42, for being mated with presupposed information by the biological information of user, is mated Matching result.Wherein, presupposed information includes the fingerprint presupposed information corresponding with described biological information, sound presets letter One or more in breath, face presupposed information, iris presupposed information.It should be understood that such presupposed information can be by eventually The harvester of end carries out collecting biological feature information to Terminal owner, as gathered fingerprint by the fingerprint acquisition device of terminal Presupposed information, by sound characteristic harvester gather sound presets information, by face characteristic harvester gather face pre- If information, gathering iris presupposed information etc. by iris feature harvester, obtain correspondence by corresponding harvester Biological information;Then, the biological information of Terminal owner that will collect, it is stored in the storage device of terminal, As presupposed information, use for subsequent match.
After getting the biological information of user, by by fingerprint feature information, sound characteristic information, face spy Reference breath, iris feature information respectively with fingerprint presupposed information, sound presets information, face presupposed information, iris presupposed information Mate, and obtain matching result.
Further, the device of this security set is also provided with priority match unit, can be by such biological characteristic Information carries out priority rating, after the biological information of higher priority carries out mating correctly, stops coupling, it is not necessary to obtain also The biological information that priority is low is mated, such that it is able to save terminal resource, improves efficiency.
The matching result obtained may include that when the biological information of collecting unit collection user fails to match During corresponding presupposed information, it is judged that existing user is that terminal haves no right the owner, the matching result of output negative;When the use gathered When the biometric information matches of person is to corresponding presupposed information, it is judged that existing user be terminal with access to person, output is correct The matching result of coupling.
Further, the device of this security set is also provided with user setup unit, for the difference according to terminal User arranges different presupposed informations, such that it is able to come with different pre-according to the biological information of user gathered If information is mated, and then different matching results can be obtained, application is carried out the security set of different stage (after Xiang State).Such as, the owner of terminal is arranged the presupposed information of the first priority, other legitimate users of terminal are arranged The presupposed information (can certainly arrange more priority layer) of two priority, by the biological information of acquisition successively with difference The presupposed information of level mates, after fitting through, and the corresponding level matching result that the match is successful of output, and then can root According to the different level matching results that the match is successful, application is carried out the security set of different stage.
This arranges unit 43 for according to matching result, application being carried out security set.Further, this arranges unit 43 May include that one or more emptied in module 431, encrypting module 432 or priority assignation module 433.
This empties module 431 for when matching result is no, emptying the logon data of application, can be by deleting terminal The user name of middle storage, login password etc. empty logon data.Such as, this empties module 431 and carries out the application in terminal Search, obtains logon data temporary in the login page of application or the logon data corresponding with application storage file, to this Logon data or logon data storage file are deleted, and empty logon data, it is ensured that the information security of Terminal owner.
The logon data of application, for when described matching result is no, is encrypted by this encrypting module 432.The most logical Cross and encryption key is set in the terminal, when judging matching result as negative, call this encryption key, the login user to application The information such as name, login password are encrypted, and after user must input the key of correspondence, could obtain the user name of correspondence, step on The information such as record password.Such as, the application in terminal is scanned for by this encrypting module 432, obtains in the login page of application temporary The logon data deposited or the logon data corresponding with application storage file, call the encryption key prestored, to this logon data Or logon data storage file is encrypted, after user must input the key of correspondence, the logon data of correspondence could be obtained, Ensure the information security of Terminal owner.
This priority assignation module 433, for when described matching result is no, arranges the default use authority of application.Example As, the application in terminal is analyzed by this priority assignation module 433, the conventional func of application, such as reading information, routine is led to Knowing, the function that could use after logging in, as concluded the business, pay, checking, accounts information etc. is classified;When matching result is no Time, the priority assignation of the conventional func of application is readable state, i.e. serviceable condition, and is logged in by needs by priority assignation module After the priority assignation of function that could use be constrained state, as concluded the business, pay, checking, the functions such as accounts information limit, Cannot user cannot be by open should be for obtaining.
When matching result is for correctly mating, the existing user of terminal judges be terminal with access to person, thus open terminal The use authority of application, user can normally use the various application of terminal.
Further, it is also possible to according to the different users of terminal, different presupposed informations is set, such that it is able to according to The biological information of the user gathered mates with different presupposed informations, and then can obtain different coupling knots Really, application is carried out the security set of different stage.
Such as, the owner of terminal arranging the security set of lowest level, when matching result is correct, i.e. user is During Terminal owner, all use authorities of open terminal applies, user can normally use the various application of terminal.
Other user to terminal arrange the security set of higher level, when matching result is other legitimate users Time, call the security set of this corresponding level, according to the open corresponding authority of this security set strategy, such as, pass through priority assignation It is readable state, i.e. serviceable condition that module arranges the priority assignation of the conventional func of application, and just can make after being logged in by needs The priority assignation of function be constrained state, as concluded the business, pay, checking, the functions such as accounts information limit, it is impossible to use Person cannot be by open should be for obtaining.
Terminal haves no right user arranges the security set of highest level, when matching result is for negative, does not the most close When the presupposed information of method user matches, call the security set of this highest level, utilize and empty module, encrypting module, power Limit arranges module etc., carries out emptying, encrypt or arrange authority etc. by the user data of application, protects, it is to avoid haves no right to make User obtains the log-on message of correspondence, improves the Information Security of Terminal owner.
As it is shown in figure 5, be the schematic block diagram of another embodiment of the device of security set of the present invention, with first embodiment The difference of the device of security set is, also includes unlocking judging unit 51, is used for judging that terminal is under screen lock state, if connect Receive unlocking signal;Wherein, unlocking signal include user by act on terminal touch screen input slip unlocking signal, Click on one or more in unlocking signal, unlocked by fingerprint signal;Corresponding, biological information includes fingerprint feature information; Acquiring unit 41 includes fingerprint identification module, for identifying that user acts on the fingerprint feature information on touch screen.
When terminal is under screen lock state, when user needs to use, it is necessary to be first unlocked operation, receive in terminal To the unlocking signal of user input, if user is by acting on the slip unlocking signal of touch screen input of terminal, click During one or more in unlocking signal, unlocked by fingerprint signal, determine and receive unlocking signal, thus trigger fingerprint identification module Obtain the biological information of user.
Concrete, in terminal, storage has the unlocking signal prestored.When the capacitive touch screen of touch screen, when user leads to When crossing the touch screen that touch operation acts on terminal, unlock judging unit 51 and touched by the capacitance variations of sensing touch screen Touch the movement locus of operation, then movement locus is contrasted with the unlocking signal prestored, determine whether that unlocking signal is defeated Enter.
When the resistive touch screen of touch screen, when user acts on the touch screen of terminal by touch operation, Unlock judging unit 51 and obtain the movement locus of touch operation by the change in resistance of sensing touch screen, then by movement locus with The unlocking signal prestored contrasts, and determines whether that unlocking signal inputs.
Or, in terminal, storage has the unlocked by fingerprint information prestored, and terminal is provided with fingerprint Identification sensor, works as use When person touches fingerprint Identification sensor with finger, gather the finger print information of finger of user, unlock judging unit 51 and with in advance The unlocked by fingerprint information deposited contrasts, and determines whether that unlocking signal inputs.
When the action that decision person acts on touch screen is unlocking motion, triggering terminal obtains the biological special of user Reference ceases.
In the present embodiment, unlocking signal is the operation acting on touch screen, and the biological information of user can be Fingerprint feature information, such that it is able to user operation touch screen when, utilize fingerprint identification module to gather user Fingerprint feature information, thus simplify the collection of biological information, and the person of being not used discovers, and further improves terminal Safety, it is ensured that the information security of Terminal owner.
Other unit of the present embodiment are essentially identical with a upper embodiment, therefore do not repeat.
As shown in Figure 6, it is the schematic block diagram of another embodiment of the device of security set of the present invention, with first embodiment The difference of the device of security set is, also includes sound judging unit 61, be used for judging terminal whether be in talking state or Under the state that person uses recording device;Wherein, biological information includes sound characteristic information;Acquiring unit 41 includes that sound obtains Delivery block, for obtaining the described sound characteristic information of user.
Concrete, judge whether terminal has the foundation of voice call by sound judging unit 61, such as terminal is to outgoing Send call request, and when receiving response, it is judged that terminal is in talking state;Or, it is concurrent that terminal receives call request When going out response, it is judged that terminal is in talking state;Or, other application (as wechat, QQ or other instant messagings are applied) send Call request, and when receiving response, it is judged that terminal is in talking state;Or, other application (as wechat, QQ or other Instant messaging is applied) when receiving call request and send response, it is judged that terminal is in talking state.
Or, by judging whether are the recorder of terminal or other application (as wechat, QQ or other instant messagings are applied) Being in recording state, such as, terminal, by judging that the recording of recorder or other application identifies whether to be in enabled state, is sentenced Whether disconnected terminal uses the state of recording device.
Or, by judging the intensity of voice signal that the mike of terminal receives, determine whether voice Effectively input, such as, in terminal, storage has voice intensity threshold, and when the voice signal that mike receives, and analysis obtains language Tone signal intensity, and the voice signal intensity obtained is compared with the voice intensity threshold prestored, when the voice letter obtained When number intensity is more than the voice intensity threshold prestored, it is judged that whether terminal is in talking state or uses the shape of recording device State.
In the present embodiment, owing to have collected the acoustical signal of user, biological information can be sound characteristic letter Breath, corresponding presupposed information can be sound presets information.
When determining that terminal is in talking state or uses the state of recording device, by sound such as the mikes of terminal Sound acquisition module gathers the sound characteristic information of user, and carries out mating contrast with default sound presets information, it is thus achieved that Matching result.
In the present embodiment, utilize user when call or recording, gather the sound characteristic information of user, thus simple Change the collection of biological information, and the person of being not used discovers, and further improves the safety of terminal, it is ensured that terminal institute The information security of the person of having.
Other steps of the present embodiment are essentially identical with a upper embodiment, therefore do not repeat.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit, module or submodule in embodiment of the present invention device can merge according to actual needs, divide and Delete.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can Completing with the hardware carrying out command terminal relevant by program, this program can be stored in a computer-readable recording medium, Storage medium may include that flash disk, read only memory (Read-Only Memory, ROM), random access device (Random Access Memory, RAM), disk or CD etc..
The above disclosed presently preferred embodiments of the present invention that is only, can not limit the right of the present invention with this certainly Scope, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment, and according to right of the present invention Require the equivalent variations made, still fall within the scope that invention is contained.

Claims (10)

1. the security setting method of a terminal applies, it is characterised in that comprise the following steps:
Obtain the biological information of user;
The biological information of described user is mated with presupposed information, the matching result whether mated;
According to described matching result, application is carried out security set.
The security setting method of terminal applies the most according to claim 1, it is characterised in that described biological information bag Include: one or more in fingerprint feature information, sound characteristic information, face characteristic information, iris feature information;
Described presupposed information includes that the fingerprint presupposed information corresponding with described biological information, sound presets information, face are pre- If one or more in information, iris presupposed information.
The security setting method of terminal applies the most according to claim 1, it is characterised in that described method is in described acquisition Before the step of the biological information of user, also include:
Under screen lock state, terminal determines and receives unlocking signal.
The security setting method of terminal applies the most according to claim 1, it is characterised in that described method is in described acquisition Before the step of the biological information of user, also include:
Determine that described terminal is in talking state or uses the state of recording device.
The security setting method of terminal applies the most according to claim 1, it is characterised in that according to described coupling knot Really, application is carried out in the step of security set, including: when described matching result is no, empty the login number of described application According to;Or
The logon data of described application is encrypted;Or
The default use authority of described application is set.
6. the device of a security set, it is characterised in that including:
Acquiring unit, for obtaining the biological information of user;
Matching unit, mates the biological information of described user with presupposed information, the coupling whether mated Result;
Unit is set, for according to described matching result, application is carried out security set.
The device of security set the most according to claim 6, it is characterised in that described biological information includes: fingerprint One or more in characteristic information, sound characteristic information, face characteristic information, iris feature information;
Described presupposed information includes that the fingerprint presupposed information corresponding with described biological information, sound presets information, face are pre- If one or more in information, iris presupposed information;
Described matching unit is by described fingerprint feature information, sound characteristic information, face characteristic information, iris feature information respectively Mate with described fingerprint presupposed information, sound presets information, face presupposed information, iris presupposed information.
The device of security set the most according to claim 6, it is characterised in that the device of described security set also includes solving Lock judging unit, is used for judging that terminal is under screen lock state, if receive unlocking signal;Wherein, described unlocking signal includes User is by acting on the slip unlocking signal of the touch screen input of described terminal, clicking on unlocking signal, unlocked by fingerprint signal In one or more;
Corresponding, described biological information includes fingerprint feature information;
Described acquiring unit includes fingerprint identification module, for identifying that described user acts on the described finger on described touch screen Stricture of vagina characteristic information.
The device of security set the most according to claim 6, it is characterised in that the device of security set also includes that sound is sentenced Disconnected unit, for judging under the state whether terminal is in talking state or use recording device;
Wherein, described biological information includes sound characteristic information;
Described acquiring unit includes sound acquisition module, for obtaining the described sound characteristic information of user.
The device of security set the most according to claim 6, it is characterised in that the described unit that arranges includes:
Empty module, for when described matching result is no, empty the logon data of application;Or
Encrypting module, for when described matching result is no, is encrypted the logon data of application;Or
Priority assignation module, when described matching result is no, arranges the default use authority of application.
CN201610518291.2A 2016-07-04 2016-07-04 The security setting method of terminal applies and the device of security set Pending CN106127010A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610518291.2A CN106127010A (en) 2016-07-04 2016-07-04 The security setting method of terminal applies and the device of security set

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610518291.2A CN106127010A (en) 2016-07-04 2016-07-04 The security setting method of terminal applies and the device of security set

Publications (1)

Publication Number Publication Date
CN106127010A true CN106127010A (en) 2016-11-16

Family

ID=57469087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610518291.2A Pending CN106127010A (en) 2016-07-04 2016-07-04 The security setting method of terminal applies and the device of security set

Country Status (1)

Country Link
CN (1) CN106127010A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790361A (en) * 2016-11-17 2017-05-31 广东欧珀移动通信有限公司 A kind of data processing method and device
CN106845191A (en) * 2016-12-28 2017-06-13 北京怡和嘉业医疗科技股份有限公司 For the authorization method and device of therapy apparatus
CN106951800A (en) * 2017-03-23 2017-07-14 亳州学院 The method and mobile terminal of a kind of application program encryption
CN107483730A (en) * 2017-08-14 2017-12-15 广东欧珀移动通信有限公司 Unlocking screen method, apparatus, terminal and computer-readable recording medium
CN108197447A (en) * 2017-12-12 2018-06-22 广东小天才科技有限公司 Application program right management method, device, terminal and the medium of mobile terminal
CN108628396A (en) * 2017-03-23 2018-10-09 上海和辉光电有限公司 A kind of mobile terminal of side fingerprint recognition
WO2018205271A1 (en) * 2017-05-12 2018-11-15 深圳市乃斯网络科技有限公司 Smart terminal biometric identification method and system
WO2019071424A1 (en) * 2017-10-10 2019-04-18 深圳传音通讯有限公司 Application function control method and terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077341A (en) * 2013-01-30 2013-05-01 广东欧珀移动通信有限公司 Application program unlocking method and device
CN103366107A (en) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 Method, device and mobile phone for protecting access permission of application program
CN103886239A (en) * 2014-03-31 2014-06-25 深圳市欧珀通信软件有限公司 User authentication method and device of mobile terminal application program
CN103942481A (en) * 2014-05-04 2014-07-23 上海鼎为电子科技(集团)有限公司 Application access method and mobile terminal
CN104239107A (en) * 2014-09-23 2014-12-24 三星电子(中国)研发中心 Application customizing method and application customizing device
CN104954552A (en) * 2015-04-24 2015-09-30 努比亚技术有限公司 Information processing method and device, and terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077341A (en) * 2013-01-30 2013-05-01 广东欧珀移动通信有限公司 Application program unlocking method and device
CN103366107A (en) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 Method, device and mobile phone for protecting access permission of application program
CN103886239A (en) * 2014-03-31 2014-06-25 深圳市欧珀通信软件有限公司 User authentication method and device of mobile terminal application program
CN103942481A (en) * 2014-05-04 2014-07-23 上海鼎为电子科技(集团)有限公司 Application access method and mobile terminal
CN104239107A (en) * 2014-09-23 2014-12-24 三星电子(中国)研发中心 Application customizing method and application customizing device
CN104954552A (en) * 2015-04-24 2015-09-30 努比亚技术有限公司 Information processing method and device, and terminal

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790361A (en) * 2016-11-17 2017-05-31 广东欧珀移动通信有限公司 A kind of data processing method and device
CN106790361B (en) * 2016-11-17 2020-02-11 Oppo广东移动通信有限公司 Data processing method and device
CN106845191A (en) * 2016-12-28 2017-06-13 北京怡和嘉业医疗科技股份有限公司 For the authorization method and device of therapy apparatus
CN106951800A (en) * 2017-03-23 2017-07-14 亳州学院 The method and mobile terminal of a kind of application program encryption
CN108628396A (en) * 2017-03-23 2018-10-09 上海和辉光电有限公司 A kind of mobile terminal of side fingerprint recognition
WO2018205271A1 (en) * 2017-05-12 2018-11-15 深圳市乃斯网络科技有限公司 Smart terminal biometric identification method and system
CN107483730A (en) * 2017-08-14 2017-12-15 广东欧珀移动通信有限公司 Unlocking screen method, apparatus, terminal and computer-readable recording medium
WO2019071424A1 (en) * 2017-10-10 2019-04-18 深圳传音通讯有限公司 Application function control method and terminal
CN108197447A (en) * 2017-12-12 2018-06-22 广东小天才科技有限公司 Application program right management method, device, terminal and the medium of mobile terminal

Similar Documents

Publication Publication Date Title
CN106127010A (en) The security setting method of terminal applies and the device of security set
JP5039103B2 (en) A method of biometric-based authentication in wireless communication for access control
CN106296199A (en) Payment based on living things feature recognition and identity authorization system
CN104899490A (en) Terminal positioning method and user terminal
CN104579670A (en) Mobile terminal authentication method and mobile terminal
CN1951326A (en) Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN102110195A (en) Computer system and identification method and device for user
CN100483995C (en) Method for filling-in user data automatically using fingerprint identification
CN203276380U (en) Distributed door access authentication system based on palm veins
CN103186769A (en) Method and system for fingerprint verification, and fingerprint collector
CN106485125A (en) A kind of fingerprint identification method and device
CN103177238A (en) Terminal and user identifying method
Alotaibi et al. Transparent authentication systems for mobile device security: A review
CN107038509A (en) Self-service registration-management system
JP2023549934A (en) Method and apparatus for user recognition
KR102188775B1 (en) Method and system for remotely controlling client terminals using face recognition and face recognition terminal
CN105550628A (en) Fingerprint inputting and recording method and apparatus
CN106211070A (en) The anti-theft protection method of a kind of mobile terminal and mobile terminal
CN106469269B (en) A kind of method, apparatus and terminal of Password Management
CN106611110A (en) Identity verification method and system
CN110546638A (en) Improvements in biometric authentication
CN116389005B (en) Electronic signing method and signing system based on distributed multi-storage nodes
CN105303092B (en) A kind of identity identifying method and device
CN107742073A (en) Information displaying method, device, computer installation and computer-readable recording medium
CN107294981A (en) A kind of method and apparatus of certification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161116