CN106127067A - A kind of method of fileinfo anti-leak and mobile terminal - Google Patents
A kind of method of fileinfo anti-leak and mobile terminal Download PDFInfo
- Publication number
- CN106127067A CN106127067A CN201610430051.7A CN201610430051A CN106127067A CN 106127067 A CN106127067 A CN 106127067A CN 201610430051 A CN201610430051 A CN 201610430051A CN 106127067 A CN106127067 A CN 106127067A
- Authority
- CN
- China
- Prior art keywords
- file
- zone bit
- user
- bit information
- described file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention belongs to communication technical field, it is provided that a kind of method of fileinfo anti-leak and mobile terminal, described method includes: when user operation file being detected, detects the zone bit information of described file;When the zone bit information of described file meets pre-conditioned, described user is pointed out to input finger print information;When the described finger print information detecting that described user inputs matches with the finger print information prestored, perform the described user operation to described file.Can effectively prevent fileinfo to be compromised by the present invention, improve the safety of fileinfo.
Description
Technical field
The present invention relates to communication technical field, particularly relate to method and the mobile terminal of a kind of fileinfo anti-leak.
Background technology
Along with the high speed development of mobile communication, mobile terminal such as mobile phone is seen everywhere in people live, and mobile phone is usual
Integrate call, note, multimedia, the several functions such as take pictures, bring great convenience for people.Along with mobile terminal
The increase of function, the internal storage space of mobile terminal is also constantly expanding, and increasing user hankers after using movement eventually
End storage fileinfo, the data such as such as address list, note, photo, word are audio-visual so that mobile terminal stores considerable
Individual's important information.Therefore, how to prevent from these important informations to be not leaked to be particularly important.
At present, in existing fileinfo encipherment scheme, mobile terminal is right by input password such as numeral, phonetic etc.
Fileinfo is encrypted, but, this cipher mode is easy to be decoded by illegal personage steal, thus causes information leakage.
Summary of the invention
The embodiment of the present invention provides method and the mobile terminal of a kind of fileinfo anti-leak, to prevent fileinfo from being let out
Leakage, improves the safety of fileinfo.
First aspect, a kind of method embodiments providing fileinfo anti-leak, described method includes:
When user operation file being detected, detect the zone bit information of described file;
When the zone bit information of described file meets pre-conditioned, described user is pointed out to input finger print information;
When the described finger print information detecting that described user inputs matches with the finger print information prestored, perform institute
State user's operation to described file.
Second aspect, embodiments provides a kind of mobile terminal, and described mobile terminal includes:
Detector unit, for when user operation file being detected, detects the zone bit information of described file;
Tip element, for when the zone bit information of described file meets pre-conditioned, points out described user input to refer to
Stricture of vagina information;
Performance element, for when the described finger print information that described user inputs and the finger print information phase prestored being detected
During coupling, perform the described user operation to described file.
The embodiment of the present invention, when user operation file being detected, first detects the zone bit information of file, literary composition detected
When the zone bit information of part meets pre-conditioned, it is desirable to user inputs finger print information, and detect the finger print information of user's input with
Whether the finger print information prestored matches, and when matching, just performs user's operation to file.The embodiment of the present invention is led to
Cross zone bit information and finger print information and file operation carried out priority assignation, thus can effectively prevent fileinfo to be compromised,
Improve the safety of fileinfo.
Accompanying drawing explanation
In order to be illustrated more clearly that embodiment of the present invention technical scheme, required use in embodiment being described below
Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is some embodiments of the present invention, general for this area
From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow diagram of a kind of fileinfo leakage prevention method that first embodiment of the invention provides;
Fig. 2 is the schematic block diagram of a kind of mobile terminal that second embodiment of the invention provides;
Fig. 3 is the schematic block diagram of a kind of mobile terminal that third embodiment of the invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this
Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise
Example, broadly falls into the scope of protection of the invention.
Should be appreciated that when using in this specification and in the appended claims, term " includes " that instruction is described special
Levy, entirety, step, operation, element and/or the existence of assembly, but be not precluded from one or more further feature, entirety, step,
Operation, element, assembly and/or the existence of its set or interpolation.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Hereafter clearly indicating other situation, otherwise " ", " " and " being somebody's turn to do " of singulative is intended to include plural form.
In implementing, the mobile terminal described in the embodiment of the present invention includes but not limited to such as have the sensitive table of touch
Other of mobile phone, laptop computer or the tablet PC in face (such as, touch-screen display and/or touch pad) etc
Portable set.It is to be further understood that in certain embodiments, described equipment not portable communication device, but have
The desk computer of touch sensitive surface (such as, touch-screen display and/or touch pad).
In discussion below, describe the mobile terminal including display and touch sensitive surface.But, it should reason
Solving, mobile terminal can include that other physical User one or more of such as physical keyboard, mouse and/or control bar connect
Jaws equipment.
Mobile terminal supports various application programs, such as following in one or more: drawing application program, demonstration application
Program, word-processing application, website establishment application program, dish imprinting application program, spreadsheet applications, game are answered
With program, telephony application, videoconference application, email application, instant messaging applications, forging
Refining supports that application program, photo management application program, digital camera application program, digital camera application program, web-browsing should
With program, digital music player application and/or video frequency player application program.
The various application programs that can perform on mobile terminals can use at least one of such as touch sensitive surface
Public physical user-interface device.Among applications and/or can adjust in corresponding application programs and/or change touches quick
The corresponding information of display in one or more functions on sense surface and mobile terminal.So, the public physical structure (example of terminal
Such as, touch sensitive surface) the various application programs with the most directly perceived and transparent user interface can be supported.
See Fig. 1, be the schematic flow diagram of a kind of fileinfo leakage prevention method that first embodiment of the invention provides, as
The method shown in figure may comprise steps of:
In step S101, when user operation file being detected, detect the zone bit information of described file.
In embodiments of the present invention, described operation include but not limited to open, copy, delete, shearing etc..
In embodiments of the present invention, user can send operation file by the interactive interface of mobile terminal to mobile terminal
Instruction, mobile terminal, after receiving this instruction, detects the zone bit information of described file.Wherein, the mark of described file
Position information is used for indicating whether that described file has carried out secrecy to be arranged, i.e. the need of carrying out Authority Verification.It is also preferred that the left it is described
Zone bit information can be fingerprint zone bit information.
It should be noted that before detecting the zone bit information of described file, embodiments providing two kinds can
Select mode:
Mode one, arranges zone bit information to All Files;
Mode two, the file selecting user arranges zone bit information.
When using mode one, when user operation file being detected, directly detect the zone bit information of described file, the most directly
Connect the position acquisition zone bit information from storage mark position information, then detect the described zone bit information of acquisition.
When using mode two, when user operation file being detected, first detect whether described file exists zone bit information,
Whether the zone bit information detecting described file the most again meets pre-conditioned, the most first detects whether to there is storage mark position letter
The position of breath, the most again from the position acquisition zone bit information of storage mark position information, the described flag bit letter that detection obtains
Breath.
Wherein, the zone bit information of described file freely can be arranged by user.For example, it is possible to the flag bit of file is believed
Breath is set to 1 or 0, TRUE or FLASE, if the zone bit information of file is 1 or TRUE, then it represents that file has carried out secrecy and has set
Putting, user, when operating this document, needs first to carry out Authority Verification, if the zone bit information of file is 0 or FLASE,
Then representing that file does not carries out secrecy to be arranged, mobile terminal is after the order receiving operation file, it is not necessary to user carries out authority
Checking, mobile terminal just can directly perform user's operation to file.
In embodiments of the present invention, before detecting the zone bit information of described file, user can be the most true
Determine whether zone bit information is set, if arranging zone bit information, it is determined whether carry out secrecy and arrange, i.e. carry out the need of user
Authority Verification.Such as, for insignificant property file, user can be not provided with zone bit information or zone bit information is set to 0,
User has the authority operating these files, it is not necessary to carrying out Authority Verification, for importance file, flag bit can be believed by user
Breath is set to 1, before performing associative operation, needs user first to carry out Authority Verification.
In step s 102, when the zone bit information of described file meets pre-conditioned, described user input is pointed out to refer to
Stricture of vagina information.
In embodiments of the present invention, when the zone bit information of described file meets, pre-conditioned (such as zone bit information is 1
Or TRUE) time, the mobile terminal described user of prompting inputs finger print information, and prompting mode includes but not limited to pop-up or voice side
Formula, mobile terminal can gather the finger print information of user by fingerprint sensor.
Further, the embodiment of the present invention can also include:
When the zone bit information of described file do not meet pre-conditioned or described file there is not zone bit information time, hold
The row described user operation to described file.
In embodiments of the present invention, do not deposit when the zone bit information of described file does not meets pre-conditioned or described file
When zone bit information, it is not necessary to user carries out Authority Verification, mobile terminal just can directly perform described user to described file
Operation.
In step s 103, when the described finger print information that described user inputs and the finger print information phase prestored being detected
During coupling, perform the described user operation to described file.
In embodiments of the present invention, mobile terminal can prestore the finger print information of one or more user.
In embodiments of the present invention, described finger print information that described user inputs detected when mobile terminal and prestore
Finger print information when matching, perform the described user operation to described file, and point out user to have to operate described file
Authority, authorizes successfully, and prompting mode includes but not limited to pop-up or voice mode.
Further, the embodiment of the present invention can also include:
When the described finger print information detecting that user inputs does not matches that with the finger print information prestored, refusal performs
The described user operation to described file, and point out described user not have the authority operating described file.
In embodiments of the present invention, the user described finger print information inputted and the finger prestored are detected when mobile terminal
When stricture of vagina information does not matches that, refusal performs the described user operation to described file, and points out described user not have operation institute
Stating the authority of file, authorization failure, prompting mode includes but not limited to the mode of pop-up or voice.
The embodiment of the present invention, when user operation file being detected, first detects the zone bit information of file, literary composition detected
When the zone bit information of part meets pre-conditioned, it is desirable to user inputs finger print information, and detect the finger print information of user's input with
Whether the finger print information prestored matches, and when matching, just performs user's operation to file.The embodiment of the present invention is led to
Cross zone bit information and finger print information and file operation carried out priority assignation, thus can effectively prevent fileinfo to be compromised,
Improve the safety of fileinfo.
Seeing Fig. 2, be the schematic block diagram of a kind of mobile terminal that second embodiment of the invention provides, this moves as shown in the figure
Terminal may include that detector unit 21, Tip element 22 and performance element 23.
Detector unit 21, for when user operation file being detected, detects the zone bit information of described file;
Tip element 22, for when the zone bit information of described file meets pre-conditioned, points out described user to input
Finger print information;
Performance element 23, for when described the user described finger print information inputted and the finger print information prestored being detected
When matching, perform the described user operation to described file.
Further, described performance element 22 is additionally operable to:
When the zone bit information of described file do not meet pre-conditioned or described file there is not zone bit information time, hold
The row described user operation to described file.
Further, described performance element 23 is additionally operable to:
When the described finger print information detecting that user inputs does not matches that with the finger print information prestored, refusal performs
The described user operation to described file, and point out described user not have the authority operating described file.
Further, described mobile terminal also includes:
Arranging unit 24, for before detecting the zone bit information of described file, the file selecting user arranges mark
Will position information.
Further, described detector unit 21 specifically for:
Detecting whether described file exists zone bit information, whether the zone bit information detecting described file the most again accords with
Close pre-conditioned.
The mobile terminal that the embodiment of the present invention provides can use in the embodiment of the method one of aforementioned correspondence, and details see
The description of above-described embodiment one, does not repeats them here.
The embodiment of the present invention, when user operation file being detected, first detects the zone bit information of file, literary composition detected
When the zone bit information of part meets pre-conditioned, it is desirable to user inputs finger print information, and detect the finger print information of user's input with
Whether the finger print information prestored matches, and when matching, just performs user's operation to file.The embodiment of the present invention is led to
Cross zone bit information and finger print information and file operation carried out priority assignation, thus can effectively prevent fileinfo to be compromised,
Improve the safety of fileinfo.
See Fig. 3, be the schematic block diagram of a kind of mobile terminal that the embodiment of the present invention three provides.As depicted this moves
Terminal may include that one or more processor 301 (only illustrating in figure), and one or more input equipments 302 are (in figure only
Illustrate one), one or more outut device 303 (in figure, only illustrating one) and memorizeies 304.Above-mentioned processor 301, input
Equipment 302, outut device 303 and memorizer 304 are connected by bus 305.Wherein:
Described processor 301, when user operation file being detected by described input equipment 302, detects described file
Zone bit information, when the zone bit information of described file meets pre-conditioned, point out described user to input finger print information, when
Detect what described user was prestored by the described finger print information of described input equipment 302 input and described memorizer 304
When finger print information matches, perform the described user operation to described file.
Further,
Described processor 301, is additionally operable to when the zone bit information of described file does not meets pre-conditioned or described file
When there is not zone bit information, perform the described user operation to described file.
Further,
Described processor 301, is additionally operable to when detecting that user passes through the described finger print information of described input equipment 302 input
When the finger print information prestored with described memorizer 304 does not matches that, refusal performs the described user operation to described file,
And point out described user not have the authority operating described file by outut device 303.
Further,
Described processor 302, is additionally operable to before detecting the zone bit information of described file, and the file selecting user sets
Put zone bit information.
Further,
Described processor 302, specifically for detecting whether described file exists zone bit information, detection is described the most again
It is pre-conditioned whether the zone bit information of file meets.
Described outut device 303, for user feedback execution result information.
Described memorizer 304, is additionally operable to store software program and unit, and described processor 301 is stored in by operation
The software program of described memorizer 304 and unit, thus hold the application of various functions and the data process of mobile terminal.
Should be appreciated that in embodiments of the present invention, alleged processor 301 can be CPU (Central
Processing Unit, CPU), this processor can also is that other general processors, digital signal processor (Digital
Signal Processor, DSP), special IC (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
Reason device can also be the processor etc. of any routine.
Input equipment 302 can include that Trackpad, fingerprint adopt sensor (for gathering the finger print information of user and fingerprint
Directional information), mike etc., outut device 303 can include display (LCD etc.), speaker etc..
This memorizer 304 can include read only memory and random access memory, and to processor 301 provide instruction and
Data.A part for memorizer 304 can also include nonvolatile RAM.Such as, memorizer 304 can also be deposited
The information of storage device type.
In implementing, processor 301, input equipment 302 described in the embodiment of the present invention, outut device 303 can
Implementation described in the first embodiment of the method performing the fileinfo anti-leak that the embodiment of the present invention provides, it is possible to
The implementation of execution mobile terminal described by the embodiment of the present invention, does not repeats them here.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example that the embodiments described herein describes
Unit and algorithm steps, it is possible to electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware
With the interchangeability of software, the most generally describe composition and the step of each example according to function.This
A little functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Specially
Industry technical staff can use different methods to realize described function to each specifically should being used for, but this realization is not
It is considered as beyond the scope of this invention.
Those skilled in the art is it can be understood that arrive, for convenience of description and succinctly, and the shifting of foregoing description
Dynamic terminal and the specific works process of unit, be referred to the corresponding process in preceding method embodiment, do not repeat them here.
In several embodiments provided herein, it should be understood that disclosed mobile terminal and method, Ke Yitong
The mode crossing other realizes.Such as, mobile terminal embodiment described above is only schematically, such as, and described unit
Division, be only a kind of logic function and divide, actual can have other dividing mode when realizing, such as can be by multiple lists
Unit or assembly combine or integrated, or some features can be ignored, or do not perform.It addition, shown or discussed each other
Coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication connection,
Can also be electric, machinery or other form connect.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit
The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme
Purpose.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to be that two or more unit are integrated in a unit.Above-mentioned integrated
Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit realizes and as independent production marketing or use using the form of SFU software functional unit
Time, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part in other words prior art contributed, or this technical scheme completely or partially can be with the form of software product
Embodying, this computer software product is stored in a storage medium, including some instructions with so that a computer
Equipment (can be personal computer, server, or the network equipment etc.) performs the complete of method described in each embodiment of the present invention
Portion or part steps.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, and any
Those familiar with the art, in the technical scope that the invention discloses, can readily occur in the amendment of various equivalence or replace
Changing, these amendments or replacement all should be contained within protection scope of the present invention.Therefore, protection scope of the present invention should be with right
The protection domain required is as the criterion.
Claims (10)
1. the method for a fileinfo anti-leak, it is characterised in that described method includes:
When user operation file being detected, detect the zone bit information of described file;
When the zone bit information of described file meets pre-conditioned, described user is pointed out to input finger print information;
When the described finger print information detecting that described user inputs matches with the finger print information prestored, perform described use
The family operation to described file.
Method the most according to claim 1, it is characterised in that described method also includes:
When the zone bit information of described file do not meet pre-conditioned or described file there is not zone bit information time, perform institute
State user's operation to described file.
Method the most according to claim 1, it is characterised in that described method also includes:
When the described finger print information detecting that user inputs does not matches that with the finger print information prestored, refusal performs described
User's operation to described file, and point out described user not have the authority operating described file.
Method the most according to claim 1, it is characterised in that before detecting the zone bit information of described file, also wrap
Include:
The file selecting user arranges zone bit information.
5. according to the method described in any one of Claims 1-4, it is characterised in that the flag bit letter of the described file of described detection
Breath includes:
Detecting whether described file exists zone bit information, whether the zone bit information detecting described file the most again meets pre-
If condition.
6. a mobile terminal, it is characterised in that described mobile terminal includes:
Detector unit, for when user operation file being detected, detects the zone bit information of described file;
Tip element, for when the zone bit information of described file meets pre-conditioned, points out described user to input fingerprint letter
Breath;
Performance element, for when detecting that the described finger print information that described user inputs matches with the finger print information prestored
Time, perform the described user operation to described file.
Mobile terminal the most according to claim 6, it is characterised in that described performance element is additionally operable to:
When the zone bit information of described file do not meet pre-conditioned or described file there is not zone bit information time, perform institute
State user's operation to described file.
Mobile terminal the most according to claim 6, it is characterised in that described performance element is additionally operable to:
When the described finger print information detecting that user inputs does not matches that with the finger print information prestored, refusal performs described
User's operation to described file, and point out described user not have the authority operating described file.
Mobile terminal the most according to claim 6, it is characterised in that described mobile terminal also includes:
Arranging unit, for before detecting the zone bit information of described file, the file selecting user arranges flag bit letter
Breath.
10. according to the mobile terminal described in any one of claim 6 to 9, it is characterised in that described detector unit specifically for:
Detecting whether described file exists zone bit information, whether the zone bit information detecting described file the most again meets pre-
If condition.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610430051.7A CN106127067A (en) | 2016-06-15 | 2016-06-15 | A kind of method of fileinfo anti-leak and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610430051.7A CN106127067A (en) | 2016-06-15 | 2016-06-15 | A kind of method of fileinfo anti-leak and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106127067A true CN106127067A (en) | 2016-11-16 |
Family
ID=57469758
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610430051.7A Pending CN106127067A (en) | 2016-06-15 | 2016-06-15 | A kind of method of fileinfo anti-leak and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106127067A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106682524A (en) * | 2016-11-23 | 2017-05-17 | 张伟彬 | Data privacy protection method of mobile terminal |
CN107133603A (en) * | 2017-05-24 | 2017-09-05 | 努比亚技术有限公司 | Method, mobile terminal and the computer-readable recording medium for preventing fingerprint from leaking |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7171561B2 (en) * | 2002-10-17 | 2007-01-30 | The United States Of America As Represented By The Secretary Of The Air Force | Method and apparatus for detecting and extracting fileprints |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
US20140081857A1 (en) * | 2004-07-01 | 2014-03-20 | American Express Travel Related Services Company, Inc. | System and method of a smartcard transaction with biometric scan recognition |
CN104361272A (en) * | 2014-10-11 | 2015-02-18 | 深圳市汇顶科技股份有限公司 | Fingerprint input information processing method and system and mobile terminal |
CN105574374A (en) * | 2014-10-10 | 2016-05-11 | 富泰华工业(深圳)有限公司 | System and method for protecting special information |
-
2016
- 2016-06-15 CN CN201610430051.7A patent/CN106127067A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7171561B2 (en) * | 2002-10-17 | 2007-01-30 | The United States Of America As Represented By The Secretary Of The Air Force | Method and apparatus for detecting and extracting fileprints |
US20140081857A1 (en) * | 2004-07-01 | 2014-03-20 | American Express Travel Related Services Company, Inc. | System and method of a smartcard transaction with biometric scan recognition |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
CN105574374A (en) * | 2014-10-10 | 2016-05-11 | 富泰华工业(深圳)有限公司 | System and method for protecting special information |
CN104361272A (en) * | 2014-10-11 | 2015-02-18 | 深圳市汇顶科技股份有限公司 | Fingerprint input information processing method and system and mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106682524A (en) * | 2016-11-23 | 2017-05-17 | 张伟彬 | Data privacy protection method of mobile terminal |
CN107133603A (en) * | 2017-05-24 | 2017-09-05 | 努比亚技术有限公司 | Method, mobile terminal and the computer-readable recording medium for preventing fingerprint from leaking |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11316805B2 (en) | Method for transmitting message and electronic device thereof | |
CN103577042B (en) | Method for providing message function and its electronic device | |
CN110059273B (en) | Method for displaying rich media on mobile terminal and mobile terminal | |
CN106663244A (en) | Rich notifications | |
CN106663243A (en) | Adaptive notifications on a screen | |
CN107728876A (en) | A kind of method of split screen display available, terminal and computer-readable recording medium | |
CN108400868B (en) | Seed key storage method and device and mobile terminal | |
EP2856299A1 (en) | Method and apparatus for transitioning between pages on a display screen | |
CN106355059A (en) | Password input method and terminal | |
US10055120B2 (en) | Managing content displayed on a touch screen enabled device using gestures | |
CN107358114A (en) | A kind of method and terminal for preventing user data loss | |
CN107169343A (en) | A kind of method and terminal of control application program | |
CN106412282A (en) | Real-time message voice prompting method and mobile terminal | |
CN106681587A (en) | Application icon corner marker processing method and terminal | |
CN107704613A (en) | A kind of approaches to IM, terminal and computer-readable recording medium | |
CN107765969A (en) | A kind of method, terminal and computer-readable recording medium for opening application program | |
CN106155554A (en) | A kind of multi-screen display method and terminal | |
CN106127067A (en) | A kind of method of fileinfo anti-leak and mobile terminal | |
CN106254677A (en) | A kind of scene mode setting method and terminal | |
CN106445699A (en) | Method and terminal for integrating social contact application program | |
CN106446683A (en) | Detection method for malignant program and terminal | |
CN106156646B (en) | Information calling method and electronic equipment | |
CN106131805A (en) | The method of a kind of information transmission and terminal | |
CN107301236A (en) | Application searches method, mobile terminal, server and computer-readable recording medium | |
CN106547539A (en) | A kind of footmark display packing and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161116 |
|
RJ01 | Rejection of invention patent application after publication |