CN106507334A - A kind of identity identifying method and mobile terminal - Google Patents

A kind of identity identifying method and mobile terminal Download PDF

Info

Publication number
CN106507334A
CN106507334A CN201611265721.0A CN201611265721A CN106507334A CN 106507334 A CN106507334 A CN 106507334A CN 201611265721 A CN201611265721 A CN 201611265721A CN 106507334 A CN106507334 A CN 106507334A
Authority
CN
China
Prior art keywords
mobile terminal
identity information
information
sim
user identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611265721.0A
Other languages
Chinese (zh)
Inventor
智晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201611265721.0A priority Critical patent/CN106507334A/en
Publication of CN106507334A publication Critical patent/CN106507334A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Abstract

Embodiments provide a kind of identity identifying method and mobile terminal.The method includes:According to the information of the SIM in the mobile terminal, first user identity information is obtained;Judge whether the first user identity information is mated with the second user identity information preserved in the mobile terminal;If it does, then allowing current holder to use the mobile terminal;Otherwise, current holder is prevented or restricted from using the mobile terminal.The present invention by preserving in advance authentication information in the terminal, and to mobile terminal in the holder of SIM carry out authentication, only certification is by could normally using mobile terminal.As such, it is possible to the identity information by mobile terminal with user carries out real name binding, even if mobile terminal is lost, stealer changes SIM, and the SIM after replacing also will be unable to obtain authentication, so as to use mobile terminal, it is ensured that the safety of user profile.

Description

A kind of identity identifying method and mobile terminal
Technical field
The present invention relates to communication technical field, more particularly to a kind of identity authentication method and mobile terminal.
Background technology
With gradually attention of the public to personal information security and importance, system of real name authentication is stepped into To in daily life, the system of real name certification of the telephone number of such as mobile terminal.But, at present, mobile terminal (such as mobile phone) Used as the important carrier of communication, which does not also bring the process of system of real name into, and does not have due to mobile terminals such as mobile phones Carry out authentication, then will be unable to the safety for ensureing user profile.
As can be seen here, for the problem of the authentication of mobile terminal, effective solution is not yet proposed at present.
Content of the invention
The embodiment of the present invention provides a kind of identity identifying method and mobile terminal, to realize recognizing the identity of mobile terminal Card, it is ensured that the safety of user profile.
In a first aspect, embodiments providing a kind of identity identifying method, mobile terminal, methods described bag is applied to Include:
According to the information of the SIM in the mobile terminal, first user identity information is obtained;
Judge the first user identity information whether with the second user identity information that preserves in the mobile terminal Match somebody with somebody;
If it does, then allowing current holder to use the mobile terminal;Otherwise, being prevented or restricted from current holder makes Use the mobile terminal.
Second aspect, the embodiment of the present invention additionally provide a kind of mobile terminal, and the mobile terminal includes:
First acquisition module, for the information according to the SIM in the mobile terminal, obtains first user identity letter Breath;
Judge module, for judging whether the first user identity information is used with second of preservation in the mobile terminal Family identity information coupling;
First determining module, for when the first user identity information is mated with the second user identity information, Current holder is allowed to use the mobile terminal;
Second determining module, for mismatching with the second user identity information in the first user identity information When, current holder is prevented or restricted from using the mobile terminal.
So, the embodiment of the present invention is by preserving in advance authentication information in the terminal, and to mobile terminal in The holder of SIM carry out authentication, only certification is by could normally using mobile terminal.As such, it is possible to will be mobile Terminal carries out real name binding with the identity information of user, even if mobile terminal is lost, stealer changes SIM, the SIM after replacing Card also will be unable to obtain authentication, so as to use mobile terminal, it is ensured that the safety of user profile.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by institute in the description to the embodiment of the present invention The accompanying drawing for using is needed to be briefly described, it should be apparent that, drawings in the following description are only some enforcements of the present invention Example, for those of ordinary skill in the art, without having to pay creative labor, can be with according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is the flow chart of the identity identifying method of first embodiment of the invention;
Fig. 2 is the flow chart of the identity identifying method of second embodiment of the invention;
Fig. 3 is the flow chart of the identity identifying method of third embodiment of the invention;
Fig. 4 is the block diagram of the mobile terminal of fourth embodiment of the invention;
Fig. 5 is the block diagram of the mobile terminal of fifth embodiment of the invention;
Fig. 6 is the block diagram of the mobile terminal of sixth embodiment of the invention;
Fig. 7 is the structural representation of the mobile terminal of seventh embodiment of the invention.
Specific embodiment
Accompanying drawing in below in conjunction with the embodiment of the present invention, to the embodiment of the present invention in technical scheme carry out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.It is based on this Embodiment in bright, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art Example, belongs to the scope of protection of the invention.
First embodiment
With reference to Fig. 1, the flow chart for showing the identity identifying method of one embodiment of the invention.
Before the process step of identity identifying method of the embodiment of the present invention is introduced, introduced on mobile terminal first The SIM (Subscriber Identification Module, client identification module) of installation, wherein, in the electricity of the SIM The contents such as the telephone directory of the information of digital mobile phone client, the key of encryption and user are stored on brain chip, are available for GSM Network client identity is differentiated, and voice messaging when conversing to client is encrypted.
By means of the SIM that installs on mobile terminal, the method for the embodiment of the present invention specifically may include steps of:
Step 101, according to the information of the SIM in the mobile terminal, obtains first user identity information;
Wherein it is possible to obtain the first use according to the user profile in the upper SIM that installs of mobile terminal (such as mobile phone) Family identity information, i.e. the first user identity information correspond to the user profile in the SIM.
Step 102, judge the first user identity information whether with the second user body that preserves in the mobile terminal Part information matches;
Wherein it is possible to the second user identity information preserved in first user identity information and mobile terminal is carried out Match somebody with somebody, judge whether they are identical.
If so, then execution step 103, it is allowed to which current holder uses mobile terminal;
That is, if identical, SIM of the SIM in mobile terminal for owner is described, can confirm that authentication is led to Cross, the holder of the SIM can normally using mobile terminal.
If it is not, then execution step 104, are prevented or restricted from current holder and use mobile terminal.
That is, if it does not match, the SIM of SIM not owner in explanation mobile terminal, mobile terminal is likely to lose Lose, and picked person or eavesdropper are used, now authentication does not pass through, the mobile terminal can be locked, until inserting Till the SIM for entering to obtain authentication.
So, the embodiment of the present invention is by preserving in advance authentication information in the terminal, and to mobile terminal in The holder of SIM carry out authentication, only certification is by could normally using mobile terminal.As such, it is possible to will be mobile Terminal carries out real name binding with the identity information of user, even if mobile terminal is lost, stealer changes SIM, the SIM after replacing Card also will be unable to obtain authentication, so as to use mobile terminal, it is ensured that the safety of user profile.
Second embodiment
With reference to Fig. 2, the flow chart for showing the identity identifying method of one embodiment of the invention, methods described specifically can be with Comprise the steps:
Step 201, after mobile terminal start for the first time, the corresponding electricity of the SIM in the acquisition mobile terminal Words number, according to the telephone number, sends identity lookup request to carrier server, obtains the carrier server and returns The subscriber identity information is saved as the second identity information by the subscriber identity information for returning;
Wherein, before mobile terminal (such as mobile phone) is started shooting for the first time, the SIM of oneself can be inserted into movement by owner Terminal, wherein, the SIM have passed through the real-name authentication of owner.
So, after first time starts shooting, it is possible to obtain the telephone number of the owner in the SIM;And to the phone number The corresponding carrier server of code sends identity lookup request (i.e. corresponding to the identity information inquiry request of the telephone number).Its In, as through the SIM of real-name authentication, in corresponding carrier server, (such as SIM is mobile card, then go to move fortune Battalion's business's server, and if SIM is UNICOM's card, Ze Qu UNICOMs carrier server) in be stored with some identity of the owner Information, including name (essential), identification card number (essential), home address (optional) etc..
Need exist in advance by the identity of owner and mobile terminal binding, the identity information that therefore asks here only can be wrapped Identification card number is included, or further includes the information such as name.So carrier server side can be just inquired corresponding to the phone The identification card number of number, and it is returned to mobile terminal.Finally, the identification card number for receiving can be stored in this by mobile terminal side Ground.
Or,
Step 202, after the mobile terminal is started shooting for the first time, gathers user fingerprints information, according to the user fingerprints Information sends identity lookup request to system server, obtains the subscriber identity information that the system server is returned, will be described Subscriber identity information saves as the second identity information.
That is, when the advance identity to owner and mobile terminal are bound, it is not essential however to by means of SIM Card, can carry out the binding of identity information with the fingerprint by means of owner.
Specifically, the finger print information of the owner of advance typing to mobile terminal can be gathered, if do not had in mobile terminal There is the finger print information for pre-saving owner, then remind user's typing, gather the finger print information of owner.Then, according to the owner Finger print information come to system server (server of such as public security system) send identity lookup request (i.e. correspond to the fingerprint The inquiry of the subscriber identity information of information).Wherein, as existing public security system is when identity card is formulated, China Association for Promoting Democracy of Dou Huidui cities Row fingerprint typing, so, in public security system will in store user finger print information and to should finger print information identity The subscriber identity information such as card number and name.Therefore, it can to search in public security system according to the finger print information of the owner of collection Subscriber identity information corresponding with the finger print information, for example, identification card number or further include the subscriber identity informations such as name.Most Afterwards, the identity information for obtaining is stored in locally.
Step 203, the corresponding telephone number of the SIM in the acquisition mobile terminal;
Wherein it is possible to when detecting the SIM in mobile terminal and switching to another SIM card, obtain current movement The possessory telephone number of the SIM in SIM in terminal.
Step 204, according to the telephone number, sends identity lookup request to carrier server, obtains the operation The first user identity information that business's server is returned;
Then, there is inquiry user identity according to the possessory telephone number of the SIM to corresponding carrier server The identity lookup request of information, the possessory identity information of the SIM so as to obtain carrier server return, at least includes Identification card number, or further include the information such as name.
Step 205, judge the first user identity information whether with the second user body that preserves in the mobile terminal Part information matches;
Then, it is possible to judge the possessory identification card number and mobile terminal of currently used SIM in mobile terminal Including owner identification card number whether consistent.
If so, then execution step 206, it is allowed to which current holder uses mobile terminal;
That is, if identical, illustrate that (that is, owner may change difference for the SIM of owner for SIM in mobile terminal The SIM of another operator when starting shooting first time is using mobile terminal), can confirm that authentication passes through, the SIM The holder of card can normally using mobile terminal.
If it is not, then execution step 207, are prevented or restricted from current holder and use mobile terminal.
That is, if it does not match, the SIM of SIM not owner in explanation mobile terminal, mobile terminal is likely to lose Lose, and picked person or eavesdropper are used, now authentication does not pass through, the mobile terminal can be locked, until inserting Till the SIM for entering to obtain owner's authentication.
By means of the technical scheme of the above embodiment of the present invention, the embodiment of the present invention passes through to be started shooting in mobile terminal for the first time When, according to mobile terminal SIM or owner's finger print information by the identity information of owner together with mobile terminal binding, that Once the SIM of mobile terminal is switched, then is required for the SIM to being currently inserted into carry out authentication, specifically recognizes Card mode be exactly using in pre-saving to mobile terminal through real-name authentication subscriber identity information come certification, it is achieved that mobile The real-name authentication of terminal.Even if mobile terminal is lost, the SIM of eavesdropper cannot also pass through authentication.
3rd embodiment
On the basis of above-described embodiment, with reference to Fig. 3, the stream of the identity identifying method of one embodiment of the invention is shown Cheng Tu, methods described specifically may include steps of:
Step 301, according to the information of the SIM in the mobile terminal, obtains first user identity information;
Referring in particular to the step of first embodiment 101, will not be described here.
Step 302, judge the first user identity information whether with the second user body that preserves in the mobile terminal Part information matches;
Referring in particular to the step of first embodiment 102, will not be described here.
If so, then execution step 303, it is allowed to which current holder uses mobile terminal, and preserves the SIM that authentication passes through The information of card;
Wherein, authentication has been passed through if be currently inserted into the SIM of mobile terminal, then can obtain and be currently inserted into SIM information (the possessory telephone number of such as SIM, or the telephone number for further including programmed emergency), and During possessory for SIM in the SIM of insertion telephone number is preserved to mobile terminal.
If it is not, then execution step 304, are prevented or restricted from current holder and use mobile terminal, and send a warning message.
Wherein, do not pass through authentication if be currently inserted into the SIM of mobile terminal, can send a warning message.
Wherein, when sending a warning message, can be according to preserving SIM that authentication in the terminal pass through Information (telephone number of such as owner or further include owner programmed emergency telephone number), determine alarm number (the telephone number or micro- corresponding to the social account of the telephone number of owner of the telephone number of such as owner or programmed emergency Letter account, QQ accounts etc.);And send a warning message to the alarm number and (for example can send to the telephone number of owner and work as The location information of front mobile terminal position, with note form).
By means of the technical scheme of the embodiment of the present invention, can in SIM after authentication, to SIM in letter Breath is preserved, then once mobile terminal is lost, it is possible to by means of the information in the SIM of authentication for preserving To determine alarm number such that it is able to send alarm letter to the telephone number of the programmed emergency of the owner or owner of mobile terminal Breath, is easy to the owner of lost property to learn the current location of mobile terminal, to recover mobile terminal.
Fourth embodiment
With reference to Fig. 4, the block diagram of the mobile terminal of one embodiment of the invention is shown.Shown in Fig. 4, mobile terminal includes:
First acquisition module 41, for the information according to the SIM in the mobile terminal, obtains first user identity letter Breath;
Judge module 42, for judge the first user identity information whether with the mobile terminal in preserve second Subscriber identity information mates;
First determining module 43, for mating with the second user identity information in the first user identity information When, it is allowed to current holder uses mobile terminal;
Second determining module 44, for mismatching with the second user identity information in the first user identity information When, it is prevented or restricted from current holder and uses mobile terminal.
So, the embodiment of the present invention is by the advance authentication information for preserving owner in the terminal, then once SIM is changed, and is required for the holder to the SIM to carry out authentication, only certification by could normally using mobile eventually End.As such, it is possible to the identity information by mobile terminal with user carries out real name binding, even if mobile terminal is lost, stealer is more SIM is changed, the SIM after replacing also will be unable to obtain authentication, so as to mobile terminal cannot be used, it is ensured that user profile Safety.
5th embodiment
With reference to Fig. 5, the block diagram of the mobile terminal of one embodiment of the invention is shown.Shown in Fig. 5, mobile terminal includes:
First acquisition module 41, for the information according to the SIM in the mobile terminal, obtains first user identity letter Breath;
Judge module 42, for judge the first user identity information whether with the mobile terminal in preserve second Subscriber identity information mates;
First determining module 43, for mating with the second user identity information in the first user identity information When, it is allowed to current holder uses mobile terminal;
Second determining module 44, for mismatching with the second user identity information in the first user identity information When, it is prevented or restricted from current holder and uses mobile terminal.
Wherein, first acquisition module 41 includes:
First acquisition submodule 411, for obtaining the corresponding telephone number of the SIM in the mobile terminal;
Second acquisition submodule 412, for according to the telephone number, sending ID inquiring to carrier server please Ask, obtain the first user identity information that the carrier server is returned.
The mobile terminal also includes:
Second acquisition module 45, for, after the mobile terminal is started shooting for the first time, obtaining the SIM in the mobile terminal Block corresponding telephone number;
3rd acquisition module 46, for according to the telephone number, sending identity lookup request to carrier server, obtaining Take the subscriber identity information that the carrier server is returned;
First preserving module 47, for saving as second identity information by the subscriber identity information;
Or,
Acquisition module 48, for, after the mobile terminal is started shooting for the first time, gathering user fingerprints information;
4th acquisition module 49, for sending identity lookup request according to the user fingerprints information to system server, Obtain the subscriber identity information that the system server is returned;
Second preserving module 50, for saving as second identity information by the subscriber identity information.
3rd preserving module 51, for mating with the second user identity information in the first user identity information When, then preserve the information of the SIM that authentication passes through;
Sending module 52, for when the first user identity information is mismatched with the second user identity information, Then send a warning message.
Wherein, the sending module 52 includes:
Determination sub-module 521, the information of the SIM for passing through according to the authentication for preserving, determines alarm number;
Sending submodule 522, for send a warning message to the alarm number.
Mobile terminal can realize the effect that mobile terminal is realized in the embodiment of the method for Fig. 1 to Fig. 3, for avoiding repeating, Here repeat no more.
Sixth embodiment
Fig. 6 is the block diagram of the mobile terminal of another embodiment of the invention.Mobile terminal 600 shown in Fig. 6 includes:At least One processor 601, memorizer 602, at least one network interface 604 and user interface 603.Each in mobile terminal 600 Component is coupled by bus system 605.It is understood that bus system 605 is used for realizing that the connection between these components is led to Letter.Bus system 605 also includes power bus, controlling bus and status signal bus in addition in addition to data/address bus is included.It but is For the sake of clear explanation, in figure 6 various buses are all designated as bus system 605.
Wherein, user interface 603 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memorizer 602 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and which is used as outside height Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The embodiment of the present invention description system and method memorizer 602 be intended to including but not limited to these Memorizer with any other suitable type.
In some embodiments, memorizer 602 stores following element, can perform module or data structure, or Person their subset, or their superset:Operating system 6021 and application program 6022.
Wherein, operating system 6021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and process hardware based task.Application program 6022, comprising various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method is may be embodied in application program 6022.
In embodiments of the present invention, by call memorizer 602 storage program or instruction, specifically, can be application The program stored in program 6022 or instruction, processor 601 are used for the information according to the SIM in the mobile terminal, obtain First user identity information;Judge the first user identity information whether with the second user body that preserves in the mobile terminal Part information matches;If it does, then allowing current holder to use mobile terminal;Otherwise, being prevented or restricted from current holder makes Use mobile terminal.
The method that the embodiments of the present invention are disclosed is can apply in processor 601, or is realized by processor 601. A kind of possibly IC chip of processor 601, the disposal ability with signal.During realization, said method each Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 601 or software form.Above-mentioned process Device 601 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components.Can realize or execute disclosed each method in the embodiment of the present invention, step and logic diagram.General Processor can be microprocessor or the processor can also be any conventional processor etc..In conjunction with embodiment of the present invention institute The step of disclosed method, can be embodied directly in hardware decoding processor and execute and complete, or with the hardware in decoding processor And software module combination execution is completed.Software module may be located at random access memory, and flash memory, read only memory may be programmed read-only In the ripe storage medium in this area such as memorizer or electrically erasable programmable memory, depositor.The storage medium is located at Memorizer 602, processor 601 read the information in memorizer 602, the step of complete said method in conjunction with its hardware.
It is understood that the embodiment of the present invention description these embodiments can use hardware, software, firmware, middleware, Microcode or its combine realizing.For hardware is realized, processing unit can be realized in one or more special ICs (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general place Reason device, controller, microcontroller, microprocessor, for execute herein described function other electronic units or its combine in.
For software realize, can pass through execute the embodiment of the present invention described in function module (such as process, function etc.) come Realize the technology described in the embodiment of the present invention.Software code is storable in memorizer and by computing device.Memorizer can To realize within a processor or outside the processor.
Alternatively, processor 601 is additionally operable to:Obtain the corresponding telephone number of SIM in the mobile terminal;According to institute Telephone number is stated, identity lookup request is sent to carrier server, obtain described the first of the carrier server return Subscriber identity information.
Alternatively, processor 601 is additionally operable to:After the mobile terminal is started shooting for the first time, obtain in the mobile terminal The corresponding telephone number of SIM, according to the telephone number, send identity lookup request to carrier server, obtain institute The subscriber identity information of carrier server return is stated, the subscriber identity information is saved as second identity information;Or Person, after the mobile terminal is started shooting for the first time, gathers user fingerprints information, according to the user fingerprints information to system service Device sends identity lookup request, obtains the subscriber identity information that the system server is returned, and the subscriber identity information is protected Save as second identity information.
Alternatively, processor 601 is additionally operable to:If it does, then preserving the information of the SIM that authentication passes through;Otherwise, Then send a warning message.
Alternatively, processor 601 is additionally operable to:The information of the SIM passed through according to the authentication for preserving, determines alarm number Code;Send a warning message to the alarm number.
Mobile terminal 600 can realize the effect above that mobile terminal is realized in previous embodiment, for avoiding repeating, here Repeat no more.
7th embodiment
Fig. 7 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 7 700 can be mobile phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric Brain etc..
Mobile terminal 700 in Fig. 7 includes radio frequency (Radio Frequency, RF) circuit 710, memorizer 720, input Unit 730, display unit 740, processor 760, voicefrequency circuit 770, WiFi (Wireless Fidelity) module 780 and electricity Source 790.
Wherein, input block 730 can be used for receive mobile phone users input numeral or character information, and produce with The signal input that the mobile phone users of mobile terminal 700 are arranged and function control is relevant.Specifically, the embodiment of the present invention In, the input block 730 can include contact panel 731.Contact panel 731, also referred to as touch screen, can collect mobile terminal use Family thereon or neighbouring touch operation (such as mobile phone users are using any suitable object or adnexaes such as finger, stylus Operation on contact panel 731), and corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 731 may include two parts of touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detect mobile phone users Touch orientation, and the signal that touch operation brings is detected, transmit a signal to touch controller;Touch controller is from touch detection Touch information is received on device, and is converted into contact coordinate, then give the processor 760, and can receiving processor 760 Next order is simultaneously executed.Furthermore, it is possible to adopt the polytype reality such as resistance-type, condenser type, infrared ray and surface acoustic wave Existing contact panel 731.Except contact panel 731, input block 730 can also include that other input equipments 732, other inputs set Standby 732 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, Mus One or more in mark, action bars etc..
Wherein, display unit 740 can be used to show the information being input into by mobile phone users or be supplied to mobile terminal use The information at family and the various menu interfaces of mobile terminal 700.Display unit 740 may include display floater 741, optionally, can To configure display using the form such as LCD or Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) Panel 741.
It should be noted that contact panel 731 can cover display floater 741, touch display screen is formed, when the touch display screen inspection Measure thereon or after neighbouring touch operation, processor 760 is sent to determine the type of touch event, with preprocessor 760 provide corresponding visual output in touch display screen according to the type of touch event.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And the arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can be distinguished two and show Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area be used for show the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 760 is the control centre of mobile terminal 700, entirely mobile whole using various interfaces and connection The various pieces at end 700, by running or executing software program and/or the module being stored in first memory 721, and adjust With the data being stored in second memory 722, the various functions and processing data of mobile terminal 700 are executed, so as to movement Terminal 700 carries out integral monitoring.Optionally, processor 760 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 721 in software program and/or module and/ Or the data in the second memory 722, processor 760 is used for the information according to the SIM in the mobile terminal, obtains the One subscriber identity information;Judge the first user identity information whether with the second user identity that preserves in the mobile terminal Information matches;If it does, then allowing current holder to use mobile terminal;Otherwise, current holder's use is prevented or restricted from Mobile terminal.
Alternatively, processor 760 is additionally operable to:Obtain the corresponding telephone number of SIM in the mobile terminal;According to institute Telephone number is stated, identity lookup request is sent to carrier server, obtain described the first of the carrier server return Subscriber identity information.
Alternatively, processor 760 is additionally operable to:After the mobile terminal is started shooting for the first time, obtain in the mobile terminal The corresponding telephone number of SIM, according to the telephone number, send identity lookup request to carrier server, obtain institute The subscriber identity information of carrier server return is stated, the subscriber identity information is saved as second identity information;Or Person, after the mobile terminal is started shooting for the first time, gathers user fingerprints information, according to the user fingerprints information to system service Device sends identity lookup request, obtains the subscriber identity information that the system server is returned, and the subscriber identity information is protected Save as second identity information.
Alternatively, processor 760 is additionally operable to:If it does, then preserving the information of the SIM that authentication passes through;Otherwise, Then send a warning message.
Alternatively, processor 760 is additionally operable to:The information of the SIM passed through according to the authentication for preserving, determines alarm number Code;Send a warning message to the alarm number.
It can be seen that, the embodiment of the present invention can pass through the authentication information for preserving owner in advance in the terminal, then Once SIM is changed, it is required for the holder to the SIM to carry out authentication, only certification is by could normally using shifting Dynamic terminal.As such, it is possible to the identity information by mobile terminal with user carries out real name binding, even if mobile terminal is lost, steal Person changes SIM, and the SIM after replacing also will be unable to obtain authentication, so as to use mobile terminal, it is ensured that user The safety of information.
Those of ordinary skill in the art are it is to be appreciated that with reference to each of the embodiment description disclosed in the embodiment of the present invention The unit and algorithm steps of example, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These Function is executed with hardware or software mode actually, the application-specific and design constraint depending on technical scheme.Specialty Technical staff can use different methods to realize described function to each specific application, but this realization should Think beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can pass through other Mode is realized.For example, device embodiment described above is only that schematically for example, the division of the unit is only A kind of division of logic function, can have when actually realizing other dividing mode, for example multiple units or component can in conjunction with or Person is desirably integrated into another system, or some features can be ignored, or does not execute.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit Connect, can be electrical, mechanical or other forms.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized using in the form of SFU software functional unit and as independent production marketing or when using, can be with It is stored in a computer read/write memory medium.Such understanding is based on, technical scheme is substantially in other words The part contributed by prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual People's computer, server, or network equipment etc.) execute all or part of step of each embodiment methods described of the invention. And aforesaid storage medium includes:USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (10)

1. a kind of identity identifying method, is applied to mobile terminal, it is characterised in that methods described includes:
According to the information of the SIM in the mobile terminal, first user identity information is obtained;
Judge whether the first user identity information is mated with the second user identity information preserved in the mobile terminal;
If it does, then allowing current holder to use the mobile terminal;Otherwise, it is prevented or restricted from current holder and uses institute State mobile terminal.
2. method according to claim 1, it is characterised in that the information of the SIM according in the mobile terminal, The step of obtaining first user identity information, including:
Obtain the corresponding telephone number of SIM in the mobile terminal;
According to the telephone number, identity lookup request is sent to carrier server, obtain the carrier server and return The first user identity information.
3. method according to claim 1, it is characterised in that described judge the first user identity information whether with institute Before stating the second user identity information coupling preserved in mobile terminal, methods described also includes:
After mobile terminal start for the first time, the corresponding telephone number of the SIM in the acquisition mobile terminal, according to institute Telephone number is stated, identity lookup request is sent to carrier server, obtain the user identity that the carrier server is returned The subscriber identity information is saved as second identity information by information;
Or,
After the mobile terminal is started shooting for the first time, user fingerprints information is gathered, taken to system according to the user fingerprints information Business device sends identity lookup request, obtains the subscriber identity information that the system server is returned, by the subscriber identity information Save as second identity information.
4. method according to claim 1, it is characterised in that described judge the first user identity information whether with institute After stating the step of the second user identity information preserved in mobile terminal mates, methods described also includes:
If it does, then preserving the information of the SIM that authentication passes through;Otherwise, send a warning message.
5. method according to claim 4, it is characterised in that described the step of send a warning message, including:
The information of the SIM passed through according to the authentication for preserving, determines alarm number;
Send a warning message to the alarm number.
6. a kind of mobile terminal, it is characterised in that the mobile terminal includes:
First acquisition module, for the information according to the SIM in the mobile terminal, obtains first user identity information;
Judge module, for judge the first user identity information whether with the second user body that preserves in the mobile terminal Part information matches;
First determining module, for when the first user identity information is mated with the second user identity information, it is allowed to Current holder uses the mobile terminal;
Second determining module, for when the first user identity information is mismatched with the second user identity information, prohibiting Only or limit current holder use the mobile terminal.
7. mobile terminal according to claim 6, it is characterised in that first acquisition module includes:
First acquisition submodule, for obtaining the corresponding telephone number of the SIM in the mobile terminal;
Second acquisition submodule, for according to the telephone number, sending identity lookup request to carrier server, obtaining The first user identity information that the carrier server is returned.
8. mobile terminal according to claim 6, it is characterised in that the mobile terminal also includes:
Second acquisition module, for, after the mobile terminal is started shooting for the first time, the SIM obtained in the mobile terminal is corresponding Telephone number;
3rd acquisition module, for according to the telephone number, sending identity lookup request to carrier server, obtains described The subscriber identity information that carrier server is returned;
First preserving module, for saving as second identity information by the subscriber identity information;
Or,
Acquisition module, for, after the mobile terminal is started shooting for the first time, gathering user fingerprints information;
4th acquisition module, for sending identity lookup request according to the user fingerprints information to system server, obtains institute State the subscriber identity information of system server return;
Second preserving module, for saving as second identity information by the subscriber identity information.
9. mobile terminal according to claim 6, it is characterised in that the mobile terminal also includes:
3rd preserving module, for when the first user identity information is mated with the second user identity information, preserving The information of the SIM that authentication passes through;
Sending module, for when the first user identity information is mismatched with the second user identity information, sending and accusing Alarming information.
10. mobile terminal according to claim 9, it is characterised in that the sending module includes:
Determination sub-module, the information of the SIM for passing through according to the authentication for preserving, determines alarm number;
Sending submodule, for send a warning message to the alarm number.
CN201611265721.0A 2016-12-30 2016-12-30 A kind of identity identifying method and mobile terminal Pending CN106507334A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611265721.0A CN106507334A (en) 2016-12-30 2016-12-30 A kind of identity identifying method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611265721.0A CN106507334A (en) 2016-12-30 2016-12-30 A kind of identity identifying method and mobile terminal

Publications (1)

Publication Number Publication Date
CN106507334A true CN106507334A (en) 2017-03-15

Family

ID=58334850

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611265721.0A Pending CN106507334A (en) 2016-12-30 2016-12-30 A kind of identity identifying method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106507334A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107358442A (en) * 2017-07-13 2017-11-17 奇酷互联网络科技(深圳)有限公司 Payment verification method, apparatus, server and storage medium
CN108228211A (en) * 2017-12-15 2018-06-29 中国移动通信集团江苏有限公司 Smart card, the method and system of intelligent card data security update
CN111343133A (en) * 2018-12-19 2020-06-26 中移物联网有限公司 Authentication method, authentication equipment and computer readable storage medium
CN111542061A (en) * 2017-04-25 2020-08-14 吴红平 Information synchronization security authentication method
CN113286289A (en) * 2020-01-31 2021-08-20 华为技术有限公司 Permission confirmation method and electronic equipment
CN114584332A (en) * 2020-11-18 2022-06-03 中移物联网有限公司 Real-name authentication method and related equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753682A (en) * 2009-11-27 2010-06-23 华为终端有限公司 Right management method for user identification card and terminal unit
CN101789988A (en) * 2009-12-29 2010-07-28 闻泰集团有限公司 Method for realizing binding of mobile phone and SIM card
CN103944944A (en) * 2013-01-23 2014-07-23 腾讯科技(深圳)有限公司 Webpage link sharing method and system, and electronic device
CN104038615A (en) * 2014-05-14 2014-09-10 京东方科技集团股份有限公司 Authentication method and authentication device of communication device
CN105141736A (en) * 2015-09-22 2015-12-09 广东欧珀移动通信有限公司 Information security protection method and apparatus
CN105657147A (en) * 2015-05-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Mobile terminal anti-theft method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753682A (en) * 2009-11-27 2010-06-23 华为终端有限公司 Right management method for user identification card and terminal unit
CN101789988A (en) * 2009-12-29 2010-07-28 闻泰集团有限公司 Method for realizing binding of mobile phone and SIM card
CN103944944A (en) * 2013-01-23 2014-07-23 腾讯科技(深圳)有限公司 Webpage link sharing method and system, and electronic device
CN104038615A (en) * 2014-05-14 2014-09-10 京东方科技集团股份有限公司 Authentication method and authentication device of communication device
CN105657147A (en) * 2015-05-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Mobile terminal anti-theft method and device
CN105141736A (en) * 2015-09-22 2015-12-09 广东欧珀移动通信有限公司 Information security protection method and apparatus

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111542061A (en) * 2017-04-25 2020-08-14 吴红平 Information synchronization security authentication method
CN111542061B (en) * 2017-04-25 2023-07-18 北京五洲天宇认证中心 Information synchronization security authentication method
CN107358442A (en) * 2017-07-13 2017-11-17 奇酷互联网络科技(深圳)有限公司 Payment verification method, apparatus, server and storage medium
CN108228211A (en) * 2017-12-15 2018-06-29 中国移动通信集团江苏有限公司 Smart card, the method and system of intelligent card data security update
CN108228211B (en) * 2017-12-15 2021-05-25 中国移动通信集团江苏有限公司 Smart card, and method and system for safely updating data of smart card
CN111343133A (en) * 2018-12-19 2020-06-26 中移物联网有限公司 Authentication method, authentication equipment and computer readable storage medium
CN113286289A (en) * 2020-01-31 2021-08-20 华为技术有限公司 Permission confirmation method and electronic equipment
CN114584332A (en) * 2020-11-18 2022-06-03 中移物联网有限公司 Real-name authentication method and related equipment
CN114584332B (en) * 2020-11-18 2024-03-19 中移物联网有限公司 Real-name authentication method and related equipment

Similar Documents

Publication Publication Date Title
CN106507334A (en) A kind of identity identifying method and mobile terminal
CN107219976A (en) Application display method and related product
CN106778183A (en) A kind of Terminal fingerprints know method for distinguishing and mobile terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN104901991B (en) Virtual resource transfer method, device and system
CN107679426A (en) A kind of screen content display method thereof and mobile terminal
CN105912919B (en) A kind of unlocked by fingerprint method and terminal
CN106920307A (en) Gate inhibition's open method, device and mobile terminal
CN106570372A (en) Starting method of application program and mobile terminal
CN106484301A (en) A kind of method of hiden application and terminal
CN107678884A (en) A kind of data transmission method, mobile terminal and computer-readable recording medium
CN106331370A (en) Data transmission method and terminal device
CN107358442A (en) Payment verification method, apparatus, server and storage medium
CN106874727A (en) Double screen terminal applies processing method, device and a kind of terminal
CN107609407A (en) The guard method of information security and device in a kind of user terminal
CN106779722A (en) The method of payment and mobile terminal of a kind of mobile terminal
CN106371739A (en) Application quick startup method and mobile terminal
CN106407771A (en) Message management method and device
CN106211070B (en) A kind of anti-theft protection method and mobile terminal of mobile terminal
CN106302995A (en) The acquisition methods of a kind of log-on message and mobile terminal
CN106778217A (en) A kind of mobile terminal unlocks error handling method and mobile terminal
CN107454664A (en) A kind of data transmission method and mobile terminal
CN107329586A (en) A kind of data inputting method, mobile terminal and computer-readable recording medium
CN105208276B (en) The photographic method and device of mobile terminal
CN106469060A (en) A kind of processing method of application messages and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170315