CN106529346B - Method for protecting terminal privacy and terminal - Google Patents

Method for protecting terminal privacy and terminal Download PDF

Info

Publication number
CN106529346B
CN106529346B CN201610963309.XA CN201610963309A CN106529346B CN 106529346 B CN106529346 B CN 106529346B CN 201610963309 A CN201610963309 A CN 201610963309A CN 106529346 B CN106529346 B CN 106529346B
Authority
CN
China
Prior art keywords
memory
mode
unlocking
low
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610963309.XA
Other languages
Chinese (zh)
Other versions
CN106529346A (en
Inventor
汪健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qishitong Group Co., Ltd
Original Assignee
Qishitong Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qishitong Group Co Ltd filed Critical Qishitong Group Co Ltd
Priority to CN201610963309.XA priority Critical patent/CN106529346B/en
Publication of CN106529346A publication Critical patent/CN106529346A/en
Application granted granted Critical
Publication of CN106529346B publication Critical patent/CN106529346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed herein are a method for protecting terminal privacy and a terminal, the method for protecting terminal privacy comprises: detecting an unlocking code input by a user in a screen locking state; if the second unlocking code is detected and the system does not operate in the low memory mode, unlocking the screen to enable the system to enter the low memory mode to operate; if the first unlocking code is detected and the system operates in the low memory mode, unlocking the screen and enabling the system to exit the low memory mode; and the low memory mode is a working mode in which the available memory of the system is gradually reduced according to a preset strategy. According to the technical scheme, when the user uses the second unlocking code to unlock the terminal, the terminal enters a low memory mode and gradually operates in a stuck mode, the user is prevented from using the terminal for a long time, and the purpose of protecting privacy is achieved.

Description

Method for protecting terminal privacy and terminal
Technical Field
The present invention relates to the field of terminal technologies, and in particular, to a method for protecting terminal privacy and a terminal.
Background
The use of mobile terminals has been deepened into the aspect of daily life of people, and more private data are stored in mobile terminals (such as mobile phones).
In the related art, the privacy protection technology is mainly used for preventing the use of the mobile terminal by others by setting a password, for example, by locking a screen, applying a lock, and the like. However, the explicit privacy protection technology is easy to negatively affect the interpersonal relationship between the user and other people while preventing other people from using the mobile phone. In addition, in some scenes that others have to tell passwords, the protection of the passwords for privacy does not exist.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method and a terminal for protecting terminal privacy, which can enable the terminal to enter a low memory mode and gradually operate in a stuck state when a user uses a second unlocking code to unlock the terminal, so that the user is prevented from using the terminal for a long time, and the purpose of protecting privacy is achieved.
The embodiment of the invention provides a method for protecting terminal privacy, which comprises the following steps:
detecting an unlocking code input by a user in a screen locking state;
if the second unlocking code is detected and the system does not operate in the low memory mode, unlocking the screen to enable the system to enter the low memory mode to operate; if the first unlocking code is detected and the system operates in the low memory mode, unlocking the screen and enabling the system to exit the low memory mode;
and the low memory mode is a working mode in which the available memory of the system is gradually reduced according to a preset strategy.
An embodiment of the present invention further provides a terminal, including:
the detection module is used for detecting an unlocking code input by a user in a screen locking state;
the unlocking processing module is used for unlocking the screen and enabling the system to enter the low memory mode to operate if the second unlocking code is detected and the system does not operate in the low memory mode; if the first unlocking code is detected and the system operates in the low memory mode, unlocking the screen and enabling the system to exit the low memory mode;
and the low memory mode is a working mode in which the available memory of the system is gradually reduced according to a preset strategy.
According to the method and the terminal for protecting the terminal privacy, the unlocking code input by a user is detected in the screen locking state, and if the second unlocking code is detected and the system does not operate in the low memory mode, the screen is unlocked, so that the system enters the low memory mode to operate; and if the first unlocking code is detected and the system operates in the low memory mode, unlocking the screen to enable the system to exit the low memory mode, wherein the low memory mode is a working mode in which the available memory of the system is gradually reduced according to a preset strategy. According to the invention, after the terminal is unlocked by other people by using the second unlocking code, the terminal enters the low memory mode and gradually operates in a stuck state, so that the terminal is prevented from being used by other people for a long time, and the purpose of protecting privacy is achieved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of an optional mobile terminal for implementing various embodiments of the present invention;
FIG. 2 is a diagram of a wireless communication system for the mobile terminal shown in FIG. 1;
fig. 3 is a flowchart of a method for protecting privacy of a terminal according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a terminal according to an embodiment of the present invention;
fig. 5 is a flowchart of a method for protecting privacy of a terminal according to example 1 of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
The technical solution of the present invention will be described in more detail with reference to the accompanying drawings and examples.
A mobile terminal implementing various embodiments of the present application will now be described with reference to the accompanying drawings. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
The mobile terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a navigation device, and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. In the following, it is assumed that the terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Fig. 1 is a schematic diagram of a hardware structure of an optional mobile terminal for implementing various embodiments of the present application.
The mobile terminal 100 may include a wireless communication unit 110, an a/V (audio/video) input unit 120, a user input unit 130, a sensing unit 140, an output unit 150, a memory 160, an interface unit 170, a controller 180, and a power supply unit 190, etc.
Fig. 1 illustrates the mobile terminal 100 having various components, but it is to be understood that not all illustrated components are required to be implemented. More or fewer components may alternatively be implemented. The elements of the mobile terminal 100 will be described in detail below.
The wireless communication unit 110 may generally include one or more components that allow radio communication between the mobile terminal 100 and a wireless communication system or network. For example, the wireless communication unit 110 may include at least one of a broadcast receiving module 111, a mobile communication module 112, a wireless internet module 113, a short-range communication module 114, and a location information module 115.
The broadcast receiving module 111 receives a broadcast signal and/or broadcast associated information from an external broadcast management server via a broadcast channel. The broadcast channel may include a satellite channel and/or a terrestrial channel. The broadcast management server may be a server that generates and transmits a broadcast signal and/or broadcast associated information or a server that receives a previously generated broadcast signal and/or broadcast associated information and transmits it to a terminal. The broadcast signal may include a TV broadcast signal, a radio broadcast signal, a data broadcast signal, and the like. Also, the broadcast signal may further include a broadcast signal combined with a TV or radio broadcast signal. The broadcast associated information may also be provided via a mobile communication network, and in this case, the broadcast associated information may be received by the mobile communication module 112. The broadcast signal may exist in various forms, for example, it may exist in the form of an Electronic Program Guide (EPG) of Digital Multimedia Broadcasting (DMB), an Electronic Service Guide (ESG) of digital video broadcasting-handheld (DVB-H), and the like. The broadcast receiving module 111 may receive a signal broadcast by using various types of broadcasting systems. In particular, the broadcast receiving module 111 may receive digital broadcasting by using a digital broadcasting system such as a data broadcasting system of multimedia broadcasting-terrestrial (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video broadcasting-handheld (DVB-H), forward link media (MediaFLO @), terrestrial digital broadcasting integrated service (ISDB-T), and the like. The broadcast receiving module 111 may be constructed to be suitable for various broadcasting systems that provide broadcast signals as well as the above-mentioned digital broadcasting systems. The broadcast signal and/or broadcast associated information received via the broadcast receiving module 111 may be stored in the memory 160 (or other type of storage medium).
The mobile communication module 112 transmits and/or receives radio signals to and/or from at least one of a base station (e.g., access point, node B, etc.), an external terminal, and a server. Such radio signals may include voice call signals, video call signals, or various types of data transmitted and/or received according to text and/or multimedia messages.
The wireless internet module 113 supports wireless internet access of the mobile terminal. The module may be internally or externally coupled to the terminal. The wireless internet access technology to which the module relates may include WLAN (wireless LAN) (Wi-Fi), Wibro (wireless broadband), Wimax (worldwide interoperability for microwave access), HSDPA (high speed downlink packet access), and the like.
The short-range communication module 114 is a module for supporting short-range communication. Some examples of short-range communication technologies include bluetooth (TM), Radio Frequency Identification (RFID), infrared data association (IrDA), Ultra Wideband (UWB), zigbee (TM), and the like.
The location information module 115 is a module for checking or acquiring location information of the mobile terminal. A typical example of the location information module 115 is a GPS (global positioning system). According to the current technology, the GPS calculates distance information and accurate time information from three or more satellites and applies triangulation to the calculated information, thereby accurately calculating three-dimensional current location information according to longitude, latitude, and altitude. Currently, a method for calculating position and time information uses three satellites and corrects an error of the calculated position and time information by using another satellite. In addition, the GPS can calculate speed information by continuously calculating current position information in real time.
The a/V input unit 120 is used to receive an audio or video signal. The a/V input unit 120 may include a camera 121 and a microphone 122, and the camera 121 processes image data of still pictures or video obtained by an image capturing apparatus in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 151. The image frames processed by the cameras 121 may be stored in the memory 160 (or other storage medium) or transmitted via the wireless communication unit 110, and two or more cameras 121 may be provided according to the construction of the mobile terminal 100. The microphone 122 may receive sounds (audio data) via the microphone 122 in a phone call mode, a recording mode, a voice recognition mode, or the like, and is capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the mobile communication module 112 in case of a phone call mode. The microphone 122 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The user input unit 130 may generate key input data to control various operations of the mobile terminal 100 according to a command input by a user. The user input unit 130 allows a user to input various types of information, and may include a keyboard, dome sheet, touch pad (e.g., a touch-sensitive member that detects changes in resistance, pressure, capacitance, and the like due to being touched), scroll wheel, joystick, and the like. In particular, when the touch pad is superimposed on the display unit 151 in the form of a layer, a touch screen may be formed.
The sensing unit 140 detects a current state of the mobile terminal 100 (e.g., an open or closed state of the mobile terminal 100), a position of the mobile terminal 100, presence or absence of contact (i.e., touch input) by a user with the mobile terminal 100, an orientation of the mobile terminal 100, acceleration or deceleration movement and direction of the mobile terminal 100, and the like, and generates a command or signal for controlling an operation of the mobile terminal 100. For example, when the mobile terminal 100 is implemented as a slide-type mobile phone, the sensing unit 140 may sense whether the slide-type phone is opened or closed. In addition, the sensing unit 140 can detect whether the power supply unit 190 supplies power or whether the interface unit 170 is coupled with an external device. The sensing unit 140 may include a proximity sensor 141.
The interface unit 170 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The identification module may store various information for authenticating a user using the mobile terminal 100 and may include a User Identity Module (UIM), a Subscriber Identity Module (SIM), a Universal Subscriber Identity Module (USIM), and the like. In addition, a device having an identification module (hereinafter, referred to as an "identification device") may take the form of a smart card, and thus, the identification device may be connected with the mobile terminal 100 via a port or other connection means. The interface unit 170 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and the external device.
In addition, when the mobile terminal 100 is connected with an external cradle, the interface unit 170 may serve as a path through which power is supplied from the cradle to the mobile terminal 100 or may serve as a path through which various command signals input from the cradle are transmitted to the mobile terminal 100. Various command signals or power input from the cradle may be used as a signal for identifying whether the mobile terminal 100 is accurately mounted on the cradle. The output unit 150 is configured to provide output signals (e.g., audio signals, video signals, alarm signals, vibration signals, etc.) in a visual, audio, and/or tactile manner. The output unit 150 may include a display unit 151, an audio output module 152, an alarm unit 153, and the like.
The display unit 151 may display information processed in the mobile terminal 100. For example, when the mobile terminal 100 is in a phone call mode, the display unit 151 may display a User Interface (UI) or a Graphical User Interface (GUI) related to a call or other communication (e.g., text messaging, multimedia file downloading, etc.). When the mobile terminal 100 is in a video call mode or an image capturing mode, the display unit 151 may display a captured image and/or a received image, a UI or GUI showing a video or an image and related functions, and the like.
Meanwhile, when the display unit 151 and the touch pad are overlapped with each other in the form of a layer to form a touch screen, the display unit 151 may serve as an input device and an output device. The display unit 151 may include at least one of a Liquid Crystal Display (LCD), a thin film transistor LCD (TFT-LCD), an Organic Light Emitting Diode (OLED) display, a flexible display, a three-dimensional (3D) display, and the like. Some of these displays may be configured to be transparent to allow a user to view from the outside, which may be referred to as transparent displays, and a typical transparent display may be, for example, a TOLED (transparent organic light emitting diode) display or the like. Depending on the particular desired implementation, mobile terminal 100 may include two or more display units (or other display devices), for example, mobile terminal 100 may include an external display unit (not shown) and an internal display unit (not shown). The touch screen may be used to detect a touch input pressure as well as a touch input position and a touch input area.
The audio output module 152 may convert audio data received by the wireless communication unit 110 or stored in the memory 160 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output module 152 may provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output module 152 may include a speaker, a buzzer, and the like.
The alarm unit 153 may provide an output to notify the mobile terminal 100 of the occurrence of an event. Typical events may include call reception, message reception, key signal input, touch input, and the like. In addition to audio or video output, the alarm unit 153 may provide output in different ways to notify the occurrence of an event. For example, the alarm unit 153 may provide an output in the form of vibration, and when a call, a message, or some other incoming communication (communicating communication) is received, the alarm unit 153 may provide a tactile output (i.e., vibration) to inform the user thereof. By providing such a tactile output, the user can recognize the occurrence of various events even when the user's mobile phone is in the user's pocket. The alarm unit 153 may also provide an output notifying the occurrence of an event via the display unit 151 or the audio output module 152.
The memory 160 may store software programs and the like for processing and controlling operations performed by the controller 180, or may temporarily store data (e.g., a phonebook, messages, still images, videos, and the like) that has been or will be output. Also, the memory 160 may store data regarding various ways of vibration and audio signals output when a touch is applied to the touch screen.
The memory 160 may include at least one type of storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. Also, the mobile terminal 100 may cooperate with a network storage device that performs a storage function of the memory 160 through a network connection.
The controller 180 generally controls the overall operation of the mobile terminal. For example, the controller 180 performs control and processing related to voice calls, data communications, video calls, and the like. In addition, the controller 180 may include a multimedia module 181 for reproducing (or playing back) multimedia data, and the multimedia module 181 may be constructed within the controller 180 or may be constructed separately from the controller 180. The controller 180 may perform a pattern recognition process to recognize a handwriting input or a picture drawing input performed on the touch screen as a character or an image.
The power supply unit 190 receives external power or internal power and provides appropriate power required to operate various elements and components under the control of the controller 180.
The various embodiments described herein may be implemented in a computer-readable medium using, for example, computer software, hardware, or any combination thereof. For a hardware implementation, the embodiments described herein may be implemented using at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, an electronic unit designed to perform the functions described herein, and in some cases, such embodiments may be implemented in the controller 180. For a software implementation, the implementation such as a process or a function may be implemented with a separate software module that allows performing at least one function or operation. The software codes may be implemented by software applications (or programs) written in any suitable programming language, which may be stored in the memory 160 and executed by the controller 180.
Up to this point, the mobile terminal 100 has been described in terms of its functionality. In addition, the mobile terminal 100 in the embodiment of the present invention may be a mobile terminal such as a folder type, a bar type, a swing type, a slide type, and other various types, and is not limited herein.
The mobile terminal 100 as shown in fig. 1 may be configured to operate with communication systems such as wired and wireless communication systems and satellite-based communication systems that transmit data via frames or packets.
A communication system in which a mobile terminal according to the present invention is operable will now be described with reference to fig. 2.
Such communication systems may use different air interfaces and/or physical layers. For example, the air interface used by the communication system includes, for example, Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunications System (UMTS) (in particular, Long Term Evolution (LTE)), global system for mobile communications (GSM), and the like. By way of non-limiting example, the following description relates to a CDMA communication system, but such teachings are equally applicable to other types of systems.
Referring to fig. 2, the CDMA wireless communication system may include a plurality of mobile terminals 100, a plurality of Base Stations (BSs) 270, Base Station Controllers (BSCs) 275, and a Mobile Switching Center (MSC) 280. The MSC280 is configured to interface with a Public Switched Telephone Network (PSTN) 290. The MSC280 is also configured to interface with a BSC275, which may be coupled to the base station 270 via a backhaul. The backhaul line may be constructed according to any of several known interfaces, which may include, for example, european/american standard high capacity digital lines (E1/T1), Asynchronous Transfer Mode (ATM), network protocol (IP), point-to-point protocol (PPP), frame relay, high-rate digital subscriber line (HDSL), Asymmetric Digital Subscriber Line (ADSL), or various types of digital subscriber lines (xDSL). It will be understood that a system as shown in fig. 2 may include multiple BSCs 275.
Each BS 270 may serve one or more sectors (or regions), each sector covered by a multi-directional antenna or an antenna pointing in a particular direction being radially distant from the BS 270. Alternatively, each partition may be covered by two or more antennas for diversity reception. Each BS 270 may be configured to support multiple frequency allocations, with each frequency allocation having a particular frequency spectrum (e.g., 1.25MHz, 5MHz, etc.).
The intersection of partitions with frequency allocations may be referred to as a CDMA channel. The BS 270 may also be referred to as a Base Transceiver Subsystem (BTS) or other equivalent terminology. In such a case, the term "base station" may be used to generically refer to a single BSC275 and at least one BS 270. The base stations may also be referred to as "cells". Alternatively, each partition of a particular BS 270 may be referred to as a plurality of cell sites.
As shown in fig. 2, a Broadcast Transmitter (BT)295 transmits a broadcast signal to the mobile terminal 100 operating within the system. A broadcast receiving module 111 as shown in fig. 1 is provided at the mobile terminal 100 to receive a broadcast signal transmitted by the BT 295. In fig. 2, several Global Positioning System (GPS) satellites 300 are shown. The satellite 300 assists in locating at least one of the plurality of mobile terminals 100.
In fig. 2, a plurality of satellites 300 are depicted, but it is understood that useful positioning information may be obtained with any number of satellites. The location information module 115 (e.g., GPS) as shown in fig. 1 is generally configured to cooperate with the satellites 300 to obtain desired positioning information. Other techniques that can track the location of the mobile terminal may be used instead of or in addition to GPS tracking techniques. In addition, at least one GPS satellite 300 may selectively or additionally process satellite DMB transmission.
As a typical operation of the wireless communication system, the BS 270 receives reverse link signals from various mobile terminals 100. The mobile terminal 100 is generally engaged in conversations, messaging, and other types of communications. Each reverse link signal received by a particular base station is processed within a particular BS 270. The obtained data is forwarded to the associated BSC 275. The BSC provides call resource allocation and mobility management functions including coordination of soft handoff procedures between BSs 270. The BSCs 275 also route the received data to the MSC280, which provides additional routing services for interfacing with the PSTN 290. Similarly, the PSTN290 interfaces with the MSC280, the MSC interfaces with the BSCs 275, and the BSCs 275 accordingly control the BS 270 to transmit forward link signals to the mobile terminal 100.
Based on the above mobile terminal hardware structure and communication system, various embodiments of the method of the present application are proposed.
As shown in fig. 3, an embodiment of the present invention provides a method for protecting privacy of a terminal, including:
s310, detecting an unlocking code input by a user in a screen locking state;
s320, if the second unlocking code is detected and the system does not operate in the low memory mode, unlocking the screen to enable the system to enter the low memory mode to operate; if the first unlocking code is detected and the system operates in the low memory mode, unlocking the screen and enabling the system to exit the low memory mode;
the low memory mode is a working mode in which the available memory of the system is gradually reduced according to a preset strategy;
the method may further comprise the following features:
optionally, after detecting the unlock code input by the user, the method further includes: if the second unlocking code is detected and the system operates in the low memory mode, judging whether the current available memory of the system is larger than or equal to a threshold value; if so, unlocking the screen to enable the system to continue to operate in the low memory mode; if not, the screen locking state is kept;
optionally, the causing the system to enter a low memory mode includes:
starting a memory filling process, applying for a specified amount of memory space from the system according to a preset initial value, and gradually applying for the memory space from the system according to a preset strategy;
the causing the system to exit low memory mode operation includes:
closing the memory filling process, and releasing all memory spaces applied by the memory filling process;
optionally, the predetermined policy comprises: every time user operation is monitored, applying for a specified number of memory spaces from the system according to a preset memory reduction step value; and/or periodically applying for a specified amount of memory space from the system according to the preset memory reduction step value;
optionally, applying for a specified number of memory spaces from the system according to the preset memory reduction step value includes:
judging whether the current available memory of the system is greater than or equal to a threshold value, if so, applying for a specified amount of memory space from the system according to a preset memory reduction step value;
in other embodiments, the system may have two working modes, and if a second unlock code input by the user is detected in the screen lock state and the system operates in the first working mode, the screen is unlocked and the first working mode in which the system operates is switched to the second working mode; if a first unlocking code input by a user is detected in the screen locking state and the system runs in the second working mode, unlocking the screen and switching the second working mode in which the system runs to the first working mode; the first working mode is a working mode which does not fill the memory space, and the second working mode is a working mode which fills the memory space; the filling treatment is as follows: the system starts a memory filling process, the memory filling process applies for a specified amount of memory space from the system according to a preset initial value, and gradually applies for the memory space from the system according to a preset strategy.
As shown in fig. 4, an embodiment of the present invention provides a terminal, including:
the detection module 401 is configured to detect an unlock code input by a user in a screen lock state;
an unlocking processing module 402, configured to unlock the screen and enable the system to enter the low memory mode for operation if the second unlocking code is detected and the system is not operating in the low memory mode; if the first unlocking code is detected and the system operates in the low memory mode, unlocking the screen and enabling the system to exit the low memory mode;
and the low memory mode is a working mode in which the available memory of the system is gradually reduced according to a preset strategy.
Optionally, the unlocking processing module 402 is configured to enable the system to enter a low memory mode, and includes: starting a memory filling process, applying for a specified amount of memory space from the system according to a preset initial value, and gradually applying for the memory space from the system according to a preset strategy;
an unlock processing module, configured to enable the system to exit from the low memory mode operation, including: and closing the memory filling process and releasing all the memory spaces applied by the memory filling process.
Optionally, the predetermined policy comprises: every time user operation is monitored, applying for a specified number of memory spaces from the system according to a preset memory reduction step value; and/or periodically applying for a specified amount of memory space from the system according to a preset memory reduction step value.
Optionally, the unlocking processing module 402 is configured to apply for a specified number of memory spaces from the system according to the preset memory reduction step value, and includes: and judging whether the current available memory of the system is greater than or equal to a threshold value, if so, applying for a specified amount of memory space from the system according to a preset memory reduction step value.
Optionally, the unlocking processing module 402 is further configured to determine whether a current available memory of the system is greater than or equal to a threshold value if the second unlocking code is detected and the system operates in the low memory mode; if so, unlocking the screen to enable the system to continue to operate in the low memory mode; if not, the screen locking state is kept
Example 1
As shown in fig. 5, a method for protecting terminal privacy of the present example includes the following steps:
step S501, detecting whether an unlocking code input by a user is received on a mobile phone screen locking interface, if so, executing step S502, otherwise, executing step S501;
step S502, determining the type of the unlock code, executing step S508 when the unlock code is the unlock code in the normal mode, and executing step S503 when the unlock code is the unlock code in the low memory mode;
step S503, unlocking the mobile phone screen, starting a resident process (memory filling process) for filling the memory in the system background, applying a specified amount of memory space to the system by the memory filling process according to a preset memory reduction initial value, and entering a low memory mode by the system;
the initial memory reduction value is a system default value or is set by a user; for example, the default memory reduction initial value of the system is 200 mbytes;
step S504, determining whether a user operation (e.g., starting a new page, sliding a list, etc.) is monitored, if yes, executing step S505, otherwise, executing step S504;
step S505, determining whether the current available memory is greater than or equal to the threshold, if so, executing step S506, otherwise, executing step S507;
wherein, the threshold is a default value of the system or is set by the user; for example, the system defaults the threshold to 300 mbytes;
step S506, the memory filling process applies for a specified amount of memory space from the system according to the preset memory reduction step value, and the step S504 is returned;
the memory reduction step value is a system default value or is set by a user; for example, the default memory reduction step size is 100 mbytes;
as the available memory in the mobile phone is smaller and smaller, the Android system may perform frequent Gc (Garbage Collection), so that the system becomes stuck when responding to the user. The system operates the card pause, and the desire of the user to use the mobile phone can be reduced.
The memory filling process calls a Native (local framework) layer method through an Android JNI (Java Native Interface) to apply for the memory, so that one process can apply for a larger memory within an Android allowed range without occurrence of OOM (Out of memory) abnormality. By setting the memory filling process as foreground service application, the process can be prevented from being killed by an Android recovery mechanism under the condition of low memory.
Step S507, judging whether the mobile phone enters a screen locking state, if so, returning to the step S501, otherwise, executing the step S507;
step S508, determine whether the system is in the low memory mode, if yes, go to step S509, otherwise go to step S510;
step S509, closing the memory filling process, releasing the memory space applied by the memory filling process (the system memory returns to normal), and the system exits the low memory mode;
step S510, unlocking the mobile phone, and operating the system in a normal mode;
the method for protecting the terminal privacy can be used in the following scenes:
(1) others ask the user to use the mobile phone;
(2) the user informs others of the unlock code (second unlock code) that the low memory mode can be entered;
(3) after the second unlocking code is input by others on the screen locking interface, the mobile phone is unlocked and enters a low memory mode;
(3) others begin to look over the phone, e.g., open a Wechat;
(4) after other people perform multiple operations (such as entering WeChat, sliding WeChat list for multiple times, turning over chat records and the like), the mobile phone enters a state of obvious display and blocking;
(5) the desire of others to look over the mobile phone is rapidly reduced due to the fact that the mobile phone is jammed in operation, and the mobile phone is returned to the user;
(6) after the user inputs the unlocking code (the first unlocking code) in the normal use mode on the screen locking interface, the mobile phone exits the low memory mode, the system memory is recovered to be normal, and the user uses the mobile phone normally.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A method of protecting terminal privacy, comprising:
detecting an unlocking code input by a user in a screen locking state;
if the second unlocking code is detected and the system does not operate in the low memory mode, unlocking the screen, and enabling the system to enter the low memory mode to operate and gradually jam; if the first unlocking code is detected and the system operates in the low memory mode, unlocking the screen and enabling the system to exit the low memory mode;
the low memory mode is a working mode in which the available memory of the system is gradually reduced according to a preset strategy;
the enabling the system to enter the low-memory mode operation and gradually locking comprises the following steps:
and starting a memory filling process, applying for a specified amount of memory space from the system according to a preset initial value, and gradually applying for the memory space from the system according to a preset strategy so as to enable the available memory of the system to be smaller and the system to be gradually stuck.
2. The method of claim 1, wherein: the causing the system to exit the low memory mode operation includes:
and closing the memory filling process and releasing all the memory spaces applied by the memory filling process.
3. The method of claim 2, wherein: the predetermined policy includes:
every time user operation is monitored, applying for a specified number of memory spaces from the system according to a preset memory reduction step value; and/or periodically applying for a specified amount of memory space from the system according to a preset memory reduction step value.
4. The method of claim 3, wherein: the applying for the specified number of memory spaces from the system according to the preset memory reduction step value comprises:
and judging whether the current available memory of the system is greater than or equal to a threshold value, if so, applying for a specified amount of memory space from the system according to a preset memory reduction step value.
5. The method of any of claims 1-4, wherein after detecting the user-entered unlock code, the method further comprises:
if the second unlocking code is detected and the system operates in the low memory mode, judging whether the current available memory of the system is larger than or equal to a threshold value; if so, unlocking the screen to enable the system to continue to operate in the low memory mode; if not, the screen locking state is kept.
6. A mobile terminal, comprising:
the detection module is used for detecting an unlocking code input by a user in a screen locking state;
the unlocking processing module is used for unlocking the screen if the second unlocking code is detected and the system does not operate in the low memory mode, so that the system enters the low memory mode to operate and is gradually blocked; if the first unlocking code is detected and the system operates in the low memory mode, unlocking the screen and enabling the system to exit the low memory mode;
the low memory mode is a working mode in which the available memory of the system is gradually reduced according to a preset strategy;
the unlocking processing module is used for enabling the system to enter the low memory mode to operate and gradually clamp, and comprises:
and starting a memory filling process, applying for a specified amount of memory space from the system according to a preset initial value, and gradually applying for the memory space from the system according to a preset strategy so as to enable the available memory of the system to be smaller and the system to be gradually stuck.
7. The mobile terminal of claim 6, wherein:
an unlock processing module, configured to enable the system to exit from the low memory mode operation, including:
and closing the memory filling process and releasing all the memory spaces applied by the memory filling process.
8. The mobile terminal of claim 7, wherein: the predetermined policy includes:
every time user operation is monitored, applying for a specified number of memory spaces from the system according to a preset memory reduction step value; and/or periodically applying for a specified amount of memory space from the system according to a preset memory reduction step value.
9. The mobile terminal of claim 8, wherein:
the unlocking processing module is used for applying for the specified amount of memory space from the system according to the preset memory reduction step value, and comprises: and judging whether the current available memory of the system is greater than or equal to a threshold value, if so, applying for a specified amount of memory space from the system according to a preset memory reduction step value.
10. The mobile terminal according to any of claims 6-9, characterized in that:
the unlocking processing module is also used for judging whether the current available memory of the system is greater than or equal to a threshold value or not if the second unlocking code is detected and the system operates in a low memory mode; if so, unlocking the screen to enable the system to continue to operate in the low memory mode; if not, the screen locking state is kept.
CN201610963309.XA 2016-10-28 2016-10-28 Method for protecting terminal privacy and terminal Active CN106529346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610963309.XA CN106529346B (en) 2016-10-28 2016-10-28 Method for protecting terminal privacy and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610963309.XA CN106529346B (en) 2016-10-28 2016-10-28 Method for protecting terminal privacy and terminal

Publications (2)

Publication Number Publication Date
CN106529346A CN106529346A (en) 2017-03-22
CN106529346B true CN106529346B (en) 2020-02-14

Family

ID=58326360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610963309.XA Active CN106529346B (en) 2016-10-28 2016-10-28 Method for protecting terminal privacy and terminal

Country Status (1)

Country Link
CN (1) CN106529346B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271332A (en) * 2011-07-18 2011-12-07 中兴通讯股份有限公司 Method and device for maintaining secrecy of terminal information
CN103945456A (en) * 2014-05-12 2014-07-23 武汉邮电科学研究院 LTE (long term evolution) base station user plane efficient UDP (user datagram protocol) data transmission optimization method based on Linux system
CN104967736A (en) * 2015-06-04 2015-10-07 上海卓易科技股份有限公司 Multi-user switching method and apparatus
CN105897430A (en) * 2016-06-22 2016-08-24 浙江德景电子科技有限公司 User management method and system for intelligent terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271332A (en) * 2011-07-18 2011-12-07 中兴通讯股份有限公司 Method and device for maintaining secrecy of terminal information
CN103945456A (en) * 2014-05-12 2014-07-23 武汉邮电科学研究院 LTE (long term evolution) base station user plane efficient UDP (user datagram protocol) data transmission optimization method based on Linux system
CN104967736A (en) * 2015-06-04 2015-10-07 上海卓易科技股份有限公司 Multi-user switching method and apparatus
CN105897430A (en) * 2016-06-22 2016-08-24 浙江德景电子科技有限公司 User management method and system for intelligent terminal

Also Published As

Publication number Publication date
CN106529346A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
CN106844029B (en) Self-management Android process freezing and unfreezing device and method
CN105188098B (en) Network switching device and network switching method of mobile terminal
CN106304037B (en) Virtual SIM card management method and device
CN106027804B (en) Unlocking method and unlocking device of mobile terminal
CN106533928B (en) Method and device for updating unread message reminding identification
CN104731480B (en) Image display method and device based on touch screen
CN106527933B (en) Control method and device for edge gesture of mobile terminal
CN106778176B (en) Information processing method and mobile terminal
CN107015756B (en) Mobile terminal and method for realizing full-screen fingerprint interaction
CN104932697B (en) Gesture unlocking method and device
CN106899958B (en) Information downloading device and method
CN106484534B (en) Control method and control device for displayed mobile terminal
CN107133508B (en) Application management method and mobile terminal
CN106648324B (en) Hidden icon control method and device and terminal
CN106371704B (en) Application shortcut layout method of screen locking interface and terminal
CN106453883B (en) Intelligent terminal and message notification processing method thereof
CN106161790B (en) Mobile terminal and control method thereof
CN107025158B (en) Sliding operation testing method and device and terminal
CN106682897B (en) Device and method for determining NFC payment
CN106412877B (en) Activation method and activation device for mobile terminal SIM card
CN106569670B (en) Device and method for processing application
CN105094733B (en) Split screen display method and device
CN109063623B (en) Fingerprint identification method, equipment and computer storage medium
CN106774860B (en) Intelligent eliminating method and system for information corner mark
CN106302943B (en) Unlocking method and unlocking device of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200115

Address after: Room 301, floor 3, building 2, No.28, Jiuhe Road, Jianggan District, Hangzhou City, Zhejiang Province

Applicant after: Qishitong Group Co., Ltd

Address before: 518000 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor

Applicant before: Nubian Technologies Ltd.

GR01 Patent grant
GR01 Patent grant