CN106778158B - A kind of information protection device and method - Google Patents

A kind of information protection device and method Download PDF

Info

Publication number
CN106778158B
CN106778158B CN201611059841.5A CN201611059841A CN106778158B CN 106778158 B CN106778158 B CN 106778158B CN 201611059841 A CN201611059841 A CN 201611059841A CN 106778158 B CN106778158 B CN 106778158B
Authority
CN
China
Prior art keywords
user
application program
mobile terminal
allow
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611059841.5A
Other languages
Chinese (zh)
Other versions
CN106778158A (en
Inventor
李成
陈鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HEYU HEALTH TECHNOLOGY Co.,Ltd.
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201611059841.5A priority Critical patent/CN106778158B/en
Publication of CN106778158A publication Critical patent/CN106778158A/en
Application granted granted Critical
Publication of CN106778158B publication Critical patent/CN106778158B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/70Multimodal biometrics, e.g. combining information from different biometric modalities

Abstract

The invention proposes a kind of information protection device and methods, this method comprises: the biometric feature of mobile terminal detection user;Biometric feature of the mobile terminal based on the user detected, present the user it is corresponding allow using application program;Mobile terminal detect the user when triggering the application program of the presentation, according to be pre-configured with the user it is corresponding allow using application program right of using functions, for the user provide it is described allow using application program corresponding function.A kind of information protection device of the present invention and method, can effectively improve the information security of mobile terminal, and the other users except owner is effectively prevent to steal the information in mobile terminal.

Description

A kind of information protection device and method
Technical field
The present invention relates to field of information security technology more particularly to a kind of information protection device and methods.
Background technique
As mobile terminal is quickly popularized, the information security of mobile terminal is more and more important.When mobile terminal loss, or move Dynamic terminal is by other users except mobile terminal owner in use, the important information in mobile terminal is (for example, short message or wechat letter Breath etc.) it may reveal;Mobile payment function (for example, Alipay or bank application) in mobile terminal may be stolen With.
Summary of the invention
The technical problem to be solved by the present invention is to provide a kind of information protection device and method, can overcome the prior art Middle mobile terminal by the user except owner in use, information be easy leakage defect.
To achieve the above object, a kind of information protection device provided by the invention, comprising:
Detection module, for detecting the biometric feature of user;
It is corresponding that the user is presented for the biometric feature based on the user detected in first protective module Allow using application program;
Second protective module, for detecting the user when triggering the application program of the presentation, according to preparatory Configure the user it is corresponding allow using application program right of using functions, for the user provide it is described allow using Application program corresponding function.
Preferably, described device further include:
Logging modle, for the user using it is described allow using application program corresponding function after, it is mobile Terminal makes in the application program usage record for storing the user from the background, and to the application program that setting user provides the user With record.
Preferably, described device further include:
Recovery module, for the user using it is described allow using application program corresponding function after, if institute State user it is described allow using application program in revise information, then detect setting user biometric feature When, restore the information that the user revises.
Preferably, described device further include:
Closedown module, for the user using it is described allow using application program corresponding function after, setting Forbid after fixed duration the user using it is described allow using application program corresponding function.
Preferably, the user biological identification feature includes at least following one:
User fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint.
In addition, to achieve the above object, the present invention also proposes a kind of information protecting method, comprising:
The biometric feature of mobile terminal detection user;
Biometric feature of the mobile terminal based on the user detected, present the user it is corresponding allow using Application program;
Mobile terminal is detecting the user when triggering the application program of the presentation, according to being pre-configured with the use Family is corresponding allow using application program right of using functions, for the user provide it is described allow using application program Corresponding function.
Preferably, the method also includes: make configuring the user and corresponding to user described in the access right of application program With it is described allow using application program corresponding function after, mobile terminal makes in the application program for storing the user from the background The application program usage record of the user is provided with record, and to setting user.
Preferably, the method also includes:
The user using it is described allow using the corresponding function of application program to configure the user corresponding using journey After the access right of sequence, if the user it is described allow using application program obtain access right application program in delete Breath is converted to, then in the biometric feature of the setting user detected, mobile terminal restores the information that the user revises.
Preferably, the method also includes:
The user using it is described allow using application program corresponding function after, mobile terminal setting when Forbid after long the user using it is described allow using application program corresponding function.
Preferably, the user biological identification feature includes at least following one:
User fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint.
A kind of information protection device of the present invention and method, can effectively improve the information security of mobile terminal, effectively Prevent the other users except owner from stealing the information in mobile terminal.
Detailed description of the invention
The hardware structural diagram of Fig. 1 mobile terminal of each embodiment to realize the present invention;
Fig. 2 is the schematic diagram according to user fingerprints hide application program of first embodiment of the invention;
Fig. 3 is the information protecting method flow chart of first embodiment of the invention;
Fig. 4 is the information protecting method flow chart of second embodiment of the invention;
Fig. 5 is the information protection device composed structure schematic diagram of third embodiment of the invention;
Fig. 6 is the information protection device composed structure schematic diagram of fourth embodiment of the invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the present invention is realized in description with reference to the drawings.In subsequent description, use For indicate element such as " module ", " component " or " unit " suffix only for being conducive to explanation of the invention, itself There is no specific meanings.Therefore, " module " can be used mixedly with " component ".
Mobile terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as moving Phone, smart phone, laptop, digit broadcasting receiver, PDA (personal digital assistant), PAD (tablet computer), PMP The mobile terminal of (portable media player), navigation device etc. and such as number TV, desktop computer etc. are consolidated Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that in addition to being used in particular for moving Except the element of purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Fig. 1 to realize the present invention the mobile terminal of each embodiment hardware configuration signal.
Mobile terminal 100 may include wireless communication unit 110, A/V (audio/video) input unit 120, user's input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power supply unit 190 Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups shown Part.More or fewer components can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more components, allows mobile terminal 100 and wireless communication system Or the radio communication between network.For example, wireless communication unit may include broadcasting reception module 111, mobile communication module 112, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel Relevant information.Broadcast channel may include satellite channel and/or terrestrial channel.Broadcast management server, which can be, to be generated and sent The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information And send it to the server of terminal.Broadcast singal may include TV broadcast singal, radio signals, data broadcasting Signal etc..Moreover, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Closing information can also provide via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 receives.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of digital multimedia broadcasting (DMB) Program guide (EPG), digital video broadcast-handheld (DVB-H) electronic service guidebooks (ESG) etc. form and exist.Broadcast Receiving module 111 can receive signal broadcast by using various types of broadcast systems.Particularly, broadcasting reception module 111 It can be wide by using such as multimedia broadcasting-ground (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video It broadcasts-holds (DVB-H), the Radio Data System of forward link media (MediaFLO@), received terrestrial digital broadcasting integrated service (ISDB-T) etc. digit broadcasting system receives digital broadcasting.Broadcasting reception module 111, which may be constructed such that, to be adapted to provide for extensively Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via the received broadcast singal of broadcasting reception module 111 and/ Or broadcast related information can store in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal may include that voice is logical Talk about signal, video calling signal or according to text and/or Multimedia Message transmission and/or received various types of data.
The Wi-Fi (Wireless Internet Access) of the support mobile terminal of wireless Internet module 113.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved in the module may include WLAN (Wireless LAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting short range communication.Some examples of short-range communication technology include indigo plant Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the location information of mobile terminal.Location information module Typical case be GPS (global positioning system).According to current technology, GPS module 115, which calculates, comes from three or more satellites Range information and correct time information and the Information application triangulation for calculating, thus according to longitude, latitude Highly accurately calculate three-dimensional current location information.Currently, it is defended for the method for calculating position and temporal information using three Star and the error that calculated position and temporal information are corrected by using an other satellite.In addition, GPS module 115 It can be by Continuous plus current location information in real time come calculating speed information.
A/V input unit 120 is for receiving audio or video signal.A/V input unit 120 may include 121 He of camera Microphone 122, camera 121 is to the static images obtained in video acquisition mode or image capture mode by image capture apparatus Or the image data of video is handled.Treated, and picture frame may be displayed on display unit 151.It is handled through camera 121 Picture frame afterwards can store in memory 160 (or other storage mediums) or be sent out via wireless communication unit 110 It send, two or more cameras 121 can be provided according to the construction of mobile terminal.Microphone 122 can be in telephone calling model, note Sound (audio data) is received via microphone in record mode, speech recognition mode etc. operational mode, and can will in this way Acoustic processing be audio data.Audio that treated (voice) data can be converted in the case where telephone calling model can The format output of mobile communication base station is sent to via mobile communication module 112.Various types of make an uproar can be implemented in microphone 122 Sound eliminates (or inhibition) algorithm to eliminate the noise or do that (or inhibition) generates during sending and receiving audio signal It disturbs.
The order that user input unit 130 can be inputted according to user generates key input data to control each of mobile terminal Kind operation.User input unit 130 allows user to input various types of information, and may include keyboard, metal dome, touch Plate (for example, the sensitive component of detection due to the variation of resistance, pressure, capacitor etc. caused by being contacted), idler wheel, rocking bar etc. Deng.Particularly, when touch tablet is superimposed upon in the form of layer on display unit 151, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (for example, mobile terminal 100 opens or closes shape State), the position of mobile terminal 100, user is for the presence or absence of contact (that is, touch input) of mobile terminal 100, mobile terminal 100 orientation, the acceleration or deceleration movement of mobile terminal 100 and direction etc., and generate for controlling mobile terminal 100 The order of operation or signal.For example, sensing unit 140 can sense when mobile terminal 100 is embodied as sliding-type mobile phone The sliding-type phone is to open or close.In addition, sensing unit 140 be able to detect power supply unit 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 may include that proximity sensor 141 will combine below Touch screen is described this.
Interface unit 170 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be storage and use each of mobile terminal 100 for verifying user It plants information and may include subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) Etc..In addition, the device (hereinafter referred to as " identification device ") with identification module can take the form of smart card, therefore, know Other device can be connect via port or other attachment devices with mobile terminal 100.Interface unit 170, which can be used for receiving, to be come from The input (for example, data information, electric power etc.) of external device (ED) and the input received is transferred in mobile terminal 100 One or more elements can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connect with external base, interface unit 170 may be used as allowing will be electric by it Power, which is provided from pedestal to the path or may be used as of mobile terminal 100, allows the various command signals inputted from pedestal to pass through it It is transferred to the path of mobile terminal.The various command signals or electric power inputted from pedestal, which may be used as mobile terminal for identification, is The no signal being accurately fitted on pedestal.Output unit 150 is configured to provide with vision, audio and/or tactile manner defeated Signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.) out.Output unit 150 may include display Unit 151, audio output module 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information handled in mobile terminal 100.For example, when mobile terminal 100 is in electricity When talking about call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file Downloading etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling mode Or when image capture mode, display unit 151 can show captured image and/or received image, show video or figure Picture and the UI or GUI of correlation function etc..
Meanwhile when display unit 151 and touch tablet in the form of layer it is superposed on one another to form touch screen when, display unit 151 may be used as input unit and output device.Display unit 151 may include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user to watch from outside, this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific Desired embodiment, mobile terminal 100 may include two or more display units (or other display devices), for example, moving Dynamic terminal may include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detecting touch Input pressure and touch input position and touch input area.
Audio output module 152 can mobile terminal be in call signal reception pattern, call mode, logging mode, It is when under the isotypes such as speech recognition mode, broadcast reception mode, wireless communication unit 110 is received or in memory 160 The audio data transducing audio signal of middle storage and to export be sound.Moreover, audio output module 152 can provide and movement The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that terminal 100 executes. Audio output module 152 may include loudspeaker, buzzer etc..
Alarm unit 153 can provide output notifying event to mobile terminal 100.Typical event can be with Including calling reception, message sink, key signals input, touch input etc..Other than audio or video output, alarm unit 153 can provide output in different ways with the generation of notification event.For example, alarm unit 153 can be in the form of vibration Output is provided, when receiving calling, message or some other entrance communications (incomingcommunication), alarm list Member 153 can provide tactile output (that is, vibration) to notify to user.By providing such tactile output, even if When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153 The output of the generation of notification event can be provided via display unit 151 or audio output module 152.
Memory 160 can store the software program etc. of the processing and control operation that are executed by controller 180, Huo Zheke Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And And memory 160 can store about the vibrations of various modes and audio signal exported when touching and being applied to touch screen Data.
Memory 160 may include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, more Media card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..Moreover, mobile terminal 100 can execute memory with by network connection The network storage device of 160 store function cooperates.
The overall operation of the usually control mobile terminal of controller 180.For example, controller 180 executes and voice communication, data Communication, video calling etc. relevant control and processing.In addition, controller 180 may include for reproducing (or playback) more matchmakers The multi-media module 181 of volume data, multi-media module 181 can construct in controller 180, or can be structured as and control Device 180 separates.Controller 180 can be with execution pattern identifying processing, by the handwriting input executed on the touchscreen or picture It draws input and is identified as character or image.
Power supply unit 190 receives external power or internal power under the control of controller 180 and provides operation each member Electric power appropriate needed for part and component.
Various embodiments described herein can be to use the calculating of such as computer software, hardware or any combination thereof Machine readable medium is implemented.Hardware is implemented, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), controller, microcontroller, microprocessor, is designed to execute function described herein processor At least one of electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180. For software implementation, the embodiment of such as process or function can with allow to execute the individual of at least one functions or operations Software module is implemented.Software code can by the software application (or program) write with any programming language appropriate Lai Implement, software code can store in memory 160 and be executed by controller 180.
So far, oneself is through describing mobile terminal according to its function.In the following, for the sake of brevity, will description such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc., which is used as, to be shown Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that using via frame or grouping send data it is all if any Line and wireless communication system and satellite-based communication system operate.
First embodiment of the invention, a kind of information protecting method, as shown in figures 2-3, comprising the following specific steps
Step S101, mobile terminal detect the biometric feature of user.
Wherein, user biological identification feature includes at least following one:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known Other feature.
The biometric feature that mobile terminal detects user is the prior art, and this will not be repeated here.
Step S102, biometric feature of the mobile terminal based on the user detected, presentation user is corresponding to be allowed to make Application program;
Specifically, step S102, comprising:
Biometric feature of the mobile terminal based on the user detected hides the corresponding application journey being forbidden to use of user Sequence, presentation user is corresponding allow using application program.
Such as: as shown in Fig. 2, the mobile phone that mobile terminal is detected based on the fingerprint sensor at mobile terminal back The fingerprint of main child hides corresponding various game, bank application and the payment being forbidden to use of child owner in Fig. 2 box The application programs such as treasured;The corresponding educational application program of mobile terminal child owner is presented.
The application programs such as the various game that can effectively avoid mobile terminal child owner from indulging;And it can effectively keep away Exempt from mobile terminal child owner branch as caused by the internet payments application program such as maloperation bank application and Alipay The behavior of paying;Child is encouraged to use educational application program;While cultivated child's good living habit, effective protection movement The financial security of terminal owner.
Step S103, mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with user It is corresponding allow using application program right of using functions, provided for user allow using application program corresponding function Energy.
Specifically, step S103, comprising:
Mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user The right of using functions of the application program used, provided for user allow using application program whole corresponding functions or part Corresponding function.
Such as: client iris of the mobile terminal based on the borrow mobile terminal user detected is borrowed according to being pre-configured with Mobile terminal user is corresponding allow using application program right of using functions, provide permission to borrow mobile terminal user The whole corresponding functions or wechat program circle of friends function of the voice communication used, and it is micro- to forbid borrow mobile terminal user to use Believe the other function of program.Can effectively avoid immobile terminal owner user temporarily borrow mobile terminal using when usurp machine Main wechat payment function is paid, and the safety of payment of mobile terminal owner is effectively protected.Meanwhile, it is capable to effectively keep away Exempt from immobile terminal owner user temporarily borrow mobile terminal using when peep the instant communication message of mobile terminal owner, and/ Or message is sent by contact person of the wechat of the mobile terminal owner malice into wechat, effectively protect mobile terminal owner Individual privacy and information security.
For another example: user fingerprints of the mobile terminal based on the borrow mobile terminal user detected are borrowed according to being pre-configured with Mobile terminal user is corresponding allow using application program access right, for borrow mobile terminal user provide allow using Voice communication whole corresponding functions or stock application program look facility, and forbid borrowing mobile terminal user using stock The Stock Trading function of ticket application program.Immobile terminal owner user can be effectively avoided temporarily to borrow mobile terminal use When usurp owner stock application program carry out Stock Trading, effectively protect the property safety of mobile terminal owner.
Second embodiment of the invention, a kind of information protecting method, as shown in figure 4, comprising the following specific steps
Step S201, mobile terminal detect the biometric feature of user.
Wherein, user biological identification feature includes at least following one:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known Other feature.
The biometric feature that mobile terminal detects user is the prior art, and this will not be repeated here.
Step S202, biometric feature of the mobile terminal based on the user detected, presentation user is corresponding to be allowed to make Application program;
Specifically, step S202, comprising:
Biometric feature of the mobile terminal based on the user detected hides the corresponding application journey being forbidden to use of user Sequence, presentation user is corresponding allow using application program.
Such as: the finger for mobile terminal child owner that mobile terminal is detected based on the fingerprint sensor at mobile terminal back Line hides the application programs such as corresponding various game, bank application and the Alipay being forbidden to use of child owner;It presents and moves The dynamic corresponding educational application program of terminal child owner.
The application programs such as the various game that can effectively avoid mobile terminal child owner from indulging;And it can effectively keep away Exempt from mobile terminal child owner branch as caused by the internet payments application program such as maloperation bank application and Alipay The behavior of paying;Child is encouraged to use educational application program;While cultivated child's good living habit, effective protection movement The financial security of terminal owner.
Step S203, mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with user It is corresponding allow using application program right of using functions, provided for user allow using application program corresponding function Energy.
Specifically, step S203, comprising:
Mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user The right of using functions of the application program used, provided for user allow using application program whole corresponding functions or part Corresponding function.
Such as: client iris of the mobile terminal based on the borrow mobile terminal user detected is borrowed according to being pre-configured with Mobile terminal user is corresponding allow using application program right of using functions, provide permission to borrow mobile terminal user The whole corresponding functions or wechat program circle of friends function of the voice communication used, and it is micro- to forbid borrow mobile terminal user to use Believe the other function of program.Can effectively avoid immobile terminal owner user temporarily borrow mobile terminal using when usurp machine Main wechat payment function is paid, and the safety of payment of mobile terminal owner is effectively protected.Meanwhile, it is capable to effectively keep away Exempt from immobile terminal owner user temporarily borrow mobile terminal using when peep the instant communication message of mobile terminal owner, and/ Or message is sent by contact person of the wechat of the mobile terminal owner malice into wechat, effectively protect mobile terminal owner Individual privacy and information security.
For another example: user fingerprints of the mobile terminal based on the borrow mobile terminal user detected are borrowed according to being pre-configured with Mobile terminal user is corresponding allow using application program access right, for borrow mobile terminal user provide allow using Voice communication whole corresponding functions or stock application program look facility, and forbid borrowing mobile terminal user using stock The Stock Trading function of ticket application program.Immobile terminal owner user can be effectively avoided temporarily to borrow mobile terminal use When usurp owner stock application program carry out Stock Trading, effectively protect the property safety of mobile terminal owner.
Step S204, mobile terminal stores the application program usage record of user on backstage, and provides use to setting user The application program usage record at family.
Specifically, step S204, comprising:
User using allow using application program corresponding function after, mobile terminal is answered in backstage storage user The application program usage record of user is provided with program usage record, and to setting user.
Setting user can be the owner of mobile terminal, be also possible to the other users of mobile terminal owner setting.
Such as: borrow mobile terminal user using allow using voice communication application program repertoire and wechat After program circle of friends function, mobile terminal backstage store borrow mobile terminal user application program usage record, and to Mobile terminal owner provides the application program usage record for borrowing mobile terminal user.
The case where user for capableing of prompting mobile terminal owner borrow mobile terminal uses application program, such as pass through voice Talk application program malicious call 110 or 119 is expected someone's call;Or malice replys wechat program circle of friends.
For another example: child owner using allow using game application repertoire after, mobile terminal is rear Platform stores the application program usage record of child owner, and uses note to the application program that mobile terminal owner provides child owner Record.
It can help the time of parent's effective monitoring child play game, and play game playing habits, child can be helped to establish Good living habit.
Step S205, if user allow using application program in revise information, in the setting user detected When biometric feature, mobile terminal restores the information that user revises.
Specifically, step S205, comprising:
If user modifies in the application program for obtaining access right or delete information, mobile terminal is used in backstage storage Family obtain access right application program in modify or delete before information, and detect setting user biology know When other feature, restore the information that user modifies or deleted in the application program for obtaining access right.
Such as: it malicious modification or is deleted in the instant messaging application program for obtaining access right if borrowing mobile terminal user Except information, then mobile terminal stores on backstage and borrows mobile terminal user in the instant messaging application program for obtaining access right Information before modification or deletion, and in the biometric feature of the owner detected, restore borrow mobile terminal user and exists Obtain the information modified or deleted in the instant messaging application program of access right.Effectively protect information security.
For another example: if child owner modifies or delete unintentionally letter in the instant messaging application program for obtaining access right Breath, then mobile terminal is modified in the instant messaging application program for obtaining access right in backstage storage child owner or deletes it Preceding information, and in the biometric feature of the owner detected, restore child owner in the Instant Messenger for obtaining access right Interrogate the information modified or deleted in application program.Effectively protect the information security of owner.
Step S206, mobile terminal forbid after the duration of setting user using allow using application program it is corresponding Function.
Such as: child owner using allow using game application repertoire after, mobile terminal is being set Forbid after fixed duration 30 minutes child owner using allow using game application repertoire.
Parent can be helped effectively to control the time of child play game, and play game playing habits, child can be helped to establish Good living habit.
Third embodiment of the invention, it is corresponding with first embodiment, as shown in figure 5, the present embodiment introduces a kind of information protection Device, including consisting of part:
Detection module 161, for detecting the biometric feature of user.
Wherein, user biological identification feature includes at least following one:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known Other feature.
The biometric feature that mobile terminal detects user is the prior art, and this will not be repeated here.
First protective module 162, for the biometric feature based on the user detected, the corresponding permission of presentation user The application program used;
Specifically, the first protective module 162, is used for:
Biometric feature of the mobile terminal based on the user detected hides the corresponding application journey being forbidden to use of user Sequence, presentation user is corresponding allow using application program.
Such as: the finger for mobile terminal child owner that mobile terminal is detected based on the fingerprint sensor at mobile terminal back Line hides the application programs such as corresponding various game, bank application and the Alipay being forbidden to use of child owner;It presents and moves The dynamic corresponding educational application program of terminal child owner.
The application programs such as the various game that can effectively avoid mobile terminal child owner from indulging;And it can effectively keep away Exempt from mobile terminal child owner branch as caused by the internet payments application program such as maloperation bank application and Alipay The behavior of paying;Child is encouraged to use educational application program;While cultivated child's good living habit, effective protection movement The financial security of terminal owner.
Second protective module 163, for detecting user in the application program that triggering is presented, according to being pre-configured with use Family is corresponding allow using application program right of using functions, provided for user allow using application program corresponding function Energy.
Specifically, the second protective module 163, is used for:
Mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user The right of using functions of the application program used, provided for user allow using application program whole corresponding functions or part Corresponding function.
Such as: the second protective module 163, for based on detect borrow mobile terminal user client iris, according to Be pre-configured with borrow mobile terminal user it is corresponding allow using application program right of using functions, for borrow mobile terminal User provide allow using voice communication whole corresponding functions or wechat program circle of friends function, and forbid borrowing it is mobile eventually End subscriber uses the other function of wechat program.Immobile terminal owner user can be effectively avoided temporarily to borrow mobile terminal The wechat payment function that owner is usurped when use is paid, and effectively protects the safety of payment of mobile terminal owner.Meanwhile Can effectively avoid immobile terminal owner user temporarily borrow mobile terminal using when peep the instant of mobile terminal owner Communication information, and/or message is sent by contact person of the wechat of the mobile terminal owner malice into wechat, it effectively protects The individual privacy and information security of mobile terminal owner.
For another example: the second protective module 163, for based on detect borrow mobile terminal user user fingerprints, according to Be pre-configured with borrow mobile terminal user it is corresponding allow using application program access right, for borrow mobile terminal user There is provided allow using voice communication whole corresponding functions or stock application program look facility, and forbid borrowing it is mobile eventually End subscriber uses the Stock Trading function of stock application program.Immobile terminal owner user can be effectively avoided temporarily to borrow Mobile terminal using when usurp owner stock application program carry out Stock Trading, effectively protect the wealth of mobile terminal owner Produce safety.
Fourth embodiment of the invention, corresponding with second embodiment, the present embodiment introduces a kind of information protection device, such as Fig. 4 It is shown, including consisting of part:
Detection module 161, for detecting the biometric feature of user.
Wherein, user biological identification feature includes at least following one:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known Other feature.
The biometric feature that mobile terminal detects user is the prior art, and this will not be repeated here.
First protective module 162, for the biometric feature based on the user detected, the corresponding permission of presentation user The application program used;
Specifically, the first protective module 162, is used for:
Biometric feature of the mobile terminal based on the user detected hides the corresponding application journey being forbidden to use of user Sequence, presentation user is corresponding allow using application program.
Such as: the finger for mobile terminal child owner that mobile terminal is detected based on the fingerprint sensor at mobile terminal back Line hides the application programs such as corresponding various game, bank application and the Alipay being forbidden to use of child owner;It presents and moves The dynamic corresponding educational application program of terminal child owner.
The application programs such as the various game that can effectively avoid mobile terminal child owner from indulging;And it can effectively keep away Exempt from mobile terminal child owner branch as caused by the internet payments application program such as maloperation bank application and Alipay The behavior of paying;Child is encouraged to use educational application program;While cultivated child's good living habit, effective protection movement The financial security of terminal owner.
Second protective module 163, for detecting user in the application program that triggering is presented, according to being pre-configured with use Family is corresponding allow using application program right of using functions, provided for user allow using application program corresponding function Energy.
Specifically, the second protective module 163, is used for:
Mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user The right of using functions of the application program used, provided for user allow using application program whole corresponding functions or part Corresponding function.
Such as: the second protective module 163, for based on detect borrow mobile terminal user client iris, according to Be pre-configured with borrow mobile terminal user it is corresponding allow using application program right of using functions, for borrow mobile terminal User provide allow using voice communication whole corresponding functions or wechat program circle of friends function, and forbid borrowing it is mobile eventually End subscriber uses the other function of wechat program.Immobile terminal owner user can be effectively avoided temporarily to borrow mobile terminal The wechat payment function that owner is usurped when use is paid, and effectively protects the safety of payment of mobile terminal owner.Meanwhile Can effectively avoid immobile terminal owner user temporarily borrow mobile terminal using when peep the instant of mobile terminal owner Communication information, and/or message is sent by contact person of the wechat of the mobile terminal owner malice into wechat, it effectively protects The individual privacy and information security of mobile terminal owner.
For another example: the second protective module 163, for based on detect borrow mobile terminal user user fingerprints, according to Be pre-configured with borrow mobile terminal user it is corresponding allow using application program access right, for borrow mobile terminal user There is provided allow using voice communication whole corresponding functions or stock application program look facility, and forbid borrowing it is mobile eventually End subscriber uses the Stock Trading function of stock application program.Immobile terminal owner user can be effectively avoided temporarily to borrow Mobile terminal using when usurp owner stock application program carry out Stock Trading, effectively protect the wealth of mobile terminal owner Produce safety.
Logging modle 164 provides user for storing the application program usage record of user on backstage, and to setting user Application program usage record.
Specifically, logging modle 164, is used for:
User using allow using application program corresponding function after, mobile terminal is answered in backstage storage user The application program usage record of user is provided with program usage record, and to setting user.
Setting user can be the owner of mobile terminal, be also possible to the other users of mobile terminal owner setting.
Such as: logging modle 164, for borrow mobile terminal user using allow using voice communication application program Repertoire and wechat program circle of friends function after, mobile terminal backstage store borrow mobile terminal user application journey Sequence usage record, and the application program usage record for borrowing mobile terminal user is provided to mobile terminal owner.
The case where user for capableing of prompting mobile terminal owner borrow mobile terminal uses application program, such as pass through voice Talk application program malicious call 110 or 119 is expected someone's call;Or malice replys wechat program circle of friends.
For another example: logging modle 164, for child owner using allow using game application repertoire it Afterwards, mobile terminal stores the application program usage record of child owner on backstage, and provides child owner to mobile terminal owner Application program usage record.
It can help the time of parent's effective monitoring child play game, and play game playing habits, child can be helped to establish Good living habit.
Recovery module 165, if for user allow using application program in revise information, in the setting detected When the biometric feature of user, restore the information that user revises.
Specifically, recovery module 165, is used for:
If user modifies in the application program for obtaining access right or delete information, mobile terminal is used in backstage storage Family obtain access right application program in modify or delete before information, and detect setting user biology know When other feature, restore the information that user modifies or deleted in the application program for obtaining access right.
Such as: recovery module 165, if for borrowing mobile terminal user in the instant messaging application journey for obtaining access right In sequence malicious modification or delete information, then mobile terminal backstage store borrow mobile terminal user obtain access right i.e. When messaging application in modify or delete before information restore to borrow and in the biometric feature of the owner detected The information modified or deleted in the instant messaging application program for obtaining access right with mobile terminal user.It effectively protects Information security.
For another example: recovery module 165, if being not intended in the instant messaging application program for obtaining access right for child owner Middle modification or deletion information, then mobile terminal is in backstage storage child owner in the instant messaging application program for obtaining access right Information before middle modification or deletion, and in the biometric feature of the owner detected, restoring child owner is made With the information modified or deleted in the instant messaging application program of permission.Effectively protect the information security of owner.
Closedown module 166, for forbid after the duration of setting user using allow using application program it is corresponding Function.
Such as: closedown module 166, for child owner using allow using game application repertoire it Afterwards, forbid after 30 minutes in the duration of setting child owner using allow using game application repertoire.
Parent can be helped effectively to control the time of child play game, and play game playing habits, child can be helped to establish Good living habit.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (8)

1. a kind of information protection device characterized by comprising
Detection module, for detecting the biometric feature of user;
It is corresponding fair that the user is presented for the biometric feature based on the user detected in first protective module Perhaps the application program used;
Second protective module, for detecting the user when triggering the application program of the presentation, according to being pre-configured with The user is corresponding allow using application program right of using functions, for the user provide it is described allow using answer With the corresponding function of program;
Recovery module, for the user using it is described allow using application program corresponding function after, if the use Family it is described allow using application program in revise information, then detect setting user biometric feature when, it is extensive The information that the multiple user revises.
2. the apparatus according to claim 1, which is characterized in that described device further include:
Logging modle, for the user using it is described allow using application program corresponding function after, mobile terminal Note is used in the application program usage record for storing the user from the background, and to the application program that setting user provides the user Record.
3. the apparatus according to claim 1, which is characterized in that described device further include:
Closedown module, for the user using it is described allow using application program corresponding function after, in setting Forbid after duration the user using it is described allow using application program corresponding function.
4. device according to any one of claim 1 to 3, which is characterized in that the user biological identification feature is at least Including following one:
User fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint.
5. a kind of information protecting method characterized by comprising
The biometric feature of mobile terminal detection user;
Biometric feature of the mobile terminal based on the user detected, present the user it is corresponding allow using answer Use program;
Mobile terminal is detecting the user when triggering the application program of the presentation, according to being pre-configured with the user couple Answer allow using application program right of using functions, for the user provide it is described allow using application program phase Answer function;
The user using it is described allow using application program corresponding function after, if the user allows to make described Revise information in the application program of application program acquisition access right, then it is special in the bio-identification of the setting user detected When sign, mobile terminal restores the information that the user revises.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
The user using it is described allow using application program corresponding function after, mobile terminal backstage storage described in The application program usage record of user, and the application program usage record of the user is provided to setting user.
7. according to the method described in claim 5, it is characterized in that, the method also includes:
The user using it is described allow using application program corresponding function after, mobile terminal setting duration it Forbid afterwards the user using it is described allow using application program corresponding function.
8. method according to any one of claims 5 to 7, which is characterized in that the user biological identification feature is at least Including following one:
User fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint.
CN201611059841.5A 2016-11-25 2016-11-25 A kind of information protection device and method Active CN106778158B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611059841.5A CN106778158B (en) 2016-11-25 2016-11-25 A kind of information protection device and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611059841.5A CN106778158B (en) 2016-11-25 2016-11-25 A kind of information protection device and method

Publications (2)

Publication Number Publication Date
CN106778158A CN106778158A (en) 2017-05-31
CN106778158B true CN106778158B (en) 2019-08-30

Family

ID=58911613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611059841.5A Active CN106778158B (en) 2016-11-25 2016-11-25 A kind of information protection device and method

Country Status (1)

Country Link
CN (1) CN106778158B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107526958A (en) * 2017-08-30 2017-12-29 努比亚技术有限公司 A kind of operating mode control method, terminal and computer-readable recording medium
CN109086103B (en) * 2018-08-02 2021-08-24 Oppo广东移动通信有限公司 Application display method and device, storage medium and electronic equipment
CN112494950A (en) * 2019-08-26 2021-03-16 上海海姆网络科技有限公司 Online game addiction prevention system and method
CN114675897B (en) * 2020-12-24 2023-05-05 荣耀终端有限公司 Application program starting method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942481A (en) * 2014-05-04 2014-07-23 上海鼎为电子科技(集团)有限公司 Application access method and mobile terminal
CN104427089A (en) * 2013-08-21 2015-03-18 上海晨兴希姆通电子科技有限公司 Mobile terminal and mobile terminal authority management method
CN105760731A (en) * 2016-01-25 2016-07-13 惠州Tcl移动通信有限公司 Method for starting application program based on mobile terminal and mobile terminal
CN106055949A (en) * 2016-05-26 2016-10-26 宇龙计算机通信科技(深圳)有限公司 System access and authorization method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104427089A (en) * 2013-08-21 2015-03-18 上海晨兴希姆通电子科技有限公司 Mobile terminal and mobile terminal authority management method
CN103942481A (en) * 2014-05-04 2014-07-23 上海鼎为电子科技(集团)有限公司 Application access method and mobile terminal
CN105760731A (en) * 2016-01-25 2016-07-13 惠州Tcl移动通信有限公司 Method for starting application program based on mobile terminal and mobile terminal
CN106055949A (en) * 2016-05-26 2016-10-26 宇龙计算机通信科技(深圳)有限公司 System access and authorization method and device

Also Published As

Publication number Publication date
CN106778158A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
CN105100476B (en) A kind of mobile terminal unlocking device and method
CN104915582B (en) unlocking method and device
CN104618605B (en) Mobile terminal locating method and device
CN105242847B (en) Mobile terminal and its quickly starting method of application
CN106778158B (en) A kind of information protection device and method
CN105208211B (en) A kind of privacy protection device, method and mobile terminal
CN105099669B (en) Recording encipher-decipher method and device
CN106941443A (en) One population historical record checks terminal and method
CN105095708B (en) A kind of unlocking method and device of mobile terminal
CN106775402A (en) A kind of mobile terminal and its method for realizing control
CN106909851A (en) A kind of secure storage method of data and device
CN106453056A (en) Mobile terminal and method for safely sharing picture
CN106791027A (en) A kind of terminal based on audio-frequency information searches device and method
CN104820797B (en) Using the management method and device of account
CN106791187A (en) A kind of mobile terminal and NFC method
CN105049582B (en) A kind of save set of calling record, method and display methods
CN104735254B (en) terminal screen locking method and system
CN104715262B (en) A kind of utilization, which is taken pictures, realizes the method, device and mobile terminal of intelligent label function
CN106952090A (en) Payment verification device and method
CN106445148A (en) Method and device for triggering terminal application
CN106817481A (en) A kind of terminal and terminal children's lock setting method
CN106485119A (en) A kind of application message device for opening and method
CN106534596A (en) Anti-harassment call filtering method and filtering system thereof
CN106792644A (en) Mobile terminal, server and information processing method
CN106686703A (en) Terminal and timer wakeup method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201207

Address after: 241000 No.32 Chunjiang Road, Qingshui street, Jiujiang District, Wuhu City, Anhui Province

Patentee after: Yang Jiawei

Address before: 518057 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor

Patentee before: NUBIA TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210127

Address after: Room 2003, 1801, 1804, No.13-1, Hai'an Road, Tianhe District, Guangzhou, Guangdong 510627

Patentee after: HEYU HEALTH TECHNOLOGY Co.,Ltd.

Address before: 241000 No.32 Chunjiang Road, Qingshui street, Jiujiang District, Wuhu City, Anhui Province

Patentee before: Yang Jiawei