CN106778339A - A kind of method for secret protection and device, mobile terminal - Google Patents

A kind of method for secret protection and device, mobile terminal Download PDF

Info

Publication number
CN106778339A
CN106778339A CN201611085019.6A CN201611085019A CN106778339A CN 106778339 A CN106778339 A CN 106778339A CN 201611085019 A CN201611085019 A CN 201611085019A CN 106778339 A CN106778339 A CN 106778339A
Authority
CN
China
Prior art keywords
grip
value
default
secret protection
grip value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611085019.6A
Other languages
Chinese (zh)
Other versions
CN106778339B (en
Inventor
郭同兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611085019.6A priority Critical patent/CN106778339B/en
Publication of CN106778339A publication Critical patent/CN106778339A/en
Application granted granted Critical
Publication of CN106778339B publication Critical patent/CN106778339B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of method for secret protection and device, mobile terminal.The method for secret protection includes:The first grip value that user applies is obtained, wherein, the first grip value is that the user does the grip produced during the first deliberate action to terminal;Judge whether the first grip value meets the first default secret protection condition;If the first grip value meets the described first default secret protection condition, into privacy protection mode.The method meets the first default secret protection condition in the first grip value; when the user of i.e. currently used terminal is non-owner; terminal enters privacy protection mode; so that the information that personal information of owner etc. is not intended to be seen by other people is protected, the situation for being effectively prevented from the leakage of personal information of owner occurs.

Description

A kind of method for secret protection and device, mobile terminal
Technical field
The present invention relates to field of information security technology, more particularly to a kind of method for secret protection and device, mobile terminal.
Background technology
In the information age, with the increasing of information content, the security of the personal information such as proprietary information, privacy information gradually into It is problem of concern.The necessity of people's life is had become due to mobile intelligent terminals such as mobile phones, and it is often protected The substantial amounts of personal information of user is deposited, for example, bank account information, privacy photo etc..Once mobile terminal is by outside user Other people use, and the personal information of user may have the risk of leakage, especially the proprietary information and privacy information of user Etc. will greatly be challenged, the security of personal information is influenceed.
The content of the invention
The embodiment of the present invention provides a kind of method for secret protection and device, mobile terminal, can lift the peace of personal information Quan Xing.
The present invention provides a kind of method for secret protection, and it includes:
The first grip value that user applies is obtained, wherein, the first grip value is pre- for the user does first to terminal If the grip produced during action;
Judge whether the first grip value meets the first default secret protection condition;
If the first grip value meets the described first default secret protection condition, into privacy protection mode.
The present invention also provides a kind of privacy protection device, and it includes:
Acquiring unit, the first grip value for obtaining user's applying, wherein, the first grip value is the user couple Terminal does the grip produced during the first deliberate action;
First judging unit, for judging whether the first grip value meets the first default secret protection condition;
Secret protection unit, if meeting the described first default secret protection condition for the first grip value, enters Privacy protection mode.
The present invention provides a kind of mobile terminal again, and it includes:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs appointing for present invention offer A kind of method for secret protection.
The present invention provides a kind of method for secret protection and device, mobile terminal.The method for secret protection is by obtaining user The the first grip value for applying, wherein, the first grip value is that the user does the grip produced during deliberate action to terminal;Sentence Whether the first grip value of breaking meets the first default secret protection condition.If the first grip value meets described first presetting Secret protection condition, then illustrate the user of currently used terminal for non-owner, and now terminal enters privacy protection mode, makes The information that is not intended to be seen by other people such as personal information of owner is protected, be effectively prevented from owner's The situation of leakage of personal information occurs, and lifts the security of personal information.
Brief description of the drawings
Fig. 1 is the flow chart of method for secret protection in the preferred embodiment of the present invention.
Fig. 2 is user's operation chart in the preferred embodiment of the present invention.
Fig. 3 is the another flow chart of method for secret protection in the preferred embodiment of the present invention.
Fig. 4 is the structural representation of privacy protection device in the preferred embodiment of the present invention.
Fig. 5 is another structural representation of privacy protection device in the preferred embodiment of the present invention.
Fig. 6 is the another structural representation of privacy protection device in the preferred embodiment of the present invention.
Fig. 7 is the structural representation of mobile terminal of the invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, the every other implementation that those skilled in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Term " first ", " second " in the present invention etc. can be used to describe various elements herein, but these elements are not It is limited by these terms.These terms are only used for distinguishing first element and another element.For example, not departing from the present invention Scope in the case of, the first control can be referred to as the second control, and similarly, the second control can be referred to as the first control. First control and the second control both control, but it is not same control.Additionally, term " comprising " and " having " and it Any deformation, it is intended that covering non-exclusive is included.
Fig. 1 is refer to, Fig. 1 is the flow chart of method for secret protection in the preferred embodiment of the present invention.The method for secret protection Can apply to the electronic equipments such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA) On, it is not particularly limited herein.
The method for secret protection in this preferred embodiment is explained below.
In step S101, the first grip value that user applies is obtained, wherein, the first grip value is the user couple Terminal does the grip produced during the first deliberate action;
When user's using terminal, typically can by terminal it is hand held in.Clicked in screen when user's finger, slided During operation, hand can produce certain grip to act on terminal.The grip value that different user is produced to terminal is different.Therefore, may be used Whether the user that terminal is currently in use to be distinguished by grip value is owner.
In the preferred embodiment, by setting holding power transducer on the side frame of terminal, when user holds terminal simultaneously And when doing the first deliberate action to terminal, holding power transducer will obtain first grip value of the user to terminal, in the present embodiment In, terminal will generate grip vector after the first grip value is got according to the grip value.
Wherein, deliberate action including sliding the action of screen, to click on the action of screen, the action of pressing keys etc. multiple dynamic One or more in work, it is not particularly limited herein.In addition, the position of holding power transducer is not limited to the side frame of terminal, Can be other positions, be not specifically limited herein.
Fig. 2 is referred to, Fig. 2 is user's operation chart in the preferred embodiment of the present invention.In fig. 2, user can pass through Operation is slided up and down on screen to browse information.When user holds terminal slides up and down operation, if sliding up and down behaviour Used as deliberate action, then the holding power transducer on side frame will obtain first grip value of the user to terminal.
In a preferred embodiment, obtain user also includes to the first grip value of terminal:The user is obtained to described Second grip value of terminal, wherein, the second grip value does the grip produced during the second deliberate action to terminal for user.In the reality Apply in example, terminal will generate the grip vector according to the first grip value and the second grip value, i.e., in the embodiment In, grip vector is comprising two vectors of element.
For example, when the first deliberate action is to slide the action of screen, when the second deliberate action is the action of pressing keys, the One grip value is that user does the grip value for sliding that holding power transducer is detected when screen is acted to terminal, and the second grip value is user The grip value that holding power transducer is detected when the action of pressing keys is done to terminal.It is unit with the first grip value and the second grip value Element forms grip vector, i.e., now grip vector includes two elements.It should be noted that in other preferred embodiments, eventually The holding power transducer at end can also obtain more kinds of grip values, and now grip vector is the vector comprising more elements, herein It is not particularly limited.
In step s 102, judge whether the first grip value meets the first default secret protection condition;
In the preferred embodiment, judge whether the first grip value meets the first default secret protection condition and specifically wrap Include:Judge whether the first grip value is preset with first and held in the first default grip value scope, and the first grip value Whether the absolute value of the difference of power average value is less than the first preset error value.Usually, what the first preset error value was set is smaller, sentences Disconnected precision is higher, and the first preset error value can carry out value according to actual conditions, be not particularly limited herein.
In the preferred embodiment, the acquisition methods bag of the first default grip value scope and the first default grip average value Include:(N is integer, and N values are bigger, and the first default grip value scope and the first default grip are average in preceding N to obtain terminal owner Value is more accurate, and such as N is integer more than or equal to 100) it is secondary that when using, holding power transducer obtains owner, to do certain to terminal pre- If N number of grip value during action.Maximum in N number of grip value is set to the upper limit of the first default grip value scope, is held N number of The minimum value of force value is set to the lower limit of the first default grip value scope, so as to obtain the first default grip value scope.By N number of grip Value averages to obtain the first default grip average value.
In a preferred embodiment, when the first grip value and second two grip values of grip value is obtained, i.e., grip to Amount be with the first grip value and the second grip value as element it is vectorial when, it is pre- according to the above-mentioned first default grip value scope and first If the acquisition methods of grip average value, can get respectively the default grip value scope of second corresponding with the second grip value and Second default grip average value.According to the first default grip average value and the default grip average value of the second grip average value generation to Amount.
It is understood that when grip vector is vectorial comprising more elements, preset grip average value vector and The corresponding default grip value scope of each element can be obtained using aforesaid way.Certainly, in other preferred embodiments, in advance If the acquisition methods of grip value scope and default grip average value vector can also use other modes, specific limit is not done herein System.In addition, the default grip value scope corresponding with the multiple elements in grip vector can be with identical, it is also possible to different.For example, First default grip value scope and the second default grip value scope can be with identical, it is also possible to different, are not particularly limited herein.
In a preferred embodiment, when grip vector be with the first grip value and the second grip value as element it is vectorial when, Judge whether the grip vector meets the first default secret protection condition, specifically include:Whether judge the first grip value In the first default grip value scope, the second grip value whether in the second default grip value scope, and the grip to Whether the mould of the difference of amount and default grip average value vector (judges the first grip value and institute less than the second preset error value State the difference of the first default grip average value square difference for presetting grip average value with second with the second grip value square Whether sum is less than the second preset error value).
In the preferred embodiment, the first preset pressure value scope, and first are in when terminal judges go out the first grip value When the absolute value of the difference of grip value and the first preset pressure average value is less than the first preset error value, currently used terminal is illustrated User is owner, and now terminal will determine the first grip value and be unsatisfactory for first and preset secret protection condition, terminal without Privacy protection mode need to be opened, user may browse through the full content in terminal.It is not in when terminal judges go out the first grip value First preset pressure value scope, and/or the absolute value of the difference of the first grip value and the first preset pressure average value is not less than first Preset error value, the then user for illustrating currently used terminal is non-owner.Now terminal will determine the first grip value Meet the first default secret protection condition, terminal will perform step S103.
In a preferred embodiment, when grip vector be with the first grip value and the second grip value as element it is vectorial when, If the first grip of terminal judges value is in the first preset pressure value scope, the second grip value is in the second preset pressure value model Enclose, and the mould of the difference of grip vector and preset pressure average value vector is less than the second preset error value, then judge the grip Vector is unsatisfactory for the first default secret protection condition, and now terminal will not carry out secret protection.If terminal judges the first grip value Be not in the first preset pressure value scope, and/or the second grip value is not in the second preset pressure value scope, and/or pressure to The mould of the difference of amount and preset pressure average value vector is not less than the second preset error value, then judge that the pressure vector meets first pre- If secret protection condition, now terminal will perform step S103.In the preferred embodiment, held using the first grip value and second Two parameters of force value judge whether active user is owner, for only with a determination methods for grip value, The accuracy that it judges is higher, and more conducively the operating habit of owner is made a distinction with the operating habit of other users.
In step s 103, if the first grip value meets the described first default secret protection condition, into privacy Protected mode.
When terminal judges go out the first grip value meets the first default secret protection condition, terminal will be into secret protection Pattern.Here, privacy protection mode can be with use pattern for only partial function, other are related to the function of owner's personal information Cannot access.For example, in privacy protection mode, active user can only call, and cannot check address list, photograph album, make With functions such as application programs.Certainly, privacy protection mode is not limited to above-mentioned form, it would however also be possible to employ other forms, herein not Do concrete restriction.
In addition, privacy protection mode can also set to generate according to the selection of owner.For example, owner is by phase Volume, bank application are arranged in privacy protection mode, then when other users use the terminal, other users will be unable to Photograph album and bank application are accessed, but can be not disposed in privacy protection mode with accessing address list, chat application etc. Function.
In a preferred embodiment, for erroneous judgement situation caused by preventing owner certain operating habit from changing Occur, before hidden protected mode is entered, also include:Obtain the authentication information of the user;Judge the authentication Whether information matches with default authentication information;If the authentication information and the default authentication information are not Match somebody with somebody, then into privacy protection mode.Here, authentication information can be password, the answer for pre-setting problem etc., herein It is not limited.
For example, when terminal judges go out active user for non-owner, terminal will be prompted to active user's input password, or The ejection of person's terminal includes the dialog box of default problem;Active user is by according to the prompting input password of terminal or default problem Answer;Terminal will determine that whether the password of user input or answer match with the password or answer for pre-setting.If matching, Illustrate that active user, for owner, will not now enter privacy protection mode.If mismatching, active user is further illustrated It is non-owner, now terminal will be into privacy protection mode.So it is possible to prevente effectively from certain operation is practised because of owner The situation of erroneous judgement occurs caused by used change, while also improving the accuracy of method for secret protection.
This preferred embodiment provides a kind of method for secret protection, and it passes through to obtain the first grip value of user's applying;Judge Whether the first grip value meets the first default secret protection condition;If it is default hidden that the first grip value meets described first Private protective condition, then into privacy protection mode.Whether the method recognizes active user using user to the grip value of terminal It is owner, is performed when active user is determined for non-owner and enter privacy protection mode, so that other is used Family in browsing terminal about the data such as personal information of owner, cannot effectively ensure the peace of the personal information of owner Quan Xing.
Fig. 3 is refer to, Fig. 3 is the another flow chart of method for secret protection in the preferred embodiment of the present invention.The secret protection Method can apply to the electronics such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA) In equipment, it is not particularly limited herein.
The method for secret protection in this preferred embodiment is explained below.
In step s 201, the first grip value that user applies is obtained, wherein, the first grip value is the user couple Terminal does the grip produced during the first deliberate action;
When user's using terminal, typically can by terminal it is hand held in.Clicked in screen when user's finger, slided During operation, hand can produce certain grip to act on terminal.The grip value that different user is produced to terminal is different.Therefore, may be used Whether the user that terminal is currently in use to be distinguished by grip value is owner.
In the preferred embodiment, by setting holding power transducer on the side frame of terminal, when user holds terminal simultaneously And when doing the first deliberate action to terminal, holding power transducer will obtain first grip value of the user to terminal.Herein, preset One or more during the multiple such as the action including slip screen, action, the action of pressing keys of click screen is acted is acted, It is not particularly limited herein.In addition, the position of holding power transducer is not limited to the side frame of terminal, can be other positions, It is not specifically limited herein.
In step S202, judge whether the first grip value meets the first default secret protection condition;
In the preferred embodiment, judge whether the first grip value meets the first default secret protection condition and specifically wrap Include:Judge whether the first grip value is preset with first and held in the first default grip value scope, and the first grip value Whether the absolute value of the difference of power average value is less than the first preset error value.Usually, what the first preset error value was set is smaller, sentences Disconnected precision is higher, and the first preset error value can carry out value according to actual conditions, be not particularly limited herein.
Here, the acquisition methods of the first default grip value scope and the first default grip average value vector include:Obtain eventually Terminal master preceding N (N is integer, and N values are bigger, and the first default grip value scope and the first default grip average value are more accurate, If N is the integer more than or equal to 100) it is secondary when using, when holding power transducer acquisition owner does certain deliberate action to terminal N number of grip value.Maximum in N number of grip value is set to the upper limit of the first default grip value scope, by N number of grip value most Small value is set to the lower limit of the first default grip value scope, so as to obtain the first default grip value scope.N number of grip value is averaged Value obtains the first default grip average value.In other preferred embodiments, the first default grip value scope and first default is held The acquisition methods of power average value can also use other modes, be not particularly limited herein.
In the preferred embodiment, default grip value scope, and the first grip are in when terminal judges go out the first grip value When the average value of the difference of value and default grip average value is less than the first preset error value, the user for illustrating currently used terminal is machine In person, now terminal will determine the first grip value and be unsatisfactory for the first default secret protection condition master, and terminal need not open hidden Private protected mode, user may browse through the full content in terminal.When terminal judges go out the first grip value be not in first preset Grip value scope, and/or the absolute value of the difference of the first grip value and the first default grip average value presets error not less than first Value, then illustrate the non-owner of user of currently used terminal.Now terminal will determine the first grip value and meet first pre- If secret protection condition, terminal will perform step S203.
In step S203, if the first grip value meets the described first default secret protection condition, judge described Whether the first grip value meets the second default secret protection condition;
In the preferred embodiment, owner can set different access rights to different people.That is, to not With people, different privacy protection modes are set.For example, average by the above-mentioned first default grip value scope and the first default grip The acquisition methods of value get the default grip value scope of threeth corresponding with the mother of owner and the 3rd default grip Average value, that is, generate the default secret protection condition of second corresponding with mother.It is interior that owner setting mother can access The content held and cannot access, material is thus formed specified authority privacy protection mode.It is understood that specifying authority hidden Private protected mode refers to that mother may only access the content that owner specifies, and cannot addressing machine master it is unspecified in Hold (such as:Specify in authority privacy protection mode, mother can access the address list of owner, but lack of competence accesses owner's sheet The photograph album of people).
In addition, in the preferred embodiment, whether terminal judges the first grip value meets the second default secret protection condition Specific method with above judge the first grip value whether meet the first default secret protection condition method it is similar, in order to illustrate The terseness of book, no longer illustrates herein.
The second default secret protection condition is unsatisfactory for when terminal judges go out the first grip value, then illustrates that active user is owner The user that I specifies is (such as:The mother of owner), now, terminal will perform step S204.Held when terminal judges go out first Force value meets the second default secret protection condition, then illustrate that active user is strange user, rather than the use that owner specifies Family, now terminal will execution step S205.
In step S204, if the first grip value is unsatisfactory for the described second default secret protection condition, enters and refer to Determine authority privacy protection mode;
When terminal judges go out the first grip value is unsatisfactory for the second default secret protection condition, illustrate that active user is owner The user that I specifies, terminal will enter the specified authority privacy protection mode corresponding with specified user for pre-setting, Allow that the user for specifying browses corresponding information according to its authority.
In step S205, if the first grip value meets the described second default secret protection condition, access entitlements Limitation privacy protection mode.
When terminal judges go out the first grip value meets the second default secret protection condition, illustrate that active user is strange use Access entitlements are limited privacy protection mode by family, terminal.In the preferred embodiment, authority limitation privacy protection mode refers to footpath between fields Raw user's lack of competence accesses the pattern of whole personal information of owner.Certainly, in other preferred embodiments, authority limitation Privacy protection mode can also set according to the selection of owner and generate.For example, owner is by photograph album, Bank application journey Sequence, address list, chat application software design patterns are in authority limitation privacy protection mode, then when strange user uses the terminal When, strange user will be unable to access photograph album, bank application, address list, chat application software, but can call etc. not It is arranged on the function in authority limitation privacy protection mode.
In addition, in the preferred embodiment, being only provided with two default secret protection condition (the i.e. first default secret protections Condition and the second default secret protection condition), and two default secret protection conditions correspond to owner and owner's sheet respectively The user that people specifies.It is understood that in other preferred embodiments, owner can set the use that more are specified Family, can set more default secret protection conditions accordingly.
For example, user's number that owner specifies is two, respectively first specifies user and second to specify user.When Judge the first grip value to meet the second default secret protection condition that (it specifies user corresponding with first, generation method and the The generation method of one default secret protection condition is similar to) when, illustrate that active user is not the first specified user.Terminal is further sentenced The first grip value of breaking whether meet the 3rd default secret protection condition (it specifies user corresponding with second, generation method with The generation method of the first default secret protection condition is similar to), if judging, the first grip value is unsatisfactory for the 3rd default privacy and protects Guard strip part, then illustrate that active user is the second specified user, and now, terminal will perform specify corresponding with the second specified user Authority privacy protection mode.
This preferred embodiment provides a kind of method for secret protection, and it passes through to obtain the first grip value of user's applying;Judge Whether the first grip value meets the first default secret protection condition;If it is default hidden that the first grip value meets described first Private protective condition, then judge whether the first grip value meets the second default secret protection condition, if the first grip value The second default secret protection condition is unsatisfactory for, is then entered and is specified authority privacy protection mode;If the grip vector meets second Secret protection condition is preset, then access entitlements limitation privacy protection mode.The method is using user to the first grip value of terminal To recognize whether active user is owner, when determine active user for non-owner when, further determine whether for The user that owner specifies.If judging the user that active user specifies for owner, perform and specify authority privacy to protect Shield pattern so that the user for specifying can access the partial personal information of owner with using terminal, and cannot access and not referred to The personal information of authority is determined, so as to protect the security of the personal information for not being designated authority.If judging, active user is Strange user, then perform authority limitation privacy protection mode so that strange user cannot relevant owner in browsing terminal Any personal information, effectively ensures the security of the personal information of owner.
Fig. 4 is refer to, Fig. 4 is the structural representation of the privacy protection device of the preferred embodiment of the present invention.The secret protection Device 300 can apply to the electricity such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA) In sub- equipment, it is not particularly limited herein.
Privacy protection device 300 in the present embodiment includes:Acquiring unit 301, the first judging unit 302 and secret protection Unit 303.Wherein, acquiring unit 301 is used to obtain the first grip value of user's applying, wherein, the first grip value is institute State the grip produced when user does the first deliberate action to the terminal;First judging unit 302 be used to judging the grip to Whether amount meets the first default secret protection condition;If secret protection unit 303 meets described first for the grip vector Default secret protection condition, then into privacy protection mode.
When user's using terminal, typically can by terminal it is hand held in.Clicked in screen when user's finger, slided During operation, hand can produce certain grip to act on terminal.The grip value that different user is produced to terminal is different.Therefore, may be used Whether the user that terminal is currently in use to be distinguished by grip value is owner.
In the preferred embodiment, when user holds terminal and does the first deliberate action to terminal, acquiring unit 301 First grip value of the user to terminal will be obtained, and grip vector is generated according to the first grip value.Herein, deliberate action One or more in multiple actions such as action, the action of click screen, the action of pressing keys including slip screen, herein It is not particularly limited.
In a preferred embodiment, grip vector can be comprising a vector for element.For example, working as acquiring unit 301 Acquisition user is done when sliding grip value when screen is acted, and for the ease of description, user is done into slip screen herein and acts when institute The grip value of acquisition is referred to as slip grip value.So grip vector is to slide grip value as the vector of element.
In a preferred embodiment, acquiring unit 301 is additionally operable to:Obtain second grip of the user to the terminal Value, wherein, the second grip value does the grip produced during the second deliberate action to terminal for user.Acquiring unit 301 is according to described First grip value and the second grip value generation grip vector, i.e., in this embodiment, grip vector is to include the first grip The vector of value and the second grip value.
In other preferred embodiments, acquiring unit 301 can also obtain more kinds of grip values, and now grip vector is bag Vector containing more elements, is not particularly limited herein.
The first grip value that acquiring unit 301 will get is transferred to the first judging unit 302, by the first judging unit 302 judge whether the first grip value meets the first default secret protection condition.
In the preferred embodiment, the first judging unit 302 specifically for:Judge the first grip value whether in the One default grip value scope, and whether the absolute value of the difference of the first grip value and the first default grip average value is less than first Preset error value.Usually, what the first preset error value was set is smaller, and the precision of judgement is higher, and the first preset error value can be with Value is carried out according to actual conditions, is not particularly limited herein.
Here, during the first default grip value scope refers to the top n grip value corresponding with certain deliberate action, with maximum Grip value be the first default grip value scope the upper limit, with lower limit that minimum grip value is the first default grip value scope The the first grip value scope for being formed.
In one embodiment, when grip vector be with the first grip value and the second grip value as element it is vectorial when, first Grip value to that should have the first default grip value scope and the first default grip average value, to that should have first to preset hold by the second grip value Force value scope and the second default grip average value, the default grip average value vector corresponding with grip vector, wherein, it is default to hold It with the first default grip average value and the second grip average value is the vector of element that power average value vector is.
In a preferred embodiment, when grip vector be with the first grip value and the second grip value as element it is vectorial when, First judging unit 302 specifically for:Judge the first grip value whether in the first default grip value scope, described second Grip value whether in the second default grip value scope, and grip vector (from the first grip value and the second grip value generate to Amount) and default grip average value vector difference mould whether less than the second preset error value (judge the first grip value with The difference of the described first default grip average value square is put down with the second grip value and the difference of the second default grip average value Whether square sum is less than the second preset error value).
In the preferred embodiment, when the first judging unit 302 judges that the first grip value is in the first default grip value Scope, and the absolute value of the difference of the first grip value and the first default grip average value, when being less than the first preset error value, illustrate ought The user of preceding using terminal is owner, and now the first judging unit 302 will determine the first grip value and be unsatisfactory for first Default secret protection condition, without opening privacy protection mode, user may browse through the full content in terminal.When the first judgement Unit 302 judges that the first grip value is not in the first default grip value scope, and/or the first grip value and the first default grip The absolute value of the difference of average value is not less than the first preset error value, then illustrate the non-owner of user of currently used terminal.This When the first judging unit 302 will determine the first grip value and meet the first default secret protection condition.
In a preferred embodiment, when grip vector be with the first grip value and the second grip value as element it is vectorial when, If the first judging unit 302 judges that the first grip value is in the first default grip value scope, the second grip value is in second Default grip value scope, and the grip is vectorial and mould of difference of default grip average value vector is less than the second preset error value, Then the first judging unit 302 judges that the grip vector is unsatisfactory for the first default secret protection condition, and now terminal will not carry out hidden Private protection.If the first judging unit 302 judges that the first grip value is not in the first default grip value scope, and/or the second grip Value is not in the second default grip value scope, and/or grip is vectorial and mould of difference of default grip average value vector is not less than the Two preset error values, then the judgement of the first judging unit 302 grip is vectorial meets the first default secret protection condition.
When the first judging unit 302 judges that grip vector meets the first default secret protection condition, first judges Unit 302 will send the first signal to secret protection unit 303 so that secret protection unit 303 enters hidden according to the first signal Private protected mode.Here, privacy protection mode can be with use pattern for only partial function, other are related to owner's personal information Function cannot access.For example, in privacy protection mode, active user can only call, and cannot check address list, phase Volume, use the functions such as application program.Certainly, privacy protection mode is not limited to above-mentioned form, it would however also be possible to employ other forms, This is not particularly limited.
In addition, privacy protection mode can also set to generate according to the selection of owner.For example, owner is by phase Volume, bank application are arranged in privacy protection mode, then when other users use the terminal, other users will be unable to Photograph album and bank application are accessed, but can be not disposed in privacy protection mode with accessing address list, chat application etc. Function.
In a preferred embodiment, refer to shown in Fig. 5, Fig. 5 is privacy protection device in the preferred embodiment of the present invention Another structural representation.The privacy protection device 300 also includes obtaining judging unit 304, wherein, obtain judging unit 304 and wrap Include acquisition subelement 3041 and judgment sub-unit 3042.When the first judging unit 302 judges that the first grip value meets first During default secret protection condition, the first judging unit 302 sends second to the acquisition subelement 3041 obtained in judging unit 304 Signal so that obtain the authentication information that subelement 3041 obtains user according to secondary signal.Here, authentication information can Think password, the answer for pre-setting problem etc., be not limited herein.
Obtain subelement 3041 and authentication information is transferred to judgment sub-unit 3042, judged by judgment sub-unit 3042 Whether the authentication information matches with default authentication information.If judgment sub-unit 3042 judges that the authentication is believed Breath is mismatched with default authentication information, then further illustrate active user for non-owner, now judgment sub-unit 3042 will send the 3rd signal to secret protection unit 303 so that secret protection unit 303 is protected according to the 3rd signal into privacy Shield pattern.If judgment sub-unit 3042 judges that the authentication information is matched with default authentication information, illustrate current User is owner, and now terminal will not enter privacy protection mode.So it is possible to prevente effectively from because of certain behaviour of owner The situation for making erroneous judgement caused by custom changes occurs, while also improving the accuracy of the judgement of privacy protection device 300.
This preferred embodiment provides a kind of privacy protection device 300, its pass through that acquiring unit 301 obtains that user applies the One grip value;First judging unit 302 judges whether the first grip value meets the first default secret protection condition;If first Judging unit 302 judges that the first grip value meets the described first default secret protection condition, then secret protection unit 303 Will be into privacy protection mode.The device 300 recognizes whether active user is machine using user to the first grip value of terminal In person, when the first judging unit 302 determines active user for non-owner, secret protection unit 303 performs entrance to master Privacy protection mode, so that other users cannot be in browsing terminal about the data such as personal information of owner, effectively Ground ensures the security of the personal information of owner.
Fig. 6 is refer to, Fig. 6 is the another structural representation of privacy protection device in the preferred embodiment of the present invention.The privacy Protection device 400 can apply to personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA) Deng on electronic equipment, it is not particularly limited herein.
Privacy protection device 400 in this preferred embodiment includes that acquiring unit 401, the first judging unit 402, second are sentenced Disconnected unit 403 and secret protection unit 404, wherein, secret protection unit 404 includes specifying authority secret protection subelement 4041 With authority limitation secret protection subelement 4042.
When user's using terminal, typically can by terminal it is hand held in.Clicked in screen when user's finger, slided During operation, hand can produce certain grip to act on terminal.The grip value that different user is produced to terminal is different.Therefore, may be used Whether the user that terminal is currently in use to be distinguished by grip value is owner.
In the preferred embodiment, when user holds terminal and does the first deliberate action to terminal, acquiring unit 401 First grip value of the user to terminal will be obtained.Herein, deliberate action includes sliding the action of screen, clicks on the dynamic of screen One or more in multiple actions such as work, action of pressing keys, it is not particularly limited herein.
The first grip value that acquiring unit 401 will get is transferred to the first judging unit 402, by the first judging unit 402 judge whether the first grip value meets the first default secret protection condition.
In the preferred embodiment, the first judging unit 402 specifically for:Judge the first grip value whether in the One default grip value scope, and whether the absolute value of the difference of the first grip value and the first default grip average value is less than first Preset error value.Usually, what the first preset error value was set is smaller, and the precision of judgement is higher, and the first preset error value can be with Value is carried out according to actual conditions, is not particularly limited herein.
Here, during the first default grip value scope refers to the top n grip value corresponding with certain deliberate action, with maximum Grip value be the first default grip value scope the upper limit, with lower limit that minimum grip value is the first default grip value scope The the first grip value scope for being formed.
In the preferred embodiment, when the first judging unit 402 judges that the first grip value is in the first default grip value Scope, and the absolute value of the difference of the first grip value and the first default grip average value, when being less than the first preset error value, illustrate ought The user of preceding using terminal is owner, and now the first judging unit 402 will determine the first grip value and be unsatisfactory for first Default secret protection condition, terminal need not open privacy protection mode, and user may browse through the full content in terminal.When first Judging unit 402 judges that the first grip value is not in the first default grip value scope, and/or the first grip value is preset with first The absolute value of the difference of grip average value is not less than the first preset error value, then illustrate the non-owner's sheet of user of currently used terminal People.Now the first judging unit 402 will determine the default secret protection condition of the first grip value satisfaction first.
When the first judging unit 402 judges that grip vector meets the first default secret protection condition, first judges The first grip value is transferred to the second judging unit 403 by unit 402, and the first grip value is judged by the second judging unit 403 Whether second default secret protection condition is met.Wherein, the second default hidden protective condition refers to the user specified with owner Corresponding default secret protection condition.When the second judging unit 403, to judge that the first grip value is unsatisfactory for second default hidden During private protective condition, the user that active user specifies for owner is illustrated.Second judging unit 403 will be to secret protection unit Specified authority secret protection subelement 4041 in 404 sends the 4th signal so that specify authority secret protection subelement 4041 The specified authority privacy protection mode corresponding with specified user is entered according to the 4th signal so that the user for specifying can be with Corresponding information is browsed according to its authority.
When the second judging unit 403 judges that the first grip value meets the described second default secret protection condition, explanation Active user is strange user, rather than the user that owner specifies.Now, the second judging unit 403 will limit hidden to authority Private protection subelement 4042 sends the 5th signal so that authority limits secret protection subelement 4042 according to the 5th signal right of access Limit limitation privacy protection mode.In the preferred embodiment, authority limitation privacy protection mode refers to that strange user's lack of competence is visited Ask the pattern of whole personal information of owner.Certainly, in other preferred embodiments, authority limitation privacy protection mode Can be set according to the selection of owner and generated.For example, owner answers photograph album, bank application, address list, chat With software design patterns in authority limits privacy protection mode, then when strange user uses the terminal, strange user will be unable to Photograph album, bank application, address list, chat application software are accessed, but can call etc. that to be not disposed on authority limitation hidden Function in private protected mode.
In addition, in the preferred embodiment, being only provided with two default secret protection condition (the i.e. first default secret protections Condition and the second default secret protection condition), and two default secret protection conditions correspond to owner and owner's sheet respectively The user that people specifies.It is understood that in other preferred embodiments, owner can set the use that more are specified Family, can set more default secret protection conditions accordingly.
This preferred embodiment provides a kind of privacy protection device 400, its pass through that acquiring unit 401 obtains that user applies the One grip value;First judging unit 402 judges whether the first grip value meets the first default secret protection condition;If described First grip value meets the described first default secret protection condition, then the second judging unit 403 judges that the first grip value is It is no to meet the second default secret protection condition, if the first grip value is unsatisfactory for the second default secret protection condition, specify Authority secret protection subelement 4041 will be into specified authority privacy protection mode;If the first grip value meets second presetting Secret protection condition, then authority limitation secret protection subelement 4042 access entitlements are limited into privacy protection mode.The device 400 Whether active user is owner is recognized to the first grip value of terminal using user, when the first judging unit 402 judges When going out active user for non-owner, the second judging unit 403 further determines whether the user specified for owner, if Judge the user that active user specifies for owner, then specify authority secret protection subelement 4041 to perform and specify authority hidden Private protected mode so that the user for specifying can access the partial personal information of owner with using terminal, and cannot access not The personal information of authority is designated, so as to protect the security of the personal information for not being designated authority.If judging current use Family is strange user, then authority limitation secret protection subelement 4042 performs authority limitation privacy protection mode so that strange use Family in browsing terminal about any personal information of owner, cannot effectively ensure the safety of the personal information of owner Property.
The present invention also provides a kind of mobile terminal, such as panel computer, mobile phone mobile terminal, refers to Fig. 7, and Fig. 7 is this The mobile terminal structure schematic diagram that inventive embodiments are provided.The mobile terminal 500 can include radio frequency (RF, Radio Frequency) circuit 501, include the memory 502, input block of one or more computer-readable recording mediums 503rd, display unit 504, sensor 505, include one or the processor 506 and power supply of more than one processing core 507 grade parts.It will be understood by those skilled in the art that the mobile terminal structure shown in Fig. 7 is not constituted to mobile terminal Limit, part more more or less than diagram can be included, or combine some parts, or different part arrangements.
Radio circuit 501 can be used to receive and send messages, or in communication process signal reception and transmission, especially, by base station Downlink information receive after, transfer to one or more than one processor 506 processed;In addition, up data is activation will be related to To base station.Additionally, radio circuit 501 can also be communicated by radio communication with network and other equipment.
Memory 502 can be used to store application program and data.Include and can hold in the application program of the storage of memory 502 Line code.Application program can constitute various functions module.Processor 506 is by running application journey of the storage in memory 502 Sequence, so as to perform various function application and data processing.
Input block 503 can be used to receive numeral, character information or the user's characteristic information (such as fingerprint) of input, and Produce the keyboard relevant with user's setting and function control, mouse, action bars, optics or trace ball signal input.Input Unit 503 may include one or more in touch display screen, physical keyboard, function key, fingerprint recognition module etc..
Display unit 504 can be used to showing by user input information or be supplied to the information and mobile terminal of user Various graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.
Mobile terminal 500 may also include at least one sensor 505, such as ambient light sensor, proximity transducer, gravity Acceleration transducer etc..In the preferred embodiment, sensor 505 at least includes holding power transducer, and holding power transducer can be put In on the side frame position of mobile terminal 500, it is also possible to be placed in the other positions of mobile terminal 500, be not particularly limited herein. When user takes mobile terminal 500 and mobile terminal 500 is operated, holding power transducer is used to obtain user to mobile terminal 500 grip effect size, and the grip value of acquisition is transferred to processor 506, should according to what is pre-set by processor 506 Corresponding function is performed with program.
Processor 506 is the control centre of mobile terminal 500, using various interfaces and the whole mobile terminal of connection 500 various pieces, by running or performing application program of the storage in memory 502, and call storage in memory Data in 502, perform the various functions and processing data of mobile terminal 500, so as to carry out overall prison to mobile terminal 500 Control.
Mobile terminal 500 also includes power supply 507 (such as battery), for being powered to all parts.Certainly, mobile terminal 500 can also will not be repeated here including voicefrequency circuit, camera, bluetooth module etc..
In the preferred embodiment, the processor 506 in mobile terminal obtains user to mobile whole by holding power transducer The first grip value at end 500, wherein, the first grip value is default dynamic for the user does first to the mobile terminal 500 As when the grip that produces.It should be noted that processor 506 can also obtain user to movement by other devices or method First grip value of terminal 500, the method that processor 506 obtains the first grip value is not limited to be obtained by holding power transducer Take, as long as first grip value of the user to mobile terminal 500 can be got.
Processor 506 will further determine whether the first grip value meets first after the first grip value is got Default secret protection condition;If the first grip value meets the described first default secret protection condition, into secret protection Pattern.
In a preferred embodiment, processor 506 perform judge the first grip value whether meet first preset it is hidden It is specific to perform during private protective condition:Judge the first grip value whether in the first default grip value scope, and described first Whether the absolute value of the difference of grip value and the first default grip average value is less than the first preset error value.When processor 506 judges Go out the first grip value and be not in the described first default grip value scope, and/or the first grip value is pre- with described first If the absolute value of the difference of grip average value is not less than first preset error value, processor 506 will judge first grip Value meets the described first default secret protection condition, and execution is entered privacy protection mode by processor 506.
In a preferred embodiment, processor 506 perform obtain user to the first grip value of mobile terminal 500 when, Also perform:Obtain the second grip value that the user applies;Wherein, the second grip value is done for the user to the terminal The grip produced during the second deliberate action;
Processor 506 judges that whether the first grip value after the first default grip value scope, is also held in execution Whether row judges the second grip value in the second default grip value scope;
Processor 506 perform judge the first grip value and first preset grip average value difference absolute value whether It is specific to perform during less than the first preset error value:Judge the difference of the first grip value and the first default grip average value Square with square sum of the second grip value and the difference of the second default grip average value whether less than the second default error Value.
In a preferred embodiment, processor 506 is being performed before entering privacy protection mode, is also executed the following steps: Obtain the authentication information of the user;Judge whether the authentication information matches with default authentication information; If the authentication information is mismatched with the default authentication information, into privacy protection mode.
In a preferred embodiment, processor 506 meets the described first default privacy and protects judging the grip vector After guard strip part, also perform:Judge whether the first grip value meets the second default secret protection condition;If described first holds Force value is unsatisfactory for the described second default secret protection condition, then enter and specify authority privacy protection mode;If or described first hold Force value meets the described second default secret protection condition, then access entitlements limitation privacy protection mode.
It should be noted that the application program of each step of the execution of above-mentioned processor 506 can be stored in memory 502 It is interior.Memory 506 completes the privacy of mobile terminal 500 by running or performing application program of the storage in memory 502 Defencive function.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion described in detail in certain embodiment Point, the detailed description above with respect to method for secret protection is may refer to, here is omitted.
Privacy protection device provided in an embodiment of the present invention is for example computer, panel computer, the hand with touch function Machine etc., the privacy protection device belongs to same design with the method for secret protection in foregoing embodiments, is protected in the privacy The either method provided in the method for secret protection embodiment can be provided on protection unit, its implement process refer to it is described Method for secret protection embodiment, here is omitted.
It should be noted that for method for secret protection of the present invention, this area common test personnel be appreciated that All or part of flow of method for secret protection described in the embodiment of the present invention is realized, can be by computer program to control phase The hardware of pass is completed, and the computer program can be stored in a computer read/write memory medium, if storage is in terminal In memory, and by least one computing device in the terminal, secret protection side as described is may include in the process of implementation The flow of the embodiment of method.Wherein, described storage medium can be magnetic disc, CD, read-only storage (ROM, Read Only Memory), random access memory (RAM, Random Access Memory) etc..
Each functional unit in the embodiment of the present invention can be integrated in a processing module, or unit list Solely it is physically present, it is also possible to which two or more units are integrated in a module.Above-mentioned integrated module can both be used The form of hardware is realized, it would however also be possible to employ the form of software function module is realized.If the integrated module is with software function The form of module is realized and as independent production marketing or when using, it is also possible to which storage is situated between in an embodied on computer readable storage In matter.Storage medium mentioned above can be read-only storage, disk or CD etc..Above-mentioned each device or system, can be with Perform the method in correlation method embodiment.
In sum, although the present invention it is disclosed above with preferred embodiment, but above preferred embodiment and be not used to limit The system present invention, one of ordinary skill in the art without departing from the spirit and scope of the present invention, can make various changes and profit Adorn, therefore protection scope of the present invention is defined by the scope that claim is defined.

Claims (11)

1. a kind of method for secret protection, it is characterised in that including:
The first grip value that user applies is obtained, wherein, the first grip value is default dynamic for the user does first to terminal As when the grip that produces;
Judge whether the first grip value meets the first default secret protection condition;
If the first grip value meets the described first default secret protection condition, into privacy protection mode.
2. method for secret protection according to claim 1, it is characterised in that described to judge whether the first grip value is full The default secret protection condition of foot first, including:Judge the first grip value whether in the first default grip value scope, and institute Whether the absolute value of difference of the first grip value and the first default grip average value is stated less than the first preset error value;
If the first grip value meets the described first default secret protection condition, into privacy protection mode, including:If institute State the first grip value and be not in the described first default grip value scope, and/or the first grip value is preset with described first and is held The absolute value of the difference of power average value is not less than first preset error value, then judge that the first grip value meets described first Default secret protection condition, and enter privacy protection mode.
3. method for secret protection according to claim 2, it is characterised in that the first grip that the acquisition user applies Value, also includes:Obtain the second grip value that the user applies;Wherein, the second grip value is the user to the end Do the grip produced during the second deliberate action in end;
It is described to judge that whether the first grip value, in the first default grip value scope, also includes:Judge second grip Whether value is in the second default grip value scope;
Whether the absolute value of the difference for judging the first grip value and the first default grip average value is default less than first to be missed Difference, including:Judge the first grip value and the first default grip average value difference square with second grip Whether square sum of the difference of value and the second default grip average value is less than the second preset error value;
If the first grip value meets the described first default secret protection condition, into privacy protection mode, including: If the first grip value is not in the described first default grip value scope, and/or the second grip value is not in described the Two default grip value scopes, and/or the first grip value and the first default grip average value difference square with it is described Square sum of the difference of the second grip value and the second default grip average value is not less than second preset error value, then judge institute State the first grip value and the second grip value meets the described first default secret protection condition, and enter privacy protection mode.
4. method for secret protection according to claim 1, it is characterised in that before the entrance privacy protection mode, Also include:
Obtain the authentication information of the user;
Judge whether the authentication information matches with default authentication information;
If the authentication information is mismatched with the default authentication information, into privacy protection mode.
5. method for secret protection according to claim 1, it is characterised in that if meeting institute in the first grip value State after the first default secret protection condition, also include:
Judge whether the first grip value meets the second default secret protection condition;
If the first grip value is unsatisfactory for the described second default secret protection condition, enters and specify authority secret protection mould Formula;Or
If the first grip value meets the described second default secret protection condition, access entitlements limitation privacy protection mode.
6. a kind of privacy protection device, it is characterised in that including:
Acquiring unit, the first grip value for obtaining user's applying, wherein, the first grip value is the user to terminal Do the grip produced during the first deliberate action;
First judging unit, for judging whether the first grip value meets the first default secret protection condition;
Secret protection unit, if meeting the described first default secret protection condition for the first grip value, into privacy Protected mode.
7. privacy protection device according to claim 6, it is characterised in that first judging unit is used to judge described Whether the first grip value is in the first default grip value scope, and the difference that the first grip value presets grip average value with first Absolute value whether be less than the first preset error value;
If the secret protection unit is not in the described first default grip value scope, and/or institute for the first grip value The absolute value of difference of the first grip value and the first default grip average value is stated not less than first preset error value, is then sentenced The fixed first grip value meets the described first default secret protection condition, and enters privacy protection mode.
8. privacy protection device according to claim 7, it is characterised in that the acquiring unit is additionally operable to obtain the use The second grip value that family applies;Wherein, the second grip value is product when the user does the second deliberate action to the terminal Raw grip;
Whether first judging unit is additionally operable to judge the second grip value in the second default grip value scope;Judge institute State the first grip value and the first default grip average value difference square with the second grip value and the second default grip Whether square sum of the difference of average value is less than the second preset error value;
If the secret protection unit is not in the described first default grip value scope, and/or institute for the first grip value State the second grip value and be not in the described second default grip value scope, and/or the first grip value is preset with described first and is held Square sum of square difference for presetting grip average value with the second grip value and second of the difference of power average value is not less than institute The second preset error value is stated, then judges that the first grip value and the second grip value meet the described first default secret protection Condition, and enter privacy protection mode.
9. privacy protection device according to claim 6, it is characterised in that the privacy protection device is also sentenced including acquisition Disconnected unit, the acquisition judging unit includes obtaining subelement and judgment sub-unit;
The subelement that obtains is used to obtain the authentication information of the user;
The judgment sub-unit is used to judge whether the authentication information matches with default authentication information;
If the secret protection unit is used for the authentication information being mismatched with the default authentication information, enter Privacy protection mode.
10. privacy protection device according to claim 6, it is characterised in that the privacy protection device also includes second Judging unit, second judging unit is used to judge whether the first grip value meets the second default secret protection condition;
The secret protection unit includes specifying authority secret protection subelement and authority limitation secret protection subelement;The finger If determine authority secret protection subelement is unsatisfactory for the described second default secret protection condition for the first grip value, enter Specify authority privacy protection mode;If authority limitation secret protection subelement meets described for the first grip value Two preset secret protection conditions, then access entitlements limitation privacy protection mode.
A kind of 11. mobile terminals, it is characterised in that including:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs such as claim 1 to right It is required that the method for secret protection described in 5 any one.
CN201611085019.6A 2016-11-30 2016-11-30 A kind of method for secret protection and device, mobile terminal Expired - Fee Related CN106778339B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611085019.6A CN106778339B (en) 2016-11-30 2016-11-30 A kind of method for secret protection and device, mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611085019.6A CN106778339B (en) 2016-11-30 2016-11-30 A kind of method for secret protection and device, mobile terminal

Publications (2)

Publication Number Publication Date
CN106778339A true CN106778339A (en) 2017-05-31
CN106778339B CN106778339B (en) 2019-08-13

Family

ID=58914772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611085019.6A Expired - Fee Related CN106778339B (en) 2016-11-30 2016-11-30 A kind of method for secret protection and device, mobile terminal

Country Status (1)

Country Link
CN (1) CN106778339B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100476A (en) * 2015-07-28 2015-11-25 努比亚技术有限公司 Device and method for unlocking mobile terminal
CN105100118A (en) * 2015-08-28 2015-11-25 努比亚技术有限公司 Authentication device and method
CN105122256A (en) * 2013-04-19 2015-12-02 高通股份有限公司 Grip force sensor array for one-handed and multimodal interaction on handheld devices and methods
CN105573466A (en) * 2015-12-11 2016-05-11 广东欧珀移动通信有限公司 Mobile terminal control method and apparatus and mobile terminal
CN105872250A (en) * 2016-05-30 2016-08-17 努比亚技术有限公司 Method and device for automatically recognizing owner identity of mobile terminal
CN105930076A (en) * 2016-04-12 2016-09-07 捷开通讯(深圳)有限公司 Mobile communication terminal and method thereof for hiding selected object

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105122256A (en) * 2013-04-19 2015-12-02 高通股份有限公司 Grip force sensor array for one-handed and multimodal interaction on handheld devices and methods
CN105100476A (en) * 2015-07-28 2015-11-25 努比亚技术有限公司 Device and method for unlocking mobile terminal
CN105100118A (en) * 2015-08-28 2015-11-25 努比亚技术有限公司 Authentication device and method
CN105573466A (en) * 2015-12-11 2016-05-11 广东欧珀移动通信有限公司 Mobile terminal control method and apparatus and mobile terminal
CN105930076A (en) * 2016-04-12 2016-09-07 捷开通讯(深圳)有限公司 Mobile communication terminal and method thereof for hiding selected object
CN105872250A (en) * 2016-05-30 2016-08-17 努比亚技术有限公司 Method and device for automatically recognizing owner identity of mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment

Also Published As

Publication number Publication date
CN106778339B (en) 2019-08-13

Similar Documents

Publication Publication Date Title
CN102292932B (en) Passive Secure execution
CN105955587B (en) A kind of hiden application icon display method and device
CN106022079B (en) A kind of unlocked by fingerprint method and terminal
CN106227437B (en) A kind of unlocked by fingerprint method and terminal
CN103699825A (en) Display apparatus and method for operating the same
CN109583356A (en) Fingerprint identification method and Related product
CN104361272A (en) Fingerprint input information processing method and system and mobile terminal
US9275210B2 (en) System and method of enhancing security of a wireless device through usage pattern detection
CN105956431B (en) A kind of application protection processing method and mobile terminal
CN104573456A (en) Terminal interface control method
CN104809402B (en) A kind of information fuzzy display methods and terminal
CN108171037A (en) Using startup method, terminal and computer storage media
CN106228054A (en) Auth method and device
CN107450839A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN107862194A (en) A kind of method, device and mobile terminal of safety verification
CN107422976A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN104598792A (en) Terminal
CN108551521A (en) A kind of log-on message reminding method and mobile terminal
CN108519841A (en) Using startup method, terminal and computer readable storage medium
CN107256353A (en) Possesses the display methods of privacy protection function
CN106203038A (en) A kind of unlocking method and mobile terminal
CN105827622A (en) Method and device for protecting user information
CN106815509A (en) A kind of multimedia file guard method, device and electronic equipment
CN105930076A (en) Mobile communication terminal and method thereof for hiding selected object
CN101471981A (en) Dialing method of telephone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190813

CF01 Termination of patent right due to non-payment of annual fee