CN106778339A - A kind of method for secret protection and device, mobile terminal - Google Patents
A kind of method for secret protection and device, mobile terminal Download PDFInfo
- Publication number
- CN106778339A CN106778339A CN201611085019.6A CN201611085019A CN106778339A CN 106778339 A CN106778339 A CN 106778339A CN 201611085019 A CN201611085019 A CN 201611085019A CN 106778339 A CN106778339 A CN 106778339A
- Authority
- CN
- China
- Prior art keywords
- grip
- value
- default
- secret protection
- grip value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000004224 protection Effects 0.000 title claims abstract description 266
- 238000000034 method Methods 0.000 title claims abstract description 57
- 230000009471 action Effects 0.000 claims abstract description 44
- 239000013598 vector Substances 0.000 description 49
- 230000006870 function Effects 0.000 description 20
- 238000003860 storage Methods 0.000 description 12
- 238000003825 pressing Methods 0.000 description 6
- 230000001681 protective effect Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 2
- 230000006854 communication Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of method for secret protection and device, mobile terminal.The method for secret protection includes:The first grip value that user applies is obtained, wherein, the first grip value is that the user does the grip produced during the first deliberate action to terminal;Judge whether the first grip value meets the first default secret protection condition;If the first grip value meets the described first default secret protection condition, into privacy protection mode.The method meets the first default secret protection condition in the first grip value; when the user of i.e. currently used terminal is non-owner; terminal enters privacy protection mode; so that the information that personal information of owner etc. is not intended to be seen by other people is protected, the situation for being effectively prevented from the leakage of personal information of owner occurs.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of method for secret protection and device, mobile terminal.
Background technology
In the information age, with the increasing of information content, the security of the personal information such as proprietary information, privacy information gradually into
It is problem of concern.The necessity of people's life is had become due to mobile intelligent terminals such as mobile phones, and it is often protected
The substantial amounts of personal information of user is deposited, for example, bank account information, privacy photo etc..Once mobile terminal is by outside user
Other people use, and the personal information of user may have the risk of leakage, especially the proprietary information and privacy information of user
Etc. will greatly be challenged, the security of personal information is influenceed.
The content of the invention
The embodiment of the present invention provides a kind of method for secret protection and device, mobile terminal, can lift the peace of personal information
Quan Xing.
The present invention provides a kind of method for secret protection, and it includes:
The first grip value that user applies is obtained, wherein, the first grip value is pre- for the user does first to terminal
If the grip produced during action;
Judge whether the first grip value meets the first default secret protection condition;
If the first grip value meets the described first default secret protection condition, into privacy protection mode.
The present invention also provides a kind of privacy protection device, and it includes:
Acquiring unit, the first grip value for obtaining user's applying, wherein, the first grip value is the user couple
Terminal does the grip produced during the first deliberate action;
First judging unit, for judging whether the first grip value meets the first default secret protection condition;
Secret protection unit, if meeting the described first default secret protection condition for the first grip value, enters
Privacy protection mode.
The present invention provides a kind of mobile terminal again, and it includes:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs appointing for present invention offer
A kind of method for secret protection.
The present invention provides a kind of method for secret protection and device, mobile terminal.The method for secret protection is by obtaining user
The the first grip value for applying, wherein, the first grip value is that the user does the grip produced during deliberate action to terminal;Sentence
Whether the first grip value of breaking meets the first default secret protection condition.If the first grip value meets described first presetting
Secret protection condition, then illustrate the user of currently used terminal for non-owner, and now terminal enters privacy protection mode, makes
The information that is not intended to be seen by other people such as personal information of owner is protected, be effectively prevented from owner's
The situation of leakage of personal information occurs, and lifts the security of personal information.
Brief description of the drawings
Fig. 1 is the flow chart of method for secret protection in the preferred embodiment of the present invention.
Fig. 2 is user's operation chart in the preferred embodiment of the present invention.
Fig. 3 is the another flow chart of method for secret protection in the preferred embodiment of the present invention.
Fig. 4 is the structural representation of privacy protection device in the preferred embodiment of the present invention.
Fig. 5 is another structural representation of privacy protection device in the preferred embodiment of the present invention.
Fig. 6 is the another structural representation of privacy protection device in the preferred embodiment of the present invention.
Fig. 7 is the structural representation of mobile terminal of the invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, the every other implementation that those skilled in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
Term " first ", " second " in the present invention etc. can be used to describe various elements herein, but these elements are not
It is limited by these terms.These terms are only used for distinguishing first element and another element.For example, not departing from the present invention
Scope in the case of, the first control can be referred to as the second control, and similarly, the second control can be referred to as the first control.
First control and the second control both control, but it is not same control.Additionally, term " comprising " and " having " and it
Any deformation, it is intended that covering non-exclusive is included.
Fig. 1 is refer to, Fig. 1 is the flow chart of method for secret protection in the preferred embodiment of the present invention.The method for secret protection
Can apply to the electronic equipments such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA)
On, it is not particularly limited herein.
The method for secret protection in this preferred embodiment is explained below.
In step S101, the first grip value that user applies is obtained, wherein, the first grip value is the user couple
Terminal does the grip produced during the first deliberate action;
When user's using terminal, typically can by terminal it is hand held in.Clicked in screen when user's finger, slided
During operation, hand can produce certain grip to act on terminal.The grip value that different user is produced to terminal is different.Therefore, may be used
Whether the user that terminal is currently in use to be distinguished by grip value is owner.
In the preferred embodiment, by setting holding power transducer on the side frame of terminal, when user holds terminal simultaneously
And when doing the first deliberate action to terminal, holding power transducer will obtain first grip value of the user to terminal, in the present embodiment
In, terminal will generate grip vector after the first grip value is got according to the grip value.
Wherein, deliberate action including sliding the action of screen, to click on the action of screen, the action of pressing keys etc. multiple dynamic
One or more in work, it is not particularly limited herein.In addition, the position of holding power transducer is not limited to the side frame of terminal,
Can be other positions, be not specifically limited herein.
Fig. 2 is referred to, Fig. 2 is user's operation chart in the preferred embodiment of the present invention.In fig. 2, user can pass through
Operation is slided up and down on screen to browse information.When user holds terminal slides up and down operation, if sliding up and down behaviour
Used as deliberate action, then the holding power transducer on side frame will obtain first grip value of the user to terminal.
In a preferred embodiment, obtain user also includes to the first grip value of terminal:The user is obtained to described
Second grip value of terminal, wherein, the second grip value does the grip produced during the second deliberate action to terminal for user.In the reality
Apply in example, terminal will generate the grip vector according to the first grip value and the second grip value, i.e., in the embodiment
In, grip vector is comprising two vectors of element.
For example, when the first deliberate action is to slide the action of screen, when the second deliberate action is the action of pressing keys, the
One grip value is that user does the grip value for sliding that holding power transducer is detected when screen is acted to terminal, and the second grip value is user
The grip value that holding power transducer is detected when the action of pressing keys is done to terminal.It is unit with the first grip value and the second grip value
Element forms grip vector, i.e., now grip vector includes two elements.It should be noted that in other preferred embodiments, eventually
The holding power transducer at end can also obtain more kinds of grip values, and now grip vector is the vector comprising more elements, herein
It is not particularly limited.
In step s 102, judge whether the first grip value meets the first default secret protection condition;
In the preferred embodiment, judge whether the first grip value meets the first default secret protection condition and specifically wrap
Include:Judge whether the first grip value is preset with first and held in the first default grip value scope, and the first grip value
Whether the absolute value of the difference of power average value is less than the first preset error value.Usually, what the first preset error value was set is smaller, sentences
Disconnected precision is higher, and the first preset error value can carry out value according to actual conditions, be not particularly limited herein.
In the preferred embodiment, the acquisition methods bag of the first default grip value scope and the first default grip average value
Include:(N is integer, and N values are bigger, and the first default grip value scope and the first default grip are average in preceding N to obtain terminal owner
Value is more accurate, and such as N is integer more than or equal to 100) it is secondary that when using, holding power transducer obtains owner, to do certain to terminal pre-
If N number of grip value during action.Maximum in N number of grip value is set to the upper limit of the first default grip value scope, is held N number of
The minimum value of force value is set to the lower limit of the first default grip value scope, so as to obtain the first default grip value scope.By N number of grip
Value averages to obtain the first default grip average value.
In a preferred embodiment, when the first grip value and second two grip values of grip value is obtained, i.e., grip to
Amount be with the first grip value and the second grip value as element it is vectorial when, it is pre- according to the above-mentioned first default grip value scope and first
If the acquisition methods of grip average value, can get respectively the default grip value scope of second corresponding with the second grip value and
Second default grip average value.According to the first default grip average value and the default grip average value of the second grip average value generation to
Amount.
It is understood that when grip vector is vectorial comprising more elements, preset grip average value vector and
The corresponding default grip value scope of each element can be obtained using aforesaid way.Certainly, in other preferred embodiments, in advance
If the acquisition methods of grip value scope and default grip average value vector can also use other modes, specific limit is not done herein
System.In addition, the default grip value scope corresponding with the multiple elements in grip vector can be with identical, it is also possible to different.For example,
First default grip value scope and the second default grip value scope can be with identical, it is also possible to different, are not particularly limited herein.
In a preferred embodiment, when grip vector be with the first grip value and the second grip value as element it is vectorial when,
Judge whether the grip vector meets the first default secret protection condition, specifically include:Whether judge the first grip value
In the first default grip value scope, the second grip value whether in the second default grip value scope, and the grip to
Whether the mould of the difference of amount and default grip average value vector (judges the first grip value and institute less than the second preset error value
State the difference of the first default grip average value square difference for presetting grip average value with second with the second grip value square
Whether sum is less than the second preset error value).
In the preferred embodiment, the first preset pressure value scope, and first are in when terminal judges go out the first grip value
When the absolute value of the difference of grip value and the first preset pressure average value is less than the first preset error value, currently used terminal is illustrated
User is owner, and now terminal will determine the first grip value and be unsatisfactory for first and preset secret protection condition, terminal without
Privacy protection mode need to be opened, user may browse through the full content in terminal.It is not in when terminal judges go out the first grip value
First preset pressure value scope, and/or the absolute value of the difference of the first grip value and the first preset pressure average value is not less than first
Preset error value, the then user for illustrating currently used terminal is non-owner.Now terminal will determine the first grip value
Meet the first default secret protection condition, terminal will perform step S103.
In a preferred embodiment, when grip vector be with the first grip value and the second grip value as element it is vectorial when,
If the first grip of terminal judges value is in the first preset pressure value scope, the second grip value is in the second preset pressure value model
Enclose, and the mould of the difference of grip vector and preset pressure average value vector is less than the second preset error value, then judge the grip
Vector is unsatisfactory for the first default secret protection condition, and now terminal will not carry out secret protection.If terminal judges the first grip value
Be not in the first preset pressure value scope, and/or the second grip value is not in the second preset pressure value scope, and/or pressure to
The mould of the difference of amount and preset pressure average value vector is not less than the second preset error value, then judge that the pressure vector meets first pre-
If secret protection condition, now terminal will perform step S103.In the preferred embodiment, held using the first grip value and second
Two parameters of force value judge whether active user is owner, for only with a determination methods for grip value,
The accuracy that it judges is higher, and more conducively the operating habit of owner is made a distinction with the operating habit of other users.
In step s 103, if the first grip value meets the described first default secret protection condition, into privacy
Protected mode.
When terminal judges go out the first grip value meets the first default secret protection condition, terminal will be into secret protection
Pattern.Here, privacy protection mode can be with use pattern for only partial function, other are related to the function of owner's personal information
Cannot access.For example, in privacy protection mode, active user can only call, and cannot check address list, photograph album, make
With functions such as application programs.Certainly, privacy protection mode is not limited to above-mentioned form, it would however also be possible to employ other forms, herein not
Do concrete restriction.
In addition, privacy protection mode can also set to generate according to the selection of owner.For example, owner is by phase
Volume, bank application are arranged in privacy protection mode, then when other users use the terminal, other users will be unable to
Photograph album and bank application are accessed, but can be not disposed in privacy protection mode with accessing address list, chat application etc.
Function.
In a preferred embodiment, for erroneous judgement situation caused by preventing owner certain operating habit from changing
Occur, before hidden protected mode is entered, also include:Obtain the authentication information of the user;Judge the authentication
Whether information matches with default authentication information;If the authentication information and the default authentication information are not
Match somebody with somebody, then into privacy protection mode.Here, authentication information can be password, the answer for pre-setting problem etc., herein
It is not limited.
For example, when terminal judges go out active user for non-owner, terminal will be prompted to active user's input password, or
The ejection of person's terminal includes the dialog box of default problem;Active user is by according to the prompting input password of terminal or default problem
Answer;Terminal will determine that whether the password of user input or answer match with the password or answer for pre-setting.If matching,
Illustrate that active user, for owner, will not now enter privacy protection mode.If mismatching, active user is further illustrated
It is non-owner, now terminal will be into privacy protection mode.So it is possible to prevente effectively from certain operation is practised because of owner
The situation of erroneous judgement occurs caused by used change, while also improving the accuracy of method for secret protection.
This preferred embodiment provides a kind of method for secret protection, and it passes through to obtain the first grip value of user's applying;Judge
Whether the first grip value meets the first default secret protection condition;If it is default hidden that the first grip value meets described first
Private protective condition, then into privacy protection mode.Whether the method recognizes active user using user to the grip value of terminal
It is owner, is performed when active user is determined for non-owner and enter privacy protection mode, so that other is used
Family in browsing terminal about the data such as personal information of owner, cannot effectively ensure the peace of the personal information of owner
Quan Xing.
Fig. 3 is refer to, Fig. 3 is the another flow chart of method for secret protection in the preferred embodiment of the present invention.The secret protection
Method can apply to the electronics such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA)
In equipment, it is not particularly limited herein.
The method for secret protection in this preferred embodiment is explained below.
In step s 201, the first grip value that user applies is obtained, wherein, the first grip value is the user couple
Terminal does the grip produced during the first deliberate action;
When user's using terminal, typically can by terminal it is hand held in.Clicked in screen when user's finger, slided
During operation, hand can produce certain grip to act on terminal.The grip value that different user is produced to terminal is different.Therefore, may be used
Whether the user that terminal is currently in use to be distinguished by grip value is owner.
In the preferred embodiment, by setting holding power transducer on the side frame of terminal, when user holds terminal simultaneously
And when doing the first deliberate action to terminal, holding power transducer will obtain first grip value of the user to terminal.Herein, preset
One or more during the multiple such as the action including slip screen, action, the action of pressing keys of click screen is acted is acted,
It is not particularly limited herein.In addition, the position of holding power transducer is not limited to the side frame of terminal, can be other positions,
It is not specifically limited herein.
In step S202, judge whether the first grip value meets the first default secret protection condition;
In the preferred embodiment, judge whether the first grip value meets the first default secret protection condition and specifically wrap
Include:Judge whether the first grip value is preset with first and held in the first default grip value scope, and the first grip value
Whether the absolute value of the difference of power average value is less than the first preset error value.Usually, what the first preset error value was set is smaller, sentences
Disconnected precision is higher, and the first preset error value can carry out value according to actual conditions, be not particularly limited herein.
Here, the acquisition methods of the first default grip value scope and the first default grip average value vector include:Obtain eventually
Terminal master preceding N (N is integer, and N values are bigger, and the first default grip value scope and the first default grip average value are more accurate,
If N is the integer more than or equal to 100) it is secondary when using, when holding power transducer acquisition owner does certain deliberate action to terminal
N number of grip value.Maximum in N number of grip value is set to the upper limit of the first default grip value scope, by N number of grip value most
Small value is set to the lower limit of the first default grip value scope, so as to obtain the first default grip value scope.N number of grip value is averaged
Value obtains the first default grip average value.In other preferred embodiments, the first default grip value scope and first default is held
The acquisition methods of power average value can also use other modes, be not particularly limited herein.
In the preferred embodiment, default grip value scope, and the first grip are in when terminal judges go out the first grip value
When the average value of the difference of value and default grip average value is less than the first preset error value, the user for illustrating currently used terminal is machine
In person, now terminal will determine the first grip value and be unsatisfactory for the first default secret protection condition master, and terminal need not open hidden
Private protected mode, user may browse through the full content in terminal.When terminal judges go out the first grip value be not in first preset
Grip value scope, and/or the absolute value of the difference of the first grip value and the first default grip average value presets error not less than first
Value, then illustrate the non-owner of user of currently used terminal.Now terminal will determine the first grip value and meet first pre-
If secret protection condition, terminal will perform step S203.
In step S203, if the first grip value meets the described first default secret protection condition, judge described
Whether the first grip value meets the second default secret protection condition;
In the preferred embodiment, owner can set different access rights to different people.That is, to not
With people, different privacy protection modes are set.For example, average by the above-mentioned first default grip value scope and the first default grip
The acquisition methods of value get the default grip value scope of threeth corresponding with the mother of owner and the 3rd default grip
Average value, that is, generate the default secret protection condition of second corresponding with mother.It is interior that owner setting mother can access
The content held and cannot access, material is thus formed specified authority privacy protection mode.It is understood that specifying authority hidden
Private protected mode refers to that mother may only access the content that owner specifies, and cannot addressing machine master it is unspecified in
Hold (such as:Specify in authority privacy protection mode, mother can access the address list of owner, but lack of competence accesses owner's sheet
The photograph album of people).
In addition, in the preferred embodiment, whether terminal judges the first grip value meets the second default secret protection condition
Specific method with above judge the first grip value whether meet the first default secret protection condition method it is similar, in order to illustrate
The terseness of book, no longer illustrates herein.
The second default secret protection condition is unsatisfactory for when terminal judges go out the first grip value, then illustrates that active user is owner
The user that I specifies is (such as:The mother of owner), now, terminal will perform step S204.Held when terminal judges go out first
Force value meets the second default secret protection condition, then illustrate that active user is strange user, rather than the use that owner specifies
Family, now terminal will execution step S205.
In step S204, if the first grip value is unsatisfactory for the described second default secret protection condition, enters and refer to
Determine authority privacy protection mode;
When terminal judges go out the first grip value is unsatisfactory for the second default secret protection condition, illustrate that active user is owner
The user that I specifies, terminal will enter the specified authority privacy protection mode corresponding with specified user for pre-setting,
Allow that the user for specifying browses corresponding information according to its authority.
In step S205, if the first grip value meets the described second default secret protection condition, access entitlements
Limitation privacy protection mode.
When terminal judges go out the first grip value meets the second default secret protection condition, illustrate that active user is strange use
Access entitlements are limited privacy protection mode by family, terminal.In the preferred embodiment, authority limitation privacy protection mode refers to footpath between fields
Raw user's lack of competence accesses the pattern of whole personal information of owner.Certainly, in other preferred embodiments, authority limitation
Privacy protection mode can also set according to the selection of owner and generate.For example, owner is by photograph album, Bank application journey
Sequence, address list, chat application software design patterns are in authority limitation privacy protection mode, then when strange user uses the terminal
When, strange user will be unable to access photograph album, bank application, address list, chat application software, but can call etc. not
It is arranged on the function in authority limitation privacy protection mode.
In addition, in the preferred embodiment, being only provided with two default secret protection condition (the i.e. first default secret protections
Condition and the second default secret protection condition), and two default secret protection conditions correspond to owner and owner's sheet respectively
The user that people specifies.It is understood that in other preferred embodiments, owner can set the use that more are specified
Family, can set more default secret protection conditions accordingly.
For example, user's number that owner specifies is two, respectively first specifies user and second to specify user.When
Judge the first grip value to meet the second default secret protection condition that (it specifies user corresponding with first, generation method and the
The generation method of one default secret protection condition is similar to) when, illustrate that active user is not the first specified user.Terminal is further sentenced
The first grip value of breaking whether meet the 3rd default secret protection condition (it specifies user corresponding with second, generation method with
The generation method of the first default secret protection condition is similar to), if judging, the first grip value is unsatisfactory for the 3rd default privacy and protects
Guard strip part, then illustrate that active user is the second specified user, and now, terminal will perform specify corresponding with the second specified user
Authority privacy protection mode.
This preferred embodiment provides a kind of method for secret protection, and it passes through to obtain the first grip value of user's applying;Judge
Whether the first grip value meets the first default secret protection condition;If it is default hidden that the first grip value meets described first
Private protective condition, then judge whether the first grip value meets the second default secret protection condition, if the first grip value
The second default secret protection condition is unsatisfactory for, is then entered and is specified authority privacy protection mode;If the grip vector meets second
Secret protection condition is preset, then access entitlements limitation privacy protection mode.The method is using user to the first grip value of terminal
To recognize whether active user is owner, when determine active user for non-owner when, further determine whether for
The user that owner specifies.If judging the user that active user specifies for owner, perform and specify authority privacy to protect
Shield pattern so that the user for specifying can access the partial personal information of owner with using terminal, and cannot access and not referred to
The personal information of authority is determined, so as to protect the security of the personal information for not being designated authority.If judging, active user is
Strange user, then perform authority limitation privacy protection mode so that strange user cannot relevant owner in browsing terminal
Any personal information, effectively ensures the security of the personal information of owner.
Fig. 4 is refer to, Fig. 4 is the structural representation of the privacy protection device of the preferred embodiment of the present invention.The secret protection
Device 300 can apply to the electricity such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA)
In sub- equipment, it is not particularly limited herein.
Privacy protection device 300 in the present embodiment includes:Acquiring unit 301, the first judging unit 302 and secret protection
Unit 303.Wherein, acquiring unit 301 is used to obtain the first grip value of user's applying, wherein, the first grip value is institute
State the grip produced when user does the first deliberate action to the terminal;First judging unit 302 be used to judging the grip to
Whether amount meets the first default secret protection condition;If secret protection unit 303 meets described first for the grip vector
Default secret protection condition, then into privacy protection mode.
When user's using terminal, typically can by terminal it is hand held in.Clicked in screen when user's finger, slided
During operation, hand can produce certain grip to act on terminal.The grip value that different user is produced to terminal is different.Therefore, may be used
Whether the user that terminal is currently in use to be distinguished by grip value is owner.
In the preferred embodiment, when user holds terminal and does the first deliberate action to terminal, acquiring unit 301
First grip value of the user to terminal will be obtained, and grip vector is generated according to the first grip value.Herein, deliberate action
One or more in multiple actions such as action, the action of click screen, the action of pressing keys including slip screen, herein
It is not particularly limited.
In a preferred embodiment, grip vector can be comprising a vector for element.For example, working as acquiring unit 301
Acquisition user is done when sliding grip value when screen is acted, and for the ease of description, user is done into slip screen herein and acts when institute
The grip value of acquisition is referred to as slip grip value.So grip vector is to slide grip value as the vector of element.
In a preferred embodiment, acquiring unit 301 is additionally operable to:Obtain second grip of the user to the terminal
Value, wherein, the second grip value does the grip produced during the second deliberate action to terminal for user.Acquiring unit 301 is according to described
First grip value and the second grip value generation grip vector, i.e., in this embodiment, grip vector is to include the first grip
The vector of value and the second grip value.
In other preferred embodiments, acquiring unit 301 can also obtain more kinds of grip values, and now grip vector is bag
Vector containing more elements, is not particularly limited herein.
The first grip value that acquiring unit 301 will get is transferred to the first judging unit 302, by the first judging unit
302 judge whether the first grip value meets the first default secret protection condition.
In the preferred embodiment, the first judging unit 302 specifically for:Judge the first grip value whether in the
One default grip value scope, and whether the absolute value of the difference of the first grip value and the first default grip average value is less than first
Preset error value.Usually, what the first preset error value was set is smaller, and the precision of judgement is higher, and the first preset error value can be with
Value is carried out according to actual conditions, is not particularly limited herein.
Here, during the first default grip value scope refers to the top n grip value corresponding with certain deliberate action, with maximum
Grip value be the first default grip value scope the upper limit, with lower limit that minimum grip value is the first default grip value scope
The the first grip value scope for being formed.
In one embodiment, when grip vector be with the first grip value and the second grip value as element it is vectorial when, first
Grip value to that should have the first default grip value scope and the first default grip average value, to that should have first to preset hold by the second grip value
Force value scope and the second default grip average value, the default grip average value vector corresponding with grip vector, wherein, it is default to hold
It with the first default grip average value and the second grip average value is the vector of element that power average value vector is.
In a preferred embodiment, when grip vector be with the first grip value and the second grip value as element it is vectorial when,
First judging unit 302 specifically for:Judge the first grip value whether in the first default grip value scope, described second
Grip value whether in the second default grip value scope, and grip vector (from the first grip value and the second grip value generate to
Amount) and default grip average value vector difference mould whether less than the second preset error value (judge the first grip value with
The difference of the described first default grip average value square is put down with the second grip value and the difference of the second default grip average value
Whether square sum is less than the second preset error value).
In the preferred embodiment, when the first judging unit 302 judges that the first grip value is in the first default grip value
Scope, and the absolute value of the difference of the first grip value and the first default grip average value, when being less than the first preset error value, illustrate ought
The user of preceding using terminal is owner, and now the first judging unit 302 will determine the first grip value and be unsatisfactory for first
Default secret protection condition, without opening privacy protection mode, user may browse through the full content in terminal.When the first judgement
Unit 302 judges that the first grip value is not in the first default grip value scope, and/or the first grip value and the first default grip
The absolute value of the difference of average value is not less than the first preset error value, then illustrate the non-owner of user of currently used terminal.This
When the first judging unit 302 will determine the first grip value and meet the first default secret protection condition.
In a preferred embodiment, when grip vector be with the first grip value and the second grip value as element it is vectorial when,
If the first judging unit 302 judges that the first grip value is in the first default grip value scope, the second grip value is in second
Default grip value scope, and the grip is vectorial and mould of difference of default grip average value vector is less than the second preset error value,
Then the first judging unit 302 judges that the grip vector is unsatisfactory for the first default secret protection condition, and now terminal will not carry out hidden
Private protection.If the first judging unit 302 judges that the first grip value is not in the first default grip value scope, and/or the second grip
Value is not in the second default grip value scope, and/or grip is vectorial and mould of difference of default grip average value vector is not less than the
Two preset error values, then the judgement of the first judging unit 302 grip is vectorial meets the first default secret protection condition.
When the first judging unit 302 judges that grip vector meets the first default secret protection condition, first judges
Unit 302 will send the first signal to secret protection unit 303 so that secret protection unit 303 enters hidden according to the first signal
Private protected mode.Here, privacy protection mode can be with use pattern for only partial function, other are related to owner's personal information
Function cannot access.For example, in privacy protection mode, active user can only call, and cannot check address list, phase
Volume, use the functions such as application program.Certainly, privacy protection mode is not limited to above-mentioned form, it would however also be possible to employ other forms,
This is not particularly limited.
In addition, privacy protection mode can also set to generate according to the selection of owner.For example, owner is by phase
Volume, bank application are arranged in privacy protection mode, then when other users use the terminal, other users will be unable to
Photograph album and bank application are accessed, but can be not disposed in privacy protection mode with accessing address list, chat application etc.
Function.
In a preferred embodiment, refer to shown in Fig. 5, Fig. 5 is privacy protection device in the preferred embodiment of the present invention
Another structural representation.The privacy protection device 300 also includes obtaining judging unit 304, wherein, obtain judging unit 304 and wrap
Include acquisition subelement 3041 and judgment sub-unit 3042.When the first judging unit 302 judges that the first grip value meets first
During default secret protection condition, the first judging unit 302 sends second to the acquisition subelement 3041 obtained in judging unit 304
Signal so that obtain the authentication information that subelement 3041 obtains user according to secondary signal.Here, authentication information can
Think password, the answer for pre-setting problem etc., be not limited herein.
Obtain subelement 3041 and authentication information is transferred to judgment sub-unit 3042, judged by judgment sub-unit 3042
Whether the authentication information matches with default authentication information.If judgment sub-unit 3042 judges that the authentication is believed
Breath is mismatched with default authentication information, then further illustrate active user for non-owner, now judgment sub-unit
3042 will send the 3rd signal to secret protection unit 303 so that secret protection unit 303 is protected according to the 3rd signal into privacy
Shield pattern.If judgment sub-unit 3042 judges that the authentication information is matched with default authentication information, illustrate current
User is owner, and now terminal will not enter privacy protection mode.So it is possible to prevente effectively from because of certain behaviour of owner
The situation for making erroneous judgement caused by custom changes occurs, while also improving the accuracy of the judgement of privacy protection device 300.
This preferred embodiment provides a kind of privacy protection device 300, its pass through that acquiring unit 301 obtains that user applies the
One grip value;First judging unit 302 judges whether the first grip value meets the first default secret protection condition;If first
Judging unit 302 judges that the first grip value meets the described first default secret protection condition, then secret protection unit 303
Will be into privacy protection mode.The device 300 recognizes whether active user is machine using user to the first grip value of terminal
In person, when the first judging unit 302 determines active user for non-owner, secret protection unit 303 performs entrance to master
Privacy protection mode, so that other users cannot be in browsing terminal about the data such as personal information of owner, effectively
Ground ensures the security of the personal information of owner.
Fig. 6 is refer to, Fig. 6 is the another structural representation of privacy protection device in the preferred embodiment of the present invention.The privacy
Protection device 400 can apply to personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA)
Deng on electronic equipment, it is not particularly limited herein.
Privacy protection device 400 in this preferred embodiment includes that acquiring unit 401, the first judging unit 402, second are sentenced
Disconnected unit 403 and secret protection unit 404, wherein, secret protection unit 404 includes specifying authority secret protection subelement 4041
With authority limitation secret protection subelement 4042.
When user's using terminal, typically can by terminal it is hand held in.Clicked in screen when user's finger, slided
During operation, hand can produce certain grip to act on terminal.The grip value that different user is produced to terminal is different.Therefore, may be used
Whether the user that terminal is currently in use to be distinguished by grip value is owner.
In the preferred embodiment, when user holds terminal and does the first deliberate action to terminal, acquiring unit 401
First grip value of the user to terminal will be obtained.Herein, deliberate action includes sliding the action of screen, clicks on the dynamic of screen
One or more in multiple actions such as work, action of pressing keys, it is not particularly limited herein.
The first grip value that acquiring unit 401 will get is transferred to the first judging unit 402, by the first judging unit
402 judge whether the first grip value meets the first default secret protection condition.
In the preferred embodiment, the first judging unit 402 specifically for:Judge the first grip value whether in the
One default grip value scope, and whether the absolute value of the difference of the first grip value and the first default grip average value is less than first
Preset error value.Usually, what the first preset error value was set is smaller, and the precision of judgement is higher, and the first preset error value can be with
Value is carried out according to actual conditions, is not particularly limited herein.
Here, during the first default grip value scope refers to the top n grip value corresponding with certain deliberate action, with maximum
Grip value be the first default grip value scope the upper limit, with lower limit that minimum grip value is the first default grip value scope
The the first grip value scope for being formed.
In the preferred embodiment, when the first judging unit 402 judges that the first grip value is in the first default grip value
Scope, and the absolute value of the difference of the first grip value and the first default grip average value, when being less than the first preset error value, illustrate ought
The user of preceding using terminal is owner, and now the first judging unit 402 will determine the first grip value and be unsatisfactory for first
Default secret protection condition, terminal need not open privacy protection mode, and user may browse through the full content in terminal.When first
Judging unit 402 judges that the first grip value is not in the first default grip value scope, and/or the first grip value is preset with first
The absolute value of the difference of grip average value is not less than the first preset error value, then illustrate the non-owner's sheet of user of currently used terminal
People.Now the first judging unit 402 will determine the default secret protection condition of the first grip value satisfaction first.
When the first judging unit 402 judges that grip vector meets the first default secret protection condition, first judges
The first grip value is transferred to the second judging unit 403 by unit 402, and the first grip value is judged by the second judging unit 403
Whether second default secret protection condition is met.Wherein, the second default hidden protective condition refers to the user specified with owner
Corresponding default secret protection condition.When the second judging unit 403, to judge that the first grip value is unsatisfactory for second default hidden
During private protective condition, the user that active user specifies for owner is illustrated.Second judging unit 403 will be to secret protection unit
Specified authority secret protection subelement 4041 in 404 sends the 4th signal so that specify authority secret protection subelement 4041
The specified authority privacy protection mode corresponding with specified user is entered according to the 4th signal so that the user for specifying can be with
Corresponding information is browsed according to its authority.
When the second judging unit 403 judges that the first grip value meets the described second default secret protection condition, explanation
Active user is strange user, rather than the user that owner specifies.Now, the second judging unit 403 will limit hidden to authority
Private protection subelement 4042 sends the 5th signal so that authority limits secret protection subelement 4042 according to the 5th signal right of access
Limit limitation privacy protection mode.In the preferred embodiment, authority limitation privacy protection mode refers to that strange user's lack of competence is visited
Ask the pattern of whole personal information of owner.Certainly, in other preferred embodiments, authority limitation privacy protection mode
Can be set according to the selection of owner and generated.For example, owner answers photograph album, bank application, address list, chat
With software design patterns in authority limits privacy protection mode, then when strange user uses the terminal, strange user will be unable to
Photograph album, bank application, address list, chat application software are accessed, but can call etc. that to be not disposed on authority limitation hidden
Function in private protected mode.
In addition, in the preferred embodiment, being only provided with two default secret protection condition (the i.e. first default secret protections
Condition and the second default secret protection condition), and two default secret protection conditions correspond to owner and owner's sheet respectively
The user that people specifies.It is understood that in other preferred embodiments, owner can set the use that more are specified
Family, can set more default secret protection conditions accordingly.
This preferred embodiment provides a kind of privacy protection device 400, its pass through that acquiring unit 401 obtains that user applies the
One grip value;First judging unit 402 judges whether the first grip value meets the first default secret protection condition;If described
First grip value meets the described first default secret protection condition, then the second judging unit 403 judges that the first grip value is
It is no to meet the second default secret protection condition, if the first grip value is unsatisfactory for the second default secret protection condition, specify
Authority secret protection subelement 4041 will be into specified authority privacy protection mode;If the first grip value meets second presetting
Secret protection condition, then authority limitation secret protection subelement 4042 access entitlements are limited into privacy protection mode.The device 400
Whether active user is owner is recognized to the first grip value of terminal using user, when the first judging unit 402 judges
When going out active user for non-owner, the second judging unit 403 further determines whether the user specified for owner, if
Judge the user that active user specifies for owner, then specify authority secret protection subelement 4041 to perform and specify authority hidden
Private protected mode so that the user for specifying can access the partial personal information of owner with using terminal, and cannot access not
The personal information of authority is designated, so as to protect the security of the personal information for not being designated authority.If judging current use
Family is strange user, then authority limitation secret protection subelement 4042 performs authority limitation privacy protection mode so that strange use
Family in browsing terminal about any personal information of owner, cannot effectively ensure the safety of the personal information of owner
Property.
The present invention also provides a kind of mobile terminal, such as panel computer, mobile phone mobile terminal, refers to Fig. 7, and Fig. 7 is this
The mobile terminal structure schematic diagram that inventive embodiments are provided.The mobile terminal 500 can include radio frequency (RF, Radio
Frequency) circuit 501, include the memory 502, input block of one or more computer-readable recording mediums
503rd, display unit 504, sensor 505, include one or the processor 506 and power supply of more than one processing core
507 grade parts.It will be understood by those skilled in the art that the mobile terminal structure shown in Fig. 7 is not constituted to mobile terminal
Limit, part more more or less than diagram can be included, or combine some parts, or different part arrangements.
Radio circuit 501 can be used to receive and send messages, or in communication process signal reception and transmission, especially, by base station
Downlink information receive after, transfer to one or more than one processor 506 processed;In addition, up data is activation will be related to
To base station.Additionally, radio circuit 501 can also be communicated by radio communication with network and other equipment.
Memory 502 can be used to store application program and data.Include and can hold in the application program of the storage of memory 502
Line code.Application program can constitute various functions module.Processor 506 is by running application journey of the storage in memory 502
Sequence, so as to perform various function application and data processing.
Input block 503 can be used to receive numeral, character information or the user's characteristic information (such as fingerprint) of input, and
Produce the keyboard relevant with user's setting and function control, mouse, action bars, optics or trace ball signal input.Input
Unit 503 may include one or more in touch display screen, physical keyboard, function key, fingerprint recognition module etc..
Display unit 504 can be used to showing by user input information or be supplied to the information and mobile terminal of user
Various graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.
Mobile terminal 500 may also include at least one sensor 505, such as ambient light sensor, proximity transducer, gravity
Acceleration transducer etc..In the preferred embodiment, sensor 505 at least includes holding power transducer, and holding power transducer can be put
In on the side frame position of mobile terminal 500, it is also possible to be placed in the other positions of mobile terminal 500, be not particularly limited herein.
When user takes mobile terminal 500 and mobile terminal 500 is operated, holding power transducer is used to obtain user to mobile terminal
500 grip effect size, and the grip value of acquisition is transferred to processor 506, should according to what is pre-set by processor 506
Corresponding function is performed with program.
Processor 506 is the control centre of mobile terminal 500, using various interfaces and the whole mobile terminal of connection
500 various pieces, by running or performing application program of the storage in memory 502, and call storage in memory
Data in 502, perform the various functions and processing data of mobile terminal 500, so as to carry out overall prison to mobile terminal 500
Control.
Mobile terminal 500 also includes power supply 507 (such as battery), for being powered to all parts.Certainly, mobile terminal
500 can also will not be repeated here including voicefrequency circuit, camera, bluetooth module etc..
In the preferred embodiment, the processor 506 in mobile terminal obtains user to mobile whole by holding power transducer
The first grip value at end 500, wherein, the first grip value is default dynamic for the user does first to the mobile terminal 500
As when the grip that produces.It should be noted that processor 506 can also obtain user to movement by other devices or method
First grip value of terminal 500, the method that processor 506 obtains the first grip value is not limited to be obtained by holding power transducer
Take, as long as first grip value of the user to mobile terminal 500 can be got.
Processor 506 will further determine whether the first grip value meets first after the first grip value is got
Default secret protection condition;If the first grip value meets the described first default secret protection condition, into secret protection
Pattern.
In a preferred embodiment, processor 506 perform judge the first grip value whether meet first preset it is hidden
It is specific to perform during private protective condition:Judge the first grip value whether in the first default grip value scope, and described first
Whether the absolute value of the difference of grip value and the first default grip average value is less than the first preset error value.When processor 506 judges
Go out the first grip value and be not in the described first default grip value scope, and/or the first grip value is pre- with described first
If the absolute value of the difference of grip average value is not less than first preset error value, processor 506 will judge first grip
Value meets the described first default secret protection condition, and execution is entered privacy protection mode by processor 506.
In a preferred embodiment, processor 506 perform obtain user to the first grip value of mobile terminal 500 when,
Also perform:Obtain the second grip value that the user applies;Wherein, the second grip value is done for the user to the terminal
The grip produced during the second deliberate action;
Processor 506 judges that whether the first grip value after the first default grip value scope, is also held in execution
Whether row judges the second grip value in the second default grip value scope;
Processor 506 perform judge the first grip value and first preset grip average value difference absolute value whether
It is specific to perform during less than the first preset error value:Judge the difference of the first grip value and the first default grip average value
Square with square sum of the second grip value and the difference of the second default grip average value whether less than the second default error
Value.
In a preferred embodiment, processor 506 is being performed before entering privacy protection mode, is also executed the following steps:
Obtain the authentication information of the user;Judge whether the authentication information matches with default authentication information;
If the authentication information is mismatched with the default authentication information, into privacy protection mode.
In a preferred embodiment, processor 506 meets the described first default privacy and protects judging the grip vector
After guard strip part, also perform:Judge whether the first grip value meets the second default secret protection condition;If described first holds
Force value is unsatisfactory for the described second default secret protection condition, then enter and specify authority privacy protection mode;If or described first hold
Force value meets the described second default secret protection condition, then access entitlements limitation privacy protection mode.
It should be noted that the application program of each step of the execution of above-mentioned processor 506 can be stored in memory 502
It is interior.Memory 506 completes the privacy of mobile terminal 500 by running or performing application program of the storage in memory 502
Defencive function.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion described in detail in certain embodiment
Point, the detailed description above with respect to method for secret protection is may refer to, here is omitted.
Privacy protection device provided in an embodiment of the present invention is for example computer, panel computer, the hand with touch function
Machine etc., the privacy protection device belongs to same design with the method for secret protection in foregoing embodiments, is protected in the privacy
The either method provided in the method for secret protection embodiment can be provided on protection unit, its implement process refer to it is described
Method for secret protection embodiment, here is omitted.
It should be noted that for method for secret protection of the present invention, this area common test personnel be appreciated that
All or part of flow of method for secret protection described in the embodiment of the present invention is realized, can be by computer program to control phase
The hardware of pass is completed, and the computer program can be stored in a computer read/write memory medium, if storage is in terminal
In memory, and by least one computing device in the terminal, secret protection side as described is may include in the process of implementation
The flow of the embodiment of method.Wherein, described storage medium can be magnetic disc, CD, read-only storage (ROM, Read Only
Memory), random access memory (RAM, Random Access Memory) etc..
Each functional unit in the embodiment of the present invention can be integrated in a processing module, or unit list
Solely it is physically present, it is also possible to which two or more units are integrated in a module.Above-mentioned integrated module can both be used
The form of hardware is realized, it would however also be possible to employ the form of software function module is realized.If the integrated module is with software function
The form of module is realized and as independent production marketing or when using, it is also possible to which storage is situated between in an embodied on computer readable storage
In matter.Storage medium mentioned above can be read-only storage, disk or CD etc..Above-mentioned each device or system, can be with
Perform the method in correlation method embodiment.
In sum, although the present invention it is disclosed above with preferred embodiment, but above preferred embodiment and be not used to limit
The system present invention, one of ordinary skill in the art without departing from the spirit and scope of the present invention, can make various changes and profit
Adorn, therefore protection scope of the present invention is defined by the scope that claim is defined.
Claims (11)
1. a kind of method for secret protection, it is characterised in that including:
The first grip value that user applies is obtained, wherein, the first grip value is default dynamic for the user does first to terminal
As when the grip that produces;
Judge whether the first grip value meets the first default secret protection condition;
If the first grip value meets the described first default secret protection condition, into privacy protection mode.
2. method for secret protection according to claim 1, it is characterised in that described to judge whether the first grip value is full
The default secret protection condition of foot first, including:Judge the first grip value whether in the first default grip value scope, and institute
Whether the absolute value of difference of the first grip value and the first default grip average value is stated less than the first preset error value;
If the first grip value meets the described first default secret protection condition, into privacy protection mode, including:If institute
State the first grip value and be not in the described first default grip value scope, and/or the first grip value is preset with described first and is held
The absolute value of the difference of power average value is not less than first preset error value, then judge that the first grip value meets described first
Default secret protection condition, and enter privacy protection mode.
3. method for secret protection according to claim 2, it is characterised in that the first grip that the acquisition user applies
Value, also includes:Obtain the second grip value that the user applies;Wherein, the second grip value is the user to the end
Do the grip produced during the second deliberate action in end;
It is described to judge that whether the first grip value, in the first default grip value scope, also includes:Judge second grip
Whether value is in the second default grip value scope;
Whether the absolute value of the difference for judging the first grip value and the first default grip average value is default less than first to be missed
Difference, including:Judge the first grip value and the first default grip average value difference square with second grip
Whether square sum of the difference of value and the second default grip average value is less than the second preset error value;
If the first grip value meets the described first default secret protection condition, into privacy protection mode, including:
If the first grip value is not in the described first default grip value scope, and/or the second grip value is not in described the
Two default grip value scopes, and/or the first grip value and the first default grip average value difference square with it is described
Square sum of the difference of the second grip value and the second default grip average value is not less than second preset error value, then judge institute
State the first grip value and the second grip value meets the described first default secret protection condition, and enter privacy protection mode.
4. method for secret protection according to claim 1, it is characterised in that before the entrance privacy protection mode,
Also include:
Obtain the authentication information of the user;
Judge whether the authentication information matches with default authentication information;
If the authentication information is mismatched with the default authentication information, into privacy protection mode.
5. method for secret protection according to claim 1, it is characterised in that if meeting institute in the first grip value
State after the first default secret protection condition, also include:
Judge whether the first grip value meets the second default secret protection condition;
If the first grip value is unsatisfactory for the described second default secret protection condition, enters and specify authority secret protection mould
Formula;Or
If the first grip value meets the described second default secret protection condition, access entitlements limitation privacy protection mode.
6. a kind of privacy protection device, it is characterised in that including:
Acquiring unit, the first grip value for obtaining user's applying, wherein, the first grip value is the user to terminal
Do the grip produced during the first deliberate action;
First judging unit, for judging whether the first grip value meets the first default secret protection condition;
Secret protection unit, if meeting the described first default secret protection condition for the first grip value, into privacy
Protected mode.
7. privacy protection device according to claim 6, it is characterised in that first judging unit is used to judge described
Whether the first grip value is in the first default grip value scope, and the difference that the first grip value presets grip average value with first
Absolute value whether be less than the first preset error value;
If the secret protection unit is not in the described first default grip value scope, and/or institute for the first grip value
The absolute value of difference of the first grip value and the first default grip average value is stated not less than first preset error value, is then sentenced
The fixed first grip value meets the described first default secret protection condition, and enters privacy protection mode.
8. privacy protection device according to claim 7, it is characterised in that the acquiring unit is additionally operable to obtain the use
The second grip value that family applies;Wherein, the second grip value is product when the user does the second deliberate action to the terminal
Raw grip;
Whether first judging unit is additionally operable to judge the second grip value in the second default grip value scope;Judge institute
State the first grip value and the first default grip average value difference square with the second grip value and the second default grip
Whether square sum of the difference of average value is less than the second preset error value;
If the secret protection unit is not in the described first default grip value scope, and/or institute for the first grip value
State the second grip value and be not in the described second default grip value scope, and/or the first grip value is preset with described first and is held
Square sum of square difference for presetting grip average value with the second grip value and second of the difference of power average value is not less than institute
The second preset error value is stated, then judges that the first grip value and the second grip value meet the described first default secret protection
Condition, and enter privacy protection mode.
9. privacy protection device according to claim 6, it is characterised in that the privacy protection device is also sentenced including acquisition
Disconnected unit, the acquisition judging unit includes obtaining subelement and judgment sub-unit;
The subelement that obtains is used to obtain the authentication information of the user;
The judgment sub-unit is used to judge whether the authentication information matches with default authentication information;
If the secret protection unit is used for the authentication information being mismatched with the default authentication information, enter
Privacy protection mode.
10. privacy protection device according to claim 6, it is characterised in that the privacy protection device also includes second
Judging unit, second judging unit is used to judge whether the first grip value meets the second default secret protection condition;
The secret protection unit includes specifying authority secret protection subelement and authority limitation secret protection subelement;The finger
If determine authority secret protection subelement is unsatisfactory for the described second default secret protection condition for the first grip value, enter
Specify authority privacy protection mode;If authority limitation secret protection subelement meets described for the first grip value
Two preset secret protection conditions, then access entitlements limitation privacy protection mode.
A kind of 11. mobile terminals, it is characterised in that including:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs such as claim 1 to right
It is required that the method for secret protection described in 5 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085019.6A CN106778339B (en) | 2016-11-30 | 2016-11-30 | A kind of method for secret protection and device, mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085019.6A CN106778339B (en) | 2016-11-30 | 2016-11-30 | A kind of method for secret protection and device, mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106778339A true CN106778339A (en) | 2017-05-31 |
CN106778339B CN106778339B (en) | 2019-08-13 |
Family
ID=58914772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611085019.6A Expired - Fee Related CN106778339B (en) | 2016-11-30 | 2016-11-30 | A kind of method for secret protection and device, mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778339B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111125770A (en) * | 2019-12-27 | 2020-05-08 | 维沃移动通信有限公司 | Privacy protection method and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100476A (en) * | 2015-07-28 | 2015-11-25 | 努比亚技术有限公司 | Device and method for unlocking mobile terminal |
CN105100118A (en) * | 2015-08-28 | 2015-11-25 | 努比亚技术有限公司 | Authentication device and method |
CN105122256A (en) * | 2013-04-19 | 2015-12-02 | 高通股份有限公司 | Grip force sensor array for one-handed and multimodal interaction on handheld devices and methods |
CN105573466A (en) * | 2015-12-11 | 2016-05-11 | 广东欧珀移动通信有限公司 | Mobile terminal control method and apparatus and mobile terminal |
CN105872250A (en) * | 2016-05-30 | 2016-08-17 | 努比亚技术有限公司 | Method and device for automatically recognizing owner identity of mobile terminal |
CN105930076A (en) * | 2016-04-12 | 2016-09-07 | 捷开通讯(深圳)有限公司 | Mobile communication terminal and method thereof for hiding selected object |
-
2016
- 2016-11-30 CN CN201611085019.6A patent/CN106778339B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105122256A (en) * | 2013-04-19 | 2015-12-02 | 高通股份有限公司 | Grip force sensor array for one-handed and multimodal interaction on handheld devices and methods |
CN105100476A (en) * | 2015-07-28 | 2015-11-25 | 努比亚技术有限公司 | Device and method for unlocking mobile terminal |
CN105100118A (en) * | 2015-08-28 | 2015-11-25 | 努比亚技术有限公司 | Authentication device and method |
CN105573466A (en) * | 2015-12-11 | 2016-05-11 | 广东欧珀移动通信有限公司 | Mobile terminal control method and apparatus and mobile terminal |
CN105930076A (en) * | 2016-04-12 | 2016-09-07 | 捷开通讯(深圳)有限公司 | Mobile communication terminal and method thereof for hiding selected object |
CN105872250A (en) * | 2016-05-30 | 2016-08-17 | 努比亚技术有限公司 | Method and device for automatically recognizing owner identity of mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111125770A (en) * | 2019-12-27 | 2020-05-08 | 维沃移动通信有限公司 | Privacy protection method and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106778339B (en) | 2019-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102292932B (en) | Passive Secure execution | |
CN105955587B (en) | A kind of hiden application icon display method and device | |
CN106022079B (en) | A kind of unlocked by fingerprint method and terminal | |
CN106227437B (en) | A kind of unlocked by fingerprint method and terminal | |
CN103699825A (en) | Display apparatus and method for operating the same | |
CN109583356A (en) | Fingerprint identification method and Related product | |
CN104361272A (en) | Fingerprint input information processing method and system and mobile terminal | |
US9275210B2 (en) | System and method of enhancing security of a wireless device through usage pattern detection | |
CN105956431B (en) | A kind of application protection processing method and mobile terminal | |
CN104573456A (en) | Terminal interface control method | |
CN104809402B (en) | A kind of information fuzzy display methods and terminal | |
CN108171037A (en) | Using startup method, terminal and computer storage media | |
CN106228054A (en) | Auth method and device | |
CN107450839A (en) | Control method, device, storage medium and mobile terminal based on blank screen gesture | |
CN107862194A (en) | A kind of method, device and mobile terminal of safety verification | |
CN107422976A (en) | Control method, device, storage medium and mobile terminal based on blank screen gesture | |
CN104598792A (en) | Terminal | |
CN108551521A (en) | A kind of log-on message reminding method and mobile terminal | |
CN108519841A (en) | Using startup method, terminal and computer readable storage medium | |
CN107256353A (en) | Possesses the display methods of privacy protection function | |
CN106203038A (en) | A kind of unlocking method and mobile terminal | |
CN105827622A (en) | Method and device for protecting user information | |
CN106815509A (en) | A kind of multimedia file guard method, device and electronic equipment | |
CN105930076A (en) | Mobile communication terminal and method thereof for hiding selected object | |
CN101471981A (en) | Dialing method of telephone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190813 |
|
CF01 | Termination of patent right due to non-payment of annual fee |