CN106778339B - A kind of method for secret protection and device, mobile terminal - Google Patents

A kind of method for secret protection and device, mobile terminal Download PDF

Info

Publication number
CN106778339B
CN106778339B CN201611085019.6A CN201611085019A CN106778339B CN 106778339 B CN106778339 B CN 106778339B CN 201611085019 A CN201611085019 A CN 201611085019A CN 106778339 B CN106778339 B CN 106778339B
Authority
CN
China
Prior art keywords
grip
value
default
grip value
secret protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201611085019.6A
Other languages
Chinese (zh)
Other versions
CN106778339A (en
Inventor
郭同兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611085019.6A priority Critical patent/CN106778339B/en
Publication of CN106778339A publication Critical patent/CN106778339A/en
Application granted granted Critical
Publication of CN106778339B publication Critical patent/CN106778339B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of method for secret protection and device, mobile terminal.The method for secret protection includes: the first grip value for obtaining user and applying, wherein the first grip value is the grip generated when the user does the first deliberate action to terminal;Judge whether the first grip value meets the first default secret protection condition;If the first grip value meets the described first default secret protection condition, enter privacy protection mode.This method meets the first default secret protection condition in the first grip value; when the user of i.e. currently used terminal is non-owner; terminal enters privacy protection mode; so that the case where personal information etc. of owner is not intended to the information seen by other people to be protected, is effectively prevented from the leakage of personal information of owner generation.

Description

A kind of method for secret protection and device, mobile terminal
Technical field
The present invention relates to field of information security technology, more particularly to a kind of method for secret protection and device, mobile terminal.
Background technique
In the information age, with the increasing of information content, the safety of the personal information such as proprietary information, privacy information gradually at The problem of being paid close attention to for people.Since the mobile intelligent terminals such as mobile phone have become the necessity of people's life, and it is often protected The a large amount of personal information of user is deposited, for example, bank account information, privacy photo etc..Once mobile terminal is by except user Other people use, and the personal information of user may have the risk of leakage, the especially proprietary information and privacy information of user Etc. will greatly be challenged, the safety of personal information is influenced.
Summary of the invention
The embodiment of the present invention provides a kind of method for secret protection and device, mobile terminal, can promote the peace of personal information Quan Xing.
The present invention provides a kind of method for secret protection comprising:
Obtain the first grip value that user applies, wherein the first grip value is that the user does first in advance to terminal If the grip generated when movement;
Judge whether the first grip value meets the first default secret protection condition;
If the first grip value meets the described first default secret protection condition, enter privacy protection mode.
The present invention also provides a kind of privacy protection devices comprising:
Acquiring unit, for obtaining the first grip value of user's application, wherein the first grip value is the user couple Terminal does the grip generated when the first deliberate action;
First judging unit, for judging whether the first grip value meets the first default secret protection condition;
Secret protection unit enters if meeting the described first default secret protection condition for the first grip value Privacy protection mode.
The present invention provides a kind of mobile terminal again comprising:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes provided by the invention A kind of method for secret protection.
The present invention provides a kind of method for secret protection and device, mobile terminal.The method for secret protection is by obtaining user The the first grip value applied, wherein the first grip value is the grip generated when the user does deliberate action to terminal;Sentence Whether the first grip value of breaking meets the first default secret protection condition.If it is default that the first grip value meets described first Secret protection condition then illustrates that the user of currently used terminal is non-owner, and terminal enters privacy protection mode at this time, makes The personal information etc. for obtaining owner is not intended to the information seen by other people to be protected, and is effectively prevented from owner's The case where leakage of personal information, occurs, and promotes the safety of personal information.
Detailed description of the invention
Fig. 1 is the flow chart of method for secret protection in the preferred embodiment of the present invention.
Fig. 2 is user's operation schematic diagram in the preferred embodiment of the present invention.
Fig. 3 is the another flow chart of method for secret protection in the preferred embodiment of the present invention.
Fig. 4 is the structural schematic diagram of privacy protection device in the preferred embodiment of the present invention.
Fig. 5 is another structural schematic diagram of privacy protection device in the preferred embodiment of the present invention.
Fig. 6 is the another structural schematic diagram of privacy protection device in the preferred embodiment of the present invention.
Fig. 7 is the structural schematic diagram of mobile terminal of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Term " first ", " second " in the present invention etc. can be used to describe various elements herein, but these elements are not It is limited by these terms.These terms are only used to distinguish the first element from the other element.For example, not departing from the present invention Range in the case where, the first control can be known as the second control, and similarly, the second control can be known as the first control. First control and the second control both control, but it is not same control.In addition, term " includes " and " having " and it Any deformation, it is intended that cover and non-exclusive include.
Fig. 1 is please referred to, Fig. 1 is the flow chart of method for secret protection in the preferred embodiment of the present invention.The method for secret protection It can be applied to the electronic equipments such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA) On, it is not particularly limited herein.
The method for secret protection in this preferred embodiment is explained in detail below.
In step s101, the first grip value that user applies is obtained, wherein the first grip value is the user couple Terminal does the grip generated when the first deliberate action;
When user's using terminal, generally can by terminal it is hand held in.When user's finger clicks in screen, slides When operation, hand can generate certain grip to terminal and act on.The grip value that different user generates terminal is different.Therefore, may be used To distinguish whether the user that terminal is used is owner by grip value.
In the preferred embodiment, by the way that holding power transducer is arranged on the side frame of terminal, when user holds terminal simultaneously And when doing the first deliberate action to terminal, holding power transducer will obtain user to the first grip value of terminal, in the present embodiment In, terminal will generate grip vector according to the grip value after getting the first grip value.
Wherein, deliberate action includes that the movement of sliding screen, the movement for clicking screen, movement of pressing keys etc. are multiple dynamic One of work is a variety of, is not particularly limited herein.In addition, the position of holding power transducer is not limited to the side frame of terminal, It can be other positions, be not specifically limited herein.
Fig. 2 is referred to, Fig. 2 is user's operation schematic diagram in the preferred embodiment of the present invention.In Fig. 2, user can pass through Slide up and down operation on the screen to browse information.When user, which holds terminal, slides up and down operation, if sliding up and down behaviour As deliberate action, then the holding power transducer being mounted on side frame will acquire user to the first grip value of terminal.
In a preferred embodiment, user is obtained to the first grip value of terminal further include: obtains the user to described Second grip value of terminal, wherein the second grip value is the grip generated when user does the second deliberate action to terminal.In the reality It applies in example, terminal will generate the grip vector according to the first grip value and the second grip value, i.e., in the embodiment In, grip vector is the vector comprising two elements.
For example, when the first deliberate action is to slide the movement of screen, when the second deliberate action is the movement of pressing keys, the One grip value is the grip value that holding power transducer detects when user does sliding screen movement to terminal, and the second grip value is user The grip value that holding power transducer detects when doing the movement of pressing keys to terminal.It is member with the first grip value and the second grip value Element forms grip vector, i.e., grip vector includes two elements at this time.It should be noted that in other preferred embodiments, eventually The holding power transducer at end can also obtain more kinds of grip values, and grip vector is the vector comprising more elements at this time, herein It is not particularly limited.
In step s 102, judge whether the first grip value meets the first default secret protection condition;
In the preferred embodiment, judge whether the first grip value meets the first default secret protection condition and specifically wrap It includes: judging whether the first grip value is in the first default grip value range, and the first grip value is preset with first and held Whether the absolute value of the difference of power average value is less than the first preset error value.Generally, the setting of the first preset error value is smaller, sentences Disconnected precision is higher, and the first preset error value can carry out value according to the actual situation, is not particularly limited herein.
In the preferred embodiment, the acquisition methods packet of the first default grip value range and the first default grip average value Include: obtaining terminal owner, (N is integer, and N value is bigger, and the first default grip value range and the first default grip are average in preceding N Be worth it is more accurate, if N is more than or equal to 100 integer) it is secondary that in use, holding power transducer obtains owner, to do some to terminal pre- If N number of grip value when movement.Maximum value in N number of grip value is set as to the upper limit of the first default grip value range, is held N number of The minimum value of force value is set as the lower limit of the first default grip value range, to obtain the first default grip value range.By N number of grip Value is averaged to obtain the first default grip average value.
In a preferred embodiment, when obtaining the first grip value and second two grip values of grip value, i.e., grip to It is pre- according to the above-mentioned first default grip value range and first when amount is using the first grip value and the second grip value as the vector of element If the acquisition methods of grip average value, can get respectively the second default grip value range corresponding with the second grip value and Second default grip average value.According to the first default grip average value and the second grip average value generate default grip average value to Amount.
It is understood that when grip vector is vector comprising more elements, preset grip average value vector and The corresponding default grip value range of each element can be obtained using aforesaid way.Certainly, in other preferred embodiments, in advance If the acquisition methods of grip value range and default grip average value vector can also use other modes, specific limit is not done herein System.In addition, default grip value range corresponding with multiple elements in grip vector may be the same or different.For example, First default grip value range and the second default grip value range may be the same or different, and be not particularly limited herein.
In a preferred embodiment, when grip vector is using the first grip value and the second grip value as the vector of element, Judge whether the grip vector meets the first default secret protection condition, specifically include: whether judging the first grip value In the first default grip value range, whether the second grip value is in the second default grip value range, and the grip to Whether the mould of the difference of amount and default grip average value vector less than the second preset error value (judges the first grip value and institute State square square with the second grip value and the difference of the second default grip average value of the difference of the first default grip average value The sum of whether less than the second preset error value).
In the preferred embodiment, when terminal judges that the first grip value is in the first preset pressure value range, and first When grip value and the absolute value of the difference of the first preset pressure average value are less than the first preset error value, illustrate currently used terminal User is owner, and terminal will determine the first grip value and be unsatisfactory for the first default secret protection condition at this time, terminal without Privacy protection mode need to be opened, user may browse through the full content in terminal.When terminal judges that the first grip value is not in First preset pressure value range and/or the first grip value and the absolute value of the difference of the first preset pressure average value are not less than first Preset error value then illustrates that the user of currently used terminal is non-owner.Terminal will determine the first grip value at this time Meet the first default secret protection condition, terminal will execute step S103.
In a preferred embodiment, when grip vector is using the first grip value and the second grip value as the vector of element, If terminal judges that the first grip value is in the first preset pressure value range, the second grip value is in the second preset pressure value model It encloses, and the mould of the difference of the grip vector and preset pressure average value vector then determines the grip less than the second preset error value Vector is unsatisfactory for the first default secret protection condition, and terminal will be without secret protection at this time.If terminal judges the first grip value Be not in the first preset pressure value range and/or the second grip value be not in the second preset pressure value range and/or pressure to The mould of the difference of amount and preset pressure average value vector is not less than the second preset error value, then it is pre- to determine that the pressure vector meets first If secret protection condition, terminal will execute step S103 at this time.In the preferred embodiment, it is held using the first grip value and second Force value two parameters judge whether active user is owner, compared to only with the judgment method of a grip value for, The accuracy that it judges is higher, more conducively distinguishes the operating habit of the operating habit of owner and other users.
In step s 103, if the first grip value meets the described first default secret protection condition, enter privacy Protected mode.
When terminal judges that the first grip value meets the first default secret protection condition, terminal will enter secret protection Mode.Here, mode can be used for only partial function in privacy protection mode, other are related to the function of owner's personal information It can not access.For example, active user can only make a phone call, and can not check address list, photograph album, make in privacy protection mode With functions such as application programs.Certainly, privacy protection mode is not limited to above-mentioned form, can also use other forms, herein not Do concrete restriction.
In addition, privacy protection mode can also be arranged to generate according to the selection of owner.For example, owner is by phase Volume, bank application are arranged in privacy protection mode, then other users will be unable to when other users use the terminal Photograph album and bank application are accessed, but accessible address list, chat application etc. are not disposed in privacy protection mode Function.
In a preferred embodiment, erroneous judgement situation caused by certain operating habit of owner changes in order to prevent Occur, before entering hidden protected mode, further includes: obtain the authentication information of the user;Judge the authentication Whether information matches with default authentication information;If the authentication information and the default authentication information are not Match, then enters privacy protection mode.Here, authentication information can be password, the answer for presetting problem etc., herein With no restrictions.
For example, terminal will be prompted to active user and input password when terminal judges that active user is non-owner, or The pop-up of person's terminal includes the dialog box of default problem;Active user will be according to the prompt input password of terminal or default problem Answer;Whether terminal matches with pre-set password or answer the password for judging user's input or answer.If matching, Illustrate that active user is owner, privacy protection mode will not be entered at this time.If mismatching, active user is further illustrated For non-owner, terminal will enter privacy protection mode at this time.In this way it is possible to prevente effectively from certain operation is practised because of owner The case where erroneous judgement, occurs caused by used change, while also improving the accuracy of method for secret protection.
This preferred embodiment provides a kind of method for secret protection, the first grip value applied by obtaining user;Judgement Whether the first grip value meets the first default secret protection condition;If the first grip value meet described first preset it is hidden Private protective condition then enters privacy protection mode.Whether this method identifies active user to the grip value of terminal using user It for owner, is executed when determining active user and being non-owner and enters privacy protection mode, so that other are used Family can not the data such as personal information in browsing terminal in relation to owner, effectively guarantee the peace of the personal information of owner Quan Xing.
Referring to figure 3., Fig. 3 is the another flow chart of method for secret protection in the preferred embodiment of the present invention.The secret protection Method can be applied to the electronics such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA) In equipment, it is not particularly limited herein.
The method for secret protection in this preferred embodiment is explained in detail below.
In step s 201, the first grip value that user applies is obtained, wherein the first grip value is the user couple Terminal does the grip generated when the first deliberate action;
When user's using terminal, generally can by terminal it is hand held in.When user's finger clicks in screen, slides When operation, hand can generate certain grip to terminal and act on.The grip value that different user generates terminal is different.Therefore, may be used To distinguish whether the user that terminal is used is owner by grip value.
In the preferred embodiment, by the way that holding power transducer is arranged on the side frame of terminal, when user holds terminal simultaneously And when doing the first deliberate action to terminal, holding power transducer will obtain user to the first grip value of terminal.Herein, it presets Movement includes one of multiple movements such as the movement of sliding screen, the movement for clicking screen, the movement of pressing keys or a variety of, It is not particularly limited herein.In addition, the position of holding power transducer is not limited to the side frame of terminal, it can be other positions, It is not specifically limited herein.
In step S202, judge whether the first grip value meets the first default secret protection condition;
In the preferred embodiment, judge whether the first grip value meets the first default secret protection condition and specifically wrap It includes: judging whether the first grip value is in the first default grip value range, and the first grip value is preset with first and held Whether the absolute value of the difference of power average value is less than the first preset error value.Generally, the setting of the first preset error value is smaller, sentences Disconnected precision is higher, and the first preset error value can carry out value according to the actual situation, is not particularly limited herein.
Here, the acquisition methods of the first default grip value range and the first default grip average value vector include: to obtain eventually Terminal master preceding N (N is integer, and N value is bigger, and the first default grip value range and the first default grip average value are more accurate, If N is more than or equal to 100 integer) it is secondary in use, when holding power transducer acquisition owner does some deliberate action to terminal N number of grip value.Maximum value in N number of grip value is set as to the upper limit of the first default grip value range, most by N number of grip value Small value is set as the lower limit of the first default grip value range, to obtain the first default grip value range.N number of grip value is averaged Value obtains the first default grip average value.In other preferred embodiments, the first default grip value range and first default is held The acquisition methods of power average value can also use other modes, be not particularly limited herein.
In the preferred embodiment, when terminal judges that the first grip value is in default grip value range, and the first grip When the average value of value and the difference of default grip average value is less than the first preset error value, illustrate that the user of currently used terminal is machine Main terminal will determine the first grip value and be unsatisfactory for the first default secret protection condition at this time in person, and terminal is hidden without opening Private protected mode, user may browse through the full content in terminal.When terminal judges that the first grip value is not in first and presets Grip value range and/or the first grip value and the absolute value of the difference of the first default grip average value are not less than the first default error Value, then illustrate the non-owner of the user of currently used terminal.It is pre- will to determine the first grip value satisfaction first for terminal at this time If secret protection condition, terminal will execute step S203.
In step S203, if the first grip value meets the described first default secret protection condition, described in judgement Whether the first grip value meets the second default secret protection condition;
In the preferred embodiment, different access authority different people can be arranged in owner.That is, to not With people, different privacy protection modes is set.For example, average by the above-mentioned first default grip value range and the first default grip To get, third corresponding with the mother of owner presets grip value range to the acquisition methods of value and third presets grip Average value generates the second default secret protection condition corresponding with mother.Accessible interior of mother is arranged in owner The content held and cannot accessed, material is thus formed specified permission privacy protection modes.It is understood that specified permission is hidden Private protected mode refers to that mother may only access the specified content of owner, unspecified interior without accessible owner Hold (such as: in specified permission privacy protection mode, the address list of the accessible owner of mother, but lack of competence accesses owner's sheet The photograph album of people).
In addition, in the preferred embodiment, terminal judges whether the first grip value meets the second default secret protection condition To judge whether the first grip value meets the method for the first default secret protection condition similar specific method and front, in order to illustrate The terseness of book, no longer illustrates herein.
When terminal judges that the first grip value is unsatisfactory for the second default secret protection condition, then illustrate that active user is owner I am specified user (such as: the mother of owner), at this point, terminal will execute step S204.When terminal judges that first holds Force value meets the second default secret protection condition, then illustrates that active user is strange user, rather than the use that owner is specified Family, terminal will execute step S205 at this time.
In step S204, if the first grip value is unsatisfactory for the described second default secret protection condition, enters and refer to Determine permission privacy protection mode;
When terminal judges that the first grip value is unsatisfactory for the second default secret protection condition, illustrate that active user is owner I am specified user, and terminal will enter pre-set specified permission privacy protection mode corresponding with specified user, Specified user is allowed to browse corresponding information according to its permission.
In step S205, if the first grip value meets the described second default secret protection condition, access entitlements Limit privacy protection mode.
When terminal judges that the first grip value meets the second default secret protection condition, illustrate that active user is strange use Access entitlements are limited privacy protection mode by family, terminal.In the preferred embodiment, permission limitation privacy protection mode refers to footpath between fields The mode of whole personal information of raw user's lack of competence access owner.Certainly, in other preferred embodiments, permission limitation Privacy protection mode can also be arranged according to the selection of owner to be generated.For example, owner is by photograph album, Bank application journey Sequence, address list, the setting of chat application software are in permission limitation privacy protection mode, then when strange user uses the terminal When, strange user will be unable to access photograph album, bank application, address list, chat application software, but can make a phone call etc. not Function in permission limitation privacy protection mode is set.
In addition, in the preferred embodiment, being only provided with two default secret protection condition (the i.e. first default secret protections Condition and the second default secret protection condition), and two default secret protection conditions respectively correspond owner and owner's sheet The user that people specifies.It is understood that more specified use can be set in owner in other preferred embodiments More default secret protection conditions can be set in family accordingly.
For example, user's number that owner specifies is two, respectively the first designated user and the second designated user.When Judge the first grip value to meet the second default secret protection condition that (it is corresponding with the first designated user, generation method and the The generation method of one default secret protection condition is similar) when, illustrating active user not is the first designated user.Terminal is further sentenced The first grip value of breaking whether meet third preset secret protection condition (it is corresponding with the second designated user, generation method with The generation method of first default secret protection condition is similar), if judging, the first grip value is unsatisfactory for third and presets privacy guarantor Guard strip part then illustrates that active user is the second designated user, at this point, terminal will execute specify corresponding with the second designated user Permission privacy protection mode.
This preferred embodiment provides a kind of method for secret protection, the first grip value applied by obtaining user;Judgement Whether the first grip value meets the first default secret protection condition;If the first grip value meet described first preset it is hidden Private protective condition, then judge whether the first grip value meets the second default secret protection condition, if the first grip value It is unsatisfactory for the second default secret protection condition, then enters specified permission privacy protection mode;If the grip vector meets second Default secret protection condition, then access entitlements limit privacy protection mode.This method is using user to the first grip value of terminal Identify whether active user is owner, when determining active user is non-owner, further determine whether for The specified user of owner.If judging, active user is the user that owner specifies, and executes specified permission privacy and protects Shield mode so that the partial personal information of terminal access owner can be used in specified user, and can not access and not referred to The personal information of permission is determined, to protect the safety for not being designated the personal information of permission.If judging, active user is Strange user then executes permission limitation privacy protection mode, so that strange user can not related owner in browsing terminal Any personal information effectively guarantees the safety of the personal information of owner.
Referring to figure 4., Fig. 4 is the structural schematic diagram of the privacy protection device of the preferred embodiment of the present invention.The secret protection Device 300 can be applied to the electricity such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA) In sub- equipment, it is not particularly limited herein.
Privacy protection device 300 in the present embodiment includes: acquiring unit 301, the first judging unit 302 and secret protection Unit 303.Wherein, acquiring unit 301 is used to obtain the first grip value of user's application, wherein the first grip value is institute State the grip generated when user does the first deliberate action to the terminal;First judging unit 302 for judge the grip to Whether amount meets the first default secret protection condition;If secret protection unit 303 meets described first for the grip vector Default secret protection condition, then enter privacy protection mode.
When user's using terminal, generally can by terminal it is hand held in.When user's finger clicks in screen, slides When operation, hand can generate certain grip to terminal and act on.The grip value that different user generates terminal is different.Therefore, may be used To distinguish whether the user that terminal is used is owner by grip value.
In the preferred embodiment, when user holds terminal and does the first deliberate action to terminal, acquiring unit 301 User will be obtained to the first grip value of terminal, and grip vector is generated according to the first grip value.Herein, deliberate action Including one of multiple movements or a variety of such as sliding the movement of screen, clicking the movement of screen, movement of pressing keys, herein It is not particularly limited.
In a preferred embodiment, grip vector can be the vector comprising an element.For example, working as acquiring unit 301 When acquisition user does grip value when sliding screen acts, for ease of description, user is done into sliding screen movement when institute herein The grip value of acquisition, which is referred to as, slides grip value.So grip vector is to slide grip value as the vector of element.
In a preferred embodiment, acquiring unit 301 is also used to: obtaining the user to the second grip of the terminal Value, wherein the second grip value is the grip generated when user does the second deliberate action to terminal.Acquiring unit 301 is according to described First grip value and the second grip value generate grip vector, i.e., in this embodiment, grip vector be include the first grip The vector of value and the second grip value.
In other preferred embodiments, acquiring unit 301 can also obtain more kinds of grip values, and grip vector is packet at this time Vector containing more elements, is not particularly limited herein.
The first grip value that acquiring unit 301 will acquire is transferred to the first judging unit 302, by the first judging unit 302 judge whether the first grip value meets the first default secret protection condition.
In the preferred embodiment, the first judging unit 302 is specifically used for: judging whether the first grip value is in One default grip value range, and whether the first grip value and the absolute value of the difference of the first default grip average value are less than first Preset error value.Generally, the setting of the first preset error value is smaller, and the precision of judgement is higher, and the first preset error value can be with Value is carried out according to the actual situation, is not particularly limited herein.
Here, the first default grip value range refers in top n grip value corresponding with some deliberate action, with maximum Grip value be the first default grip value range the upper limit, with the smallest grip value be the first default grip value range lower limit and The the first grip value range formed.
In one embodiment, when grip vector is using the first grip value and the second grip value as the vector of element, first Grip value is corresponding with the first default grip value range and the first default grip average value, and the second grip value is corresponding with first and default holds Force value range and the second default grip average value, default grip average value vector corresponding with grip vector, wherein default to hold Power average value vector is using the first default grip average value and the second grip average value as the vector of element.
In a preferred embodiment, when grip vector is using the first grip value and the second grip value as the vector of element, First judging unit 302 is specifically used for: judge whether the first grip value is in the first default grip value range, described second Whether grip value is in the second default grip value range, and grip vector (from the first grip value and the second grip value generate to Amount) with the mould of the difference of default grip average value vector whether less than the second preset error value (judge the first grip value and The difference of the first default grip average value it is square flat with the second grip value and the difference of the second default grip average value Whether the sum of side is less than the second preset error value).
In the preferred embodiment, when the first judging unit 302 judges that the first grip value is in the first default grip value Range, and when the absolute value of the difference of the first grip value and the first default grip average value is less than the first preset error value, explanation is worked as The user of preceding using terminal is owner, and the first judging unit 302 will determine the first grip value and be unsatisfactory for first at this time Default secret protection condition, without opening privacy protection mode, user may browse through the full content in terminal.When the first judgement Unit 302 judges that the first grip value is not in the first default grip value range and/or the first grip value and the first default grip The absolute value of the difference of average value is not less than the first preset error value, then illustrates the non-owner of the user of currently used terminal.This When the first judging unit 302 will determine the first grip value meet the first default secret protection condition.
In a preferred embodiment, when grip vector is using the first grip value and the second grip value as the vector of element, If the first judging unit 302 judges that the first grip value is in the first default grip value range, the second grip value is in second Default grip value range, and the mould of the difference of the grip vector and default grip average value vector is less than the second preset error value, Then the first judging unit 302 determines that the grip vector is unsatisfactory for the first default secret protection condition, and terminal will be without hidden at this time Private protection.If the first judging unit 302 judges that the first grip value is not in the first default grip value range and/or the second grip Value is not in the mould of the difference of the second default grip value range and/or grip vector and default grip average value vector not less than the Two preset error values, then the first judging unit 302 determines that the grip vector meets the first default secret protection condition.
When the first judging unit 302 judges that the grip vector meets the first default secret protection condition, the first judgement Unit 302 will to secret protection unit 303 send the first signal so that secret protection unit 303 according to the first signal enter it is hidden Private protected mode.Here, mode can be used for only partial function in privacy protection mode, other are related to owner's personal information Function can not access.For example, active user can only make a phone call, and can not check address list, phase in privacy protection mode Volume uses the functions such as application program.Certainly, privacy protection mode is not limited to above-mentioned form, can also use other forms, This is not particularly limited.
In addition, privacy protection mode can also be arranged to generate according to the selection of owner.For example, owner is by phase Volume, bank application are arranged in privacy protection mode, then other users will be unable to when other users use the terminal Photograph album and bank application are accessed, but accessible address list, chat application etc. are not disposed in privacy protection mode Function.
In a preferred embodiment, shown in referring to figure 5., Fig. 5 is privacy protection device in the preferred embodiment of the present invention Another structural schematic diagram.The privacy protection device 300 further includes obtaining judging unit 304, wherein obtains judging unit 304 and wraps It includes and obtains subelement 3041 and judgment sub-unit 3042.When the first judging unit 302 judges that the first grip value meets first When default secret protection condition, the first judging unit 302 sends second to the acquisition subelement 3041 obtained in judging unit 304 Signal, so that obtaining the authentication information that subelement 3041 obtains user according to second signal.Here, authentication information can Think password, the answer for presetting problem etc., herein with no restrictions.
It obtains subelement 3041 and authentication information is transferred to judgment sub-unit 3042, judged by judgment sub-unit 3042 Whether the authentication information matches with default authentication information.If judgment sub-unit 3042 judges that the authentication is believed Breath is mismatched with default authentication information, then further illustrates that active user is non-owner, at this time judgment sub-unit 3042 will send third signal to secret protection unit 303, protect so that secret protection unit 303 enters privacy according to third signal Shield mode.If judgment sub-unit 3042 judges that the authentication information is matched with default authentication information, illustrate current User is owner, and terminal will not enter privacy protection mode at this time.In this way it is possible to prevente effectively from because of certain behaviour of owner The case where making erroneous judgement caused by habit changes occurs, while also improving the accuracy of the judgement of privacy protection device 300.
This preferred embodiment provides a kind of privacy protection device 300, obtains that user applies by acquiring unit 301 One grip value;First judging unit 302 judges whether the first grip value meets the first default secret protection condition;If first Judging unit 302 judges that the first grip value meets the described first default secret protection condition, then secret protection unit 303 Privacy protection mode will be entered.The device 300 identifies whether active user is machine to the first grip value of terminal using user In person, when it is non-owner that the first judging unit 302, which determines active user, secret protection unit 303 executes entrance to master Privacy protection mode so that other users can not the data such as personal information in browsing terminal in relation to owner, effectively Ground guarantees the safety of the personal information of owner.
Fig. 6 is please referred to, Fig. 6 is the another structural schematic diagram of privacy protection device in the preferred embodiment of the present invention.The privacy Protective device 400 can be applied to personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA) On equal electronic equipments, it is not particularly limited herein.
Privacy protection device 400 in this preferred embodiment is sentenced including acquiring unit 401, the first judging unit 402, second Disconnected unit 403 and secret protection unit 404, wherein secret protection unit 404 includes specified permission secret protection subelement 4041 Secret protection subelement 4042 is limited with permission.
When user's using terminal, generally can by terminal it is hand held in.When user's finger clicks in screen, slides When operation, hand can generate certain grip to terminal and act on.The grip value that different user generates terminal is different.Therefore, may be used To distinguish whether the user that terminal is used is owner by grip value.
In the preferred embodiment, when user holds terminal and does the first deliberate action to terminal, acquiring unit 401 User will be obtained to the first grip value of terminal.Herein, deliberate action includes sliding the movement of screen, clicking the dynamic of screen Make, one of multiple movements such as the movement of pressing keys or a variety of, is not particularly limited herein.
The first grip value that acquiring unit 401 will acquire is transferred to the first judging unit 402, by the first judging unit 402 judge whether the first grip value meets the first default secret protection condition.
In the preferred embodiment, the first judging unit 402 is specifically used for: judging whether the first grip value is in One default grip value range, and whether the first grip value and the absolute value of the difference of the first default grip average value are less than first Preset error value.Generally, the setting of the first preset error value is smaller, and the precision of judgement is higher, and the first preset error value can be with Value is carried out according to the actual situation, is not particularly limited herein.
Here, the first default grip value range refers in top n grip value corresponding with some deliberate action, with maximum Grip value be the first default grip value range the upper limit, with the smallest grip value be the first default grip value range lower limit and The the first grip value range formed.
In the preferred embodiment, when the first judging unit 402 judges that the first grip value is in the first default grip value Range, and when the absolute value of the difference of the first grip value and the first default grip average value is less than the first preset error value, explanation is worked as The user of preceding using terminal is owner, and the first judging unit 402 will determine the first grip value and be unsatisfactory for first at this time Default secret protection condition, for terminal without opening privacy protection mode, user may browse through the full content in terminal.When first Judging unit 402 judges that the first grip value is not in the first default grip value range and/or the first grip value and presets with first The absolute value of the difference of grip average value is not less than the first preset error value, then illustrates the non-owner's sheet of the user of currently used terminal People.The first judging unit 402 will determine the first grip value the first default secret protection condition of satisfaction at this time.
When the first judging unit 402 judges that the grip vector meets the first default secret protection condition, the first judgement The first grip value is transferred to second judgment unit 403 by unit 402, judges the first grip value by second judgment unit 403 Whether second default secret protection condition is met.Wherein, second preset hidden protective condition refer to owner specify user Corresponding default secret protection condition.When second judgment unit 403 judge the first grip value be unsatisfactory for second preset it is hidden When private protective condition, illustrate that active user is the user that owner specifies.Second judgment unit 403 will be to secret protection unit Specified permission secret protection subelement 4041 in 404 sends fourth signal, so that specified permission secret protection subelement 4041 Enter specified permission privacy protection mode corresponding with specified user according to the fourth signal, so that specified user can be with Corresponding information is browsed according to its permission.
When second judgment unit 403 judges that the first grip value meets the described second default secret protection condition, explanation Active user is strange user, rather than the user that owner is specified.At this point, second judgment unit 403 will be hidden to permission limitation Private protection subelement 4042 sends the 5th signal, so that permission limits secret protection subelement 4042 according to the 5th signal right of access Limit limitation privacy protection mode.In the preferred embodiment, permission limitation privacy protection mode refers to that strange user's lack of competence is visited Ask the mode of whole personal information of owner.Certainly, in other preferred embodiments, permission limits privacy protection mode It can be arranged according to the selection of owner and be generated.For example, owner answers photograph album, bank application, address list, chat With software setting in permission limitation privacy protection mode, then strange user will be unable to when strange user uses the terminal Photograph album, bank application, address list, chat application software are accessed, but can make a phone call etc. that be not disposed on permission limitation hidden Function in private protected mode.
In addition, in the preferred embodiment, being only provided with two default secret protection condition (the i.e. first default secret protections Condition and the second default secret protection condition), and two default secret protection conditions respectively correspond owner and owner's sheet The user that people specifies.It is understood that more specified use can be set in owner in other preferred embodiments More default secret protection conditions can be set in family accordingly.
This preferred embodiment provides a kind of privacy protection device 400, obtains that user applies by acquiring unit 401 One grip value;First judging unit 402 judges whether the first grip value meets the first default secret protection condition;If described First grip value meets the described first default secret protection condition, then second judgment unit 403 judges that the first grip value is The second default secret protection condition of no satisfaction is specified if the first grip value is unsatisfactory for the second default secret protection condition Permission secret protection subelement 4041 will enter specified permission privacy protection mode;If it is default that the first grip value meets second Secret protection condition, then access entitlements are limited privacy protection mode by permission limitation secret protection subelement 4042.The device 400 Identify whether active user is owner to the first grip value of terminal using user, when the first judging unit 402 determines When active user is non-owner out, second judgment unit 403 further determines whether the user specified for owner, if Judge that active user is the user that owner specifies, then specifies permission secret protection subelement 4041 to execute specified permission hidden Private protected mode so that the partial personal information of terminal access owner can be used in specified user, and can not access not It is designated the personal information of permission, to protect the safety for not being designated the personal information of permission.If judging currently to use Family is strange user, then permission limitation secret protection subelement 4042 executes permission and limits privacy protection mode, so that strange use Family can not any personal information in relation to owner in browsing terminal, effectively guarantee the safety of the personal information of owner Property.
The present invention also provides a kind of mobile terminals, such as tablet computer, mobile phone mobile terminal, referring to Fig. 7, Fig. 7 is this The mobile terminal structure schematic diagram that inventive embodiments provide.The mobile terminal 500 may include radio frequency (RF, Radio Frequency) circuit 501, include one or more memory 502, the input unit of computer readable storage medium 503, display unit 504, sensor 505, the processor 506 and power supply for including one or more than one processing core 507 equal components.It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 7 is not constituted to mobile terminal It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
Radio circuit 501 can be used for receiving and sending messages or communication process in signal send and receive, particularly, by base station Downlink information receive after, transfer to one or more than one processor 506 processing;In addition, the data for being related to uplink are sent To base station.In addition, radio circuit 501 can also be communicated with network and other equipment by wireless communication.
Memory 502 can be used for storing application program and data.It include that can hold in the application program that memory 502 stores Line code.Application program can form various functional modules.Processor 506 is stored in the application journey of memory 502 by operation Sequence, thereby executing various function application and data processing.
Input unit 503 can be used for receiving number, character information or the user's characteristic information (such as fingerprint) of input, and Generate keyboard related with user setting and function control, mouse, operating stick, optics or trackball signal input.Input Unit 503 may include one of touch display screen, physical keyboard, function key, fingerprint recognition mould group etc. or a variety of.
Display unit 504 can be used for showing information input by user or the information and mobile terminal that are supplied to user Various graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.
Mobile terminal 500 may also include at least one sensor 505, such as ambient light sensor, proximity sensor, gravity Acceleration transducer etc..In the preferred embodiment, sensor 505 includes at least holding power transducer, and holding power transducer can be set In on the side frame position of mobile terminal 500, the other positions of mobile terminal 500 can also be placed in, are not particularly limited herein. When user takes mobile terminal 500 and operates to mobile terminal 500, holding power transducer is for obtaining user to mobile terminal 500 grip acts on size, and the grip value that will acquire is transferred to processor 506, is answered by processor 506 according to pre-set Corresponding function is executed with program.
Processor 506 is the control centre of mobile terminal 500, utilizes various interfaces and the entire mobile terminal of connection 500 various pieces by running or execute the application program being stored in memory 502, and are called and are stored in memory Data in 502 execute the various functions and processing data of mobile terminal 500, to carry out whole prison to mobile terminal 500 Control.
Mobile terminal 500 further includes power supply 507 (such as battery), for powering to all parts.Certainly, mobile terminal 500 can also include voicefrequency circuit, camera, bluetooth module etc., and details are not described herein.
In the preferred embodiment, the processor 506 in mobile terminal obtains user to mobile whole by holding power transducer The first grip value at end 500, wherein it is default dynamic that the first grip value is that the user does first to the mobile terminal 500 As when the grip that generates.It should be noted that processor 506 can also obtain user to movement by other devices or method First grip value of terminal 500, the method that processor 506 obtains the first grip value are not limited to obtain by holding power transducer It takes, as long as available arrive user to the first grip value of mobile terminal 500.
Processor 506 will further determine whether the first grip value meets first after getting the first grip value Default secret protection condition;If the first grip value meets the described first default secret protection condition, enter secret protection Mode.
In a preferred embodiment, processor 506 execute judge the first grip value whether meet first preset it is hidden It is specific to execute: to judge whether the first grip value is in the first default grip value range, and described first when private protective condition Whether grip value and the absolute value of the difference of the first default grip average value are less than the first preset error value.When processor 506 judges The first grip value is not in the described first default grip value range and/or the first grip value and described first in advance out If the absolute value of the difference of grip average value is not less than first preset error value, processor 506 will determine first grip Value meets the described first default secret protection condition, and processor 506 will execute and enter privacy protection mode.
In a preferred embodiment, processor 506 execute obtain user to the first grip value of mobile terminal 500 when, It also executes: obtaining the second grip value that the user applies;Wherein, the second grip value is that the user does the terminal The grip generated when the second deliberate action;
Processor 506 is also held after execution judges whether the first grip value is in the first default grip value range Row judges whether the second grip value is in the second default grip value range;
Processor 506 execute judge the first grip value and the first default grip average value absolute value of the difference whether It is specific to execute: to judge the difference of the first grip value and the first default grip average value when less than the first preset error value Square with the sum of square of the second grip value and the difference of the second default grip average value whether less than the second default error Value.
In a preferred embodiment, processor 506 also executes the following steps: before executing into privacy protection mode Obtain the authentication information of the user;Judge whether the authentication information matches with default authentication information; If the authentication information and the default authentication information mismatch, enter privacy protection mode.
In a preferred embodiment, processor 506 is judging that the grip vector meets the described first default privacy and protect After guard strip part, also executes: judging whether the first grip value meets the second default secret protection condition;If described first holds Force value is unsatisfactory for the described second default secret protection condition, then enters specified permission privacy protection mode;If or described first hold Force value meets the described second default secret protection condition, then access entitlements limit privacy protection mode.
It should be noted that the application program for each step that above-mentioned processor 506 executes can store in memory 502 It is interior.Memory 506 completes the privacy of mobile terminal 500 by running or executing the application program being stored in memory 502 Defencive function.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the detailed description above with respect to method for secret protection, details are not described herein again.
Privacy protection device provided in an embodiment of the present invention is for example computer, tablet computer, the hand with touch function Method for secret protection in machine etc., the privacy protection device and foregoing embodiments belongs to same design, protects in the privacy Either offer method in the method for secret protection embodiment can be run on protection unit, specific implementation process is detailed in described Method for secret protection embodiment, details are not described herein again.
It should be noted that this field common test personnel are understood that for method for secret protection of the present invention The all or part of the process for realizing method for secret protection described in the embodiment of the present invention, is that can control phase by computer program The hardware of pass is completed, and the computer program can be stored in a computer-readable storage medium, as being stored in terminal It in memory, and is executed by least one processor in the terminal, in the process of implementation may include such as the secret protection side The process of the embodiment of method.Wherein, the storage medium can be magnetic disk, CD, read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory) etc..
Each functional unit in the embodiment of the present invention can integrate in a processing module, be also possible to each unit list It is solely physically present, can also be integrated in two or more units in a module.Above-mentioned integrated module can both use Formal implementation of hardware can also be realized in the form of software function module.If the integrated module is with software function The form of module is realized and when sold or used as an independent product, also can store in computer-readable storage Jie In matter.Storage medium mentioned above can be read-only memory, disk or CD etc..Above-mentioned each device or system, can be with Execute the method in correlation method embodiment.
In conclusion although the present invention has been disclosed above in the preferred embodiment, but above preferred embodiment is not to limit The system present invention, those skilled in the art can make various changes and profit without departing from the spirit and scope of the present invention Decorations, therefore protection scope of the present invention subjects to the scope of the claims.

Claims (8)

1. a kind of method for secret protection characterized by comprising
Obtain the first grip value that user applies, wherein it is default dynamic that the first grip value is that the user does first to terminal As when the grip that generates;
Obtain the second grip value that the user applies;Wherein, the second grip value is that the user does the to the terminal The grip generated when two deliberate actions;
Judge whether the first grip value meets the first default secret protection condition, comprising: judge that the first grip value is It is no to be in the first default grip value range;Judge whether the second grip value is in the second default grip value range;Judge institute State the square average with the second grip value and the second default grip of the difference of the first grip value and the first default grip average value Whether the sum of square of the difference of value be less than the second preset error value;
If the first grip value meets the described first default secret protection condition, enter privacy protection mode, comprising: if institute State the first grip value be not in the described first default grip value range and/or the second grip value to be not in described second pre- If grip value range and/or the first grip value and the difference of the first default grip average value square with described second The sum of square of grip value and the difference of the second default grip average value is not less than second preset error value, then determines described the One grip value and the second grip value meet the described first default secret protection condition, and enter privacy protection mode.
2. method for secret protection according to claim 1, which is characterized in that before the entrance privacy protection mode, Further include:
Obtain the authentication information of the user;
Judge whether the authentication information matches with default authentication information;
If the authentication information and the default authentication information mismatch, enter privacy protection mode.
3. method for secret protection according to claim 1, which is characterized in that if meeting institute in the first grip value After stating the first default secret protection condition, further includes:
Judge whether the first grip value meets the second default secret protection condition;
If the first grip value is unsatisfactory for the described second default secret protection condition, enter specified permission secret protection mould Formula;Or
If the first grip value meets the described second default secret protection condition, access entitlements limit privacy protection mode.
4. a kind of privacy protection device characterized by comprising
Acquiring unit, for obtaining the first grip value of user's application, wherein the first grip value is the user to terminal The grip generated when doing the first deliberate action;Obtain the second grip value that the user applies;Wherein, the second grip value is The grip that the user generates when doing the second deliberate action to the terminal;
First judging unit is specifically used for for judging whether the first grip value meets the first default secret protection condition: Judge whether the first grip value is in the first default grip value range;It is pre- to judge whether the second grip value is in second If grip value range;Judge the difference of the first grip value and the first default grip average value square with the second grip value And whether the sum of square of the difference of the second default grip average value be less than the second preset error value;
Secret protection unit enters privacy if meeting the described first default secret protection condition for the first grip value Protected mode is specifically used for: if the first grip value is not in the described first default grip value range and/or described second Grip value is not in the described second default grip value range and/or the first grip value and the described first default grip is average The difference of value square with the sum of square of the second grip value and the difference of the second default grip average value not less than described second Preset error value then determines that the first grip value and the second grip value meet the described first default secret protection condition, And enter privacy protection mode.
5. privacy protection device according to claim 4, which is characterized in that the privacy protection device further includes obtaining to sentence Disconnected unit, the acquisition judging unit include obtaining subelement and judgment sub-unit;
The authentication information for obtaining subelement and being used to obtain the user;
The judgment sub-unit is for judging whether the authentication information matches with default authentication information;
If the secret protection unit is mismatched for the authentication information and the default authentication information, enter Privacy protection mode.
6. privacy protection device according to claim 4, which is characterized in that the privacy protection device further includes second sentencing Disconnected unit, the second judgment unit is for judging whether the first grip value meets the second default secret protection condition;
The secret protection unit includes that specified permission secret protection subelement and permission limit secret protection subelement;The finger It is unsatisfactory for the described second default secret protection condition for the first grip value if determining permission secret protection subelement, is entered Specified permission privacy protection mode;If permission limitation secret protection subelement meets described for the first grip value Two default secret protection conditions, then access entitlements limit privacy protection mode.
7. a kind of mobile terminal characterized by comprising
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes such as claim 1 to right It is required that 3 described in any item method for secret protection.
8. a kind of storage medium, which is characterized in that computer program is stored in the storage medium, when the computer program When running on computers, so that the computer perform claim requires 1 to 3 described in any item method for secret protection.
CN201611085019.6A 2016-11-30 2016-11-30 A kind of method for secret protection and device, mobile terminal Expired - Fee Related CN106778339B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611085019.6A CN106778339B (en) 2016-11-30 2016-11-30 A kind of method for secret protection and device, mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611085019.6A CN106778339B (en) 2016-11-30 2016-11-30 A kind of method for secret protection and device, mobile terminal

Publications (2)

Publication Number Publication Date
CN106778339A CN106778339A (en) 2017-05-31
CN106778339B true CN106778339B (en) 2019-08-13

Family

ID=58914772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611085019.6A Expired - Fee Related CN106778339B (en) 2016-11-30 2016-11-30 A kind of method for secret protection and device, mobile terminal

Country Status (1)

Country Link
CN (1) CN106778339B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100476A (en) * 2015-07-28 2015-11-25 努比亚技术有限公司 Device and method for unlocking mobile terminal
CN105100118A (en) * 2015-08-28 2015-11-25 努比亚技术有限公司 Authentication device and method
CN105122256A (en) * 2013-04-19 2015-12-02 高通股份有限公司 Grip force sensor array for one-handed and multimodal interaction on handheld devices and methods
CN105573466A (en) * 2015-12-11 2016-05-11 广东欧珀移动通信有限公司 Mobile terminal control method and apparatus and mobile terminal
CN105872250A (en) * 2016-05-30 2016-08-17 努比亚技术有限公司 Method and device for automatically recognizing owner identity of mobile terminal
CN105930076A (en) * 2016-04-12 2016-09-07 捷开通讯(深圳)有限公司 Mobile communication terminal and method thereof for hiding selected object

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105122256A (en) * 2013-04-19 2015-12-02 高通股份有限公司 Grip force sensor array for one-handed and multimodal interaction on handheld devices and methods
CN105100476A (en) * 2015-07-28 2015-11-25 努比亚技术有限公司 Device and method for unlocking mobile terminal
CN105100118A (en) * 2015-08-28 2015-11-25 努比亚技术有限公司 Authentication device and method
CN105573466A (en) * 2015-12-11 2016-05-11 广东欧珀移动通信有限公司 Mobile terminal control method and apparatus and mobile terminal
CN105930076A (en) * 2016-04-12 2016-09-07 捷开通讯(深圳)有限公司 Mobile communication terminal and method thereof for hiding selected object
CN105872250A (en) * 2016-05-30 2016-08-17 努比亚技术有限公司 Method and device for automatically recognizing owner identity of mobile terminal

Also Published As

Publication number Publication date
CN106778339A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
CN102467462B (en) Method for protecting data stored in device and corresponding device
CN106778175B (en) Interface locking method and device and terminal equipment
CN106022079B (en) A kind of unlocked by fingerprint method and terminal
US9275210B2 (en) System and method of enhancing security of a wireless device through usage pattern detection
CN105426083B (en) A kind of file switching method and terminal
CN109583356A (en) Fingerprint identification method and Related product
CN107729836A (en) Face identification method and Related product
CN113792278A (en) Method and device for displaying application and picture and electronic equipment
EP2669834A1 (en) Mobile information terminal, grip characteristic learning method, and grip characteristic authentication method
CN104809174A (en) Opening method of terminal application
CN106815509B (en) A kind of multimedia file guard method, device and electronic equipment
CN107918496A (en) It is a kind of to input error correction method and device, a kind of device for being used to input error correction
EP2669835B1 (en) Mobile information terminal and gripping-feature learning method
CN106293080A (en) The method of a kind of user profile process and mobile terminal
CN108073303A (en) A kind of input method, device and electronic equipment
CN108519841A (en) Using startup method, terminal and computer readable storage medium
CN108781234A (en) Function control method and terminal
CN105930076A (en) Mobile communication terminal and method thereof for hiding selected object
CN104808899A (en) Terminal
CN108803988A (en) Control method of electronic device, device, storage medium and electronic equipment
CN106778339B (en) A kind of method for secret protection and device, mobile terminal
CN106874718A (en) privacy processing method, device and terminal
CN106775217B (en) A kind of application identities processing method, device and terminal
CN109634481A (en) Text display method, device, mobile terminal and storage medium
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190813

CF01 Termination of patent right due to non-payment of annual fee