CN106778339B - A kind of method for secret protection and device, mobile terminal - Google Patents
A kind of method for secret protection and device, mobile terminal Download PDFInfo
- Publication number
- CN106778339B CN106778339B CN201611085019.6A CN201611085019A CN106778339B CN 106778339 B CN106778339 B CN 106778339B CN 201611085019 A CN201611085019 A CN 201611085019A CN 106778339 B CN106778339 B CN 106778339B
- Authority
- CN
- China
- Prior art keywords
- grip
- value
- default
- grip value
- secret protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000004224 protection Effects 0.000 title claims abstract description 251
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000004590 computer program Methods 0.000 claims description 4
- 230000006870 function Effects 0.000 description 19
- 238000010586 diagram Methods 0.000 description 10
- 238000003825 pressing Methods 0.000 description 6
- 230000001681 protective effect Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 230000006399 behavior Effects 0.000 description 2
- 230000006854 communication Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005034 decoration Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of method for secret protection and device, mobile terminal.The method for secret protection includes: the first grip value for obtaining user and applying, wherein the first grip value is the grip generated when the user does the first deliberate action to terminal;Judge whether the first grip value meets the first default secret protection condition;If the first grip value meets the described first default secret protection condition, enter privacy protection mode.This method meets the first default secret protection condition in the first grip value; when the user of i.e. currently used terminal is non-owner; terminal enters privacy protection mode; so that the case where personal information etc. of owner is not intended to the information seen by other people to be protected, is effectively prevented from the leakage of personal information of owner generation.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of method for secret protection and device, mobile terminal.
Background technique
In the information age, with the increasing of information content, the safety of the personal information such as proprietary information, privacy information gradually at
The problem of being paid close attention to for people.Since the mobile intelligent terminals such as mobile phone have become the necessity of people's life, and it is often protected
The a large amount of personal information of user is deposited, for example, bank account information, privacy photo etc..Once mobile terminal is by except user
Other people use, and the personal information of user may have the risk of leakage, the especially proprietary information and privacy information of user
Etc. will greatly be challenged, the safety of personal information is influenced.
Summary of the invention
The embodiment of the present invention provides a kind of method for secret protection and device, mobile terminal, can promote the peace of personal information
Quan Xing.
The present invention provides a kind of method for secret protection comprising:
Obtain the first grip value that user applies, wherein the first grip value is that the user does first in advance to terminal
If the grip generated when movement;
Judge whether the first grip value meets the first default secret protection condition;
If the first grip value meets the described first default secret protection condition, enter privacy protection mode.
The present invention also provides a kind of privacy protection devices comprising:
Acquiring unit, for obtaining the first grip value of user's application, wherein the first grip value is the user couple
Terminal does the grip generated when the first deliberate action;
First judging unit, for judging whether the first grip value meets the first default secret protection condition;
Secret protection unit enters if meeting the described first default secret protection condition for the first grip value
Privacy protection mode.
The present invention provides a kind of mobile terminal again comprising:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes provided by the invention
A kind of method for secret protection.
The present invention provides a kind of method for secret protection and device, mobile terminal.The method for secret protection is by obtaining user
The the first grip value applied, wherein the first grip value is the grip generated when the user does deliberate action to terminal;Sentence
Whether the first grip value of breaking meets the first default secret protection condition.If it is default that the first grip value meets described first
Secret protection condition then illustrates that the user of currently used terminal is non-owner, and terminal enters privacy protection mode at this time, makes
The personal information etc. for obtaining owner is not intended to the information seen by other people to be protected, and is effectively prevented from owner's
The case where leakage of personal information, occurs, and promotes the safety of personal information.
Detailed description of the invention
Fig. 1 is the flow chart of method for secret protection in the preferred embodiment of the present invention.
Fig. 2 is user's operation schematic diagram in the preferred embodiment of the present invention.
Fig. 3 is the another flow chart of method for secret protection in the preferred embodiment of the present invention.
Fig. 4 is the structural schematic diagram of privacy protection device in the preferred embodiment of the present invention.
Fig. 5 is another structural schematic diagram of privacy protection device in the preferred embodiment of the present invention.
Fig. 6 is the another structural schematic diagram of privacy protection device in the preferred embodiment of the present invention.
Fig. 7 is the structural schematic diagram of mobile terminal of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
Term " first ", " second " in the present invention etc. can be used to describe various elements herein, but these elements are not
It is limited by these terms.These terms are only used to distinguish the first element from the other element.For example, not departing from the present invention
Range in the case where, the first control can be known as the second control, and similarly, the second control can be known as the first control.
First control and the second control both control, but it is not same control.In addition, term " includes " and " having " and it
Any deformation, it is intended that cover and non-exclusive include.
Fig. 1 is please referred to, Fig. 1 is the flow chart of method for secret protection in the preferred embodiment of the present invention.The method for secret protection
It can be applied to the electronic equipments such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA)
On, it is not particularly limited herein.
The method for secret protection in this preferred embodiment is explained in detail below.
In step s101, the first grip value that user applies is obtained, wherein the first grip value is the user couple
Terminal does the grip generated when the first deliberate action;
When user's using terminal, generally can by terminal it is hand held in.When user's finger clicks in screen, slides
When operation, hand can generate certain grip to terminal and act on.The grip value that different user generates terminal is different.Therefore, may be used
To distinguish whether the user that terminal is used is owner by grip value.
In the preferred embodiment, by the way that holding power transducer is arranged on the side frame of terminal, when user holds terminal simultaneously
And when doing the first deliberate action to terminal, holding power transducer will obtain user to the first grip value of terminal, in the present embodiment
In, terminal will generate grip vector according to the grip value after getting the first grip value.
Wherein, deliberate action includes that the movement of sliding screen, the movement for clicking screen, movement of pressing keys etc. are multiple dynamic
One of work is a variety of, is not particularly limited herein.In addition, the position of holding power transducer is not limited to the side frame of terminal,
It can be other positions, be not specifically limited herein.
Fig. 2 is referred to, Fig. 2 is user's operation schematic diagram in the preferred embodiment of the present invention.In Fig. 2, user can pass through
Slide up and down operation on the screen to browse information.When user, which holds terminal, slides up and down operation, if sliding up and down behaviour
As deliberate action, then the holding power transducer being mounted on side frame will acquire user to the first grip value of terminal.
In a preferred embodiment, user is obtained to the first grip value of terminal further include: obtains the user to described
Second grip value of terminal, wherein the second grip value is the grip generated when user does the second deliberate action to terminal.In the reality
It applies in example, terminal will generate the grip vector according to the first grip value and the second grip value, i.e., in the embodiment
In, grip vector is the vector comprising two elements.
For example, when the first deliberate action is to slide the movement of screen, when the second deliberate action is the movement of pressing keys, the
One grip value is the grip value that holding power transducer detects when user does sliding screen movement to terminal, and the second grip value is user
The grip value that holding power transducer detects when doing the movement of pressing keys to terminal.It is member with the first grip value and the second grip value
Element forms grip vector, i.e., grip vector includes two elements at this time.It should be noted that in other preferred embodiments, eventually
The holding power transducer at end can also obtain more kinds of grip values, and grip vector is the vector comprising more elements at this time, herein
It is not particularly limited.
In step s 102, judge whether the first grip value meets the first default secret protection condition;
In the preferred embodiment, judge whether the first grip value meets the first default secret protection condition and specifically wrap
It includes: judging whether the first grip value is in the first default grip value range, and the first grip value is preset with first and held
Whether the absolute value of the difference of power average value is less than the first preset error value.Generally, the setting of the first preset error value is smaller, sentences
Disconnected precision is higher, and the first preset error value can carry out value according to the actual situation, is not particularly limited herein.
In the preferred embodiment, the acquisition methods packet of the first default grip value range and the first default grip average value
Include: obtaining terminal owner, (N is integer, and N value is bigger, and the first default grip value range and the first default grip are average in preceding N
Be worth it is more accurate, if N is more than or equal to 100 integer) it is secondary that in use, holding power transducer obtains owner, to do some to terminal pre-
If N number of grip value when movement.Maximum value in N number of grip value is set as to the upper limit of the first default grip value range, is held N number of
The minimum value of force value is set as the lower limit of the first default grip value range, to obtain the first default grip value range.By N number of grip
Value is averaged to obtain the first default grip average value.
In a preferred embodiment, when obtaining the first grip value and second two grip values of grip value, i.e., grip to
It is pre- according to the above-mentioned first default grip value range and first when amount is using the first grip value and the second grip value as the vector of element
If the acquisition methods of grip average value, can get respectively the second default grip value range corresponding with the second grip value and
Second default grip average value.According to the first default grip average value and the second grip average value generate default grip average value to
Amount.
It is understood that when grip vector is vector comprising more elements, preset grip average value vector and
The corresponding default grip value range of each element can be obtained using aforesaid way.Certainly, in other preferred embodiments, in advance
If the acquisition methods of grip value range and default grip average value vector can also use other modes, specific limit is not done herein
System.In addition, default grip value range corresponding with multiple elements in grip vector may be the same or different.For example,
First default grip value range and the second default grip value range may be the same or different, and be not particularly limited herein.
In a preferred embodiment, when grip vector is using the first grip value and the second grip value as the vector of element,
Judge whether the grip vector meets the first default secret protection condition, specifically include: whether judging the first grip value
In the first default grip value range, whether the second grip value is in the second default grip value range, and the grip to
Whether the mould of the difference of amount and default grip average value vector less than the second preset error value (judges the first grip value and institute
State square square with the second grip value and the difference of the second default grip average value of the difference of the first default grip average value
The sum of whether less than the second preset error value).
In the preferred embodiment, when terminal judges that the first grip value is in the first preset pressure value range, and first
When grip value and the absolute value of the difference of the first preset pressure average value are less than the first preset error value, illustrate currently used terminal
User is owner, and terminal will determine the first grip value and be unsatisfactory for the first default secret protection condition at this time, terminal without
Privacy protection mode need to be opened, user may browse through the full content in terminal.When terminal judges that the first grip value is not in
First preset pressure value range and/or the first grip value and the absolute value of the difference of the first preset pressure average value are not less than first
Preset error value then illustrates that the user of currently used terminal is non-owner.Terminal will determine the first grip value at this time
Meet the first default secret protection condition, terminal will execute step S103.
In a preferred embodiment, when grip vector is using the first grip value and the second grip value as the vector of element,
If terminal judges that the first grip value is in the first preset pressure value range, the second grip value is in the second preset pressure value model
It encloses, and the mould of the difference of the grip vector and preset pressure average value vector then determines the grip less than the second preset error value
Vector is unsatisfactory for the first default secret protection condition, and terminal will be without secret protection at this time.If terminal judges the first grip value
Be not in the first preset pressure value range and/or the second grip value be not in the second preset pressure value range and/or pressure to
The mould of the difference of amount and preset pressure average value vector is not less than the second preset error value, then it is pre- to determine that the pressure vector meets first
If secret protection condition, terminal will execute step S103 at this time.In the preferred embodiment, it is held using the first grip value and second
Force value two parameters judge whether active user is owner, compared to only with the judgment method of a grip value for,
The accuracy that it judges is higher, more conducively distinguishes the operating habit of the operating habit of owner and other users.
In step s 103, if the first grip value meets the described first default secret protection condition, enter privacy
Protected mode.
When terminal judges that the first grip value meets the first default secret protection condition, terminal will enter secret protection
Mode.Here, mode can be used for only partial function in privacy protection mode, other are related to the function of owner's personal information
It can not access.For example, active user can only make a phone call, and can not check address list, photograph album, make in privacy protection mode
With functions such as application programs.Certainly, privacy protection mode is not limited to above-mentioned form, can also use other forms, herein not
Do concrete restriction.
In addition, privacy protection mode can also be arranged to generate according to the selection of owner.For example, owner is by phase
Volume, bank application are arranged in privacy protection mode, then other users will be unable to when other users use the terminal
Photograph album and bank application are accessed, but accessible address list, chat application etc. are not disposed in privacy protection mode
Function.
In a preferred embodiment, erroneous judgement situation caused by certain operating habit of owner changes in order to prevent
Occur, before entering hidden protected mode, further includes: obtain the authentication information of the user;Judge the authentication
Whether information matches with default authentication information;If the authentication information and the default authentication information are not
Match, then enters privacy protection mode.Here, authentication information can be password, the answer for presetting problem etc., herein
With no restrictions.
For example, terminal will be prompted to active user and input password when terminal judges that active user is non-owner, or
The pop-up of person's terminal includes the dialog box of default problem;Active user will be according to the prompt input password of terminal or default problem
Answer;Whether terminal matches with pre-set password or answer the password for judging user's input or answer.If matching,
Illustrate that active user is owner, privacy protection mode will not be entered at this time.If mismatching, active user is further illustrated
For non-owner, terminal will enter privacy protection mode at this time.In this way it is possible to prevente effectively from certain operation is practised because of owner
The case where erroneous judgement, occurs caused by used change, while also improving the accuracy of method for secret protection.
This preferred embodiment provides a kind of method for secret protection, the first grip value applied by obtaining user;Judgement
Whether the first grip value meets the first default secret protection condition;If the first grip value meet described first preset it is hidden
Private protective condition then enters privacy protection mode.Whether this method identifies active user to the grip value of terminal using user
It for owner, is executed when determining active user and being non-owner and enters privacy protection mode, so that other are used
Family can not the data such as personal information in browsing terminal in relation to owner, effectively guarantee the peace of the personal information of owner
Quan Xing.
Referring to figure 3., Fig. 3 is the another flow chart of method for secret protection in the preferred embodiment of the present invention.The secret protection
Method can be applied to the electronics such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA)
In equipment, it is not particularly limited herein.
The method for secret protection in this preferred embodiment is explained in detail below.
In step s 201, the first grip value that user applies is obtained, wherein the first grip value is the user couple
Terminal does the grip generated when the first deliberate action;
When user's using terminal, generally can by terminal it is hand held in.When user's finger clicks in screen, slides
When operation, hand can generate certain grip to terminal and act on.The grip value that different user generates terminal is different.Therefore, may be used
To distinguish whether the user that terminal is used is owner by grip value.
In the preferred embodiment, by the way that holding power transducer is arranged on the side frame of terminal, when user holds terminal simultaneously
And when doing the first deliberate action to terminal, holding power transducer will obtain user to the first grip value of terminal.Herein, it presets
Movement includes one of multiple movements such as the movement of sliding screen, the movement for clicking screen, the movement of pressing keys or a variety of,
It is not particularly limited herein.In addition, the position of holding power transducer is not limited to the side frame of terminal, it can be other positions,
It is not specifically limited herein.
In step S202, judge whether the first grip value meets the first default secret protection condition;
In the preferred embodiment, judge whether the first grip value meets the first default secret protection condition and specifically wrap
It includes: judging whether the first grip value is in the first default grip value range, and the first grip value is preset with first and held
Whether the absolute value of the difference of power average value is less than the first preset error value.Generally, the setting of the first preset error value is smaller, sentences
Disconnected precision is higher, and the first preset error value can carry out value according to the actual situation, is not particularly limited herein.
Here, the acquisition methods of the first default grip value range and the first default grip average value vector include: to obtain eventually
Terminal master preceding N (N is integer, and N value is bigger, and the first default grip value range and the first default grip average value are more accurate,
If N is more than or equal to 100 integer) it is secondary in use, when holding power transducer acquisition owner does some deliberate action to terminal
N number of grip value.Maximum value in N number of grip value is set as to the upper limit of the first default grip value range, most by N number of grip value
Small value is set as the lower limit of the first default grip value range, to obtain the first default grip value range.N number of grip value is averaged
Value obtains the first default grip average value.In other preferred embodiments, the first default grip value range and first default is held
The acquisition methods of power average value can also use other modes, be not particularly limited herein.
In the preferred embodiment, when terminal judges that the first grip value is in default grip value range, and the first grip
When the average value of value and the difference of default grip average value is less than the first preset error value, illustrate that the user of currently used terminal is machine
Main terminal will determine the first grip value and be unsatisfactory for the first default secret protection condition at this time in person, and terminal is hidden without opening
Private protected mode, user may browse through the full content in terminal.When terminal judges that the first grip value is not in first and presets
Grip value range and/or the first grip value and the absolute value of the difference of the first default grip average value are not less than the first default error
Value, then illustrate the non-owner of the user of currently used terminal.It is pre- will to determine the first grip value satisfaction first for terminal at this time
If secret protection condition, terminal will execute step S203.
In step S203, if the first grip value meets the described first default secret protection condition, described in judgement
Whether the first grip value meets the second default secret protection condition;
In the preferred embodiment, different access authority different people can be arranged in owner.That is, to not
With people, different privacy protection modes is set.For example, average by the above-mentioned first default grip value range and the first default grip
To get, third corresponding with the mother of owner presets grip value range to the acquisition methods of value and third presets grip
Average value generates the second default secret protection condition corresponding with mother.Accessible interior of mother is arranged in owner
The content held and cannot accessed, material is thus formed specified permission privacy protection modes.It is understood that specified permission is hidden
Private protected mode refers to that mother may only access the specified content of owner, unspecified interior without accessible owner
Hold (such as: in specified permission privacy protection mode, the address list of the accessible owner of mother, but lack of competence accesses owner's sheet
The photograph album of people).
In addition, in the preferred embodiment, terminal judges whether the first grip value meets the second default secret protection condition
To judge whether the first grip value meets the method for the first default secret protection condition similar specific method and front, in order to illustrate
The terseness of book, no longer illustrates herein.
When terminal judges that the first grip value is unsatisfactory for the second default secret protection condition, then illustrate that active user is owner
I am specified user (such as: the mother of owner), at this point, terminal will execute step S204.When terminal judges that first holds
Force value meets the second default secret protection condition, then illustrates that active user is strange user, rather than the use that owner is specified
Family, terminal will execute step S205 at this time.
In step S204, if the first grip value is unsatisfactory for the described second default secret protection condition, enters and refer to
Determine permission privacy protection mode;
When terminal judges that the first grip value is unsatisfactory for the second default secret protection condition, illustrate that active user is owner
I am specified user, and terminal will enter pre-set specified permission privacy protection mode corresponding with specified user,
Specified user is allowed to browse corresponding information according to its permission.
In step S205, if the first grip value meets the described second default secret protection condition, access entitlements
Limit privacy protection mode.
When terminal judges that the first grip value meets the second default secret protection condition, illustrate that active user is strange use
Access entitlements are limited privacy protection mode by family, terminal.In the preferred embodiment, permission limitation privacy protection mode refers to footpath between fields
The mode of whole personal information of raw user's lack of competence access owner.Certainly, in other preferred embodiments, permission limitation
Privacy protection mode can also be arranged according to the selection of owner to be generated.For example, owner is by photograph album, Bank application journey
Sequence, address list, the setting of chat application software are in permission limitation privacy protection mode, then when strange user uses the terminal
When, strange user will be unable to access photograph album, bank application, address list, chat application software, but can make a phone call etc. not
Function in permission limitation privacy protection mode is set.
In addition, in the preferred embodiment, being only provided with two default secret protection condition (the i.e. first default secret protections
Condition and the second default secret protection condition), and two default secret protection conditions respectively correspond owner and owner's sheet
The user that people specifies.It is understood that more specified use can be set in owner in other preferred embodiments
More default secret protection conditions can be set in family accordingly.
For example, user's number that owner specifies is two, respectively the first designated user and the second designated user.When
Judge the first grip value to meet the second default secret protection condition that (it is corresponding with the first designated user, generation method and the
The generation method of one default secret protection condition is similar) when, illustrating active user not is the first designated user.Terminal is further sentenced
The first grip value of breaking whether meet third preset secret protection condition (it is corresponding with the second designated user, generation method with
The generation method of first default secret protection condition is similar), if judging, the first grip value is unsatisfactory for third and presets privacy guarantor
Guard strip part then illustrates that active user is the second designated user, at this point, terminal will execute specify corresponding with the second designated user
Permission privacy protection mode.
This preferred embodiment provides a kind of method for secret protection, the first grip value applied by obtaining user;Judgement
Whether the first grip value meets the first default secret protection condition;If the first grip value meet described first preset it is hidden
Private protective condition, then judge whether the first grip value meets the second default secret protection condition, if the first grip value
It is unsatisfactory for the second default secret protection condition, then enters specified permission privacy protection mode;If the grip vector meets second
Default secret protection condition, then access entitlements limit privacy protection mode.This method is using user to the first grip value of terminal
Identify whether active user is owner, when determining active user is non-owner, further determine whether for
The specified user of owner.If judging, active user is the user that owner specifies, and executes specified permission privacy and protects
Shield mode so that the partial personal information of terminal access owner can be used in specified user, and can not access and not referred to
The personal information of permission is determined, to protect the safety for not being designated the personal information of permission.If judging, active user is
Strange user then executes permission limitation privacy protection mode, so that strange user can not related owner in browsing terminal
Any personal information effectively guarantees the safety of the personal information of owner.
Referring to figure 4., Fig. 4 is the structural schematic diagram of the privacy protection device of the preferred embodiment of the present invention.The secret protection
Device 300 can be applied to the electricity such as personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA)
In sub- equipment, it is not particularly limited herein.
Privacy protection device 300 in the present embodiment includes: acquiring unit 301, the first judging unit 302 and secret protection
Unit 303.Wherein, acquiring unit 301 is used to obtain the first grip value of user's application, wherein the first grip value is institute
State the grip generated when user does the first deliberate action to the terminal;First judging unit 302 for judge the grip to
Whether amount meets the first default secret protection condition;If secret protection unit 303 meets described first for the grip vector
Default secret protection condition, then enter privacy protection mode.
When user's using terminal, generally can by terminal it is hand held in.When user's finger clicks in screen, slides
When operation, hand can generate certain grip to terminal and act on.The grip value that different user generates terminal is different.Therefore, may be used
To distinguish whether the user that terminal is used is owner by grip value.
In the preferred embodiment, when user holds terminal and does the first deliberate action to terminal, acquiring unit 301
User will be obtained to the first grip value of terminal, and grip vector is generated according to the first grip value.Herein, deliberate action
Including one of multiple movements or a variety of such as sliding the movement of screen, clicking the movement of screen, movement of pressing keys, herein
It is not particularly limited.
In a preferred embodiment, grip vector can be the vector comprising an element.For example, working as acquiring unit 301
When acquisition user does grip value when sliding screen acts, for ease of description, user is done into sliding screen movement when institute herein
The grip value of acquisition, which is referred to as, slides grip value.So grip vector is to slide grip value as the vector of element.
In a preferred embodiment, acquiring unit 301 is also used to: obtaining the user to the second grip of the terminal
Value, wherein the second grip value is the grip generated when user does the second deliberate action to terminal.Acquiring unit 301 is according to described
First grip value and the second grip value generate grip vector, i.e., in this embodiment, grip vector be include the first grip
The vector of value and the second grip value.
In other preferred embodiments, acquiring unit 301 can also obtain more kinds of grip values, and grip vector is packet at this time
Vector containing more elements, is not particularly limited herein.
The first grip value that acquiring unit 301 will acquire is transferred to the first judging unit 302, by the first judging unit
302 judge whether the first grip value meets the first default secret protection condition.
In the preferred embodiment, the first judging unit 302 is specifically used for: judging whether the first grip value is in
One default grip value range, and whether the first grip value and the absolute value of the difference of the first default grip average value are less than first
Preset error value.Generally, the setting of the first preset error value is smaller, and the precision of judgement is higher, and the first preset error value can be with
Value is carried out according to the actual situation, is not particularly limited herein.
Here, the first default grip value range refers in top n grip value corresponding with some deliberate action, with maximum
Grip value be the first default grip value range the upper limit, with the smallest grip value be the first default grip value range lower limit and
The the first grip value range formed.
In one embodiment, when grip vector is using the first grip value and the second grip value as the vector of element, first
Grip value is corresponding with the first default grip value range and the first default grip average value, and the second grip value is corresponding with first and default holds
Force value range and the second default grip average value, default grip average value vector corresponding with grip vector, wherein default to hold
Power average value vector is using the first default grip average value and the second grip average value as the vector of element.
In a preferred embodiment, when grip vector is using the first grip value and the second grip value as the vector of element,
First judging unit 302 is specifically used for: judge whether the first grip value is in the first default grip value range, described second
Whether grip value is in the second default grip value range, and grip vector (from the first grip value and the second grip value generate to
Amount) with the mould of the difference of default grip average value vector whether less than the second preset error value (judge the first grip value and
The difference of the first default grip average value it is square flat with the second grip value and the difference of the second default grip average value
Whether the sum of side is less than the second preset error value).
In the preferred embodiment, when the first judging unit 302 judges that the first grip value is in the first default grip value
Range, and when the absolute value of the difference of the first grip value and the first default grip average value is less than the first preset error value, explanation is worked as
The user of preceding using terminal is owner, and the first judging unit 302 will determine the first grip value and be unsatisfactory for first at this time
Default secret protection condition, without opening privacy protection mode, user may browse through the full content in terminal.When the first judgement
Unit 302 judges that the first grip value is not in the first default grip value range and/or the first grip value and the first default grip
The absolute value of the difference of average value is not less than the first preset error value, then illustrates the non-owner of the user of currently used terminal.This
When the first judging unit 302 will determine the first grip value meet the first default secret protection condition.
In a preferred embodiment, when grip vector is using the first grip value and the second grip value as the vector of element,
If the first judging unit 302 judges that the first grip value is in the first default grip value range, the second grip value is in second
Default grip value range, and the mould of the difference of the grip vector and default grip average value vector is less than the second preset error value,
Then the first judging unit 302 determines that the grip vector is unsatisfactory for the first default secret protection condition, and terminal will be without hidden at this time
Private protection.If the first judging unit 302 judges that the first grip value is not in the first default grip value range and/or the second grip
Value is not in the mould of the difference of the second default grip value range and/or grip vector and default grip average value vector not less than the
Two preset error values, then the first judging unit 302 determines that the grip vector meets the first default secret protection condition.
When the first judging unit 302 judges that the grip vector meets the first default secret protection condition, the first judgement
Unit 302 will to secret protection unit 303 send the first signal so that secret protection unit 303 according to the first signal enter it is hidden
Private protected mode.Here, mode can be used for only partial function in privacy protection mode, other are related to owner's personal information
Function can not access.For example, active user can only make a phone call, and can not check address list, phase in privacy protection mode
Volume uses the functions such as application program.Certainly, privacy protection mode is not limited to above-mentioned form, can also use other forms,
This is not particularly limited.
In addition, privacy protection mode can also be arranged to generate according to the selection of owner.For example, owner is by phase
Volume, bank application are arranged in privacy protection mode, then other users will be unable to when other users use the terminal
Photograph album and bank application are accessed, but accessible address list, chat application etc. are not disposed in privacy protection mode
Function.
In a preferred embodiment, shown in referring to figure 5., Fig. 5 is privacy protection device in the preferred embodiment of the present invention
Another structural schematic diagram.The privacy protection device 300 further includes obtaining judging unit 304, wherein obtains judging unit 304 and wraps
It includes and obtains subelement 3041 and judgment sub-unit 3042.When the first judging unit 302 judges that the first grip value meets first
When default secret protection condition, the first judging unit 302 sends second to the acquisition subelement 3041 obtained in judging unit 304
Signal, so that obtaining the authentication information that subelement 3041 obtains user according to second signal.Here, authentication information can
Think password, the answer for presetting problem etc., herein with no restrictions.
It obtains subelement 3041 and authentication information is transferred to judgment sub-unit 3042, judged by judgment sub-unit 3042
Whether the authentication information matches with default authentication information.If judgment sub-unit 3042 judges that the authentication is believed
Breath is mismatched with default authentication information, then further illustrates that active user is non-owner, at this time judgment sub-unit
3042 will send third signal to secret protection unit 303, protect so that secret protection unit 303 enters privacy according to third signal
Shield mode.If judgment sub-unit 3042 judges that the authentication information is matched with default authentication information, illustrate current
User is owner, and terminal will not enter privacy protection mode at this time.In this way it is possible to prevente effectively from because of certain behaviour of owner
The case where making erroneous judgement caused by habit changes occurs, while also improving the accuracy of the judgement of privacy protection device 300.
This preferred embodiment provides a kind of privacy protection device 300, obtains that user applies by acquiring unit 301
One grip value;First judging unit 302 judges whether the first grip value meets the first default secret protection condition;If first
Judging unit 302 judges that the first grip value meets the described first default secret protection condition, then secret protection unit 303
Privacy protection mode will be entered.The device 300 identifies whether active user is machine to the first grip value of terminal using user
In person, when it is non-owner that the first judging unit 302, which determines active user, secret protection unit 303 executes entrance to master
Privacy protection mode so that other users can not the data such as personal information in browsing terminal in relation to owner, effectively
Ground guarantees the safety of the personal information of owner.
Fig. 6 is please referred to, Fig. 6 is the another structural schematic diagram of privacy protection device in the preferred embodiment of the present invention.The privacy
Protective device 400 can be applied to personal computer, hand-held or laptop devices, mobile phone, personal digital assistant (PDA)
On equal electronic equipments, it is not particularly limited herein.
Privacy protection device 400 in this preferred embodiment is sentenced including acquiring unit 401, the first judging unit 402, second
Disconnected unit 403 and secret protection unit 404, wherein secret protection unit 404 includes specified permission secret protection subelement 4041
Secret protection subelement 4042 is limited with permission.
When user's using terminal, generally can by terminal it is hand held in.When user's finger clicks in screen, slides
When operation, hand can generate certain grip to terminal and act on.The grip value that different user generates terminal is different.Therefore, may be used
To distinguish whether the user that terminal is used is owner by grip value.
In the preferred embodiment, when user holds terminal and does the first deliberate action to terminal, acquiring unit 401
User will be obtained to the first grip value of terminal.Herein, deliberate action includes sliding the movement of screen, clicking the dynamic of screen
Make, one of multiple movements such as the movement of pressing keys or a variety of, is not particularly limited herein.
The first grip value that acquiring unit 401 will acquire is transferred to the first judging unit 402, by the first judging unit
402 judge whether the first grip value meets the first default secret protection condition.
In the preferred embodiment, the first judging unit 402 is specifically used for: judging whether the first grip value is in
One default grip value range, and whether the first grip value and the absolute value of the difference of the first default grip average value are less than first
Preset error value.Generally, the setting of the first preset error value is smaller, and the precision of judgement is higher, and the first preset error value can be with
Value is carried out according to the actual situation, is not particularly limited herein.
Here, the first default grip value range refers in top n grip value corresponding with some deliberate action, with maximum
Grip value be the first default grip value range the upper limit, with the smallest grip value be the first default grip value range lower limit and
The the first grip value range formed.
In the preferred embodiment, when the first judging unit 402 judges that the first grip value is in the first default grip value
Range, and when the absolute value of the difference of the first grip value and the first default grip average value is less than the first preset error value, explanation is worked as
The user of preceding using terminal is owner, and the first judging unit 402 will determine the first grip value and be unsatisfactory for first at this time
Default secret protection condition, for terminal without opening privacy protection mode, user may browse through the full content in terminal.When first
Judging unit 402 judges that the first grip value is not in the first default grip value range and/or the first grip value and presets with first
The absolute value of the difference of grip average value is not less than the first preset error value, then illustrates the non-owner's sheet of the user of currently used terminal
People.The first judging unit 402 will determine the first grip value the first default secret protection condition of satisfaction at this time.
When the first judging unit 402 judges that the grip vector meets the first default secret protection condition, the first judgement
The first grip value is transferred to second judgment unit 403 by unit 402, judges the first grip value by second judgment unit 403
Whether second default secret protection condition is met.Wherein, second preset hidden protective condition refer to owner specify user
Corresponding default secret protection condition.When second judgment unit 403 judge the first grip value be unsatisfactory for second preset it is hidden
When private protective condition, illustrate that active user is the user that owner specifies.Second judgment unit 403 will be to secret protection unit
Specified permission secret protection subelement 4041 in 404 sends fourth signal, so that specified permission secret protection subelement 4041
Enter specified permission privacy protection mode corresponding with specified user according to the fourth signal, so that specified user can be with
Corresponding information is browsed according to its permission.
When second judgment unit 403 judges that the first grip value meets the described second default secret protection condition, explanation
Active user is strange user, rather than the user that owner is specified.At this point, second judgment unit 403 will be hidden to permission limitation
Private protection subelement 4042 sends the 5th signal, so that permission limits secret protection subelement 4042 according to the 5th signal right of access
Limit limitation privacy protection mode.In the preferred embodiment, permission limitation privacy protection mode refers to that strange user's lack of competence is visited
Ask the mode of whole personal information of owner.Certainly, in other preferred embodiments, permission limits privacy protection mode
It can be arranged according to the selection of owner and be generated.For example, owner answers photograph album, bank application, address list, chat
With software setting in permission limitation privacy protection mode, then strange user will be unable to when strange user uses the terminal
Photograph album, bank application, address list, chat application software are accessed, but can make a phone call etc. that be not disposed on permission limitation hidden
Function in private protected mode.
In addition, in the preferred embodiment, being only provided with two default secret protection condition (the i.e. first default secret protections
Condition and the second default secret protection condition), and two default secret protection conditions respectively correspond owner and owner's sheet
The user that people specifies.It is understood that more specified use can be set in owner in other preferred embodiments
More default secret protection conditions can be set in family accordingly.
This preferred embodiment provides a kind of privacy protection device 400, obtains that user applies by acquiring unit 401
One grip value;First judging unit 402 judges whether the first grip value meets the first default secret protection condition;If described
First grip value meets the described first default secret protection condition, then second judgment unit 403 judges that the first grip value is
The second default secret protection condition of no satisfaction is specified if the first grip value is unsatisfactory for the second default secret protection condition
Permission secret protection subelement 4041 will enter specified permission privacy protection mode;If it is default that the first grip value meets second
Secret protection condition, then access entitlements are limited privacy protection mode by permission limitation secret protection subelement 4042.The device 400
Identify whether active user is owner to the first grip value of terminal using user, when the first judging unit 402 determines
When active user is non-owner out, second judgment unit 403 further determines whether the user specified for owner, if
Judge that active user is the user that owner specifies, then specifies permission secret protection subelement 4041 to execute specified permission hidden
Private protected mode so that the partial personal information of terminal access owner can be used in specified user, and can not access not
It is designated the personal information of permission, to protect the safety for not being designated the personal information of permission.If judging currently to use
Family is strange user, then permission limitation secret protection subelement 4042 executes permission and limits privacy protection mode, so that strange use
Family can not any personal information in relation to owner in browsing terminal, effectively guarantee the safety of the personal information of owner
Property.
The present invention also provides a kind of mobile terminals, such as tablet computer, mobile phone mobile terminal, referring to Fig. 7, Fig. 7 is this
The mobile terminal structure schematic diagram that inventive embodiments provide.The mobile terminal 500 may include radio frequency (RF, Radio
Frequency) circuit 501, include one or more memory 502, the input unit of computer readable storage medium
503, display unit 504, sensor 505, the processor 506 and power supply for including one or more than one processing core
507 equal components.It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 7 is not constituted to mobile terminal
It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
Radio circuit 501 can be used for receiving and sending messages or communication process in signal send and receive, particularly, by base station
Downlink information receive after, transfer to one or more than one processor 506 processing;In addition, the data for being related to uplink are sent
To base station.In addition, radio circuit 501 can also be communicated with network and other equipment by wireless communication.
Memory 502 can be used for storing application program and data.It include that can hold in the application program that memory 502 stores
Line code.Application program can form various functional modules.Processor 506 is stored in the application journey of memory 502 by operation
Sequence, thereby executing various function application and data processing.
Input unit 503 can be used for receiving number, character information or the user's characteristic information (such as fingerprint) of input, and
Generate keyboard related with user setting and function control, mouse, operating stick, optics or trackball signal input.Input
Unit 503 may include one of touch display screen, physical keyboard, function key, fingerprint recognition mould group etc. or a variety of.
Display unit 504 can be used for showing information input by user or the information and mobile terminal that are supplied to user
Various graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.
Mobile terminal 500 may also include at least one sensor 505, such as ambient light sensor, proximity sensor, gravity
Acceleration transducer etc..In the preferred embodiment, sensor 505 includes at least holding power transducer, and holding power transducer can be set
In on the side frame position of mobile terminal 500, the other positions of mobile terminal 500 can also be placed in, are not particularly limited herein.
When user takes mobile terminal 500 and operates to mobile terminal 500, holding power transducer is for obtaining user to mobile terminal
500 grip acts on size, and the grip value that will acquire is transferred to processor 506, is answered by processor 506 according to pre-set
Corresponding function is executed with program.
Processor 506 is the control centre of mobile terminal 500, utilizes various interfaces and the entire mobile terminal of connection
500 various pieces by running or execute the application program being stored in memory 502, and are called and are stored in memory
Data in 502 execute the various functions and processing data of mobile terminal 500, to carry out whole prison to mobile terminal 500
Control.
Mobile terminal 500 further includes power supply 507 (such as battery), for powering to all parts.Certainly, mobile terminal
500 can also include voicefrequency circuit, camera, bluetooth module etc., and details are not described herein.
In the preferred embodiment, the processor 506 in mobile terminal obtains user to mobile whole by holding power transducer
The first grip value at end 500, wherein it is default dynamic that the first grip value is that the user does first to the mobile terminal 500
As when the grip that generates.It should be noted that processor 506 can also obtain user to movement by other devices or method
First grip value of terminal 500, the method that processor 506 obtains the first grip value are not limited to obtain by holding power transducer
It takes, as long as available arrive user to the first grip value of mobile terminal 500.
Processor 506 will further determine whether the first grip value meets first after getting the first grip value
Default secret protection condition;If the first grip value meets the described first default secret protection condition, enter secret protection
Mode.
In a preferred embodiment, processor 506 execute judge the first grip value whether meet first preset it is hidden
It is specific to execute: to judge whether the first grip value is in the first default grip value range, and described first when private protective condition
Whether grip value and the absolute value of the difference of the first default grip average value are less than the first preset error value.When processor 506 judges
The first grip value is not in the described first default grip value range and/or the first grip value and described first in advance out
If the absolute value of the difference of grip average value is not less than first preset error value, processor 506 will determine first grip
Value meets the described first default secret protection condition, and processor 506 will execute and enter privacy protection mode.
In a preferred embodiment, processor 506 execute obtain user to the first grip value of mobile terminal 500 when,
It also executes: obtaining the second grip value that the user applies;Wherein, the second grip value is that the user does the terminal
The grip generated when the second deliberate action;
Processor 506 is also held after execution judges whether the first grip value is in the first default grip value range
Row judges whether the second grip value is in the second default grip value range;
Processor 506 execute judge the first grip value and the first default grip average value absolute value of the difference whether
It is specific to execute: to judge the difference of the first grip value and the first default grip average value when less than the first preset error value
Square with the sum of square of the second grip value and the difference of the second default grip average value whether less than the second default error
Value.
In a preferred embodiment, processor 506 also executes the following steps: before executing into privacy protection mode
Obtain the authentication information of the user;Judge whether the authentication information matches with default authentication information;
If the authentication information and the default authentication information mismatch, enter privacy protection mode.
In a preferred embodiment, processor 506 is judging that the grip vector meets the described first default privacy and protect
After guard strip part, also executes: judging whether the first grip value meets the second default secret protection condition;If described first holds
Force value is unsatisfactory for the described second default secret protection condition, then enters specified permission privacy protection mode;If or described first hold
Force value meets the described second default secret protection condition, then access entitlements limit privacy protection mode.
It should be noted that the application program for each step that above-mentioned processor 506 executes can store in memory 502
It is interior.Memory 506 completes the privacy of mobile terminal 500 by running or executing the application program being stored in memory 502
Defencive function.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the detailed description above with respect to method for secret protection, details are not described herein again.
Privacy protection device provided in an embodiment of the present invention is for example computer, tablet computer, the hand with touch function
Method for secret protection in machine etc., the privacy protection device and foregoing embodiments belongs to same design, protects in the privacy
Either offer method in the method for secret protection embodiment can be run on protection unit, specific implementation process is detailed in described
Method for secret protection embodiment, details are not described herein again.
It should be noted that this field common test personnel are understood that for method for secret protection of the present invention
The all or part of the process for realizing method for secret protection described in the embodiment of the present invention, is that can control phase by computer program
The hardware of pass is completed, and the computer program can be stored in a computer-readable storage medium, as being stored in terminal
It in memory, and is executed by least one processor in the terminal, in the process of implementation may include such as the secret protection side
The process of the embodiment of method.Wherein, the storage medium can be magnetic disk, CD, read-only memory (ROM, Read Only
Memory), random access memory (RAM, Random Access Memory) etc..
Each functional unit in the embodiment of the present invention can integrate in a processing module, be also possible to each unit list
It is solely physically present, can also be integrated in two or more units in a module.Above-mentioned integrated module can both use
Formal implementation of hardware can also be realized in the form of software function module.If the integrated module is with software function
The form of module is realized and when sold or used as an independent product, also can store in computer-readable storage Jie
In matter.Storage medium mentioned above can be read-only memory, disk or CD etc..Above-mentioned each device or system, can be with
Execute the method in correlation method embodiment.
In conclusion although the present invention has been disclosed above in the preferred embodiment, but above preferred embodiment is not to limit
The system present invention, those skilled in the art can make various changes and profit without departing from the spirit and scope of the present invention
Decorations, therefore protection scope of the present invention subjects to the scope of the claims.
Claims (8)
1. a kind of method for secret protection characterized by comprising
Obtain the first grip value that user applies, wherein it is default dynamic that the first grip value is that the user does first to terminal
As when the grip that generates;
Obtain the second grip value that the user applies;Wherein, the second grip value is that the user does the to the terminal
The grip generated when two deliberate actions;
Judge whether the first grip value meets the first default secret protection condition, comprising: judge that the first grip value is
It is no to be in the first default grip value range;Judge whether the second grip value is in the second default grip value range;Judge institute
State the square average with the second grip value and the second default grip of the difference of the first grip value and the first default grip average value
Whether the sum of square of the difference of value be less than the second preset error value;
If the first grip value meets the described first default secret protection condition, enter privacy protection mode, comprising: if institute
State the first grip value be not in the described first default grip value range and/or the second grip value to be not in described second pre-
If grip value range and/or the first grip value and the difference of the first default grip average value square with described second
The sum of square of grip value and the difference of the second default grip average value is not less than second preset error value, then determines described the
One grip value and the second grip value meet the described first default secret protection condition, and enter privacy protection mode.
2. method for secret protection according to claim 1, which is characterized in that before the entrance privacy protection mode,
Further include:
Obtain the authentication information of the user;
Judge whether the authentication information matches with default authentication information;
If the authentication information and the default authentication information mismatch, enter privacy protection mode.
3. method for secret protection according to claim 1, which is characterized in that if meeting institute in the first grip value
After stating the first default secret protection condition, further includes:
Judge whether the first grip value meets the second default secret protection condition;
If the first grip value is unsatisfactory for the described second default secret protection condition, enter specified permission secret protection mould
Formula;Or
If the first grip value meets the described second default secret protection condition, access entitlements limit privacy protection mode.
4. a kind of privacy protection device characterized by comprising
Acquiring unit, for obtaining the first grip value of user's application, wherein the first grip value is the user to terminal
The grip generated when doing the first deliberate action;Obtain the second grip value that the user applies;Wherein, the second grip value is
The grip that the user generates when doing the second deliberate action to the terminal;
First judging unit is specifically used for for judging whether the first grip value meets the first default secret protection condition:
Judge whether the first grip value is in the first default grip value range;It is pre- to judge whether the second grip value is in second
If grip value range;Judge the difference of the first grip value and the first default grip average value square with the second grip value
And whether the sum of square of the difference of the second default grip average value be less than the second preset error value;
Secret protection unit enters privacy if meeting the described first default secret protection condition for the first grip value
Protected mode is specifically used for: if the first grip value is not in the described first default grip value range and/or described second
Grip value is not in the described second default grip value range and/or the first grip value and the described first default grip is average
The difference of value square with the sum of square of the second grip value and the difference of the second default grip average value not less than described second
Preset error value then determines that the first grip value and the second grip value meet the described first default secret protection condition,
And enter privacy protection mode.
5. privacy protection device according to claim 4, which is characterized in that the privacy protection device further includes obtaining to sentence
Disconnected unit, the acquisition judging unit include obtaining subelement and judgment sub-unit;
The authentication information for obtaining subelement and being used to obtain the user;
The judgment sub-unit is for judging whether the authentication information matches with default authentication information;
If the secret protection unit is mismatched for the authentication information and the default authentication information, enter
Privacy protection mode.
6. privacy protection device according to claim 4, which is characterized in that the privacy protection device further includes second sentencing
Disconnected unit, the second judgment unit is for judging whether the first grip value meets the second default secret protection condition;
The secret protection unit includes that specified permission secret protection subelement and permission limit secret protection subelement;The finger
It is unsatisfactory for the described second default secret protection condition for the first grip value if determining permission secret protection subelement, is entered
Specified permission privacy protection mode;If permission limitation secret protection subelement meets described for the first grip value
Two default secret protection conditions, then access entitlements limit privacy protection mode.
7. a kind of mobile terminal characterized by comprising
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes such as claim 1 to right
It is required that 3 described in any item method for secret protection.
8. a kind of storage medium, which is characterized in that computer program is stored in the storage medium, when the computer program
When running on computers, so that the computer perform claim requires 1 to 3 described in any item method for secret protection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085019.6A CN106778339B (en) | 2016-11-30 | 2016-11-30 | A kind of method for secret protection and device, mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085019.6A CN106778339B (en) | 2016-11-30 | 2016-11-30 | A kind of method for secret protection and device, mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106778339A CN106778339A (en) | 2017-05-31 |
CN106778339B true CN106778339B (en) | 2019-08-13 |
Family
ID=58914772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611085019.6A Expired - Fee Related CN106778339B (en) | 2016-11-30 | 2016-11-30 | A kind of method for secret protection and device, mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778339B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111125770A (en) * | 2019-12-27 | 2020-05-08 | 维沃移动通信有限公司 | Privacy protection method and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100476A (en) * | 2015-07-28 | 2015-11-25 | 努比亚技术有限公司 | Device and method for unlocking mobile terminal |
CN105100118A (en) * | 2015-08-28 | 2015-11-25 | 努比亚技术有限公司 | Authentication device and method |
CN105122256A (en) * | 2013-04-19 | 2015-12-02 | 高通股份有限公司 | Grip force sensor array for one-handed and multimodal interaction on handheld devices and methods |
CN105573466A (en) * | 2015-12-11 | 2016-05-11 | 广东欧珀移动通信有限公司 | Mobile terminal control method and apparatus and mobile terminal |
CN105872250A (en) * | 2016-05-30 | 2016-08-17 | 努比亚技术有限公司 | Method and device for automatically recognizing owner identity of mobile terminal |
CN105930076A (en) * | 2016-04-12 | 2016-09-07 | 捷开通讯(深圳)有限公司 | Mobile communication terminal and method thereof for hiding selected object |
-
2016
- 2016-11-30 CN CN201611085019.6A patent/CN106778339B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105122256A (en) * | 2013-04-19 | 2015-12-02 | 高通股份有限公司 | Grip force sensor array for one-handed and multimodal interaction on handheld devices and methods |
CN105100476A (en) * | 2015-07-28 | 2015-11-25 | 努比亚技术有限公司 | Device and method for unlocking mobile terminal |
CN105100118A (en) * | 2015-08-28 | 2015-11-25 | 努比亚技术有限公司 | Authentication device and method |
CN105573466A (en) * | 2015-12-11 | 2016-05-11 | 广东欧珀移动通信有限公司 | Mobile terminal control method and apparatus and mobile terminal |
CN105930076A (en) * | 2016-04-12 | 2016-09-07 | 捷开通讯(深圳)有限公司 | Mobile communication terminal and method thereof for hiding selected object |
CN105872250A (en) * | 2016-05-30 | 2016-08-17 | 努比亚技术有限公司 | Method and device for automatically recognizing owner identity of mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN106778339A (en) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102467462B (en) | Method for protecting data stored in device and corresponding device | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN106022079B (en) | A kind of unlocked by fingerprint method and terminal | |
US9275210B2 (en) | System and method of enhancing security of a wireless device through usage pattern detection | |
CN105426083B (en) | A kind of file switching method and terminal | |
CN109583356A (en) | Fingerprint identification method and Related product | |
CN107729836A (en) | Face identification method and Related product | |
CN113792278A (en) | Method and device for displaying application and picture and electronic equipment | |
EP2669834A1 (en) | Mobile information terminal, grip characteristic learning method, and grip characteristic authentication method | |
CN104809174A (en) | Opening method of terminal application | |
CN106815509B (en) | A kind of multimedia file guard method, device and electronic equipment | |
CN107918496A (en) | It is a kind of to input error correction method and device, a kind of device for being used to input error correction | |
EP2669835B1 (en) | Mobile information terminal and gripping-feature learning method | |
CN106293080A (en) | The method of a kind of user profile process and mobile terminal | |
CN108073303A (en) | A kind of input method, device and electronic equipment | |
CN108519841A (en) | Using startup method, terminal and computer readable storage medium | |
CN108781234A (en) | Function control method and terminal | |
CN105930076A (en) | Mobile communication terminal and method thereof for hiding selected object | |
CN104808899A (en) | Terminal | |
CN108803988A (en) | Control method of electronic device, device, storage medium and electronic equipment | |
CN106778339B (en) | A kind of method for secret protection and device, mobile terminal | |
CN106874718A (en) | privacy processing method, device and terminal | |
CN106775217B (en) | A kind of application identities processing method, device and terminal | |
CN109634481A (en) | Text display method, device, mobile terminal and storage medium | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190813 |
|
CF01 | Termination of patent right due to non-payment of annual fee |