CN106803031A - A kind of information protecting method and mobile terminal - Google Patents

A kind of information protecting method and mobile terminal Download PDF

Info

Publication number
CN106803031A
CN106803031A CN201710056806.6A CN201710056806A CN106803031A CN 106803031 A CN106803031 A CN 106803031A CN 201710056806 A CN201710056806 A CN 201710056806A CN 106803031 A CN106803031 A CN 106803031A
Authority
CN
China
Prior art keywords
mobile terminal
user
information
authentication information
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710056806.6A
Other languages
Chinese (zh)
Inventor
周华杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710056806.6A priority Critical patent/CN106803031A/en
Publication of CN106803031A publication Critical patent/CN106803031A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Abstract

The embodiment of the invention provides a kind of information protecting method and mobile terminal.Methods described includes:According to default check-verifying period, the authentication information that user submits to is received;Judge whether the authentication information is consistent with default authentication information;If so, then judging that whether the user submits the number of times of the authentication information to less than preset times;If so, then performing preset mode in the mobile terminal.With the method described in the embodiment of the present invention, when user loses mobile terminal, personal information of the user in the mobile terminal memory storage is effectively protected, and, greatly improve the probability given for change.

Description

A kind of information protecting method and mobile terminal
Technical field
The present invention relates to technical field of mobile terminals, more particularly, to a kind of information protecting method and a kind of mobile terminal.
Background technology
Constantly develop and ripe with mobile intelligent terminal technology, mobile terminal has become as a kind of means of communication We live in an indispensable part, user during the use to mobile terminal, can by substantial amounts of information Store in Wherein, so, the safety problem of mobile terminal is also increasingly paid attention to by user.
In the prior art, it is the information security and convenient use of protection user, finger print safety certification has turned into a kind of master Stream;Although mobile phone quick release, payment cipher certification, account authentication etc. can be realized by fingerprint, and be had very Security high, but user is still helpless for mobile phone loss, cannot be given for change substantially after losing.
Because in the prior art, still the technical scheme without complete set can be used for being lost when mobile terminal Shi Jineng is effectively protected user profile can help user to give the mobile terminal of loss for change again.
The content of the invention
The embodiment of the present invention provides a kind of information protecting method and mobile terminal, to solve to be lost in its mobile terminal as user During mistake, the user profile in the mobile terminal is effectively protected, and, help user to give the problem of the mobile terminal for change.
First aspect, there is provided a kind of method of information protection, methods described is applied to mobile terminal, methods described bag Include:
According to default check-verifying period, the authentication information that user submits to is received;
Judge whether the authentication information is consistent with default authentication information;
If so, then judging that whether the user submits the number of times of the authentication information to less than preset times;
If so, then performing preset mode in the mobile terminal.
Preferably, the step of authentication information that the reception user submits to, includes:
Touch gestures information of the user to the mobile terminal is received,
Password authentication information of the user in the mobile terminal typing is received,
Finger print information of the user in the mobile terminal typing is received,
Receive one or more in the iris information of the mobile terminal typing of user.
Preferably, it is described in the mobile terminal perform preset mode the step of, including:
The operating right for unlocking the mobile terminal screen is limited, and/or, limit the mobile terminal power-off Operating right.
Preferably, also include:
Safe protection treatment is carried out to the mobile terminal.
Preferably, it is described to include the step of carry out safe protection treatment to the mobile terminal:
Localization process is carried out to the mobile terminal;
And/or,
By the stored files passe in the mobile terminal of user to high in the clouds, and to the file after upload is finished Carry out delete processing;
And/or,
Reminding short message is sent to user preset telephone number.
Second aspect, there is provided a kind of mobile terminal, the mobile terminal includes:
Authentication information receiver module, for according to default check-verifying period, receiving the authentication letter that user submits to Breath;
Identity information authentication module, for judging whether the authentication information is consistent with default authentication information; If so, then call number information authentication module;
Number information authentication module, for judging that whether the user submits the number of times of the authentication information to less than pre- If number of times;If so, then calling preset mode performing module;
Preset mode performing module, for performing preset mode in the mobile terminal.
Preferably, the authentication information receiver module includes:
Touch gestures information receiving submodule, for receiving touch gestures information of the user to the mobile terminal,
And/or,
Password authentication information receiving submodule, for receiving password authentication information of the user in the mobile terminal typing,
And/or,
Finger print information receiving submodule, for receiving finger print information of the user in the mobile terminal typing,
And/or,
Iris information receiving submodule, for receiving iris information of the user in the mobile terminal typing.
Preferably, the preset mode performing module includes:
Authority limits submodule, for limiting the operating right for unlocking the mobile terminal screen,
And/or,
Power-off limits submodule, for limiting the operating right of the mobile terminal power-off.
Preferably, also include:
Safe protection treatment module, for carrying out safe protection treatment to the mobile terminal.
Preferably, the safe protection treatment module includes:
Positioning submodule, for carrying out localization process to the mobile terminal;
And/or,
Information processing submodule, for by the stored files passe in the mobile terminal of user to high in the clouds, and Upload carries out delete processing after finishing to the file;
And/or,
SMS module, for sending reminding short message to user preset telephone number.
In embodiments of the present invention, mobile terminal receives the authentication letter that user submits to according to default check-verifying period Breath, it is whether accurate by verifying the authentication information, and, whether the user submits to the number of times of authentication information full Whether sufficient preset times are in a safe condition to judge the mobile terminal, and right to decide whether for judged result Its own is protected, and this just can guarantee that user on the premise of without changing too many habitual operation, when mobile terminal is lost When, personal information of the user in the mobile terminal memory storage is effectively protected, and, greatly improve given for change general Rate.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below by institute in the description to the embodiment of the present invention The accompanying drawing for needing to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the invention Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these accompanying drawings Obtain other accompanying drawings.
The step of Fig. 1 is a kind of information protecting method embodiment of the invention flow chart;
Fig. 2 is the structural representation of the mobile terminal of another embodiment of the invention;
Fig. 3 is the block diagram of the mobile terminal of another embodiment of the present invention;
Fig. 4 is the structural representation of the mobile terminal of another embodiment of the invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Embodiment one
Reference picture 1, flow chart the step of show a kind of information protecting method embodiment of the invention, can specifically include Following steps:
Step 101, according to default check-verifying period, receives the authentication information that user submits to;
In implementing, the embodiment of the present invention can be using in the terminal, for example, mobile phone, panel computer, individual Digital assistants, wearable device (such as bracelet, glasses, wrist-watch) etc..
Used as a kind of example of the embodiment of the present invention, the mode of the authentication information that the reception user submits to can be wrapped Include:Touch gestures information of the user to the mobile terminal is received, password authentification of the user in the mobile terminal typing is received Information, receives finger print information of the user in the mobile terminal typing, and the iris for receiving user in the mobile terminal typing is believed The methods such as breath.
Step 102, judges whether the authentication information is consistent with default authentication information;If so, then performing step Rapid 103.
In actual applications, graphical passwords unblock and numerical ciphers unblock is all that easily identity information confirms than more efficient Method, in order to further enhance the security of mobile terminal, can add finger print collecting function to carry out in mobile terminal device Identification, however, compared to fingerprint recognition, identification, Ke Yigeng are carried out to the iris of user using image acquisition device Further assure that the accuracy of subscriber authentication information.
For example, user can be input into touch gestures by UI (User Interface, user interface), it is defeated on UI Enter password, fingerprint acquisition device input finger print information in the terminal is defeated in image acquisition device in the terminal Enter the authentication information that the methods such as iris information are realized submitting to.
Certainly, those skilled in the art receive the authentication of user's submission arbitrarily from above-mentioned one or more method Information is all feasible, and this present invention is not restricted.
Step 103, judges that whether the user submits the number of times of the authentication information to less than preset times;If so, Then perform step 104.
In implementing, user can set up the information for storing authentication information in mobile terminal system Storehouse, will be used in Data Enter to the described information storehouse of identifying user identity, wherein, the authentication information is included, and is used Touch gestures information, password authentication information, finger print information, iris information of family typing etc., system can again be entered in user When row identification is operated, whether the identity identification information for verifying user's typing is consistent with the authentication information of advance typing, And the number of times that user submits authentication information to is recorded, by judging whether the number of times meets preset times come to mobile whole Whether end is in a safe condition to be judged.
In a preferred embodiment of the invention, when the authentication information is accurate, and, the user submits identity to When the number of times of checking information meets preset times, judge that the mobile terminal is in a safe condition, into next check-verifying period.
For example, set up user submit to authentication information counting how many times Count, set initial value Count=0, when with When family carries out identification operation by fingerprint sensor, if authentication information is accurate, increases and count Count '=Count + 1, in a cycle T (24 hours), counting is reset and resetted if cumulative number Count ' >=1, into next verification In the cycle, if Count ' < 1, mobile terminal enters safe mode, limits the operating right of the mobile terminal and it is carried out Safe protection treatment.
Certainly, the above method only makees example, and those skilled in the art can also use other method school according to actual conditions Whether accurate test the authentication information, and, the user submits whether the number of times of authentication information meets default time to Number is also feasible, and this present invention is not restricted.
Step 104, preset mode is performed in the mobile terminal.
As a kind of example of embodiment of the present invention concrete application, in mobile terminal, can be in the following manner Preset mode is performed in the mobile terminal:
Mode one, the operating right that limitation unlocks the mobile terminal screen.
Mode two, limits the operating right of the mobile terminal power-off.
For example, when system judges that mobile terminal is under non-secure states, system can automatically by the mobile terminal Screen carry out screen locking treatment, and forbid user to close the power supply of the mobile terminal.
Certainly, those skilled in the art can select the limitation of above-mentioned any one or more method to be in non-secure states The operating right of mobile terminal, is not restricted to this present invention.
In another embodiment, the mobile terminal can also be carried out at safeguard protection in the following way Reason.
Example one, localization process is carried out to the mobile terminal;
For example, when system judge mobile terminal be in non-secure states when, system can using such as triangulation location, The methods such as GPS location method are positioned to the movement.
Example two, it is by the stored files passe in the mobile terminal of user to high in the clouds and right after upload is finished The file carries out delete processing;
For example, when system judge mobile terminal be in non-secure states when, system can by the application list of user, The files passes such as social networking application program chat record, log, photo, audio frequency and video to cloud disk is preserved, after upload is finished, will The All Files stored in the mobile terminal carries out delete processing.
Example three, reminding short message is sent to user preset telephone number.
For example, user can preset a list, when system judges that mobile terminal is in non-secure states, system is automatic Reminding short message is sent to the telephone number in the list.
Certainly, those skilled in the art can be from above-mentioned any one or more method to the shifting in non-secure states Dynamic terminal carries out safeguard protection to be all possible, and this present invention is not restricted.
In embodiments of the present invention, according to default check-verifying period, the authentication information that user submits to is received;Judge institute Whether consistent with default authentication information state authentication information;If so, then judging that the user submits the authentication to Whether the number of times of information is less than preset times;If so, then performing preset mode in the mobile terminal, this just can guarantee that user On the premise of the too many habitual operation without change, when mobile terminal is lost, user is effectively protected described mobile whole The personal information of end memory storage, and, greatly improve the probability given for change.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it to be all expressed as a series of action group Close, but those skilled in the art should know, and the embodiment of the present invention is not limited by described sequence of movement, because according to According to the embodiment of the present invention, some steps can sequentially or simultaneously be carried out using other.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, the involved action not necessarily present invention is implemented Necessary to example.
Embodiment two
Fig. 2 is the block diagram of the mobile terminal of one embodiment of the invention.Mobile terminal 200 shown in Fig. 2 includes:
Authentication information receiver module 201, for according to default check-verifying period, receiving the authentication that user submits to Information;
Identity information authentication module 202, for judge the authentication information whether with default authentication information one Cause;If so, then call number information authentication module 203;
Number information authentication module 203, for judging that whether the user submits to the number of times of the authentication information small In preset times;If so, then calling preset mode performing module 204;
Preset mode performing module 204, for performing preset mode in the mobile terminal.
In a kind of preferred embodiment of the invention, the authentication information receiver module 201 can also include following son Module:
Touch gestures information receiving submodule, for receiving touch gestures information of the user to the mobile terminal,
And/or,
Password authentication information receiving submodule, for receiving password authentication information of the user in the mobile terminal typing,
And/or,
Finger print information receiving submodule, for receiving finger print information of the user in the mobile terminal typing,
And/or,
Iris information receiving submodule, for receiving iris information of the user in the mobile terminal typing.
In a kind of preferred embodiment of the invention, the preset mode performing module 204 can also include following submodule:
Authority limits submodule, for limiting the operating right for unlocking the mobile terminal screen,
And/or,
Power-off limits submodule, for limiting the operating right of the mobile terminal power-off.
In a kind of preferred embodiment of the invention, also include:
Safe protection treatment module, for carrying out safe protection treatment to the mobile terminal.
In a kind of preferred embodiment of the invention, safe protection treatment module can also include following submodule:
Safe protection treatment submodule, for for the mobile terminal in non-secure states, limitation will be described mobile whole Hold the operating right of unlocking screen.
In a kind of preferred embodiment of the invention, the operating right limitation module 204 can also include following submodule:
Power-off limits submodule, for for the mobile terminal in non-secure states, limitation will be described mobile whole Hold the operating right of power-off.
In a kind of preferred embodiment of the invention, also include:
Safe protection treatment module 206, safe protection treatment is carried out for the mobile terminal in non-secure states.
In a kind of preferred embodiment of the invention, the safe protection treatment module 206 can also include following submodule:
Positioning submodule, for carrying out localization process to the mobile terminal;
And/or,
Information processing submodule, for by the stored files passe in the mobile terminal of user to high in the clouds, and Upload carries out delete processing after finishing to the file;
And/or,
SMS module, for sending reminding short message to user preset telephone number.
In embodiments of the present invention, according to default check-verifying period, the authentication information that user submits to is received;Judge institute Whether consistent with default authentication information state authentication information;If so, then judging that the user submits the authentication to Whether the number of times of information is less than preset times;If so, then performing preset mode in the mobile terminal, this just can guarantee that user On the premise of the too many habitual operation without change, when mobile terminal is lost, user is effectively protected described mobile whole The personal information of end memory storage, and, greatly improve the probability given for change.
For system embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, it is related Part is illustrated referring to the part of embodiment of the method.
Embodiment three
Fig. 3 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 300 shown in Fig. 3 includes:At least One processor 301, memory 302, at least one network interface 304 and other users interface 303.In mobile terminal 300 Each component is coupled by bus system 305.It is understood that bus system 305 is used to realize the company between these components Connect letter.Bus system 305 in addition to including data/address bus, also including power bus, controlling bus and status signal bus in addition.But Be for clear explanation for the sake of, various buses are all designated as bus system 305 in figure 3.
Wherein, user interface 303 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 302 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read- OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM (ErasablePROM, EPROM), Electrically Erasable Read Only Memory (ElectricallyEPROM, EEPROM) dodge Deposit.Volatile memory can be random access memory (RandomAccessMemory, RAM), and it is used as outside slow at a high speed Deposit.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory (SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory (DirectRambusRAM, DRRAM).The memory 302 of the system and method for embodiment of the present invention description is intended to include but does not limit In these memories with any other suitable type.
In some embodiments, memory 302 stores following element, can perform module or data structure, or Person their subset, or their superset:Operating system 3021 and application program 3022.
Wherein, operating system 3021, comprising various system programs, such as ccf layer, core library layer, driving layer etc. are used for Realize various basic businesses and process hardware based task.Application program 3022, comprising various application programs, such as media Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side The program of method may be embodied in application program 3022.
In embodiments of the present invention, by the program for calling memory 302 to store or instruction, specifically, can be application The program stored in program 3022 or instruction, processor 301 are used for according to default check-verifying period, receive the identity that user submits to Checking information;Judge whether the authentication information is consistent with default authentication information;If so, then judging that the user carries Whether the number of times of the authentication information is handed over less than preset times;If so, then performing preset mode in the mobile terminal.
The method that the embodiments of the present invention are disclosed can apply in processor 301, or be realized by processor 301. Processor 301 is probably a kind of IC chip, the disposal ability with signal.In implementation process, the above method it is each Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 301 or software form.Above-mentioned treatment Device 301 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), application specific integrated circuit (ApplicationSpecific IntegratedCircuit, ASIC), ready-made programmable gate array (FieldProgrammableGateArray, FPGA) or other PLDs, discrete gate or transistor logic Device, discrete hardware components.Can realize or perform disclosed each method in the embodiment of the present invention, step and box Figure.General processor can be microprocessor or the processor can also be any conventional processor etc..With reference to the present invention The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and perform completion, or use decoding processor In hardware and software module combination perform completion.Software module may be located at random access memory, and flash memory, read-only storage can In the ripe storage medium in this area such as program read-only memory or electrically erasable programmable memory, register.The storage Medium is located at memory 302, and processor 301 reads the information in memory 302, and the step of the above method is completed with reference to its hardware Suddenly.
It is understood that the embodiment of the present invention description these embodiments can with hardware, software, firmware, middleware, Microcode or its combination are realized.Realized for hardware, processing unit can be realized in one or more application specific integrated circuits (ApplicationSpecificIntegratedCircuits, ASIC), digital signal processor (DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device (ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray, FPGA), general processor, controller, microcontroller, microprocessor, other the electronics lists for performing herein described function In unit or its combination.
For software realize, can by perform the module (such as process, function etc.) of function described in the embodiment of the present invention come Realize the technology described in the embodiment of the present invention.Software code is storable in memory and by computing device.Memory can To realize within a processor or outside processor.
Alternatively, processor 301 is additionally operable to:Receive touch gestures information of the user to the mobile terminal.
Alternatively, processor 301 is additionally operable to:Receive password authentication information of the user in the mobile terminal typing.
Alternatively, processor 301 is additionally operable to:Receive finger print information of the user in the mobile terminal typing.
Alternatively, processor 301 is additionally operable to:Receive one kind in the iris information of the mobile terminal typing of user or Person is various.
Alternatively, processor 301 is additionally operable to:Limit the operating right for unlocking the mobile terminal screen.
Alternatively, processor 301 is additionally operable to:Limit is limited the operating right of the mobile terminal power-off.
Alternatively, processor 301 is additionally operable to:Safe protection treatment is carried out to the mobile terminal.
Alternatively, processor 301 is additionally operable to:Localization process is carried out to the mobile terminal.
Alternatively, processor 301 is additionally operable to:By the stored files passe in the mobile terminal of user to high in the clouds, And delete processing is carried out to the file after upload is finished.
Alternatively, processor 301 is additionally operable to:Reminding short message is sent to user preset telephone number.
Mobile terminal 300 can realize each process of mobile terminal realization in previous embodiment, to avoid repeating, here Repeat no more.
In embodiments of the present invention, according to default check-verifying period, the authentication information that user submits to is received;Judge institute Whether consistent with default authentication information state authentication information;If so, then judging that the user submits the authentication to Whether the number of times of information is less than preset times;If so, then performing preset mode in the mobile terminal, this just can guarantee that user On the premise of the too many habitual operation without change, when mobile terminal is lost, user is effectively protected described mobile whole The personal information of end memory storage, and, greatly improve the probability given for change.
Example IV
Fig. 4 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 4 400 can be mobile phone, panel computer, personal digital assistant (PersonalDigital Assistant, PDA) or vehicle-mounted computer Deng.
Mobile terminal 400 in Fig. 4 includes that radio frequency (RadioFrequency, RF) circuit 410, memory 420, input are single Unit 430, display unit 440, processor 460, voicefrequency circuit 440, WiFi (WirelessFidelity) module 480 and power supply 490。
Wherein, input block 430 can be used to receive the numeral or character information of user input, and produce and mobile terminal 400 user is set and the relevant signal input of function control.Specifically, in the embodiment of the present invention, the input block 430 can With including contact panel 431.Contact panel 431, also referred to as touch-screen, can collect user thereon or neighbouring touch operation (such as user uses the operations of any suitable object or annex on contact panel 431 such as finger, stylus), and according to advance The formula of setting drives corresponding attachment means.Optionally, contact panel 431 may include touch detecting apparatus and touch controller Two parts.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, by signal Send touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, Give the processor 460 again, and the order sent of receiving processor 460 and can be performed.Furthermore, it is possible to using resistance-type, The polytypes such as condenser type, infrared ray and surface acoustic wave realize contact panel 431.Except contact panel 431, input block 430 can also include other input equipments 432, and other input equipments 432 can include but is not limited to physical keyboard, function key One or more in (such as loudness control button, switch key etc.), trace ball, mouse, action bars etc..
Wherein, display unit 440 can be used for display by the information of user input or be supplied to information and the movement of user The various menu interfaces of terminal 400.Display unit 440 may include display panel 441, optionally, can use LCD or organic hairs The forms such as optical diode (OrganicLight-EmittingDiode, OLED) configure display panel 441.
It should be noted that contact panel 431 can cover display panel 441, touch display screen is formed, when touch display screen inspection Measure thereon or after neighbouring touch operation, processor 460 is sent to determine the type of touch event, with preprocessor 460 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And the arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can distinguish two and show Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area be used for show utilization rate control higher, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 460 is the control centre of mobile terminal 400, using various interfaces and connection whole mobile phone Various pieces, by running or performing software program and/or module of the storage in first memory 421, and call storage Data in second memory 422, perform the various functions and processing data of mobile terminal 400, so as to mobile terminal 400 Carry out integral monitoring.Optionally, processor 460 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 421 in software program and/or module and/ Or the data in the second memory 422, processor 460 is for according to default check-verifying period, receiving the identity that user submits to Checking information;Judge whether the authentication information is consistent with default authentication information;If so, then judging that the user carries Whether the number of times of the authentication information is handed over less than preset times;If so, then performing preset mode in the mobile terminal.
Alternatively, processor 460 is additionally operable to:Receive touch gestures information of the user to the mobile terminal.
Alternatively, processor 460 is additionally operable to:Receive password authentication information of the user in the mobile terminal typing.
Alternatively, processor 460 is additionally operable to:Receive finger print information of the user in the mobile terminal typing.
Alternatively, processor 460 is additionally operable to:Receive one kind in the iris information of the mobile terminal typing of user or Person is various.
Alternatively, processor 460 is additionally operable to:Limit the operating right for unlocking the mobile terminal screen.
Alternatively, processor 460 is additionally operable to:Limit is limited the operating right of the mobile terminal power-off.
Alternatively, processor 460 is additionally operable to:Safe protection treatment is carried out to the mobile terminal.
Alternatively, processor 460 is additionally operable to:Localization process is carried out to the mobile terminal.
Alternatively, processor 460 is additionally operable to:By the stored files passe in the mobile terminal of user to high in the clouds, And delete processing is carried out to the file after upload is finished.
Alternatively, processor 460 is additionally operable to:Reminding short message is sent to user preset telephone number.
It can be seen that, in the embodiment of the present invention, when detecting mobile terminal and carrying out voice call, voice signal is received, pass through The spatial positional information of mobile terminal searches the first object audio frequency parameter of adaptation, and is exported according to the first object audio frequency parameter Voice signal, the operating habit for having reached real-time adaptation user carries out voice call, so as to the broadcasting that improve voice signal is imitated Really, meanwhile, the output regulation of voice signal is carried out automatically, it is to avoid user is adjusted operation manually, improves the letter of operation Just the effect of property.
Those of ordinary skill in the art it is to be appreciated that with reference to disclosed in the embodiment of the present invention embodiment description it is each The unit and algorithm steps of example, can be realized with the combination of electronic hardware or computer software and electronic hardware.These Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty Technical staff can realize described function to each specific application using distinct methods, but this realization should not Think beyond the scope of this invention.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can be by other Mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, is only A kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be the INDIRECT COUPLING or communication link of device or unit by some interfaces Connect, can be electrical, mechanical or other forms.
The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be according to the actual needs selected to realize the mesh of this embodiment scheme 's.
In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is to realize in the form of SFU software functional unit and as independent production marketing or when using, can be with Storage is in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are used to so that a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the invention. And foregoing storage medium includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The above, specific embodiment only of the invention, but protection scope of the present invention is not limited thereto, and it is any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (10)

1. a kind of information protecting method, it is characterised in that including:
According to default check-verifying period, the authentication information that user submits to is received;
Judge whether the authentication information is consistent with default authentication information;
If so, then judging that whether the user submits the number of times of the authentication information to less than preset times;
If so, then performing preset mode in the mobile terminal.
2. method according to claim 1, it is characterised in that the step of the authentication information that the reception user submits to Including:
Touch gestures information of the user to the mobile terminal is received,
Password authentication information of the user in the mobile terminal typing is received,
Finger print information of the user in the mobile terminal typing is received,
Receive one or more in the iris information of the mobile terminal typing of user.
3. method according to claim 1, it is characterised in that the step that preset mode is performed in the mobile terminal Suddenly, including:
The operating right for unlocking the mobile terminal screen is limited, and/or, limit the behaviour of the mobile terminal power-off Make authority.
4. method according to claim 3, it is characterised in that also include:
Safe protection treatment is carried out to the mobile terminal.
5. the method according to the claim 4, it is characterised in that described to be carried out at safeguard protection to the mobile terminal The step of reason, includes:
Localization process is carried out to the mobile terminal;
And/or,
By the stored files passe in the mobile terminal of user to high in the clouds, and the file is carried out after upload is finished Delete processing;
And/or,
Reminding short message is sent to user preset telephone number.
6. a kind of mobile terminal, it is characterised in that including:
Authentication information receiver module, for according to default check-verifying period, receiving the authentication information that user submits to;
Identity information authentication module, for judging whether the authentication information is consistent with default authentication information;If so, Then call number information authentication module;
Number information authentication module, for judging that whether the user submits the number of times of the authentication information to less than default time Number;If so, then calling preset mode performing module;
Preset mode performing module, for performing preset mode in the mobile terminal.
7. mobile terminal according to claim 1, it is characterised in that the authentication information receiver module includes:
Touch gestures information receiving submodule, for receiving touch gestures information of the user to the mobile terminal,
And/or,
Password authentication information receiving submodule, for receiving password authentication information of the user in the mobile terminal typing,
And/or,
Finger print information receiving submodule, for receiving finger print information of the user in the mobile terminal typing,
And/or,
Iris information receiving submodule, for receiving iris information of the user in the mobile terminal typing.
8. mobile terminal according to claim 1, it is characterised in that the preset mode performing module includes:
Authority limits submodule, for limiting the operating right for unlocking the mobile terminal screen,
And/or,
Power-off limits submodule, for limiting the operating right of the mobile terminal power-off.
9. mobile terminal according to claim 1, it is characterised in that also include:
Safe protection treatment module, for carrying out safe protection treatment to the mobile terminal.
10. mobile terminal according to claim 1, it is characterised in that the safe protection treatment module includes:
Positioning submodule, for carrying out localization process to the mobile terminal;
And/or,
Information processing submodule, for by the stored files passe in the mobile terminal of user to high in the clouds, and upload Delete processing is carried out to the file after finishing;
And/or,
SMS module, for sending reminding short message to user preset telephone number.
CN201710056806.6A 2017-01-25 2017-01-25 A kind of information protecting method and mobile terminal Pending CN106803031A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710056806.6A CN106803031A (en) 2017-01-25 2017-01-25 A kind of information protecting method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710056806.6A CN106803031A (en) 2017-01-25 2017-01-25 A kind of information protecting method and mobile terminal

Publications (1)

Publication Number Publication Date
CN106803031A true CN106803031A (en) 2017-06-06

Family

ID=58987271

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710056806.6A Pending CN106803031A (en) 2017-01-25 2017-01-25 A kind of information protecting method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106803031A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107466031A (en) * 2017-08-08 2017-12-12 深圳市金立通信设备有限公司 A kind of method and terminal for protecting data
CN109446781A (en) * 2018-11-06 2019-03-08 北京无线电计量测试研究所 A kind of iris encryption data storage device and method
CN109753774A (en) * 2019-01-08 2019-05-14 腾燊嘉诚(上海)信息科技股份有限公司 A kind of intelligent manufacturing system
CN113253092A (en) * 2020-01-28 2021-08-13 新唐科技股份有限公司 Secure integrated circuit using soft security countermeasure

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118748A (en) * 2010-12-30 2011-07-06 胡利锋 Mobile phone integrated with security module
CN104899490A (en) * 2015-05-27 2015-09-09 广东欧珀移动通信有限公司 Terminal positioning method and user terminal
CN105450841A (en) * 2014-09-25 2016-03-30 小米科技有限责任公司 Method and device of terminal guard against theft

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118748A (en) * 2010-12-30 2011-07-06 胡利锋 Mobile phone integrated with security module
CN105450841A (en) * 2014-09-25 2016-03-30 小米科技有限责任公司 Method and device of terminal guard against theft
CN104899490A (en) * 2015-05-27 2015-09-09 广东欧珀移动通信有限公司 Terminal positioning method and user terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107466031A (en) * 2017-08-08 2017-12-12 深圳市金立通信设备有限公司 A kind of method and terminal for protecting data
CN109446781A (en) * 2018-11-06 2019-03-08 北京无线电计量测试研究所 A kind of iris encryption data storage device and method
CN109753774A (en) * 2019-01-08 2019-05-14 腾燊嘉诚(上海)信息科技股份有限公司 A kind of intelligent manufacturing system
CN113253092A (en) * 2020-01-28 2021-08-13 新唐科技股份有限公司 Secure integrated circuit using soft security countermeasure
CN113253092B (en) * 2020-01-28 2023-08-08 新唐科技股份有限公司 Secure integrated circuit using soft security countermeasures

Similar Documents

Publication Publication Date Title
EP2506183B1 (en) Systems and methods for gesture lock obfuscation
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN106127003B (en) A kind of fingerprint recognition unlocking method and mobile terminal
CN106778183A (en) A kind of Terminal fingerprints know method for distinguishing and mobile terminal
CN106803031A (en) A kind of information protecting method and mobile terminal
CN106445328B (en) Unlocking method of mobile terminal screen and mobile terminal
CN104598783A (en) Unlocking method and device of intelligent terminal
CN107635071A (en) A kind of theft preventing method, mobile terminal and computer-readable recording medium
CN107632870A (en) The startup method and terminal of a kind of application
CN107390991B (en) A kind of processing method and mobile terminal of screenshot
CN106027794B (en) A kind of encryption method and mobile terminal of photo
CN107450799A (en) The display methods and mobile terminal of a kind of message
CN107358111A (en) A kind of method for secret protection and mobile terminal
CN106293080A (en) The method of a kind of user profile process and mobile terminal
CN107643912A (en) A kind of information sharing method and mobile terminal
CN106778223A (en) A kind of cryptographic check method and mobile terminal
CN106991319A (en) The right management method and mobile terminal of a kind of application program
CN107609407A (en) The guard method of information security and device in a kind of user terminal
CN106778217A (en) A kind of mobile terminal unlocks error handling method and mobile terminal
CN106792544A (en) A kind of method and terminal for detecting terminal location
CN106250757A (en) The control method of a kind of application program and mobile terminal
CN106211070B (en) A kind of anti-theft protection method and mobile terminal of mobile terminal
CN108491703A (en) A kind of double verification unlocking method and system based on comprehensive screen equipment
CN106874787A (en) A kind of image viewing method and mobile terminal
CN106991306A (en) A kind of method and mobile terminal for inputting password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170606