CN106909815A - A kind of method of controlling security, device and mobile terminal - Google Patents

A kind of method of controlling security, device and mobile terminal Download PDF

Info

Publication number
CN106909815A
CN106909815A CN201710055030.6A CN201710055030A CN106909815A CN 106909815 A CN106909815 A CN 106909815A CN 201710055030 A CN201710055030 A CN 201710055030A CN 106909815 A CN106909815 A CN 106909815A
Authority
CN
China
Prior art keywords
blocked
region
area
routine
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710055030.6A
Other languages
Chinese (zh)
Inventor
黄敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201710055030.6A priority Critical patent/CN106909815A/en
Publication of CN106909815A publication Critical patent/CN106909815A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention provides a kind of method of controlling security, device and mobile terminal, the method is used for mobile terminal, and it includes:Acquisition is blocked region;Whether the region that is blocked described in judging belongs to default routine and blocks scope;If the region that is blocked is not belonging to default routine and blocks scope, protection operation is performed.By the method, routine when can obtain user commonly using mobile terminal according to the use habit of user blocks scope, if it is inconsistent that the size of currently used person's occlusion area blocks scope with routine before, then think mobile terminal be in it is dangerous in the state of, as lost or being stolen, safety measure just can be now performed, the risk caused after mobile terminal is lost is reduced, it is achieved thereby that the security control after stolen or loss.

Description

A kind of method of controlling security, device and mobile terminal
Technical field
The present invention relates to security technology area, and in particular to the method for controlling security and mobile terminal of a kind of mobile terminal.
Background technology
With the development of the communication technology, the communication equipment such as mobile phone has become indispensable carry-on in people's daily life Article.Because mobile phone is often carried with, this is also increased loses or stolen risk.Due to often storing more on mobile phone Personal information, when lost mobile phone or it is stolen after be easily caused larger loss.
Some anti-theft method of mobile phone are also occurred in that in the prior art, and such as operating habit according to user judges current behaviour Whether legal, if not conforming to rule enters anti-theft modes if making.The program is disadvantageous in that because the operating habit of user may It is various words, is accordingly difficult to extract.Additionally, in order to prevent mobile phone to be stolen in being placed on pocket or bag, can also be by light sensing Device detects luminous intensity, so as to judge whether mobile phone is removed, is alarmed if being removed.The program is disadvantageous in that Alarm can only be carried out to the mobile phone for being put into pocket or bag etc., good safety cannot be carried out situations such as omitted for mobile phone Control.
The content of the invention
In view of this, a kind of method of controlling security, device and mobile terminal are the embodiment of the invention provides, to solve mobile phone Safety problem after stolen or loss.
First aspect present invention provides a kind of method of controlling security, for mobile terminal, including:Acquisition is blocked area Domain;Whether the region that is blocked described in judging belongs to default routine and blocks scope;If the region that is blocked is not belonging to preset Routine block scope, then perform protection operation.
By implementing the method that first aspect is described, user can be obtained commonly using movement according to the use habit of user Routine during terminal blocks scope, if to block scope inconsistent for the size of currently used person's occlusion area and routine before, Then think mobile terminal be in it is dangerous in the state of, such as lose or stolen, just can now perform safety measure, reduce shifting The risk caused after dynamic lost terminal, it is achieved thereby that the security control after stolen or loss.
With reference to first aspect present invention, in first aspect present invention first embodiment, it is normal that the routine blocks scope The preset area value range of shielded area is advised, whether the region that is blocked described in the judgement belongs to default routine blocks scope, Including:Be blocked the position in region and the area in the region that is blocked described in obtaining;The corresponding routine in the position is obtained to block The preset area value range of area;Judge described in be blocked region area whether in the preset area value range.
By performing above-mentioned steps, it can be conventional shielded area routinely to block scope, and different occlusion area correspondences are not With conventional shielded area, therefore the preset area model of corresponding conventional shielded area is obtained according to the position in the region that is blocked Value is enclosed, whether the current region that is blocked then is judged in preset area value range, if no longer illustrated in preset range value User changes, it should perform protection operation.
With reference to first aspect present invention, in first aspect present invention second embodiment, the routine blocks scope for hand Contouring presets edge extent, and whether the region that is blocked described in the judgement belongs to default routine blocks scope, including:Obtain The external periphery outline in the region that is blocked;Judge whether the external periphery outline is located at the hand profile and presets edge model Enclose.
By performing above-mentioned steps, scope selection will be routinely blocked for hand profile presets edge extent, due to everyone Hand shape it is different, custom during hand-held mobile terminal is different, then cause the outline of occlusion area different, therefore by judging Whether the external periphery outline in region of being blocked is located at the default edge extent of the hand profile to determine whether to have changed mobile end The user at end, with accuracy higher.
With reference to first aspect present invention or first aspect first embodiment or first aspect second embodiment, the present invention In the implementation method of first aspect the 3rd, the region that is blocked includes the position in the region that is blocked, and/or described is blocked The area in region, and/or the external periphery outline in the region that is blocked.
By performing above-mentioned steps, judge to use by information such as the position in the region that is blocked, area, external periphery outlines Whether person there occurs change, because these information are according to the difference of the custom and hand-characteristic of each user, can more preferable quilt Distinguish, improve the degree of accuracy for identifying abnormal user.
It is described in the 4th implementation method of first aspect present invention with reference to the 3rd implementation method of first aspect present invention Perform one or more that protection operation includes in alarm, screen locking, file encryption, shutdown, the long-range transmission of location information.
By performing above-mentioned steps, when it is that abnormal user uses mobile terminal to judge, can be by alarm, lock Screen, file encryption, shutdown, the long-range mode for sending warning message are protected, so as to improve its storage after mobile terminal is lost Information security row, or find lose mobile terminal provide information.
It is described in the 5th implementation method of first aspect present invention with reference to the 3rd implementation method of first aspect present invention Routine blocks occlusion area when scope is normally used according to user in preset times to calculate.
By performing above-mentioned steps, the extraction of many secondary datas of occlusion area during by normally using user is obtained Conventional blocks scope, is obtained due to use habit and hand-characteristic that the data are directed to user, therefore the degree of accuracy is higher, Can distinguish that degree is also high, thereby may be ensured that the recognition accuracy of abnormal user.
Additionally, second aspect present invention provides a kind of safety control, it is for mobile terminal including above-mentioned for performing The module or unit of first aspect or the described method of controlling security of any one realization of first aspect.
For example, the safety control includes:Detection module, for obtaining the region that is blocked;Processing module, for sentencing Whether the disconnected region that is blocked belongs to default routine blocks scope;Protection performing module, if for the area that is blocked Domain is not belonging to default routine and blocks scope, performs protection operation.
By implementing the safety control of second aspect, user can be obtained according to the use habit of user and be commonly used Routine during mobile terminal blocks scope, if the size of currently used person's occlusion area is blocked scope and differed with routine before Cause, then it is assumed that mobile terminal be in it is dangerous in the state of, such as lose or stolen, just can now perform safety measure, reduce The risk that mobile terminal is caused after losing, it is achieved thereby that security control stolen or after losing.
By combining second aspect present invention, in the first embodiment of second aspect present invention, the routine blocks model The preset area value range for conventional shielded area is enclosed, the processing module includes:Position acquisition submodule, it is described for obtaining Be blocked the position in region and the area in the region that is blocked;Area acquisition submodule, it is corresponding often for obtaining the position Advise the maximum of shielded area;First judging submodule, for judging the area in the region that is blocked whether described default In areal extent value.
By implementing above-mentioned safety control, it can be conventional shielded area, different blocked areas routinely to block scope Domain different conventional shielded areas of correspondence, therefore the pre- of corresponding conventional shielded area is obtained according to the position in the region that is blocked If areal extent value, whether the current region that is blocked then is judged in preset area value range, if no longer preset range value It is interior, then illustrate that user changes, it should perform protection operation.
By combining second aspect present invention, in the second embodiment of second aspect present invention, the routine blocks model Enclose for hand profile presets edge extent, the processing module includes:Edge acquisition submodule, for obtaining the area that is blocked The external periphery outline in domain;Second judging submodule, for judging whether the external periphery outline is default positioned at the hand profile Edge extent.
Above-mentioned safety control will routinely block scope selection for hand profile presets edge extent, due to everyone Hand shape is different, and custom during hand-held mobile terminal is different, then cause the outline of occlusion area different, therefore by judging quilt Whether the external periphery outline of occlusion area is located at the default edge extent of the hand profile to determine whether to have changed mobile terminal User, with accuracy higher.
With reference to second aspect present invention or second aspect first embodiment or second aspect second embodiment, the present invention In the implementation method of second aspect the 3rd, the protection performing module include alarm submodule, and/or screen locking submodule and/ Or file encryption submodule, and/or shutdown submodule, and/or the long-range sending submodule of location information in one or more.
Above-mentioned safety control, when it is that abnormal user uses mobile terminal to judge, can be by alarm, lock Screen, file encryption, shutdown, the long-range mode for sending warning message are protected, so as to improve its storage after mobile terminal is lost Information security row, or find lose mobile terminal provide information.
Module or unit included by the safety control are not limited to above-mentioned naming method.
These aspects of the application can more straightforward in the following description.
Third aspect present invention provides a kind of mobile terminal, including above-mentioned second aspect, the embodiment party of second aspect first Safety control described in formula, second embodiment and the 3rd implementation method.
Fourth aspect present invention additionally provides another mobile terminal, including:Occlusion detection unit, memory and treatment Device, the occlusion detection unit, between the memory and the processor by bus interconnect, deposited in the memory Contain computer instruction, the processor by performing the computer instruction, so as to realize following methods:Acquisition is blocked area Domain;Whether the region that is blocked described in judging belongs to default routine and blocks scope;If the region that is blocked is not belonging to preset Routine block scope, then perform protection operation.
Conventional screening when above-mentioned mobile terminal can obtain user commonly using mobile terminal according to the use habit of user Gear scope, if to block scope with routine before inconsistent for the size of currently used person's occlusion area, then it is assumed that mobile terminal In the state of dangerous, such as lose or stolen, just can now perform safety measure, reduce after mobile terminal is lost and make Into risk, it is achieved thereby that security control stolen or after losing.
Brief description of the drawings
The features and advantages of the present invention can be more clearly understood from by reference to accompanying drawing, accompanying drawing is schematical without that should manage Solution is to carry out any limitation to the present invention, in the accompanying drawings:
Fig. 1 shows the structure chart of mobile phone in the embodiment of the present invention;
Fig. 2 shows the flow chart of the method for controlling security of the mobile terminal in the embodiment of the present invention;
Fig. 3 shows a kind of structural representation of the mobile terminal in the embodiment of the present invention;
Fig. 4 shows the structural representation of another mobile terminal in the embodiment of the present invention.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not having There is the every other embodiment made and being obtained under the premise of creative work, belong to the scope of protection of the invention.
As shown in figure 1, being the application scenarios schematic diagram of embodiments of the invention.Mobile terminal can be mobile phone or flat board electricity The mobile devices such as brain, by taking mobile phone as an example, the part-structure block diagram of mobile phone is as shown in figure 1, mobile phone includes radio circuit to mobile terminal 210th, memory 220, input block 230, display unit 240, sensor 250, voicefrequency circuit 260, wireless module 270, treatment Device 280 and the grade of power supply 290 part.It will be understood by those skilled in the art that the handset structure shown in Fig. 1 does not constitute opponent The restriction of machine, can include part more more or less than diagram, or combine some parts, or different part arrangements.
Wherein RF circuits 210 be used for receive and send messages or communication process in, the reception and transmission of signal.Memory 220 is used for Storage software program and module, processor 280 store the software program and module in memory 220 by operation, so that Perform various function application and the data processing of mobile phone.Input block 230 is used to receive the numeral or character information of input, with And produce the key signals relevant with user's setting of mobile phone and function control to be input into.Input block 230 may include contact panel 231 and other input equipments 232.Other input equipments 232 can include but is not limited to physical keyboard, function key, mouse, behaviour Make one or more in bar.Display unit 240 be used for show by user input information or be supplied to user information and The various menus of mobile phone.Display unit 240 can include display panel 241.Contact panel 231 can cover display panel 241, when Contact panel 231 is detected thereon or after neighbouring touch operation, sends processor 280 to determine the class of touch event Type, corresponding visual output is provided with preprocessor 280 according to the type of touch event on display panel 241.
Mobile phone may also include at least one sensor 250, such as optical sensor, motion sensor and other sensors.Light Sensor may include ambient light sensor and proximity transducer, and environmental sensor can adjust display according to the light and shade of ambient light The brightness of panel 241, proximity transducer can close display panel 241 and/or backlight when mobile phone is moved in one's ear.This implementation Optical sensor can be arranged on the housing of the front and back of mobile phone in example, for detecting blocked area during user's grip mobile phone Domain.Pressure sensor can also be included herein, be arranged in the front of mobile phone or back housing, for the side by detecting pressure Formula obtains occlusion area during user's grip mobile phone.Additionally, mobile phone can also configure gyroscope, barometer, hygrometer, temperature The other sensors such as meter, infrared ray sensor, repeat no more.
Voicefrequency circuit 260, loudspeaker 261, microphone 262 can provide the COBBAIF between user and mobile phone.Wireless mould Block 270 can be WIFI module, provide the user wireless the Internet access service.
Processor 280 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform software program of the storage in memory 220 and/or module, and call storage in memory 220 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 280 can be with Including one or more processing units.Additionally, mobile phone also includes the power supply 290 powered of each part, by power-supply management system with Processor 280 is logically contiguous, so as to realize the functions such as management charging, electric discharge and power managed by power-supply management system.
Although not shown, mobile phone can also will not be repeated here including camera, bluetooth module etc..
Refer to Fig. 2, method of controlling security provided in an embodiment of the present invention can be used for above-mentioned mobile terminal, such as mobile phone, Panel computer etc., the method includes:
S1, acquisition are blocked region.
Herein be blocked region to hold the region stopped and block after machine when user is using mobile phone.Occlusion area can lead to Cross optical sensor to detect, occlusion area can be identified by the difference of brightness.Additionally, occlusion area can also be by pressure Sensor is detected, after holding mobile phone, there is pressure between hand and the contact surface of mobile phone, therefore is detected by pressure sensor and received Power can also obtain occlusion area.Following information is also further obtained after obtaining occlusion area:It is including but not limited to described to be hidden Keep off one or more in position, the area in the region that is blocked, the external periphery outline in the region that is blocked in region.It is logical Cross the information such as position, area, the external periphery outline in the region that is blocked to judge whether user there occurs change, due to these letters The characteristics of ceasing the custom and hand-characteristic according to each user, can preferably be distinguished, and improve and identify abnormal user The degree of accuracy.
S2, judge described in the region that is blocked whether belong to default routine and block scope.
In the step, used as a kind of specific implementation, the routine blocks the default face that scope is conventional shielded area Product value range, whether the region that is blocked described in the judgement belongs to default routine blocks scope, including:
First, be blocked the position in region and the area in the region that is blocked described in obtaining.Position herein refers to position In mobile phone front or the back side, top, middle part or bottom.During due to different conditions, the diverse location of mobile phone is held.For example When taking out mobile phone, what may be contacted is the top or the position of bottom of mobile phone, and contact range is smaller.Phone is taken using mobile phone When, occlusion area is located at the mobile phone back side, and can typically hold the middle part of mobile phone;During using application APP on mobile phone, can hold Stop the middle and lower part at the machine back side.It can be seen that diverse location can correspond to different occlusion areas.Be blocked region position determine Afterwards, can then obtain being blocked the area in region according to blocking scope.
Secondly, the preset area value range of the corresponding conventional shielded area in the position is obtained.
After the position in the region that is blocked is determined, the position can correspond to the scope contacted when user routinely uses, example When such as taking phone or when browsing mobile phone web pages, the custom of each user is different.According to conventional blocking position, it is right to preset The preset area value range of the conventional shielded area answered, this value is obtained for the use habit of user.
The routine blocks occlusion area when scope is normally used by counting a large number of users to calculate, such as statistics one User 200 times or 500 subnormal occlusion areas when using.The multiple extraction of occlusion area during by normally using user Data, obtain routine blocks scope, is obtained due to use habit and hand-characteristic that the data are directed to user, therefore accurate Exactness is higher, can distinguish that degree is also high, such that it is able to the recognition accuracy of abnormal user.
Finally, judge described in be blocked region area whether in the preset area value range.If current detection The region that is blocked area in the range of the preset area, then explanation be still original user, in the absence of exception.When being hidden The area in region is kept off not in the range of the preset area, then performs step 3, it is believed that exception occurs in user, is protected accordingly Operation.
By performing above-mentioned steps, it can be conventional shielded area routinely to block scope, and different occlusion area correspondences are not With conventional shielded area, therefore the preset area model of corresponding conventional shielded area is obtained according to the position in the region that is blocked Value is enclosed, whether the current region that is blocked then is judged in preset area value range, if no longer illustrated in preset range value User changes, it should perform protection operation.
If S3, the region that is blocked are not belonging to default routine and block scope, protection operation is performed.
Described execution protects operation including but not limited to alarm, screen locking, file encryption, shutdown, location information long-range One or more in transmission.User can be allowed to find the exception of mobile phone state in time by alarm, by screen locking and plus Secret emissary obtains abnormal user and cannot use mobile phone, reduces mobile phone and loses the loss for causing, and location information remotely sends can be further Improve the probability being found after mobile phone is lost.By performing above-mentioned steps, when it is that abnormal user uses mobile terminal to judge, Can be protected by way of alarm, screen locking, file encryption, shutdown, long-range transmission warning message, so as to improve shifting The security row of the information of its storage after dynamic lost terminal, or find the mobile terminal lost and information is provided.
In the present embodiment provide method of controlling security, for mobile terminal in, can be obtained according to the use habit of user Routine when mobile terminal is commonly used to user blocks scope, if the size of currently used person's occlusion area is normal with before To block scope inconsistent for rule, then it is assumed that mobile terminal be in it is dangerous in the state of, such as lose or stolen, just can now perform Safety measure, reduces the risk caused after mobile terminal is lost, it is achieved thereby that the security control after stolen or loss.
Used as another implementation in step S2, the routine is blocked and may range from the default edge model of hand profile Enclose, whether the region that is blocked described in judgement belongs to default routine blocks scope can also use following steps:
The first step, obtain described in be blocked the external periphery outline in region.What is extracted herein is not the whole area being blocked, But the edge of occlusion area.The edge in region can be obtained by way of rim detection.
Second step, judges whether the external periphery outline is located at the hand profile and presets edge extent.To routinely block Scope selection presets edge extent for hand profile, and because everyone hand shape is different, custom during hand-held mobile terminal is not Together, then cause the outline of occlusion area different, therefore whether be located at by the external periphery outline in the region that judges to be blocked described The default edge extent of hand profile determines whether to have changed the user of mobile terminal, with accuracy higher.If hidden The external periphery outline for keeping off region is located in the default edge extent of the hand profile, then illustrate that user does not change, and mobile phone is used Family is normal, if not in this range, illustrating that cellphone subscriber occurs in that change, then performs safety operation.
A kind of schematic diagram of safety control provided in an embodiment of the present invention referring to Fig. 3, for mobile terminal in, It includes:
Detection module 31, for obtaining the region that is blocked;
Processing module 32, scope is blocked for judging whether the region that is blocked belongs to default routine;
Protection performing module 33, if being not belonging to default routine for the region that is blocked blocks scope, performs guarantor Shield operation.
Safety control in the present embodiment is presented in the form of functional unit, and unit here refers to ASIC electricity Road, performs the processor and memory of one or more softwares or fixed routine, and/or other can provide the device of above-mentioned functions Part.
Alternatively, the routine blocks the preset area value range that scope is conventional shielded area, the processing module 32 Including:Position acquisition submodule, the position for obtaining the region that is blocked;Area acquisition submodule, for obtaining the position Put the maximum of corresponding conventional shielded area;First judging submodule, for judge the region that is blocked area whether In the preset area value range.
By implementing above-mentioned safety control, it can be conventional shielded area, different blocked areas routinely to block scope Domain different conventional shielded areas of correspondence, therefore the pre- of corresponding conventional shielded area is obtained according to the position in the region that is blocked If areal extent value, whether the current region that is blocked then is judged in preset area value range, if no longer preset range value It is interior, then illustrate that user changes, it should perform protection operation.
Alternatively, the routine blocks scope for hand profile presets edge extent, and the processing module includes:Obtain at edge Submodule is taken, the external periphery outline for obtaining the region that is blocked;Second judging submodule, for judging the outward flange Whether profile is located at the hand profile and presets edge extent.
Above-mentioned safety control will routinely block scope selection for hand profile presets edge extent, due to everyone Hand shape is different, and custom during hand-held mobile terminal is different, then cause the outline of occlusion area different, therefore by judging quilt Whether the external periphery outline of occlusion area is located at the default edge extent of the hand profile to determine whether to have changed mobile terminal User, with accuracy higher.
Alternatively, the protection performing module includes that alarm submodule, and/or screen locking submodule, and/or file add Close submodule, and/or shutdown submodule, and/or the long-range sending submodule of location information in one or more.
Above-mentioned safety control, when it is that abnormal user uses mobile terminal to judge, can be by alarm, lock Screen, file encryption, shutdown, the long-range mode for sending warning message are protected, so as to improve its storage after mobile terminal is lost Information security row, or find lose mobile terminal provide information.
Safety control in above-described embodiment, can obtain user commonly using movement according to the use habit of user Routine during terminal blocks scope, if to block scope inconsistent for the size of currently used person's occlusion area and routine before, Then think mobile terminal be in it is dangerous in the state of, such as lose or stolen, just can now perform safety measure, reduce shifting The risk caused after dynamic lost terminal, it is achieved thereby that the security control after stolen or loss.
The embodiment of the present invention also provides a kind of mobile terminal, the security control dress with the mobile terminal shown in above-mentioned Fig. 3 Put.
Additionally, another mobile terminal is also provided in the embodiment of the present invention, as shown in figure 4, being that the embodiment of the present invention is carried The hardware architecture diagram of the mobile terminal of confession, the equipment includes one or more processors 41, memory 42 and for knowing The occlusion detection unit 43 of other occlusion area, in Fig. 4 by taking a processor 41 as an example.Occlusion detection unit 43 connects processor 41, the connection memory 42 of processor 41 can be connected, in Fig. 4 as a example by being connected by bus by bus or other modes.
Processor 41 can be central processing unit (Central Processing Unit, CPU).Processor 41 can be with It is other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field- Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, The chips such as discrete hardware components, or above-mentioned all kinds of chips combination.General processor can be microprocessor or the treatment Device can also be any conventional processor etc..
Memory 42 can be used to storing non-transient software program, non-as a kind of non-transient computer readable storage medium storing program for executing The corresponding program of processing method of the list items operation in transient computer executable program and module, such as the embodiment of the present application Instruction/module.Processor 41 passes through to run the non-transient software program stored in memory 42, instruction and module, so that The various function application of execute server and data processing, that is, realize the treatment side of above method embodiment list items operation Method.
Memory 42 can include storing program area and storage data field, wherein, storing program area can storage program area, Application program required at least one function;Storage data field can store the use institute of the processing unit operated according to list items Data of establishment etc..Additionally, memory 42 can include high-speed random access memory, non-transient memory can also be included, For example, at least one disk memory, flush memory device or other non-transient solid-state memories.In certain embodiments, deposit Reservoir 41 is optional including the memory remotely located relative to processor 42, and these remote memories can be by network connection extremely The processing unit of list items operation.The example of above-mentioned network includes but is not limited to internet, intranet, LAN, movement Communication network and combinations thereof.
Occlusion detection unit 43 can be provided in the optical sensor on housing, for identifying user hand to mobile terminal Blocking position, can also be the pressure sensor being arranged on housing, for recognizing occlusion area by pressure, can be with It is other such as touch-control sensors, occlusion area is obtained by recognizing touch signal.It is all to be capable of identify that hand to movement The sensor of the occlusion area of terminal can be used in herein.
It is above-mentioned to be moved through the method that the executable embodiment of the present invention of terminal is provided, possess the corresponding function mould of execution method Block and beneficial effect.The processor 41 by performing the computer instruction, so as to realize following methods:
First, the region that is blocked is obtained;
Next, whether the region that is blocked described in judgement belongs to default routine blocks scope;
Then, if the region that is blocked is not belonging to default routine and blocks scope, protection operation is performed.
Wherein, the routine blocks the preset area value range that scope is conventional shielded area, and the judgement is described to be hidden Whether gear region belongs to default routine blocks scope, including:
The first step, obtain described in be blocked the position in region;
Second step, obtains the preset area value range of the corresponding conventional shielded area in the position;
3rd step, judge described in be blocked region area whether in the preset area value range.
Alternatively implementation, the routine is blocked scope and can also preset edge extent, institute for hand profile State whether the region that is blocked described in judgement belongs to default routine and block scope, including:
The first step, obtain described in be blocked the external periphery outline in region;
Second step, judges whether the external periphery outline is located at the hand profile and presets edge extent.
Wherein, the region that is blocked includes the face of the position, and/or the region that is blocked in the region that is blocked The external periphery outline in the long-pending, and/or region that is blocked.
Alternatively, the execution protection operation includes that alarm, screen locking, file encryption, shutdown, location information are remotely sent out One or more in sending.The routine blocks occlusion area when scope is normally used according to user in preset times to count Calculate.
Conventional screening when above-mentioned mobile terminal can obtain user commonly using mobile terminal according to the use habit of user Gear scope, if to block scope with routine before inconsistent for the size of currently used person's occlusion area, then it is assumed that mobile terminal In the state of dangerous, such as lose or stolen, just can now perform safety measure, reduce after mobile terminal is lost and make Into risk, it is achieved thereby that security control stolen or after losing.
It will be understood by those skilled in the art that all or part of flow in realizing above-described embodiment method, can be logical Computer program is crossed to instruct the hardware of correlation to complete, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (ROM) or random access memory (RAM) etc..
Although being described in conjunction with the accompanying embodiments of the invention, those skilled in the art can not depart from the present invention Spirit and scope in the case of various modification can be adapted and modification, such modification and modification are each fallen within by appended claims institute Within the scope of restriction.

Claims (11)

1. a kind of method of controlling security, for mobile terminal, it is characterised in that including:
Acquisition is blocked region;
Whether the region that is blocked described in judging belongs to default routine and blocks scope;
If the region that is blocked is not belonging to default routine and blocks scope, protection operation is performed.
2. method according to claim 1, it is characterised in that it is the default of conventional shielded area that the routine blocks scope Areal extent value, whether the region that is blocked described in the judgement belongs to default routine blocks scope, including:
Be blocked the position in region and the area in the region that is blocked described in obtaining;
Obtain the preset area value range of the corresponding conventional shielded area in the position;
Judge described in be blocked region area whether in the preset area value range.
3. method according to claim 1, it is characterised in that the routine blocks scope for hand profile presets edge model Enclose, whether the region that is blocked described in the judgement belongs to default routine blocks scope, including:
Be blocked the external periphery outline in region described in obtaining;
Judge whether the external periphery outline is located at the hand profile and presets edge extent.
4. the method according to claim 1 or 2 or 3, it is characterised in that the region that is blocked includes the area that is blocked The external periphery outline of the area, and/or the region that is blocked in the position in domain, and/or the region that is blocked.
5. method according to claim 4, it is characterised in that the execution protection operation includes alarm, screen locking, text Part encryption, shutdown, location information remotely send in one or more.
6. method according to claim 4, it is characterised in that the routine blocks scope according to user in preset times Normal occlusion area when using is calculated.
7. a kind of safety control, for mobile terminal, it is characterised in that including:
Detection module, for obtaining the region that is blocked;
Processing module, scope is blocked for judging whether the region that is blocked belongs to default routine;
Protection performing module, if being not belonging to default routine for the region that is blocked blocks scope, performs protection operation.
8. safety control according to claim 7, it is characterised in that it is conventional block surface that the routine blocks scope Long-pending preset area value range, the processing module includes:
Position and area acquisition submodule, for obtaining the be blocked position in region and the area in the region that is blocked;
Area acquisition submodule, the maximum for obtaining the corresponding conventional shielded area in the position;
First judging submodule, for judging the area in the region that is blocked whether in the preset area value range.
9. safety control according to claim 7, it is characterised in that the routine blocks scope for hand profile is pre- If edge extent, the processing module includes:
Edge acquisition submodule, the external periphery outline for obtaining the region that is blocked;
Second judging submodule, edge extent is preset for judging whether the external periphery outline is located at the hand profile.
10. safety control according to claim 8 or claim 9, it is characterised in that the protection performing module includes alarm Prompting submodule, and/or screen locking submodule, and/or file encryption submodule, and/or shutdown submodule, and/or location information One or more in long-range sending submodule.
11. a kind of mobile terminals, it is characterised in that including the safety control described in claim any one of 7-10.
CN201710055030.6A 2017-01-24 2017-01-24 A kind of method of controlling security, device and mobile terminal Pending CN106909815A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710055030.6A CN106909815A (en) 2017-01-24 2017-01-24 A kind of method of controlling security, device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710055030.6A CN106909815A (en) 2017-01-24 2017-01-24 A kind of method of controlling security, device and mobile terminal

Publications (1)

Publication Number Publication Date
CN106909815A true CN106909815A (en) 2017-06-30

Family

ID=59206565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710055030.6A Pending CN106909815A (en) 2017-01-24 2017-01-24 A kind of method of controlling security, device and mobile terminal

Country Status (1)

Country Link
CN (1) CN106909815A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109302529A (en) * 2018-09-05 2019-02-01 南昌努比亚技术有限公司 Screen locking information display method, terminal and computer readable storage medium
CN110250969A (en) * 2019-07-05 2019-09-20 浙江英特汉莎智能科技有限公司 A kind of adjustable automatic soap dispenser of liquid outlet quantity
CN111402192A (en) * 2018-12-28 2020-07-10 杭州海康威视数字技术股份有限公司 Inspection well cover detection method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103348352A (en) * 2011-01-28 2013-10-09 株式会社Ntt都科摩 Mobile information terminal and grip-characteristic learning method
CN105100118A (en) * 2015-08-28 2015-11-25 努比亚技术有限公司 Authentication device and method
CN105162976A (en) * 2015-08-24 2015-12-16 努比亚技术有限公司 Mobile terminal and anti-theft processing method therefor
CN106254689A (en) * 2016-09-30 2016-12-21 维沃移动通信有限公司 The alarm method of a kind of mobile terminal and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103348352A (en) * 2011-01-28 2013-10-09 株式会社Ntt都科摩 Mobile information terminal and grip-characteristic learning method
CN105162976A (en) * 2015-08-24 2015-12-16 努比亚技术有限公司 Mobile terminal and anti-theft processing method therefor
CN105100118A (en) * 2015-08-28 2015-11-25 努比亚技术有限公司 Authentication device and method
CN106254689A (en) * 2016-09-30 2016-12-21 维沃移动通信有限公司 The alarm method of a kind of mobile terminal and mobile terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109302529A (en) * 2018-09-05 2019-02-01 南昌努比亚技术有限公司 Screen locking information display method, terminal and computer readable storage medium
CN111402192A (en) * 2018-12-28 2020-07-10 杭州海康威视数字技术股份有限公司 Inspection well cover detection method and device
CN111402192B (en) * 2018-12-28 2023-10-27 杭州海康威视数字技术股份有限公司 Inspection well cover detection method and inspection well cover detection device
CN110250969A (en) * 2019-07-05 2019-09-20 浙江英特汉莎智能科技有限公司 A kind of adjustable automatic soap dispenser of liquid outlet quantity

Similar Documents

Publication Publication Date Title
US11429276B2 (en) Method for displaying graphical user interface and mobile terminal
CN105912915B (en) A kind of unlocked by fingerprint method and terminal
CN106066685B (en) One kind solution lock control method and terminal device
CN105912919B (en) A kind of unlocked by fingerprint method and terminal
CN107796984A (en) A kind of information cuing method and mobile terminal
CN106527949A (en) Fingerprint unlocking method and device and terminal
CN106951850A (en) The method and mobile terminal of a kind of control fingerprint recognition module
CN106874727A (en) Double screen terminal applies processing method, device and a kind of terminal
CN106909815A (en) A kind of method of controlling security, device and mobile terminal
CN107292235A (en) The acquisition method and Related product of fingerprint
CN106303004A (en) The way of recording, device and mobile terminal under screen lock state
CN103957321A (en) Mobile terminal and antitheft method thereof
CN109710150A (en) Key control method and terminal
CN109144228A (en) A kind of fingerprint identification method and mobile terminal
CN104751586A (en) Terminal, information processing method and information processing device
CN106648460B (en) Step counting data filtering method and intelligent terminal
CN105045372A (en) Method and equipment controlling wearable device
CN108063861A (en) The method, apparatus and mobile terminal that a kind of state is reminded
CN106445721A (en) Watchdog fault-tolerant processing method and mobile terminal
CN106817489B (en) The reminding method and mobile terminal of message
CN107862189A (en) Unlocking method and related product
CN107066090A (en) The method and mobile terminal of a kind of control fingerprint recognition module
CN107256383A (en) The acquisition method and Related product of fingerprint
CN106385486A (en) Proximity sensor control method, proximity sensor control device and mobile terminal
CN109285002A (en) A kind of graphical identification code display methods and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170630