CN106951800A - The method and mobile terminal of a kind of application program encryption - Google Patents

The method and mobile terminal of a kind of application program encryption Download PDF

Info

Publication number
CN106951800A
CN106951800A CN201710178741.2A CN201710178741A CN106951800A CN 106951800 A CN106951800 A CN 106951800A CN 201710178741 A CN201710178741 A CN 201710178741A CN 106951800 A CN106951800 A CN 106951800A
Authority
CN
China
Prior art keywords
mobile terminal
default
application program
predetermined encryption
facial characteristics
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710178741.2A
Other languages
Chinese (zh)
Other versions
CN106951800B (en
Inventor
圣光磊
吴恒飞
朱锦龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bo Zhouxueyuan
Original Assignee
Bo Zhouxueyuan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bo Zhouxueyuan filed Critical Bo Zhouxueyuan
Priority to CN201710178741.2A priority Critical patent/CN106951800B/en
Publication of CN106951800A publication Critical patent/CN106951800A/en
Application granted granted Critical
Publication of CN106951800B publication Critical patent/CN106951800B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The method and mobile terminal encrypted the invention belongs to encipherment protection field there is provided a kind of application program.In embodiments of the present invention, detection and the signal intensity of the Intelligent bracelet wireless connection first, when the signal intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained, and controls the default application program of the mobile terminal to enter predetermined encryption state according to the facial characteristics of the acquisition.Method provided in an embodiment of the present invention and mobile terminal can be protected the privacy of owner user not compromised when mobile terminal is by public use, lift the usage experience of user according to the default encrypted state applied of the strength control of signal between Intelligent bracelet and mobile terminal.

Description

The method and mobile terminal of a kind of application program encryption
Technical field
The invention belongs to the method and mobile terminal in encipherment protection field, more particularly to a kind of encryption of application program.
Background technology
Mobile terminal is used as history of the simple communication equipment with Mobile Communication Development existing decades.Opened from 2007 Begin, intellectuality has triggered mobile terminal gene mutation, fundamentally change terminal and positioned as the tradition of mobile network's tip. Mobile intelligent terminal is almost changed into the crucial entrance and main innovation platform of Internet service between a flash, new media, Ecommerce and information service platform, the most important hinge of Internet resources, mobile network resource and environmental interaction resource, it is grasped Make system and processor chips or even the strategic high ground as current whole ICT industries.
At present, mobile terminal there is a situation where to be borrowed temporarily by friend or other people, now easily causes privacy leakage, makes Into psychological pressure.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of method of application program encryption, it is intended to solve current mobile terminal The problem of privacy is easily revealed when being borrowed by other people temporarily.
In order to solve the above-mentioned technical problem, the present invention is realized in:A kind of method of application program encryption, is applied to Mobile terminal, the mobile terminal and Intelligent bracelet wireless connection, the described method comprises the following steps:
Detection and the signal intensity of the Intelligent bracelet wireless connection;
When the signal intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained;
The default application program for controlling the mobile terminal according to the facial characteristics of the acquisition enters predetermined encryption state.
Further, before the step of the detection and the signal intensity of the Intelligent bracelet wireless connection, including:
The mobile terminal is attached with the Intelligent bracelet by bluetooth;
Enter predetermined encryption pattern corresponding with the annexation on the backstage of the mobile terminal.
Further, it is described when the signal intensity is less than predetermined threshold value, obtain the mobile terminal active user's The step of facial characteristics, including:
When the signal intensity is less than predetermined threshold value, the front camera for starting the mobile terminal detects the face of active user Portion's feature.
Further, it is described to control the default application program of the mobile terminal to enter according to the facial characteristics of the acquisition The step of predetermined encryption state, including:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection During facial characteristics, the default application program of the mobile terminal is controlled to enter the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
Further, in the step for controlling the default application program of the mobile terminal to enter the second predetermined encryption state After rapid, also include:
The duration that the mobile terminal is entered first encrypted state by second encrypted state is calculated according to following formula T2:
When the duration for entering the second predetermined encryption state in the mobile terminal reaches T2, the default of the mobile terminal is controlled to answer Enter the first predetermined encryption state with program;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
The purpose of the embodiment of the present invention also resides in a kind of mobile terminal of offer, and the mobile terminal wirelessly connects with Intelligent bracelet Connect, the mobile terminal includes:
Detection unit, for detecting the signal intensity with the Intelligent bracelet wireless connection;
Acquiring unit, for when the signal intensity is less than predetermined threshold value, obtaining the face of the mobile terminal active user Feature;
Control unit, the default application program for controlling the mobile terminal according to the facial characteristics of the acquisition enters default Encrypted state.
Further, the mobile terminal and the mode of Intelligent bracelet wireless connection are:Will be described mobile whole by bluetooth End is attached with the Intelligent bracelet;
Described control unit is additionally operable to enter predetermined encryption mould corresponding with the annexation on the backstage of the mobile terminal Formula.
Further, the acquiring unit specifically for:
When the signal intensity is less than predetermined threshold value, the front camera for starting the mobile terminal detects the face of active user Portion's feature.
Further, described control unit specifically for:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection During facial characteristics, the default application program of the mobile terminal is controlled to enter the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
Further, the mobile terminal also includes:
Computing unit, is added for calculating the mobile terminal according to following formula by second encrypted state into described first The duration T2 of close state:
Described control unit is additionally operable to, when the duration that the mobile terminal enters the second predetermined encryption state reaches T2, control institute The default application program for stating mobile terminal enters the first predetermined encryption state;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
In embodiments of the present invention, detection and the signal intensity of the Intelligent bracelet wireless connection first, in the signal When intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained, and it is special according to the face of the acquisition Levy and control the default application program of the mobile terminal to enter predetermined encryption state.Method provided in an embodiment of the present invention and movement Terminal can be according to the default encrypted state applied of the strength control of signal between Intelligent bracelet and mobile terminal, and protection owner use The privacy at family is not compromised when mobile terminal is by public use, lifts the usage experience of user.
Brief description of the drawings
Fig. 1 is the flow chart for the method that the application program provided in an embodiment of the present invention applied to mobile terminal is encrypted;
Fig. 2 shows the circuit theory schematic diagram of mobile terminal provided in an embodiment of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Implementing for the present invention is described in detail below in conjunction with specific embodiment:
Fig. 1 shows the flow for the method that the application program provided in an embodiment of the present invention applied to mobile terminal is encrypted, in order to It is easy to explanation, only lists the part related to the embodiment of the present invention, details are as follows:
The embodiments of the invention provide a kind of method of application program encryption, applied to mobile terminal, the mobile terminal and intelligence Energy bracelet wireless connection, this method comprises the following steps:
Step S10, detection and the signal intensity of the Intelligent bracelet wireless connection.Mobile terminal and the Intelligent bracelet wireless connection Signal power it is related to distance therebetween, distance is remote, and signal is weak, and apart from closely, signal is strong;Apart from it is remote when(That is signal When intensity is weak), privacy easily reveals, it is necessary to strengthen the secret protection of default application program, that is, is encrypted.Preferably, in step Before rapid S10, the mobile terminal is attached with the Intelligent bracelet by bluetooth first, and in the mobile terminal Backstage enters predetermined encryption pattern corresponding with the annexation, and the corresponding cipher mode is when mobile terminal and the intelligence The mobile terminal is put into default when energy bracelet starts connection(Using)Encryption mode.
Step S20, when the signal intensity is less than predetermined threshold value, the face for obtaining the mobile terminal active user is special Levy.Specifically, when the signal intensity is less than predetermined threshold value, the current use of front camera detection of the mobile terminal is started The facial characteristics at family.If the signal intensity is by turning by force weak, until the Intelligent bracelet connects with the wireless of the mobile terminal Disconnection is connect, then controls the default application program of the mobile terminal to enter the second predetermined encryption state.
Step S30, controls the default application program of the mobile terminal to enter default according to the facial characteristics of the acquisition Encrypted state.
As one embodiment of the present invention, step S30 embodiment is:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection During facial characteristics(Specifically, special facial expression is prestored in the terminal, and the special facial expression is defined as Default secret protection facial characteristics), control the default application program of the mobile terminal(Such as chat class, property class application Program)Into the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
As one embodiment of the present invention, enter second in the default application program of the control mobile terminal pre- If after the step of encrypted state, also including:
The duration that the mobile terminal is entered first encrypted state by second encrypted state is calculated according to following formula T2:
When the duration for entering the second predetermined encryption state in the mobile terminal reaches T2, the default of the mobile terminal is controlled to answer Enter the first predetermined encryption state with program;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
It can be seen from above-mentioned formula, when the similarity is bigger, the mobile terminal is entered by second encrypted state The duration T2 of first encrypted state time is then shorter, by the encryption level of the second predetermined encryption state is higher than institute The encryption level of the first predetermined encryption state is stated, the complexity of the Crypted password of the second predetermined encryption state is default higher than first to be added The complexity of the Crypted password of close state, decryption is complex, and if if owner user, the similarity is very high, subtracts The time of few second predetermined encryption state, faster the first predetermined encryption today state can facilitate owner user to solve faster Lock, lifts the usage experience of user.
In embodiments of the present invention, detection and the signal intensity of the Intelligent bracelet wireless connection first, in the signal When intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained, and it is special according to the face of the acquisition Levy and control the default application program of the mobile terminal to enter predetermined encryption state.Method provided in an embodiment of the present invention and movement Terminal can be according to the default encrypted state applied of the strength control of signal between Intelligent bracelet and mobile terminal, and protection owner use The privacy at family is not compromised when mobile terminal is by public use, lifts the usage experience of user.
Fig. 2 shows the circuit theory schematic diagram of mobile terminal provided in an embodiment of the present invention, for convenience of description, only arranges Go out the part related to the embodiment of the present invention, details are as follows:
The embodiment of the present invention additionally provides a kind of mobile terminal, the mobile terminal and Intelligent bracelet wireless connection, the movement Terminal includes:Detection unit 100, acquiring unit 200 and control unit 300;
Detection unit 100, for detecting the signal intensity with the Intelligent bracelet wireless connection;
Acquiring unit 200, for when the signal intensity is less than predetermined threshold value, obtaining the face of the mobile terminal active user Portion's feature;
Control unit 300, the default application program for controlling the mobile terminal according to the facial characteristics of the acquisition enters Predetermined encryption state.
As one embodiment of the present invention, the mobile terminal and the mode of Intelligent bracelet wireless connection are:Pass through indigo plant The mobile terminal is attached by tooth with the Intelligent bracelet;
Described control unit is additionally operable to enter predetermined encryption mould corresponding with the annexation on the backstage of the mobile terminal Formula.
As one embodiment of the present invention, acquiring unit 200 specifically for:
When the signal intensity is less than predetermined threshold value, the front camera for starting the mobile terminal detects the face of active user Portion's feature.
As one embodiment of the present invention, control unit 300 specifically for:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection During facial characteristics, the default application program of the mobile terminal is controlled to enter the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
As one embodiment of the present invention, the mobile terminal also includes:
Computing unit 400, enters described for calculating the mobile terminal by second encrypted state according to following formula The duration T2 of one encrypted state:
Described control unit is additionally operable to, when the duration that the mobile terminal enters the second predetermined encryption state reaches T2, control institute The default application program for stating mobile terminal enters the first predetermined encryption state;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
It should be noted that mobile terminal provided in an embodiment of the present invention and the above-mentioned application program applied to mobile terminal The embodiment correspondence of the method for encryption, its operation principle and mode are corresponded to and are applicable, and are just repeated no more here.
In embodiments of the present invention, detection and the signal intensity of the Intelligent bracelet wireless connection first, in the signal When intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained, and it is special according to the face of the acquisition Levy and control the default application program of the mobile terminal to enter predetermined encryption state.Method provided in an embodiment of the present invention and movement Terminal can be according to the default encrypted state applied of the strength control of signal between Intelligent bracelet and mobile terminal, and protection owner use The privacy at family is not compromised when mobile terminal is by public use, lifts the usage experience of user.
It will be appreciated by those skilled in the art that simply being carried out for the unit that above-described embodiment includes according to function logic Divide, but be not limited to above-mentioned division, as long as corresponding function can be realized;In addition, the tool of each functional unit Body title is also only to facilitate mutually distinguish, the protection domain being not intended to limit the invention.
Those of ordinary skill in the art are further appreciated that all or part of step realized in above-described embodiment method is can To instruct the hardware of correlation to complete by program, described program can be stored in a computer read/write memory medium In, described storage medium, including ROM/RAM, disk, CD etc..
Presently preferred embodiments of the present invention is the foregoing is only, is not intended to limit the invention, all essences in the present invention Any modification, equivalent and improvement made within refreshing and principle etc., should be included within the scope of the present invention.

Claims (10)

1. a kind of method of application program encryption, applied to mobile terminal, the mobile terminal and Intelligent bracelet wireless connection, its It is characterised by, the described method comprises the following steps:
Detection and the signal intensity of the Intelligent bracelet wireless connection;
When the signal intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained;
The default application program for controlling the mobile terminal according to the facial characteristics of the acquisition enters predetermined encryption state.
2. according to the method described in claim 1, it is characterised in that in the detection and the letter of the Intelligent bracelet wireless connection Before the step of number intensity, including:
The mobile terminal is attached with the Intelligent bracelet by bluetooth;
Enter predetermined encryption pattern corresponding with the annexation on the backstage of the mobile terminal.
3. according to the method described in claim 1, it is characterised in that described when the signal intensity is less than predetermined threshold value, obtain The step of taking the facial characteristics of the mobile terminal active user, including:
When the signal intensity is less than predetermined threshold value, the front camera for starting the mobile terminal detects the face of active user Portion's feature.
4. according to the method described in claim 1, it is characterised in that described to be moved according to the control of the facial characteristics of the acquisition is described The step of default application program of dynamic terminal enters predetermined encryption state, including:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection During facial characteristics, the default application program of the mobile terminal is controlled to enter the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
5. method according to claim 4, it is characterised in that in the default application program of the control mobile terminal Into after the step of the second predetermined encryption state, also include:
The duration that the mobile terminal is entered first encrypted state by second encrypted state is calculated according to following formula T2:
When the duration for entering the second predetermined encryption state in the mobile terminal reaches T2, the default of the mobile terminal is controlled to answer Enter the first predetermined encryption state with program;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
6. a kind of mobile terminal, the mobile terminal and Intelligent bracelet wireless connection, it is characterised in that the mobile terminal bag Include:
Detection unit, for detecting the signal intensity with the Intelligent bracelet wireless connection;
Acquiring unit, for when the signal intensity is less than predetermined threshold value, obtaining the face of the mobile terminal active user Feature;
Control unit, the default application program for controlling the mobile terminal according to the facial characteristics of the acquisition enters default Encrypted state.
7. mobile terminal according to claim 6, it is characterised in that the mobile terminal and Intelligent bracelet wireless connection Mode is:The mobile terminal is attached with the Intelligent bracelet by bluetooth;
Described control unit is additionally operable to enter predetermined encryption mould corresponding with the annexation on the backstage of the mobile terminal Formula.
8. mobile terminal according to claim 6, it is characterised in that the acquiring unit specifically for:
When the signal intensity is less than predetermined threshold value, the front camera for starting the mobile terminal detects the face of active user Portion's feature.
9. mobile terminal according to claim 6, it is characterised in that described control unit specifically for:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection During facial characteristics, the default application program of the mobile terminal is controlled to enter the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
10. mobile terminal according to claim 9, it is characterised in that the mobile terminal also includes:
Computing unit, is added for calculating the mobile terminal according to following formula by second encrypted state into described first The duration T2 of close state:
Described control unit is additionally operable to, when the duration that the mobile terminal enters the second predetermined encryption state reaches T2, control institute The default application program for stating mobile terminal enters the first predetermined encryption state;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
CN201710178741.2A 2017-03-23 2017-03-23 Application program encryption method and mobile terminal Expired - Fee Related CN106951800B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710178741.2A CN106951800B (en) 2017-03-23 2017-03-23 Application program encryption method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710178741.2A CN106951800B (en) 2017-03-23 2017-03-23 Application program encryption method and mobile terminal

Publications (2)

Publication Number Publication Date
CN106951800A true CN106951800A (en) 2017-07-14
CN106951800B CN106951800B (en) 2020-04-21

Family

ID=59472730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710178741.2A Expired - Fee Related CN106951800B (en) 2017-03-23 2017-03-23 Application program encryption method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106951800B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577737A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Mobile terminal and automatic authority adjusting method thereof
CN104217147A (en) * 2014-09-24 2014-12-17 中国联合网络通信集团有限公司 Method for switching unlocking modes of intelligent terminal and intelligent terminal
CN104598183A (en) * 2014-12-31 2015-05-06 青岛歌尔声学科技有限公司 Head-mounted display equipment and method for obtaining intelligent equipment information by head-mounted display equipment
CN104639745A (en) * 2015-01-26 2015-05-20 小米科技有限责任公司 Voice prompt method and device
US20150278498A1 (en) * 2014-03-28 2015-10-01 Lg Electronics Inc. Mobile terminal and method for controlling the same
US20160302068A1 (en) * 2015-04-08 2016-10-13 Lg Electronics Inc. Mobile terminal and method for controlling the same
CN106127010A (en) * 2016-07-04 2016-11-16 珠海市魅族科技有限公司 The security setting method of terminal applies and the device of security set

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577737A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Mobile terminal and automatic authority adjusting method thereof
US20150278498A1 (en) * 2014-03-28 2015-10-01 Lg Electronics Inc. Mobile terminal and method for controlling the same
CN104217147A (en) * 2014-09-24 2014-12-17 中国联合网络通信集团有限公司 Method for switching unlocking modes of intelligent terminal and intelligent terminal
CN104598183A (en) * 2014-12-31 2015-05-06 青岛歌尔声学科技有限公司 Head-mounted display equipment and method for obtaining intelligent equipment information by head-mounted display equipment
CN104639745A (en) * 2015-01-26 2015-05-20 小米科技有限责任公司 Voice prompt method and device
US20160302068A1 (en) * 2015-04-08 2016-10-13 Lg Electronics Inc. Mobile terminal and method for controlling the same
CN106127010A (en) * 2016-07-04 2016-11-16 珠海市魅族科技有限公司 The security setting method of terminal applies and the device of security set

Also Published As

Publication number Publication date
CN106951800B (en) 2020-04-21

Similar Documents

Publication Publication Date Title
KR101833965B1 (en) Distributing biometric authentication between devices in an ad hoc network
US8498618B2 (en) Systems for intelligent authentication based on proximity
KR102323169B1 (en) Method and system for managing a door entry using beacon signal
CA2789216C (en) Method, apparatus, and use of presence detection
JP5955956B2 (en) Method and apparatus for detecting and handling lost electronic devices
US20110313922A1 (en) System For NFC Authentication Based on BLUETOOTH Proximity
US20120254987A1 (en) Pairing and authentication process between a host device and a limited input wireless device
CN104507034B (en) Equipment connection method, device and terminal device
US20160379039A1 (en) Method and apparatus for enabling the touchscreen display of a mobile device
US20120019379A1 (en) Systems for three factor authentication challenge
CN104077512B (en) Personal information security management method and managing device
EP3964984A1 (en) Unlocking method and electronic device
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN104902074B (en) A kind of mobile phone information safety management method based on more permission modes
Gratton Developing practical wireless applications
CN109522695A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN108475306A (en) User interface for mobile device
CN108431821A (en) User interface for mobile device
CN105827788A (en) Intelligent terminal control method, intelligent terminal and main control terminal
CN107431542A (en) Initiation and checking for body area network
TW200633466A (en) Network access system, method and recording medium
CN106997761A (en) The method and mobile terminal of a kind of secret protection
CN106845195A (en) A kind of method for preventing from peeping and mobile terminal
CN106951800A (en) The method and mobile terminal of a kind of application program encryption
CN105449303B (en) A kind of control method and mobile terminal of mobile terminal charging current

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200421

Termination date: 20210323