CN106951800A - The method and mobile terminal of a kind of application program encryption - Google Patents
The method and mobile terminal of a kind of application program encryption Download PDFInfo
- Publication number
- CN106951800A CN106951800A CN201710178741.2A CN201710178741A CN106951800A CN 106951800 A CN106951800 A CN 106951800A CN 201710178741 A CN201710178741 A CN 201710178741A CN 106951800 A CN106951800 A CN 106951800A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- default
- application program
- predetermined encryption
- facial characteristics
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The method and mobile terminal encrypted the invention belongs to encipherment protection field there is provided a kind of application program.In embodiments of the present invention, detection and the signal intensity of the Intelligent bracelet wireless connection first, when the signal intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained, and controls the default application program of the mobile terminal to enter predetermined encryption state according to the facial characteristics of the acquisition.Method provided in an embodiment of the present invention and mobile terminal can be protected the privacy of owner user not compromised when mobile terminal is by public use, lift the usage experience of user according to the default encrypted state applied of the strength control of signal between Intelligent bracelet and mobile terminal.
Description
Technical field
The invention belongs to the method and mobile terminal in encipherment protection field, more particularly to a kind of encryption of application program.
Background technology
Mobile terminal is used as history of the simple communication equipment with Mobile Communication Development existing decades.Opened from 2007
Begin, intellectuality has triggered mobile terminal gene mutation, fundamentally change terminal and positioned as the tradition of mobile network's tip.
Mobile intelligent terminal is almost changed into the crucial entrance and main innovation platform of Internet service between a flash, new media,
Ecommerce and information service platform, the most important hinge of Internet resources, mobile network resource and environmental interaction resource, it is grasped
Make system and processor chips or even the strategic high ground as current whole ICT industries.
At present, mobile terminal there is a situation where to be borrowed temporarily by friend or other people, now easily causes privacy leakage, makes
Into psychological pressure.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of method of application program encryption, it is intended to solve current mobile terminal
The problem of privacy is easily revealed when being borrowed by other people temporarily.
In order to solve the above-mentioned technical problem, the present invention is realized in:A kind of method of application program encryption, is applied to
Mobile terminal, the mobile terminal and Intelligent bracelet wireless connection, the described method comprises the following steps:
Detection and the signal intensity of the Intelligent bracelet wireless connection;
When the signal intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained;
The default application program for controlling the mobile terminal according to the facial characteristics of the acquisition enters predetermined encryption state.
Further, before the step of the detection and the signal intensity of the Intelligent bracelet wireless connection, including:
The mobile terminal is attached with the Intelligent bracelet by bluetooth;
Enter predetermined encryption pattern corresponding with the annexation on the backstage of the mobile terminal.
Further, it is described when the signal intensity is less than predetermined threshold value, obtain the mobile terminal active user's
The step of facial characteristics, including:
When the signal intensity is less than predetermined threshold value, the front camera for starting the mobile terminal detects the face of active user
Portion's feature.
Further, it is described to control the default application program of the mobile terminal to enter according to the facial characteristics of the acquisition
The step of predetermined encryption state, including:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection
During facial characteristics, the default application program of the mobile terminal is controlled to enter the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the
Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
Further, in the step for controlling the default application program of the mobile terminal to enter the second predetermined encryption state
After rapid, also include:
The duration that the mobile terminal is entered first encrypted state by second encrypted state is calculated according to following formula
T2:
When the duration for entering the second predetermined encryption state in the mobile terminal reaches T2, the default of the mobile terminal is controlled to answer
Enter the first predetermined encryption state with program;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
The purpose of the embodiment of the present invention also resides in a kind of mobile terminal of offer, and the mobile terminal wirelessly connects with Intelligent bracelet
Connect, the mobile terminal includes:
Detection unit, for detecting the signal intensity with the Intelligent bracelet wireless connection;
Acquiring unit, for when the signal intensity is less than predetermined threshold value, obtaining the face of the mobile terminal active user
Feature;
Control unit, the default application program for controlling the mobile terminal according to the facial characteristics of the acquisition enters default
Encrypted state.
Further, the mobile terminal and the mode of Intelligent bracelet wireless connection are:Will be described mobile whole by bluetooth
End is attached with the Intelligent bracelet;
Described control unit is additionally operable to enter predetermined encryption mould corresponding with the annexation on the backstage of the mobile terminal
Formula.
Further, the acquiring unit specifically for:
When the signal intensity is less than predetermined threshold value, the front camera for starting the mobile terminal detects the face of active user
Portion's feature.
Further, described control unit specifically for:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection
During facial characteristics, the default application program of the mobile terminal is controlled to enter the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the
Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
Further, the mobile terminal also includes:
Computing unit, is added for calculating the mobile terminal according to following formula by second encrypted state into described first
The duration T2 of close state:
Described control unit is additionally operable to, when the duration that the mobile terminal enters the second predetermined encryption state reaches T2, control institute
The default application program for stating mobile terminal enters the first predetermined encryption state;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
In embodiments of the present invention, detection and the signal intensity of the Intelligent bracelet wireless connection first, in the signal
When intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained, and it is special according to the face of the acquisition
Levy and control the default application program of the mobile terminal to enter predetermined encryption state.Method provided in an embodiment of the present invention and movement
Terminal can be according to the default encrypted state applied of the strength control of signal between Intelligent bracelet and mobile terminal, and protection owner use
The privacy at family is not compromised when mobile terminal is by public use, lifts the usage experience of user.
Brief description of the drawings
Fig. 1 is the flow chart for the method that the application program provided in an embodiment of the present invention applied to mobile terminal is encrypted;
Fig. 2 shows the circuit theory schematic diagram of mobile terminal provided in an embodiment of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Implementing for the present invention is described in detail below in conjunction with specific embodiment:
Fig. 1 shows the flow for the method that the application program provided in an embodiment of the present invention applied to mobile terminal is encrypted, in order to
It is easy to explanation, only lists the part related to the embodiment of the present invention, details are as follows:
The embodiments of the invention provide a kind of method of application program encryption, applied to mobile terminal, the mobile terminal and intelligence
Energy bracelet wireless connection, this method comprises the following steps:
Step S10, detection and the signal intensity of the Intelligent bracelet wireless connection.Mobile terminal and the Intelligent bracelet wireless connection
Signal power it is related to distance therebetween, distance is remote, and signal is weak, and apart from closely, signal is strong;Apart from it is remote when(That is signal
When intensity is weak), privacy easily reveals, it is necessary to strengthen the secret protection of default application program, that is, is encrypted.Preferably, in step
Before rapid S10, the mobile terminal is attached with the Intelligent bracelet by bluetooth first, and in the mobile terminal
Backstage enters predetermined encryption pattern corresponding with the annexation, and the corresponding cipher mode is when mobile terminal and the intelligence
The mobile terminal is put into default when energy bracelet starts connection(Using)Encryption mode.
Step S20, when the signal intensity is less than predetermined threshold value, the face for obtaining the mobile terminal active user is special
Levy.Specifically, when the signal intensity is less than predetermined threshold value, the current use of front camera detection of the mobile terminal is started
The facial characteristics at family.If the signal intensity is by turning by force weak, until the Intelligent bracelet connects with the wireless of the mobile terminal
Disconnection is connect, then controls the default application program of the mobile terminal to enter the second predetermined encryption state.
Step S30, controls the default application program of the mobile terminal to enter default according to the facial characteristics of the acquisition
Encrypted state.
As one embodiment of the present invention, step S30 embodiment is:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection
During facial characteristics(Specifically, special facial expression is prestored in the terminal, and the special facial expression is defined as
Default secret protection facial characteristics), control the default application program of the mobile terminal(Such as chat class, property class application
Program)Into the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the
Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
As one embodiment of the present invention, enter second in the default application program of the control mobile terminal pre-
If after the step of encrypted state, also including:
The duration that the mobile terminal is entered first encrypted state by second encrypted state is calculated according to following formula
T2:
When the duration for entering the second predetermined encryption state in the mobile terminal reaches T2, the default of the mobile terminal is controlled to answer
Enter the first predetermined encryption state with program;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
It can be seen from above-mentioned formula, when the similarity is bigger, the mobile terminal is entered by second encrypted state
The duration T2 of first encrypted state time is then shorter, by the encryption level of the second predetermined encryption state is higher than institute
The encryption level of the first predetermined encryption state is stated, the complexity of the Crypted password of the second predetermined encryption state is default higher than first to be added
The complexity of the Crypted password of close state, decryption is complex, and if if owner user, the similarity is very high, subtracts
The time of few second predetermined encryption state, faster the first predetermined encryption today state can facilitate owner user to solve faster
Lock, lifts the usage experience of user.
In embodiments of the present invention, detection and the signal intensity of the Intelligent bracelet wireless connection first, in the signal
When intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained, and it is special according to the face of the acquisition
Levy and control the default application program of the mobile terminal to enter predetermined encryption state.Method provided in an embodiment of the present invention and movement
Terminal can be according to the default encrypted state applied of the strength control of signal between Intelligent bracelet and mobile terminal, and protection owner use
The privacy at family is not compromised when mobile terminal is by public use, lifts the usage experience of user.
Fig. 2 shows the circuit theory schematic diagram of mobile terminal provided in an embodiment of the present invention, for convenience of description, only arranges
Go out the part related to the embodiment of the present invention, details are as follows:
The embodiment of the present invention additionally provides a kind of mobile terminal, the mobile terminal and Intelligent bracelet wireless connection, the movement
Terminal includes:Detection unit 100, acquiring unit 200 and control unit 300;
Detection unit 100, for detecting the signal intensity with the Intelligent bracelet wireless connection;
Acquiring unit 200, for when the signal intensity is less than predetermined threshold value, obtaining the face of the mobile terminal active user
Portion's feature;
Control unit 300, the default application program for controlling the mobile terminal according to the facial characteristics of the acquisition enters
Predetermined encryption state.
As one embodiment of the present invention, the mobile terminal and the mode of Intelligent bracelet wireless connection are:Pass through indigo plant
The mobile terminal is attached by tooth with the Intelligent bracelet;
Described control unit is additionally operable to enter predetermined encryption mould corresponding with the annexation on the backstage of the mobile terminal
Formula.
As one embodiment of the present invention, acquiring unit 200 specifically for:
When the signal intensity is less than predetermined threshold value, the front camera for starting the mobile terminal detects the face of active user
Portion's feature.
As one embodiment of the present invention, control unit 300 specifically for:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection
During facial characteristics, the default application program of the mobile terminal is controlled to enter the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the
Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
As one embodiment of the present invention, the mobile terminal also includes:
Computing unit 400, enters described for calculating the mobile terminal by second encrypted state according to following formula
The duration T2 of one encrypted state:
Described control unit is additionally operable to, when the duration that the mobile terminal enters the second predetermined encryption state reaches T2, control institute
The default application program for stating mobile terminal enters the first predetermined encryption state;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
It should be noted that mobile terminal provided in an embodiment of the present invention and the above-mentioned application program applied to mobile terminal
The embodiment correspondence of the method for encryption, its operation principle and mode are corresponded to and are applicable, and are just repeated no more here.
In embodiments of the present invention, detection and the signal intensity of the Intelligent bracelet wireless connection first, in the signal
When intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained, and it is special according to the face of the acquisition
Levy and control the default application program of the mobile terminal to enter predetermined encryption state.Method provided in an embodiment of the present invention and movement
Terminal can be according to the default encrypted state applied of the strength control of signal between Intelligent bracelet and mobile terminal, and protection owner use
The privacy at family is not compromised when mobile terminal is by public use, lifts the usage experience of user.
It will be appreciated by those skilled in the art that simply being carried out for the unit that above-described embodiment includes according to function logic
Divide, but be not limited to above-mentioned division, as long as corresponding function can be realized;In addition, the tool of each functional unit
Body title is also only to facilitate mutually distinguish, the protection domain being not intended to limit the invention.
Those of ordinary skill in the art are further appreciated that all or part of step realized in above-described embodiment method is can
To instruct the hardware of correlation to complete by program, described program can be stored in a computer read/write memory medium
In, described storage medium, including ROM/RAM, disk, CD etc..
Presently preferred embodiments of the present invention is the foregoing is only, is not intended to limit the invention, all essences in the present invention
Any modification, equivalent and improvement made within refreshing and principle etc., should be included within the scope of the present invention.
Claims (10)
1. a kind of method of application program encryption, applied to mobile terminal, the mobile terminal and Intelligent bracelet wireless connection, its
It is characterised by, the described method comprises the following steps:
Detection and the signal intensity of the Intelligent bracelet wireless connection;
When the signal intensity is less than predetermined threshold value, the facial characteristics of the mobile terminal active user is obtained;
The default application program for controlling the mobile terminal according to the facial characteristics of the acquisition enters predetermined encryption state.
2. according to the method described in claim 1, it is characterised in that in the detection and the letter of the Intelligent bracelet wireless connection
Before the step of number intensity, including:
The mobile terminal is attached with the Intelligent bracelet by bluetooth;
Enter predetermined encryption pattern corresponding with the annexation on the backstage of the mobile terminal.
3. according to the method described in claim 1, it is characterised in that described when the signal intensity is less than predetermined threshold value, obtain
The step of taking the facial characteristics of the mobile terminal active user, including:
When the signal intensity is less than predetermined threshold value, the front camera for starting the mobile terminal detects the face of active user
Portion's feature.
4. according to the method described in claim 1, it is characterised in that described to be moved according to the control of the facial characteristics of the acquisition is described
The step of default application program of dynamic terminal enters predetermined encryption state, including:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection
During facial characteristics, the default application program of the mobile terminal is controlled to enter the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the
Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
5. method according to claim 4, it is characterised in that in the default application program of the control mobile terminal
Into after the step of the second predetermined encryption state, also include:
The duration that the mobile terminal is entered first encrypted state by second encrypted state is calculated according to following formula
T2:
When the duration for entering the second predetermined encryption state in the mobile terminal reaches T2, the default of the mobile terminal is controlled to answer
Enter the first predetermined encryption state with program;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
6. a kind of mobile terminal, the mobile terminal and Intelligent bracelet wireless connection, it is characterised in that the mobile terminal bag
Include:
Detection unit, for detecting the signal intensity with the Intelligent bracelet wireless connection;
Acquiring unit, for when the signal intensity is less than predetermined threshold value, obtaining the face of the mobile terminal active user
Feature;
Control unit, the default application program for controlling the mobile terminal according to the facial characteristics of the acquisition enters default
Encrypted state.
7. mobile terminal according to claim 6, it is characterised in that the mobile terminal and Intelligent bracelet wireless connection
Mode is:The mobile terminal is attached with the Intelligent bracelet by bluetooth;
Described control unit is additionally operable to enter predetermined encryption mould corresponding with the annexation on the backstage of the mobile terminal
Formula.
8. mobile terminal according to claim 6, it is characterised in that the acquiring unit specifically for:
When the signal intensity is less than predetermined threshold value, the front camera for starting the mobile terminal detects the face of active user
Portion's feature.
9. mobile terminal according to claim 6, it is characterised in that described control unit specifically for:
Judge the similarity of the facial characteristics and default facial characteristics in the mobile terminal of the acquisition;
When the similarity is more than or equal to default similarity threshold, and the facial characteristics of the acquisition is default secret protection
During facial characteristics, the default application program of the mobile terminal is controlled to enter the first predetermined encryption state;
When the similarity is less than the default similarity threshold, the default application program of the mobile terminal is controlled to enter the
Two predetermined encryption states;
Wherein, the encryption level of the second predetermined encryption state is higher than the encryption level of the first predetermined encryption state.
10. mobile terminal according to claim 9, it is characterised in that the mobile terminal also includes:
Computing unit, is added for calculating the mobile terminal according to following formula by second encrypted state into described first
The duration T2 of close state:
Described control unit is additionally operable to, when the duration that the mobile terminal enters the second predetermined encryption state reaches T2, control institute
The default application program for stating mobile terminal enters the first predetermined encryption state;
Wherein, T1 represents preset reference duration, and D1 represents the similarity, and D2 represents the similarity threshold.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710178741.2A CN106951800B (en) | 2017-03-23 | 2017-03-23 | Application program encryption method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710178741.2A CN106951800B (en) | 2017-03-23 | 2017-03-23 | Application program encryption method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106951800A true CN106951800A (en) | 2017-07-14 |
CN106951800B CN106951800B (en) | 2020-04-21 |
Family
ID=59472730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710178741.2A Expired - Fee Related CN106951800B (en) | 2017-03-23 | 2017-03-23 | Application program encryption method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106951800B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103577737A (en) * | 2012-08-07 | 2014-02-12 | 百度在线网络技术(北京)有限公司 | Mobile terminal and automatic authority adjusting method thereof |
CN104217147A (en) * | 2014-09-24 | 2014-12-17 | 中国联合网络通信集团有限公司 | Method for switching unlocking modes of intelligent terminal and intelligent terminal |
CN104598183A (en) * | 2014-12-31 | 2015-05-06 | 青岛歌尔声学科技有限公司 | Head-mounted display equipment and method for obtaining intelligent equipment information by head-mounted display equipment |
CN104639745A (en) * | 2015-01-26 | 2015-05-20 | 小米科技有限责任公司 | Voice prompt method and device |
US20150278498A1 (en) * | 2014-03-28 | 2015-10-01 | Lg Electronics Inc. | Mobile terminal and method for controlling the same |
US20160302068A1 (en) * | 2015-04-08 | 2016-10-13 | Lg Electronics Inc. | Mobile terminal and method for controlling the same |
CN106127010A (en) * | 2016-07-04 | 2016-11-16 | 珠海市魅族科技有限公司 | The security setting method of terminal applies and the device of security set |
-
2017
- 2017-03-23 CN CN201710178741.2A patent/CN106951800B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103577737A (en) * | 2012-08-07 | 2014-02-12 | 百度在线网络技术(北京)有限公司 | Mobile terminal and automatic authority adjusting method thereof |
US20150278498A1 (en) * | 2014-03-28 | 2015-10-01 | Lg Electronics Inc. | Mobile terminal and method for controlling the same |
CN104217147A (en) * | 2014-09-24 | 2014-12-17 | 中国联合网络通信集团有限公司 | Method for switching unlocking modes of intelligent terminal and intelligent terminal |
CN104598183A (en) * | 2014-12-31 | 2015-05-06 | 青岛歌尔声学科技有限公司 | Head-mounted display equipment and method for obtaining intelligent equipment information by head-mounted display equipment |
CN104639745A (en) * | 2015-01-26 | 2015-05-20 | 小米科技有限责任公司 | Voice prompt method and device |
US20160302068A1 (en) * | 2015-04-08 | 2016-10-13 | Lg Electronics Inc. | Mobile terminal and method for controlling the same |
CN106127010A (en) * | 2016-07-04 | 2016-11-16 | 珠海市魅族科技有限公司 | The security setting method of terminal applies and the device of security set |
Also Published As
Publication number | Publication date |
---|---|
CN106951800B (en) | 2020-04-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101833965B1 (en) | Distributing biometric authentication between devices in an ad hoc network | |
US8498618B2 (en) | Systems for intelligent authentication based on proximity | |
KR102323169B1 (en) | Method and system for managing a door entry using beacon signal | |
CA2789216C (en) | Method, apparatus, and use of presence detection | |
JP5955956B2 (en) | Method and apparatus for detecting and handling lost electronic devices | |
US20110313922A1 (en) | System For NFC Authentication Based on BLUETOOTH Proximity | |
US20120254987A1 (en) | Pairing and authentication process between a host device and a limited input wireless device | |
CN104507034B (en) | Equipment connection method, device and terminal device | |
US20160379039A1 (en) | Method and apparatus for enabling the touchscreen display of a mobile device | |
US20120019379A1 (en) | Systems for three factor authentication challenge | |
CN104077512B (en) | Personal information security management method and managing device | |
EP3964984A1 (en) | Unlocking method and electronic device | |
CN104778773A (en) | System and method for controlling entrance guard by mobile phone | |
CN104902074B (en) | A kind of mobile phone information safety management method based on more permission modes | |
Gratton | Developing practical wireless applications | |
CN109522695A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN108475306A (en) | User interface for mobile device | |
CN108431821A (en) | User interface for mobile device | |
CN105827788A (en) | Intelligent terminal control method, intelligent terminal and main control terminal | |
CN107431542A (en) | Initiation and checking for body area network | |
TW200633466A (en) | Network access system, method and recording medium | |
CN106997761A (en) | The method and mobile terminal of a kind of secret protection | |
CN106845195A (en) | A kind of method for preventing from peeping and mobile terminal | |
CN106951800A (en) | The method and mobile terminal of a kind of application program encryption | |
CN105449303B (en) | A kind of control method and mobile terminal of mobile terminal charging current |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200421 Termination date: 20210323 |