CN107392006A - Implementation method of security application and mobile terminal - Google Patents
Implementation method of security application and mobile terminal Download PDFInfo
- Publication number
- CN107392006A CN107392006A CN201710547838.6A CN201710547838A CN107392006A CN 107392006 A CN107392006 A CN 107392006A CN 201710547838 A CN201710547838 A CN 201710547838A CN 107392006 A CN107392006 A CN 107392006A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- safe space
- space
- user
- nfc label
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 238000003860 storage Methods 0.000 claims abstract description 74
- 238000004891 communication Methods 0.000 claims abstract description 17
- 230000004044 response Effects 0.000 claims description 45
- 230000002452 interceptive effect Effects 0.000 claims description 36
- 230000006870 function Effects 0.000 claims description 23
- 238000004321 preservation Methods 0.000 claims description 21
- 238000001514 detection method Methods 0.000 claims description 18
- 230000033001 locomotion Effects 0.000 claims description 10
- 238000012544 monitoring process Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 3
- 238000013497 data interchange Methods 0.000 claims description 2
- 230000006399 behavior Effects 0.000 claims 1
- 238000012795 verification Methods 0.000 abstract 1
- 238000012545 processing Methods 0.000 description 6
- 238000012790 confirmation Methods 0.000 description 4
- 230000006698 induction Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000014759 maintenance of location Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000000151 deposition Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 229910052799 carbon Inorganic materials 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000001404 mediated effect Effects 0.000 description 1
- 238000009527 percussion Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001629 suppression Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention relates to the technical field of communication, and discloses a method for realizing security application and a mobile terminal, wherein the method comprises the following steps: detecting an NFC label outside the mobile terminal through an NFC module built in the mobile terminal; after the NFC label is detected, popping up prompt information for inquiring whether a security space is established in the mobile terminal on a user interface of the mobile terminal; acquiring a setup instruction which is input by a user on a user interface of the mobile terminal and responds to the prompt message; according to the establishment instruction, unsealing the reserved storage space of the mobile terminal, taking the reserved storage space as a security space, and acquiring and storing the basic information of the NFC label as a verification key of the security space; detecting a target application program selected by a user from application programs of the mobile terminal, and storing the target application program in the safe space; by establishing a hidden security space for privacy preserving applications, the purpose of protecting personal privacy and property security is achieved.
Description
Technical field
The present invention relates to communication technical field, and in particular to the implementation method and mobile terminal of a kind of safety applications.
Background technology
Used with the popularization of smart mobile phone, smart mobile phone can be by downloading and installing some application programs
(Application) increasing function is realized, the individual privacy being related to also can be more and more, such as installed on smart mobile phone
After Mobile banking's applications client, the information such as account password can be related to, mobile payment can be realized by also installing other
Applications client after, can quickly and easily move payment, but also easily by it is non-I operate.Such as some
For family has the parent of child, the smart mobile phone of parent may be brought by child plays, due to child identification capability compared with
It is weak, the maloperation of similar mobile payment etc. may be unconsciously caused, causes individual privacy information to reveal, wealth is caused when serious
Production loss etc..
The content of the invention
The embodiment of the invention discloses a kind of implementation method of safety applications and mobile terminal, for solving in the prior art
Unsafe problems existing for application program, to improve the safe operation of application program, protect the individual privacy or property of user
Safety.
The embodiment of the invention discloses a kind of implementation method of safety applications, mobile terminal is built-in with wireless near field communication
(Near Field Communication, abbreviation NFC) module, methods described include:
NFC label outside the mobile terminal is detected by the NFC module;
After the NFC label is detected, ejected on the user interface of mobile terminal for asking whether described
Mobile terminal establishes the prompt message of safe space;
User is obtained to instruct in the foundation in response to the prompt message that the user interface of mobile terminal inputs;
Instructed according to described establish, unseal the reserved storage space of the mobile terminal, the reserved storage space is made
For the safe space, and obtain authentication secret and preservation of the essential information of the NFC label as the safe space;
Detection user selects obtained destination application in the application program of the mobile terminal, and by the mesh
Mark application program is saved in the safe space.
As an alternative embodiment, in first aspect present invention, it is described to be instructed according to described establish, unseal institute
The reserved storage space of mobile terminal is stated, using the reserved storage space as the safe space, and obtains the NFC marks
After the essential information of label is as the authentication secret of the safe space and preservation, methods described also includes:
The safe space is shown on the user interface of mobile terminal;
The detection user selects obtained destination application in the application program of the mobile terminal, and by institute
State destination application and be saved in the safe space, including:
OPEN of the user to the safe space is received, and the safety sky is opened in response to the OPEN
Between with enter the safe space operation interactive interface;
The selection operation that user adds function to the application program on the operation interactive interface is detected, based on the operation
The application list is presented in interactive interface, and described the application list includes all application programs of the mobile terminal;
User is monitored to the selection operation of destination application on described the application list, and by the intended application
Program is saved in the safe space.
As an alternative embodiment, in first aspect present invention, the detection user is in the mobile terminal
Application program in select obtained destination application, and by the destination application be saved in the safe space it
Afterwards, methods described also includes:
After detecting and exiting the safe space, the safe space is hidden on the user interface of mobile terminal.
As an alternative embodiment, in first aspect present invention, in the acquisition user described mobile whole
End subscriber interface input in response to the prompt message foundation instruct while, and it is described according to it is described establish instruct,
The reserved storage space of the mobile terminal is unsealed, using the reserved storage space as the safe space, and obtains institute
Before the essential information of NFC label is stated as the authentication secret of the safe space and preservation, methods described also includes:
Obtaining what user instructed in the foundation in response to the prompt message that the user interface of mobile terminal inputs
Meanwhile gather the fingerprint image of user;
Identify whether the fingerprint image matches with the pre-stored fingerprint image of the mobile terminal authorized user;
Instructed if it does, execution is described according to described establish, the reserved storage space of the mobile terminal is unsealed, by institute
Reserved storage space is stated as the safe space, and obtains the essential information of the NFC label as the safe space
Authentication secret and the step of preservation.
Second aspect of the present invention discloses a kind of implementation method of safety applications, and mobile terminal is built-in near radio and led to
Believe NFC module, methods described includes:
NFC label outside the mobile terminal is detected by the NFC module;
After the NFC label is detected, the essential information of the NFC label is read;
Judge whether the essential information of the NFC label matches with the authentication secret stored;The authentication secret is use
In the essential information for the target NFC label for establishing safe space;
When the essential information of the NFC label matches with the authentication secret, in the user interface of mobile terminal
The upper display safe space, the safe space are stored with destination application, and the destination application is from the movement
Selection obtains in the application program of terminal.
As an alternative embodiment, in second aspect of the present invention, essential information and institute in the NFC label
When stating authentication secret and matching, it is described the safe space is shown on the user interface of mobile terminal after, methods described
Also include:
Receive OPEN of the user to the safe space;
The safe space is opened in response to the OPEN to enter the operation interactive interface of the safe space;
The destination application is shown on the operation interactive interface.
As an alternative embodiment, in second aspect of the present invention, it is described in the user interface of mobile terminal
After the upper display safe space, methods described also includes:
After detecting and exiting the safe space, the safe space is hidden on the user interface of mobile terminal.
As an alternative embodiment, in second aspect of the present invention, essential information and institute in the NFC label
When stating authentication secret and matching, and before showing the safe space on the user interface of mobile terminal, methods described
Also include:
When the essential information of the NFC label matches with the authentication secret, the fingerprint image of user is gathered;
Identify whether the fingerprint image matches with the pre-stored fingerprint image of the mobile terminal authorized user;
If it does, perform show the safe space on the user interface of mobile terminal the step of.
Third aspect present invention discloses a kind of mobile terminal, and the mobile terminal is built-in with wireless near field communication NFC
Module, the mobile terminal include:
First label detecting unit, for detecting the NFC label outside the mobile terminal by the NFC module;
Tip element is established, for after first label detecting unit detects the NFC label, in the movement
The prompt message for asking whether to establish safe space in the mobile terminal is ejected on end-user interface;
First instruction response unit, is carried for obtaining user what the user interface of mobile terminal inputted in response to described
Show the foundation instruction of information;
Unit is established in space, for being instructed according to described establish, the reserved storage space of the mobile terminal is unsealed, by institute
Reserved storage space is stated as the safe space, and obtains the essential information of the NFC label as the safe space
Authentication secret and preservation;
Using selecting unit, obtained intended application is selected for detecting user in the application program of the mobile terminal
Program, and the destination application is saved in the safe space.
As an alternative embodiment, in third aspect present invention, the mobile terminal also includes:
First display unit, instructed for establishing unit in the space according to described establish, unseal the mobile terminal
Reserved storage space, using the reserved storage space as the safe space, and obtain the basic letter of the NFC label
After breath is as the authentication secret of the safe space and preservation, show that the safety is empty on the user interface of mobile terminal
Between;
The application selecting unit specifically includes:
First opening unit, for receiving OPEN of the user to the safe space, and in response to the opening
Safe space described in instruction unpack is with the operation interactive interface of the entrance safe space;
List display unit, for detecting selection of the user to the application program addition function on the operation interactive interface
Operation, the application list is presented based on the operation interactive interface, described the application list includes the mobile terminal
All application programs;
Storage unit, for monitoring selection operation of the user to destination application on described the application list, and
The destination application is saved in the safe space.
As an alternative embodiment, in third aspect present invention, the mobile terminal also includes:
First hidden unit, for detecting user in the application program of the mobile terminal using selecting unit described
Obtained destination application is selected, and after the destination application is saved in into the safe space, is being detected
After exiting the safe space, the safe space is hidden on the user interface of mobile terminal.
As an alternative embodiment, in third aspect present invention, the mobile terminal also includes:
First collecting unit, for obtaining user in the user interface of mobile terminal in the described first instruction response unit
While the foundation in response to the prompt message of input instructs, and the space is established unit and referred to according to the foundation
Order, the reserved storage space of the mobile terminal is unsealed, using the reserved storage space as the safe space, and obtained
Before the essential information of the NFC label is as the authentication secret of the safe space and preservation, the fingerprint image of user is gathered;
First fingerprint identification unit, for identifying whether the fingerprint image prestores with the mobile terminal authorized user
Fingerprint image matches;
The space establishes unit and is used to identify that the fingerprint image prestores with described in first fingerprint identification unit
When fingerprint image matches, instructed according to described establish, the reserved storage space of the mobile terminal is unsealed, by the pre- retention
It is close as the checking of the safe space as the safe space, and the essential information of the acquisition NFC label to store up space
Key simultaneously preserves.
Fourth aspect present invention discloses a kind of mobile terminal, and the mobile terminal is built-in with wireless near field communication NFC
Module, the mobile terminal include:
Second label detecting unit, for detecting the NFC label outside the mobile terminal by the NFC module;
Reading unit, for after second label detecting unit detects the NFC label, reading the NFC marks
The essential information of label;
Key judging unit, for judging whether the essential information of the NFC label matches with the authentication secret stored;
The authentication secret is for the essential information for the target NFC label for establishing safe space;
Second display unit, for determining that the essential information of the NFC label is tested with described in the key judging unit
When card key matches, the safe space is shown on the user interface of mobile terminal, the safe space is stored with mesh
Application program is marked, the destination application selects to obtain from the application program of the mobile terminal.
As an alternative embodiment, in fourth aspect present invention, the mobile terminal also includes:
Receiving unit, the essential information and the checking for determining the NFC label in the key judging unit are close
When key matches, and after second display unit shows the safe space on the user interface of mobile terminal,
Receive OPEN of the user to the safe space;
Second response unit, for opening the safe space in response to the OPEN to enter the safe space
Operation interactive interface;
3rd display unit, for showing the destination application on the operation interactive interface.
As an alternative embodiment, in fourth aspect present invention, the mobile terminal also includes:
Second hidden unit, the safe space is shown on user interface of mobile terminal for second display unit
Afterwards, and after detecting and exiting the safe space, the safe space is hidden on the user interface of mobile terminal.
As an alternative embodiment, in fourth aspect present invention, the mobile terminal also includes:
Second collecting unit, for determining that the essential information of the NFC label is tested with described in the key judging unit
Card key is when matching, and second display unit shown on the user interface of mobile terminal safe space it
Before, gather the fingerprint image of user;
Second fingerprint identification unit, for identifying whether the fingerprint image prestores with the mobile terminal authorized user
Fingerprint image matches;
Second display unit is used to identify that the fingerprint image prestores with described in second fingerprint identification unit
When fingerprint image matches, the safe space is shown on the user interface of mobile terminal.
Fifth aspect present invention discloses a kind of mobile terminal, it may include:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs such as first party of the present invention
The implementation method of safety applications disclosed in face or the implementation method for performing the safety applications as disclosed in second aspect of the present invention.
Sixth aspect present invention discloses a kind of computer-readable recording medium, and it is stored based on electronic data interchange
Calculation machine program, wherein, the computer program causes computer to perform the reality of the safety applications as disclosed in first aspect present invention
Existing method or the implementation method for performing the safety applications as disclosed in second aspect of the present invention.
Compared with prior art, the embodiment of the present invention has the advantages that:
In embodiments of the present invention, mobile terminal is built-in with NFC module, and movement is detected by the NFC module of mobile terminal
The NFC label of exterior of terminal, after NFC label is detected, ejected on user interface of mobile terminal for asking whether moving
Dynamic terminal establishes the prompt message of safe space, after obtaining user response prompt message input and establishing instruction, according to foundation
Instruction, unseals the reserved storage space of mobile terminal, using reserved storage space as safe space, then obtains the NFC label
Authentication secret and preservation of the essential information as the safe space, the destination application that user selects finally is saved in peace
In the total space.As can be seen that implementing the embodiment of the present invention, deactivated by NFC label to establish safe sky in the terminal
Between, and by the essential information of NFC label be used as the safe space authentication secret, for preserve destination application, so as to
Destination application is protected, prevents other people from operating destination application, improves the security of destination application, so as to
Play protection individual privacy and protect the purpose of personal property;
In another aspect, establishing safe space and destination application and then logical is saved in safe space
The NFC label that the NFC module of mobile terminal is gone outside detection is crossed, if after detecting NFC label, obtaining the base of NFC label
This information, if the essential information of the NFC label and the authentication secret of storage match, show on user interface of mobile terminal
Show the safe space, so that the destination application that user can be to preserve in space safe to use;As can be seen that establish safety
After space, the essential information of the NFC label for establishing the safe space is used as to the authentication secret of the safe space, it
Afterwards, only with the NFC label safe space could be allowed to be shown on user interface of mobile terminal, it is empty thereby using safety
Between in destination application, prevent other people from operating destination application so as to realize, improve the security of destination application,
Play protection individual privacy and protect the purpose of personal property.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it will use below required in embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ability
For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached
Figure.
Fig. 1 is the schematic flow sheet of the implementation method of safety applications disclosed in the embodiment of the present invention;
Fig. 2 is another schematic flow sheet of the implementation method of safety applications disclosed in the embodiment of the present invention;
Fig. 3 is another schematic flow sheet of the implementation method of safety applications disclosed in the embodiment of the present invention;
Fig. 4 is another schematic flow sheet of the implementation method of safety applications disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of mobile terminal disclosed in the embodiment of the present invention;
Fig. 6 is another structural representation of mobile terminal disclosed in the embodiment of the present invention;
Fig. 7 is another structural representation of mobile terminal disclosed in the embodiment of the present invention;
Fig. 8 is another structural representation of mobile terminal disclosed in the embodiment of the present invention;
Fig. 9 is another structural representation of mobile terminal disclosed in the embodiment of the present invention;
Figure 10 is another structural representation of mobile terminal disclosed in the embodiment of the present invention;
Figure 11 is another structural representation of mobile terminal disclosed in the embodiment of the present invention;
Figure 12 is another structural representation of mobile terminal disclosed in the embodiment of the present invention;
Figure 13 is another structural representation of mobile terminal disclosed in the embodiment of the present invention;
Figure 14 is another structural representation of mobile terminal disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this
Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example is applied, belongs to the scope of protection of the invention.
It should be noted that term " first ", " second ", " the 3rd " in description and claims of this specification etc.
It is for distinguishing different objects, rather than for describing particular order.The term " comprising " and " having " of the embodiment of the present invention
And their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or the mistake of unit
Journey, method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but may include unclear
It is that ground is listed or for the intrinsic other steps of these processes, method, product or equipment or unit.
The embodiment of the invention discloses a kind of implementation method of safety applications, for preventing other people from using application program, carries
The safety of high application program, so as to play protection individual privacy and protect the purpose of personal property.The embodiment of the present invention is also corresponding
Ground discloses a kind of mobile terminal.
Mobile terminal disclosed in the embodiment of the present invention can be smart mobile phone, intelligent watch etc..Below will be from mobile terminal
Angle is set out, and in conjunction with specific embodiments, technical solution of the present invention is described in detail.
Embodiment one
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of the implementation method of safety applications disclosed in the embodiment of the present invention;Such as Fig. 1
Shown, a kind of implementation method of safety applications may include:
101st, mobile terminal passes through the NFC label outside built-in NFC module detection.
Built in NFC module in the terminal, NFC is by non-contact type wireless radio frequency identification (Radio Frequency
Identification, abbreviation RFID) and the Technology Integration that interconnects, combining induction card reader, icah wavw and
Point-to-point function, can be identified with compatible equipment and data exchange in short distance.NFC label provided in an embodiment of the present invention
Can possess smart mobile phone, intelligent watch, card or NFC label of NFC function etc..
After mobile terminal opens NFC function, the NFC label in the mobile terminal certain distance is detected by NFC module.
102nd, mobile terminal ejects for asking whether establishing peace on a user interface after the NFC label is detected
The prompt message of the total space.
, can be with for asking whether to establish safe space it is appreciated that mobile terminal pop-up window on a user interface
Display whether to establish " confirmation " button of safe space and " cancellation " button in window, for being supplied to user to select.
103rd, acquisition for mobile terminal user instructs in the foundation in response to the prompt message that user interface inputs.
Mobile terminal monitors selection operation of the user to button, when monitoring user's selection " confirmation " button, then gets
User is used for the foundation instruction for responding the prompt message;When monitoring user's selection " cancellation " button, illustrate that user is not given to
Establish instruction, then terminate the flow.
104th, mobile terminal instructs according to the foundation, unseals reserved storage space, using the reserved storage space as safety
Space, and obtain authentication secret and preservation of the essential information of NFC label as the safe space.
Safe space can be used as user with reserved storage space in mobile terminal.It is understood that it can move
Dynamic terminal reserves multiple memory space regions, and user, which can classify, establishes different safe spaces, such as, according to what is preserved
Multiple safe spaces are established in the classification of destination application.
And then mobile terminal unseals one of reserved storage space, the reserved storage space is used according to instruction is established
Make safe space.If after detecting another NFC label, after user agrees to establish safe space, unseal another
Reserved storage space, for use as another safe space.
As an alternative embodiment, incidence relation is established in the safe space of foundation and NFC label by mobile terminal,
Subsequently can rapidly and accurately to find corresponding safe space by NFC label.
105th, mobile terminal detection user selects obtained destination application in the application, and should by the target
The safe space is saved in program.
For example the application programs such as mobile payment application program, photograph album can be saved in safe space, except with NFC
The user of label can check outside the destination application of safe space that other people can not then check peace by NFC label
Destination application in the total space, play protection individual subscriber privacy and protect the purpose of user's property safety.
In embodiments of the present invention, mobile terminal is built-in with NFC module, and movement is detected by the NFC module of mobile terminal
The NFC label of exterior of terminal, after NFC label is detected, ejected on user interface of mobile terminal for asking whether moving
Dynamic terminal establishes the prompt message of safe space, after obtaining user response prompt message input and establishing instruction, according to foundation
Instruction, unseals the reserved storage space of mobile terminal, using reserved storage space as safe space, then obtains the NFC label
Authentication secret and preservation of the essential information as the safe space, the destination application that user selects finally is saved in peace
In the total space.As can be seen that implementing the embodiment of the present invention, deactivated by NFC label to establish safe sky in the terminal
Between, and by the essential information of NFC label be used as the safe space authentication secret, for preserve destination application, so as to
Destination application is protected, prevents other people from operating destination application, improves the security of destination application, so as to
Play protection individual privacy and protect the purpose of personal property.
Embodiment two
Referring to Fig. 2, Fig. 2 is another schematic flow sheet of the implementation method of safety applications disclosed in the embodiment of the present invention;
As shown in Fig. 2 a kind of implementation method of safety applications may include:
201st, mobile terminal passes through the NFC label outside built-in NFC module detection.
202nd, mobile terminal ejects for asking whether establishing peace on a user interface after the NFC label is detected
The prompt message of the total space.
As an alternative embodiment, mobile terminal is after NFC label is detected, output information on a user interface
To require that user's input logs in the account and password of mobile terminal, the account that acquisition for mobile terminal user inputs on a user interface
And password, determine whether the account, password whether account with registration, code matches, if it does, mobile terminal with
Ejected on the interface of family for asking whether establishing the prompt message of safe space.Otherwise, mobile terminal terminates the flow.Pass through
The embodiment, only validated user is allowed to establish safe space on mobile terminals.
203rd, acquisition for mobile terminal user instructs in the foundation in response to the prompt message that user interface inputs.
204th, mobile terminal instructs according to the foundation, unseals reserved storage space, using the reserved storage space as safety
Space, and obtain authentication secret and preservation of the essential information of NFC label as the safe space.
As an alternative embodiment, mobile terminal obtain user user interface input in response to the prompting
While the foundation instruction of information, the fingerprint image of user is gathered;Further identify whether the fingerprint image is awarded with mobile terminal
The pre-stored fingerprint image of power user matches;If it does, perform step 204;If it does not match, explanation subscriber authentication
Failure, terminates the flow.By the embodiment, after subscriber authentication success, i.e., user uses for the mandate of mobile terminal
Family, safe space could be established based on NFC label on mobile terminals, for preserving the application journey for needing to carry out safeguard protection
Sequence.
Further, if fingerprint image and the pre-stored fingerprint image of mobile terminal authorized user match, the NFC is read
The essential information of label, the type of the NFC label is identified according to the essential information of the NFC label, if the type of the NFC label
Be user set when being allowed for establishing the type of safe space, perform step 204;Otherwise, the flow is terminated.For example, with
Family can set the type of NFC label as the intelligent watch of carrying NFC function.
Further, if the type of the NFC label be user set when being allowed for establishing the type of safe space,
Further identify NFC label where equipment whether with the mobile terminal binding, if bound device, then perform step
204;Otherwise, the flow is terminated.For example, intelligent watch of the type of NFC label for carrying NFC function, then only in intelligence
Wrist-watch according to the NFC label on intelligent watch with that after mobile terminal binding, could establish safe space, to prevent other people from grasping
Make.
205th, mobile terminal shows the safe space on a user interface.
206th, mobile terminal receives OPEN of the user to the safe space, and opens and pacify in response to the OPEN
The total space is with the operation interactive interface of the entrance safe space.
207th, mobile terminal detection user adds the selection operation of function, base to the application program on the operation interactive interface
The application list is presented in the operation interactive interface, the application list includes all application programs of mobile terminal.
208th, mobile terminal monitoring user is to the selection operation of destination application on the application list, and by mesh
Mark application program is saved in safe space.
As an alternative embodiment, after destination application is saved in safe space by mobile terminal, examining
Measure after exiting the safe space, the safe space is hidden on user interface of mobile terminal, that is, not on a user interface
Show the safe space.By the embodiment, after exiting safe space, safe space is invisible on a user interface, then its
His user can not use these application programs.For example, parent is used for mobile payment application journey by establishing safe space, by some
Sequence is saved in safe space, to prevent student from when using parent's mobile phone, maloperation mobile payment application program, causing property
Loss etc..Further for example, by establishing safe space, some important application programs are saved in by mobile terminal authorized user
In safe space, then can not see in the people for stealing the mobile terminal or the people for picking up the mobile terminal from user interface
These application programs, also just have no idea to steal individual privacy from these application programs.
In this embodiment, after mobile terminal establishes safe space according to NFC label, opened according to the OPEN of user
Safe space, then shows operation interactive interface, and user can realize on operation interactive interface and preserve destination application
Into safe space.
Embodiment three
Referring to Fig. 3, Fig. 3 is another schematic flow sheet of the implementation method of safety applications disclosed in the embodiment of the present invention;
As shown in figure 3, a kind of implementation method of safety applications may include:
301st, mobile terminal passes through the NFC label outside NFC module detection.
302nd, mobile terminal reads the essential information of NFC label after NFC label is detected.
303rd, mobile terminal judges whether the essential information of NFC label matches with the authentication secret stored;Wherein, this is tested
It is for the essential information for the target NFC label for establishing safe space to demonstrate,prove key.Wherein, in matching, step 304 is turned to;
During mismatch, terminate the flow.
304th, mobile terminal shows the safe space on a user interface, and the safe space is stored with destination application,
The destination application selects to obtain from the application program of mobile terminal.
As an alternative embodiment, NFC label essential information with store authentication secret (it is any checking it is close
Key) match after, according to the NFC label and the incidence relation of safe space, corresponding safe space is found, then in user
Shown on interface.
In embodiments of the present invention, after establishing safe space and saving destination application in safe space,
The NFC label gone again by the NFC module of mobile terminal outside detection, if after detecting NFC label, obtaining NFC label
Essential information, if the essential information of the NFC label with storage authentication secret match, in user interface of mobile terminal
Upper display safe space, so that the destination application that user can be to preserve in space safe to use;As can be seen that establish
After safe space, the essential information of the NFC label for establishing the safe space is used as to the authentication secret of the safe space,
Afterwards, only with the NFC label safe space could be allowed to be shown on user interface of mobile terminal, thereby using safety
Destination application in space, prevent other people from operating destination application so as to realize, improve the safety of destination application
Property, play protection individual privacy and protect the purpose of personal property.
Example IV
Referring to Fig. 4, Fig. 4 is another schematic flow sheet of the implementation method of safety applications disclosed in the embodiment of the present invention;
As shown in figure 4, a kind of implementation method of safety applications may include:
401st, mobile terminal passes through the NFC label outside NFC module detection.
402nd, mobile terminal reads the essential information of NFC label after NFC label is detected.
403rd, mobile terminal judges whether the essential information of NFC label matches with the authentication secret stored;Wherein, this is tested
It is for the essential information for the target NFC label for establishing safe space to demonstrate,prove key.Wherein, in matching, step 404 is turned to;
During mismatch, terminate the flow.
404th, mobile terminal shows the safe space on a user interface.
As an alternative embodiment, essential information and the authentication secret phase of storage of the mobile terminal in NFC label
During matching, by the fingerprint image for gathering user;Identify the fingerprint image whether the pre-stored fingerprint with mobile terminal authorized user
Image matches;If it does, then perform step 404;Otherwise, illustrate that subscriber authentication fails, terminate the flow.By this
Embodiment, after subscriber authentication success, i.e., user is the authorized user of mobile terminal, and mobile terminal can also be empty by safety
Between show for user operate.
As an alternative embodiment, mobile terminal shows that the safe space specifically includes on a user interface:Move
Dynamic terminal shows the shortcut icon of the safe space on a user interface, and the shortcut icon has with safe space links corresponding close
System.
405th, mobile terminal receives OPEN of the user to the safe space.
Mobile terminal receive the shortcut icon of the safe space on user to user interface OPEN (including click on,
Double-click, touch or slide etc.), corresponding relation is linked according to shortcut icon and safe space, opens the safe space.
406th, mobile terminal opens safe space to enter the mutual arena of operation of the safe space in response to the OPEN
Face.
407th, mobile terminal display target application program on the operation interactive interface.
As an alternative embodiment, mobile terminal on the operation interactive interface display target application program it
Afterwards, after detecting and exiting the safe space, the safe space is hidden on a user interface.By the embodiment, peace is exited
After the total space, safe space is invisible on a user interface, then other users can not use these application programs.
In this embodiment, mobile terminal obtains safe space according to NFC label, then shows on a user interface,
Further destination application is shown, so that user operates.
Embodiment five
Referring to Fig. 5, Fig. 5 is the structural representation of mobile terminal disclosed in the embodiment of the present invention;In the movement shown in Fig. 5
In terminal, the mobile terminal is built-in with NFC module, specifically includes:
First label detecting unit 510, for detecting the NFC label outside mobile terminal by NFC module;
Tip element 520 is established, for after the first label detecting unit 510 detects NFC label, being used in mobile terminal
The prompt message for asking whether to establish safe space in mobile terminal is ejected on the interface of family;
First instruction response unit 530, for obtain user user interface of mobile terminal input in response to the prompting
The foundation instruction of information;
Unit 540 is established in space, for being instructed according to above-mentioned foundation, unseals the reserved storage space of mobile terminal, will be pre-
Memory space is stayed as the safe space in mobile terminal, and obtains the essential information of NFC label as the safe space
Authentication secret simultaneously preserves;
Using selecting unit 550, obtained intended application is selected for detecting user in the application program of mobile terminal
Program, and the destination application is saved in safe space.
In embodiments of the present invention, mobile terminal is built-in with NFC module.First label detecting unit 510, passes through NFC moulds
NFC label outside block detection mobile terminal, after NFC label is detected, establishes Tip element 520 in mobile terminal user circle
The prompt message for asking whether to establish safe space in mobile terminal is ejected on face, the first instruction response unit 530 is obtaining
After taking user response prompt message input to establish instruction, space is established unit 540 and instructed according to the foundation, unseals mobile terminal
Reserved storage space, using reserved storage space as safe space, then obtain the essential information of the NFC label as the peace
The authentication secret of the total space and preservation, the destination application that user selects finally is saved in safety using selecting unit 550
In space.As can be seen that implementing the embodiment of the present invention, deactivated by NFC label to establish safe space in the terminal,
And the essential information of NFC label is used as to the authentication secret of the safe space, for preserving destination application, so as to by mesh
Mark application program protects, and prevents other people from operating destination application, improves the security of destination application, so as to play
Protect individual privacy and protect the purpose of personal property;
As an alternative embodiment, establishing Tip element 520 is used for pop-up window on a user interface, in window
On display whether to establish " confirmation " button and " cancellation " button of safe space, for being supplied to user to select.And then first
Instruction response unit 530 is used to monitor selection operation of the user to button, when monitoring user's selection " confirmation " button, then obtains
The foundation instruction for being used to respond the prompt message to user.
It is additionally operable to as an alternative embodiment, unit 540 is established in space by the safe space of foundation and NFC label
Incidence relation is established, subsequently can rapidly and accurately to find corresponding safe space by NFC label.
It is understood that the mobile terminal shown in Fig. 5 can be used for performing the safety applications shown in step 101- steps 105
Implementation method.
Incorporated by reference to the mobile terminal shown in Fig. 5, in the mobile terminal shown in Fig. 6, the mobile terminal also includes:
First display unit 610, instructed for establishing unit 540 in space according to described establish, unseal mobile terminal
Reserved storage space, using reserved storage space as safe space, and the essential information of NFC label is obtained as safe space
Authentication secret and preservation after, the safe space is shown on user interface of mobile terminal;
Further, above-mentioned application selecting unit 550 specifically includes:
First opening unit 620, refer to for receiving OPEN of the user to the safe space, and in response to the opening
Order opens safe space to enter the operation interactive interface of safe space;
List display unit 620, for detecting selection of the user to the application program addition function on operation interactive interface
Operation, the application list is presented based on operation interactive interface, the application list applies journey including all of mobile terminal
Sequence;
Storage unit 630, for monitoring selection operation of the user to destination application on the application list, and will
Destination application is saved in safe space.
It is understood that the mobile terminal shown in Fig. 6 can be used for performing the safety applications shown in step 201- steps 208
Implementation method.
Incorporated by reference to Fig. 5, the mobile terminal shown in Fig. 7 also includes:
First hidden unit 710, for being selected in detecting application program of the user in mobile terminal in application selecting unit 550
Obtained destination application is selected, and after destination application is saved in into safe space, the safety is exited detecting
Behind space, the safe space is hidden on user interface of mobile terminal.
Incorporated by reference to Fig. 5, the mobile terminal shown in Fig. 8 also includes:
First collecting unit 810, it is defeated in user interface of mobile terminal for obtaining user in the first instruction response unit 530
While the foundation in response to the prompt message entered instructs, and space is established unit 540 and instructed according to the foundation, and deblocking moves
The reserved storage space of dynamic terminal, using reserved storage space as safe space, and obtain the essential information conduct of NFC label
Before the authentication secret of safe space and preservation, the fingerprint image of user is gathered;
First fingerprint identification unit 820, for identify the fingerprint image whether the finger that prestores with mobile terminal authorized user
Print image matches;
Above-mentioned space establishes unit 540 and is used to identify the fingerprint image and pre-stored fingerprint in the first fingerprint identification unit 820
When image matches, instructed according to the foundation, unseal the reserved storage space of mobile terminal, using reserved storage space as safety
Space, and obtain authentication secret and preservation of the essential information of NFC label as safe space.
Embodiment six
Referring to Fig. 9, Fig. 9 is another structural representation of mobile terminal disclosed in the embodiment of the present invention;As shown in figure 9,
A kind of mobile terminal may include:
Second label detecting unit 910, for detecting the NFC label outside mobile terminal by NFC module;
Reading unit 920, for after the second label detecting unit 910 detects NFC label, reading the NFC label
Essential information;
Key judging unit 930, for judge the essential information of the NFC label and the authentication secret that stores whether phase
Match somebody with somebody;The authentication secret is for the essential information for the target NFC label for establishing safe space;
Second display unit 940, for determining the essential information and authentication secret of NFC label in key judging unit 930
When matching, the safe space is shown on user interface of mobile terminal, the safe space is stored with destination application, the mesh
Mark application program selects to obtain from the application program of mobile terminal.
In embodiments of the present invention, establish safe space in mobile terminal and intended application journey is saved in safe space
After sequence, the second label detecting unit 910 by the NFC module of mobile terminal go detection outside NFC label, if detected
After NFC label, reading unit 920 obtains the essential information of NFC label, if key judging unit 930 determines the NFC label
Essential information and the authentication secret of storage when matching, the second display unit 940 show this on user interface of mobile terminal
Safe space, so that the destination application that user can be to preserve in space safe to use;As can be seen that establish safe space
Afterwards, the essential information of the NFC label for establishing the safe space is used as to the authentication secret of the safe space, afterwards, only
The useful NFC label could allow the safe space to be shown on user interface of mobile terminal, thereby using in safe space
Destination application, prevent other people from operating destination application so as to realize, improve the security of destination application, play
Protect individual privacy and protect the purpose of personal property.
It is understood that the mobile terminal shown in Fig. 9 can be used for performing the safety applications shown in step 301- steps 304
Implementation method.
Incorporated by reference to Fig. 9, the mobile terminal shown in Figure 10 also includes:
Receiving unit 1010, for determining the essential information and authentication secret phase of NFC label in key judging unit 930
Timing, and after the second display unit 940 shows safe space on user interface of mobile terminal, it is empty to safety to receive user
Between OPEN;
Second response unit 1020, for opening safe space in response to OPEN to enter the operation of the safe space
Interactive interface;
3rd display unit 1030, for the display target application program on operation interactive interface.
It is understood that the safety that the mobile terminal shown in Figure 10 can be used for performing shown in step 401- steps 407 should
Implementation method.
Incorporated by reference to Fig. 9, the mobile terminal shown in Figure 11 also includes:
Second hidden unit 1110, safe space is shown on user interface of mobile terminal for the second display unit 940
Afterwards, and after detecting and exiting the safe space, safe space is hidden on user interface of mobile terminal.
Incorporated by reference to Fig. 9, the mobile terminal shown in Figure 12 also includes:
Second collecting unit 1210, for determining the essential information and authentication secret of NFC label in key judging unit 930
When matching, and before the second display unit 940 shows safe space on user interface of mobile terminal, the finger of user is gathered
Print image;
Second fingerprint identification unit 1220, for identify the fingerprint image whether the finger that prestores with mobile terminal authorized user
Print image matches;
Second display unit 940 is used to identify fingerprint image and pre-stored fingerprint image phase in the second fingerprint identification unit 1220
During matching, safe space is shown on user interface of mobile terminal.
Embodiment seven
Figure 13 is referred to, Figure 13 is another structural representation of mobile terminal disclosed in the embodiment of the present invention;In Figure 13 institutes
The mobile terminal shown may include:At least one processor 1310, such as CPU, memory 1320, at least one communication bus
1330, input unit 1340, output device 1350.Wherein, communication bus 1330 is used to realize the communication link between these components
Connect.Memory 1320 can be high-speed RAM memory or non-labile memory (non-volatile
Memory), a for example, at least magnetic disk storage.Memory 1320 optionally can also be at least one and be located remotely from foregoing place
Manage the storage device of device 1310.Wherein, processor 1310 can be with reference to the mobile terminal described by Fig. 5 to Figure 12, memory
Batch processing code is stored in 1320, and processor 1310 calls the program code that stores in memory 1320, for perform with
Lower operation:
NFC label outside the mobile terminal is detected by the NFC module;After the NFC label is detected,
The prompt message for asking whether to establish safe space in the mobile terminal is ejected on the user interface of mobile terminal;Obtain
Family is taken to instruct in the foundation in response to the prompt message that the user interface of mobile terminal inputs;Referred to according to the foundation
Order, the reserved storage space of the mobile terminal is unsealed, using the reserved storage space as the safe space, and obtained
Authentication secret and preservation of the essential information of the NFC label as the safe space;User is detected in the mobile terminal
Application program in select obtained destination application, and the destination application is saved in the safe space;
Or
NFC label outside the mobile terminal is detected by the NFC module;After the NFC label is detected, read
Take the essential information of the NFC label;Judge whether the essential information of the NFC label matches with the authentication secret stored;
The authentication secret is for the essential information for the target NFC label for establishing safe space;In the essential information of the NFC label
When matching with the authentication secret, the safe space, the safe space are shown on the user interface of mobile terminal
Destination application is stored with, the destination application selects to obtain from the application program of the mobile terminal.
Alternatively, above-mentioned processor 1310 can also be used to perform following steps:
Instructed according to described establish, the reserved storage space of the mobile terminal is unsealed, by the reserved storage space
As the safe space, and obtain authentication secret and guarantor of the essential information of the NFC label as the safe space
After depositing, the safe space is shown on the user interface of mobile terminal;
And then above-mentioned processor 1310 can be also used for performing following steps:User is received to beat the safe space
Instruction is opened, and the safe space is opened to enter the mutual arena of operation of the safe space in response to the OPEN
Face;
The selection operation that user adds function to the application program on the operation interactive interface is detected, based on the operation
The application list is presented in interactive interface, and described the application list includes all application programs of the mobile terminal;
User is monitored to the selection operation of destination application on described the application list, and by the intended application
Program is saved in the safe space.
Alternatively, above-mentioned processor 1310 can also be used to perform following steps:
In the destination application that detection user selects to obtain in the application program of the mobile terminal, and by described in
Destination application is saved in after the safe space, after detecting and exiting the safe space, in the mobile terminal
The safe space is hidden in user interface.
Alternatively, above-mentioned processor 1310 can also be used to perform following steps:
Obtaining what user instructed in the foundation in response to the prompt message that the user interface of mobile terminal inputs
Meanwhile gather the fingerprint image of user;
Identify whether the fingerprint image matches with the pre-stored fingerprint image of the mobile terminal authorized user;
If it does, being instructed according to described establish, the reserved storage space of the mobile terminal is unsealed, by the pre- retention
It is close as the checking of the safe space as the safe space, and the essential information of the acquisition NFC label to store up space
Key simultaneously preserves.
Alternatively, above-mentioned processor 1310 can also be used to perform following steps:
It is described in the mobile terminal user when the essential information of the NFC label matches with the authentication secret
After the safe space is shown on interface, OPEN of the user to the safe space is received;Refer in response to the opening
Order opens the safe space to enter the operation interactive interface of the safe space;Institute is shown on the operation interactive interface
State destination application.
Alternatively, above-mentioned processor 1310 can also be used to perform following steps:
After the safe space is shown on the user interface of mobile terminal, the safe space is exited detecting
Afterwards, the safe space is hidden on the user interface of mobile terminal.
Alternatively, above-mentioned processor 1310 can also be used to perform following steps:
When the essential information of the NFC label matches with the authentication secret, the fingerprint image of user is gathered;Identification
Whether the fingerprint image matches with the pre-stored fingerprint image of the mobile terminal authorized user;If it does, in the shifting
The safe space is shown on dynamic end-user interface.
Embodiment eight
Figure 14 is referred to, Figure 14 is the related part-structure block diagram of mobile terminal disclosed in the embodiment of the present invention.Refer to
Figure 14, the mobile terminal include:It is radio frequency (Radio Frequency, abbreviation RF) circuit 10, memory 20, input block 30, aobvious
Show unit 40, sensor 50, voicefrequency circuit 60, Wireless Fidelity (Wireless Fidelity, abbreviation WiFi) module 70, processing
The part such as device 80 and power supply 90.It will be understood by those skilled in the art that the mobile terminal structure shown in Figure 14 is not formed pair
The restriction of mobile terminal, it can include than illustrating more or less parts, either combine some parts or different parts
Arrangement.
Each component parts of mobile terminal is specifically introduced with reference to Figure 14:
RF circuits 10 can be used for the reception and transmission of information.Generally, RF circuits 10 include but is not limited to antenna, at least one
Amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF
Circuit 10 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication standard
Or agreement, including but not limited to GSM, GPRS, CDMA, WCDMA, LTE, Email, Short Message Service (Short
Messaging Service, abbreviation SMS) etc..
Memory 20 can be used for storage software program and module, and processor 80 is stored in the soft of memory 20 by operation
Part program and module, so as to perform the various function application of mobile terminal and data processing.Memory 20 can mainly include
Storing program area and storage data field, wherein, storing program area can storage program area, the application journey needed at least one function
Sequence (such as application interface display function, call function etc.) etc.;Storage data field can store the use according to mobile terminal
Data (such as identification of contacts, default mode of operation etc.) created etc..In addition, memory 20 can include depositing at random at a high speed
Access to memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other are easy
The property lost solid-state memory.
Input block 30 can be used for the numeral or character information for receiving input, and produces and set with the user of mobile terminal
And the key signals input that function control is relevant.Specifically, input block 30 may include fingerprint recognition module 31 and other are defeated
Enter equipment 32.Fingerprint recognition module 31, user can be gathered in finger print data thereon.Optionally, fingerprint recognition module 31 can wrap
Include optical fingerprint module, capacitance type fingerprint module and RF-type fingerprint module.Referred to fingerprint recognition module 31 for condenser type
Exemplified by line identification module, induction electrode (n1 abnormal induction electrodes and n2 normal induction electrode) and and induced electricity are specifically included
The signal processing circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.) of pole connection.Except fingerprint recognition
Module 31, input block 30 can also include other input equipments 32.Specifically, other input equipments 32 can include but unlimited
One kind in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. or
It is a variety of.
Display unit 40 can be used for showing the information inputted by user or be supplied to the information of user and use mobile terminal
Various menus.Display unit 40 may include display screen 41, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Display screen 41.Although in fig. 14, fingerprint recognition module 31 is that the part independent as two is mobile whole to realize with display screen 41
The input at end and input function, but it is in some embodiments it is possible to fingerprint recognition module 31 and display screen 41 is integrated and real
The input of existing mobile terminal and output function.
Mobile terminal may also include at least one sensor 50, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display screen 41, and proximity transducer can close display screen when mobile terminal is moved in one's ear
41 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) and accelerate
The size of degree, size and the direction of gravity are can detect that when static, the application available for identification mobile terminal posture is (such as vertical and horizontal
Shield switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;As for movement
The other sensors such as gyroscope that terminal can also configure, barometer, hygrometer, thermometer, infrared ray sensor, it is no longer superfluous herein
State.
Voicefrequency circuit 60, loudspeaker 61, microphone 62 can provide the COBBAIF between user and mobile terminal.Audio-frequency electric
Electric signal after the voice data received conversion can be transferred to loudspeaker 61 by road 60, and sound letter is converted to by loudspeaker 61
Number output;On the other hand, the voice signal of collection is converted to electric signal by microphone 62, is converted to after being received by voicefrequency circuit 60
Voice data, then after voice data output processor 80 is handled, through RF circuits 10 to be sent to such as another mobile terminal, or
Person exports voice data to memory 20 further to handle.
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user's transceiver electronicses by WiFi module 70
Mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Figure 12 is shown
WiFi module 70, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, can exist as needed completely
Do not change in the essential scope of invention and omit.
Processor 80 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Part, by running or performing the software program and/or module that are stored in memory 20, and call and be stored in memory 20
Interior data, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Optionally,
Processor 80 may include one or more processing units;Preferably, processor 80 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 80.
Mobile terminal also includes the power supply 90 (such as battery) to all parts power supply, it is preferred that power supply can pass through electricity
Management system and processor 80 are logically contiguous, so as to realize management charging, electric discharge and power consumption pipe by power-supply management system
The functions such as reason.
Although being not shown, mobile terminal can also include camera, bluetooth module etc., will not be repeated here.
In earlier figures 1 and embodiment shown in Fig. 4, each step method flow can the structure based on the mobile terminal it is real
It is existing.
Earlier figures 5 into the embodiment shown in Figure 12, each unit function can based on the mobile terminal structure realize.
By implementing above-mentioned mobile terminal, can need to protect for protection user by establishing hiding safe space
The application program of shield, strengthen the security of some application operatings on mobile terminal, play protection individual subscriber privacy and property
The purpose of safety.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage
Medium include read-only storage (Read-Only Memory, ROM), random access memory (Random Access Memory,
RAM), programmable read only memory (Programmable Read-only Memory, PROM), erasable programmable is read-only deposits
Reservoir (Erasable Programmable Read Only Memory, EPROM), disposable programmable read-only storage (One-
Time Programmable Read-Only Memory, OTPROM), the electronics formula of erasing can make carbon copies read-only storage
(Electrically-Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact
Disc Read-Only Memory, CD-ROM) or other disk storages, magnetic disk storage, magnetic tape storage or can
For carrying or any other computer-readable medium of data storage.
Detailed Jie has been carried out to the implementation method of a kind of safety applications disclosed in the embodiment of the present invention and mobile terminal above
Continue, specific case used herein is set forth to the principle and embodiment of the present invention, and the explanation of above example is only
It is the method and its core concept for being used to help understand the present invention;Meanwhile for those of ordinary skill in the art, according to this hair
Bright thought, there will be changes in specific embodiments and applications, in summary, this specification content should not manage
Solve as limitation of the present invention.
Claims (18)
- A kind of 1. implementation method of safety applications, it is characterised in that mobile terminal is built-in with wireless near field communication NFC module, Methods described includes:NFC label outside the mobile terminal is detected by the NFC module;After the NFC label is detected, ejected on the user interface of mobile terminal for asking whether in the movement Terminal establishes the prompt message of safe space;User is obtained to instruct in the foundation in response to the prompt message that the user interface of mobile terminal inputs;Instructed according to described establish, the reserved storage space of the mobile terminal is unsealed, using the reserved storage space as institute Safe space is stated, and obtains authentication secret and preservation of the essential information of the NFC label as the safe space;Detection user selects obtained destination application in the application program of the mobile terminal, and should by the target The safe space is saved in program.
- 2. according to the method for claim 1, it is characterised in that it is described to be instructed according to described establish, unseal the movement eventually The reserved storage space at end, using the reserved storage space as the safe space, and obtain the basic of the NFC label After information is as the authentication secret of the safe space and preservation, methods described also includes:The safe space is shown on the user interface of mobile terminal;The detection user selects obtained destination application in the application program of the mobile terminal, and by the mesh Mark application program is saved in the safe space, including:User is received to the OPEN of the safe space, and in response to the OPEN open the safe space with Into the operation interactive interface of the safe space;The selection operation that user adds function to the application program on the operation interactive interface is detected, it is interactive based on the operation The application list is presented in interface, and described the application list includes all application programs of the mobile terminal;User is monitored to the selection operation of destination application on described the application list, and by the destination application It is saved in the safe space.
- 3. according to the method for claim 2, it is characterised in that application program of the detection user in the mobile terminal It is middle to select obtained destination application, and after the destination application is saved in into the safe space, the side Method also includes:After detecting and exiting the safe space, the safe space is hidden on the user interface of mobile terminal.
- 4. according to the method for claim 1, it is characterised in that in the acquisition user in the user interface of mobile terminal While the foundation in response to the prompt message of input instructs, and it is described according to the foundation instruction, unseal the shifting The reserved storage space of dynamic terminal, using the reserved storage space as the safe space, and obtain the NFC label Before essential information is as the authentication secret of the safe space and preservation, methods described also includes:While acquisition user instructs in the foundation in response to the prompt message that the user interface of mobile terminal inputs, Gather the fingerprint image of user;Identify whether the fingerprint image matches with the pre-stored fingerprint image of the mobile terminal authorized user;Instructed if it does, execution is described according to described establish, unseal the reserved storage space of the mobile terminal, will be described pre- Memory space is stayed as the safe space, and obtains essential information the testing as the safe space of the NFC label The step of demonstrate,proving key and preserving.
- A kind of 5. implementation method of safety applications, it is characterised in that mobile terminal is built-in with wireless near field communication NFC module, Methods described includes:NFC label outside the mobile terminal is detected by the NFC module;After the NFC label is detected, the essential information of the NFC label is read;Judge whether the essential information of the NFC label matches with the authentication secret stored;The authentication secret is for building The essential information of the target NFC label of vertical safe space;When the essential information of the NFC label matches with the authentication secret, show on the user interface of mobile terminal Show the safe space, the safe space is stored with destination application, and the destination application is from the mobile terminal Application program in select to obtain.
- 6. according to the method for claim 5, it is characterised in that close in the essential information of the NFC label and the checking When key matches, it is described the safe space is shown on the user interface of mobile terminal after, methods described also includes:Receive OPEN of the user to the safe space;The safe space is opened in response to the OPEN to enter the operation interactive interface of the safe space;The destination application is shown on the operation interactive interface.
- 7. the method according to claim 5 or 6, it is characterised in that described to be shown on the user interface of mobile terminal After the safe space, methods described also includes:After detecting and exiting the safe space, the safe space is hidden on the user interface of mobile terminal.
- 8. according to the method for claim 5, it is characterised in that close in the essential information of the NFC label and the checking When key matches, and before showing the safe space on the user interface of mobile terminal, methods described also includes:When the essential information of the NFC label matches with the authentication secret, the fingerprint image of user is gathered;Identify whether the fingerprint image matches with the pre-stored fingerprint image of the mobile terminal authorized user;If it does, perform show the safe space on the user interface of mobile terminal the step of.
- 9. a kind of mobile terminal, it is characterised in that the mobile terminal is built-in with wireless near field communication NFC module, the shifting Dynamic terminal includes:First label detecting unit, for detecting the NFC label outside the mobile terminal by the NFC module;Tip element is established, for after first label detecting unit detects the NFC label, in the mobile terminal The prompt message for asking whether to establish safe space in the mobile terminal is ejected in user interface;First instruction response unit, believe for obtaining user what the user interface of mobile terminal inputted in response to the prompting The foundation instruction of breath;Unit is established in space, for being instructed according to described establish, unseals the reserved storage space of the mobile terminal, will be described pre- Memory space is stayed as the safe space, and obtains essential information the testing as the safe space of the NFC label Card key simultaneously preserves;Using selecting unit, obtained intended application journey is selected for detecting user in the application program of the mobile terminal Sequence, and the destination application is saved in the safe space.
- 10. mobile terminal according to claim 9, it is characterised in that the mobile terminal also includes:First display unit, instructed for establishing unit in the space according to described establish, unseal the pre- of the mobile terminal Memory space is stayed, using the reserved storage space as the safe space, and obtains the essential information work of the NFC label After authentication secret and preservation for the safe space, the safe space is shown on the user interface of mobile terminal;The application selecting unit specifically includes:First opening unit, for receiving OPEN of the user to the safe space, and in response to the OPEN The safe space is opened to enter the operation interactive interface of the safe space;List display unit, grasped for detecting selection of the user to the application program addition function on the operation interactive interface Make, the application list is presented based on the operation interactive interface, described the application list includes the institute of the mobile terminal There is application program;Storage unit, for monitoring selection operation of the user to destination application on described the application list, and by institute State destination application and be saved in the safe space.
- 11. mobile terminal according to claim 10, it is characterised in that the mobile terminal also includes:First hidden unit, for being selected described using selecting unit detection user in the application program of the mobile terminal Obtained destination application, and after the destination application is saved in into the safe space, exited detecting Behind the safe space, the safe space is hidden on the user interface of mobile terminal.
- 12. mobile terminal according to claim 9, it is characterised in that the mobile terminal also includes:First collecting unit, inputted for obtaining user in the described first instruction response unit in the user interface of mobile terminal In response to the prompt message foundation instruct while, and the space establish unit according to it is described establish instruct, solution The reserved storage space of the mobile terminal is sealed, using the reserved storage space as the safe space, and described in acquisition Before the essential information of NFC label is as the authentication secret of the safe space and preservation, the fingerprint image of user is gathered;First fingerprint identification unit, for identify the fingerprint image whether the pre-stored fingerprint with the mobile terminal authorized user Image matches;The space establishes unit and is used to identify the fingerprint image and the pre-stored fingerprint in first fingerprint identification unit When image matches, instructed according to described establish, unseal the reserved storage space of the mobile terminal, the reserved storage is empty Between be used as the safe space, and obtain the essential information of the NFC label as the safe space authentication secret simultaneously Preserve.
- 13. a kind of mobile terminal, it is characterised in that the mobile terminal is built-in with wireless near field communication NFC module, the shifting Dynamic terminal includes:Second label detecting unit, for detecting the NFC label outside the mobile terminal by the NFC module;Reading unit, for after second label detecting unit detects the NFC label, reading the NFC label Essential information;Key judging unit, for judging whether the essential information of the NFC label matches with the authentication secret stored;It is described Authentication secret is for the essential information for the target NFC label for establishing safe space;Second display unit, the essential information and the checking for determining the NFC label in the key judging unit are close When key matches, the safe space is shown on the user interface of mobile terminal, the safe space is stored with target should With program, the destination application selects to obtain from the application program of the mobile terminal.
- 14. mobile terminal according to claim 13, it is characterised in that the mobile terminal also includes:Receiving unit, for the essential information that the NFC label is determined in the key judging unit and the authentication secret phase During matching, and after second display unit shows the safe space on the user interface of mobile terminal, receive OPEN of the user to the safe space;Second response unit, for opening the safe space in response to the OPEN to enter the behaviour of the safe space Make interactive interface;3rd display unit, for showing the destination application on the operation interactive interface.
- 15. the mobile terminal according to claim 13 or 14, it is characterised in that the mobile terminal also includes:Second hidden unit, for second display unit shown on user interface of mobile terminal the safe space it Afterwards, and after detecting and exiting the safe space, the safe space is hidden on the user interface of mobile terminal.
- 16. mobile terminal according to claim 13, it is characterised in that the mobile terminal also includes:Second collecting unit, the essential information and the checking for determining the NFC label in the key judging unit are close When key matches, and before second display unit shows the safe space on the user interface of mobile terminal, Gather the fingerprint image of user;Second fingerprint identification unit, for identify the fingerprint image whether the pre-stored fingerprint with the mobile terminal authorized user Image matches;Second display unit is used to identify the fingerprint image and the pre-stored fingerprint in second fingerprint identification unit When image matches, the safe space is shown on the user interface of mobile terminal.
- A kind of 17. mobile terminal, it is characterised in that including:It is stored with the memory of executable program code;The processor coupled with the memory;The processor calls the executable program code stored in the memory, performs as Claims 1 to 4 is any The implementation method of safety applications described in or the realization side for performing the safety applications as described in any one of claim 5~8 Method.
- A kind of 18. computer-readable recording medium, it is characterised in that it stores the computer program for electronic data interchange, Wherein, the computer program causes computer to perform the realization side of the safety applications as described in any one of Claims 1 to 4 Method or the implementation method for performing the safety applications as described in any one of claim 5~8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710547838.6A CN107392006B (en) | 2017-07-06 | 2017-07-06 | Implementation method of security application and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710547838.6A CN107392006B (en) | 2017-07-06 | 2017-07-06 | Implementation method of security application and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107392006A true CN107392006A (en) | 2017-11-24 |
CN107392006B CN107392006B (en) | 2020-09-04 |
Family
ID=60335618
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710547838.6A Active CN107392006B (en) | 2017-07-06 | 2017-07-06 | Implementation method of security application and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107392006B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108881496A (en) * | 2018-08-15 | 2018-11-23 | 广东小天才科技有限公司 | Download management method of application program, telephone watch and mobile phone terminal |
CN111093177A (en) * | 2018-10-23 | 2020-05-01 | 上海博泰悦臻电子设备制造有限公司 | Application account synchronization method, vehicle machine and vehicle |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105188016A (en) * | 2015-08-11 | 2015-12-23 | 努比亚技术有限公司 | Terminal privacy protection system and method |
CN106886416A (en) * | 2017-03-08 | 2017-06-23 | 北京小米移动软件有限公司 | Multi-User Dimension processing method and processing device |
-
2017
- 2017-07-06 CN CN201710547838.6A patent/CN107392006B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105188016A (en) * | 2015-08-11 | 2015-12-23 | 努比亚技术有限公司 | Terminal privacy protection system and method |
CN106886416A (en) * | 2017-03-08 | 2017-06-23 | 北京小米移动软件有限公司 | Multi-User Dimension processing method and processing device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108881496A (en) * | 2018-08-15 | 2018-11-23 | 广东小天才科技有限公司 | Download management method of application program, telephone watch and mobile phone terminal |
CN108881496B (en) * | 2018-08-15 | 2021-06-08 | 广东小天才科技有限公司 | Download management method of application program, telephone watch and mobile phone terminal |
CN111093177A (en) * | 2018-10-23 | 2020-05-01 | 上海博泰悦臻电子设备制造有限公司 | Application account synchronization method, vehicle machine and vehicle |
Also Published As
Publication number | Publication date |
---|---|
CN107392006B (en) | 2020-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106203035B (en) | A kind of data access control method and mobile terminal | |
CN108304105A (en) | A kind of application interface starts method, mobile terminal | |
CN107025395A (en) | A kind of fingerprint identification method and mobile terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN107580114A (en) | Biometric discrimination method, mobile terminal and computer-readable recording medium | |
CN106778175A (en) | A kind of interface locking means, device and terminal device | |
CN107885825A (en) | A kind of five application page sharing method and mobile terminal | |
CN106791168A (en) | Information of mobile terminal guard method, device and mobile terminal | |
CN106327193B (en) | A kind of system unlocking method and equipment | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN106920307A (en) | Gate inhibition's open method, device and mobile terminal | |
CN107885991A (en) | A kind of locking screen interface control method, mobile terminal and computer-readable recording medium | |
CN107369017A (en) | Quick payment implementation method and Related product | |
CN109522695A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN107609407A (en) | Method and device for protecting information security in user terminal | |
CN106803027A (en) | Application function entrance starts method, device and mobile terminal | |
CN107240157A (en) | Near-field communication method of controlling security, mobile terminal and computer-readable recording medium | |
CN108011887A (en) | A kind of account management method and equipment | |
CN108156537A (en) | The remote operation method and mobile terminal of a kind of mobile terminal | |
CN107402710A (en) | Method for protecting privacy, mobile terminal and computer-readable recording medium | |
CN107679410A (en) | Possess the mobile terminal and Related product of certain privacy protection function | |
CN109409044A (en) | A kind of verifying interface display method and terminal | |
CN108629280A (en) | Face identification method and mobile terminal | |
CN105868598A (en) | Method and terminal for fingerprint unlocking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |