CN107451437B - Locking method and device of mobile terminal - Google Patents

Locking method and device of mobile terminal Download PDF

Info

Publication number
CN107451437B
CN107451437B CN201610375894.1A CN201610375894A CN107451437B CN 107451437 B CN107451437 B CN 107451437B CN 201610375894 A CN201610375894 A CN 201610375894A CN 107451437 B CN107451437 B CN 107451437B
Authority
CN
China
Prior art keywords
voice
degree
habit
mobile terminal
theme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610375894.1A
Other languages
Chinese (zh)
Other versions
CN107451437A (en
Inventor
聂晓萌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201610375894.1A priority Critical patent/CN107451437B/en
Publication of CN107451437A publication Critical patent/CN107451437A/en
Application granted granted Critical
Publication of CN107451437B publication Critical patent/CN107451437B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a locking method and a device of a mobile terminal, wherein the method comprises the following steps: when the voice call based on the mobile terminal is finished, determining a theme scene and voice habit characteristics of the call; if the voice habit features corresponding to the theme scene are stored, calculating the matching degree of the stored voice habit features and the determined voice habit features; if the matching degree is smaller than a first threshold value, determining a suspicious degree accumulated value corresponding to the matching degree, and calculating the sum of the original suspicious degree and the suspicious degree accumulated value to obtain an updated suspicious degree; and if the updated suspicious degree is larger than the second threshold value, locking the mobile terminal. By applying the scheme of the invention, the safety of the mobile terminal can be improved.

Description

Locking method and device of mobile terminal
[ technical field ] A method for producing a semiconductor device
The present invention relates to mobile terminal technologies, and in particular, to a method and an apparatus for locking a mobile terminal.
[ background of the invention ]
At present, mobile terminals are more and more popular, functions are more and more powerful, more and more important information is stored in the mobile terminals, and once the mobile terminals are lost and picked up by others or the mobile terminals are stolen, users face very serious safety risks.
In order to improve the security of the mobile terminal, a security authentication method based on a password is generally adopted in the prior art, but the static authentication information has a great hidden danger, namely, the static authentication information is very easy to copy and leak, so the security is very low.
[ summary of the invention ]
The invention provides a locking method and a locking device of a mobile terminal, which can improve the safety of the mobile terminal.
The specific technical scheme is as follows:
a locking method of a mobile terminal includes:
when the voice call based on the mobile terminal is finished, determining a theme scene and voice habit characteristics of the call;
if the voice habit features corresponding to the theme scene are stored, calculating the matching degree of the stored voice habit features and the determined voice habit features;
if the matching degree is smaller than a first threshold value, determining a suspicious degree accumulated value corresponding to the matching degree, and calculating the sum of the original suspicious degree and the suspicious degree accumulated value to obtain an updated suspicious degree;
and if the updated suspicious degree is larger than a second threshold value, locking the mobile terminal.
According to a preferred embodiment of the present invention, before determining the theme scene and the voice habit characteristics of the call when the voice call based on the mobile terminal is ended, the method further includes:
inquiring whether a user starts a safety detection state;
and if the confirmation instruction is received, determining the theme scene and the voice habit characteristics of the call when the voice call based on the mobile terminal is ended.
According to a preferred embodiment of the present invention, before inquiring whether the user turns on the security detection state, the method further includes:
collecting voice call data serving as a sample, and determining different theme scenes and voice habit characteristics under each theme scene in the call process by performing statistical analysis on the collected voice call data;
and storing the different theme scenes and the voice habit characteristics respectively corresponding to the different theme scenes to obtain a voice habit characteristic data set.
According to a preferred embodiment of the invention, the method further comprises:
if the voice habit characteristics corresponding to the theme scene are not stored, maintaining the original suspicion degree unchanged;
and if the matching degree is greater than or equal to the first threshold value, maintaining the original suspicious degree unchanged.
According to a preferred embodiment of the invention, the method further comprises:
and if the updated suspicion degree is smaller than or equal to the second threshold and the matching degrees corresponding to the subsequent continuous M voice calls are larger than or equal to the first threshold, zeroing the updated suspicion degree, wherein M is a positive integer.
According to a preferred embodiment of the invention, the method further comprises:
and if the updated suspicious degree is larger than the second threshold, sending the voice call data of the call to a preset receiving object.
According to a preferred embodiment of the present invention, the receiving object includes: and (4) mail box.
According to a preferred embodiment of the invention, the method further comprises: updating the voice habit feature data set;
the updating comprises the following steps:
adding a new theme scene and corresponding voice habit characteristics;
and updating the voice habit characteristics corresponding to the stored theme scene.
A locking apparatus of a mobile terminal, comprising: the system comprises a security authentication module and a locking module;
the safety authentication module is used for determining the theme scene and the voice habit characteristics of the call when the voice call based on the mobile terminal is finished; if the voice habit features corresponding to the theme scene are stored, calculating the matching degree of the stored voice habit features and the determined voice habit features; if the matching degree is smaller than a first threshold value, determining a suspicious degree accumulated value corresponding to the matching degree, and calculating the sum of the original suspicious degree and the suspicious degree accumulated value to obtain an updated suspicious degree; if the updated suspicious degree is larger than a second threshold value, informing the locking module to execute the self function;
the locking module is used for locking the mobile terminal.
According to a preferred embodiment of the present invention, the security authentication module is further configured to query whether the user starts a security detection state, and if a confirmation instruction is received, determine a theme scene and a voice habit characteristic of the call when the voice call based on the mobile terminal is ended.
According to a preferred embodiment of the present invention, the security authentication module is further configured to collect voice call data as a sample before inquiring whether the user starts the security detection state, determine different theme scenes and voice habit characteristics under each theme scene during the call by performing statistical analysis on the collected voice call data, and store the different theme scenes and the voice habit characteristics corresponding to the different theme scenes to obtain a voice habit characteristic data set.
According to a preferred embodiment of the present invention, the security authentication module is further configured to, if the voice habit features corresponding to the theme scene are not stored, maintain the original doubtful degree unchanged, and if the matching degree is greater than or equal to the first threshold, maintain the original doubtful degree unchanged.
According to a preferred embodiment of the present invention, the security authentication module is further configured to, if the updated suspicion degree is smaller than or equal to the second threshold and the matching degrees corresponding to the subsequent M consecutive voice calls are both larger than or equal to the first threshold, zero the updated suspicion degree, where M is a positive integer.
According to a preferred embodiment of the present invention, the security authentication module is further configured to send the voice call data of the call to a preset receiving object if the updated suspicion degree is greater than the second threshold.
According to a preferred embodiment of the present invention, the receiving object includes: and (4) mail box.
According to a preferred embodiment of the present invention, the security authentication module is further configured to update the voice habit feature data set;
the updating comprises the following steps:
adding a new theme scene and corresponding voice habit characteristics;
and updating the voice habit characteristics corresponding to the stored theme scene.
Therefore, by adopting the scheme of the invention, the safety authentication of the user can be carried out based on the voice habit characteristics of the user in different theme scenes, if the voice habit characteristics of the voice call carried out by the user are not matched with the stored voice habit characteristics in the same theme scene, the suspicious degree can be increased, and when the suspicious degree is greater than the preset threshold value, the mobile terminal is locked, so that the mobile terminal can not be continuously used, and the voice habit is information with obvious personal characteristics and is difficult to copy, thereby improving the safety of the mobile terminal compared with the prior art.
[ description of the drawings ]
Fig. 1 is a flowchart of an embodiment of the method for determining speech habit characteristics of a user in different topic scenes according to the present invention.
Fig. 2 is a flowchart of an embodiment of a locking method of a mobile terminal according to the present invention.
Fig. 3 is a schematic structural diagram of a locking device of a mobile terminal according to an embodiment of the present invention.
[ detailed description ] embodiments
As mentioned above, the mobile terminals in the prior art all use the static authentication information to authenticate the user identity, the static authentication information is very easy to be copied, so the security is very low, and the voice habits exhibited when the user performs voice calls in different theme scenes during the process of using the mobile terminal are information with very obvious personal characteristics and are difficult to be copied, so the voice habit characteristics of the user in different theme scenes can be obtained by performing statistical analysis on the voice calls of the user in different theme scenes, if the mobile terminal is lost and picked up or stolen by other people, the voice habit characteristics of other people can have a larger difference with the original user, so whether the identity of the user of the mobile terminal is reliable can be identified through the voice habit characteristics, and the mobile terminal can be locked when the identity is determined to be unreliable, thereby improving the security of the mobile terminal.
In order to make the technical solution of the present invention clearer and more obvious, the solution of the present invention is further described in detail below by referring to the drawings and examples.
Example one
Fig. 1 is a flowchart of an embodiment of a method for determining speech habit characteristics of a user in different topic scenes according to the present invention, and as shown in fig. 1, the method includes the following specific implementation manners.
In 11, voice call data as a sample is collected, and statistical analysis is performed on the collected voice call data to determine different theme scenes and voice habit characteristics under each theme scene during the call.
When each voice call of the user is finished, the mobile terminal can store the voice call data as a sample, and perform semantic analysis and the like on the collected voice call data as the sample to obtain a theme scene related to each voice call of the user, such as: "about eating", "ask help busy", "watch movie", "small and big greeting", "easy to work", "distinguished" etc..
Moreover, the speech habit characteristics under each topic scene can be obtained through a speech recognition technology and the like, including but not limited to:
A. the user's voice timbre characteristics such as loud, clear, bold, magnetic, soft, etc.;
B. tone and tone of the user on some key words;
C. the user actively dials the first greeting word and tone;
D. the last word used by the user before hanging up the phone, such as baibei, hao, bye;
E. the user appears words with higher frequency in the voice under the theme scene, such as the spoken Buddhist, the commonly used wording and the language;
F. the user uses habits of negative expressions, positive expressions and turning expressions in the subject scene.
Theoretically, the more samples collected, the more accurate the obtained statistical analysis result, and the specific amount of samples to be collected can be determined according to actual needs.
The above techniques such as semantic analysis and speech recognition are all prior art.
In 12, different theme scenes and the corresponding speech habit features are stored to obtain a speech habit feature data set.
After the different theme scenes and the voice habit characteristics under each theme scene are determined, the different theme scenes and the voice habit characteristics corresponding to the different theme scenes can be combined into a voice habit characteristic data set and stored.
The voice habit feature data set can be stored in the mobile terminal, and the voice habit feature data set can also be stored in the server together with the mobile terminal id, the mobile terminal number (such as a mobile phone number) and the like, so that if the user changes the mobile terminal, a new mobile terminal can directly obtain the voice habit feature data set from the server without obtaining the voice habit feature data set through statistical analysis and the like.
After the above processing is completed, the mobile terminal may inquire, through the screen, whether the user starts the security detection state, and if a confirmation instruction is received, perform security detection in the manner described in the second embodiment, and lock the mobile terminal when the locking condition is satisfied.
Example two
In this embodiment, the reliability of the user identity may be determined by "suspicion degree", and when the suspicion degree is sufficiently high, the mobile terminal is locked.
Fig. 2 is a flowchart of an embodiment of a locking method of a mobile terminal according to the present invention, as shown in fig. 2, including the following specific implementation manners.
In 21, when the voice call based on the mobile terminal is ended, the theme scene and the voice habit feature of the call are determined.
After each voice call of a user is finished, the theme scene of the call and the voice habit characteristics of the call can be determined by performing semantic analysis, voice recognition and the like on the voice call data of the call.
At 22, if the speech habit feature corresponding to the topic scene of the current call is stored, the matching degree between the stored speech habit feature and the speech habit feature of the current call is calculated.
Assuming that the topic scene of the call determined in 21 is "about eating", it is first determined whether the voice habit features corresponding to the topic scene of "about eating" are stored, and if so, the matching degree between the voice habit features corresponding to the stored topic scene of "about eating" and the voice habit features of the call determined in 21 is further calculated.
How to calculate the matching degree is not limited and can be determined according to actual needs.
In 23, if the matching degree is smaller than the first threshold, determining a suspicious degree accumulated value corresponding to the matching degree, and calculating the sum of the original suspicious degree and the suspicious degree accumulated value to obtain an updated suspicious degree.
And comparing the matching degree calculated in the step 22 with a preset first threshold, and if the matching degree is smaller than the first threshold, further determining a suspicious degree accumulated value corresponding to the matching degree.
The specific value of the first threshold may be determined according to actual needs, such as 60%.
The matching degrees of different sizes may correspond to different accumulated suspicious degrees values, for example, if the matching degree is greater than or equal to 0% but less than 30%, the corresponding accumulated suspicious degree value is a, and if the matching degree is greater than or equal to 30% but less than 60%, the corresponding accumulated suspicious degree value is b, where a is greater than b, where a is 2 and b is 1.
The initial value of the suspicion degree may be 0, which may subsequently increase with continued accumulation.
After the suspicious degree accumulated value is determined, the sum of the suspicious degree accumulated value and the original suspicious degree can be calculated, so that the updated suspicious degree, namely the suspicious degree after accumulation, can be obtained.
At 24, the mobile terminal is locked if the updated suspicion degree is greater than a second threshold.
And comparing the updated suspicious degree with a preset second threshold, and locking the mobile terminal if the updated suspicious degree is greater than the second threshold.
The specific value of the second threshold can be determined according to actual needs.
In addition to the above description, the following processes can be adopted for the following cases:
1) if the voice habit characteristics corresponding to the topic scene of the call are not stored, the original suspicion degree is maintained.
For example, the topic scene of the call is "emergency call", and the topic scene never appears before, so that the speech habit characteristics corresponding to the topic scene are not saved, and in this case, the original suspicion degree can be maintained unchanged.
2) And if the calculated matching degree is greater than or equal to the first threshold value, maintaining the original suspicious degree unchanged.
Namely, the user identity is considered to be reliable, and the suspiciousness cannot be increased.
3) And if the updated suspicion degree is smaller than or equal to the second threshold and the matching degrees corresponding to the subsequent continuous M voice calls are larger than or equal to the first threshold, the updated suspicion degree is returned to 0, wherein M is a positive integer.
If the user a borrows the mobile terminal of the user a to the user B for use, the corresponding matching degree of the user B after completing the voice call by using the mobile terminal is usually smaller than the first threshold value, so that the suspicious degree is increased, but if the matching degrees corresponding to the subsequent continuous M voice calls are larger than or equal to the first threshold value, it is indicated that the mobile terminal is still used by the user a, and locking is not needed, and in this case, the suspicious degree can be returned to 0, so as to avoid possible false locking.
The specific value of M can be determined according to actual needs, such as 1.
In addition, in practical application, if the updated suspicion degree is greater than the second threshold, the mobile terminal is locked, and besides, the voice call data of the call can be sent to a preset receiving object.
For example, the user may set a security reminding mailbox in the mobile terminal in advance, the mobile terminal may send the voice call data triggering the locking to the mailbox, and if the locking is caused by the mobile terminal being stolen, the voice call data sent to the user mailbox may be used to help track down and determine the identity of the thief.
Therefore, when a user carries out voice call each time, the mobile terminal needs to store voice call data of the call, and then if the voice call data is determined to be the voice call data triggering locking, the voice call data is sent to a preset receiving object and deleted, and if the voice call data is not the voice call data triggering locking, the voice call data is directly deleted.
Furthermore, the stored voice habit feature data set can be updated at any time according to actual needs, and the updating can include: and adding a new theme scene and the corresponding voice habit characteristics, updating the voice habit characteristics corresponding to the stored theme scene, and the like.
In any case, statistical analysis needs to be performed according to the voice call data of a plurality of times to obtain an update result.
If the server also stores the voice habit feature data set, the voice habit feature data set stored in the mobile terminal and the server needs to be updated synchronously.
After the mobile terminal is locked, the locked state will be maintained unless the unlocking is performed as follows:
1) uploading identity authentication information on a designated page;
2) dialing a verification telephone by other equipment to verify the identity;
3) and verifying the identity by adopting other offline channels.
The specific implementation of each mode is the prior art.
The above is the introduction about the method embodiment of the present invention, and the present invention also discloses a locking device of a mobile terminal, as described in the third embodiment.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a locking device of a mobile terminal according to an embodiment of the present invention, as shown in fig. 3, including: a security authentication module 31 and a locking module 32.
The security authentication module 31 is configured to determine a theme scene and voice habit characteristics of the call when the voice call based on the mobile terminal is ended; if the voice habit characteristics corresponding to the topic scene of the call are stored, calculating the matching degree of the stored voice habit characteristics and the determined voice habit characteristics; if the matching degree is smaller than a first threshold value, determining a suspicious degree accumulated value corresponding to the matching degree, and calculating the sum of the original suspicious degree and the suspicious degree accumulated value to obtain an updated suspicious degree; if the updated suspicion degree is greater than the second threshold, the locking module 32 is notified to execute its own function.
And a locking module 32 for locking the mobile terminal.
The security authentication module 31 may collect voice call data as a sample, perform statistical analysis on the collected voice call data by using techniques such as semantic analysis and voice analysis, determine different theme scenes occurring during a call and voice habit features under each theme scene, and store the different theme scenes and the corresponding voice habit features to obtain a voice habit feature data set.
Then, the security authentication module 31 may ask the user whether to start the security detection state through the screen, and if receiving the confirmation instruction, start the security detection state, that is, determine the reliability of the user identity through the "suspiciousness", and lock the mobile terminal when the suspiciousness is high enough.
Specifically, after each voice call of the user is ended, the security authentication module 31 may determine the theme scene of the call and the voice habit characteristics of the call by performing semantic analysis, voice recognition, and the like on the voice call data of the call.
Assuming that the topic scene of the current call is "about eating", the security authentication module 31 may first determine whether the voice habit feature corresponding to the topic scene of "about eating" is stored, and if so, further calculate a matching degree between the voice habit feature corresponding to the stored topic scene of "about eating" and the voice habit feature of the current call.
Then, the security authentication module 31 compares the matching degree with a preset first threshold, and if the matching degree is smaller than the first threshold, the accumulated value of the suspicious degree corresponding to the matching degree can be further determined.
The specific value of the first threshold may be determined according to actual needs, such as 60%. The matching degrees of different sizes may correspond to different accumulated suspicious degrees values, for example, if the matching degree is greater than or equal to 0% but less than 30%, the corresponding accumulated suspicious degree value is a, and if the matching degree is greater than or equal to 30% but less than 60%, the corresponding accumulated suspicious degree value is b, where a is greater than b, where a is 2 and b is 1. The initial value of the suspicion degree may be 0, which may subsequently increase with continued accumulation.
After the suspicious degree accumulated value is determined, the security authentication module 31 calculates the sum of the suspicious degree accumulated value and the original suspicious degree, so as to obtain an updated suspicious degree, that is, the suspicious degree after accumulation.
And, the security authentication module 31 compares the updated suspicion degree with a preset second threshold, and if the updated suspicion degree is greater than the second threshold, notifies the locking module 32 to lock the mobile terminal.
In addition to the above description, the following processes can be adopted for the following cases:
1) if the voice habit characteristics corresponding to the topic scene of the call are not stored, the security authentication module 31 maintains the original suspicion degree unchanged.
2) If the calculated matching degree is greater than or equal to the first threshold, the security authentication module 31 maintains the original suspicious degree.
3) If the updated suspicion degree is smaller than or equal to the second threshold and the matching degrees corresponding to the subsequent M consecutive voice calls are both larger than or equal to the first threshold, the security authentication module 31 will zero the updated suspicion degree, where M is a positive integer.
In addition, if the updated suspicion degree is greater than the second threshold, the security authentication module 31 may further send the voice call data of the call to a preset receiving object.
For example, the user may set a security alert mailbox in the mobile terminal in advance, the security authentication module 31 may send the voice call data triggering the locking to the mailbox, and if the mobile terminal is locked due to theft, the voice call data sent to the user mailbox may be used to help track down and determine the identity of the thief.
Furthermore, the security authentication module 31 may also update the stored voice habit feature data set at any time according to actual needs, where the updating may include: and adding a new theme scene and the corresponding voice habit characteristics, and updating the voice habit characteristics corresponding to the stored theme scene.
In any case, statistical analysis needs to be performed according to the voice call data of a plurality of times to obtain an update result.
After the mobile terminal is locked, the locked state will be maintained unless the unlocking is performed as follows:
1) uploading identity authentication information on a designated page;
2) dialing a verification telephone by other equipment to verify the identity;
3) and verifying the identity by adopting other offline channels.
The specific implementation of each mode is the prior art.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (14)

1. A locking method of a mobile terminal, comprising:
collecting voice call data serving as a sample, and storing different theme scenes and corresponding voice habit characteristics in the voice call data serving as the sample;
when the voice call based on the mobile terminal is finished, determining a theme scene and voice habit characteristics of the call;
if the voice habit features corresponding to the theme scene are stored, calculating the matching degree of the stored voice habit features and the determined voice habit features;
if the matching degree is smaller than a first threshold value, determining a suspicious degree accumulated value corresponding to the matching degree, and calculating the sum of the original suspicious degree and the suspicious degree accumulated value to obtain an updated suspicious degree;
if the updated suspicious degree is larger than a second threshold value, locking the mobile terminal; and if the updated suspicion degree is smaller than or equal to the second threshold and the matching degrees corresponding to the subsequent continuous M voice calls are larger than or equal to the first threshold, zeroing the updated suspicion degree, wherein M is a positive integer.
2. The method of claim 1,
when the voice call based on the mobile terminal is finished, before determining the theme scene and the voice habit characteristics of the call, the method further comprises the following steps:
inquiring whether a user starts a safety detection state;
and if the confirmation instruction is received, determining the theme scene and the voice habit characteristics of the call when the voice call based on the mobile terminal is ended.
3. The method of claim 2,
before the querying whether the user turns on the security detection state, the method further includes:
collecting voice call data serving as a sample, and determining different theme scenes and voice habit characteristics under each theme scene in the call process by performing statistical analysis on the collected voice call data;
and storing the different theme scenes and the voice habit characteristics respectively corresponding to the different theme scenes to obtain a voice habit characteristic data set.
4. The method of claim 1,
the method further comprises the following steps:
if the voice habit characteristics corresponding to the theme scene are not stored, maintaining the original suspicion degree unchanged;
and if the matching degree is greater than or equal to the first threshold value, maintaining the original suspicious degree unchanged.
5. The method of claim 1,
the method further comprises the following steps:
and if the updated suspicious degree is larger than the second threshold, sending the voice call data of the call to a preset receiving object.
6. The method of claim 5,
the receiving object includes: and (4) mail box.
7. The method of claim 3,
the method further comprises the following steps: updating the voice habit feature data set;
the updating comprises the following steps:
adding a new theme scene and corresponding voice habit characteristics;
and updating the voice habit characteristics corresponding to the stored theme scene.
8. A locking apparatus of a mobile terminal, comprising: the system comprises a security authentication module and a locking module;
the safety authentication module is used for collecting voice call data serving as a sample and storing different theme scenes and corresponding voice habit characteristics in the voice call data serving as the sample; when the voice call based on the mobile terminal is finished, determining a theme scene and voice habit characteristics of the call; if the voice habit features corresponding to the theme scene are stored, calculating the matching degree of the stored voice habit features and the determined voice habit features; if the matching degree is smaller than a first threshold value, determining a suspicious degree accumulated value corresponding to the matching degree, and calculating the sum of the original suspicious degree and the suspicious degree accumulated value to obtain an updated suspicious degree; if the updated suspicious degree is larger than a second threshold value, informing the locking module to execute the self function; if the updated suspicion degree is smaller than or equal to the second threshold and the matching degrees corresponding to the subsequent continuous M voice calls are larger than or equal to the first threshold, zeroing the updated suspicion degree, wherein M is a positive integer;
the locking module is used for locking the mobile terminal.
9. The apparatus of claim 8,
the security authentication module is further used for inquiring whether a user starts a security detection state or not, and if a confirmation instruction is received, determining a theme scene and voice habit characteristics of the call when the voice call based on the mobile terminal is finished.
10. The apparatus of claim 9,
the safety authentication module is further used for collecting voice call data serving as a sample before inquiring whether a user starts a safety detection state, determining different theme scenes and voice habit characteristics under each theme scene in the call process by performing statistical analysis on the collected voice call data, and storing the different theme scenes and the voice habit characteristics corresponding to the different theme scenes to obtain a voice habit characteristic data set.
11. The apparatus of claim 8,
the safety certification module is further configured to, if the voice habit features corresponding to the theme scene are not stored, maintain the original doubtful degree unchanged, and if the matching degree is greater than or equal to the first threshold, maintain the original doubtful degree unchanged.
12. The apparatus of claim 8,
and the safety authentication module is further used for sending the voice call data of the call to a preset receiving object if the updated suspicion degree is greater than the second threshold.
13. The apparatus of claim 12,
the receiving object includes: and (4) mail box.
14. The apparatus of claim 10,
the safety authentication module is further used for updating the voice habit feature data set;
the updating comprises the following steps:
adding a new theme scene and corresponding voice habit characteristics;
and updating the voice habit characteristics corresponding to the stored theme scene.
CN201610375894.1A 2016-05-31 2016-05-31 Locking method and device of mobile terminal Active CN107451437B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610375894.1A CN107451437B (en) 2016-05-31 2016-05-31 Locking method and device of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610375894.1A CN107451437B (en) 2016-05-31 2016-05-31 Locking method and device of mobile terminal

Publications (2)

Publication Number Publication Date
CN107451437A CN107451437A (en) 2017-12-08
CN107451437B true CN107451437B (en) 2021-04-16

Family

ID=60485092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610375894.1A Active CN107451437B (en) 2016-05-31 2016-05-31 Locking method and device of mobile terminal

Country Status (1)

Country Link
CN (1) CN107451437B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141721A (en) * 2006-09-05 2008-03-12 北京三星通信技术研究有限公司 Safety mobile telephone based communication custom
CN101707642A (en) * 2009-09-30 2010-05-12 宇龙计算机通信科技(深圳)有限公司 Intelligent antitheft method, terminal and system
CN103477604A (en) * 2011-03-30 2013-12-25 高通股份有限公司 Continuous voice authentication for a mobile device
CN103530540A (en) * 2013-09-27 2014-01-22 西安交通大学 User identity attribute detection method based on man-machine interaction behavior characteristics
CN103957322A (en) * 2014-05-05 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof
CN104036171A (en) * 2014-06-20 2014-09-10 北京金山安全软件有限公司 Method for protecting mobile equipment and mobile equipment
CN104157286A (en) * 2014-07-31 2014-11-19 深圳市金立通信设备有限公司 Idiomatic phrase acquisition method and device
CN104834847A (en) * 2014-02-11 2015-08-12 腾讯科技(深圳)有限公司 Identity verification method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141722B (en) * 2006-09-05 2012-07-11 北京三星通信技术研究有限公司 Safety mobile telephone based on user vocal feature and implementing method thereof
CN102104679A (en) * 2010-12-09 2011-06-22 中兴通讯股份有限公司 Method and device for preventing mobile terminal from being used by invalid user
CN102930676A (en) * 2012-10-31 2013-02-13 牛运玲 Voice identification type anti-theft device
US20140201120A1 (en) * 2013-01-17 2014-07-17 Apple Inc. Generating notifications based on user behavior
CN105072249A (en) * 2015-07-07 2015-11-18 百度在线网络技术(北京)有限公司 Method and device of preventing mobile device from being stolen, and corresponding mobile device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141721A (en) * 2006-09-05 2008-03-12 北京三星通信技术研究有限公司 Safety mobile telephone based communication custom
CN101707642A (en) * 2009-09-30 2010-05-12 宇龙计算机通信科技(深圳)有限公司 Intelligent antitheft method, terminal and system
CN103477604A (en) * 2011-03-30 2013-12-25 高通股份有限公司 Continuous voice authentication for a mobile device
CN103530540A (en) * 2013-09-27 2014-01-22 西安交通大学 User identity attribute detection method based on man-machine interaction behavior characteristics
CN104834847A (en) * 2014-02-11 2015-08-12 腾讯科技(深圳)有限公司 Identity verification method and device
CN103957322A (en) * 2014-05-05 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof
CN104036171A (en) * 2014-06-20 2014-09-10 北京金山安全软件有限公司 Method for protecting mobile equipment and mobile equipment
CN104157286A (en) * 2014-07-31 2014-11-19 深圳市金立通信设备有限公司 Idiomatic phrase acquisition method and device

Also Published As

Publication number Publication date
CN107451437A (en) 2017-12-08

Similar Documents

Publication Publication Date Title
US10182148B2 (en) Method and system for filtering undesirable incoming telephone calls
US9374463B2 (en) System and method for tracking persons of interest via voiceprint
US9906642B2 (en) Identity identification method and apparatus and communication terminal
US9837079B2 (en) Methods and apparatus for identifying fraudulent callers
CN103347131B (en) A kind of intelligent mobile phone anti-theft method and system
CN108540755B (en) Identity recognition method and device
AU2017305245A1 (en) Call classification through analysis of DTMF events
CN108960117A (en) For the method and system of vehicle recognition of face account setup facial image
US8675828B2 (en) Authentication of a user to a telephonic communication device
CN109117622A (en) A kind of identity identifying method based on audio-frequency fingerprint
CN107507308B (en) Information matching method and device and intelligent door lock
KR20170077381A (en) System and method for prevent voice phishing using speech recognition
CN107451437B (en) Locking method and device of mobile terminal
JP2016071068A (en) Call analysis device, call analysis method, and call analysis program
KR101033870B1 (en) Method and device for processing spam call
CN108990061B (en) Method, device and system for preventing identity card number from being stolen
CN108280089A (en) Identify the method and apparatus sent a telegram here extremely
CN111062407A (en) Image processing method and device, electronic equipment and storage medium
CN109461276A (en) Intelligent terminal theft preventing method and intelligent terminal
CN114155880A (en) Illegal voice recognition method and system based on GBDT algorithm model
CN111246366B (en) Target crowd positioning method and system and related equipment
US9529984B2 (en) System and method for verification of user identification based on multimedia content elements
CN113127828A (en) Interface protection method, device, equipment and storage medium based on network security
CN111083273A (en) Voice processing method and device and electronic equipment
CN112837690B (en) Audio data generation method, audio data transfer method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant