CN108197497B - browser access method and mobile terminal - Google Patents

browser access method and mobile terminal Download PDF

Info

Publication number
CN108197497B
CN108197497B CN201810245239.3A CN201810245239A CN108197497B CN 108197497 B CN108197497 B CN 108197497B CN 201810245239 A CN201810245239 A CN 201810245239A CN 108197497 B CN108197497 B CN 108197497B
Authority
CN
China
Prior art keywords
user
target
facial feature
feature information
browser
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810245239.3A
Other languages
Chinese (zh)
Other versions
CN108197497A (en
Inventor
姜自雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810245239.3A priority Critical patent/CN108197497B/en
Publication of CN108197497A publication Critical patent/CN108197497A/en
Application granted granted Critical
Publication of CN108197497B publication Critical patent/CN108197497B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a browser access method and a mobile terminal, wherein the method comprises the following steps: receiving a first input for controlling the foreground running of a target browser, and acquiring user characteristic information, wherein the target browser runs in the background; and if the user characteristic information is not matched with the target user information of the target browser, foreground operating the target browser and limiting accessing to the data of the target user. Therefore, when the collected user characteristic information is not matched with the target user information of the target browser, the data of the target user can be limited to be accessed, so that the privacy of the user is protected, and the privacy of the user is prevented from being revealed.

Description

browser access method and mobile terminal
Technical Field
the present invention relates to the field of communications technologies, and in particular, to a browser access method and a mobile terminal.
Background
With the rapid development of mobile terminals, mobile terminals have become an essential tool in people's life, and bring great convenience to various aspects of users' life. The user can use the browser to refer to some private information of the user (such as a bank account or a fund account of the user, and the like), and after the user refers to the private information, the browser can be switched to the background or quit, and the like.
However, when the user runs the browser from the background to the foreground again, some private information browsed before may be displayed due to the memory function of the browser, which may easily cause leakage of user information.
disclosure of Invention
The embodiment of the invention provides a browser access method and a mobile terminal, and aims to solve the problem that user information is easy to leak when a browser of the mobile terminal runs from a background to a foreground.
In order to solve the technical problem, the invention is realized as follows: a browser access method, comprising:
Receiving a first input for controlling the foreground running of a target browser, and acquiring user characteristic information, wherein the target browser runs in the background;
and if the user characteristic information is not matched with the target user information of the target browser, foreground operating the target browser and limiting accessing to the data of the target user.
in a first aspect, an embodiment of the present invention provides a browser access method, including:
receiving a first input for controlling the foreground running of a target browser, and acquiring user characteristic information, wherein the target browser runs in the background;
And if the user characteristic information is not matched with the target user information of the target browser, foreground operating the target browser and limiting accessing to the data of the target user.
In a second aspect, an embodiment of the present invention further provides a mobile terminal, including:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for receiving first input for controlling the foreground operation of a target browser and acquiring user characteristic information, and the target browser is operated in the background;
And the operation module is used for operating the target browser in the foreground and limiting the data of the target user to be accessed if the user characteristic information is not matched with the target user information of the target browser.
In a third aspect, an embodiment of the present invention further provides a mobile terminal, including a processor, a memory, and a computer program stored on the memory and operable on the processor, where the computer program, when executed by the processor, implements the steps of the browser access method described above.
in a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the above browser access method are implemented.
In the embodiment of the invention, a first input for controlling the foreground running of a target browser is received, and user characteristic information is collected, wherein the target browser runs in the background; and if the user characteristic information is not matched with the target user information of the target browser, foreground operating the target browser and limiting accessing to the data of the target user. Therefore, when the collected user characteristic information is not matched with the target user information of the target browser, the data of the target user can be limited to be accessed, so that the privacy of the user is protected, and the privacy of the user is prevented from being revealed.
drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a flowchart of a browser access method according to an embodiment of the present invention;
Fig. 2 is a second flowchart of a browser access method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a control display according to an embodiment of the present invention;
fig. 4 is a third flowchart of a browser access method according to an embodiment of the present invention;
fig. 5 is one of the structural diagrams of a mobile terminal according to an embodiment of the present invention;
Fig. 6 is one of the structural diagrams of an operation module of the mobile terminal according to the embodiment of the present invention;
Fig. 7 is one of the structural diagrams of a first operation sub-module of the mobile terminal according to the embodiment of the present invention;
Fig. 8 is a second block diagram of a first operation sub-module of the mobile terminal according to the embodiment of the present invention;
Fig. 9 is a second block diagram of an operation module of the mobile terminal according to the embodiment of the present invention;
fig. 10 is a second block diagram of a mobile terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of a browser access method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
step 101, receiving a first input for controlling the foreground running of a target browser, and acquiring user characteristic information, wherein the target browser runs in the background.
In the embodiment of the present invention, the target browser may be a browser carried by the mobile terminal, or may also be a third-party browser downloaded by the mobile terminal, and the like. The first input for controlling the foreground running of the target browser may be a touch operation on the mobile terminal, or may also be a voice input received by the mobile terminal from a user, and so on. The user characteristic information may be user facial characteristic information collected by a camera, or user voice characteristic information collected by a microphone, and the like.
And 102, if the user characteristic information is not matched with the target user information of the target browser, foreground operating the target browser and limiting accessing to the data of the target user.
in the embodiment of the present invention, the target user may be a user of the mobile terminal. The target user information may be voice information previously input by a user using the mobile terminal, or may also be face information previously input by the user using the mobile terminal, or the like. The user characteristic information is not matched with the target user information of the target browser, and may be the voice information received by the mobile terminal, or the face information collected by the mobile terminal. The data of the target user may be history data of some webpages browsed by the target user, or may also be information of some pages collected by the target user, and the like, which is not limited in the embodiment of the present invention.
In the embodiment of the invention, when the user characteristic information is the face characteristic information of the user, whether the face characteristic information of the user is matched with the target user information of the target browser can be judged. And can be set in the safety under the setting and the anti-disclosure of the safety. If the option of 'preventing disclosure' is set to be in the starting state, the camera can be started to take a picture of the face of the user, and the picture is taken as the target user information. And then, a target browser in the list can be selected, and after the target browser is set, when the target browser is started, the camera can be automatically started to collect the facial feature information of the user for matching.
in the embodiment of the present invention, if the user characteristic information matches with the target user information of the target browser, the data of the target user may be allowed to be accessed.
In the embodiment of the invention, if the user characteristic information is not matched with the target user information of the target browser, the target browser is operated in the foreground, and the data of the target user is limited to be accessed. Therefore, even if other users exist at the user side, the user does not have any relation, and the other users cannot see the data of the target user due to the fact that the data of the target user are limited to be accessed, so that the privacy of the user is protected, and the privacy of the user is prevented from being revealed.
in an embodiment of the present invention, the Mobile terminal may be a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a Wearable Device (Wearable Device), or the like.
The browser access method comprises the steps of receiving first input for controlling the foreground running of a target browser, and collecting user characteristic information, wherein the target browser runs in the background; and if the user characteristic information is not matched with the target user information of the target browser, foreground operating the target browser and limiting accessing to the data of the target user. Therefore, when the collected user characteristic information is not matched with the target user information of the target browser, the data of the target user can be limited to be accessed, so that the privacy of the user is protected, and the privacy of the user is prevented from being revealed.
Referring to fig. 2, fig. 2 is a flowchart of a browser access method according to an embodiment of the present invention. The main difference between this embodiment and the previous embodiment is that the user feature information in the method is facial feature information collected by a camera. As shown in fig. 2, the method comprises the following steps:
Step 201, receiving a first input for controlling the foreground operation of a target browser, and acquiring user characteristic information, wherein the target browser is operated in the background, and the user characteristic information is facial characteristic information acquired by a camera.
In the embodiment of the present invention, the target browser may be a browser carried by the mobile terminal, or may also be a third-party browser downloaded by the mobile terminal, and the like. The first input for controlling the foreground running of the target browser may be a touch operation on the mobile terminal, or may also be a voice input received by the mobile terminal from a user, and so on.
Step 202, detecting whether second facial feature information except the first facial feature information of the target user is contained in the facial feature information collected by the camera.
In the embodiment of the present invention, the facial feature information collected by the camera may be facial feature information collected by a front camera of the mobile terminal, or may also be facial feature information collected by a rear camera of the mobile terminal. The target user may be understood as a user of the mobile terminal, the first facial feature information may be understood as facial feature information preset by the user of the mobile terminal, and the second facial feature information may be understood as facial feature information of some other users than the user of the mobile terminal.
Step 203, if the facial feature information collected by the camera includes second facial feature information other than the first facial feature information of the target user, the target browser is operated in the foreground, and the data of the target user is restricted from being accessed.
In the embodiment of the present invention, if the facial feature information acquired by the camera includes second facial feature information other than the first facial feature information of the target user, it indicates that there are other users around the user when using the mobile terminal, and the target browser may be operated on the foreground and access to the data of the target user is restricted. Therefore, the privacy of the user can be protected, and the privacy of the user can be prevented from being revealed.
of course, in the process of collecting facial feature information by the camera, a front-facing camera is preferably used for collection. If the front-facing camera can collect the facial feature information of other users, the other users can easily see the content on the mobile terminal, and at the moment, the data of the target user can be limited to be accessed, and the privacy of the user is protected. When the mobile terminal rear camera collects facial feature information of other users, the users can not see the contents displayed on the mobile terminal. Therefore, preferably, the facial feature information collected by the front camera can be judged.
it should be noted that if the facial feature information collected by the camera does not include second facial feature information other than the first facial feature information of the target user, the detection may be continued, or the process may be ended, which is exemplified by ending the process in fig. 2 in the embodiment of the present invention.
Optionally, if the facial feature information collected by the camera includes second facial feature information other than the first facial feature information of the target user, the foreground runs the target browser and restricts access to the data of the target user, including:
if the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user, displaying a preset control, wherein the preset control is used for controlling the access authority of the data of the target user;
and if receiving the touch operation of the user on the preset control, foreground running the target browser and limiting accessing the data of the target user.
in this embodiment, the preset control may be a circular control, a rectangular control, or some other control. The touch operation on the preset control can be one click, one double click or one long press, and the like. In addition, other touch operations may be performed, and the embodiment is not limited thereto.
In this embodiment, if the facial feature information collected by the camera includes second facial feature information other than the first facial feature information of the target user, the user is prompted by displaying a preset control, so that the user can autonomously select whether to limit access to the data of the target user. For example: when the user is on the subway, the second facial feature information can be facial feature information of passengers nearby, so that the user can touch a preset control, and access to the data of the target user is limited; or when the user is in some shopping malls, the second facial feature information may be facial feature information of some customers nearby, so that the user can also touch the preset control, thereby limiting access to the data of the target user and preventing leakage of user information.
In this embodiment, if the preset control does not receive the touch operation of the user within a certain time, the data of the target user may be allowed to be accessed. The fact that the user does not touch the preset control indicates that the current environment is possibly safe, even if some users exist nearby, the users have little influence on viewing the contents browsed by the users, and therefore the data of the target user can be allowed to be accessed. Therefore, through displaying the preset control, the user can independently select the access authority of the data of the target user, the individual requirements of the user in different environments can be met, and the mobile terminal can protect the privacy of the user more intelligently.
Of course, there may be different areas on the preset control to control different permissions. For better understanding, we can refer to fig. 3, and fig. 3 is a schematic diagram of a control display provided by an embodiment of the present invention. As can be seen in fig. 3, different areas on the preset control display different words, "avatar" and "launch". When the user clicks 'start', the data of the target user can be allowed to be accessed; when the user clicks "divide up", access to the target user's data may be restricted. By the method, when the user characteristic information acquired by the camera indicates that other users exist, different permissions can be determined through different selections of the users, so that the personalized requirements of the users in different environments are met.
For example, when a user is working on a project with a team, the camera may capture facial feature information of other users, and the user may click on the display position of the "start" two words, thereby allowing access to the target user's data, and some of the material previously reviewed by the user may be discussed with members of the team. When the user is on the bus, the camera can possibly collect facial feature information of other users, and the user can click the display position of the two words of 'body-divided', so that the data of the target user is limited to be accessed, the privacy of the user can be well protected, and the privacy of the user is prevented from being revealed.
optionally, if the facial feature information collected by the camera includes second facial feature information other than the first facial feature information of the target user, the foreground runs the target browser and restricts access to the data of the target user, including:
If the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user, receiving fingerprint information input by the user at a preset position;
and if the fingerprint information is matched with the preset fingerprint information, the target browser is operated in the foreground, and the data of the target user is limited to be accessed.
in this embodiment, the preset position may be a position of the fingerprint module, or may be any position on the display screen. Such as the top left corner, top right corner, bottom left corner, bottom right corner, or the display location of the target browser icon, etc. When the fingerprint information input at the preset position is matched with the preset fingerprint information, the data of the target user can be limited to be accessed.
In the embodiment, the access authority of the data of the target user can be set quickly through the fingerprint information, so that the operation of the user is more convenient, the privacy of the user is well protected, and the disclosure of the privacy is prevented.
Of course, the user may also set different permissions using different fingerprints, and determine whether the data of the target user can be accessed through different fingerprints. For example, when some other users exist around the user, the user can input fingerprint information of an index finger at a preset position, and at the moment, the data of the target user can be limited to be accessed; when a user is at home, the fingerprint information of the middle finger can be input at a preset position, and the data of the target user can be allowed to be accessed. Therefore, different access authorities can be controlled through different fingerprints, the safety of own privacy can be protected, and different access requirements on the browser in different environments can be met.
The browser access method comprises the steps of receiving a first input for controlling the foreground operation of a target browser, and acquiring user characteristic information, wherein the target browser operates in the background, and the user characteristic information is face characteristic information acquired by a camera; detecting whether second facial feature information except the first facial feature information of the target user is contained in the facial feature information collected by the camera; and if the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user, the target browser is operated in the foreground, and the data of the target user is limited to be accessed. Therefore, when the facial feature information collected by the camera contains the second facial feature information except the first facial feature information of the target user, the data of the target user can be limited to be accessed, so that the privacy of the user is protected, and the privacy of the user is prevented from being leaked.
referring to fig. 4, fig. 4 is a flowchart of a browser access method according to an embodiment of the present invention. The main difference between this embodiment and the previous embodiment is that the user characteristic information in this method is the sound information collected by the microphone. As shown in fig. 4, the method comprises the following steps:
step 401, receiving a first input for controlling foreground operation of a target browser, and acquiring user characteristic information, wherein the target browser is already in background operation, and the user characteristic information is sound information acquired by a microphone.
in the embodiment of the present invention, the target browser may be a browser carried by the mobile terminal, or may also be a third-party browser downloaded by the mobile terminal, and the like. The first input for controlling the foreground running of the target browser may be a touch operation on the mobile terminal, or may also be a voice input received by the mobile terminal from a user, and so on.
And 402, detecting whether the sound information collected by the microphone is matched with the preset sound information of the target user.
In the embodiment of the present invention, the target user may be understood as a user of the mobile terminal. The preset sound information may be sound information previously input by a user of the mobile terminal. And whether the sound information collected by the microphone is matched with the preset sound information of the target user or not is detected, and judgment can be carried out through the frequency or tone of sound and the like.
and 403, if the sound information collected by the microphone is not matched with the preset sound information, foreground running the target browser and limiting accessing to the data of the target user.
In the embodiment of the invention, if the sound information collected by the microphone is not matched with the preset sound information, it is indicated that some other users may exist in the current environment, so that the data of the target user can be limited to be accessed, the privacy of the user is protected, and the privacy of the user is prevented from being leaked. Of course, the user may also make some sound to control the access right of the data of the target user, and the like, which is not limited to this embodiment of the present invention.
It should be noted that if the sound information collected by the microphone matches the preset sound information, the detection may be continued, or the process may be ended, and fig. 4 of the embodiment of the present invention illustrates the ending process.
The browser access method comprises the steps of receiving a first input for controlling the foreground operation of a target browser, and acquiring user characteristic information, wherein the target browser is operated in the background, and the user characteristic information is sound information acquired by a microphone; detecting whether the sound information collected by the microphone is matched with preset sound information of the target user; and if the sound information collected by the microphone is not matched with the preset sound information, the target browser is operated by the foreground, and the data of the target user is limited to be accessed. Therefore, when the sound information collected by the microphone is not matched with the preset sound information, the data of the target user can be limited to be accessed, so that the privacy of the user is protected, and the privacy of the user is prevented from being revealed.
Referring to fig. 5, fig. 5 is a structural diagram of a mobile terminal according to an embodiment of the present invention, which can implement details of a browser access method in the foregoing embodiment and achieve the same effect. As shown in fig. 5, the mobile terminal 500 includes an acquisition module 501 and an operation module 502, where the acquisition module 501 is connected with the operation module 502, where:
an acquisition module 501, configured to receive a first input for controlling foreground operation of a target browser, and acquire user feature information, where the target browser is already running in a background;
an operation module 502, configured to, if the user characteristic information does not match the target user information of the target browser, foreground-operate the target browser and limit access to the data of the target user.
optionally, the user feature information is facial feature information collected by a camera, as shown in fig. 6, the running module 502 includes:
The first detection submodule 5021 is used for detecting whether the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user;
A first running sub-module 5022, configured to, if the facial feature information acquired by the camera and detected by the first detecting sub-module 5021 includes second facial feature information other than the first facial feature information of the target user, foreground run the target browser, and limit access to the data of the target user.
Optionally, as shown in fig. 7, the first operation submodule 5022 includes:
A display unit 50221, configured to display a preset control, if the first detection submodule 5021 detects that second facial feature information other than the first facial feature information of the target user is included in the facial feature information acquired by the camera, where the preset control is used to control an access right of data of the target user;
A first running unit 50222, configured to, if a touch operation of a user on the preset control is received, foreground run the target browser, and limit access to the data of the target user.
optionally, as shown in fig. 8, the first operation submodule 5022 includes:
A receiving unit 50223, configured to receive fingerprint information input by a user at a preset position if the first detection submodule 5021 detects that second facial feature information other than the first facial feature information of the target user is included in the facial feature information acquired by the camera;
A second operation unit 50224, configured to, if the fingerprint information matches preset fingerprint information, foreground-operate the target browser and limit access to the data of the target user.
optionally, the user characteristic information is sound information collected by a microphone, as shown in fig. 9, the operation module 502 includes:
the second detection submodule 5023 is used for detecting whether the sound information collected by the microphone is matched with the preset sound information of the target user;
A second operation submodule 5024, configured to, if the second detection submodule 5023 detects that the sound information collected by the microphone is not matched with the preset sound information, foreground operate the target browser and limit access to the data of the target user.
The mobile terminal 500 can implement each process implemented by the mobile terminal in the method embodiments of fig. 1 to fig. 4, and is not described herein again to avoid repetition.
The mobile terminal 500 of the embodiment of the present invention receives a first input for controlling the foreground of a target browser to operate, and collects user characteristic information, where the target browser has operated in the background; and if the user characteristic information is not matched with the target user information of the target browser, foreground operating the target browser and limiting accessing to the data of the target user. Therefore, when the collected user characteristic information is not matched with the target user information of the target browser, the data of the target user can be limited to be accessed, so that the privacy of the user is protected, and the privacy of the user is prevented from being revealed.
Referring to fig. 10, fig. 10 is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present invention, where the mobile terminal 1000 includes, but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, a processor 1010, and a power supply 1011. Those skilled in the art will appreciate that the mobile terminal architecture illustrated in fig. 10 is not intended to be limiting of mobile terminals, and that a mobile terminal may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 1010 is configured to receive a first input for controlling a foreground of a target browser to run, and acquire user feature information, where the target browser has run in a background; and if the user characteristic information is not matched with the target user information of the target browser, foreground operating the target browser and limiting accessing to the data of the target user. Therefore, when the collected user characteristic information is not matched with the target user information of the target browser, the data of the target user can be limited to be accessed, so that the privacy of the user is protected, and the privacy of the user is prevented from being revealed.
Optionally, the user feature information is facial feature information acquired by a camera, and the processor 1010 is further configured to detect whether second facial feature information other than the first facial feature information of the target user is included in the facial feature information acquired by the camera; and if the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user, the target browser is operated in the foreground, and the data of the target user is limited to be accessed.
Optionally, the processor 1010 is further configured to display a preset control if the facial feature information acquired by the camera includes second facial feature information other than the first facial feature information of the target user, where the preset control is used to control an access right of the data of the target user; and if receiving the touch operation of the user on the preset control, foreground running the target browser and limiting accessing the data of the target user. If the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user, displaying a preset control, wherein the preset control is used for controlling the access authority of the data of the target user; and if receiving the touch operation of the user on the preset control, foreground running the target browser and limiting accessing the data of the target user.
Optionally, the processor 1010 is further configured to receive fingerprint information input by a user at a preset position if the facial feature information acquired by the camera includes second facial feature information other than the first facial feature information of the target user; and if the fingerprint information is matched with the preset fingerprint information, the target browser is operated in the foreground, and the data of the target user is limited to be accessed.
Optionally, the user characteristic information is sound information collected by a microphone, and the processor 1010 is further configured to detect whether the sound information collected by the microphone matches preset sound information of the target user; and if the sound information collected by the microphone is not matched with the preset sound information, the target browser is operated by the foreground, and the data of the target user is limited to be accessed.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 1001 may be used for receiving and sending signals during a message transmission or a call, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 1010; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 1001 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio frequency unit 1001 may also communicate with a network and other devices through a wireless communication system.
the mobile terminal provides the user with wireless broadband internet access through the network module 1002, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 1003 may convert audio data received by the radio frequency unit 1001 or the network module 1002 or stored in the memory 1009 into an audio signal and output as sound. Also, the audio output unit 1003 may also provide audio output related to a specific function performed by the mobile terminal 1000 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 1003 includes a speaker, a buzzer, a receiver, and the like.
The input unit 1004 is used to receive an audio or video signal. The input Unit 1004 may include a Graphics Processing Unit (GPU) 10041 and a microphone 10042, the Graphics processor 10041 Processing image data of still pictures or video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 1006. The image frames processed by the graphic processor 10041 may be stored in the memory 1009 (or other storage medium) or transmitted via the radio frequency unit 1001 or the network module 1002. The microphone 10042 can receive sound and can process such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 1001 in case of a phone call mode.
The mobile terminal 1000 can also include at least one sensor 1005, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 10061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 10061 and/or the backlight when the mobile terminal 1000 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 1005 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which will not be described in detail herein.
The display unit 1006 is used to display information input by the user or information provided to the user. The Display unit 1006 may include a Display panel 10061, and the Display panel 10061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 1007 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 1007 includes a touch panel 10071 and other input devices 10072. The touch panel 10071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 10071 (e.g., operations by a user on or near the touch panel 10071 using a finger, a stylus, or any other suitable object or attachment). The touch panel 10071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 1010, and receives and executes commands sent by the processor 1010. In addition, the touch panel 10071 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 10071, the user input unit 1007 can include other input devices 10072. Specifically, the other input devices 10072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a track ball, a mouse, and a joystick, which are not described herein again.
further, the touch panel 10071 can be overlaid on the display panel 10061, and when the touch panel 10071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 1010 to determine the type of the touch event, and then the processor 1010 provides a corresponding visual output on the display panel 10061 according to the type of the touch event. Although in fig. 10, the touch panel 10071 and the display panel 10061 are two independent components for implementing the input and output functions of the mobile terminal, in some embodiments, the touch panel 10071 and the display panel 10061 may be integrated to implement the input and output functions of the mobile terminal, which is not limited herein.
the interface unit 1008 is an interface through which an external device is connected to the mobile terminal 1000. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 1008 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 1000 or may be used to transmit data between the mobile terminal 1000 and external devices.
The memory 1009 may be used to store software programs as well as various data. The memory 1009 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, and the like), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 1009 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 1010 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 1009 and calling data stored in the memory 1009, thereby integrally monitoring the mobile terminal. Processor 1010 may include one or more processing units; preferably, the processor 1010 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 1010.
The mobile terminal 1000 may also include a power supply 1011 (e.g., a battery) for powering the various components, and the power supply 1011 may be logically coupled to the processor 1010 via a power management system that may be configured to manage charging, discharging, and power consumption.
In addition, the mobile terminal 1000 includes some functional modules that are not shown, and are not described in detail herein.
Preferably, an embodiment of the present invention further provides a mobile terminal, including a processor 1010, a memory 1009, and a computer program stored in the memory 1009 and capable of running on the processor 1010, where the computer program, when executed by the processor 1010, implements each process of the above browser access method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
the embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned browser access method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (4)

1. a browser access method, comprising:
Receiving a first input for controlling the foreground running of a target browser, and acquiring user characteristic information, wherein the target browser runs in the background;
If the user characteristic information is not matched with the target user information of the target browser, the target browser is operated in a foreground, and the data of the target user are limited to be accessed;
The method comprises the following steps that user characteristic information is face characteristic information collected by a camera, if the user characteristic information is not matched with target user information of a target browser, the target browser is operated by a foreground, and access to data of the target user is limited, and the method comprises the following steps:
detecting whether second facial feature information except the first facial feature information of the target user is contained in the facial feature information collected by the camera;
if the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user, the target browser is operated in a foreground, and the data of the target user are restricted from being accessed;
wherein, if the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user, the foreground runs the target browser and restricts the access to the data of the target user, including:
If the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user, displaying a preset control, wherein the preset control is used for controlling the access authority of the data of the target user;
if receiving a touch operation of a user on the preset control, foreground operating the target browser and limiting accessing data of the target user;
alternatively, the first and second electrodes may be,
If the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user, the foreground runs the target browser and limits access to the data of the target user, and the method comprises the following steps:
If the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user, receiving fingerprint information input by the user at a preset position;
And if the fingerprint information is matched with the preset fingerprint information, the target browser is operated in the foreground, and the data of the target user is limited to be accessed.
2. A mobile terminal, comprising:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for receiving first input for controlling the foreground operation of a target browser and acquiring user characteristic information, and the target browser is operated in the background;
the operation module is used for operating the target browser in a foreground and limiting the data of the target user to be accessed if the user characteristic information is not matched with the target user information of the target browser;
wherein, user characteristic information is the facial characteristic information that the camera was gathered, the operation module includes:
The first detection submodule is used for detecting whether second facial feature information except the first facial feature information of the target user is contained in the facial feature information collected by the camera;
the first running sub-module is used for running the target browser in a foreground and limiting the access to the data of the target user if the first detection sub-module detects that second facial feature information except the first facial feature information of the target user is contained in the facial feature information collected by the camera;
wherein the first operational submodule comprises:
The display unit is used for displaying a preset control if the first detection submodule detects that second facial feature information except the first facial feature information of the target user is contained in the facial feature information collected by the camera, and the preset control is used for controlling the access authority of the data of the target user;
The first running unit is used for running the target browser in a foreground and limiting the data of the target user to be accessed if the touch operation of the user on the preset control is received;
alternatively, the first and second electrodes may be,
the first operational submodule includes:
The receiving unit is used for receiving fingerprint information input by a user at a preset position if the first detection submodule detects that the facial feature information collected by the camera contains second facial feature information except the first facial feature information of the target user;
and the second operation unit is used for operating the target browser in a foreground if the fingerprint information is matched with preset fingerprint information and limiting the data of the target user to be accessed.
3. a mobile terminal, characterized in that it comprises a processor, a memory and a computer program stored on said memory and executable on said processor, said computer program, when executed by said processor, implementing the steps of the browser access method according to claim 1.
4. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the browser access method according to claim 1.
CN201810245239.3A 2018-03-23 2018-03-23 browser access method and mobile terminal Active CN108197497B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810245239.3A CN108197497B (en) 2018-03-23 2018-03-23 browser access method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810245239.3A CN108197497B (en) 2018-03-23 2018-03-23 browser access method and mobile terminal

Publications (2)

Publication Number Publication Date
CN108197497A CN108197497A (en) 2018-06-22
CN108197497B true CN108197497B (en) 2019-12-06

Family

ID=62595848

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810245239.3A Active CN108197497B (en) 2018-03-23 2018-03-23 browser access method and mobile terminal

Country Status (1)

Country Link
CN (1) CN108197497B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102214286A (en) * 2010-04-08 2011-10-12 鸿富锦精密工业(深圳)有限公司 Network content restricted browsing control system and method
CN105227572A (en) * 2015-10-19 2016-01-06 武汉大学 Based on the access control system of context aware and method on a kind of mobile platform
CN105701378A (en) * 2014-11-24 2016-06-22 中兴通讯股份有限公司 Terminal device control method and device
CN105760746A (en) * 2016-01-28 2016-07-13 福州瑞芯微电子股份有限公司 Authority management method, authority distribution method and equipment
CN106599663A (en) * 2016-12-14 2017-04-26 广东欧珀移动通信有限公司 Information security protecting method and mobile terminal
CN107437012A (en) * 2016-05-27 2017-12-05 阿里巴巴集团控股有限公司 The guard method of data and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102214286A (en) * 2010-04-08 2011-10-12 鸿富锦精密工业(深圳)有限公司 Network content restricted browsing control system and method
CN105701378A (en) * 2014-11-24 2016-06-22 中兴通讯股份有限公司 Terminal device control method and device
CN105227572A (en) * 2015-10-19 2016-01-06 武汉大学 Based on the access control system of context aware and method on a kind of mobile platform
CN105760746A (en) * 2016-01-28 2016-07-13 福州瑞芯微电子股份有限公司 Authority management method, authority distribution method and equipment
CN107437012A (en) * 2016-05-27 2017-12-05 阿里巴巴集团控股有限公司 The guard method of data and device
CN106599663A (en) * 2016-12-14 2017-04-26 广东欧珀移动通信有限公司 Information security protecting method and mobile terminal

Also Published As

Publication number Publication date
CN108197497A (en) 2018-06-22

Similar Documents

Publication Publication Date Title
EP4047940A1 (en) Screencast control method and electronic device
CN108182019B (en) Suspension control display processing method and mobile terminal
CN109078319B (en) Game interface display method and terminal
CN108446058B (en) Mobile terminal operation method and mobile terminal
CN110837327B (en) Message viewing method and terminal
CN108595946B (en) Privacy protection method and terminal
CN111026484A (en) Application sharing method, first electronic device and computer-readable storage medium
CN109710349B (en) Screen capturing method and mobile terminal
CN109523253B (en) Payment method and device
CN110865745A (en) Screen capturing method and terminal equipment
CN108196753B (en) Interface switching method and mobile terminal
CN109544172B (en) Display method and terminal equipment
CN111443815A (en) Vibration reminding method and electronic equipment
CN108132749B (en) Image editing method and mobile terminal
CN111061404A (en) Control method and first electronic device
CN109669656B (en) Information display method and terminal equipment
CN111522477A (en) Application starting method and electronic equipment
CN108021315B (en) Control method and mobile terminal
CN108540642B (en) Mobile terminal and operation method thereof
CN110795746B (en) Information processing method and electronic equipment
CN111124537B (en) Application starting method and electronic equipment
CN110032422B (en) Application management method, terminal equipment and computer readable storage medium
CN109739430B (en) Display method and mobile terminal
CN109062483B (en) Image processing method and terminal equipment
CN111273831A (en) Method for controlling electronic equipment and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant