CN108460256A - Data guard method, mobile terminal and device - Google Patents

Data guard method, mobile terminal and device Download PDF

Info

Publication number
CN108460256A
CN108460256A CN201810052481.9A CN201810052481A CN108460256A CN 108460256 A CN108460256 A CN 108460256A CN 201810052481 A CN201810052481 A CN 201810052481A CN 108460256 A CN108460256 A CN 108460256A
Authority
CN
China
Prior art keywords
owner
pattern
unlock
application
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810052481.9A
Other languages
Chinese (zh)
Inventor
葛亚洁
朱少杰
周佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Everest Mobile Communication Co Ltd
Original Assignee
Beijing Everest Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Everest Mobile Communication Co Ltd filed Critical Beijing Everest Mobile Communication Co Ltd
Priority to CN201810052481.9A priority Critical patent/CN108460256A/en
Publication of CN108460256A publication Critical patent/CN108460256A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

This application discloses a kind of data guard method, mobile terminal and device, this method includes:When mobile terminal is in screen lock state, unlock input instruction is received;If unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to unlock input instruction is biometric feature unlocking manner, then is unlocked to mobile terminal, and enter owner's pattern, owner's pattern refers to the pattern with preset first permission of owner after mobile terminal unlock;If unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to unlock input instruction is not biometric feature unlocking manner, then is unlocked to mobile terminal, and enter non-owner's pattern, non- owner's pattern refers to the pattern with preset second permission of non-owner after mobile terminal unlock;Wherein, the first permission is more than the second permission.By the above-mentioned means, the application can enter the pattern with different rights, and easy to operate in the case where unlock user does not discover after so that mobile terminal is unlocked.

Description

Data guard method, mobile terminal and device
Technical field
This application involves technical field of mobile terminals, more particularly to a kind of data guard method, mobile terminal and device.
Background technology
With popularizing for mobile terminal, people are higher and higher using the frequency of mobile terminal, but the thing followed is mobile The safety problem of the information stored in terminal.
Currently, mobile terminal is only capable of protecting the unlatching safety of mobile terminal by screen-lock password, it can not be to movement Specific data (such as privacy information) in terminal is further protected, and if after screen-lock password obtained by other people, Ta Renye It is checked after capable of being unlocked to mobile terminal, therefore mobile terminal data safety is not high at present.Likewise, when screen-lock password is by him After people borrows, important in customer mobile terminal, secret fileinfo has the risk of leakage.Existing solution includes:Individually Encryption (download an encryption folder or move on to another space) or application lock (or file lock), when owner wants to check When these secret files, need progress two steps operation that could enter in encryption folder.
But present inventor has found in long-term R&D process, encryption folder application is shown on the table, It is be easy to cause a kind of obscure hint, implies that owner has secret, and owner uses the operating process of encryption folder application excessively It is cumbersome.
Invention content
The application is mainly solving the technical problems that provide a kind of data guard method, mobile terminal and device, Neng Gou In the case that unlock user does not discover, enter the pattern with different rights after so that mobile terminal is unlocked, and easy to operate.
In order to solve the above technical problems, the technical solution that the application uses is:A kind of data guard method, institute are provided The method of stating includes:When mobile terminal is in screen lock state, unlock input instruction is received;If the unlock input is instructed and is preset Unlock instruction matches, and the unlocking manner belonging to the unlock input instruction is biometric feature unlocking manner, then to described Mobile terminal unlocks, and enters owner's pattern, and owner's pattern refers to after mobile terminal unlocks, having owner preset first The pattern of permission;If the unlock input instruction is matched with default unlock instruction, and the unlock belonging to the unlock input instruction Mode is not the biometric feature unlocking manner, then is unlocked to the mobile terminal, and enters non-owner's pattern, described non- Owner's pattern refers to the pattern with preset second permission of non-owner after mobile terminal unlock;Wherein, first permission is big In second permission.
In order to solve the above technical problems, another technical solution that the application uses is:A kind of mobile terminal is provided, it is described Mobile terminal includes:Processor, memory, bio-identification circuit, telecommunication circuit, display, the processor are respectively coupled to institute State memory, the bio-identification circuit, the telecommunication circuit, the display, it is the processor, the memory, described Bio-identification circuit, the telecommunication circuit, the display can realize the step in method as described above at work.
In order to solve the above technical problems, another technical solution that the application uses is:It provides a kind of with store function Device, be stored thereon with program data, described program data realize the step in method as described above when being executed by processor.
The advantageous effect of the application is:The case where being different from the prior art, the application are in screen lock state in mobile terminal When, receive unlock input instruction;If the unlock input instruction is matched with default unlock instruction, and unlock input instruction institute The unlocking manner of category is biometric feature unlocking manner, then is unlocked to the mobile terminal, and enters owner's pattern, the machine Holotype refers to the pattern with preset first permission of owner after mobile terminal unlock;If unlock input instruction with it is pre- If unlock instruction matches, and the unlocking manner belonging to the unlock input instruction is not the biometric feature unlocking manner, Then the mobile terminal is unlocked, and enters non-owner's pattern, non-owner's pattern refers to after mobile terminal unlocks, having non- The pattern of preset second permission of owner;Wherein, first permission is more than second permission.Due to biometric feature solution Lock mode is difficult to by the people except owner using unlocking mobile terminal, when unlock input instruction is matched with default unlock instruction, And belong to biometric feature unlocking manner, it may be determined that be owner's identity, unlock the simultaneously big owner's pattern of access entitlements, work as solution Lock input instruction is matched with default unlock instruction, and is not belonging to biometric feature unlocking manner, it may be determined that is not owner's body Part, unlock and the small non-owner's pattern of access entitlements, in this way, can unlock user do not discover in the case of, Enter the pattern with different rights after so that mobile terminal is unlocked, and easy to operate.
Description of the drawings
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present application, for For those of ordinary skill in the art, without creative efforts, other are can also be obtained according to these attached drawings Attached drawing.Wherein:
Fig. 1 is the flow diagram of one embodiment of the application data guard method;
Fig. 2 is the structural schematic diagram of one embodiment of the application mobile terminal;
Fig. 3 is the structural schematic diagram for one embodiment of device that the application has store function.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, rather than whole embodiments.Based on this Embodiment in application, those of ordinary skill in the art are obtained every other under the premise of not making performing creative labour Embodiment shall fall in the protection scope of this application.
Refering to fig. 1, Fig. 1 is the flow diagram of one embodiment of the application data guard method, and this method includes:
Step S101:When mobile terminal is in screen lock state, unlock input instruction is received.
Step S102:If unlock input instruction is matched with default unlock instruction, and unlocks the unlock side belonging to input instruction Formula is biometric feature unlocking manner, then is unlocked to mobile terminal, and enters owner's pattern, and owner's pattern refers to mobile terminal After unlock, the pattern with preset first permission of owner.
Step S103:If unlock input instruction is matched with default unlock instruction, and unlocks the unlock side belonging to input instruction Formula is not biometric feature unlocking manner, then is unlocked to mobile terminal, and enters non-owner's pattern, and non-owner's pattern refers to moving After dynamic terminal unlocking, the pattern with preset second permission of non-owner;Wherein, the first permission is more than the second permission.
In present embodiment, there are many modes of unlock screen for mobile terminal setting, such as including face unlock, fingerprint solution Lock, password unlock, gesture unlock etc., while user setting at least one biometric feature unlocking manner is needed, such as:Face Unlock, unlocked by fingerprint, iris unlock, vocal print unlock, etc., and at least one conventional unlocking manner, such as:Password unlock, Gesture unlock, etc..
In the present embodiment, owner's pattern refers to preset with owner's identity, when unlock input instruction and default unlock Instructions match, and when belonging to biometric feature unlocking manner, the mould with the first permission entered after mobile terminal unlock Formula.Non- owner's pattern refers to preset with non-owner's identity, is matched with default unlock instruction when unlock input is instructed, and is not belonging to When biometric feature unlocking manner, the pattern with the second permission that is entered after mobile terminal unlock, wherein the first permission More than the second permission.For example, mobile terminal include file 1, file 2, file 1, file 2, using 1, using 2, and it is literary Part 2, file 1 are redefined for hiding using 2 attributes, at this point, under owner's pattern, display file 1, file 2, file Folder 1, file 2, using 1, using 2, etc., under non-owner's pattern, display file 1, file 2, using 1, etc. hide text Part 2, file 1, using 2, etc.;For another example, under owner's pattern, address list, instant messaging chat record, etc. can be opened, Under non-owner's pattern, forbid opening address list, instant messaging chat record, etc..
For mobile terminal, the permission of general owner's identity is the largest after manufacture, and the permission of non-owner's identity is It is less than the permission of owner's identity.Biometric feature is can be known with the feature of unique identification user, the biology of each user Other feature has uniqueness, is different from, therefore, biometric feature unlocking manner is distinguished owner's identity and non-owner's body Part, and into the pattern of different rights, this mode be difficult to that unlock user is made to discover after mobile terminal unlock.
When mobile terminal is in screen lock state, if user needs to unlock mobile terminal, input unlock input refers to It enables, if unlock input instruction is matched with unlocking manner preset in mobile terminal, mobile terminal can be unlocked, and further Judge whether this unlocking manner is biometric feature unlocking manner, if (e.g., this unlock is face unlock, fingerprint solution One kind in lock, iris unlock, vocal print unlock etc.), then judge to unlock user for owner's identity, in this case, unlock is used Family can only be owner, enter owner's pattern after mobile terminal unlock;(e.g., this unlock is gesture unlock, password solution if not One kind in lock etc.), then judge to unlock user for non-owner's identity, in this case, unlock user may be owner, It may not be owner, enter non-owner's pattern after mobile terminal unlock.
The application receives unlock input instruction when mobile terminal is in screen lock state;If unlock input is instructed and is preset Unlock instruction matches, and the unlocking manner unlocked belonging to input instruction is biometric feature unlocking manner, then to mobile terminal Unlock, and enter owner's pattern, owner's pattern refers to the pattern with preset first permission of owner after mobile terminal unlock; If unlock input instruction is matched with default unlock instruction, and the unlocking manner unlocked belonging to input instruction is not biometric feature Unlocking manner then unlocks mobile terminal, and enters non-owner's pattern, and non-owner's pattern refers to after mobile terminal unlocks, having The pattern of non-preset second permission of owner;Wherein, the first permission is more than the second permission.Due to biometric feature unlocking manner It is difficult to by the people except owner using unlocking mobile terminal, when unlock input instruction is matched with default unlock instruction, and belongs to Biometric feature unlocking manner, it may be determined that be owner's identity, unlock the simultaneously big owner's pattern of access entitlements, when unlock inputs Instruction is matched with default unlock instruction, and is not belonging to biometric feature unlocking manner, it may be determined that and it is not owner's identity, unlock And non-owner's pattern that access entitlements are small can make mobile whole in this way in the case where unlock user does not discover Enter the pattern with different rights after the unlock of end, and easy to operate.
In one embodiment, after owner's pattern refers to mobile terminal unlock, hidden file and/or hiden application are shown The state of pattern, hidden file and/or hiden application is set in advance as hidden state;Non- owner's pattern refers to mobile terminal unlock Afterwards, the pattern of the hidden file and/or hiden application is hidden.
In the present embodiment, some are not intended to the hidden file and/or hidden shown to other people by owner in advance The state for hiding application is set as hidden state.If it is owner's identity to unlock user, that is, enters owner's pattern, then can show hidden Tibetan language part and/or hiden application enter non-owner's pattern if unlock user is not owner's identity, then hide these and hide File and/or hiden application.In this way, the safety that can improve private data, is difficult to be aware, and operates letter It is single, convenient.
Further, under non-owner's pattern, according to the instruction of the display hidden file and/or hiden application that receive, and After biometric feature is verified, hidden file and/or hiden application are shown.
In the present embodiment, under non-owner's pattern, hidden file and/or hiden application stash, this Shi Ruguo mobile terminals receive the instruction of display hidden file and/or hiden application, then user can be required to carry out biological knowledge Other signature verification then shows hidden file and/or hiden application after biometric feature is verified, if bio-identification Signature verification is not over showing hidden file and/or hiden application still then.Such as:Owner is with non-owner's identity Unlock when then needing to show hidden file and/or hiden application, can pass through bio-identification into non-owner's pattern Feature is verified, after being verified, you can display hidden file and/or hiden application;If non-owner is with non-owner Identity unlocks, and is the verification being difficult to through biometric feature into non-owner's pattern, cannot require display hidden file And/or hiden application.In this way, it on the one hand can ensure the safety of hidden file and/or hiden application, another party Face can still meet this Man's Demands of owner under non-owner's pattern, hidden file and/or hiden application be shown, to carry Rise user experience.
For adding the application of application lock, equally there is different places in owner's pattern and non-owner's pattern in present embodiment Reason strategy, is described as follows:
Under owner's pattern, is instructed according to the use of the first application added with application lock received, directly initiate and add Added with the first application of application lock;Under non-owner's pattern, according to the use of the first application added with application lock received Instruction, and after application lock is verified, start the first application added with application lock.
If mobile terminal judges to unlock user for owner's identity, into owner's pattern, for first added with application lock Using user needs in use, entrance can be directly initiated, i.e., without inputting password authentification, if judging to unlock user for non-machine Owner identification is asked to start first added with application lock in user and first is answered in application, starting this every time into non-owner's pattern With being required for unlocking, until the application lock of first application is turned off manually in user.In this way, it on the one hand can facilitate machine Main I is directly applied using first added with application lock, on the other hand, it is ensured that the first application added with application lock It is safe to use.
Certainly, in practical application, if the user thinks that:The safe to use of first application will be prior to the use of the first application Convenience then can not also distinguish owner's pattern for the first application added with application lock and non-owner's pattern is required for password Verification.I.e. under owner's pattern or non-owner's pattern, instructed according to the use of the first application added with application lock, in application lock After being verified, start the first application added with application lock.
After the first application unlock, the first application when backstage retains, is again introduced into without verification, cleaning backstage the always After one application, it is again turned on the first application, still needs to verify again, with the first application of unlock.
In one embodiment, the second of account password is needed to apply login, into the mode of the second application, in machine Holotype and non-owner's pattern equally have different processing strategies, i.e.,:
Under owner's pattern, starts and log in need account number cipher second in application, directly automated log on second is applied, the Two apply and are had logged on before entering screen lock state, and mobile terminal has automatically recorded account number cipher;Under non-owner's pattern, Start second in application, prompt user inputs account number cipher, after receiving correct account number cipher, login second is applied.
In the present embodiment, specific second application, such as the wechat of user, QQ, Taobao, payment can be preset The applications such as treasured, Jingdone district.If mobile terminal judges to unlock user for owner's identity, into owner's pattern, start second in application, can Direct automated log on simultaneously enters the second application;If judging to unlock user for non-owner's identity, into non-owner's pattern, every time into Enter second in application, will not automated log on, need input account number cipher can just enter, that is, prompt user input account number cipher, After receiving correct account number cipher, the second application is logged in.In this way, non-owner user can be avoided using machine Second account is applied using owner when master mobile terminal, further promotes safety and the private data of the second application account Safety.Further, the second application can be the preset important application of user, such as wechat in the embodiment of the present invention, QQ etc. can also be the application for the application type for being related to privacy of user that system automatically determines, for example, instant messaging application, postal Part application, forum apply, social networking application, need to log in the application using account in the application types such as Dropbox application.
In the present embodiment, mobile terminal is provided with owner's identification switch;Such as:In " the setting-peace of mobile terminal In entirely ", owner's identification switch can be provided, when owner's identification switch is opened, just meeting cognitron owner identification, identifies in owner When switch is closed, the identification without owner's identity.In the identification without owner's identity, no matter user passes through any mode Unlock enters mobile terminal, all remains the state of pre-set hidden file and/or hiden application in mobile terminal hidden Tibetan state.It is specific to be:
If unlock input instruction is matched with default unlock instruction, when owner's identification switch is opened, and input instruction is unlocked Affiliated unlocking manner is biometric feature unlocking manner, then is unlocked to mobile terminal, and enters owner's pattern;If unlock is defeated Enter instruction to match with default unlock instruction, when owner's identification switch is opened, and unlocks the unlocking manner belonging to input instruction not It is biometric feature unlocking manner, then mobile terminal is unlocked, and enters non-owner's pattern;If unlock input is instructed and is preset Unlock instruction matches, when owner's identification switch is closed, no matter the unlocking manner belonging to unlock input instruction is that biology is known Other feature unlocking manner unlocks mobile terminal, and hides the hidden file and/or hiden application.
By the above-mentioned means, can with flexible meet the different demands of user in varied situations, can both meet Demand of the user to the safety of private data, and the demand of flexibility of the user to setting can be met, to promote user Experience.
In one embodiment, this method further includes:Under owner's pattern, non-concealed file is set and/or non-concealed is answered State is hidden state;Or, under non-owner's pattern, if biometric feature is verified, owner's pattern is switched to; Or, when showing the application on mobile terminal and/file on PC, the hidden file and/or hiden application are hidden.
In present embodiment, the shape of non-concealed application and/or non-concealed file can also be arranged in user under owner's pattern State is hidden state, and after setting, in application house keeper, desktop, file can be hidden for these applications and/or file, so as to When non-owner's unlock enters mobile terminal, these applications and/or file are hidden.In non-owner's pattern, it can not be arranged or change Using and/or file dispaly state, certainly, owner enters in the applications such as picture library, short message, contact person, file management, selection It " display is all ", can be by biometric feature of input owner, such as input face, fingerprint, iris, vocal print, etc., just Really after input, the file being hidden can be shown.In addition, user can also be switched to machine by inputting the biometric feature of owner Holotype, the dispaly state of modify, adjust application and/or file.In order to further ensure the safety of hidden file, when When mobile terminal connects PC PC by data line, hiden application and/or hidden file are also hidden on PC PC It hides.
It is the structural schematic diagram of one embodiment of the application mobile terminal referring to Fig. 2, Fig. 2, mobile terminal includes:Processor 401, memory 402, bio-identification circuit 403, telecommunication circuit 404 and display 405, processor 401 are respectively coupled to store Device 402, bio-identification circuit 403, telecommunication circuit 404 and display 405, wherein processor 401, memory 402, biology Identification circuit 403, telecommunication circuit 404 and display 405 can realize the step in as above any one method at work.Phase Hold inside the Pass and refers to above method part, it is no longer superfluous herein to chat.Bio-identification is special in the embodiment of above-mentioned data guard method When sign unlocking manner includes unlocked by fingerprint mode, the bio-identification circuit 403 of the mobile terminal is fingerprint input circuit, should Fingerprint input circuit couples the processor 401.
It is the structural schematic diagram for one embodiment of device that the application has store function, the device 50 referring to Fig. 3, Fig. 3 It is stored thereon with program data 501, the step in as above any one method is realized when program data 501 is executed by processor.Phase Hold inside the Pass and refers to above method part, it is no longer superfluous herein to chat.
The foregoing is merely presently filed embodiments, are not intended to limit the scope of the claims of the application, every to utilize this Equivalent structure or equivalent flow shift made by application specification and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field includes similarly in the scope of patent protection of the application.

Claims (11)

1. a kind of data guard method, which is characterized in that the method includes:
When mobile terminal is in screen lock state, unlock input instruction is received;
If the unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to the unlock input instruction is raw Object identification feature unlocking manner then unlocks the mobile terminal, and enters owner's pattern, and owner's pattern refers to mobile whole After the unlock of end, the pattern with preset first permission of owner;
If the unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to the unlock input instruction is not The biometric feature unlocking manner then unlocks the mobile terminal, and enters non-owner's pattern, non-owner's pattern It refer to the pattern with preset second permission of non-owner after mobile terminal unlock;
Wherein, first permission is more than second permission.
2. according to the method described in claim 1, it is characterized in that, owner's pattern refer to mobile terminal unlock after, display The state of the pattern of hidden file and/or hiden application, the hidden file and/or hiden application is set in advance as hiding shape State;
Non- owner's pattern refers to the pattern of the hiding hidden file and/or hiden application after mobile terminal unlock.
3. according to the method described in claim 1, it is characterized in that, the biometric feature unlocking manner includes face unlock At least one of mode, unlocked by fingerprint mode, iris unlocking manner, vocal print unlocking manner.
4. according to the method described in claim 2, it is characterized in that, the method further includes:
Under non-owner's pattern, according to the instruction of the display hidden file and/or hiden application that receive, and in life After object identification feature is verified, the hidden file and/or hiden application are shown.
5. according to the method described in claim 1, it is characterized in that, the method further includes:
Under owner's pattern, is instructed according to the use of the first application added with application lock received, directly initiate institute State the first application added with application lock;
Under non-owner's pattern, instructed according to the use of the first application added with application lock received, and described After application lock is verified, start first application added with application lock.
6. according to the method described in claim 1, it is characterized in that, the method further includes:
Under owner's pattern or non-owner's pattern, instructed according to the use of the first application added with application lock, After the application lock is verified, start first application added with application lock.
7. according to the method described in claim 1, it is characterized in that, the method further includes:
Under owner's pattern, starts and log in need account number cipher second in application, directly second answering described in automated log on With described second applies and had logged on before entering the screen lock state, and the mobile terminal has automatically recorded the account Number password;
Under non-owner's pattern, start described second in application, prompt user's input account number cipher, is receiving correctly After account number cipher, second application is logged in.
8. according to the method described in claim 1, it is characterized in that, the mobile terminal is provided with owner's identification switch;
If the unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to the unlock input instruction It is biometric feature unlocking manner, then the mobile terminal is unlocked, and enters owner's pattern, including:
If the unlock input instruction is matched with default unlock instruction, when owner's identification switch is opened, and it is described Unlocking manner belonging to unlock input instruction is biometric feature unlocking manner, then is unlocked to the mobile terminal, and enter Owner's pattern;
If the unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to the unlock input instruction is not The biometric feature unlocking manner then unlocks the mobile terminal, and enters non-owner's pattern, including:
If the unlock input instruction is matched with default unlock instruction, when owner's identification switch is opened, and the unlock inputs Unlocking manner belonging to instruction is not the biometric feature unlocking manner, then is unlocked to the mobile terminal, and is entered non- Owner's pattern;
The method further includes:
If the unlock input instruction is matched with default unlock instruction, when owner's identification switch is closed, then to the shifting Dynamic terminal unlocking, and hide the hidden file and/or hiden application.
9. according to the method described in claim 2, it is characterized in that, the method further includes:
Under owner's pattern, the state that non-concealed file and/or non-concealed application is arranged is hidden state;
Or, under non-owner's pattern, if biometric feature is verified, owner's pattern is switched to;
Or, when shown on PC the application on the mobile terminal and/file when, hide the hidden file and/or Hiden application.
10. a kind of mobile terminal, which is characterized in that the mobile terminal includes:Processor, bio-identification circuit, leads to memory Believe circuit, display, the processor is respectively coupled to the memory, the bio-identification circuit, the telecommunication circuit, described Display, the processor, the memory, the bio-identification circuit, the telecommunication circuit, the display are at work It can realize the step in any one of claim 1-9 the methods.
11. a kind of device with store function, is stored thereon with program data, which is characterized in that described program data are located Manage the step realized when device executes in any one of claim 1-9 the methods.
CN201810052481.9A 2018-01-18 2018-01-18 Data guard method, mobile terminal and device Pending CN108460256A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810052481.9A CN108460256A (en) 2018-01-18 2018-01-18 Data guard method, mobile terminal and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810052481.9A CN108460256A (en) 2018-01-18 2018-01-18 Data guard method, mobile terminal and device

Publications (1)

Publication Number Publication Date
CN108460256A true CN108460256A (en) 2018-08-28

Family

ID=63221341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810052481.9A Pending CN108460256A (en) 2018-01-18 2018-01-18 Data guard method, mobile terminal and device

Country Status (1)

Country Link
CN (1) CN108460256A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109871672A (en) * 2019-01-21 2019-06-11 深圳市趣创科技有限公司 Method for secret protection and device on mobile terminal
CN110489941A (en) * 2019-08-20 2019-11-22 青岛海信移动通信技术股份有限公司 Terminal and processing method
CN111597528A (en) * 2019-02-21 2020-08-28 奇酷互联网络科技(深圳)有限公司 Information protection method of electronic equipment, electronic equipment and storage device
WO2021088272A1 (en) * 2019-11-04 2021-05-14 深圳传音控股股份有限公司 Application protection method, control device, and readable storage medium
WO2022257088A1 (en) * 2021-06-10 2022-12-15 深圳传音控股股份有限公司 Processing method, mobile terminal, and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101610309A (en) * 2009-06-26 2009-12-23 宇龙计算机通信科技(深圳)有限公司 A kind of portable terminal mode switch control method, system and portable terminal
CN101719955A (en) * 2009-11-26 2010-06-02 中山大学 Intelligent terminal system with fingerprint identification and information processing method
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment
CN104065823A (en) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 User mode control method and user mode control system based on iris recognition technology for mobile terminal
CN104077512A (en) * 2013-03-25 2014-10-01 腾讯科技(深圳)有限公司 Personnel information safety management method and management device
CN106372468A (en) * 2015-07-21 2017-02-01 腾讯科技(深圳)有限公司 Mobile terminal operation method and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101610309A (en) * 2009-06-26 2009-12-23 宇龙计算机通信科技(深圳)有限公司 A kind of portable terminal mode switch control method, system and portable terminal
CN101719955A (en) * 2009-11-26 2010-06-02 中山大学 Intelligent terminal system with fingerprint identification and information processing method
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment
CN104077512A (en) * 2013-03-25 2014-10-01 腾讯科技(深圳)有限公司 Personnel information safety management method and management device
CN104065823A (en) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 User mode control method and user mode control system based on iris recognition technology for mobile terminal
CN106372468A (en) * 2015-07-21 2017-02-01 腾讯科技(深圳)有限公司 Mobile terminal operation method and mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109871672A (en) * 2019-01-21 2019-06-11 深圳市趣创科技有限公司 Method for secret protection and device on mobile terminal
CN111597528A (en) * 2019-02-21 2020-08-28 奇酷互联网络科技(深圳)有限公司 Information protection method of electronic equipment, electronic equipment and storage device
CN110489941A (en) * 2019-08-20 2019-11-22 青岛海信移动通信技术股份有限公司 Terminal and processing method
WO2021088272A1 (en) * 2019-11-04 2021-05-14 深圳传音控股股份有限公司 Application protection method, control device, and readable storage medium
WO2022257088A1 (en) * 2021-06-10 2022-12-15 深圳传音控股股份有限公司 Processing method, mobile terminal, and storage medium

Similar Documents

Publication Publication Date Title
CN108460256A (en) Data guard method, mobile terminal and device
US20150033364A1 (en) Method and Apparatus for the Protection of Application Software
JP5727008B2 (en) Operating system unlocking method and mobile phone
CN103377332B (en) The method of access application and device
Sule et al. Cybersecurity through the lens of digital identity and data protection: issues and trends
US20160366588A1 (en) User mode control method and system based on iris recognition technology for mobile terminal
CN107038357A (en) User authority control method and mobile terminal
JP2011512580A (en) System and method for accessing tamper-resistant storage in a wireless communication device using biometric data
CN105760737A (en) Control method for applications and terminal
JP2018517960A (en) Privacy protection method and protection device for mobile terminal, and mobile terminal
WO2007097868A2 (en) Permitting multiple tasks requiring elevated rights
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN103645838A (en) Mobile terminal and unlocking method thereof
CN105512547A (en) Intelligent terminal privacy protection method and intelligent terminal privacy protection system
CN105701420A (en) Method for managing user data and terminal
CN106126994A (en) The user management method of a kind of mobile terminal and system
CN104267900A (en) Screen locking and unlocking method of custom personalized touch screen terminal
WO2016119341A1 (en) Method and device for implementing multi-user login mode, and computer storage medium
CN105703909A (en) Authentication method and electronic equipment
CN105516500B (en) Method and system for selecting equipment mode
CN106127005A (en) The user management method of a kind of mobile terminal and system
EP3369208A2 (en) Interception-proof authentication and encryption system and method
US9473936B2 (en) Method and device for protecting privacy information
CN106407760B (en) User terminal and application program hiding method
WO2018006349A1 (en) Method and system for verifying user entry based on picture password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180828

RJ01 Rejection of invention patent application after publication