CN108460256A - Data guard method, mobile terminal and device - Google Patents
Data guard method, mobile terminal and device Download PDFInfo
- Publication number
- CN108460256A CN108460256A CN201810052481.9A CN201810052481A CN108460256A CN 108460256 A CN108460256 A CN 108460256A CN 201810052481 A CN201810052481 A CN 201810052481A CN 108460256 A CN108460256 A CN 108460256A
- Authority
- CN
- China
- Prior art keywords
- owner
- pattern
- unlock
- application
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
This application discloses a kind of data guard method, mobile terminal and device, this method includes:When mobile terminal is in screen lock state, unlock input instruction is received;If unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to unlock input instruction is biometric feature unlocking manner, then is unlocked to mobile terminal, and enter owner's pattern, owner's pattern refers to the pattern with preset first permission of owner after mobile terminal unlock;If unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to unlock input instruction is not biometric feature unlocking manner, then is unlocked to mobile terminal, and enter non-owner's pattern, non- owner's pattern refers to the pattern with preset second permission of non-owner after mobile terminal unlock;Wherein, the first permission is more than the second permission.By the above-mentioned means, the application can enter the pattern with different rights, and easy to operate in the case where unlock user does not discover after so that mobile terminal is unlocked.
Description
Technical field
This application involves technical field of mobile terminals, more particularly to a kind of data guard method, mobile terminal and device.
Background technology
With popularizing for mobile terminal, people are higher and higher using the frequency of mobile terminal, but the thing followed is mobile
The safety problem of the information stored in terminal.
Currently, mobile terminal is only capable of protecting the unlatching safety of mobile terminal by screen-lock password, it can not be to movement
Specific data (such as privacy information) in terminal is further protected, and if after screen-lock password obtained by other people, Ta Renye
It is checked after capable of being unlocked to mobile terminal, therefore mobile terminal data safety is not high at present.Likewise, when screen-lock password is by him
After people borrows, important in customer mobile terminal, secret fileinfo has the risk of leakage.Existing solution includes:Individually
Encryption (download an encryption folder or move on to another space) or application lock (or file lock), when owner wants to check
When these secret files, need progress two steps operation that could enter in encryption folder.
But present inventor has found in long-term R&D process, encryption folder application is shown on the table,
It is be easy to cause a kind of obscure hint, implies that owner has secret, and owner uses the operating process of encryption folder application excessively
It is cumbersome.
Invention content
The application is mainly solving the technical problems that provide a kind of data guard method, mobile terminal and device, Neng Gou
In the case that unlock user does not discover, enter the pattern with different rights after so that mobile terminal is unlocked, and easy to operate.
In order to solve the above technical problems, the technical solution that the application uses is:A kind of data guard method, institute are provided
The method of stating includes:When mobile terminal is in screen lock state, unlock input instruction is received;If the unlock input is instructed and is preset
Unlock instruction matches, and the unlocking manner belonging to the unlock input instruction is biometric feature unlocking manner, then to described
Mobile terminal unlocks, and enters owner's pattern, and owner's pattern refers to after mobile terminal unlocks, having owner preset first
The pattern of permission;If the unlock input instruction is matched with default unlock instruction, and the unlock belonging to the unlock input instruction
Mode is not the biometric feature unlocking manner, then is unlocked to the mobile terminal, and enters non-owner's pattern, described non-
Owner's pattern refers to the pattern with preset second permission of non-owner after mobile terminal unlock;Wherein, first permission is big
In second permission.
In order to solve the above technical problems, another technical solution that the application uses is:A kind of mobile terminal is provided, it is described
Mobile terminal includes:Processor, memory, bio-identification circuit, telecommunication circuit, display, the processor are respectively coupled to institute
State memory, the bio-identification circuit, the telecommunication circuit, the display, it is the processor, the memory, described
Bio-identification circuit, the telecommunication circuit, the display can realize the step in method as described above at work.
In order to solve the above technical problems, another technical solution that the application uses is:It provides a kind of with store function
Device, be stored thereon with program data, described program data realize the step in method as described above when being executed by processor.
The advantageous effect of the application is:The case where being different from the prior art, the application are in screen lock state in mobile terminal
When, receive unlock input instruction;If the unlock input instruction is matched with default unlock instruction, and unlock input instruction institute
The unlocking manner of category is biometric feature unlocking manner, then is unlocked to the mobile terminal, and enters owner's pattern, the machine
Holotype refers to the pattern with preset first permission of owner after mobile terminal unlock;If unlock input instruction with it is pre-
If unlock instruction matches, and the unlocking manner belonging to the unlock input instruction is not the biometric feature unlocking manner,
Then the mobile terminal is unlocked, and enters non-owner's pattern, non-owner's pattern refers to after mobile terminal unlocks, having non-
The pattern of preset second permission of owner;Wherein, first permission is more than second permission.Due to biometric feature solution
Lock mode is difficult to by the people except owner using unlocking mobile terminal, when unlock input instruction is matched with default unlock instruction,
And belong to biometric feature unlocking manner, it may be determined that be owner's identity, unlock the simultaneously big owner's pattern of access entitlements, work as solution
Lock input instruction is matched with default unlock instruction, and is not belonging to biometric feature unlocking manner, it may be determined that is not owner's body
Part, unlock and the small non-owner's pattern of access entitlements, in this way, can unlock user do not discover in the case of,
Enter the pattern with different rights after so that mobile terminal is unlocked, and easy to operate.
Description of the drawings
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present application, for
For those of ordinary skill in the art, without creative efforts, other are can also be obtained according to these attached drawings
Attached drawing.Wherein:
Fig. 1 is the flow diagram of one embodiment of the application data guard method;
Fig. 2 is the structural schematic diagram of one embodiment of the application mobile terminal;
Fig. 3 is the structural schematic diagram for one embodiment of device that the application has store function.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, rather than whole embodiments.Based on this
Embodiment in application, those of ordinary skill in the art are obtained every other under the premise of not making performing creative labour
Embodiment shall fall in the protection scope of this application.
Refering to fig. 1, Fig. 1 is the flow diagram of one embodiment of the application data guard method, and this method includes:
Step S101:When mobile terminal is in screen lock state, unlock input instruction is received.
Step S102:If unlock input instruction is matched with default unlock instruction, and unlocks the unlock side belonging to input instruction
Formula is biometric feature unlocking manner, then is unlocked to mobile terminal, and enters owner's pattern, and owner's pattern refers to mobile terminal
After unlock, the pattern with preset first permission of owner.
Step S103:If unlock input instruction is matched with default unlock instruction, and unlocks the unlock side belonging to input instruction
Formula is not biometric feature unlocking manner, then is unlocked to mobile terminal, and enters non-owner's pattern, and non-owner's pattern refers to moving
After dynamic terminal unlocking, the pattern with preset second permission of non-owner;Wherein, the first permission is more than the second permission.
In present embodiment, there are many modes of unlock screen for mobile terminal setting, such as including face unlock, fingerprint solution
Lock, password unlock, gesture unlock etc., while user setting at least one biometric feature unlocking manner is needed, such as:Face
Unlock, unlocked by fingerprint, iris unlock, vocal print unlock, etc., and at least one conventional unlocking manner, such as:Password unlock,
Gesture unlock, etc..
In the present embodiment, owner's pattern refers to preset with owner's identity, when unlock input instruction and default unlock
Instructions match, and when belonging to biometric feature unlocking manner, the mould with the first permission entered after mobile terminal unlock
Formula.Non- owner's pattern refers to preset with non-owner's identity, is matched with default unlock instruction when unlock input is instructed, and is not belonging to
When biometric feature unlocking manner, the pattern with the second permission that is entered after mobile terminal unlock, wherein the first permission
More than the second permission.For example, mobile terminal include file 1, file 2, file 1, file 2, using 1, using 2, and it is literary
Part 2, file 1 are redefined for hiding using 2 attributes, at this point, under owner's pattern, display file 1, file 2, file
Folder 1, file 2, using 1, using 2, etc., under non-owner's pattern, display file 1, file 2, using 1, etc. hide text
Part 2, file 1, using 2, etc.;For another example, under owner's pattern, address list, instant messaging chat record, etc. can be opened,
Under non-owner's pattern, forbid opening address list, instant messaging chat record, etc..
For mobile terminal, the permission of general owner's identity is the largest after manufacture, and the permission of non-owner's identity is
It is less than the permission of owner's identity.Biometric feature is can be known with the feature of unique identification user, the biology of each user
Other feature has uniqueness, is different from, therefore, biometric feature unlocking manner is distinguished owner's identity and non-owner's body
Part, and into the pattern of different rights, this mode be difficult to that unlock user is made to discover after mobile terminal unlock.
When mobile terminal is in screen lock state, if user needs to unlock mobile terminal, input unlock input refers to
It enables, if unlock input instruction is matched with unlocking manner preset in mobile terminal, mobile terminal can be unlocked, and further
Judge whether this unlocking manner is biometric feature unlocking manner, if (e.g., this unlock is face unlock, fingerprint solution
One kind in lock, iris unlock, vocal print unlock etc.), then judge to unlock user for owner's identity, in this case, unlock is used
Family can only be owner, enter owner's pattern after mobile terminal unlock;(e.g., this unlock is gesture unlock, password solution if not
One kind in lock etc.), then judge to unlock user for non-owner's identity, in this case, unlock user may be owner,
It may not be owner, enter non-owner's pattern after mobile terminal unlock.
The application receives unlock input instruction when mobile terminal is in screen lock state;If unlock input is instructed and is preset
Unlock instruction matches, and the unlocking manner unlocked belonging to input instruction is biometric feature unlocking manner, then to mobile terminal
Unlock, and enter owner's pattern, owner's pattern refers to the pattern with preset first permission of owner after mobile terminal unlock;
If unlock input instruction is matched with default unlock instruction, and the unlocking manner unlocked belonging to input instruction is not biometric feature
Unlocking manner then unlocks mobile terminal, and enters non-owner's pattern, and non-owner's pattern refers to after mobile terminal unlocks, having
The pattern of non-preset second permission of owner;Wherein, the first permission is more than the second permission.Due to biometric feature unlocking manner
It is difficult to by the people except owner using unlocking mobile terminal, when unlock input instruction is matched with default unlock instruction, and belongs to
Biometric feature unlocking manner, it may be determined that be owner's identity, unlock the simultaneously big owner's pattern of access entitlements, when unlock inputs
Instruction is matched with default unlock instruction, and is not belonging to biometric feature unlocking manner, it may be determined that and it is not owner's identity, unlock
And non-owner's pattern that access entitlements are small can make mobile whole in this way in the case where unlock user does not discover
Enter the pattern with different rights after the unlock of end, and easy to operate.
In one embodiment, after owner's pattern refers to mobile terminal unlock, hidden file and/or hiden application are shown
The state of pattern, hidden file and/or hiden application is set in advance as hidden state;Non- owner's pattern refers to mobile terminal unlock
Afterwards, the pattern of the hidden file and/or hiden application is hidden.
In the present embodiment, some are not intended to the hidden file and/or hidden shown to other people by owner in advance
The state for hiding application is set as hidden state.If it is owner's identity to unlock user, that is, enters owner's pattern, then can show hidden
Tibetan language part and/or hiden application enter non-owner's pattern if unlock user is not owner's identity, then hide these and hide
File and/or hiden application.In this way, the safety that can improve private data, is difficult to be aware, and operates letter
It is single, convenient.
Further, under non-owner's pattern, according to the instruction of the display hidden file and/or hiden application that receive, and
After biometric feature is verified, hidden file and/or hiden application are shown.
In the present embodiment, under non-owner's pattern, hidden file and/or hiden application stash, this
Shi Ruguo mobile terminals receive the instruction of display hidden file and/or hiden application, then user can be required to carry out biological knowledge
Other signature verification then shows hidden file and/or hiden application after biometric feature is verified, if bio-identification
Signature verification is not over showing hidden file and/or hiden application still then.Such as:Owner is with non-owner's identity
Unlock when then needing to show hidden file and/or hiden application, can pass through bio-identification into non-owner's pattern
Feature is verified, after being verified, you can display hidden file and/or hiden application;If non-owner is with non-owner
Identity unlocks, and is the verification being difficult to through biometric feature into non-owner's pattern, cannot require display hidden file
And/or hiden application.In this way, it on the one hand can ensure the safety of hidden file and/or hiden application, another party
Face can still meet this Man's Demands of owner under non-owner's pattern, hidden file and/or hiden application be shown, to carry
Rise user experience.
For adding the application of application lock, equally there is different places in owner's pattern and non-owner's pattern in present embodiment
Reason strategy, is described as follows:
Under owner's pattern, is instructed according to the use of the first application added with application lock received, directly initiate and add
Added with the first application of application lock;Under non-owner's pattern, according to the use of the first application added with application lock received
Instruction, and after application lock is verified, start the first application added with application lock.
If mobile terminal judges to unlock user for owner's identity, into owner's pattern, for first added with application lock
Using user needs in use, entrance can be directly initiated, i.e., without inputting password authentification, if judging to unlock user for non-machine
Owner identification is asked to start first added with application lock in user and first is answered in application, starting this every time into non-owner's pattern
With being required for unlocking, until the application lock of first application is turned off manually in user.In this way, it on the one hand can facilitate machine
Main I is directly applied using first added with application lock, on the other hand, it is ensured that the first application added with application lock
It is safe to use.
Certainly, in practical application, if the user thinks that:The safe to use of first application will be prior to the use of the first application
Convenience then can not also distinguish owner's pattern for the first application added with application lock and non-owner's pattern is required for password
Verification.I.e. under owner's pattern or non-owner's pattern, instructed according to the use of the first application added with application lock, in application lock
After being verified, start the first application added with application lock.
After the first application unlock, the first application when backstage retains, is again introduced into without verification, cleaning backstage the always
After one application, it is again turned on the first application, still needs to verify again, with the first application of unlock.
In one embodiment, the second of account password is needed to apply login, into the mode of the second application, in machine
Holotype and non-owner's pattern equally have different processing strategies, i.e.,:
Under owner's pattern, starts and log in need account number cipher second in application, directly automated log on second is applied, the
Two apply and are had logged on before entering screen lock state, and mobile terminal has automatically recorded account number cipher;Under non-owner's pattern,
Start second in application, prompt user inputs account number cipher, after receiving correct account number cipher, login second is applied.
In the present embodiment, specific second application, such as the wechat of user, QQ, Taobao, payment can be preset
The applications such as treasured, Jingdone district.If mobile terminal judges to unlock user for owner's identity, into owner's pattern, start second in application, can
Direct automated log on simultaneously enters the second application;If judging to unlock user for non-owner's identity, into non-owner's pattern, every time into
Enter second in application, will not automated log on, need input account number cipher can just enter, that is, prompt user input account number cipher,
After receiving correct account number cipher, the second application is logged in.In this way, non-owner user can be avoided using machine
Second account is applied using owner when master mobile terminal, further promotes safety and the private data of the second application account
Safety.Further, the second application can be the preset important application of user, such as wechat in the embodiment of the present invention,
QQ etc. can also be the application for the application type for being related to privacy of user that system automatically determines, for example, instant messaging application, postal
Part application, forum apply, social networking application, need to log in the application using account in the application types such as Dropbox application.
In the present embodiment, mobile terminal is provided with owner's identification switch;Such as:In " the setting-peace of mobile terminal
In entirely ", owner's identification switch can be provided, when owner's identification switch is opened, just meeting cognitron owner identification, identifies in owner
When switch is closed, the identification without owner's identity.In the identification without owner's identity, no matter user passes through any mode
Unlock enters mobile terminal, all remains the state of pre-set hidden file and/or hiden application in mobile terminal hidden
Tibetan state.It is specific to be:
If unlock input instruction is matched with default unlock instruction, when owner's identification switch is opened, and input instruction is unlocked
Affiliated unlocking manner is biometric feature unlocking manner, then is unlocked to mobile terminal, and enters owner's pattern;If unlock is defeated
Enter instruction to match with default unlock instruction, when owner's identification switch is opened, and unlocks the unlocking manner belonging to input instruction not
It is biometric feature unlocking manner, then mobile terminal is unlocked, and enters non-owner's pattern;If unlock input is instructed and is preset
Unlock instruction matches, when owner's identification switch is closed, no matter the unlocking manner belonging to unlock input instruction is that biology is known
Other feature unlocking manner unlocks mobile terminal, and hides the hidden file and/or hiden application.
By the above-mentioned means, can with flexible meet the different demands of user in varied situations, can both meet
Demand of the user to the safety of private data, and the demand of flexibility of the user to setting can be met, to promote user
Experience.
In one embodiment, this method further includes:Under owner's pattern, non-concealed file is set and/or non-concealed is answered
State is hidden state;Or, under non-owner's pattern, if biometric feature is verified, owner's pattern is switched to;
Or, when showing the application on mobile terminal and/file on PC, the hidden file and/or hiden application are hidden.
In present embodiment, the shape of non-concealed application and/or non-concealed file can also be arranged in user under owner's pattern
State is hidden state, and after setting, in application house keeper, desktop, file can be hidden for these applications and/or file, so as to
When non-owner's unlock enters mobile terminal, these applications and/or file are hidden.In non-owner's pattern, it can not be arranged or change
Using and/or file dispaly state, certainly, owner enters in the applications such as picture library, short message, contact person, file management, selection
It " display is all ", can be by biometric feature of input owner, such as input face, fingerprint, iris, vocal print, etc., just
Really after input, the file being hidden can be shown.In addition, user can also be switched to machine by inputting the biometric feature of owner
Holotype, the dispaly state of modify, adjust application and/or file.In order to further ensure the safety of hidden file, when
When mobile terminal connects PC PC by data line, hiden application and/or hidden file are also hidden on PC PC
It hides.
It is the structural schematic diagram of one embodiment of the application mobile terminal referring to Fig. 2, Fig. 2, mobile terminal includes:Processor
401, memory 402, bio-identification circuit 403, telecommunication circuit 404 and display 405, processor 401 are respectively coupled to store
Device 402, bio-identification circuit 403, telecommunication circuit 404 and display 405, wherein processor 401, memory 402, biology
Identification circuit 403, telecommunication circuit 404 and display 405 can realize the step in as above any one method at work.Phase
Hold inside the Pass and refers to above method part, it is no longer superfluous herein to chat.Bio-identification is special in the embodiment of above-mentioned data guard method
When sign unlocking manner includes unlocked by fingerprint mode, the bio-identification circuit 403 of the mobile terminal is fingerprint input circuit, should
Fingerprint input circuit couples the processor 401.
It is the structural schematic diagram for one embodiment of device that the application has store function, the device 50 referring to Fig. 3, Fig. 3
It is stored thereon with program data 501, the step in as above any one method is realized when program data 501 is executed by processor.Phase
Hold inside the Pass and refers to above method part, it is no longer superfluous herein to chat.
The foregoing is merely presently filed embodiments, are not intended to limit the scope of the claims of the application, every to utilize this
Equivalent structure or equivalent flow shift made by application specification and accompanying drawing content, it is relevant to be applied directly or indirectly in other
Technical field includes similarly in the scope of patent protection of the application.
Claims (11)
1. a kind of data guard method, which is characterized in that the method includes:
When mobile terminal is in screen lock state, unlock input instruction is received;
If the unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to the unlock input instruction is raw
Object identification feature unlocking manner then unlocks the mobile terminal, and enters owner's pattern, and owner's pattern refers to mobile whole
After the unlock of end, the pattern with preset first permission of owner;
If the unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to the unlock input instruction is not
The biometric feature unlocking manner then unlocks the mobile terminal, and enters non-owner's pattern, non-owner's pattern
It refer to the pattern with preset second permission of non-owner after mobile terminal unlock;
Wherein, first permission is more than second permission.
2. according to the method described in claim 1, it is characterized in that, owner's pattern refer to mobile terminal unlock after, display
The state of the pattern of hidden file and/or hiden application, the hidden file and/or hiden application is set in advance as hiding shape
State;
Non- owner's pattern refers to the pattern of the hiding hidden file and/or hiden application after mobile terminal unlock.
3. according to the method described in claim 1, it is characterized in that, the biometric feature unlocking manner includes face unlock
At least one of mode, unlocked by fingerprint mode, iris unlocking manner, vocal print unlocking manner.
4. according to the method described in claim 2, it is characterized in that, the method further includes:
Under non-owner's pattern, according to the instruction of the display hidden file and/or hiden application that receive, and in life
After object identification feature is verified, the hidden file and/or hiden application are shown.
5. according to the method described in claim 1, it is characterized in that, the method further includes:
Under owner's pattern, is instructed according to the use of the first application added with application lock received, directly initiate institute
State the first application added with application lock;
Under non-owner's pattern, instructed according to the use of the first application added with application lock received, and described
After application lock is verified, start first application added with application lock.
6. according to the method described in claim 1, it is characterized in that, the method further includes:
Under owner's pattern or non-owner's pattern, instructed according to the use of the first application added with application lock,
After the application lock is verified, start first application added with application lock.
7. according to the method described in claim 1, it is characterized in that, the method further includes:
Under owner's pattern, starts and log in need account number cipher second in application, directly second answering described in automated log on
With described second applies and had logged on before entering the screen lock state, and the mobile terminal has automatically recorded the account
Number password;
Under non-owner's pattern, start described second in application, prompt user's input account number cipher, is receiving correctly
After account number cipher, second application is logged in.
8. according to the method described in claim 1, it is characterized in that, the mobile terminal is provided with owner's identification switch;
If the unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to the unlock input instruction
It is biometric feature unlocking manner, then the mobile terminal is unlocked, and enters owner's pattern, including:
If the unlock input instruction is matched with default unlock instruction, when owner's identification switch is opened, and it is described
Unlocking manner belonging to unlock input instruction is biometric feature unlocking manner, then is unlocked to the mobile terminal, and enter
Owner's pattern;
If the unlock input instruction is matched with default unlock instruction, and the unlocking manner belonging to the unlock input instruction is not
The biometric feature unlocking manner then unlocks the mobile terminal, and enters non-owner's pattern, including:
If the unlock input instruction is matched with default unlock instruction, when owner's identification switch is opened, and the unlock inputs
Unlocking manner belonging to instruction is not the biometric feature unlocking manner, then is unlocked to the mobile terminal, and is entered non-
Owner's pattern;
The method further includes:
If the unlock input instruction is matched with default unlock instruction, when owner's identification switch is closed, then to the shifting
Dynamic terminal unlocking, and hide the hidden file and/or hiden application.
9. according to the method described in claim 2, it is characterized in that, the method further includes:
Under owner's pattern, the state that non-concealed file and/or non-concealed application is arranged is hidden state;
Or, under non-owner's pattern, if biometric feature is verified, owner's pattern is switched to;
Or, when shown on PC the application on the mobile terminal and/file when, hide the hidden file and/or
Hiden application.
10. a kind of mobile terminal, which is characterized in that the mobile terminal includes:Processor, bio-identification circuit, leads to memory
Believe circuit, display, the processor is respectively coupled to the memory, the bio-identification circuit, the telecommunication circuit, described
Display, the processor, the memory, the bio-identification circuit, the telecommunication circuit, the display are at work
It can realize the step in any one of claim 1-9 the methods.
11. a kind of device with store function, is stored thereon with program data, which is characterized in that described program data are located
Manage the step realized when device executes in any one of claim 1-9 the methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810052481.9A CN108460256A (en) | 2018-01-18 | 2018-01-18 | Data guard method, mobile terminal and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810052481.9A CN108460256A (en) | 2018-01-18 | 2018-01-18 | Data guard method, mobile terminal and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108460256A true CN108460256A (en) | 2018-08-28 |
Family
ID=63221341
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810052481.9A Pending CN108460256A (en) | 2018-01-18 | 2018-01-18 | Data guard method, mobile terminal and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108460256A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109871672A (en) * | 2019-01-21 | 2019-06-11 | 深圳市趣创科技有限公司 | Method for secret protection and device on mobile terminal |
CN110489941A (en) * | 2019-08-20 | 2019-11-22 | 青岛海信移动通信技术股份有限公司 | Terminal and processing method |
CN111597528A (en) * | 2019-02-21 | 2020-08-28 | 奇酷互联网络科技(深圳)有限公司 | Information protection method of electronic equipment, electronic equipment and storage device |
WO2021088272A1 (en) * | 2019-11-04 | 2021-05-14 | 深圳传音控股股份有限公司 | Application protection method, control device, and readable storage medium |
WO2022257088A1 (en) * | 2021-06-10 | 2022-12-15 | 深圳传音控股股份有限公司 | Processing method, mobile terminal, and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101610309A (en) * | 2009-06-26 | 2009-12-23 | 宇龙计算机通信科技(深圳)有限公司 | A kind of portable terminal mode switch control method, system and portable terminal |
CN101719955A (en) * | 2009-11-26 | 2010-06-02 | 中山大学 | Intelligent terminal system with fingerprint identification and information processing method |
CN102375651A (en) * | 2010-08-13 | 2012-03-14 | Tcl集团股份有限公司 | Method for unlocking portable electronic equipment |
CN104065823A (en) * | 2014-06-30 | 2014-09-24 | 惠州Tcl移动通信有限公司 | User mode control method and user mode control system based on iris recognition technology for mobile terminal |
CN104077512A (en) * | 2013-03-25 | 2014-10-01 | 腾讯科技(深圳)有限公司 | Personnel information safety management method and management device |
CN106372468A (en) * | 2015-07-21 | 2017-02-01 | 腾讯科技(深圳)有限公司 | Mobile terminal operation method and mobile terminal |
-
2018
- 2018-01-18 CN CN201810052481.9A patent/CN108460256A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101610309A (en) * | 2009-06-26 | 2009-12-23 | 宇龙计算机通信科技(深圳)有限公司 | A kind of portable terminal mode switch control method, system and portable terminal |
CN101719955A (en) * | 2009-11-26 | 2010-06-02 | 中山大学 | Intelligent terminal system with fingerprint identification and information processing method |
CN102375651A (en) * | 2010-08-13 | 2012-03-14 | Tcl集团股份有限公司 | Method for unlocking portable electronic equipment |
CN104077512A (en) * | 2013-03-25 | 2014-10-01 | 腾讯科技(深圳)有限公司 | Personnel information safety management method and management device |
CN104065823A (en) * | 2014-06-30 | 2014-09-24 | 惠州Tcl移动通信有限公司 | User mode control method and user mode control system based on iris recognition technology for mobile terminal |
CN106372468A (en) * | 2015-07-21 | 2017-02-01 | 腾讯科技(深圳)有限公司 | Mobile terminal operation method and mobile terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109871672A (en) * | 2019-01-21 | 2019-06-11 | 深圳市趣创科技有限公司 | Method for secret protection and device on mobile terminal |
CN111597528A (en) * | 2019-02-21 | 2020-08-28 | 奇酷互联网络科技(深圳)有限公司 | Information protection method of electronic equipment, electronic equipment and storage device |
CN110489941A (en) * | 2019-08-20 | 2019-11-22 | 青岛海信移动通信技术股份有限公司 | Terminal and processing method |
WO2021088272A1 (en) * | 2019-11-04 | 2021-05-14 | 深圳传音控股股份有限公司 | Application protection method, control device, and readable storage medium |
WO2022257088A1 (en) * | 2021-06-10 | 2022-12-15 | 深圳传音控股股份有限公司 | Processing method, mobile terminal, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108460256A (en) | Data guard method, mobile terminal and device | |
US20150033364A1 (en) | Method and Apparatus for the Protection of Application Software | |
JP5727008B2 (en) | Operating system unlocking method and mobile phone | |
CN103377332B (en) | The method of access application and device | |
Sule et al. | Cybersecurity through the lens of digital identity and data protection: issues and trends | |
US20160366588A1 (en) | User mode control method and system based on iris recognition technology for mobile terminal | |
CN107038357A (en) | User authority control method and mobile terminal | |
JP2011512580A (en) | System and method for accessing tamper-resistant storage in a wireless communication device using biometric data | |
CN105760737A (en) | Control method for applications and terminal | |
JP2018517960A (en) | Privacy protection method and protection device for mobile terminal, and mobile terminal | |
WO2007097868A2 (en) | Permitting multiple tasks requiring elevated rights | |
CN106936999A (en) | Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently | |
CN103645838A (en) | Mobile terminal and unlocking method thereof | |
CN105512547A (en) | Intelligent terminal privacy protection method and intelligent terminal privacy protection system | |
CN105701420A (en) | Method for managing user data and terminal | |
CN106126994A (en) | The user management method of a kind of mobile terminal and system | |
CN104267900A (en) | Screen locking and unlocking method of custom personalized touch screen terminal | |
WO2016119341A1 (en) | Method and device for implementing multi-user login mode, and computer storage medium | |
CN105703909A (en) | Authentication method and electronic equipment | |
CN105516500B (en) | Method and system for selecting equipment mode | |
CN106127005A (en) | The user management method of a kind of mobile terminal and system | |
EP3369208A2 (en) | Interception-proof authentication and encryption system and method | |
US9473936B2 (en) | Method and device for protecting privacy information | |
CN106407760B (en) | User terminal and application program hiding method | |
WO2018006349A1 (en) | Method and system for verifying user entry based on picture password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180828 |
|
RJ01 | Rejection of invention patent application after publication |