CN108537025A - Method for secret protection and device, computer readable storage medium, terminal - Google Patents
Method for secret protection and device, computer readable storage medium, terminal Download PDFInfo
- Publication number
- CN108537025A CN108537025A CN201810274185.3A CN201810274185A CN108537025A CN 108537025 A CN108537025 A CN 108537025A CN 201810274185 A CN201810274185 A CN 201810274185A CN 108537025 A CN108537025 A CN 108537025A
- Authority
- CN
- China
- Prior art keywords
- terminal
- biological characteristic
- holder
- secret protection
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
This application involves a kind of method for secret protection and device, computer readable storage medium, terminal.This method includes:Multiple preset use environments are set for terminal, and configure testing conditions;When terminal meets the feature of a use environment in multiple preset use environments, if terminal is in use state, the biological characteristic of acquisition terminal holder;When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, terminal is subjected to secret protection processing.By after judging use environment, the biological characteristic of acquisition terminal holder in use, and collected biological characteristic is matched with preset biological characteristic, ensure the use of terminal be it is legal either be authorized to use, to effectively prevent terminal surprisingly shift user when caused by privacy leakage.
Description
Technical field
This application involves field of terminal technology, more particularly to a kind of method for secret protection and device, computer-readable deposit
Storage media, terminal.
Background technology
As terminal device enters the intelligent epoch, the mobile terminals such as mobile phone, communication tablet are played the part of more in people's lives
Carry out more important role.By various software applications, people can be met in social, shopping, amusement, work, study etc.
Different demands.
Currently, the secret protection demand of intelligent terminal is more and more, and become increasingly complex, cannot meet various multiple
The secret protection demand of demand under miscellaneous scene, especially terminal after surprisingly shifting.
Invention content
A kind of method for secret protection of the embodiment of the present application offer and device, computer readable storage medium, terminal, to meet
Prevent terminal privacy leakage after surprisingly shifting.
A kind of method for secret protection is applied to terminal, the method includes:
Multiple preset use environments are set for terminal, and configure testing conditions;
When terminal meets the feature of a use environment in multiple preset use environments, if terminal, which is in, uses shape
State, the biological characteristic of acquisition terminal holder;
When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, terminal is subjected to privacy
Protection is handled.
A kind of privacy protection device, including:
Use environment configuration module for multiple preset use environments to be arranged for terminal, and configures corresponding detector bar
Part;
Physical characteristics collecting module, the spy for meeting a use environment in multiple preset use environments when terminal
When sign, if terminal is in use state, the biological characteristic of acquisition terminal holder;
Secret protection processing module, biological characteristic and preset biological characteristic for working as collected holder terminal are not
When matching, terminal is subjected to secret protection processing.
A kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of the method in each embodiment of the application is realized when being executed by processor.
A kind of terminal, including memory, processor and storage are on a memory and the computer that can run on a processor
Program, which is characterized in that the processor realizes the side in each embodiment of the application when executing the computer program
The step of method.
Method for secret protection and device that the embodiment of the present application is provided, computer readable storage medium, terminal, by
After judging use environment, the biological characteristic of acquisition terminal holder in use, and by collected biological characteristic with it is pre-
If biological characteristic matched, it is ensured that the use of terminal be it is legal either be authorized to use, to effectively prevent end
End privacy leakage caused by when surprisingly shifting user.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is the terminal inner structural schematic diagram in one embodiment;
Fig. 2 is the flow chart of the method for secret protection in one embodiment;
Fig. 3 is the process chart of the default use environment of setting in one embodiment;
Fig. 4 is the flow chart of the method for secret protection in another embodiment;
Fig. 5 is the flow chart of the method for secret protection in another embodiment;
Fig. 6 is the flow chart of the method for secret protection in further embodiment;
Fig. 7 is the structure diagram of the privacy protection device in an embodiment;
Fig. 8 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and
It is not used in restriction the application.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe herein various elements,
But these elements should not be limited by these terms.These terms are only used to distinguish first element and another element.
In one embodiment, as shown in Figure 1, providing a kind of internal structure schematic diagram of terminal.The terminal includes logical
Cross processor, memory and the display screen of system bus connection.Wherein, the processor is for providing calculating and control ability, branch
Support the operation of entire terminal.Memory for storing data, program, and/or instruction code etc., stored on memory at least one
Computer program, the computer program can be executed by processor, to realize that is provided in the embodiment of the present application is suitable for terminal
Method for secret protection.Memory may include that magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. are non-easily
The property lost storage medium or random access memory (Random-Access-Memory, RAM) etc..For example, in one embodiment
In, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system, database
And computer program.A kind of method for secret protection phase provided for realizing above each embodiment is provided in the database
The data of pass, for example default processing strategy or default verification information can be stored etc..The computer program can performed by processor,
For realizing a kind of method for secret protection that each embodiment of the application is provided.Built-in storage is non-volatile memory medium
In operating system, database and computer program the running environment of cache is provided.Display screen can be touch screen, such as
For capacitance plate or electrical screen, it to be used for the interface information of display terminal.The terminal can be mobile phone, tablet computer or individual digital
Assistant or Wearable etc..
Method for secret protection in the present embodiment is described for running in terminal.The method for secret protection
Applied to terminal, and it specifically can be adapted for the scene that terminal changes user.
In the application, terminal change user specifically refers to terminal and is transferred to other user from a user,
May include:Owner by mobile phone to known people use, owner by mobile phone to be not familiar with or stranger use, lost mobile phone
Grabbed when in use by stranger's use, mobile phone afterwards etc..In rear several scenes, the privacy of owner, which all suffers from, to be leaked
Problem.
The scheme of secret protection is carried out when being shifted between different users this application involves terminal.
The method for secret protection of one embodiment of the application is as shown in Fig. 2, including step 202 to step 206.
Step 202:Multiple preset use environments are set for terminal, and configure testing conditions.Terminal is configured,
The multiple possible use environments of prior typing wherein.These use environments are that possible need or not need for users
Carry out the use environment of secret protection.The preset use environment can be that system provides, recommends or made by oneself by user
Justice.
When configuring use environment, needs cooperation to provide corresponding testing conditions, that is, confirm the testing conditions of use environment.
Testing conditions may come from the system detectio function that terminal is capable of providing, to obtain system detectio parameter, including but not limited to
The illumination letter of location information, light sensor offer that posture information, GPS sensor or the communication module that gyroscope provides provide
The touch information and press that breath, the finger print information of fingerprint module offer, the image information of imaging sensor offer, touch screen provide
The key information etc. that key provides.
In some embodiments, the correspondence of use environment and testing conditions may include at least one of:
When terminal connects and use family wifi or geographical location to be near residence in preset range, used for family
Environment;It is public use environment when terminal connects and use public wifi or geographical location is in public activity region.This
A little use environments are mainly distinguished from the position where terminal, and wherein home environment has obvious privacy.It needs
The demand for carrying out secret protection is little.And work as terminal in non-common use environment in use, carrying out the demand of secret protection
It is then larger.
Step 204:When terminal meets the feature of a use environment in multiple preset use environments, and in terminal
When in use state, the biological characteristic of acquisition terminal holder.The use state of terminal refers to the shape after unlock in this application
State may include desktop state, the Application Program Interface state after unlock, the setting interface state after unlock etc. after unlock;
It can also be including mobile phone by the state after receiving incoming call and connection under screen lock state.It in a state of use, can be with operating terminal
All or part of function, such as open application, browse information, take phone etc.;Obtain terminal part or the number of whole
According to, such as check photograph album, short message, contact person etc..
Holder terminal, it can be understood as the use for being currently being operated, holding terminal or having operating terminal condition
Person.Holder terminal is not limited to the user of handheld terminal.Terminal is determined eventually by perception to environment and use state synthesis
Hold holder.Such as terminal is held, screen is contacted, have in imaging sensor close shot character image, using voice communication, make
With earphone etc..
When terminal is in use state, the various sensors that can have by it are obtained about holder terminal
Biological characteristic.These sensors may include:Face recognition sensor (such as the identification of 3D face recognitions, face-image), iris
Sensor, fingerprint sensor (screen lower fingerprint, back fingerprint, side fingerprint etc.), microphone and earphone etc..It is corresponding to it, this
A little biological characteristics may include in facial characteristics, iris feature, fingerprint characteristic, vocal print feature and ear line feature it is a kind of with
On.
During gatherer process can be happened at holder terminal using terminal, and in a manner of imperceptible into
Row.Such as when holder terminal is when clicking screen, can passing through screen, fingerprint sensor obtains fingerprint characteristic down;When terminal is held
When browsing screen content, front camera can obtain its face-image and then obtain facial characteristics person;Work as holder terminal
When call, its vocal print feature is obtained;When holder terminal is listened to music using earphone, its ear line feature is obtained.
Step 206:When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, by terminal
Carry out secret protection processing.
Preset biological characteristic may include one in one or more of a kind of biological characteristic, multiclass biological characteristic
Or it is multiple.Such as it can only include fingerprint characteristic, facial characteristics, iris feature, vocal print feature and the ear line of owner in terminal
One or more of feature;Or fingerprint characteristic, facial characteristics, iris feature, the vocal print in terminal including multiple users are special
One or more of sign and ear line feature.
When carrying out the matching of biological characteristic, carried out according to preset matching condition.Preset matching condition may include:
Collected any biological characteristic whether there is with preset biological characteristic to be matched;Such as fingerprint characteristic whether there is
Matching or facial characteristics whether there is matching with the presence or absence of matching or vocal print feature.
Collected arbitrary at least two inhomogeneous biological characteristic is matched with whether preset biological characteristic exists simultaneously;
Such as fingerprint characteristic and face are characterized in no existing simultaneously matching or fingerprint characteristic and vocal print is characterized in no exist simultaneously
Match or facial characteristics and vocal print are characterized in no existing simultaneously matching;
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of match, and also collect it is arbitrary separately
One inhomogeneous biological characteristic whether there is with preset biological characteristic to be matched;Such as specified fingerprint characteristic is must to acquire simultaneously
Matched biological characteristic, and another inhomogeneous biological characteristic is coordinated to be confirmed.
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of matching, and is adopted within the set time
Collect the specified biological characteristic and preset biological characteristic with the presence or absence of matching;Such as judge that fingerprint characteristic is twice in 5 seconds
It is no to there is matching, to confirm that user shifts.
……
It can be needed to carry out select and set according to the intensity of verification.
In some embodiments, it can includes following manner terminal to be carried out secret protection processing:It reduces Permission Levels, incite somebody to action
Terminal is set as the use state of bottom line, is forbidden to use.
Permission Levels are reduced, such as some privacy informations are made to hide and are handled, suitable for temporarily transferring terminal to visitor
It uses.
Terminal is set as to the use state of bottom line, such as is only capable of using most basic call function.
It is forbidden to use, such as screen locking, needs to carry out authentication again to obtain access right.It can obtain utmostly
Protection.
Above-mentioned method for secret protection, by judging use environment, the biology of acquisition terminal holder in use
Feature, and collected biological characteristic is matched with preset biological characteristic, it is ensured that the use of terminal be it is legal or
Be authorized to use, to effectively prevent terminal surprisingly shift user when caused by privacy leakage.
In some embodiments, as shown in figure 3, multiple preset use environments are arranged for terminal, and corresponding inspection is configured
The step of survey condition, i.e., step 202 may include:
Step 302:Use environment is created according to user instruction.Such as user can create a use environment, and name
For " new use environment 1 ".
Step 304:System detectio function is provided, to obtain system detectio parameter.System provides system function, such as provides
" GPS data ", " touch control detection data ", " wifi connection status data " etc..
Step 306:It is at least one system detectio function of newly-built use environment configuration according to user instruction, and is corresponding
System detectio parameter setting detected value.Specify the newly-built use environment uses which detection data and qualified value
It is how many.The Configuration Values of these testing conditions are inputted and preserved by user.To form user-defined use environment.
Step 302, which can also be, reads existing use environment, and in subsequent steps, to have use environment configuration
New system detectio function and its detected value, or to the new detected value of existing system detectio functional configuration to adjust the use
The testing conditions of environment keep it more accurate.
In another embodiment, method for secret protection is as shown in figure 4, including step 402 to step 406.
Step 402:Multiple preset use environments are set for terminal, and configure testing conditions.Terminal is configured,
The multiple possible use environments of prior typing wherein.These use environments are that possible need or not need for users
Carry out the use environment of secret protection.The preset use environment can be that system provides, recommends or made by oneself by user
Justice.
When configuring use environment, needs cooperation to provide corresponding testing conditions, that is, confirm the testing conditions of use environment.
Testing conditions may come from the system detectio function that terminal is capable of providing, to obtain system detectio parameter, including but not limited to
The illumination letter of location information, light sensor offer that posture information, GPS sensor or the communication module that gyroscope provides provide
The touch information and press that breath, the finger print information of fingerprint module offer, the image information of imaging sensor offer, touch screen provide
The key information etc. that key provides.
In some embodiments, the correspondence of use environment and testing conditions may include at least one of:
When terminal connects and use family wifi or geographical location to be near residence in preset range, used for family
Environment;It is public use environment when terminal connects and use public wifi or geographical location is in public activity region.This
A little use environments are mainly distinguished from the position where terminal, and wherein home environment has obvious privacy.It needs
The demand for carrying out secret protection is little.And work as terminal in non-common use environment in use, carrying out the demand of secret protection
It is then larger.
Step 404:When terminal meets the feature of a use environment in multiple preset use environments, and in terminal
When in use state, duration or the periodically biological characteristic of acquisition terminal holder.The use state of terminal, in this Shen
Please middle finger unlock after state, may include unlock after desktop state, the Application Program Interface state after unlock, after unlock
Interface state etc. is set;It can also be including mobile phone by the state after receiving incoming call and connection under screen lock state.In use state
Under, it can be with all or part of function of operating terminal, such as open application, browse information, take phone etc.;Obtain terminal part
Point or whole data, such as check photograph album, short message, contact person etc..
Holder terminal, it can be understood as the use for being currently being operated, holding terminal or having operating terminal condition
Person.Holder terminal is not limited to the user of handheld terminal.Terminal is determined eventually by perception to environment and use state synthesis
Hold holder.Such as terminal is held, screen is contacted, have in imaging sensor close shot character image, using voice communication, make
With earphone etc..
When terminal is in use state, the various sensors that can have by it are obtained about holder terminal
Biological characteristic.These sensors may include:Face recognition sensor (such as the identification of 3D face recognitions, face-image), iris
Sensor, fingerprint sensor (screen lower fingerprint, back fingerprint, side fingerprint etc.), microphone and earphone etc..It is corresponding to it, this
A little biological characteristics may include in facial characteristics, iris feature, fingerprint characteristic, vocal print feature and ear line feature it is a kind of with
On.
During gatherer process can be happened at holder terminal using terminal, and in a manner of imperceptible into
Row.Such as when holder terminal is when clicking screen, can passing through screen, fingerprint sensor obtains fingerprint characteristic down;When terminal is held
When browsing screen content, front camera can obtain its face-image and then obtain facial characteristics person;Work as holder terminal
When call, its vocal print feature is obtained;When holder terminal is listened to music using earphone, its ear line feature is obtained.
For step 404, routinely the biological characteristic of acquisition terminal holder, i.e., whole during the use of terminal
End constantly perceives ambient enviroment by sensor, obtains the biological characteristic that can be got.Using single biological characteristic into
It when row matching, needs to guarantee to collect required biological characteristic to the full extent, routinely acquisition is effectively to ensure
Means.Such as by the image in front camera continuous collecting angular field of view, it can largely ensure the appearance of face.
By microphone continuous collecting voice, vocal print feature can be largely collected.By user wear earphone and with end
Continuous collecting ear line feature when end connection uses, can largely ensure to collect required ear line feature.
The periodically biological characteristic of acquisition terminal holder, i.e., during the use of terminal, every the period of setting,
The biological characteristic of holder terminal is obtained by sensor.It, can be by multiple biographies when being matched using multiple biological characteristics
The collection period of sensor is staggered so that whithin a period of time, multiple sensors execute acquisition successively, reach a kind of " continuous collecting "
Purpose.It is also possible to which transient resource consumption when multiple sensors being avoided to work at the same time becomes larger.Certainly, using single raw
When object feature is matched, periodically acquisition mode can also be used.For the biological characteristic for being easy to obtain, it is not necessary that into
Row continuous collecting.Such as fingerprint module under screen is configured in the terminal with touch screen, user is held very much when using touch screen
Fingerprint characteristic easily can be obtained by the lower fingerprint module of screen.
Duration periodically acquires and can ensure that the gatherer process is correctly triggered, and does not have to differentiate residing for terminal
Different scenes.
Step 406:When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, by terminal
Carry out secret protection processing.
Preset biological characteristic may include one in one or more of a kind of biological characteristic, multiclass biological characteristic
Or it is multiple.Such as it can only include fingerprint characteristic, facial characteristics, iris feature, vocal print feature and the ear line of owner in terminal
One or more of feature;Or fingerprint characteristic, facial characteristics, iris feature, the vocal print in terminal including multiple users are special
One or more of sign and ear line feature.
When carrying out the matching of biological characteristic, carried out according to preset matching condition.Preset matching condition may include:
Collected any biological characteristic whether there is with preset biological characteristic to be matched;Such as fingerprint characteristic whether there is
Matching or facial characteristics whether there is matching with the presence or absence of matching or vocal print feature.
Collected arbitrary at least two inhomogeneous biological characteristic is matched with whether preset biological characteristic exists simultaneously;
Such as fingerprint characteristic and face are characterized in no existing simultaneously matching or fingerprint characteristic and vocal print is characterized in no exist simultaneously
Match or facial characteristics and vocal print are characterized in no existing simultaneously matching;
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of match, and also collect it is arbitrary separately
One inhomogeneous biological characteristic whether there is with preset biological characteristic to be matched;Such as specified fingerprint characteristic is must to acquire simultaneously
Matched biological characteristic, and another inhomogeneous biological characteristic is coordinated to be confirmed.
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of matching, and is adopted within the set time
Collect the specified biological characteristic and preset biological characteristic with the presence or absence of matching;Such as judge that fingerprint characteristic is twice in 5 seconds
It is no to there is matching, to confirm that user shifts.
……
It can be needed to carry out select and set according to the intensity of verification.
In some embodiments, it can includes following manner terminal to be carried out secret protection processing:It reduces Permission Levels, incite somebody to action
Terminal is set as the use state of bottom line, is forbidden to use.
Permission Levels are reduced, such as some privacy informations are made to hide and are handled, suitable for temporarily transferring terminal to visitor
It uses.
Terminal is set as to the use state of bottom line, such as is only capable of using most basic call function.
It is forbidden to use, such as screen locking, needs to carry out authentication again to obtain access right.It can obtain utmostly
Protection.
Above-mentioned method for secret protection, by judging use environment, the biology of acquisition terminal holder in use
Feature, and collected biological characteristic is matched with preset biological characteristic, it is ensured that the use of terminal be it is legal or
Be authorized to use, to effectively prevent terminal surprisingly shift user when caused by privacy leakage.
In yet another embodiment, method for secret protection is as shown in figure 5, including step 502 to step 506.
Step 502:Multiple preset use environments are set for terminal, and configure testing conditions.Terminal is configured,
The multiple possible use environments of prior typing wherein.These use environments are that possible need or not need for users
Carry out the use environment of secret protection.The preset use environment can be that system provides, recommends or made by oneself by user
Justice.
When configuring use environment, needs cooperation to provide corresponding testing conditions, that is, confirm the testing conditions of use environment.
Testing conditions may come from the system detectio function that terminal is capable of providing, to obtain system detectio parameter, including but not limited to
The illumination letter of location information, light sensor offer that posture information, GPS sensor or the communication module that gyroscope provides provide
The touch information and press that breath, the finger print information of fingerprint module offer, the image information of imaging sensor offer, touch screen provide
The key information etc. that key provides.
In some embodiments, the correspondence of use environment and testing conditions may include at least one of:
When terminal connects and use family wifi or geographical location to be near residence in preset range, used for family
Environment;It is public use environment when terminal connects and use public wifi or geographical location is in public activity region.This
A little use environments are mainly distinguished from the position where terminal, and wherein home environment has obvious privacy.It needs
The demand for carrying out secret protection is little.And work as terminal in non-common use environment in use, carrying out the demand of secret protection
It is then larger.
Step 504:When terminal meets the feature of a use environment in multiple preset use environments, and in terminal
When in use state, if detecting, process, the biological characteristic of acquisition terminal holder are preset in unlatching.Terminal uses shape
State refers to the state after unlock in this application, may include the desktop state after unlocking, the Application Program Interface shape after unlock
Setting interface state after state, unlock etc.;It can also be including mobile phone by the state after receiving incoming call and connection under screen lock state.
In a state of use, can be with all or part of function of operating terminal, such as open application, browse information, take phone etc.;
The data of terminal part or whole are obtained, such as check photograph album, short message, contact person etc..
Holder terminal, it can be understood as the use for being currently being operated, holding terminal or having operating terminal condition
Person.Holder terminal is not limited to the user of handheld terminal.Terminal is determined eventually by perception to environment and use state synthesis
Hold holder.Such as terminal is held, screen is contacted, have in imaging sensor close shot character image, using voice communication, make
With earphone etc..
When terminal is in use state, the various sensors that can have by it are obtained about holder terminal
Biological characteristic.These sensors may include:Face recognition sensor (such as the identification of 3D face recognitions, face-image), iris
Sensor, fingerprint sensor (screen lower fingerprint, back fingerprint, side fingerprint etc.), microphone and earphone etc..It is corresponding to it, this
A little biological characteristics may include in facial characteristics, iris feature, fingerprint characteristic, vocal print feature and ear line feature it is a kind of with
On.
During gatherer process can be happened at holder terminal using terminal, and in a manner of imperceptible into
Row.Such as when holder terminal is when clicking screen, can passing through screen, fingerprint sensor obtains fingerprint characteristic down;When terminal is held
When browsing screen content, front camera can obtain its face-image and then obtain facial characteristics person;Work as holder terminal
When call, its vocal print feature is obtained;When holder terminal is listened to music using earphone, its ear line feature is obtained.
, to prevent specific privacy from revealing, spy can be detected when unavoidable terminal transfers user for step 504
Determine the unlatching situation of the required process of privacy.If the required process of specific privacy is opened, it is likely that be that owner exists
It uses, it is also possible to be that other users are spying upon.The biological characteristic of acquisition terminal holder judges at this time.If it is confirmed that
It is that owner is using, then need not carries out secret protection;If it is confirmed that not being owner, then needs to take secret protection, avoid this
Specific privacy is revealed.
It constitutes a threat to protection privacy or owner is unwilling the journey of installation in addition, default process can also be other kinds of
The erection schedule of sequence.Such as terminal is after transferring user, user install in the terminal without authorization some wiretapping types program,
Or children voluntarily install some trivial games.The biological characteristic of acquisition terminal holder judges at this time.If it is confirmed that being machine
Master is using, then need not carry out secret protection;If it is confirmed that not being owner, then needs to take secret protection, avoid in terminal
It is mounted unnecessary program.
Step 506:When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, by terminal
Carry out secret protection processing.
Preset biological characteristic may include one in one or more of a kind of biological characteristic, multiclass biological characteristic
Or it is multiple.Such as it can only include fingerprint characteristic, facial characteristics, iris feature, vocal print feature and the ear line of owner in terminal
One or more of feature;Or fingerprint characteristic, facial characteristics, iris feature, the vocal print in terminal including multiple users are special
One or more of sign and ear line feature.
When carrying out the matching of biological characteristic, carried out according to preset matching condition.Preset matching condition may include:
Collected any biological characteristic whether there is with preset biological characteristic to be matched;Such as fingerprint characteristic whether there is
Matching or facial characteristics whether there is matching with the presence or absence of matching or vocal print feature.
Collected arbitrary at least two inhomogeneous biological characteristic is matched with whether preset biological characteristic exists simultaneously;
Such as fingerprint characteristic and face are characterized in no existing simultaneously matching or fingerprint characteristic and vocal print is characterized in no exist simultaneously
Match or facial characteristics and vocal print are characterized in no existing simultaneously matching;
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of match, and also collect it is arbitrary separately
One inhomogeneous biological characteristic whether there is with preset biological characteristic to be matched;Such as specified fingerprint characteristic is must to acquire simultaneously
Matched biological characteristic, and another inhomogeneous biological characteristic is coordinated to be confirmed.
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of matching, and is adopted within the set time
Collect the specified biological characteristic and preset biological characteristic with the presence or absence of matching;Such as judge that fingerprint characteristic is twice in 5 seconds
It is no to there is matching, to confirm that user shifts.
……
It can be needed to carry out select and set according to the intensity of verification.
In some embodiments, it can includes following manner terminal to be carried out secret protection processing:It reduces Permission Levels, incite somebody to action
Terminal is set as the use state of bottom line, is forbidden to use.
Permission Levels are reduced, such as some privacy informations are made to hide and are handled, suitable for temporarily transferring terminal to visitor
It uses.
Terminal is set as to the use state of bottom line, such as is only capable of using most basic call function.
It is forbidden to use, such as screen locking, needs to carry out authentication again to obtain access right.It can obtain utmostly
Protection.
Above-mentioned method for secret protection, by judging use environment, the biology of acquisition terminal holder in use
Feature, and collected biological characteristic is matched with preset biological characteristic, it is ensured that the use of terminal be it is legal or
Be authorized to use, to effectively prevent terminal surprisingly shift user when caused by privacy leakage.
In a further embodiment, method for secret protection is as shown in fig. 6, including step 602 to step 606.
Step 602:Multiple preset use environments are set for terminal, and configure testing conditions.Terminal is configured,
The multiple possible use environments of prior typing wherein.These use environments are that possible need or not need for users
Carry out the use environment of secret protection.The preset use environment can be that system provides, recommends or made by oneself by user
Justice.
When configuring use environment, needs cooperation to provide corresponding testing conditions, that is, confirm the testing conditions of use environment.
Testing conditions may come from the system detectio function that terminal is capable of providing, to obtain system detectio parameter, including but not limited to
The illumination letter of location information, light sensor offer that posture information, GPS sensor or the communication module that gyroscope provides provide
The touch information and press that breath, the finger print information of fingerprint module offer, the image information of imaging sensor offer, touch screen provide
The key information etc. that key provides.
In some embodiments, the correspondence of use environment and testing conditions may include at least one of:
When terminal connects and use family wifi or geographical location to be near residence in preset range, used for family
Environment;It is public use environment when terminal connects and use public wifi or geographical location is in public activity region.This
A little use environments are mainly distinguished from the position where terminal, and wherein home environment has obvious privacy.It needs
The demand for carrying out secret protection is little.And work as terminal in non-common use environment in use, carrying out the demand of secret protection
It is then larger.
Step 604:When terminal meets the feature of a use environment in multiple preset use environments, and in terminal
When in use state, if detecting the attitudes vibration that terminal imposes a condition, the biological characteristic of acquisition terminal holder.
The use state of terminal refers to the state after unlock in this application, may include the desktop state after unlocking, the application after unlock
Setting interface state after program interface state, unlock etc.;Can also include that mobile phone is sent a telegram here and connect by being received under screen lock state
State after logical.In a state of use, can be with all or part of function of operating terminal, such as open application, browsing information, connect
Make a phone call etc.;The data of terminal part or whole are obtained, such as check photograph album, short message, contact person etc..
Holder terminal, it can be understood as the use for being currently being operated, holding terminal or having operating terminal condition
Person.Holder terminal is not limited to the user of handheld terminal.Terminal is determined eventually by perception to environment and use state synthesis
Hold holder.Such as terminal is held, screen is contacted, have in imaging sensor close shot character image, using voice communication, make
With earphone etc..
When terminal is in use state, the various sensors that can have by it are obtained about holder terminal
Biological characteristic.These sensors may include:Face recognition sensor (such as the identification of 3D face recognitions, face-image), iris
Sensor, fingerprint sensor (screen lower fingerprint, back fingerprint, side fingerprint etc.), microphone and earphone etc..It is corresponding to it, this
A little biological characteristics may include in facial characteristics, iris feature, fingerprint characteristic, vocal print feature and ear line feature it is a kind of with
On.
During gatherer process can be happened at holder terminal using terminal, and in a manner of imperceptible into
Row.Such as when holder terminal is when clicking screen, can passing through screen, fingerprint sensor obtains fingerprint characteristic down;When terminal is held
When browsing screen content, front camera can obtain its face-image and then obtain facial characteristics person;Work as holder terminal
When call, its vocal print feature is obtained;When holder terminal is listened to music using earphone, its ear line feature is obtained.
For step 604, which can correspond to attitudes vibration when terminal is grabbed.When terminal is grabbed,
Usually with the larger variation of instantaneous acceleration, or the variation of the caused repeatedly acceleration of different directions is pullled back and forth.It is logical
It crosses and sets the attitudes vibration similar with judging, confirm whether terminal is grabbed.When judging that terminal is grabbed, start acquisition eventually
Hold the biological characteristic of holder to confirm that grabber is not belonging to owner, to start secret protection.
In other embodiments, the attitudes vibration needed for other can also be set, substantially to judge that terminal may be hand over,
To which holder terminal be identified in time, facilitate startup secret protection.
Step 606:When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, by terminal
Carry out secret protection processing.
Preset biological characteristic may include one in one or more of a kind of biological characteristic, multiclass biological characteristic
Or it is multiple.Such as it can only include fingerprint characteristic, facial characteristics, iris feature, vocal print feature and the ear line of owner in terminal
One or more of feature;Or fingerprint characteristic, facial characteristics, iris feature, the vocal print in terminal including multiple users are special
One or more of sign and ear line feature.
When carrying out the matching of biological characteristic, carried out according to preset matching condition.Preset matching condition may include:
Collected any biological characteristic whether there is with preset biological characteristic to be matched;Such as fingerprint characteristic whether there is
Matching or facial characteristics whether there is matching with the presence or absence of matching or vocal print feature.
Collected arbitrary at least two inhomogeneous biological characteristic is matched with whether preset biological characteristic exists simultaneously;
Such as fingerprint characteristic and face are characterized in no existing simultaneously matching or fingerprint characteristic and vocal print is characterized in no exist simultaneously
Match or facial characteristics and vocal print are characterized in no existing simultaneously matching;
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of match, and also collect it is arbitrary separately
One inhomogeneous biological characteristic whether there is with preset biological characteristic to be matched;Such as specified fingerprint characteristic is must to acquire simultaneously
Matched biological characteristic, and another inhomogeneous biological characteristic is coordinated to be confirmed.
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of matching, and is adopted within the set time
Collect the specified biological characteristic and preset biological characteristic with the presence or absence of matching;Such as judge that fingerprint characteristic is twice in 5 seconds
It is no to there is matching, to confirm that user shifts.
……
It can be needed to carry out select and set according to the intensity of verification.
In some embodiments, it can includes following manner terminal to be carried out secret protection processing:It reduces Permission Levels, incite somebody to action
Terminal is set as the use state of bottom line, is forbidden to use.
Permission Levels are reduced, such as some privacy informations are made to hide and are handled, suitable for temporarily transferring terminal to visitor
It uses.
Terminal is set as to the use state of bottom line, such as is only capable of using most basic call function.
It is forbidden to use, such as screen locking, needs to carry out authentication again to obtain access right.It can obtain utmostly
Protection.
Above-mentioned method for secret protection, by judging use environment, the biology of acquisition terminal holder in use
Feature, and collected biological characteristic is matched with preset biological characteristic, it is ensured that the use of terminal be it is legal or
Be authorized to use, to effectively prevent terminal surprisingly shift user when caused by privacy leakage.
Fig. 7 is the structure diagram of the privacy protection device of one embodiment of the application.The privacy protection device includes:
Use environment configuration module 702 for multiple preset use environments to be arranged for terminal, and configures corresponding detection
Condition.
Physical characteristics collecting module 704, for meeting a use environment in multiple preset use environments when terminal
Feature when, if terminal is in use state, the biological characteristic of acquisition terminal holder.
Secret protection processing module 706, the biological characteristic and preset biology for working as collected holder terminal are special
When sign mismatches, terminal is subjected to secret protection processing.
In some embodiments, the biological characteristic includes:Facial characteristics, iris feature, fingerprint characteristic, vocal print feature with
And one or more of ear line feature.
In some embodiments, physical characteristics collecting module 704 is used for when terminal is in use state, duration or week
Phase property acquisition terminal holder biological characteristic.
In some embodiments, physical characteristics collecting module 704 is used for when terminal is in use state, if detecting out
Default process is opened, then starts the biological characteristic of acquisition terminal holder.
In some embodiments, physical characteristics collecting module 704 is used for when terminal is in use state, if detecting end
The attitudes vibration to impose a condition is held, then starts the biological characteristic of acquisition terminal holder.
In some embodiments, secret protection processing module 706, which is used to handle terminal progress secret protection, includes:It reduces
Permission Levels, are forbidden to use the use state that terminal is set as to bottom line.
In some embodiments, use environment configuration module 702 includes:
Newly-built unit, for creating use environment according to user instruction;
System function provides unit, for providing system detectio function, to obtain system detectio parameter;
Parameter configuration unit, for being that newly-built use environment configures at least one system detectio function according to user instruction,
And it is corresponding system detectio parameter setting detected value.
Specific about privacy protection device limits the restriction that may refer to above for method for secret protection, herein not
It repeats again.Modules in above-mentioned privacy protection device can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in or independently of in the processor in computer equipment, can also store in a software form in the form of hardware
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
Realizing for modules in the privacy protection device provided in the embodiment of the present application can be the shape of computer program
Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal
Or on the memory of server.When the computer program is executed by processor, realize that privacy described in the embodiment of the present application is protected
The step of maintaining method.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer
The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors
When so that the processor executes the step of method for secret protection.
A kind of computer program product including instruction, when run on a computer so that computer executes privacy
Guard method.
The embodiment of the present application also provides a kind of terminals.As shown in figure 8, for convenience of description, illustrate only and the application
The relevant part of embodiment, particular technique details do not disclose, please refer to the embodiment of the present application method part.The terminal can be
Including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of
Sales, point-of-sale terminal), vehicle-mounted computer, the arbitrary terminal device such as Wearable, by taking terminal is mobile phone as an example:
Fig. 8 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 8, mobile phone
Including:Radio frequency (Radio Frequency, RF) circuit 810, memory 820, input unit 830, display unit 840, sensor
850, voicefrequency circuit 860, Wireless Fidelity (wireless fidelity, WiFi) module 870, processor 880 and power supply 890
Equal components.It will be understood by those skilled in the art that handset structure shown in Fig. 8 does not constitute the restriction to mobile phone, may include
Than illustrating more or fewer components, certain components or different components arrangement are either combined.
Wherein, RF circuits 810 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station
After downlink information receives, handled to processor 880;The data of uplink can also be sent to base station.In general, RF circuits include but
Be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier,
LNA), duplexer etc..In addition, RF circuits 810 can also be communicated with network and other equipment by radio communication.Above-mentioned channel radio
Letter can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of
Mobile communication, GSM), general packet radio service (General Packet Radio Service,
GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code
Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email,
Short message service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storing software program and module, and processor 880 is stored in memory 820 by operation
Software program and module, to execute various function application and the data processing of mobile phone.Memory 820 can include mainly
Program storage area and data storage area, wherein program storage area can storage program area, the application journey needed at least one function
Sequence (such as the application program of sound-playing function, application program of image player function etc.) etc.;Data storage area can store root
Created data (such as audio data, address list etc.) etc. are used according to mobile phone.In addition, memory 820 may include high speed
Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or
Other volatile solid-state parts.
Input unit 830 can be used for receiving the number or character information of input, and generate the user setting with mobile phone 800
And the related key signals input of function control.Specifically, input unit 830 may include operation panel 831 and other inputs
Equipment 832.Operation panel 831, alternatively referred to as touch screen collect user on it or neighbouring touch operation (such as user
Use the operation of any suitable object or attachment such as finger, stylus on operation panel 831 or near operation panel 831),
And corresponding attachment device is driven according to preset formula.In one embodiment, operation panel 831 may include touching inspection
Survey two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation
The signal brought, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and will
It is converted into contact coordinate, then gives processor 880, and can receive order that processor 880 is sent and be executed.In addition,
The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave may be used and realize operation panel 831.In addition to operating surface
Plate 831, input unit 830 can also include other input equipments 832.Specifically, other input equipments 832 may include but not
It is limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.) etc..
Display unit 840 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 840 may include display panel 841.In one embodiment, liquid crystal display (Liquid may be used
Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED)
To configure display panel 841.In one embodiment, operation panel 831 can cover display panel 841, when operation panel 831 is examined
It measures and sends processor 880 on it or after neighbouring touch operation to determine the type of touch event, be followed by subsequent processing device
880 provide corresponding visual output according to the type of touch event on display panel 841.Although in fig. 8, operation panel
831 be to realize input and the input function of mobile phone as two independent components with display panel 841, but in certain implementations
In example, can be integrated by operation panel 831 and display panel 841 and that realizes mobile phone output and input function.
Mobile phone 800 may also include at least one sensor 850, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and range sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 841, and range sensor can close display panel when mobile phone is moved in one's ear
841 and/or backlight.Motion sensor may include acceleration transducer, can detect by acceleration transducer and adds in all directions
The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture
Switching), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, humidity
Other sensors such as meter, thermometer, infrared sensor etc..
Voicefrequency circuit 860, loud speaker 861 and microphone 862 can provide the audio interface between user and mobile phone.Audio-frequency electric
The transformed electric signal of the audio data received can be transferred to loud speaker 861 by road 860, and sound is converted to by loud speaker 861
Signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is turned after being received by voicefrequency circuit 860
It is changed to audio data, then by after the processing of audio data output processor 880, another mobile phone can be sent to through RF circuits 810, or
Person exports audio data to memory 820 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 870
Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 8 is shown
WiFi module 870, but it is understood that, and it is not belonging to must be configured into for mobile phone 800, it can omit as needed.
Processor 880 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 820, and call and be stored in memory 820
Data execute the various functions and processing data of mobile phone, to carry out whole monitoring to mobile phone.In one embodiment, it handles
Device 880 may include one or more processing units.In one embodiment, processor 880 can integrate application processor and modulation
Demodulator, wherein the main processing operation system of application processor, user interface and application program etc.;Modem is mainly located
Reason wireless communication.It is understood that above-mentioned modem can not also be integrated into processor 880.For example, the processor
880 can integrate application processor and baseband processor, baseband processor with and the composable modem such as other peripheral chips.
Mobile phone 800 further includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can pass through power management system
System is logically contiguous with processor 880, to realize the work(such as management charging, electric discharge and power managed by power-supply management system
Energy.
In one embodiment, mobile phone 800 can also include camera, bluetooth module etc..
In the embodiment of the present application, when the processor included by the mobile phone executes the computer program of storage on a memory
Realize above-mentioned described information sharing method.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile
And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM),
Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access
Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as
It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced
SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, it is all considered to be the range of this specification record.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention
Range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (10)
1. a kind of method for secret protection is applied to terminal, the method includes:
Multiple preset use environments are set for terminal, and configure testing conditions;
When terminal meets the feature of a use environment in multiple preset use environments, if terminal is in use state,
The biological characteristic of acquisition terminal holder;
When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, terminal is subjected to secret protection
Processing.
2. according to the method described in claim 1, it is characterized in that, the biological characteristic includes:Facial characteristics, iris feature,
One or more of fingerprint characteristic, vocal print feature and ear line feature.
3. according to the method described in claim 1, it is characterized in that, when terminal is in use state, duration or periodicity
The biological characteristic of ground acquisition terminal holder.
4. according to the method described in claim 1, it is characterized in that, when terminal is in use state, if detecting, unlatching is pre-
If process, then start the biological characteristic of acquisition terminal holder.
5. according to the method described in claim 1, it is characterized in that, when terminal is in use state, if detecting, terminal is sent out
The raw attitudes vibration to impose a condition, then start the biological characteristic of acquisition terminal holder.
6. according to the method described in claim 1, it is characterized in that, described include by terminal progress secret protection processing:It reduces
Permission Levels, are forbidden to use the use state that terminal is set as to bottom line.
7. according to the method described in claim 1, it is characterized in that, described be arranged multiple preset use environments for terminal, and
The step of configuring corresponding testing conditions include:
Use environment is created according to user instruction;
System detectio function is provided, to obtain system detectio parameter;
It is at least one system detectio function of newly-built use environment configuration according to user instruction, and is corresponding system detectio parameter
Detected value is set.
8. a kind of privacy protection device, which is characterized in that described device includes:
Use environment configuration module for multiple preset use environments to be arranged for terminal, and configures corresponding testing conditions;
Physical characteristics collecting module, the feature for meeting a use environment in multiple preset use environments when terminal
When, if terminal is in use state, the biological characteristic of acquisition terminal holder;
Secret protection processing module is mismatched for the biological characteristic when collected holder terminal with preset biological characteristic
When, terminal is subjected to secret protection processing.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
The step of any one of claim 1 to 7 the method is realized when processor executes.
10. a kind of terminal, including memory, processor and storage are on a memory and the computer journey that can run on a processor
Sequence, which is characterized in that the processor realizes any one of claim 1 to 7 the method when executing the computer program
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810274185.3A CN108537025B (en) | 2018-03-29 | 2018-03-29 | Privacy protection method and device, computer readable storage medium and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810274185.3A CN108537025B (en) | 2018-03-29 | 2018-03-29 | Privacy protection method and device, computer readable storage medium and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108537025A true CN108537025A (en) | 2018-09-14 |
CN108537025B CN108537025B (en) | 2020-08-18 |
Family
ID=63481639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810274185.3A Active CN108537025B (en) | 2018-03-29 | 2018-03-29 | Privacy protection method and device, computer readable storage medium and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108537025B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109933966A (en) * | 2019-03-13 | 2019-06-25 | 中国人民解放军国防科技大学 | Continuous authentication method and system based on biological characteristics |
CN110472393A (en) * | 2019-07-18 | 2019-11-19 | 平安科技(深圳)有限公司 | Information display method, device, storage medium and equipment based on bio-identification |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105446571A (en) * | 2014-06-27 | 2016-03-30 | 联想(北京)有限公司 | Information processing method and electronic equipment |
EP3079721A1 (en) * | 2013-12-11 | 2016-10-19 | Health-Ever Biotech Co. Ltd. | Pharmaceutical compositions of carotenoid |
CN107577931A (en) * | 2017-08-29 | 2018-01-12 | 广东欧珀移动通信有限公司 | Authority control method and related product |
CN107609363A (en) * | 2017-10-20 | 2018-01-19 | 维沃移动通信有限公司 | A kind of unlocking method and mobile terminal |
CN107609407A (en) * | 2017-08-16 | 2018-01-19 | 广东小天才科技有限公司 | The guard method of information security and device in a kind of user terminal |
-
2018
- 2018-03-29 CN CN201810274185.3A patent/CN108537025B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3079721A1 (en) * | 2013-12-11 | 2016-10-19 | Health-Ever Biotech Co. Ltd. | Pharmaceutical compositions of carotenoid |
CN105446571A (en) * | 2014-06-27 | 2016-03-30 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN107609407A (en) * | 2017-08-16 | 2018-01-19 | 广东小天才科技有限公司 | The guard method of information security and device in a kind of user terminal |
CN107577931A (en) * | 2017-08-29 | 2018-01-12 | 广东欧珀移动通信有限公司 | Authority control method and related product |
CN107609363A (en) * | 2017-10-20 | 2018-01-19 | 维沃移动通信有限公司 | A kind of unlocking method and mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109933966A (en) * | 2019-03-13 | 2019-06-25 | 中国人民解放军国防科技大学 | Continuous authentication method and system based on biological characteristics |
CN110472393A (en) * | 2019-07-18 | 2019-11-19 | 平安科技(深圳)有限公司 | Information display method, device, storage medium and equipment based on bio-identification |
Also Published As
Publication number | Publication date |
---|---|
CN108537025B (en) | 2020-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108521494A (en) | Terminal control method and device, readable storage medium storing program for executing, terminal | |
CN108536783A (en) | Data processing method and device, terminal, computer readable storage medium | |
CN104915582B (en) | unlocking method and device | |
CN108616652A (en) | Data guard method and device, terminal, computer readable storage medium | |
CN108563932A (en) | Application control method and apparatus, readable storage medium storing program for executing, terminal | |
CN106293751A (en) | A kind of method showing information on the terminal device and terminal unit | |
CN104618605B (en) | Mobile terminal locating method and device | |
CN107437009A (en) | Authority control method and related product | |
CN108573168A (en) | Private space starts method and apparatus, storage medium, electronic equipment | |
CN108537037A (en) | Privacy control method and device, computer readable storage medium, terminal | |
CN105099701B (en) | A kind of method of terminal and terminal authentication | |
CN108573169A (en) | Nearest task list display methods and device, storage medium, electronic equipment | |
CN107346397A (en) | Information processing method and related product | |
CN108353099A (en) | A kind of method and apparatus of PPG certifications | |
CN106611152A (en) | User identity determination method and apparatus | |
CN107491673A (en) | Biometric discrimination method and Related product | |
CN107133507A (en) | A kind of privacy services system access method, device and mobile terminal | |
CN108632454A (en) | Information processing method and device, computer readable storage medium, terminal | |
CN108537058A (en) | The polygonal color application method and device, computer readable storage medium, terminal of terminal | |
CN108509788A (en) | Information sharing method and device, computer readable storage medium, terminal | |
CN108491733A (en) | Method and apparatus, storage medium, electronic equipment are recommended in privacy application | |
CN108197448A (en) | Document display method, device, readable storage medium storing program for executing and terminal | |
CN108537025A (en) | Method for secret protection and device, computer readable storage medium, terminal | |
CN104980436B (en) | A kind of encryption transmission system, method, terminal and intermediate server | |
CN107102913B (en) | Data back up method, device and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |