CN108537025A - Method for secret protection and device, computer readable storage medium, terminal - Google Patents

Method for secret protection and device, computer readable storage medium, terminal Download PDF

Info

Publication number
CN108537025A
CN108537025A CN201810274185.3A CN201810274185A CN108537025A CN 108537025 A CN108537025 A CN 108537025A CN 201810274185 A CN201810274185 A CN 201810274185A CN 108537025 A CN108537025 A CN 108537025A
Authority
CN
China
Prior art keywords
terminal
biological characteristic
holder
secret protection
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810274185.3A
Other languages
Chinese (zh)
Other versions
CN108537025B (en
Inventor
张伟杰
张俊
谭春宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810274185.3A priority Critical patent/CN108537025B/en
Publication of CN108537025A publication Critical patent/CN108537025A/en
Application granted granted Critical
Publication of CN108537025B publication Critical patent/CN108537025B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

This application involves a kind of method for secret protection and device, computer readable storage medium, terminal.This method includes:Multiple preset use environments are set for terminal, and configure testing conditions;When terminal meets the feature of a use environment in multiple preset use environments, if terminal is in use state, the biological characteristic of acquisition terminal holder;When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, terminal is subjected to secret protection processing.By after judging use environment, the biological characteristic of acquisition terminal holder in use, and collected biological characteristic is matched with preset biological characteristic, ensure the use of terminal be it is legal either be authorized to use, to effectively prevent terminal surprisingly shift user when caused by privacy leakage.

Description

Method for secret protection and device, computer readable storage medium, terminal
Technical field
This application involves field of terminal technology, more particularly to a kind of method for secret protection and device, computer-readable deposit Storage media, terminal.
Background technology
As terminal device enters the intelligent epoch, the mobile terminals such as mobile phone, communication tablet are played the part of more in people's lives Carry out more important role.By various software applications, people can be met in social, shopping, amusement, work, study etc. Different demands.
Currently, the secret protection demand of intelligent terminal is more and more, and become increasingly complex, cannot meet various multiple The secret protection demand of demand under miscellaneous scene, especially terminal after surprisingly shifting.
Invention content
A kind of method for secret protection of the embodiment of the present application offer and device, computer readable storage medium, terminal, to meet Prevent terminal privacy leakage after surprisingly shifting.
A kind of method for secret protection is applied to terminal, the method includes:
Multiple preset use environments are set for terminal, and configure testing conditions;
When terminal meets the feature of a use environment in multiple preset use environments, if terminal, which is in, uses shape State, the biological characteristic of acquisition terminal holder;
When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, terminal is subjected to privacy Protection is handled.
A kind of privacy protection device, including:
Use environment configuration module for multiple preset use environments to be arranged for terminal, and configures corresponding detector bar Part;
Physical characteristics collecting module, the spy for meeting a use environment in multiple preset use environments when terminal When sign, if terminal is in use state, the biological characteristic of acquisition terminal holder;
Secret protection processing module, biological characteristic and preset biological characteristic for working as collected holder terminal are not When matching, terminal is subjected to secret protection processing.
A kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of the method in each embodiment of the application is realized when being executed by processor.
A kind of terminal, including memory, processor and storage are on a memory and the computer that can run on a processor Program, which is characterized in that the processor realizes the side in each embodiment of the application when executing the computer program The step of method.
Method for secret protection and device that the embodiment of the present application is provided, computer readable storage medium, terminal, by After judging use environment, the biological characteristic of acquisition terminal holder in use, and by collected biological characteristic with it is pre- If biological characteristic matched, it is ensured that the use of terminal be it is legal either be authorized to use, to effectively prevent end End privacy leakage caused by when surprisingly shifting user.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the terminal inner structural schematic diagram in one embodiment;
Fig. 2 is the flow chart of the method for secret protection in one embodiment;
Fig. 3 is the process chart of the default use environment of setting in one embodiment;
Fig. 4 is the flow chart of the method for secret protection in another embodiment;
Fig. 5 is the flow chart of the method for secret protection in another embodiment;
Fig. 6 is the flow chart of the method for secret protection in further embodiment;
Fig. 7 is the structure diagram of the privacy protection device in an embodiment;
Fig. 8 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe herein various elements, But these elements should not be limited by these terms.These terms are only used to distinguish first element and another element.
In one embodiment, as shown in Figure 1, providing a kind of internal structure schematic diagram of terminal.The terminal includes logical Cross processor, memory and the display screen of system bus connection.Wherein, the processor is for providing calculating and control ability, branch Support the operation of entire terminal.Memory for storing data, program, and/or instruction code etc., stored on memory at least one Computer program, the computer program can be executed by processor, to realize that is provided in the embodiment of the present application is suitable for terminal Method for secret protection.Memory may include that magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. are non-easily The property lost storage medium or random access memory (Random-Access-Memory, RAM) etc..For example, in one embodiment In, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system, database And computer program.A kind of method for secret protection phase provided for realizing above each embodiment is provided in the database The data of pass, for example default processing strategy or default verification information can be stored etc..The computer program can performed by processor, For realizing a kind of method for secret protection that each embodiment of the application is provided.Built-in storage is non-volatile memory medium In operating system, database and computer program the running environment of cache is provided.Display screen can be touch screen, such as For capacitance plate or electrical screen, it to be used for the interface information of display terminal.The terminal can be mobile phone, tablet computer or individual digital Assistant or Wearable etc..
Method for secret protection in the present embodiment is described for running in terminal.The method for secret protection Applied to terminal, and it specifically can be adapted for the scene that terminal changes user.
In the application, terminal change user specifically refers to terminal and is transferred to other user from a user, May include:Owner by mobile phone to known people use, owner by mobile phone to be not familiar with or stranger use, lost mobile phone Grabbed when in use by stranger's use, mobile phone afterwards etc..In rear several scenes, the privacy of owner, which all suffers from, to be leaked Problem.
The scheme of secret protection is carried out when being shifted between different users this application involves terminal.
The method for secret protection of one embodiment of the application is as shown in Fig. 2, including step 202 to step 206.
Step 202:Multiple preset use environments are set for terminal, and configure testing conditions.Terminal is configured, The multiple possible use environments of prior typing wherein.These use environments are that possible need or not need for users Carry out the use environment of secret protection.The preset use environment can be that system provides, recommends or made by oneself by user Justice.
When configuring use environment, needs cooperation to provide corresponding testing conditions, that is, confirm the testing conditions of use environment. Testing conditions may come from the system detectio function that terminal is capable of providing, to obtain system detectio parameter, including but not limited to The illumination letter of location information, light sensor offer that posture information, GPS sensor or the communication module that gyroscope provides provide The touch information and press that breath, the finger print information of fingerprint module offer, the image information of imaging sensor offer, touch screen provide The key information etc. that key provides.
In some embodiments, the correspondence of use environment and testing conditions may include at least one of:
When terminal connects and use family wifi or geographical location to be near residence in preset range, used for family Environment;It is public use environment when terminal connects and use public wifi or geographical location is in public activity region.This A little use environments are mainly distinguished from the position where terminal, and wherein home environment has obvious privacy.It needs The demand for carrying out secret protection is little.And work as terminal in non-common use environment in use, carrying out the demand of secret protection It is then larger.
Step 204:When terminal meets the feature of a use environment in multiple preset use environments, and in terminal When in use state, the biological characteristic of acquisition terminal holder.The use state of terminal refers to the shape after unlock in this application State may include desktop state, the Application Program Interface state after unlock, the setting interface state after unlock etc. after unlock; It can also be including mobile phone by the state after receiving incoming call and connection under screen lock state.It in a state of use, can be with operating terminal All or part of function, such as open application, browse information, take phone etc.;Obtain terminal part or the number of whole According to, such as check photograph album, short message, contact person etc..
Holder terminal, it can be understood as the use for being currently being operated, holding terminal or having operating terminal condition Person.Holder terminal is not limited to the user of handheld terminal.Terminal is determined eventually by perception to environment and use state synthesis Hold holder.Such as terminal is held, screen is contacted, have in imaging sensor close shot character image, using voice communication, make With earphone etc..
When terminal is in use state, the various sensors that can have by it are obtained about holder terminal Biological characteristic.These sensors may include:Face recognition sensor (such as the identification of 3D face recognitions, face-image), iris Sensor, fingerprint sensor (screen lower fingerprint, back fingerprint, side fingerprint etc.), microphone and earphone etc..It is corresponding to it, this A little biological characteristics may include in facial characteristics, iris feature, fingerprint characteristic, vocal print feature and ear line feature it is a kind of with On.
During gatherer process can be happened at holder terminal using terminal, and in a manner of imperceptible into Row.Such as when holder terminal is when clicking screen, can passing through screen, fingerprint sensor obtains fingerprint characteristic down;When terminal is held When browsing screen content, front camera can obtain its face-image and then obtain facial characteristics person;Work as holder terminal When call, its vocal print feature is obtained;When holder terminal is listened to music using earphone, its ear line feature is obtained.
Step 206:When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, by terminal Carry out secret protection processing.
Preset biological characteristic may include one in one or more of a kind of biological characteristic, multiclass biological characteristic Or it is multiple.Such as it can only include fingerprint characteristic, facial characteristics, iris feature, vocal print feature and the ear line of owner in terminal One or more of feature;Or fingerprint characteristic, facial characteristics, iris feature, the vocal print in terminal including multiple users are special One or more of sign and ear line feature.
When carrying out the matching of biological characteristic, carried out according to preset matching condition.Preset matching condition may include:
Collected any biological characteristic whether there is with preset biological characteristic to be matched;Such as fingerprint characteristic whether there is Matching or facial characteristics whether there is matching with the presence or absence of matching or vocal print feature.
Collected arbitrary at least two inhomogeneous biological characteristic is matched with whether preset biological characteristic exists simultaneously; Such as fingerprint characteristic and face are characterized in no existing simultaneously matching or fingerprint characteristic and vocal print is characterized in no exist simultaneously Match or facial characteristics and vocal print are characterized in no existing simultaneously matching;
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of match, and also collect it is arbitrary separately One inhomogeneous biological characteristic whether there is with preset biological characteristic to be matched;Such as specified fingerprint characteristic is must to acquire simultaneously Matched biological characteristic, and another inhomogeneous biological characteristic is coordinated to be confirmed.
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of matching, and is adopted within the set time Collect the specified biological characteristic and preset biological characteristic with the presence or absence of matching;Such as judge that fingerprint characteristic is twice in 5 seconds It is no to there is matching, to confirm that user shifts.
……
It can be needed to carry out select and set according to the intensity of verification.
In some embodiments, it can includes following manner terminal to be carried out secret protection processing:It reduces Permission Levels, incite somebody to action Terminal is set as the use state of bottom line, is forbidden to use.
Permission Levels are reduced, such as some privacy informations are made to hide and are handled, suitable for temporarily transferring terminal to visitor It uses.
Terminal is set as to the use state of bottom line, such as is only capable of using most basic call function.
It is forbidden to use, such as screen locking, needs to carry out authentication again to obtain access right.It can obtain utmostly Protection.
Above-mentioned method for secret protection, by judging use environment, the biology of acquisition terminal holder in use Feature, and collected biological characteristic is matched with preset biological characteristic, it is ensured that the use of terminal be it is legal or Be authorized to use, to effectively prevent terminal surprisingly shift user when caused by privacy leakage.
In some embodiments, as shown in figure 3, multiple preset use environments are arranged for terminal, and corresponding inspection is configured The step of survey condition, i.e., step 202 may include:
Step 302:Use environment is created according to user instruction.Such as user can create a use environment, and name For " new use environment 1 ".
Step 304:System detectio function is provided, to obtain system detectio parameter.System provides system function, such as provides " GPS data ", " touch control detection data ", " wifi connection status data " etc..
Step 306:It is at least one system detectio function of newly-built use environment configuration according to user instruction, and is corresponding System detectio parameter setting detected value.Specify the newly-built use environment uses which detection data and qualified value It is how many.The Configuration Values of these testing conditions are inputted and preserved by user.To form user-defined use environment.
Step 302, which can also be, reads existing use environment, and in subsequent steps, to have use environment configuration New system detectio function and its detected value, or to the new detected value of existing system detectio functional configuration to adjust the use The testing conditions of environment keep it more accurate.
In another embodiment, method for secret protection is as shown in figure 4, including step 402 to step 406.
Step 402:Multiple preset use environments are set for terminal, and configure testing conditions.Terminal is configured, The multiple possible use environments of prior typing wherein.These use environments are that possible need or not need for users Carry out the use environment of secret protection.The preset use environment can be that system provides, recommends or made by oneself by user Justice.
When configuring use environment, needs cooperation to provide corresponding testing conditions, that is, confirm the testing conditions of use environment. Testing conditions may come from the system detectio function that terminal is capable of providing, to obtain system detectio parameter, including but not limited to The illumination letter of location information, light sensor offer that posture information, GPS sensor or the communication module that gyroscope provides provide The touch information and press that breath, the finger print information of fingerprint module offer, the image information of imaging sensor offer, touch screen provide The key information etc. that key provides.
In some embodiments, the correspondence of use environment and testing conditions may include at least one of:
When terminal connects and use family wifi or geographical location to be near residence in preset range, used for family Environment;It is public use environment when terminal connects and use public wifi or geographical location is in public activity region.This A little use environments are mainly distinguished from the position where terminal, and wherein home environment has obvious privacy.It needs The demand for carrying out secret protection is little.And work as terminal in non-common use environment in use, carrying out the demand of secret protection It is then larger.
Step 404:When terminal meets the feature of a use environment in multiple preset use environments, and in terminal When in use state, duration or the periodically biological characteristic of acquisition terminal holder.The use state of terminal, in this Shen Please middle finger unlock after state, may include unlock after desktop state, the Application Program Interface state after unlock, after unlock Interface state etc. is set;It can also be including mobile phone by the state after receiving incoming call and connection under screen lock state.In use state Under, it can be with all or part of function of operating terminal, such as open application, browse information, take phone etc.;Obtain terminal part Point or whole data, such as check photograph album, short message, contact person etc..
Holder terminal, it can be understood as the use for being currently being operated, holding terminal or having operating terminal condition Person.Holder terminal is not limited to the user of handheld terminal.Terminal is determined eventually by perception to environment and use state synthesis Hold holder.Such as terminal is held, screen is contacted, have in imaging sensor close shot character image, using voice communication, make With earphone etc..
When terminal is in use state, the various sensors that can have by it are obtained about holder terminal Biological characteristic.These sensors may include:Face recognition sensor (such as the identification of 3D face recognitions, face-image), iris Sensor, fingerprint sensor (screen lower fingerprint, back fingerprint, side fingerprint etc.), microphone and earphone etc..It is corresponding to it, this A little biological characteristics may include in facial characteristics, iris feature, fingerprint characteristic, vocal print feature and ear line feature it is a kind of with On.
During gatherer process can be happened at holder terminal using terminal, and in a manner of imperceptible into Row.Such as when holder terminal is when clicking screen, can passing through screen, fingerprint sensor obtains fingerprint characteristic down;When terminal is held When browsing screen content, front camera can obtain its face-image and then obtain facial characteristics person;Work as holder terminal When call, its vocal print feature is obtained;When holder terminal is listened to music using earphone, its ear line feature is obtained.
For step 404, routinely the biological characteristic of acquisition terminal holder, i.e., whole during the use of terminal End constantly perceives ambient enviroment by sensor, obtains the biological characteristic that can be got.Using single biological characteristic into It when row matching, needs to guarantee to collect required biological characteristic to the full extent, routinely acquisition is effectively to ensure Means.Such as by the image in front camera continuous collecting angular field of view, it can largely ensure the appearance of face. By microphone continuous collecting voice, vocal print feature can be largely collected.By user wear earphone and with end Continuous collecting ear line feature when end connection uses, can largely ensure to collect required ear line feature.
The periodically biological characteristic of acquisition terminal holder, i.e., during the use of terminal, every the period of setting, The biological characteristic of holder terminal is obtained by sensor.It, can be by multiple biographies when being matched using multiple biological characteristics The collection period of sensor is staggered so that whithin a period of time, multiple sensors execute acquisition successively, reach a kind of " continuous collecting " Purpose.It is also possible to which transient resource consumption when multiple sensors being avoided to work at the same time becomes larger.Certainly, using single raw When object feature is matched, periodically acquisition mode can also be used.For the biological characteristic for being easy to obtain, it is not necessary that into Row continuous collecting.Such as fingerprint module under screen is configured in the terminal with touch screen, user is held very much when using touch screen Fingerprint characteristic easily can be obtained by the lower fingerprint module of screen.
Duration periodically acquires and can ensure that the gatherer process is correctly triggered, and does not have to differentiate residing for terminal Different scenes.
Step 406:When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, by terminal Carry out secret protection processing.
Preset biological characteristic may include one in one or more of a kind of biological characteristic, multiclass biological characteristic Or it is multiple.Such as it can only include fingerprint characteristic, facial characteristics, iris feature, vocal print feature and the ear line of owner in terminal One or more of feature;Or fingerprint characteristic, facial characteristics, iris feature, the vocal print in terminal including multiple users are special One or more of sign and ear line feature.
When carrying out the matching of biological characteristic, carried out according to preset matching condition.Preset matching condition may include:
Collected any biological characteristic whether there is with preset biological characteristic to be matched;Such as fingerprint characteristic whether there is Matching or facial characteristics whether there is matching with the presence or absence of matching or vocal print feature.
Collected arbitrary at least two inhomogeneous biological characteristic is matched with whether preset biological characteristic exists simultaneously; Such as fingerprint characteristic and face are characterized in no existing simultaneously matching or fingerprint characteristic and vocal print is characterized in no exist simultaneously Match or facial characteristics and vocal print are characterized in no existing simultaneously matching;
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of match, and also collect it is arbitrary separately One inhomogeneous biological characteristic whether there is with preset biological characteristic to be matched;Such as specified fingerprint characteristic is must to acquire simultaneously Matched biological characteristic, and another inhomogeneous biological characteristic is coordinated to be confirmed.
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of matching, and is adopted within the set time Collect the specified biological characteristic and preset biological characteristic with the presence or absence of matching;Such as judge that fingerprint characteristic is twice in 5 seconds It is no to there is matching, to confirm that user shifts.
……
It can be needed to carry out select and set according to the intensity of verification.
In some embodiments, it can includes following manner terminal to be carried out secret protection processing:It reduces Permission Levels, incite somebody to action Terminal is set as the use state of bottom line, is forbidden to use.
Permission Levels are reduced, such as some privacy informations are made to hide and are handled, suitable for temporarily transferring terminal to visitor It uses.
Terminal is set as to the use state of bottom line, such as is only capable of using most basic call function.
It is forbidden to use, such as screen locking, needs to carry out authentication again to obtain access right.It can obtain utmostly Protection.
Above-mentioned method for secret protection, by judging use environment, the biology of acquisition terminal holder in use Feature, and collected biological characteristic is matched with preset biological characteristic, it is ensured that the use of terminal be it is legal or Be authorized to use, to effectively prevent terminal surprisingly shift user when caused by privacy leakage.
In yet another embodiment, method for secret protection is as shown in figure 5, including step 502 to step 506.
Step 502:Multiple preset use environments are set for terminal, and configure testing conditions.Terminal is configured, The multiple possible use environments of prior typing wherein.These use environments are that possible need or not need for users Carry out the use environment of secret protection.The preset use environment can be that system provides, recommends or made by oneself by user Justice.
When configuring use environment, needs cooperation to provide corresponding testing conditions, that is, confirm the testing conditions of use environment. Testing conditions may come from the system detectio function that terminal is capable of providing, to obtain system detectio parameter, including but not limited to The illumination letter of location information, light sensor offer that posture information, GPS sensor or the communication module that gyroscope provides provide The touch information and press that breath, the finger print information of fingerprint module offer, the image information of imaging sensor offer, touch screen provide The key information etc. that key provides.
In some embodiments, the correspondence of use environment and testing conditions may include at least one of:
When terminal connects and use family wifi or geographical location to be near residence in preset range, used for family Environment;It is public use environment when terminal connects and use public wifi or geographical location is in public activity region.This A little use environments are mainly distinguished from the position where terminal, and wherein home environment has obvious privacy.It needs The demand for carrying out secret protection is little.And work as terminal in non-common use environment in use, carrying out the demand of secret protection It is then larger.
Step 504:When terminal meets the feature of a use environment in multiple preset use environments, and in terminal When in use state, if detecting, process, the biological characteristic of acquisition terminal holder are preset in unlatching.Terminal uses shape State refers to the state after unlock in this application, may include the desktop state after unlocking, the Application Program Interface shape after unlock Setting interface state after state, unlock etc.;It can also be including mobile phone by the state after receiving incoming call and connection under screen lock state. In a state of use, can be with all or part of function of operating terminal, such as open application, browse information, take phone etc.; The data of terminal part or whole are obtained, such as check photograph album, short message, contact person etc..
Holder terminal, it can be understood as the use for being currently being operated, holding terminal or having operating terminal condition Person.Holder terminal is not limited to the user of handheld terminal.Terminal is determined eventually by perception to environment and use state synthesis Hold holder.Such as terminal is held, screen is contacted, have in imaging sensor close shot character image, using voice communication, make With earphone etc..
When terminal is in use state, the various sensors that can have by it are obtained about holder terminal Biological characteristic.These sensors may include:Face recognition sensor (such as the identification of 3D face recognitions, face-image), iris Sensor, fingerprint sensor (screen lower fingerprint, back fingerprint, side fingerprint etc.), microphone and earphone etc..It is corresponding to it, this A little biological characteristics may include in facial characteristics, iris feature, fingerprint characteristic, vocal print feature and ear line feature it is a kind of with On.
During gatherer process can be happened at holder terminal using terminal, and in a manner of imperceptible into Row.Such as when holder terminal is when clicking screen, can passing through screen, fingerprint sensor obtains fingerprint characteristic down;When terminal is held When browsing screen content, front camera can obtain its face-image and then obtain facial characteristics person;Work as holder terminal When call, its vocal print feature is obtained;When holder terminal is listened to music using earphone, its ear line feature is obtained.
, to prevent specific privacy from revealing, spy can be detected when unavoidable terminal transfers user for step 504 Determine the unlatching situation of the required process of privacy.If the required process of specific privacy is opened, it is likely that be that owner exists It uses, it is also possible to be that other users are spying upon.The biological characteristic of acquisition terminal holder judges at this time.If it is confirmed that It is that owner is using, then need not carries out secret protection;If it is confirmed that not being owner, then needs to take secret protection, avoid this Specific privacy is revealed.
It constitutes a threat to protection privacy or owner is unwilling the journey of installation in addition, default process can also be other kinds of The erection schedule of sequence.Such as terminal is after transferring user, user install in the terminal without authorization some wiretapping types program, Or children voluntarily install some trivial games.The biological characteristic of acquisition terminal holder judges at this time.If it is confirmed that being machine Master is using, then need not carry out secret protection;If it is confirmed that not being owner, then needs to take secret protection, avoid in terminal It is mounted unnecessary program.
Step 506:When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, by terminal Carry out secret protection processing.
Preset biological characteristic may include one in one or more of a kind of biological characteristic, multiclass biological characteristic Or it is multiple.Such as it can only include fingerprint characteristic, facial characteristics, iris feature, vocal print feature and the ear line of owner in terminal One or more of feature;Or fingerprint characteristic, facial characteristics, iris feature, the vocal print in terminal including multiple users are special One or more of sign and ear line feature.
When carrying out the matching of biological characteristic, carried out according to preset matching condition.Preset matching condition may include:
Collected any biological characteristic whether there is with preset biological characteristic to be matched;Such as fingerprint characteristic whether there is Matching or facial characteristics whether there is matching with the presence or absence of matching or vocal print feature.
Collected arbitrary at least two inhomogeneous biological characteristic is matched with whether preset biological characteristic exists simultaneously; Such as fingerprint characteristic and face are characterized in no existing simultaneously matching or fingerprint characteristic and vocal print is characterized in no exist simultaneously Match or facial characteristics and vocal print are characterized in no existing simultaneously matching;
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of match, and also collect it is arbitrary separately One inhomogeneous biological characteristic whether there is with preset biological characteristic to be matched;Such as specified fingerprint characteristic is must to acquire simultaneously Matched biological characteristic, and another inhomogeneous biological characteristic is coordinated to be confirmed.
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of matching, and is adopted within the set time Collect the specified biological characteristic and preset biological characteristic with the presence or absence of matching;Such as judge that fingerprint characteristic is twice in 5 seconds It is no to there is matching, to confirm that user shifts.
……
It can be needed to carry out select and set according to the intensity of verification.
In some embodiments, it can includes following manner terminal to be carried out secret protection processing:It reduces Permission Levels, incite somebody to action Terminal is set as the use state of bottom line, is forbidden to use.
Permission Levels are reduced, such as some privacy informations are made to hide and are handled, suitable for temporarily transferring terminal to visitor It uses.
Terminal is set as to the use state of bottom line, such as is only capable of using most basic call function.
It is forbidden to use, such as screen locking, needs to carry out authentication again to obtain access right.It can obtain utmostly Protection.
Above-mentioned method for secret protection, by judging use environment, the biology of acquisition terminal holder in use Feature, and collected biological characteristic is matched with preset biological characteristic, it is ensured that the use of terminal be it is legal or Be authorized to use, to effectively prevent terminal surprisingly shift user when caused by privacy leakage.
In a further embodiment, method for secret protection is as shown in fig. 6, including step 602 to step 606.
Step 602:Multiple preset use environments are set for terminal, and configure testing conditions.Terminal is configured, The multiple possible use environments of prior typing wherein.These use environments are that possible need or not need for users Carry out the use environment of secret protection.The preset use environment can be that system provides, recommends or made by oneself by user Justice.
When configuring use environment, needs cooperation to provide corresponding testing conditions, that is, confirm the testing conditions of use environment. Testing conditions may come from the system detectio function that terminal is capable of providing, to obtain system detectio parameter, including but not limited to The illumination letter of location information, light sensor offer that posture information, GPS sensor or the communication module that gyroscope provides provide The touch information and press that breath, the finger print information of fingerprint module offer, the image information of imaging sensor offer, touch screen provide The key information etc. that key provides.
In some embodiments, the correspondence of use environment and testing conditions may include at least one of:
When terminal connects and use family wifi or geographical location to be near residence in preset range, used for family Environment;It is public use environment when terminal connects and use public wifi or geographical location is in public activity region.This A little use environments are mainly distinguished from the position where terminal, and wherein home environment has obvious privacy.It needs The demand for carrying out secret protection is little.And work as terminal in non-common use environment in use, carrying out the demand of secret protection It is then larger.
Step 604:When terminal meets the feature of a use environment in multiple preset use environments, and in terminal When in use state, if detecting the attitudes vibration that terminal imposes a condition, the biological characteristic of acquisition terminal holder. The use state of terminal refers to the state after unlock in this application, may include the desktop state after unlocking, the application after unlock Setting interface state after program interface state, unlock etc.;Can also include that mobile phone is sent a telegram here and connect by being received under screen lock state State after logical.In a state of use, can be with all or part of function of operating terminal, such as open application, browsing information, connect Make a phone call etc.;The data of terminal part or whole are obtained, such as check photograph album, short message, contact person etc..
Holder terminal, it can be understood as the use for being currently being operated, holding terminal or having operating terminal condition Person.Holder terminal is not limited to the user of handheld terminal.Terminal is determined eventually by perception to environment and use state synthesis Hold holder.Such as terminal is held, screen is contacted, have in imaging sensor close shot character image, using voice communication, make With earphone etc..
When terminal is in use state, the various sensors that can have by it are obtained about holder terminal Biological characteristic.These sensors may include:Face recognition sensor (such as the identification of 3D face recognitions, face-image), iris Sensor, fingerprint sensor (screen lower fingerprint, back fingerprint, side fingerprint etc.), microphone and earphone etc..It is corresponding to it, this A little biological characteristics may include in facial characteristics, iris feature, fingerprint characteristic, vocal print feature and ear line feature it is a kind of with On.
During gatherer process can be happened at holder terminal using terminal, and in a manner of imperceptible into Row.Such as when holder terminal is when clicking screen, can passing through screen, fingerprint sensor obtains fingerprint characteristic down;When terminal is held When browsing screen content, front camera can obtain its face-image and then obtain facial characteristics person;Work as holder terminal When call, its vocal print feature is obtained;When holder terminal is listened to music using earphone, its ear line feature is obtained.
For step 604, which can correspond to attitudes vibration when terminal is grabbed.When terminal is grabbed, Usually with the larger variation of instantaneous acceleration, or the variation of the caused repeatedly acceleration of different directions is pullled back and forth.It is logical It crosses and sets the attitudes vibration similar with judging, confirm whether terminal is grabbed.When judging that terminal is grabbed, start acquisition eventually Hold the biological characteristic of holder to confirm that grabber is not belonging to owner, to start secret protection.
In other embodiments, the attitudes vibration needed for other can also be set, substantially to judge that terminal may be hand over, To which holder terminal be identified in time, facilitate startup secret protection.
Step 606:When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, by terminal Carry out secret protection processing.
Preset biological characteristic may include one in one or more of a kind of biological characteristic, multiclass biological characteristic Or it is multiple.Such as it can only include fingerprint characteristic, facial characteristics, iris feature, vocal print feature and the ear line of owner in terminal One or more of feature;Or fingerprint characteristic, facial characteristics, iris feature, the vocal print in terminal including multiple users are special One or more of sign and ear line feature.
When carrying out the matching of biological characteristic, carried out according to preset matching condition.Preset matching condition may include:
Collected any biological characteristic whether there is with preset biological characteristic to be matched;Such as fingerprint characteristic whether there is Matching or facial characteristics whether there is matching with the presence or absence of matching or vocal print feature.
Collected arbitrary at least two inhomogeneous biological characteristic is matched with whether preset biological characteristic exists simultaneously; Such as fingerprint characteristic and face are characterized in no existing simultaneously matching or fingerprint characteristic and vocal print is characterized in no exist simultaneously Match or facial characteristics and vocal print are characterized in no existing simultaneously matching;
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of match, and also collect it is arbitrary separately One inhomogeneous biological characteristic whether there is with preset biological characteristic to be matched;Such as specified fingerprint characteristic is must to acquire simultaneously Matched biological characteristic, and another inhomogeneous biological characteristic is coordinated to be confirmed.
Specified biological characteristic and preset biological characteristic are collected with the presence or absence of matching, and is adopted within the set time Collect the specified biological characteristic and preset biological characteristic with the presence or absence of matching;Such as judge that fingerprint characteristic is twice in 5 seconds It is no to there is matching, to confirm that user shifts.
……
It can be needed to carry out select and set according to the intensity of verification.
In some embodiments, it can includes following manner terminal to be carried out secret protection processing:It reduces Permission Levels, incite somebody to action Terminal is set as the use state of bottom line, is forbidden to use.
Permission Levels are reduced, such as some privacy informations are made to hide and are handled, suitable for temporarily transferring terminal to visitor It uses.
Terminal is set as to the use state of bottom line, such as is only capable of using most basic call function.
It is forbidden to use, such as screen locking, needs to carry out authentication again to obtain access right.It can obtain utmostly Protection.
Above-mentioned method for secret protection, by judging use environment, the biology of acquisition terminal holder in use Feature, and collected biological characteristic is matched with preset biological characteristic, it is ensured that the use of terminal be it is legal or Be authorized to use, to effectively prevent terminal surprisingly shift user when caused by privacy leakage.
Fig. 7 is the structure diagram of the privacy protection device of one embodiment of the application.The privacy protection device includes:
Use environment configuration module 702 for multiple preset use environments to be arranged for terminal, and configures corresponding detection Condition.
Physical characteristics collecting module 704, for meeting a use environment in multiple preset use environments when terminal Feature when, if terminal is in use state, the biological characteristic of acquisition terminal holder.
Secret protection processing module 706, the biological characteristic and preset biology for working as collected holder terminal are special When sign mismatches, terminal is subjected to secret protection processing.
In some embodiments, the biological characteristic includes:Facial characteristics, iris feature, fingerprint characteristic, vocal print feature with And one or more of ear line feature.
In some embodiments, physical characteristics collecting module 704 is used for when terminal is in use state, duration or week Phase property acquisition terminal holder biological characteristic.
In some embodiments, physical characteristics collecting module 704 is used for when terminal is in use state, if detecting out Default process is opened, then starts the biological characteristic of acquisition terminal holder.
In some embodiments, physical characteristics collecting module 704 is used for when terminal is in use state, if detecting end The attitudes vibration to impose a condition is held, then starts the biological characteristic of acquisition terminal holder.
In some embodiments, secret protection processing module 706, which is used to handle terminal progress secret protection, includes:It reduces Permission Levels, are forbidden to use the use state that terminal is set as to bottom line.
In some embodiments, use environment configuration module 702 includes:
Newly-built unit, for creating use environment according to user instruction;
System function provides unit, for providing system detectio function, to obtain system detectio parameter;
Parameter configuration unit, for being that newly-built use environment configures at least one system detectio function according to user instruction, And it is corresponding system detectio parameter setting detected value.
Specific about privacy protection device limits the restriction that may refer to above for method for secret protection, herein not It repeats again.Modules in above-mentioned privacy protection device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in or independently of in the processor in computer equipment, can also store in a software form in the form of hardware In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
Realizing for modules in the privacy protection device provided in the embodiment of the present application can be the shape of computer program Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal Or on the memory of server.When the computer program is executed by processor, realize that privacy described in the embodiment of the present application is protected The step of maintaining method.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors When so that the processor executes the step of method for secret protection.
A kind of computer program product including instruction, when run on a computer so that computer executes privacy Guard method.
The embodiment of the present application also provides a kind of terminals.As shown in figure 8, for convenience of description, illustrate only and the application The relevant part of embodiment, particular technique details do not disclose, please refer to the embodiment of the present application method part.The terminal can be Including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer, the arbitrary terminal device such as Wearable, by taking terminal is mobile phone as an example:
Fig. 8 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 8, mobile phone Including:Radio frequency (Radio Frequency, RF) circuit 810, memory 820, input unit 830, display unit 840, sensor 850, voicefrequency circuit 860, Wireless Fidelity (wireless fidelity, WiFi) module 870, processor 880 and power supply 890 Equal components.It will be understood by those skilled in the art that handset structure shown in Fig. 8 does not constitute the restriction to mobile phone, may include Than illustrating more or fewer components, certain components or different components arrangement are either combined.
Wherein, RF circuits 810 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station After downlink information receives, handled to processor 880;The data of uplink can also be sent to base station.In general, RF circuits include but Be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 810 can also be communicated with network and other equipment by radio communication.Above-mentioned channel radio Letter can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email, Short message service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storing software program and module, and processor 880 is stored in memory 820 by operation Software program and module, to execute various function application and the data processing of mobile phone.Memory 820 can include mainly Program storage area and data storage area, wherein program storage area can storage program area, the application journey needed at least one function Sequence (such as the application program of sound-playing function, application program of image player function etc.) etc.;Data storage area can store root Created data (such as audio data, address list etc.) etc. are used according to mobile phone.In addition, memory 820 may include high speed Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or Other volatile solid-state parts.
Input unit 830 can be used for receiving the number or character information of input, and generate the user setting with mobile phone 800 And the related key signals input of function control.Specifically, input unit 830 may include operation panel 831 and other inputs Equipment 832.Operation panel 831, alternatively referred to as touch screen collect user on it or neighbouring touch operation (such as user Use the operation of any suitable object or attachment such as finger, stylus on operation panel 831 or near operation panel 831), And corresponding attachment device is driven according to preset formula.In one embodiment, operation panel 831 may include touching inspection Survey two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation The signal brought, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and will It is converted into contact coordinate, then gives processor 880, and can receive order that processor 880 is sent and be executed.In addition, The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave may be used and realize operation panel 831.In addition to operating surface Plate 831, input unit 830 can also include other input equipments 832.Specifically, other input equipments 832 may include but not It is limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.) etc..
Display unit 840 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 840 may include display panel 841.In one embodiment, liquid crystal display (Liquid may be used Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 841.In one embodiment, operation panel 831 can cover display panel 841, when operation panel 831 is examined It measures and sends processor 880 on it or after neighbouring touch operation to determine the type of touch event, be followed by subsequent processing device 880 provide corresponding visual output according to the type of touch event on display panel 841.Although in fig. 8, operation panel 831 be to realize input and the input function of mobile phone as two independent components with display panel 841, but in certain implementations In example, can be integrated by operation panel 831 and display panel 841 and that realizes mobile phone output and input function.
Mobile phone 800 may also include at least one sensor 850, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and range sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 841, and range sensor can close display panel when mobile phone is moved in one's ear 841 and/or backlight.Motion sensor may include acceleration transducer, can detect by acceleration transducer and adds in all directions The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture Switching), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, humidity Other sensors such as meter, thermometer, infrared sensor etc..
Voicefrequency circuit 860, loud speaker 861 and microphone 862 can provide the audio interface between user and mobile phone.Audio-frequency electric The transformed electric signal of the audio data received can be transferred to loud speaker 861 by road 860, and sound is converted to by loud speaker 861 Signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is turned after being received by voicefrequency circuit 860 It is changed to audio data, then by after the processing of audio data output processor 880, another mobile phone can be sent to through RF circuits 810, or Person exports audio data to memory 820 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 870 Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 8 is shown WiFi module 870, but it is understood that, and it is not belonging to must be configured into for mobile phone 800, it can omit as needed.
Processor 880 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 820, and call and be stored in memory 820 Data execute the various functions and processing data of mobile phone, to carry out whole monitoring to mobile phone.In one embodiment, it handles Device 880 may include one or more processing units.In one embodiment, processor 880 can integrate application processor and modulation Demodulator, wherein the main processing operation system of application processor, user interface and application program etc.;Modem is mainly located Reason wireless communication.It is understood that above-mentioned modem can not also be integrated into processor 880.For example, the processor 880 can integrate application processor and baseband processor, baseband processor with and the composable modem such as other peripheral chips. Mobile phone 800 further includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can pass through power management system System is logically contiguous with processor 880, to realize the work(such as management charging, electric discharge and power managed by power-supply management system Energy.
In one embodiment, mobile phone 800 can also include camera, bluetooth module etc..
In the embodiment of the present application, when the processor included by the mobile phone executes the computer program of storage on a memory Realize above-mentioned described information sharing method.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, it is all considered to be the range of this specification record.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention Range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (10)

1. a kind of method for secret protection is applied to terminal, the method includes:
Multiple preset use environments are set for terminal, and configure testing conditions;
When terminal meets the feature of a use environment in multiple preset use environments, if terminal is in use state, The biological characteristic of acquisition terminal holder;
When the biological characteristic of collected holder terminal and preset biological characteristic mismatch, terminal is subjected to secret protection Processing.
2. according to the method described in claim 1, it is characterized in that, the biological characteristic includes:Facial characteristics, iris feature, One or more of fingerprint characteristic, vocal print feature and ear line feature.
3. according to the method described in claim 1, it is characterized in that, when terminal is in use state, duration or periodicity The biological characteristic of ground acquisition terminal holder.
4. according to the method described in claim 1, it is characterized in that, when terminal is in use state, if detecting, unlatching is pre- If process, then start the biological characteristic of acquisition terminal holder.
5. according to the method described in claim 1, it is characterized in that, when terminal is in use state, if detecting, terminal is sent out The raw attitudes vibration to impose a condition, then start the biological characteristic of acquisition terminal holder.
6. according to the method described in claim 1, it is characterized in that, described include by terminal progress secret protection processing:It reduces Permission Levels, are forbidden to use the use state that terminal is set as to bottom line.
7. according to the method described in claim 1, it is characterized in that, described be arranged multiple preset use environments for terminal, and The step of configuring corresponding testing conditions include:
Use environment is created according to user instruction;
System detectio function is provided, to obtain system detectio parameter;
It is at least one system detectio function of newly-built use environment configuration according to user instruction, and is corresponding system detectio parameter Detected value is set.
8. a kind of privacy protection device, which is characterized in that described device includes:
Use environment configuration module for multiple preset use environments to be arranged for terminal, and configures corresponding testing conditions;
Physical characteristics collecting module, the feature for meeting a use environment in multiple preset use environments when terminal When, if terminal is in use state, the biological characteristic of acquisition terminal holder;
Secret protection processing module is mismatched for the biological characteristic when collected holder terminal with preset biological characteristic When, terminal is subjected to secret protection processing.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of any one of claim 1 to 7 the method is realized when processor executes.
10. a kind of terminal, including memory, processor and storage are on a memory and the computer journey that can run on a processor Sequence, which is characterized in that the processor realizes any one of claim 1 to 7 the method when executing the computer program The step of.
CN201810274185.3A 2018-03-29 2018-03-29 Privacy protection method and device, computer readable storage medium and terminal Active CN108537025B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810274185.3A CN108537025B (en) 2018-03-29 2018-03-29 Privacy protection method and device, computer readable storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810274185.3A CN108537025B (en) 2018-03-29 2018-03-29 Privacy protection method and device, computer readable storage medium and terminal

Publications (2)

Publication Number Publication Date
CN108537025A true CN108537025A (en) 2018-09-14
CN108537025B CN108537025B (en) 2020-08-18

Family

ID=63481639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810274185.3A Active CN108537025B (en) 2018-03-29 2018-03-29 Privacy protection method and device, computer readable storage medium and terminal

Country Status (1)

Country Link
CN (1) CN108537025B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933966A (en) * 2019-03-13 2019-06-25 中国人民解放军国防科技大学 Continuous authentication method and system based on biological characteristics
CN110472393A (en) * 2019-07-18 2019-11-19 平安科技(深圳)有限公司 Information display method, device, storage medium and equipment based on bio-identification

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105446571A (en) * 2014-06-27 2016-03-30 联想(北京)有限公司 Information processing method and electronic equipment
EP3079721A1 (en) * 2013-12-11 2016-10-19 Health-Ever Biotech Co. Ltd. Pharmaceutical compositions of carotenoid
CN107577931A (en) * 2017-08-29 2018-01-12 广东欧珀移动通信有限公司 Authority control method and related product
CN107609363A (en) * 2017-10-20 2018-01-19 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN107609407A (en) * 2017-08-16 2018-01-19 广东小天才科技有限公司 The guard method of information security and device in a kind of user terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3079721A1 (en) * 2013-12-11 2016-10-19 Health-Ever Biotech Co. Ltd. Pharmaceutical compositions of carotenoid
CN105446571A (en) * 2014-06-27 2016-03-30 联想(北京)有限公司 Information processing method and electronic equipment
CN107609407A (en) * 2017-08-16 2018-01-19 广东小天才科技有限公司 The guard method of information security and device in a kind of user terminal
CN107577931A (en) * 2017-08-29 2018-01-12 广东欧珀移动通信有限公司 Authority control method and related product
CN107609363A (en) * 2017-10-20 2018-01-19 维沃移动通信有限公司 A kind of unlocking method and mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933966A (en) * 2019-03-13 2019-06-25 中国人民解放军国防科技大学 Continuous authentication method and system based on biological characteristics
CN110472393A (en) * 2019-07-18 2019-11-19 平安科技(深圳)有限公司 Information display method, device, storage medium and equipment based on bio-identification

Also Published As

Publication number Publication date
CN108537025B (en) 2020-08-18

Similar Documents

Publication Publication Date Title
CN108521494A (en) Terminal control method and device, readable storage medium storing program for executing, terminal
CN108536783A (en) Data processing method and device, terminal, computer readable storage medium
CN104915582B (en) unlocking method and device
CN108616652A (en) Data guard method and device, terminal, computer readable storage medium
CN108563932A (en) Application control method and apparatus, readable storage medium storing program for executing, terminal
CN106293751A (en) A kind of method showing information on the terminal device and terminal unit
CN104618605B (en) Mobile terminal locating method and device
CN107437009A (en) Authority control method and related product
CN108573168A (en) Private space starts method and apparatus, storage medium, electronic equipment
CN108537037A (en) Privacy control method and device, computer readable storage medium, terminal
CN105099701B (en) A kind of method of terminal and terminal authentication
CN108573169A (en) Nearest task list display methods and device, storage medium, electronic equipment
CN107346397A (en) Information processing method and related product
CN108353099A (en) A kind of method and apparatus of PPG certifications
CN106611152A (en) User identity determination method and apparatus
CN107491673A (en) Biometric discrimination method and Related product
CN107133507A (en) A kind of privacy services system access method, device and mobile terminal
CN108632454A (en) Information processing method and device, computer readable storage medium, terminal
CN108537058A (en) The polygonal color application method and device, computer readable storage medium, terminal of terminal
CN108509788A (en) Information sharing method and device, computer readable storage medium, terminal
CN108491733A (en) Method and apparatus, storage medium, electronic equipment are recommended in privacy application
CN108197448A (en) Document display method, device, readable storage medium storing program for executing and terminal
CN108537025A (en) Method for secret protection and device, computer readable storage medium, terminal
CN104980436B (en) A kind of encryption transmission system, method, terminal and intermediate server
CN107102913B (en) Data back up method, device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant