CN108537025B - Privacy protection method and device, computer readable storage medium and terminal - Google Patents

Privacy protection method and device, computer readable storage medium and terminal Download PDF

Info

Publication number
CN108537025B
CN108537025B CN201810274185.3A CN201810274185A CN108537025B CN 108537025 B CN108537025 B CN 108537025B CN 201810274185 A CN201810274185 A CN 201810274185A CN 108537025 B CN108537025 B CN 108537025B
Authority
CN
China
Prior art keywords
terminal
preset
biological
environment
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810274185.3A
Other languages
Chinese (zh)
Other versions
CN108537025A (en
Inventor
张伟杰
张俊
谭春宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810274185.3A priority Critical patent/CN108537025B/en
Publication of CN108537025A publication Critical patent/CN108537025A/en
Application granted granted Critical
Publication of CN108537025B publication Critical patent/CN108537025B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The application relates to a privacy protection method and device, a computer readable storage medium and a terminal. The method comprises the following steps: setting a plurality of preset use environments for the terminal, and configuring detection conditions; when the terminal accords with the characteristics of one of a plurality of preset using environments, if the terminal is in a using state, the biological characteristics of a terminal holder are collected; and when the collected biological characteristics of the terminal holder are not matched with the preset biological characteristics, carrying out privacy protection processing on the terminal. Through after judging service environment, gather the biological characteristics of terminal holder in the use to match the biological characteristics who gathers with preset biological characteristics, ensure that the use of terminal is legal or authorized and use, thereby effectively prevent that the privacy that the terminal caused when unexpected transfer user from revealing.

Description

Privacy protection method and device, computer readable storage medium and terminal
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a privacy protection method and apparatus, a computer-readable storage medium, and a terminal.
Background
As terminal devices enter the intelligent era, mobile terminals such as mobile phones and communication tablets play more and more important roles in the life of people. Through various software applications, different requirements of people can be met in the aspects of social contact, shopping, entertainment, work, learning and the like.
At present, the privacy protection requirements of intelligent terminals are more and more, and the privacy protection requirements are more and more complex, so that the requirements under various complex scenes cannot be met, and particularly the privacy protection requirements of the terminals after the terminals are transferred accidentally are met.
Disclosure of Invention
The embodiment of the application provides a privacy protection method and device, a computer-readable storage medium and a terminal, so as to prevent privacy disclosure after the terminal is accidentally transferred.
A privacy protection method is applied to a terminal, and the method comprises the following steps:
setting a plurality of preset use environments for the terminal, and configuring detection conditions;
when the terminal accords with the characteristics of one of a plurality of preset using environments, if the terminal is in a using state, the biological characteristics of a terminal holder are collected;
and when the collected biological characteristics of the terminal holder are not matched with the preset biological characteristics, carrying out privacy protection processing on the terminal.
A privacy preserving apparatus comprising:
the service environment configuration module is used for setting a plurality of preset service environments for the terminal and configuring corresponding detection conditions;
the terminal comprises a biological characteristic acquisition module, a data acquisition module and a data processing module, wherein the biological characteristic acquisition module is used for acquiring the biological characteristics of a terminal holder if the terminal is in a use state when the terminal accords with the characteristics of one of a plurality of preset use environments;
and the privacy protection processing module is used for carrying out privacy protection processing on the terminal when the collected biological characteristics of the terminal holder are not matched with the preset biological characteristics.
A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method in the various embodiments of the application.
A terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method in the various embodiments of the present application are implemented when the computer program is executed by the processor.
According to the privacy protection method and device, the computer readable storage medium and the terminal, after the use environment is judged, the biological characteristics of the terminal holder are collected in the use process, and the collected biological characteristics are matched with the preset biological characteristics, so that the use of the terminal is legal or authorized, and privacy disclosure caused when the terminal transfers users accidentally is effectively prevented.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of the internal structure of a terminal in one embodiment;
FIG. 2 is a flow diagram of a privacy preserving method in one embodiment;
FIG. 3 is a flow diagram that illustrates the processing of setting a predetermined usage environment, in one embodiment;
FIG. 4 is a flow diagram of a privacy preserving method in another embodiment;
FIG. 5 is a flow diagram of a privacy preserving method in yet another embodiment;
FIG. 6 is a flow diagram of a privacy preserving method in yet another embodiment;
FIG. 7 is a block diagram of a privacy preserving apparatus in an embodiment;
fig. 8 is a block diagram of a partial structure of a mobile phone related to a terminal according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another.
In one embodiment, as shown in fig. 1, a schematic diagram of the internal structure of a terminal is provided. The terminal includes a processor, a memory, and a display screen connected by a system bus. Wherein, the processor is used for providing calculation and control capability and supporting the operation of the whole terminal. The memory is used for storing data, programs, and/or instruction codes, and the like, and at least one computer program is stored on the memory, and the computer program can be executed by the processor to realize the privacy protection method suitable for the terminal provided in the embodiment of the application. The Memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random-Access-Memory (RAM). For example, in one embodiment, the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a database, and a computer program. The database stores data related to implementing a privacy protection method provided in the above embodiments, for example, may store a preset processing policy or preset verification information. The computer program can be executed by a processor for implementing a privacy protection method provided by various embodiments of the present application. The internal memory provides a cached operating environment for the operating system, databases, and computer programs in the non-volatile storage medium. The display screen may be a touch screen, such as a capacitive screen or an electronic screen, for displaying interface information of the terminal. The terminal can be a mobile phone, a tablet computer, a personal digital assistant or a wearable device.
The privacy protection method in this embodiment is described by taking the operation on a terminal as an example. The privacy protection method is applied to the terminal, and is particularly suitable for the situation that the terminal changes the user.
In the present application, the terminal changing user specifically means that the terminal is transferred from one user to another user, and may include: the mobile phone is used by a familiar person by the owner, is used by a less familiar or stranger by the owner, is used by a stranger after being lost, is robbed when being used and the like. In the latter several scenarios, the privacy of the owner faces the problem of being compromised.
The application relates to a scheme for privacy protection when a terminal is transferred between different users.
The privacy protection method according to an embodiment of the present application is shown in fig. 2, and includes steps 202 to 206.
Step 202: and setting a plurality of preset use environments for the terminal, and configuring detection conditions. I.e. the terminal is configured in which a plurality of possible usage environments are entered in advance. These use environments are use environments that may or may not require privacy protection for the user. The preset use environment can be provided by the system, recommended or customized by the user.
When configuring the use environment, the corresponding detection conditions, that is, the detection conditions for confirming the use environment, need to be cooperatively provided. The detection condition may be from a system detection function that the terminal can provide to obtain a system detection parameter, including but not limited to attitude information provided by a gyroscope, position information provided by a GPS sensor or a communication module, illumination information provided by a light sensor, fingerprint information provided by a fingerprint module, image information provided by an image sensor, touch information provided by a touch screen, key information provided by a key, and the like.
In some embodiments, the correspondence of the usage environment and the detection condition may include at least one of:
when the terminal is connected and uses the household wifi or the geographical position is in a preset range near the residence, the terminal is a household using environment; and when the terminal is connected and uses the public wifi or the geographic position is in the public activity area, the terminal is a public use environment. These use environments are mainly distinguished from the location where the terminal is located, where the home environment has a relatively obvious privacy. There is little need for privacy protection. When the terminal is used in an unusual use environment, the requirement for privacy protection is large.
Step 204: when the terminal accords with the characteristics of one of a plurality of preset using environments and is in a using state, the biological characteristics of the terminal holder are collected. The use state of the terminal, which refers to the unlocked state in the present application, may include the unlocked desktop state, the unlocked application interface state, the unlocked setting interface state, and the like; the mobile phone can also comprise a state after receiving the incoming call and being connected in the screen locking state. In the use state, a terminal portion or all functions, such as starting an application, browsing information, making and receiving calls, etc., can be operated; and obtaining terminal part or all data, such as viewing photo albums, short messages, contacts and the like.
The terminal holder may be understood as a user who is currently operating, holding, or having a condition for operating the terminal. The terminal holder is not limited to users who hold the terminal. The terminal comprehensively determines the terminal holder through the perception and the use state of the environment. Such as the terminal being held, the screen being touched, close-up character images within the image sensor, using voice calls, using headphones, etc.
When the terminal is in a use state, the biometric features of the terminal holder can be obtained by various sensors provided in the terminal. These sensors may include: facial recognition sensors (e.g., 3D facial recognition, facial image recognition), iris sensors, fingerprint sensors (off-screen, back, side, etc.), microphones, and headphones, among others. Correspondingly, the biometric features may include one or more of facial features, iris features, fingerprint features, voiceprint features, and ear print features.
The acquisition process may take place during the use of the terminal by the terminal holder and may be performed in an imperceptible manner. For example, when the terminal holder clicks the screen, fingerprint features can be acquired through the under-screen fingerprint sensor; when a terminal holder browses screen contents, the front-facing camera can acquire a face image of the terminal holder so as to acquire face features; when a terminal holder calls, acquiring the voiceprint characteristics of the terminal holder; when the terminal holder listens to music using the headphones, the ear print characteristics thereof are acquired.
Step 206: and when the collected biological characteristics of the terminal holder are not matched with the preset biological characteristics, carrying out privacy protection processing on the terminal.
The preset biometric features may include one or more of a class of biometric features, one or more of a class of biometric features. For example, only one or more of a fingerprint feature, a facial feature, an iris feature, a voiceprint feature, and an ear print feature of the individual may be included within the terminal; or one or more of fingerprint, facial, iris, voice, and ear-print characteristics of multiple users.
And when the biological characteristics are matched, the matching is carried out according to preset matching conditions. The preset matching conditions may include:
whether any collected biological characteristics are matched with preset biological characteristics or not is judged; such as whether there is a match for a fingerprint feature, or whether there is a match for a facial feature, or whether there is a match for a voiceprint feature.
Whether the collected at least two different biological characteristics are matched with the preset biological characteristics or not at the same time; for example, whether there is a match between the fingerprint feature and the facial feature, or whether there is a match between the fingerprint feature and the vocal print feature, or whether there is a match between the facial feature and the vocal print feature;
acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not, and acquiring whether any other different biological characteristics are matched with the preset biological characteristics or not; for example, a given fingerprint feature is a biometric that must be acquired and matched and validated against another, different class of biometric.
Acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not, and acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not within set time; for example, within 5 seconds, a determination is made twice as to whether there is a match in the fingerprint characteristics to confirm that the user has transferred.
……
Can be selected and set according to the strength requirements of the verification.
In some embodiments, the privacy protecting process for the terminal may include the following steps: the authority level is lowered, the terminal is set to the minimum use state, and the use is prohibited.
The permission level is lowered, for example, some privacy information is hidden, and the method is suitable for temporarily handing over the terminal to the visitor for use.
The terminal is set to a minimum use state, and for example, only the most basic call function can be used.
The forbidden use, such as screen locking, needs to be authenticated again to obtain the use right. Maximum protection can be obtained.
According to the privacy protection method, the use environment is judged, the biological characteristics of the terminal holder are collected in the use process, the collected biological characteristics are matched with the preset biological characteristics, the use of the terminal is legal or authorized, and therefore privacy disclosure caused when the terminal transfers users accidentally is effectively prevented.
In some embodiments, as shown in fig. 3, the step of setting a plurality of preset usage environments for the terminal and configuring corresponding detection conditions, that is, step 202, may include:
step 302: and establishing a new use environment according to the user instruction. For example, a user may create a new use environment and name "new use environment 1".
Step 304: and providing a system detection function to acquire system detection parameters. The system provides system functions, such as "GPS data," "touch detection data," "wifi connection status data," and the like.
Step 306: and configuring at least one system detection function for the newly-built use environment according to the user instruction, and setting detection values for corresponding system detection parameters. Specifying which instrumentation data is used by the newly created environment of use and what the qualified value is. The configuration values of these detection conditions are input by the user and saved. Thereby forming a user-defined use environment.
Step 302 may also be reading the existing usage environment, and in the subsequent steps, configuring a new system detection function and its detection value for the existing usage environment, or configuring a new detection value for the existing system detection function to adjust the detection condition of the usage environment, so that it is more accurate.
In another embodiment, the privacy protecting method is shown in fig. 4 and includes steps 402 through 406.
Step 402: and setting a plurality of preset use environments for the terminal, and configuring detection conditions. I.e. the terminal is configured in which a plurality of possible usage environments are entered in advance. These use environments are use environments that may or may not require privacy protection for the user. The preset use environment can be provided by the system, recommended or customized by the user.
When configuring the use environment, the corresponding detection conditions, that is, the detection conditions for confirming the use environment, need to be cooperatively provided. The detection condition may be from a system detection function that the terminal can provide to obtain a system detection parameter, including but not limited to attitude information provided by a gyroscope, position information provided by a GPS sensor or a communication module, illumination information provided by a light sensor, fingerprint information provided by a fingerprint module, image information provided by an image sensor, touch information provided by a touch screen, key information provided by a key, and the like.
In some embodiments, the correspondence of the usage environment and the detection condition may include at least one of:
when the terminal is connected and uses the household wifi or the geographical position is in a preset range near the residence, the terminal is a household using environment; and when the terminal is connected and uses the public wifi or the geographic position is in the public activity area, the terminal is a public use environment. These use environments are mainly distinguished from the location where the terminal is located, where the home environment has a relatively obvious privacy. There is little need for privacy protection. When the terminal is used in an unusual use environment, the requirement for privacy protection is large.
Step 404: when the terminal accords with the characteristics of one of a plurality of preset using environments and is in a using state, the biological characteristics of the terminal holder are collected continuously or periodically. The use state of the terminal, which refers to the unlocked state in the present application, may include the unlocked desktop state, the unlocked application interface state, the unlocked setting interface state, and the like; the mobile phone can also comprise a state after receiving the incoming call and being connected in the screen locking state. In the use state, a terminal portion or all functions, such as starting an application, browsing information, making and receiving calls, etc., can be operated; and obtaining terminal part or all data, such as viewing photo albums, short messages, contacts and the like.
The terminal holder may be understood as a user who is currently operating, holding, or having a condition for operating the terminal. The terminal holder is not limited to users who hold the terminal. The terminal comprehensively determines the terminal holder through the perception and the use state of the environment. Such as the terminal being held, the screen being touched, close-up character images within the image sensor, using voice calls, using headphones, etc.
When the terminal is in a use state, the biometric features of the terminal holder can be obtained by various sensors provided in the terminal. These sensors may include: facial recognition sensors (e.g., 3D facial recognition, facial image recognition), iris sensors, fingerprint sensors (off-screen, back, side, etc.), microphones, and headphones, among others. Correspondingly, the biometric features may include one or more of facial features, iris features, fingerprint features, voiceprint features, and ear print features.
The acquisition process may take place during the use of the terminal by the terminal holder and may be performed in an imperceptible manner. For example, when the terminal holder clicks the screen, fingerprint features can be acquired through the under-screen fingerprint sensor; when a terminal holder browses screen contents, the front-facing camera can acquire a face image of the terminal holder so as to acquire face features; when a terminal holder calls, acquiring the voiceprint characteristics of the terminal holder; when the terminal holder listens to music using the headphones, the ear print characteristics thereof are acquired.
For step 404, the biometric features of the terminal holder are continuously collected, that is, during the use of the terminal, the terminal continuously senses the surrounding environment through the sensor and acquires the biometric features that can be acquired. When matching is performed by using a single biometric feature, it is necessary to ensure that the required biometric feature can be acquired to the maximum extent, and continuous acquisition is an effective guarantee means. For example, images within the visual angle range are continuously collected through the front camera, and the appearance of the human face can be ensured to a greater extent. The voice is continuously collected through the microphone, and voiceprint characteristics can be collected to a large extent. The earphone is worn by the user and the earphone is continuously collected when the earphone is connected with the terminal for use, so that the required earphone characteristics can be collected to a greater extent.
The method comprises the steps of periodically collecting the biological characteristics of a terminal holder, namely acquiring the biological characteristics of the terminal holder through a sensor at set intervals in the use process of the terminal. When a plurality of biological characteristics are adopted for matching, the acquisition periods of the sensors can be staggered, so that the sensors sequentially perform acquisition within a period of time, and the aim of continuous acquisition is fulfilled. Meanwhile, the instant resource consumption is prevented from being increased when a plurality of sensors work simultaneously. Of course, a periodic acquisition may also be used when matching is performed using a single biometric. For easy-to-acquire biometrics, continuous acquisition is not necessary. For example, a terminal with a touch screen is provided with an off-screen fingerprint module, and when a user uses the touch screen, the user can easily obtain fingerprint characteristics through the off-screen fingerprint module.
Continuous or periodic acquisition can ensure that the acquisition process is triggered correctly without distinguishing different scenarios where the terminal is located.
Step 406: and when the collected biological characteristics of the terminal holder are not matched with the preset biological characteristics, carrying out privacy protection processing on the terminal.
The preset biometric features may include one or more of a class of biometric features, one or more of a class of biometric features. For example, only one or more of a fingerprint feature, a facial feature, an iris feature, a voiceprint feature, and an ear print feature of the individual may be included within the terminal; or one or more of fingerprint, facial, iris, voice, and ear-print characteristics of multiple users.
And when the biological characteristics are matched, the matching is carried out according to preset matching conditions. The preset matching conditions may include:
whether any collected biological characteristics are matched with preset biological characteristics or not is judged; such as whether there is a match for a fingerprint feature, or whether there is a match for a facial feature, or whether there is a match for a voiceprint feature.
Whether the collected at least two different biological characteristics are matched with the preset biological characteristics or not at the same time; for example, whether there is a match between the fingerprint feature and the facial feature, or whether there is a match between the fingerprint feature and the vocal print feature, or whether there is a match between the facial feature and the vocal print feature;
acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not, and acquiring whether any other different biological characteristics are matched with the preset biological characteristics or not; for example, a given fingerprint feature is a biometric that must be acquired and matched and validated against another, different class of biometric.
Acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not, and acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not within set time; for example, within 5 seconds, a determination is made twice as to whether there is a match in the fingerprint characteristics to confirm that the user has transferred.
……
Can be selected and set according to the strength requirements of the verification.
In some embodiments, the privacy protecting process for the terminal may include the following steps: the authority level is lowered, the terminal is set to the minimum use state, and the use is prohibited.
The permission level is lowered, for example, some privacy information is hidden, and the method is suitable for temporarily handing over the terminal to the visitor for use.
The terminal is set to a minimum use state, and for example, only the most basic call function can be used.
The forbidden use, such as screen locking, needs to be authenticated again to obtain the use right. Maximum protection can be obtained.
According to the privacy protection method, the use environment is judged, the biological characteristics of the terminal holder are collected in the use process, the collected biological characteristics are matched with the preset biological characteristics, the use of the terminal is legal or authorized, and therefore privacy disclosure caused when the terminal transfers users accidentally is effectively prevented.
In yet another embodiment, a privacy preserving method is shown in fig. 5, comprising steps 502-506.
Step 502: and setting a plurality of preset use environments for the terminal, and configuring detection conditions. I.e. the terminal is configured in which a plurality of possible usage environments are entered in advance. These use environments are use environments that may or may not require privacy protection for the user. The preset use environment can be provided by the system, recommended or customized by the user.
When configuring the use environment, the corresponding detection conditions, that is, the detection conditions for confirming the use environment, need to be cooperatively provided. The detection condition may be from a system detection function that the terminal can provide to obtain a system detection parameter, including but not limited to attitude information provided by a gyroscope, position information provided by a GPS sensor or a communication module, illumination information provided by a light sensor, fingerprint information provided by a fingerprint module, image information provided by an image sensor, touch information provided by a touch screen, key information provided by a key, and the like.
In some embodiments, the correspondence of the usage environment and the detection condition may include at least one of:
when the terminal is connected and uses the household wifi or the geographical position is in a preset range near the residence, the terminal is a household using environment; and when the terminal is connected and uses the public wifi or the geographic position is in the public activity area, the terminal is a public use environment. These use environments are mainly distinguished from the location where the terminal is located, where the home environment has a relatively obvious privacy. There is little need for privacy protection. When the terminal is used in an unusual use environment, the requirement for privacy protection is large.
Step 504: when the terminal accords with the characteristics of one of a plurality of preset using environments and is in a using state, if the preset process is detected to be started, the biological characteristics of the terminal holder are collected. The use state of the terminal, which refers to the unlocked state in the present application, may include the unlocked desktop state, the unlocked application interface state, the unlocked setting interface state, and the like; the mobile phone can also comprise a state after receiving the incoming call and being connected in the screen locking state. In the use state, a terminal portion or all functions, such as starting an application, browsing information, making and receiving calls, etc., can be operated; and obtaining terminal part or all data, such as viewing photo albums, short messages, contacts and the like.
The terminal holder may be understood as a user who is currently operating, holding, or having a condition for operating the terminal. The terminal holder is not limited to users who hold the terminal. The terminal comprehensively determines the terminal holder through the perception and the use state of the environment. Such as the terminal being held, the screen being touched, close-up character images within the image sensor, using voice calls, using headphones, etc.
When the terminal is in a use state, the biometric features of the terminal holder can be obtained by various sensors provided in the terminal. These sensors may include: facial recognition sensors (e.g., 3D facial recognition, facial image recognition), iris sensors, fingerprint sensors (off-screen, back, side, etc.), microphones, and headphones, among others. Correspondingly, the biometric features may include one or more of facial features, iris features, fingerprint features, voiceprint features, and ear print features.
The acquisition process may take place during the use of the terminal by the terminal holder and may be performed in an imperceptible manner. For example, when the terminal holder clicks the screen, fingerprint features can be acquired through the under-screen fingerprint sensor; when a terminal holder browses screen contents, the front-facing camera can acquire a face image of the terminal holder so as to acquire face features; when a terminal holder calls, acquiring the voiceprint characteristics of the terminal holder; when the terminal holder listens to music using the headphones, the ear print characteristics thereof are acquired.
For step 504, when the terminal handover user is not avoided, to prevent the specific privacy from being revealed, the turn-on of the process required for the specific privacy may be detected. If the processes required for a particular privacy are turned on, it may be used by the owner or snooped by other users. At this time, the biological characteristics of the terminal holder are collected for judgment. If the owner is confirmed to use the mobile terminal, privacy protection is not needed; if the confirmation is not the owner, privacy protection is required to avoid the specific privacy disclosure.
In addition, the default process may be an installation process for other types of programs that pose a threat to privacy protection or are unwilling to be installed by the owner. For example, after the terminal hands over the user, the user is good at installing some eavesdropping-like program in the terminal, or a child installs some mini-game by himself. At this time, the biological characteristics of the terminal holder are collected for judgment. If the owner is confirmed to use the mobile terminal, privacy protection is not needed; if the terminal is confirmed not to be the owner, privacy protection is needed to avoid unnecessary programs installed in the terminal.
Step 506: and when the collected biological characteristics of the terminal holder are not matched with the preset biological characteristics, carrying out privacy protection processing on the terminal.
The preset biometric features may include one or more of a class of biometric features, one or more of a class of biometric features. For example, only one or more of a fingerprint feature, a facial feature, an iris feature, a voiceprint feature, and an ear print feature of the individual may be included within the terminal; or one or more of fingerprint, facial, iris, voice, and ear-print characteristics of multiple users.
And when the biological characteristics are matched, the matching is carried out according to preset matching conditions. The preset matching conditions may include:
whether any collected biological characteristics are matched with preset biological characteristics or not is judged; such as whether there is a match for a fingerprint feature, or whether there is a match for a facial feature, or whether there is a match for a voiceprint feature.
Whether the collected at least two different biological characteristics are matched with the preset biological characteristics or not at the same time; for example, whether there is a match between the fingerprint feature and the facial feature, or whether there is a match between the fingerprint feature and the vocal print feature, or whether there is a match between the facial feature and the vocal print feature;
acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not, and acquiring whether any other different biological characteristics are matched with the preset biological characteristics or not; for example, a given fingerprint feature is a biometric that must be acquired and matched and validated against another, different class of biometric.
Acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not, and acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not within set time; for example, within 5 seconds, a determination is made twice as to whether there is a match in the fingerprint characteristics to confirm that the user has transferred.
……
Can be selected and set according to the strength requirements of the verification.
In some embodiments, the privacy protecting process for the terminal may include the following steps: the authority level is lowered, the terminal is set to the minimum use state, and the use is prohibited.
The permission level is lowered, for example, some privacy information is hidden, and the method is suitable for temporarily handing over the terminal to the visitor for use.
The terminal is set to a minimum use state, and for example, only the most basic call function can be used.
The forbidden use, such as screen locking, needs to be authenticated again to obtain the use right. Maximum protection can be obtained.
According to the privacy protection method, the use environment is judged, the biological characteristics of the terminal holder are collected in the use process, the collected biological characteristics are matched with the preset biological characteristics, the use of the terminal is legal or authorized, and therefore privacy disclosure caused when the terminal transfers users accidentally is effectively prevented.
In yet another embodiment, the privacy protecting method is shown in fig. 6, and includes steps 602 to 606.
Step 602: and setting a plurality of preset use environments for the terminal, and configuring detection conditions. I.e. the terminal is configured in which a plurality of possible usage environments are entered in advance. These use environments are use environments that may or may not require privacy protection for the user. The preset use environment can be provided by the system, recommended or customized by the user.
When configuring the use environment, the corresponding detection conditions, that is, the detection conditions for confirming the use environment, need to be cooperatively provided. The detection condition may be from a system detection function that the terminal can provide to obtain a system detection parameter, including but not limited to attitude information provided by a gyroscope, position information provided by a GPS sensor or a communication module, illumination information provided by a light sensor, fingerprint information provided by a fingerprint module, image information provided by an image sensor, touch information provided by a touch screen, key information provided by a key, and the like.
In some embodiments, the correspondence of the usage environment and the detection condition may include at least one of:
when the terminal is connected and uses the household wifi or the geographical position is in a preset range near the residence, the terminal is a household using environment; and when the terminal is connected and uses the public wifi or the geographic position is in the public activity area, the terminal is a public use environment. These use environments are mainly distinguished from the location where the terminal is located, where the home environment has a relatively obvious privacy. There is little need for privacy protection. When the terminal is used in an unusual use environment, the requirement for privacy protection is large.
Step 604: when the terminal accords with the characteristics of one of a plurality of preset using environments and is in a using state, if the terminal is detected to generate the posture change of the set condition, the biological characteristics of the terminal holder are collected. The use state of the terminal, which refers to the unlocked state in the present application, may include the unlocked desktop state, the unlocked application interface state, the unlocked setting interface state, and the like; the mobile phone can also comprise a state after receiving the incoming call and being connected in the screen locking state. In the use state, a terminal portion or all functions, such as starting an application, browsing information, making and receiving calls, etc., can be operated; and obtaining terminal part or all data, such as viewing photo albums, short messages, contacts and the like.
The terminal holder may be understood as a user who is currently operating, holding, or having a condition for operating the terminal. The terminal holder is not limited to users who hold the terminal. The terminal comprehensively determines the terminal holder through the perception and the use state of the environment. Such as the terminal being held, the screen being touched, close-up character images within the image sensor, using voice calls, using headphones, etc.
When the terminal is in a use state, the biometric features of the terminal holder can be obtained by various sensors provided in the terminal. These sensors may include: facial recognition sensors (e.g., 3D facial recognition, facial image recognition), iris sensors, fingerprint sensors (off-screen, back, side, etc.), microphones, and headphones, among others. Correspondingly, the biometric features may include one or more of facial features, iris features, fingerprint features, voiceprint features, and ear print features.
The acquisition process may take place during the use of the terminal by the terminal holder and may be performed in an imperceptible manner. For example, when the terminal holder clicks the screen, fingerprint features can be acquired through the under-screen fingerprint sensor; when a terminal holder browses screen contents, the front-facing camera can acquire a face image of the terminal holder so as to acquire face features; when a terminal holder calls, acquiring the voiceprint characteristics of the terminal holder; when the terminal holder listens to music using the headphones, the ear print characteristics thereof are acquired.
For step 604, the change in pose may correspond to a change in pose when the terminal is robbed. When the terminal is robbed, it usually accompanies a large change in instantaneous acceleration or a change in acceleration in a plurality of different directions due to pulling back and forth. Whether the terminal is robbed or not is confirmed by setting and judging similar posture changes. When the terminal is determined to be robbed, the biometric feature of the terminal holder is started to be collected to confirm that the robber does not belong to the owner, thereby starting privacy protection.
In other embodiments, other required posture changes can be set to roughly judge that the terminal is possibly handed over, so that the terminal holder can be identified in time, and privacy protection can be started conveniently.
Step 606: and when the collected biological characteristics of the terminal holder are not matched with the preset biological characteristics, carrying out privacy protection processing on the terminal.
The preset biometric features may include one or more of a class of biometric features, one or more of a class of biometric features. For example, only one or more of a fingerprint feature, a facial feature, an iris feature, a voiceprint feature, and an ear print feature of the individual may be included within the terminal; or one or more of fingerprint, facial, iris, voice, and ear-print characteristics of multiple users.
And when the biological characteristics are matched, the matching is carried out according to preset matching conditions. The preset matching conditions may include:
whether any collected biological characteristics are matched with preset biological characteristics or not is judged; such as whether there is a match for a fingerprint feature, or whether there is a match for a facial feature, or whether there is a match for a voiceprint feature.
Whether the collected at least two different biological characteristics are matched with the preset biological characteristics or not at the same time; for example, whether there is a match between the fingerprint feature and the facial feature, or whether there is a match between the fingerprint feature and the vocal print feature, or whether there is a match between the facial feature and the vocal print feature;
acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not, and acquiring whether any other different biological characteristics are matched with the preset biological characteristics or not; for example, a given fingerprint feature is a biometric that must be acquired and matched and validated against another, different class of biometric.
Acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not, and acquiring whether the specified biological characteristics are matched with the preset biological characteristics or not within set time; for example, within 5 seconds, a determination is made twice as to whether there is a match in the fingerprint characteristics to confirm that the user has transferred.
……
Can be selected and set according to the strength requirements of the verification.
In some embodiments, the privacy protecting process for the terminal may include the following steps: the authority level is lowered, the terminal is set to the minimum use state, and the use is prohibited.
The permission level is lowered, for example, some privacy information is hidden, and the method is suitable for temporarily handing over the terminal to the visitor for use.
The terminal is set to a minimum use state, and for example, only the most basic call function can be used.
The forbidden use, such as screen locking, needs to be authenticated again to obtain the use right. Maximum protection can be obtained.
According to the privacy protection method, the use environment is judged, the biological characteristics of the terminal holder are collected in the use process, the collected biological characteristics are matched with the preset biological characteristics, the use of the terminal is legal or authorized, and therefore privacy disclosure caused when the terminal transfers users accidentally is effectively prevented.
Fig. 7 is a block diagram of a privacy protecting apparatus according to an embodiment of the present application. The privacy securing apparatus includes:
a usage environment configuration module 702, configured to set a plurality of preset usage environments for the terminal, and configure corresponding detection conditions.
The biometric feature collection module 704 is configured to collect a biometric feature of the terminal holder when the terminal conforms to a feature of one of the plurality of preset usage environments, if the terminal is in a usage state.
And the privacy protection processing module 706 is configured to perform privacy protection processing on the terminal when the collected biometric features of the terminal holder are not matched with the preset biometric features.
In some embodiments, the biometric features include: one or more of facial features, iris features, fingerprint features, voice print features, and ear print features.
In some embodiments, the biometric acquisition module 704 is configured to continuously or periodically acquire the biometric of the terminal holder while the terminal is in use.
In some embodiments, the biometric collecting module 704 is configured to start collecting the biometric of the terminal holder when the terminal is in the use state and if it is detected that the preset process is started.
In some embodiments, the biometric acquiring module 704 is configured to start acquiring the biometric of the terminal holder when the terminal is in the use state and if the terminal is detected to have a posture change of the setting condition.
In some embodiments, the privacy protection processing module 706 configured to perform privacy protection processing on the terminal includes: the authority level is lowered, the terminal is set to the minimum use state, and the use is prohibited.
In some embodiments, the usage environment configuration module 702 includes:
the new building unit is used for building a new use environment according to a user instruction;
the system function providing unit is used for providing a system detection function so as to acquire system detection parameters;
and the parameter configuration unit is used for configuring at least one system detection function for the newly-built using environment according to the user instruction and setting a detection value for the corresponding system detection parameter.
For the specific definition of the privacy protecting device, reference may be made to the above definition of the privacy protecting method, which is not described herein again. The modules in the privacy protecting device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The modules in the privacy protecting apparatus provided in the embodiments of the present application may be implemented in the form of a computer program. The computer program may be run on a terminal or a server. The program modules constituted by the computer program may be stored on the memory of the terminal or the server. The computer program, when executed by a processor, performs the steps of the privacy preserving method described in the embodiments of the present application.
The embodiment of the application also provides a computer readable storage medium. One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to perform the steps of the privacy protection method.
A computer program product containing instructions which, when run on a computer, cause the computer to perform a privacy preserving method.
The embodiment of the application also provides a terminal. As shown in fig. 8, for convenience of explanation, only the parts related to the embodiments of the present application are shown, and details of the technology are not disclosed, please refer to the method part of the embodiments of the present application. The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of sales), a vehicle-mounted computer, a wearable device, and so on, taking the terminal as the mobile phone as an example:
fig. 8 is a block diagram of a partial structure of a mobile phone related to a terminal according to an embodiment of the present application. Referring to fig. 8, the handset includes: radio Frequency (RF) circuitry 810, memory 820, input unit 830, display unit 840, sensor 850, audio circuitry 860, wireless fidelity (WiFi) module 870, processor 880, and power supply 890. Those skilled in the art will appreciate that the handset configuration shown in fig. 8 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The RF circuit 810 may be used for receiving and transmitting signals during information transmission and reception or during a call, and may receive downlink information of a base station and then process the downlink information to the processor 880; the uplink data may also be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 810 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE)), e-mail, Short Messaging Service (SMS), and the like.
The memory 820 may be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the cellular phone by operating the software programs and modules stored in the memory 820. The memory 820 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function (such as an application program for a sound playing function, an application program for an image playing function, and the like), and the like; the data storage area may store data (such as audio data, an address book, etc.) created according to the use of the mobile phone, and the like. Further, the memory 820 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 830 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone 800. Specifically, the input unit 830 may include an operation panel 831 and other input devices 832. The operation panel 831, which may also be referred to as a touch screen, may collect touch operations of a user (e.g., operations of the user on the operation panel 831 or in the vicinity of the operation panel 831 using any suitable object or accessory such as a finger or a stylus) thereon or nearby, and drive the corresponding connection device according to a preset program. In one embodiment, the operation panel 831 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts it to touch point coordinates, and sends the touch point coordinates to the processor 880, and can receive and execute commands from the processor 880. In addition, the operation panel 831 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 830 may include other input devices 832 in addition to the operation panel 831. In particular, other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), and the like.
The display unit 840 may be used to display information input by the user or information provided to the user and various menus of the cellular phone. The display unit 840 may include a display panel 841. In one embodiment, the Display panel 841 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. In one embodiment, the operation panel 831 can cover the display panel 841, and when the operation panel 831 detects a touch operation thereon or nearby, it is transmitted to the processor 880 to determine the type of touch event, and then the processor 880 provides a corresponding visual output on the display panel 841 according to the type of touch event. Although in fig. 8 the operation panel 831 and the display panel 841 are two separate components to implement the input and output functions of the mobile phone, in some embodiments the operation panel 831 and the display panel 841 may be integrated to implement the input and output functions of the mobile phone.
The cell phone 800 may also include at least one sensor 850, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 841 according to the brightness of ambient light, and a distance sensor that turns off the display panel 841 and/or the backlight when the mobile phone is moved to the ear. The motion sensor can comprise an acceleration sensor, the acceleration sensor can detect the magnitude of acceleration in each direction, the magnitude and the direction of gravity can be detected when the mobile phone is static, and the motion sensor can be used for identifying the application of the gesture of the mobile phone (such as horizontal and vertical screen switching), the vibration identification related functions (such as pedometer and knocking) and the like; the mobile phone may be provided with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor.
The audio circuitry 860, speaker 861 and microphone 862 may provide an audio interface between the user and the handset. The audio circuit 860 can transmit the electrical signal converted from the received audio data to the speaker 861, and the electrical signal is converted into a sound signal by the speaker 861 and output; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal, which is received by the audio circuit 860 and converted into audio data, and then the audio data is output to the processor 880 for processing, and then the audio data may be transmitted to another mobile phone through the RF circuit 810, or the audio data may be output to the memory 820 for subsequent processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to send and receive e-mails, browse webpages, access streaming media and the like through the WiFi module 870, and provides wireless broadband Internet access for the user. Although fig. 8 shows WiFi module 870, it is understood that it is not an essential component of cell phone 800 and may be omitted as desired.
The processor 880 is a control center of the mobile phone, connects various parts of the entire mobile phone using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 820 and calling data stored in the memory 820, thereby performing an overall listening to the mobile phone. In one embodiment, processor 880 may include one or more processing units. In one embodiment, the processor 880 may integrate an application processor and a modem, wherein the application processor primarily handles operating systems, user interfaces, applications, and the like; the modem handles primarily wireless communications. It is to be appreciated that the modem need not be integrated into the processor 880. For example, the processor 880 may integrate an application processor and a baseband processor, which may constitute a modem with other peripheral chips, etc. The cell phone 800 also includes a power supply 890 (e.g., a battery) for powering the various components, which may be logically coupled to the processor 880 via a power management system that may be used to manage charging, discharging, and power consumption.
In one embodiment, the cell phone 800 may also include a camera, a bluetooth module, and the like.
In the embodiment of the present application, the processor included in the mobile phone implements the information sharing method described above when executing the computer program stored in the memory.
Any reference to memory, storage, database, or other medium used herein may include non-volatile and/or volatile memory. Suitable non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (6)

1. A privacy protection method is applied to a terminal, and the method comprises the following steps:
setting a plurality of preset use environments for the terminal, and configuring detection conditions; the detection condition comprises attitude information provided by a gyroscope; the plurality of preset use environments comprise a family environment and a public use environment;
when the terminal accords with the characteristics of one of a plurality of preset using environments, if the terminal is in an unlocked using state and detects that a preset process is started or detects that the terminal has a posture change of a set condition, acquiring the biological characteristics of a terminal holder;
when the collected biological characteristics of the terminal holder are not matched with the preset biological characteristics, the terminal is subjected to privacy protection processing; the privacy protection processing of the terminal comprises the following steps: the authority level is reduced, the terminal is set to be in a minimum use state, and the use is forbidden;
the step of setting a plurality of preset use environments for the terminal and configuring corresponding detection conditions comprises the following steps:
establishing a use environment or reading the existing use environment according to a user instruction;
providing a system detection function to obtain system detection parameters;
and configuring at least one system detection function for the newly-built use environment according to the user instruction, and setting detection values for corresponding system detection parameters.
2. The method of claim 1, wherein the biometric features comprise: one or more of facial features, iris features, fingerprint features, voice print features, and ear print features.
3. The method according to claim 1, characterized in that the biometric characteristic of the terminal holder is continuously or periodically acquired while the terminal is in use.
4. An apparatus for privacy protection, the apparatus comprising:
the service environment configuration module is used for setting a plurality of preset service environments for the terminal and configuring corresponding detection conditions; the detection condition comprises attitude information provided by a gyroscope; the plurality of preset use environments comprise a family environment and a public use environment;
the terminal comprises a biological characteristic acquisition module, a judgment module and a display module, wherein the biological characteristic acquisition module is used for acquiring the biological characteristics of a terminal holder if the terminal is in an unlocked use state and detects that a preset process is started or detects that the terminal has posture change of a set condition when the terminal accords with the characteristics of one of a plurality of preset use environments;
the privacy protection processing module is used for carrying out privacy protection processing on the terminal when the collected biological characteristics of the terminal holder are not matched with the preset biological characteristics; the privacy protection processing of the terminal comprises the following steps: the authority level is reduced, the terminal is set to be in a minimum use state, and the use is forbidden;
the usage environment configuration module is further configured to:
establishing a use environment or reading the existing use environment according to a user instruction;
providing a system detection function to obtain system detection parameters;
and configuring at least one system detection function for the newly-built use environment according to the user instruction, and setting detection values for corresponding system detection parameters.
5. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 3.
6. A terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 3 are implemented by the processor when executing the computer program.
CN201810274185.3A 2018-03-29 2018-03-29 Privacy protection method and device, computer readable storage medium and terminal Active CN108537025B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810274185.3A CN108537025B (en) 2018-03-29 2018-03-29 Privacy protection method and device, computer readable storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810274185.3A CN108537025B (en) 2018-03-29 2018-03-29 Privacy protection method and device, computer readable storage medium and terminal

Publications (2)

Publication Number Publication Date
CN108537025A CN108537025A (en) 2018-09-14
CN108537025B true CN108537025B (en) 2020-08-18

Family

ID=63481639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810274185.3A Active CN108537025B (en) 2018-03-29 2018-03-29 Privacy protection method and device, computer readable storage medium and terminal

Country Status (1)

Country Link
CN (1) CN108537025B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933966A (en) * 2019-03-13 2019-06-25 中国人民解放军国防科技大学 A kind of lasting authentication method and its system based on biological characteristic

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609363A (en) * 2017-10-20 2018-01-19 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN107609407A (en) * 2017-08-16 2018-01-19 广东小天才科技有限公司 The guard method of information security and device in a kind of user terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015087242A1 (en) * 2013-12-11 2015-06-18 Health-Ever Biotech Co. Ltd Pharmaceutical compositions of carotenoid
CN105446571A (en) * 2014-06-27 2016-03-30 联想(北京)有限公司 Information processing method and electronic equipment
CN107577931A (en) * 2017-08-29 2018-01-12 广东欧珀移动通信有限公司 Authority control method and related product

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609407A (en) * 2017-08-16 2018-01-19 广东小天才科技有限公司 The guard method of information security and device in a kind of user terminal
CN107609363A (en) * 2017-10-20 2018-01-19 维沃移动通信有限公司 A kind of unlocking method and mobile terminal

Also Published As

Publication number Publication date
CN108537025A (en) 2018-09-14

Similar Documents

Publication Publication Date Title
CN106778175B (en) Interface locking method and device and terminal equipment
CN108462697B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN108563932B (en) Application control method and device, readable storage medium and terminal
CN108521494B (en) Terminal control method and device, readable storage medium and terminal
CN106548144B (en) Iris information processing method and device and mobile terminal
CN112799750A (en) Terminal equipment information display method and terminal equipment
CN108574940B (en) Incoming call processing method and device
CN108536783B (en) Data processing method and device, terminal and computer readable storage medium
CN108418953B (en) Screen control method and device of terminal, readable storage medium and terminal
CN106445596B (en) Method and device for managing setting items
CN107046595A (en) Announcement information processing method, device and mobile terminal
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN106850957B (en) Application notification management method and device and mobile terminal
CN110460700B (en) Display screen control method and device, electronic equipment and storage medium
WO2018099043A1 (en) Terminal behavior triggering method and terminal
CN108616652B (en) Data protection method and device, terminal and computer readable storage medium
CN108549804B (en) Mode switching method and device, computer readable storage medium and terminal
CN108537025B (en) Privacy protection method and device, computer readable storage medium and terminal
CN107257408B (en) Main screen page display method, terminal and computer readable storage medium
CN108632454B (en) Information processing method and device, computer readable storage medium and terminal
WO2019196704A1 (en) Inter-multi-character message notification method and device within terminal, and terminal
CN107818247B (en) Mobile terminal unlocking method and mobile terminal
CN108509788B (en) Information sharing method and device, computer readable storage medium and terminal
CN107577933B (en) Application login method and device, computer equipment and computer readable storage medium
CN108537058A (en) The polygonal color application method and device, computer readable storage medium, terminal of terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant