CN109165501A - Mobile terminal, intelligent terminal and its method for secret protection and storage medium - Google Patents
Mobile terminal, intelligent terminal and its method for secret protection and storage medium Download PDFInfo
- Publication number
- CN109165501A CN109165501A CN201810954802.4A CN201810954802A CN109165501A CN 109165501 A CN109165501 A CN 109165501A CN 201810954802 A CN201810954802 A CN 201810954802A CN 109165501 A CN109165501 A CN 109165501A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- password
- photo
- preset
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
The present invention provides a kind of mobile terminal, intelligent terminal and its method for secret protection and storage medium, the method is by receiving screen-lock password and being compared the screen-lock password with the first preset password;The output error signal when comparison result number is more than preset value;User's photo is acquired according to the error signal;User's photo and alarm signal are exported, the purpose of protection privacy of user and property safety is realized with this.
Description
Technical field
The present invention relates to intelligent communication technical field more particularly to a kind of mobile terminals, intelligent terminal and its secret protection
Method and storage medium.
Background technique
Smartwatch has information processing capability, in addition to indicating the time, also has and reminds, navigation, calibration, monitoring, hands over
Mutually wait one of or multiple functions;Display mode includes pointer, number, image etc..Now can by smart phone or
Home network is connected with internet, the contents such as display incoming information, news and Weather information.Smartwatch is simply lightly convenient for taking
Band.
Smart phone has independent operating system, and various application programs can be voluntarily installed by user, pass through this class
Sequence constantly expands the function of mobile phone, and smart phone is other than having common call function, powerful function phase
When in a computer, therefore, information security and individual privacy in smart phone will become safely abnormal important, in smart phone
How to pass through smartwatch when being used by others or losing prevents information leakage to become current urgent problem to be solved.
Summary of the invention
The invention mainly solves the technical problem of providing a kind of mobile terminal, intelligent terminal and its method for secret protection and
Storage medium, with achieve the purpose that protect privacy of user and property safety with it is antitheft.
In order to solve the above technical problems, one technical scheme adopted by the invention is that:
A kind of method for protecting mobile terminal privacy is provided, comprising:
Mobile terminal receives screen-lock password and is compared the screen-lock password with the first preset password;
The output error signal when comparison result number is more than preset value;
According to error signal background acquisition user's photo;And
Backstage exports user's photo and alarm signal.
In order to solve the above technical problems, another technical solution used in the present invention is: a kind of mobile terminal is provided, it is described
Mobile terminal includes memory and processor interconnected, wherein
The memory is used to store the program instruction for realizing method for secret protection described in above-mentioned any one;
The processor is used to execute the described program instruction of the memory storage.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of storage medium, store
There is the program file that can be realized any of the above-described the method.
In order to solve the above technical problems, another technical solution used in the present invention is: providing a kind of intelligent terminal privacy
Guard method, comprising:
It receives user's photo and alarm signal from mobile terminal and alarms and solved with prompting mobile terminal
Lock;
It receives shutdown confirmation instruction and exports off signal to the mobile terminal.
In order to solve the above technical problems, another technical solution used in the present invention is: a kind of intelligent terminal is provided, it is described
Intelligent terminal includes memory and processor interconnected, wherein
The memory is used to store the program instruction for realizing method for secret protection described in above-mentioned any one;
The processor is used to execute the described program instruction of the memory storage
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of storage medium, store
There is the program file that can be realized any of the above-described the method.
The beneficial effects of the present invention are: being different from the prior art, method for secret protection proposed by the present invention passes through mobile whole
End receives screen-lock password and is compared the screen-lock password with the first preset password;It is more than preset value in comparison result number
When output error signal;According to error signal background acquisition user's photo;Backstage exports user's photo and report
Alert signal.Privacy of user and safeguarding of assets and antitheft purpose are realized with this.
Detailed description of the invention
Fig. 1 and Fig. 2 is the flow diagram of method for protecting mobile terminal privacy of the present invention;
Fig. 3 is the flow diagram of intelligent terminal method for secret protection of the present invention;
Fig. 4 is the flow diagram of method for secret protection of the mobile terminal of the present invention in conjunction with intelligent terminal;
Fig. 5 is the structural schematic diagram of mobile terminal and intelligent terminal of the present invention;
Fig. 6 is the structural schematic diagram of storage medium of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiment is only a part of the embodiment of the application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
Term " first ", " second ", " third " in the application are used for description purposes only, and should not be understood as instruction or dark
Show relative importance or implicitly indicates the quantity of indicated technical characteristic." first ", " second ", " are defined as a result,
Three " feature can explicitly or implicitly include at least one of the features.In the description of the present application, the meaning of " plurality " is extremely
It is two few, such as two, three etc., unless otherwise specifically defined.The directional instruction of institute is (all in the embodiment of the present application
Such as up, down, left, right, before and after ...) it is only used for explaining in the phase under a certain particular pose (as shown in the picture) between each component
To positional relationship, motion conditions etc., if the particular pose changes, directionality instruction also correspondingly changes therewith
Become.In addition, term " includes " and " having " and their any deformations, it is intended that cover and non-exclusive include.Such as comprising
The process, method, system, product or equipment of a series of steps or units are not limited to listed step or unit, and
It is optionally further comprising the step of not listing or unit, or optionally further comprising for these process, methods, product or equipment
Intrinsic other step or units.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
The present invention will be described in detail with reference to the accompanying drawings and examples.
Fig. 1 and Fig. 2 are please referred to, is the flow diagram of the application method for protecting mobile terminal privacy.The described method includes:
Step S1: mobile terminal is arranged the first preset password and saves first preset password.
Wherein, first preset password is the pre-stored password of the mobile terminal, can be numerical ciphers, number
The password of word and monogram, fingerprint etc..Such as: " 128963 ", " ad5263 ".
Step S2: mobile terminal receives screen-lock password and compares the screen-lock password and first preset password
Compared with.
Wherein, the mobile terminal is the electronic equipments such as mobile phone, ipad, and the screen-lock password is to input in mobile terminal
Numerical ciphers, number and password, fingerprint of monogram etc. or mobile terminal do not store password and directly using included
Sliding type is opened.First preset password is pre-stored password in mobile terminal, can be numerical ciphers, number
With password, the fingerprint of monogram etc..
Step S3: the output error signal when comparison result number is more than preset value.
In the present embodiment, preset times are pre-stored in mobile terminal, are 3 times;When mobile terminal is unlocked
When, the input password that mobile terminal detects continuously input 3 times it is all wrong when, mobile terminal can output error signal at this time.?
In other embodiments, the preset times can also be configured as needed.
Step S4: according to error signal background acquisition user's photo.
Wherein, the front camera of mobile terminal can carry out face to mobile terminal user according to the error signal of output
It identifies and takes pictures, the mobile terminal is mobile phone, acquires user's photo by the front camera of mobile phone.
Step S5: user's photo and alarm signal are exported from the background.
Wherein, the photo of the mobile terminal user of acquisition and alarm signal are sent to intelligent end by mobile terminal backstage
End, intelligent terminal are the wearable devices such as smartwatch.
Step S6: when mobile terminal detects screen-lock password and the preset password match, if having secret to apply is made
With, mobile terminal judge the application boot sequence/activation sequence whether with default boot sequence/default activation sequence one
It causes.
Wherein, secret is applied as wechat, QQ, bank app etc., default boot sequence/preset activation sequence as mobile terminal
In pre-stored sequence, for example, mobile terminal storage boot sequence be wechat, QQ, Everbright Bank app;Wherein apply
Boot sequence refers to its sequence not started in running background, when mobile terminal starts Everbright Bank app, mobile terminal
Detect using sequence be first starting wechat enter login state and be retained on running background, restart QQ enter login
State is simultaneously retained on running background, restarts Everbright Bank's app normal use at this time;Or when mobile terminal normally makes
When with QQ, the use sequence that mobile terminal detects is that first the entrance of starting wechat logins state and is retained on running background,
Restart QQ normal use at this time.The activation sequence refers to if transported when using being opened and being in mobile terminal backstage
When row, need its being adjusted to foreground according to the pre-stored sequence of mobile terminal, such as: the activation sequence of mobile terminal storage is
Wechat, QQ, Everbright Bank app, these applications have been opened before and in mobile terminal running backgrounds, when mobile terminal is normal
When using Everbright Bank app, then mobile terminal need to be by Everbright Bank app, wechat, the QQ of running background, according to wechat, QQ, light
This is sequentially adjusted to foreground to big bank app, if the use sequence that mobile terminal detects is not according to wechat, QQ, wide silver
This default activation sequence of row app is adjusted to foreground, then mobile terminal is taken pictures.When mobile terminal is detected using secret application
When boot sequence/activation sequence and default boot sequence/default activation sequence it is consistent when, i.e. mobile terminal answering when front opening
With (such as Everbright Bank app) normal use, if at this time mobile terminal detect wechat, in QQ any one or both exit
From the background, the application to front opening is worked as, i.e. Everbright Bank app do not have an impact, and continue normal use.Specific boot sequence/swash
Sequence living can be configured according to the use habit of itself, no longer be repeated one by one at this its sequence.It is detected in mobile terminal
The first preset password match or mobile terminal saved inside the unlocking pin that arrives and mobile terminal do not store first preset it is close
When code, mobile terminal is unlocked, and mobile terminal detects that the secret of storage inside is applied by use, mobile terminal judges
Whether boot sequence/activation sequence of the secret application is consistent with default boot sequence/default activation sequence.
In some embodiments, the foreground and backstage of above-mentioned corresponding application switch, and can be by judging the application program
The no technological means for losing focus carries out, wherein application is to obtain focus from foreground is adjusted to from the background, and being adjusted to backstage from foreground is to lose
Go focus.
Step S7: if consistent with the default boot sequence/default activation sequence, normally start or activate the secret
Using.
Wherein, if when pre-stored consistent in boot sequence/activation sequence and mobile terminal that mobile terminal detects,
Then normally starting or activate the secret application, i.e., the boot sequence prestored in mobile terminal is QQ, wechat, Everbright Bank app,
Then when mobile terminal starting Everbright Bank app transfer accounts etc. operation, starting or activation sequence that mobile terminal detects
It must be QQ, wechat, Everbright Bank app, could normally start or activate the secret application;If mobile terminal monitored to starting
Sequentially/activation sequence and the default boot sequence/default activation sequence stored in mobile terminal are inconsistent, as mobile terminal detects
If the practical boot sequence/activation sequence arrived is wechat, QQ, Everbright Bank app, then secret application, i.e. Everbright Bank app
Mobile terminal will take pictures to user when being activated or activating.
Step S8: if inconsistent with the default boot sequence/default activation sequence, acquire user's photo and with prestore
Photo is compared.
Wherein, if boot sequence/activation sequence for detecting of mobile terminal with it is pre-stored inconsistent in mobile terminal
When, the front camera of mobile terminal, which is automatically opened, to carry out recognition of face to user and takes pictures, by the photo of acquisition and movement
Terminal inner prestores photo and is compared, described to prestore the photo in person that photo is cellie, can be 2D photo
It can be 3D photo, the front camera of the mobile phone can may be 3D camera for 2D camera.
Step S9: if matching with default photo, normally start or activate the secret application.
Wherein, if mobile terminal detects that prestoring photo inside the user's photo and mobile terminal of acquisition matches,
Normally start or activate the secret application.
Step S10: user's photo and alarm signal are exported when mismatching with default photo.
Wherein, if mobile terminal detect acquisition user's photo and mobile terminal inside prestore photo mismatch when,
The photo of the mobile terminal user of acquisition and alarm signal are sent to intelligent terminal by mobile terminal.
Step S11: the remote power-off signal from intelligent terminal is received.
Wherein, it when intelligent terminal receives the photo and alarm signal of mobile terminal user, is sent to mobile terminal
Remote power-off signal, mobile terminal receive the remote power-off signal from intelligent terminal, and mobile terminal and intelligent terminal, which are sent, to be believed
Number communication carrier be base station, in other embodiments, the communication between mobile phone and smartwatch can also use bluetooth, Wifi
Deng depending on determining between the two apart from situation.
Step S12: it responds the off signal and judges whether there is the first preset password.
Wherein, mobile terminal judges whether inside has the first of storage after receiving the remote power-off signal from intelligent terminal
Preset password.
Step S13: when having first preset password, mobile terminal shutdown.
Wherein, when mobile terminal detects that there is the first preset password of storage in inside, mobile terminal shutdown.
Step S14: when without the first default screen-lock password, mobile terminal is arranged the second preset password and passes through backstage
It shuts down after exporting second preset password to default recipient.
Wherein, when mobile terminal detects internal the first default screen-lock password not stored, mobile terminal default setting
One the second preset password, and the second preset password of default setting is sent to intelligent terminal, then mobile terminal shuts down, and writes from memory
The second preset password recognized is numerical ciphers.
Step S15: when receiving power-on instruction again, reception startup password is simultaneously pre- with described second by the startup password
If password is compared.
Wherein, when mobile terminal, which receives power-on instruction again, to be unlocked, startup password that mobile terminal detects
It is compared with second preset password of storage.
Step 16: if it matches, normal use.
Wherein, mobile whole when second preset password match of startup password and storage that mobile terminal detects
End unlock.
Step 17: output error signal and alarm signal when comparison result number is more than preset value.
Wherein, the default startup password of described the second of mobile terminal detects startup password and storage is mismatched and is inputted
When number is more than preset times, mobile terminal output error signal and alarm signal, the preset times are 3 times.
Step 18: receiving the factory reset signal from intelligent terminal with factory reset.
Wherein, after intelligent terminal receives the error signal and alarm signal that mobile terminal exports, mobile terminal is issued
Factory reset signal, mobile terminal receive the factory reset signal from intelligent terminal and restore factory automatically and set
It sets.
When mobile terminal receives unlock instruction, saved inside the screen-lock password and mobile terminal that mobile terminal detects
The first preset password mismatch, and repeatedly input, be more than preset times (at this in the input number that mobile terminal detects
In embodiment preset times be 3 times, in other embodiments, the preset times can also be configured as needed) when export
Error signal, mobile terminal acquire the photo of user according to the front camera of the error signal, and export the use
Person's photo and alarm signal are to intelligent terminal.
Secret application is stored in mobile terminal, secret application can be the application such as wechat, QQ, Alipay, bank, by with
Family oneself setting.Mobile terminal saves a default boot sequence/default activation sequence, when mobile terminal does not store first in advance
If password or the first preset password of storage have been cracked, and detect that secret is applied by use, mobile terminal judges
The boot sequence or activation sequence of secret application whether with default boot sequence/default activation sequence of storage whether one
It causes, when mobile terminal detects the boot sequence/activation sequence and default boot sequence/default activation sequence of the secret application
When being consistent, the normal starting of secret application;When the boot sequence/activation for the secret application that mobile terminal detects is suitable
When sequence and default boot sequence/default activation sequence are inconsistent, the front camera of mobile terminal takes pictures to user, with into
Row recognition of face, and the photo that prestores saved with mobile terminal is compared, if the comparison result that mobile terminal detects
Match, then secret application normal use, if the comparison result that detects of mobile terminal mismatches, mobile terminal is by the use
Person's photo and alarm signal are sent to intelligent terminal, and receive the remote power-off signal from intelligent terminal, and mobile terminal is rung
It answers the off signal and judges whether the mobile terminal stores the first preset password, it is mobile when having the first preset password
Terminal closedown;When without the first preset password, the second preset password of mobile terminal default setting simultaneously passes through backstage to intelligent terminal
Send second preset password, mobile terminal shutdown.
When mobile terminal receives power-on instruction again, the second of startup password and storage that mobile terminal detects is pre-
If when password match, mobile terminal-opening;When startup password that mobile terminal detects and the second preset password of storage not
Timing, mobile terminal output error signal simultaneously receive the factory reset signal from intelligent terminal with factory reset.
Referring to Fig. 3, being the flow diagram of intelligent terminal method for secret protection of the present invention.The described method includes:
Step S19: user's photo and alarm signal from mobile terminal are received and is alarmed to prompt user to move
Dynamic terminal is unlocking.
Wherein, intelligent terminal receives user's photo from mobile terminal and always vibration alarm, prompts to use
Family mobile terminal is unlocking.
Step S20: receiving shutdown confirmation instruction and exports off signal to the mobile terminal.
Wherein, intelligent terminal receives the confirmation of the shutdown from mobile terminal instruction and sends to the mobile terminal and shuts down
Signal, to control the mobile terminal shutdown.
The intelligence terminating receives the user's photo sent from the mobile terminal and warning message to prompt to use
Family someone unlocks the mobile terminal of oneself, and the intelligent terminal also receives the confirmation of the shutdown from mobile terminal instruction and to described
Mobile terminal exports off signal so that control mobile terminal shutdown.
Referring to Fig. 4, being the flow diagram of method for secret protection of the mobile terminal of the present invention in conjunction with intelligent terminal.Institute
The method of stating includes:
Step S301: mobile terminal is arranged the first preset password preset password and saves first preset password.
Wherein, first preset password is pre-stored password in the mobile terminal, can be numerical ciphers,
Password, the fingerprint etc. of number and monogram.Such as: " 128963 ", " ad5263 ".
Step S302: mobile terminal receives screen-lock password and is compared the screen-lock password with the first preset password.
Wherein, the mobile terminal is the electronic equipments such as mobile phone, ipad, and the screen-lock password is to input in mobile terminal
Password, fingerprint of numerical ciphers, number and monogram etc. or mobile terminal do not store password and directly use mobile phone certainly
The sliding type of band opens mobile phone.First preset password is pre-stored password in mobile terminal, can be number
Password, digital and monogram password, fingerprint etc..
Step S303: the mobile terminal output error signal when comparison result number is more than preset value.
Wherein, preset times are pre-stored in mobile terminal, are 3 times;It is mobile whole when mobile terminal is unlocked
Hold the input password that detects continuously input 3 times it is all wrong when, mobile terminal can output error signal at this time.In other embodiments
In, the preset times can also be configured as needed.
Step S304: mobile terminal is according to error signal background acquisition user's photo.
Wherein, the preposition wardrobe of taking the photograph of mobile terminal can carry out face to mobile terminal user according to the error signal of output
It identifies and takes pictures, the mobile terminal is mobile phone, acquires user's photo by the front camera of mobile phone.
Step S305: mobile terminal backstage exports user's photo and alarm signal.
Wherein, the photo of the mobile terminal user of acquisition and alarm signal are sent to intelligent end by mobile terminal backstage
End, intelligent terminal are the wearable devices such as smartwatch.
Step S306: intelligent terminal receives user's photo and alarm signal from mobile terminal and alarms to prompt someone to solve
Lock the mobile terminal of oneself.
Wherein, intelligent terminal receives user's photo from mobile terminal and always vibration alarm, prompts to use
Family mobile terminal is unlocking.
Step S307: when mobile terminal detects screen-lock password and the preset password match, if there is secret application quilt
Use, mobile terminal judge the application boot sequence/activation sequence whether with default boot sequence/default activation sequence one
It causes.
Wherein, secret is applied as wechat, QQ, bank app etc., default boot sequence/preset activation sequence as mobile terminal
In pre-stored sequence, for example, mobile terminal storage boot sequence be wechat, QQ, Everbright Bank app;Wherein apply
Boot sequence refers to its sequence not started in running background, when mobile terminal starts Everbright Bank app, mobile terminal
Detect using sequence be first starting wechat enter login state and be retained on running background, restart QQ enter login
State is simultaneously retained on running background, restarts Everbright Bank's app normal use at this time;Or when mobile terminal normally makes
When with QQ, the use sequence that mobile terminal detects is that first the entrance of starting wechat logins state and is retained on running background,
Restart QQ normal use at this time.The activation sequence refers to if transported when using being opened and being in mobile terminal backstage
When row, need its being adjusted to foreground according to the pre-stored sequence of mobile terminal, such as: the activation sequence of mobile terminal storage is
Wechat, QQ, Everbright Bank app, these applications have been opened before and in mobile terminal running backgrounds, when mobile terminal is normal
When using Everbright Bank app, then mobile terminal need to be by Everbright Bank app, wechat, the QQ of running background, according to wechat, QQ, light
This is sequentially adjusted to foreground to big bank app, if the use sequence that mobile terminal detects is not according to wechat, QQ, wide silver
This is sequentially adjusted to foreground to row app, then mobile terminal is taken pictures.Starting when mobile terminal, which is detected, to be applied using secret
When sequentially/activation sequence meets default boot sequence/default activation sequence, i.e., mobile terminal when the application of front opening it is (such as wide
Bank app) normal use, if at this time mobile terminal detect wechat, in QQ any one or both exit backstage, to working as
The application of front opening, i.e. Everbright Bank app do not have an impact, and continue normal use.Specifically default boot sequence/default activation
The setting of sequence can be configured according to the use habit of itself, no longer be repeated one by one at this its sequence.In mobile terminal
It is pre- that the first preset password match or mobile terminal saved inside the unlocking pin and mobile terminal detected does not store first
If when password, mobile terminal is unlocked, and mobile terminal detects that the secret of storage inside is applied by use, mobile terminal
Judge whether boot sequence/activation sequence of the secret application is consistent with default boot sequence/default activation sequence.
In some embodiments, the foreground and backstage of above-mentioned corresponding application switch, and can be by judging the application program
The no technological means for losing focus carries out, wherein application is to obtain focus from foreground is adjusted to from the background, and being adjusted to backstage from foreground is to lose
Go focus.
Step S308: if consistent with the default boot sequence/default activation sequence, normally start or activate the private
Close application.
Wherein, if when pre-stored consistent in boot sequence/activation sequence and mobile terminal that mobile terminal detects,
Then normally start or activate the secret application, i.e., the boot sequence/activation sequence prestored in mobile terminal is QQ, wechat, light
Big bank app, then when mobile terminal starting Everbright Bank app transfer accounts etc. operation, starting that mobile terminal detects
Or activation sequence must be QQ, wechat, Everbright Bank app, could normally start or activate the secret application;If mobile terminal
It monitors boot sequence/activation sequence and default boot sequence/default activation sequence of storage in mobile terminal is inconsistent, such as move
If practical boot sequence/activation sequence that dynamic terminal detects is wechat, QQ, Everbright Bank app, then the secret application, i.e.,
Mobile terminal will take pictures to user when Everbright Bank app is activated or activates.
Step S309: if inconsistent with the default boot sequence/default activation sequence, mobile terminal acquires user and shines
Piece is simultaneously compared with photo is prestored.
Wherein, if boot sequence/activation sequence for detecting of mobile terminal with it is pre-stored inconsistent in mobile terminal
When, the front camera of mobile terminal, which is automatically opened, to carry out recognition of face to user and takes pictures, by the photo of acquisition and movement
Terminal inner prestores photo and is compared.It is described to prestore the photo in person that photo is cellie, it can be 2D photo
It can be 3D photo, the front camera of the mobile phone can may be 3D camera for 2D camera.
Step S310: if matching with default photo, normally start or activate the secret application.
Wherein, if mobile terminal detects that prestoring photo inside the user's photo and mobile terminal of acquisition matches,
Normally start or activate the secret application.
Step S311: user's photo and alarm signal are exported when mismatching with default photo.
Wherein, if mobile terminal detect acquisition user's photo and mobile terminal inside prestore photo mismatch when,
The photo of the mobile terminal user of acquisition and alarm signal are sent to intelligent terminal by mobile terminal.
Step S312: intelligent terminal receives shutdown confirmation instruction and exports off signal to the mobile terminal.
Wherein, intelligent terminal receives the confirmation of the shutdown from mobile terminal instruction and sends to the mobile terminal and shuts down
Signal, to control the mobile terminal shutdown.
Step S313: mobile terminal receives remote power-off signal from intelligent terminal.
Wherein, it when intelligent terminal receives the photo and alarm signal of mobile terminal user, is sent to mobile terminal
Remote power-off signal, mobile terminal receive the remote power-off signal from intelligent terminal, and mobile terminal and intelligent terminal, which are sent, to be believed
Number communication carrier be base station, in other embodiments, the communication between mobile phone and smartwatch can also use bluetooth, Wifi
Deng depending on determining between the two apart from situation.
Step S314: mobile terminal responds the off signal and judges whether there is the first preset password.
Wherein, mobile terminal judges whether inside has the first of storage after receiving the remote power-off signal from intelligent terminal
Preset password.
Step S315: when having first preset password, mobile terminal shutdown.
Wherein, when mobile terminal detects that there is the first preset password of storage in inside, mobile terminal shuts down.
Step S316: when without the first default screen-lock password, after mobile terminal is arranged the second preset password and passes through
Platform shuts down after exporting second preset password to default recipient.
Wherein, when mobile terminal detects internal the first preset password not stored, mobile terminal default setting one
Second preset password, and the second preset password of default setting is sent to intelligent terminal, then mobile terminal shuts down, default
Second preset password is numerical ciphers.
Step S317: when mobile terminal receives power-on instruction again, receive startup password and by the startup password with
Second preset password is matched.
Wherein, when mobile terminal, which receives power-on instruction again, to be unlocked, startup password that mobile terminal detects
It is matched with second preset password.
Step S318: if it matches, normal use.
Wherein, mobile whole when second preset password match of startup password and storage that mobile terminal detects
End unlock.
Step S319: output error signal and alarm signal when comparison result number is more than preset value.
Wherein, when the described second default startup password of the mobile terminal startup password detected and storage mismatches and defeated
When indegree is more than preset times, mobile terminal output error signal and alarm signal, the preset times are 3 times.
Step S320: mobile terminal receives factory reset signal from intelligent terminal with factory reset.
Wherein, after intelligent terminal receives the error signal and alarm signal that mobile terminal exports, mobile terminal is issued
Factory reset signal, mobile terminal receive the factory reset signal from intelligent terminal and restore factory automatically and set
It sets.
When mobile terminal receives unlock instruction, saved inside the screen-lock password and mobile terminal that mobile terminal detects
The first preset password mismatch, and repeatedly input, be more than preset times (at this in the input number that mobile terminal detects
In embodiment preset times be 3 times, in other embodiments, the preset times can also be configured as needed) when export
Error signal, mobile terminal acquire the photo of user according to the front camera of the error signal, and export the use
Person's photo and alarm signal are to intelligent terminal.
Secret application is stored in mobile terminal, secret application can be the application such as wechat, QQ, Alipay, bank, by with
Family oneself setting.Mobile terminal save a boot sequence/activation sequence, when mobile terminal do not store the first preset password or
First preset password of storage has been cracked, and detects that secret is applied by use, mobile terminal judges the secret
Whether whether boot sequence/activation sequence of application consistent with default boot sequence/default activation sequence of storage, when mobile whole
When end detects that boot sequence/activation sequence that the secret is applied and default boot sequence/default activation sequence are consistent, institute
State the normal starting of secret application;When the boot sequence/activation sequence for the secret application that mobile terminal detects is opened with default
When dynamic sequence/default activation sequence is inconsistent, the front camera of mobile terminal takes pictures to user, to carry out face knowledge
Not, and with mobile terminal the photo that prestores saved is compared, if the comparison result matching that mobile terminal detects, normally
Start or activate the secret application, if the comparison result that mobile terminal detects mismatches, mobile terminal makes described
User's photo and alarm signal are sent to intelligent terminal, and receive the remote power-off signal from intelligent terminal, mobile terminal
It responds the off signal and judges whether the mobile terminal stores the first preset password, when having the first preset password, move
Dynamic terminal closedown;When without the first preset password, the second preset password of mobile terminal default setting simultaneously passes through backstage to intelligent end
End sends second preset password, mobile terminal shutdown.
When mobile terminal receives power-on instruction again, the second of startup password and storage that mobile terminal detects is pre-
If when password match, mobile terminal-opening;When startup password that mobile terminal detects and the second preset password of storage not
Timing, mobile terminal output error signal simultaneously receive the factory reset signal from intelligent terminal with factory reset.
Referring to Fig. 5, being the structural schematic diagram of mobile terminal or intelligent terminal of the present invention.The mobile terminal or intelligence are eventually
End includes processor 51 and the memory 52 connect with processor lotus root.
The memory 52 is stored with the program instruction of the secret protection for realizing any of the above-described.
The processor 51 is used to execute the described program instruction of the storage of memory 52.
Wherein, processor 51 can also be known as CPU (Central Processing Unit, central processing unit).Processing
Device 51 may be a kind of IC chip, the processing capacity with signal.Processor 51 can also be general processor, number
Signal processor (DSP), specific integrated circuit (ASIC), ready-made programmable gate array (FPGA) or other programmable logic devices
Part, discrete gate or transistor logic, discrete hardware components.General processor can be microprocessor or the processor
It is also possible to any conventional processor etc..
Memory 52 can be memory bar, TF card etc., can store all information in mobile terminal, including the original of input
Data, computer program, intermediate operation result and final operation result all save in memory.It is specified according to controller
Position deposit and taking-up information.There is memory, mobile terminal just has memory function, just can guarantee normal work.Mobile terminal
In memory can be divided into main memory (memory) and additional storage (external memory) by purposes memory, also have and be divided into external storage
The classification method of device and internal storage.External memory is usually magnetic medium or CD etc., energy long-term preservation information.Memory refers to mainboard
On storage unit, be used to store the data and program being currently executing, but be only used for temporarily storing program and data, close
Power supply or power-off, data can lose.
The mobile terminal or intelligent terminal further include other devices, with mobile terminal in the prior art or intelligence
Other devices and function in terminal are identical, and details are not described herein.
It is the structural schematic diagram of storage medium of the present invention refering to Fig. 6.The storage medium of the application, which is stored with, can be realized
State the methodical program file 61 of institute, wherein the program file 61 can be stored in above-mentioned storage in the form of software products and be situated between
In matter, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment
Deng) or processor (processor) execute each embodiment the method for the application all or part of the steps.And it is above-mentioned
Storage device includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory
The various media that can store program code such as (RAM, Random Access Memory), magnetic or disk, or meter
The terminal devices such as calculation machine, server, mobile phone, plate.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the division of unit,
Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be with
In conjunction with or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed
Mutual coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING of device or unit or
Communication connection can be electrical property, mechanical or other forms.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
The application passes through mobile terminal preset password and saves the preset password;Receive screen-lock password and by the screen locking
Password is compared with preset password;It is unlocked when screen-lock password is consistent with the preset password;It is more than in comparison result number
Output error signal when preset value;User's photo is acquired according to the error signal;Export user's photo and alarm
Signal;Intelligent terminal receives user's photo and alarm signal is simultaneously alarmed, and secret in the terminal is using being made
Used time judges whether it is user, then controls mobile terminal shutdown by intelligent terminal if not user, into
And it is recovered by setting startup password with controlling mobile terminal by intelligent terminal if unlocking mistake after unlocking again
Factory's setting, the purpose of protection privacy of user and property safety is realized with this.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this
Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other
Technical field is included within the scope of the present invention.
Claims (10)
1. a kind of method for protecting mobile terminal privacy characterized by comprising
Mobile terminal receives screen-lock password and is compared the screen-lock password with the first preset password;
The output error signal when comparison result number is more than preset value;
According to error signal background acquisition user's photo;And
Backstage exports user's photo and alarm signal.
2. the method according to claim 1, wherein the mobile terminal receives screen-lock password and by the screen locking
Password is compared with the first preset password further include:
The unlock when mobile terminal detects screen-lock password and first preset password match;
If detecting, the secret of mobile terminal storage is applied by use, mobile terminal judges the boot sequence of the application/swash
Whether sequence living is consistent with default boot sequence/default activation sequence;
If inconsistent with the default boot sequence/default activation sequence, user's photo is acquired;
User's photo is compared by mobile terminal with photo is prestored;
User's photo and alarm signal are being exported with described prestore when photo mismatches.
3. method according to claim 1 or 2, which is characterized in that described to export user's photo and alarm signal
Later further include:
Mobile terminal receives the remote power-off signal from intelligent terminal;
It responds the remote power-off signal and judges whether the mobile terminal stores the first preset password;
When there is first preset password, mobile terminal shuts down;
In no first preset password, the second preset password is arranged in mobile terminal and backstage exports institute to default recipient
It shuts down after stating the second preset password.
4. according to the method described in claim 3, it is characterized in that, after the shutdown further include:
When receiving power-on instruction again, receives startup password and compare the startup password and second preset password
Compared with;
When the comparison result number detected is more than preset value, to the intelligent terminal output error signal;
The factory reset signal from intelligent terminal is received with factory reset.
5. method according to claim 1 or 2, which is characterized in that
The reception screen-lock password simultaneously before being compared with the first preset password the screen-lock password includes:
Mobile terminal is arranged the first preset password and saves first preset password;
It is described have secret using used when judge the application boot sequence/activation sequence whether with default boot sequence/in advance
If activation sequence unanimously further includes;
If consistent with default boot sequence/default activation sequence, normally start or activate the secret application;
It is described to be compared user's photo with photo is prestored further include:
If matching with photo is prestored, normally start or activate the secret application;
It is described when receiving power-on command again, receive startup password and by the startup password and second preset password into
Row compares further include:
Such as startup password is consistent with second preset password, then normal boot-strap.
6. a kind of intelligent terminal method for secret protection characterized by comprising
It receives user's photo and alarm signal from mobile terminal and alarms to prompt customer mobile terminal solving
Lock;
It receives shutdown confirmation instruction and exports off signal to the mobile terminal.
7. a kind of mobile terminal, which is characterized in that including memory interconnected and processor, wherein
The memory is used to store the program instruction for realizing the method for secret protection as described in claim 1-5 any one;
The processor is used to execute the described program instruction of the memory storage.
8. a kind of intelligent terminal, which is characterized in that including memory interconnected and processor, wherein
The memory is used to store the program instruction for realizing the method for secret protection as described in claim 6 any one;
The processor is used to execute the described program instruction of the memory storage.
9. a kind of storage medium, which is characterized in that be stored with program data, described program data can be performed to realize as weighed
Benefit requires method for secret protection described in 1-5 any one.
10. a kind of storage medium, which is characterized in that be stored with program data, described program data can be performed to realize such as
Method for secret protection described in claim 6 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810954802.4A CN109165501A (en) | 2018-08-21 | 2018-08-21 | Mobile terminal, intelligent terminal and its method for secret protection and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810954802.4A CN109165501A (en) | 2018-08-21 | 2018-08-21 | Mobile terminal, intelligent terminal and its method for secret protection and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109165501A true CN109165501A (en) | 2019-01-08 |
Family
ID=64896385
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810954802.4A Withdrawn CN109165501A (en) | 2018-08-21 | 2018-08-21 | Mobile terminal, intelligent terminal and its method for secret protection and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109165501A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110263521A (en) * | 2019-06-24 | 2019-09-20 | 深圳市商汤科技有限公司 | Login guard method and device, system, electronic equipment and storage medium |
CN112230830A (en) * | 2020-09-01 | 2021-01-15 | 盐城华旭光电技术有限公司 | Screen capturing device and screen capturing method of touch screen equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104166813A (en) * | 2014-07-11 | 2014-11-26 | 北京奇虎科技有限公司 | Method and device for protecting privacy content in intelligent terminal based on screen lock |
CN105554227A (en) * | 2014-10-31 | 2016-05-04 | 东莞宇龙通信科技有限公司 | Method and apparatus for improving terminal information security, and terminal |
CN106778217A (en) * | 2016-11-29 | 2017-05-31 | 维沃移动通信有限公司 | A kind of mobile terminal unlocks error handling method and mobile terminal |
CN107153562A (en) * | 2017-06-01 | 2017-09-12 | 珠海市魅族科技有限公司 | A kind of method, device and the storage medium of control of taking pictures |
-
2018
- 2018-08-21 CN CN201810954802.4A patent/CN109165501A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104166813A (en) * | 2014-07-11 | 2014-11-26 | 北京奇虎科技有限公司 | Method and device for protecting privacy content in intelligent terminal based on screen lock |
CN105554227A (en) * | 2014-10-31 | 2016-05-04 | 东莞宇龙通信科技有限公司 | Method and apparatus for improving terminal information security, and terminal |
CN106778217A (en) * | 2016-11-29 | 2017-05-31 | 维沃移动通信有限公司 | A kind of mobile terminal unlocks error handling method and mobile terminal |
CN107153562A (en) * | 2017-06-01 | 2017-09-12 | 珠海市魅族科技有限公司 | A kind of method, device and the storage medium of control of taking pictures |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110263521A (en) * | 2019-06-24 | 2019-09-20 | 深圳市商汤科技有限公司 | Login guard method and device, system, electronic equipment and storage medium |
CN112230830A (en) * | 2020-09-01 | 2021-01-15 | 盐城华旭光电技术有限公司 | Screen capturing device and screen capturing method of touch screen equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11216549B2 (en) | Security verification method and device | |
US9801068B2 (en) | Terminal device | |
US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
EP1914961B1 (en) | Mobile information terminal apparatus | |
CN104408344A (en) | System switching method, system switching device and terminal | |
US8463234B2 (en) | Method for providing security services by using mobile terminal password and mobile terminal thereof | |
CN103370717A (en) | Always-available embedded theft reaction subsystem | |
CN103577739A (en) | Intelligent mobile terminal and setting and accessing control method thereof | |
CN103034417A (en) | Unlocking method for touch screen and terminal equipment | |
CN104166813A (en) | Method and device for protecting privacy content in intelligent terminal based on screen lock | |
US10548538B2 (en) | Electronic device and alarm control method | |
CN109165501A (en) | Mobile terminal, intelligent terminal and its method for secret protection and storage medium | |
JP2013161261A (en) | Information processing terminal, authentication control method and authentication control program of the same | |
CN110706389A (en) | Wireless direct-connection access control system and method | |
CN102402651B (en) | Information protection device and method and portable terminal | |
CN106066763A (en) | Terminal unlocking method and device | |
CN108052810A (en) | A kind of data processing method, device and equipment | |
CN206849138U (en) | Recognition of face building residence intercom and intercom system | |
CN107154999B (en) | Terminal and unlocking method and storage device based on environmental information | |
CN111050236B (en) | Electronic equipment anti-theft method, device and system, electronic equipment and storage medium | |
US10645070B2 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
KR20160098901A (en) | User authentication server system and user authentication method using the same | |
CN112905964B (en) | Unlocking method for user equipment, storage medium, chip and related equipment | |
JP2001297315A (en) | Ic card, portable electronic terminal and countermeasure system for illegal use thereof | |
CN114666442B (en) | Working mode switching method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 518000 1-10 Floor, Building A2, Nanshan Zhiyuan, 1001 Xueyuan Avenue, Nanshan District, Shenzhen City, Guangdong Province Applicant after: Our Internet Network Technology (Shenzhen) Co., Ltd. Address before: 518000 1-10 Floor, Building A2, Nanshan Zhiyuan, 1001 Xueyuan Avenue, Shenzhen City, Guangdong Province Applicant before: Our Internet Network Technology (Shenzhen) Co., Ltd. |
|
CB02 | Change of applicant information | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190108 |
|
WW01 | Invention patent application withdrawn after publication |