CN110336911A - A kind of security level method of adjustment and terminal - Google Patents
A kind of security level method of adjustment and terminal Download PDFInfo
- Publication number
- CN110336911A CN110336911A CN201910328316.6A CN201910328316A CN110336911A CN 110336911 A CN110336911 A CN 110336911A CN 201910328316 A CN201910328316 A CN 201910328316A CN 110336911 A CN110336911 A CN 110336911A
- Authority
- CN
- China
- Prior art keywords
- terminal
- security level
- default
- authentication
- default authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of security level method of adjustment and terminal, this method comprises: determining first state locating for the terminal, the first state is unlocked state or screen lock state;Obtain the corresponding target data of the first state;The security level of the terminal is determined according to the target data;Wherein, when the first state is unlocked state, the target data includes the authentication result of default authentication information.The embodiment of the present invention improves the safety that terminal uses.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of security level methods of adjustment and terminal.
Background technique
With the development of terminal, terminal occupies more and more important position in people's lives, currently, one in terminal
As be stored with a large amount of data information of owner.In practice, the security level of terminal is changeless, the i.e. behaviour of terminal
It is changeless for making permission.Such as: if the authentication information of terminal is grasped by the other users in addition to owner, complete to authenticate
After unlock, other users can inquire the data information stored in terminal, be leaked so as to cause data information, or control
Application program in terminal executes corresponding operation, brings loss to owner.There is peace when as it can be seen that terminal using in the prior art
The poor problem of full property.
Summary of the invention
The embodiment of the present invention provides a kind of security level method of adjustment and terminal, when solving that terminal uses in the prior art
There is a problem of that safety is poor.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, being applied to terminal, the method packet the embodiment of the invention provides a kind of security level method of adjustment
It includes:
Determine that first state locating for the terminal, the first state are unlocked state or screen lock state;
Obtain the corresponding target data of the first state;
The security level of the terminal is adjusted according to the target data;
Wherein, when the first state is unlocked state, the target data includes the certification knot of default authentication information
Fruit.
Second aspect, the embodiment of the present invention also provide a kind of terminal, comprising:
Determining module, for determining that first state locating for the terminal, the first state are unlocked state or screen locking
State;
Module is obtained, for obtaining the corresponding target data of the first state;
Module is adjusted, for adjusting the security level of the terminal according to the target data;
Wherein, when the first state is unlocked state, the target data includes the certification knot of default authentication information
Fruit.
In the embodiment of the present invention, by determining that first state locating for terminal, first state are unlocked state or screen locking shape
State;Obtain the corresponding target data of first state;The security level of terminal is adjusted according to target data.When first state is unlock
When state, the first data include the authentication result of default authentication information.In this way, according to the target obtained under different first states
Data, so that different security levels can be arranged in terminal automatically under different first states.Therefore, the present invention is implemented
Example improves the safety that terminal uses.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention
Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention,
For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is a kind of flow chart of security level method of adjustment provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another security level method of adjustment provided in an embodiment of the present invention;
Fig. 3 is one of exemplary graph provided in an embodiment of the present invention;
Fig. 4 is the two of exemplary graph provided in an embodiment of the present invention;
Fig. 5 is the flow chart of another security level method of adjustment provided in an embodiment of the present invention;
Fig. 6 is a kind of structure chart of terminal provided in an embodiment of the present invention;
Fig. 7 is one of the structure chart of the second determining module in a kind of terminal provided in an embodiment of the present invention;
Fig. 8 is the structure chart of the first determining submodule in a kind of terminal provided in an embodiment of the present invention;
Fig. 9 is the two of the structure chart of the second determining module in a kind of terminal provided in an embodiment of the present invention;
Figure 10 is the three of the structure chart of the second determining module in a kind of terminal provided in an embodiment of the present invention;
Figure 11 is the structure chart of another terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
It is a kind of flow chart of security level method of adjustment provided in an embodiment of the present invention referring to Fig. 1, Fig. 1, such as Fig. 1 institute
Show, comprising the following steps:
Step 101 determines that first state locating for the terminal, the first state are unlocked state or screen lock state.
Wherein, when terminal is screen lock state, while terminal can be to put out screen state, or bright screen state.Specific shape
State is it is not limited here.
Step 102 obtains the corresponding target data of the first state.
Wherein, terminal can obtain target data every default authentication period, and the length of default authentication period is herein not
It limits.Certainly, terminal can also obtain target data in real time.
Step 103, the security level that the terminal is adjusted according to the target data.
Wherein, when first state is unlocked state, target data includes the authentication result of default authentication information;When the first shape
When state is screen lock state, target data includes the geographical location information that screen locking duration or terminal are presently in.
Wherein, default authentication information may include at least one that user is accustomed in authentication information and user biological authentication information
?.Such as: user is accustomed to the pressing gesture that authentication information may include user, the position for pressing terminal display screen and slip gesture
Etc. in information at least one of;User biological authentication information may include in the information such as the fingerprint, face and iris of user extremely
One item missing.In this way, since default authentication information includes a plurality of types of information, so that the certification knot of default authentication information
The reliability of fruit is higher.
In addition, above-mentioned default authentication information can be stored in advance in terminal inner.
In addition, default authentication information can also include in user shows for terminal when first state is unlocked state
The work angle of appearance, such as: user for terminal show content work angle can for along terminal up and down direction or
Left and right directions.In this way, can show the work angle of content for terminal by the user of the currently used terminal of calculating and preset
The matching degree of work angle, so that it is determined that the security level of terminal.
In addition, target data can also include the geographical location that terminal is presently in when first state is screen lock state
Information.Such as: terminal can be according to the distance between the position and predeterminated position that terminal is presently in, so that it is determined that the peace of terminal
Congruent grade.
It should be noted that when first state is unlocked state, what the authentication result certification of default authentication information passed through
When number is more, a possibility that user of currently used terminal is the owner of terminal, is higher, may thereby determine that terminal is Gao An
Congruent grade, when terminal is high safety grade, the operating right of terminal is larger.When the authentication result certification of default authentication information is logical
When the number crossed is fewer, a possibility that user of currently used terminal is the owner of terminal, is smaller, may thereby determine that terminal is
Lower security grade, when terminal is lower security grade, the operating right of terminal is smaller.In this way, when terminal is by its in addition to owner
His user in use, can determine that terminal is lower security grade, to reduce the data money of terminal owner through the above steps
Material a possibility that being leaked, the application program decreased in other users controlling terminal execute corresponding operation, to owner with
Come appearance the phenomenon that loss, to improve the security performance of terminal.
It should be noted that screen locking duration is longer when first state is screen lock state, judge lost terminal can
Can property it is bigger, can determine that terminal is lower security grade at this time, when terminal is lower security grade, the operating right of terminal compared with
It is small, such as: when terminal is lower security grade, external equipment can be closed by the interface of terminal and access the number stored in terminal
According to the function of data.A possibility that data information of terminal owner is leaked can be equally reduced, to improve the peace of terminal
Full performance.
In addition, when target data difference, the security level of terminal be can also be different, so that more flexible
Determine the security level of terminal.
In the embodiment of the present invention, above-mentioned terminal can be mobile phone, tablet computer (Tablet Personal Computer),
Laptop computer (Laptop Computer), personal digital assistant (PersonalDigital Assistant, abbreviation PDA),
Mobile Internet access device (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..
By step 101 to 103, security level and operating right with terminal in the prior art are changeless side
Formula is compared, in embodiments of the present invention, according to the target data obtained under different first states, so that terminal can be
Different security levels is set automatically under different first states.Therefore, the embodiment of the present invention improves the safety that terminal uses
Property.
Referring to fig. 2, Fig. 2 is the flow chart of another security level method of adjustment provided in an embodiment of the present invention.This implementation
The main distinction of example and last embodiment is: when first state is unlocked state, can calculate n-th and preset authentication period
Safety summation in interior and N+1 default authentication period, and determine that terminal is pre- at N+2 according to safety summation
Security level in the setting authentication period.As shown in Figure 2, comprising the following steps:
Step 201 determines that first state locating for the terminal, the first state are unlocked state.
Wherein, when terminal is screen lock state, while terminal can be to put out screen state, or bright screen state.Specific shape
State is it is not limited here.
Step 202 obtains the corresponding target data of the first state, and the target data includes default authentication information
Authentication result.
Wherein, terminal can obtain target data every default authentication period.Certainly, terminal can also obtain target in real time
Data.
Step 203 calculates the safety in N+1 default authentication periods according to the authentication result of the default authentication information
Score, wherein the default authentication information is the authentication information in N+1 default authentication periods, and the N is positive integer.
Wherein, preset authentication period length it is not limited here, such as: default authentication period can be 10 seconds, 20 seconds
Or 30 seconds etc..
Wherein, default authentication information may include delivery operation, the account of user's input and password and the voice of user
Identification etc..And the authentication result of default authentication information may include: the delivery operation account whether successful, user inputs and password
Whether whether certification success and the speech recognition of user authenticate successfully etc..
It is corresponded to wherein it is possible to first calculate and preset the authentication result of authentication information each time in N+1 default authentication periods
Safety, then the corresponding safety of the authentication result of default authentication information each time is directly superimposed or is weighted again
Superposition, to obtain the safety in N+1 default authentication periods.
Optionally, described that the N+1 default authentication period is calculated according to the authentication result of the default authentication information
Interior safety, comprising:
It is corresponding to calculate the default authentication information authenticates each time in N+1 default authentication periods authentication result
/ and, obtain the safety in the N+1 default authentication periods;
Wherein, when the M times authentication result of the default authentication information is to authenticate successfully, the default authentication information
The M times authentication result is scored at the first score value;When the L times authentication result of the default authentication information is authentification failure,
The L times authentication result of the default authentication information is scored at the second score value, and the M and the L are positive integer.
The certification that authentication information authenticates each time is preset in present embodiment and weighted superposition N+1 default authentication periods
As a result the mode of corresponding score is compared, and can be more quickly calculated safe in N+1 default authentication periods
Point.
Wherein, the value of the first score value and the second score value is different, such as: the first score value can be positive number, and the second score value
It can be negative or 0.Preferably, the first score value is positive number, and the second score value is negative.
It should be noted that the second score value is negative integer it is further preferred that the first score value is positive integer.
In this way, since the safety in N+1 default authentication periods is every by being directly superimposed default authentication information
The corresponding score of the authentication result once authenticated obtains, and the first score value is positive number, and the second score value is negative.Work as authentication result
When more for the number of authentification failure, by the second score value of multiple stacking, terminal can be reduced automatically in N+1 pre- setting authentications
Safety in period, and then the security level of terminal is reduced automatically.
In addition, in present embodiment, if authentication result be authenticate successful number it is more, corresponding safety compared with
Height, and be positive number;If authentication result is that the number of authentification failure is more, corresponding safety is lower, thereby increases and it is possible to be negative.
Optionally, the default authentication information includes that user is accustomed to authentication information and/or user biological authentication information.
Wherein, default authentication information may include at least one that user is accustomed in authentication information and user biological authentication information
?.Such as: user is accustomed to the pressing gesture that authentication information may include user, the position for pressing terminal display screen and slip gesture
Etc. in information at least one of;User biological authentication information may include in the information such as the fingerprint, face and iris of user extremely
One item missing.
In this way, since default authentication information includes a plurality of types of information, so that the certification of default authentication information
As a result reliability is higher.
Optionally, it is corresponding less than the user biological authentication information to be accustomed to corresponding first score value of authentication information by the user
The first score value;
The user is accustomed to corresponding second score value of authentication information and is greater than the user biological authentication information corresponding second
Score value.
Wherein, referring to table 1, in same security level, user is accustomed to corresponding first score value of authentication information and is less than user
Corresponding first score value of biometric authentication information;User is accustomed to corresponding second score value of authentication information and is greater than user biological authentication information
Corresponding second score value.Such as: when terminal is in the first security level, when user be accustomed to authentication information it is every authenticate it is successfully primary
When, can add 2 points, and user biological authentication information it is every authenticate successfully one time when, 3 points can be added.When user is accustomed to authentication information
At every authentification failure one time, minus 2 points can be added, and at the every authentification failure of user biological authentication information one time, minus 3 points can be added.
In addition, referring to table 1, when terminal is in third security level, primary, the explanation if user biological authentication information fails
A possibility that user of currently used terminal is not terminal owner is higher, directly can directly be adjusted to the security level of terminal
Second security level, to reduce a possibility that data information of terminal is leaked.
Table 1
In present embodiment, since when being authenticated, user biological authentication information can than user's habit authentication information
It is more preferable by property, in this way, setting user, which is accustomed to corresponding first score value of authentication information, is less than user biological authentication information corresponding the
One score value;And corresponding second score value of setting user's habit authentication information is second point corresponding greater than user biological authentication information
Value, to improve the accuracy for the security level that terminal determines.
Step 204, acquisition n-th preset the safety in authentication period, and calculate the n-th and preset authentication period
Safety summation in the interior and described N+1 default authentication periods.
Wherein, n-th presets the safety summation in authentication period and in N+1 default authentication periods, i.e., by N
Safety in a default authentication period is directly added with the safety in N+1 default authentication periods.
Step 205 determines safety of the terminal in N+2 default authentication periods according to the safety summation
Grade.
Wherein, security level is classified as at least two grades, and in different security levels, the operating right of terminal is not
Together.
Optionally, described to determine the terminal in N+2 default authentication periods according to the safety summation
Security level, comprising:
When the safety summation is less than or equal to the first preset value, determine that the terminal is pre- at the N+2
Security level in the setting authentication period is the first security level;
When the safety summation is greater than first preset value, and is less than or equal to the second preset value, institute is determined
Stating security level of the terminal in the N+2 default authentication periods is the second security level;
When the safety summation is greater than second preset value, determine that the terminal is default at the N+2
Security level in authentication period is third security level;
Wherein, in first security level, the terminal forbids accessing the data information of user, and operation is forbidden to pay
Class application program;In second security level, the terminal forbids accessing the private data information in the data information of user,
And forbid operation payment class application program;In the third security level, the terminal allows to access the data information of user, and
Allow to run payment class application program.
Such as: when the password of terminal is leaked, after other users get above-mentioned password, terminal is unlocked, eventually
End is currently at the first security level, then present terminal executes some basic operations, such as: open browser.It is any to be related to
Data information to user is not allowed access to.In this way, since other users only obtain the unlocking pin of terminal, then terminal
Security level be constantly in the first security level, the operation that terminal is able to carry out is limited, to improve the safety of terminal.
In addition, when owner is in the case where continuous operating terminal, the security level of present terminal is higher, for instance in the
Three security levels need to lend terminal at this time other users use, when other users are during using the terminal, are connecing
In the default authentication period got off, since the user detected is accustomed to the matching of authentication information and/or user biological authentication information
As a result be generally it is unsuccessful, so as in next default authentication period reduce terminal security level, to improve
The safety that terminal uses.
Wherein, the specific value of the first preset value and the second preset value it is not limited here, such as: the first preset value takes
Value can be 15, and the value of the second preset value can be with 25.
Certainly, a upper limit value can be set in the corresponding safety of third security level, when the safety of terminal arrives
When up to the upper limit value, safety no longer rises.Such as: referring to table 1, the corresponding safety range of third security level can be with
For 26-30.When safety of the terminal in second default authentication period is 30, terminal is in the default authentication period of third
Interior safety summation is 5, then the safety in second default authentication period and in the default authentication period of third is total
With remain as 30.
In addition, the private data information in the data information of user may include the photo of user, contact person, call note
Record, short message or documentum privatum etc..User can at the terminal be marked above-mentioned private data information.
In addition, the part A in Fig. 3 indicates the status bar of terminal referring to Fig. 3, the part B in Fig. 3 indicates the display of terminal
Interface.And security level that terminal is presently in can be shown in the display interface and status bar of terminal and terminal exists
Forbid the function of executing when current safety grade.Certainly, terminal can also show the safety etc. of adjustment terminal in the display interface
The option of grade, for selection by the user whether with the security level of active accommodation terminal.Such as: above-mentioned adjustment terminal is triggered in user
Security level option, terminal can directly be raised to third security level by the first current security level.
In addition, in different security levels, security level that terminal is presently in, terminal taboo in current safety grade
The information such as the option of security level of the function and adjustment terminal that only execute can partly or entirely be shown at the terminal.Such as:
Referring to table 2, when terminal is in the first security level, above-mentioned letter can be shown when running application program and access data information
Breath;When terminal is in the second security level, above- mentioned information can be often shown in the status bar of terminal, it is of course also possible in terminal
Above- mentioned information are shown when operation application program and access data information;It, can be in terminal when terminal is in third security level
Status bar and display interface often show above- mentioned information, it is of course also possible in terminal operating application program and access data information
Show above- mentioned information.
Table 2
In present embodiment, the security level of terminal includes the first security level, the second security level and third safety etc.
Grade, and it is configured with different operating rights for different security levels, in this way, when user's using terminal in addition to owner, eventually
End may be at lower security level, reduce a possibility that data information of user is leaked, so that the peace of terminal
Full better performances, and when owner's using terminal, it may be at higher security level, in this way, the intelligence of terminal can be made
Change degree is higher.
Optionally, described to determine the terminal in N+2 default authentication periods according to the safety summation
After security level, the method also includes:
Judge whether security level of the terminal in N+2 default authentication periods is more than default security level;
It, will when security level of the terminal in N+2 default authentication periods is more than the default security level
The duration of N+3 default authentication periods is set as the first duration, wherein first duration is less than the N+2 and presets
The duration of authentication period.
Wherein, default security level can be the first security level, when peace of the terminal in N+2 default authentication periods
When congruent grade is more than the first security level, i.e., security level of the terminal in N+2 default authentication periods is second safety etc.
When grade or third security level, N+3 default authentication periods can be shortened, (N+3 default authentication periods are set
Duration of the duration less than N+2 default authentication periods).
Such as: referring to table 3, when default security level is the first security level, when terminal is in N+2 default authentication periods
When interior security level is in the first security level, default authentication period of the terminal in N+3 default authentication periods can be with
Without shortening, T is remained as;When security level of the terminal in N+2 default authentication periods is in the second security level, eventually
Holding the default authentication period in N+3 default authentication periods adjustable is T/2;When terminal is in N+2 pre- setting authentications
When security level in period is in third security level, default authentication period of the terminal in N+3 default authentication periods
Adjustable is T/4.
In addition, seeing also table 3, when terminal is in different security levels, user is accustomed to authentication information or user biological is recognized
Also adjustable default authentication period when demonstrate,proving authentification of message failure.It should be noted that when terminal is N+2 pre- setting authentication weeks
When being in third security level in the phase, and there is user biological authentication information authentification failure in N+2 default authentication periods
When, security level of the terminal in N+3 default authentication periods directly can be adjusted to the second security level, improved eventually
The safety at end.
Table 3
In present embodiment, if terminal it is current security level it is higher when, can pass through shorten terminal pre- setting authentication week
Phase, to improve the certification frequency of terminal, thus a possibility that data information for reducing terminal is leaked, and then improve terminal and use
Safety.
It is, of course, also possible to default authentication period is shortened according to the instruction of user, and such as: it presets and recognizes at N+2 when terminal
Demonstrate,proving the security level in the period is more than when presetting security level, and user's input is for shortening the finger of N+3 default authentication periods
It enables, to shorten N+3 default authentication periods.The type of above-metioned instruction it is not limited here, such as: above-metioned instruction can for by
Press operation, touch control operation or phonetic order etc..
It should be noted that in the present embodiment, terminal is in the different moments belonged in the same default authentication period
Safety and security level are fixed and invariable.Such as: when terminal is currently in second default authentication period, terminal
It will not change belonging to the safety at each moment and security level in second default authentication period, preset when second
Authentication period terminates, and when terminal will be entered in the default authentication period of third, counts terminal at this time second pre- setting authentication week
Safety in phase, to determine security level of the terminal in third predetermined period.Referring to fig. 4, C segment table shows that terminal is belonging to
The corresponding safety in different in second default authentication period at the time of, D segment table shows terminal, and third is default to recognize belonging to
Corresponding safety at the time of demonstrate,proving different in the period.It should be noted that C sections and D sections indicate terminal in the unlocked state.
In the embodiment of the present invention, by step 201 to 205, the safety that terminal uses equally can be improved.
It is the flow chart of another security level method of adjustment provided in an embodiment of the present invention referring to Fig. 5, Fig. 5.This implementation
The main distinction of example and last embodiment is: when first state is screen lock state, can be determined eventually according to screen locking duration
The security level at end.As shown in Figure 5, comprising the following steps:
Step 501 determines that first state locating for the terminal, the first state are screen lock state.
Wherein, when terminal is in screen lock state, while terminal can be to put out screen state, or bright screen state.Work as end
When end is bright screen state, the current security level of display terminal and terminal it can be equally on the display interface of terminal
Forbid the function of executing when current safety grade.
In addition, when terminal receives trigger action, and the trigger action is presently in security level for triggering terminal
Forbid the operation executed, above-mentioned trigger action can also be shown on the display interface of terminal.
Step 502 obtains the corresponding target data of the first state, and the target data includes screen locking duration.
Wherein, equally successively target data can be obtained every a default authentication period, target can also be obtained in real time
Data.In addition, target data can also include the current geographical location of terminal.
Step 503, when screen locking duration be less than or equal to the first preset duration when, determine the security level of the terminal
For the 4th security level.
Step 504, when screen locking duration be greater than first preset duration, and be less than or equal to the second preset duration
When, determine that the security level of the terminal is the 5th security level.
Step 505, when screen locking duration be greater than second preset duration when, determine that the security level of the terminal is
6th security level.
Wherein, in the 4th security level, the background application of the terminal is forbidden to access the data information of user;
In the 5th security level, closes the speech identifying function of the terminal and external equipment is forbidden to pass through the general of the terminal
The data information of universal serial bus (Universal Serial Bus, USB) interface access user;In the 6th security level,
The current position of the terminal is obtained, and the current position of the terminal is sent to network side equipment.
Wherein, when terminal is in screen lock state, the screen locking duration of terminal is obtained, and according to screen locking duration
Safety can be counted, it should be noted that screen locking duration is longer, and safety is lower, and safety can be with
For negative.Referring to fig. 4, E segment table shows that terminal is corresponding at the time of difference in a default authentication period in the state of the lock screen in Fig. 4
Safety, and E sections may refer to about C sections and D sections of specific statement in last embodiment, and details are not described herein.
Wherein, the specific value of the first preset duration and the second preset duration is it is not limited here.
In addition, terminal can be normally carried out charge function by USB interface when terminal is in five security levels.
In addition, terminal then can be set when terminal current geographical location and the distance between preset geographical position are bigger
Security level it is lower, when the current geographical location of terminal and the distance between preset geographical position are bigger, then end can be set
The security level at end is higher.
Such as: when terminal is illegally occupied by the other users in addition to owner, when the screen locking by detecting terminal continues
Long, if screen locking duration is longer, a possibility that determining lost terminal, is bigger, and then can determine that the security level of terminal is got over
It is low.Such as: when screen locking duration is small to 10 for 6 hours, it can determine that the security level of terminal is the 4th security level,
The background application of terminal is forbidden to access the data information of user at this time.When screen locking duration is greater than 36 hours,
It can then determine that a possibility that security level of terminal is the 6th security level, determines lost terminal at this time is larger, then terminal can
To obtain the current position of terminal, and the current position of terminal is sent to network side equipment.To further improve terminal
The safety used.
In the embodiment of the present invention, terminal in the state of the lock screen, can adjust terminal according to the screen locking duration of terminal
Security level.A possibility that screen locking duration is longer, lost terminal is bigger, so as to which terminal is determined as lower safety
Grade reduces a possibility that data information of terminal storage is leaked.In addition, making when the screen locking duration of terminal is too long
Terminal when being in six security levels, the current position of terminal can be sent to network side equipment by terminal, to facilitate machine
Master recovers terminal, and makes the intelligence degree of terminal higher.
It is the structure chart of terminal provided in an embodiment of the present invention referring to Fig. 6, Fig. 6, is able to achieve a kind of peace in above-described embodiment
The details of congruent grade method of adjustment, and reach identical effect.As shown in fig. 6, terminal 600 includes:
Determining module 601, for determining that first state locating for the terminal, the first state are unlocked state or lock
Screen state;
Module 602 is obtained, for obtaining the corresponding target data of the first state;
Module 603 is adjusted, for adjusting the security level of the terminal according to the target data;
Wherein, when the first state is unlocked state, the target data includes the certification knot of default authentication information
Fruit.
Optionally, referring to Fig. 7, when the first state is unlocked state, the adjustment module 603 includes:
First computational submodule 6031, it is N+1 described for being calculated according to the authentication result of the default authentication information
Safety in default authentication period, wherein the default authentication information is the certification letter in N+1 default authentication periods
Breath, the N are positive integer;
Second computational submodule 6032 presets safety in authentication period for obtaining n-th, and calculates described the
Safety summation in N number of default authentication period and in the N+1 default authentication periods;
First determines submodule 6033, for determining that the terminal is default at N+2 according to the safety summation
Security level in authentication period.
Optionally, first computational submodule 6031 is also used to calculate described default in N+1 default authentication periods
The sum of corresponding score of the authentication result that authentication information authenticates each time, to obtain in the N+1 default authentication periods
Safety;
Wherein, when the M times authentication result of the default authentication information is to authenticate successfully, the default authentication information
The M times authentication result is scored at the first score value;When the L times authentication result of the default authentication information is authentification failure,
The L times authentication result of the default authentication information is scored at the second score value, and the M and the L are positive integer.
Optionally, first score value is positive number, and second score value is negative.
Optionally, the default authentication information includes that user is accustomed to authentication information and/or user biological authentication information.
Optionally, it is corresponding less than the user biological authentication information to be accustomed to corresponding first score value of authentication information by the user
The first score value;
The user is accustomed to corresponding second score value of authentication information and is greater than the user biological authentication information corresponding second
Score value.
Optionally, referring to Fig. 8, described first determines that submodule 6033 includes:
First determination unit 60331, for determining institute when the safety summation is less than or equal to the first preset value
Stating security level of the terminal in the N+2 default authentication periods is the first security level;
Second determination unit 60332 for being greater than first preset value when the safety summation, and is less than or waits
When the second preset value, determine that security level of the terminal in the N+2 default authentication periods is second safety etc.
Grade;
Third determination unit 60333, described in determining when the safety summation is greater than second preset value
Security level of the terminal in the N+2 default authentication periods is third security level;
Wherein, in first security level, the terminal forbids accessing the data information of user, and operation is forbidden to pay
Class application program;In second security level, the terminal forbids accessing the private data information in the data information of user,
And forbid operation payment class application program;In the third security level, the terminal allows to access the data information of user, and
Allow to run payment class application program.
Optionally, referring to Fig. 9, the adjustment module 603 further include:
Judging submodule 6034, for whether judging security level of the terminal in N+2 default authentication periods
More than default security level;
Submodule 6035 is set, for being more than institute when security level of the terminal in N+2 default authentication periods
When stating default security level, the first duration is set by the duration of N+3 default authentication periods, wherein first duration
Less than the duration of the N+2 default authentication periods.
Optionally, referring to Figure 10, when the first state is screen lock state, the adjustment module 603 includes:
Second determines submodule 6036, for determining institute when screen locking duration is less than or equal to the first preset duration
The security level for stating terminal is the 4th security level;
Third determines submodule 6037, for being greater than first preset duration when screen locking duration, and is less than or waits
When the second preset duration, determine that the security level of the terminal is the 5th security level;
4th determines submodule 6038, described in determining when screen locking duration is greater than second preset duration
The security level of terminal is the 6th security level;
Wherein, in the 4th security level, the background application of the terminal is forbidden to access the data information of user;
In the 5th security level, closes the speech identifying function of the terminal and external equipment is forbidden to pass through the USB of the terminal
The data information of interface access user;In the 6th security level, the current position of the terminal is obtained, and by the terminal
Current position is sent to network side equipment.
Terminal provided in an embodiment of the present invention can be realized terminal in the embodiment of the method for Fig. 1, Fig. 2 and Fig. 5 realize it is each
A process, to avoid repeating, which is not described herein again.The embodiment of the present invention equally improves the safety that terminal uses.
A kind of hardware structural diagram of Figure 11 terminal of each embodiment to realize the present invention.
The terminal 1100 includes but is not limited to: radio frequency unit 1101, network module 1102, audio output unit 1103, defeated
Enter unit 1104, sensor 1105, display unit 1106, user input unit 1107, interface unit 1108, memory 1109,
The components such as processor 1110 and power supply 1111.It will be understood by those skilled in the art that terminal structure shown in Figure 11 is not
The restriction of structure paired terminal, terminal may include perhaps combining certain components or difference than illustrating more or fewer components
Component layout.In embodiments of the present invention, terminal includes but is not limited to mobile phone, tablet computer, laptop, palm electricity
Brain, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 1110 are used for:
Determine that first state locating for the terminal, the first state are unlocked state or screen lock state;
Obtain the corresponding target data of the first state;
The security level of the terminal is determined according to the target data;
Wherein, when the first state is unlocked state, the target data includes the certification knot of default authentication information
Fruit.
Optionally, when the first state is unlocked state, the processor 1110 executes described according to the target
The security level of terminal described in data point reuse, comprising:
The safety in N+1 default authentication periods is calculated according to the authentication result of the default authentication information,
In, the default authentication information is the authentication information in N+1 default authentication periods, and the N is positive integer;
The safety in the default authentication period of n-th is obtained, and is calculated in the default authentication period of the n-th and described
Safety summation in N+1 default authentication periods;
Security level of the terminal in N+2 default authentication periods is determined according to the safety summation.
Optionally, the processor 1110, which executes, described calculates described the according to the authentication result of the default authentication information
Safety in N+1 default authentication periods, comprising:
It is corresponding to calculate the default authentication information authenticates each time in N+1 default authentication periods authentication result
/ and, to obtain the safety in the N+1 default authentication periods;
Wherein, when the M times authentication result of the default authentication information is to authenticate successfully, the default authentication information
The M times authentication result is scored at the first score value;When the L times authentication result of the default authentication information is authentification failure,
The L times authentication result of the default authentication information is scored at the second score value, and the M and the L are positive integer.
Optionally, first score value is positive number, and second score value is negative.
Optionally, the default authentication information includes that user is accustomed to authentication information and/or user biological authentication information.
Optionally, it is corresponding less than the user biological authentication information to be accustomed to corresponding first score value of authentication information by the user
The first score value;
The user is accustomed to corresponding second score value of authentication information and is greater than the user biological authentication information corresponding second
Score value.
Optionally, the processor 1110 executes described determines the terminal in N+2 according to the safety summation
Security level in a default authentication period, comprising:
When the safety summation is less than or equal to the first preset value, determine that the terminal is pre- at the N+2
Security level in the setting authentication period is the first security level;
When the safety summation is greater than first preset value, and is less than or equal to the second preset value, institute is determined
Stating security level of the terminal in the N+2 default authentication periods is the second security level;
When the safety summation is greater than second preset value, determine that the terminal is default at the N+2
Security level in authentication period is third security level;
Wherein, in first security level, the terminal forbids accessing the data information of user, and operation is forbidden to pay
Class application program;In second security level, the terminal forbids accessing the private data information in the data information of user,
And forbid operation payment class application program;In the third security level, the terminal allows to access the data information of user, and
Allow to run payment class application program.
Optionally, the processor 1110 is also used to:
Judge whether security level of the terminal in N+2 default authentication periods is more than default security level;
It, will when security level of the terminal in N+2 default authentication periods is more than the default security level
The duration of N+3 default authentication periods is set as the first duration, wherein first duration is less than the N+2 and presets
The duration of authentication period.
Optionally, when the first state is screen lock state, the processor 1110 executes described according to the target
Data determine the security level of the terminal, comprising:
When screen locking duration is less than or equal to the first preset duration, determine that the security level of the terminal is the 4th peace
Congruent grade;
When screen locking duration is greater than first preset duration, and is less than or equal to the second preset duration, institute is determined
The security level for stating terminal is the 5th security level;
When screen locking duration is greater than second preset duration, determine that the security level of the terminal is the 6th safety
Grade;
Wherein, in the 4th security level, the background application of the terminal is forbidden to access the data information of user;
In the 5th security level, closes the speech identifying function of the terminal and external equipment is forbidden to pass through the USB of the terminal
The data information of interface access user;In the 6th security level, the current position of the terminal is obtained, and by the terminal
Current position is sent to network side equipment.
Terminal provided in an embodiment of the present invention can be realized each process that terminal is realized in previous embodiment, to avoid weight
Multiple, which is not described herein again.The safety that terminal uses equally can be improved in the present embodiment.
It should be understood that the embodiment of the present invention in, radio frequency unit 1101 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 1110 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 1101 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 1101 can also by wireless communication system and network and other
Equipment communication.
Terminal provides wireless broadband internet by network module 1102 for user and accesses, and such as user is helped to receive and dispatch electricity
Sub- mail, browsing webpage and access streaming video etc..
Audio output unit 1103 can be received by radio frequency unit 1101 or network module 1102 or in memory
The audio data stored in 1109 is converted into audio signal and exports to be sound.Moreover, audio output unit 1103 can be with
Audio output relevant to the specific function that terminal 1100 executes is provided (for example, call signal receives sound, message sink sound
Etc.).Audio output unit 1103 includes loudspeaker, buzzer and receiver etc..
Input unit 1104 is for receiving audio or video signal.Input unit 1104 may include graphics processor
(Graphics Processing Unit, GPU) 11041 and microphone 11042, graphics processor 11041 are captured in video
The of the static images or video obtained in mode or the first image capture mode by the first image capture apparatus (such as camera)
One image data is handled.Treated, and the first picture frame may be displayed on display unit 1106.Through graphics processor
11041 treated that the first picture frame can store in memory 1109 (or other storage mediums) or via radio frequency unit
1101 or network module 1102 sent.Microphone 11042 can receive sound, and can be by such acoustic processing
Audio data.Treated, and audio data can be converted in the case where telephone calling model and can be sent out via radio frequency unit 1101
It is sent to the format output of mobile communication base station.
Terminal 1100 further includes at least one sensor 1105, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment light
The light and shade of line adjusts the brightness of display panel 11061, and proximity sensor can close display when terminal 1100 is moved in one's ear
Panel 11061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three in all directions
Axis) acceleration size, can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 1105
It can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, temperature
Meter, infrared sensor etc. are spent, details are not described herein.
Display unit 1106 is for showing information input by user or being supplied to the information of user.Display unit 1106 can
Including display panel 11061, liquid crystal display (Liquid Crystal Display, LCD), organic light-emitting diodes can be used
Forms such as (Organic Light-Emitting Diode, OLED) are managed to configure display panel 11061.
User input unit 1107 can be used for receiving the number or character information of input, and generates and set with the user of terminal
It sets and the related key signals of function control inputs.Specifically, user input unit 1107 include touch panel 11071 and its
His input equipment 11072.Touch panel 11071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 11071 or in touch panel
Operation near 11071).Touch panel 11071 may include both touch detecting apparatus and touch controller.Wherein, it touches
The touch orientation of detection device detection user is touched, and detects touch operation bring signal, transmits a signal to touch controller;
Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 1110,
It receives the order that processor 1110 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface
The multiple types such as sound wave realize touch panel 11071.In addition to touch panel 11071, user input unit 1107 can also include
Other input equipments 11072.Specifically, other input equipments 11072 can include but is not limited to physical keyboard, function key (ratio
Such as volume control button, switch key), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 11071 can be covered on display panel 11061, when touch panel 11071 detects
After touch operation on or near it, processor 1110 is sent to determine the type of touch event, is followed by subsequent processing device 1110
Corresponding visual output is provided on display panel 11061 according to the type of touch event.Although in Figure 11, touch panel
11071 and display panel 11061 are the functions that outputs and inputs of realizing terminal as two independent components, but certain
In embodiment, touch panel 11071 and display panel 11061 can be integrated and be realized the function that outputs and inputs of terminal, tool
Body is herein without limitation.
Interface unit 1108 is the interface that external device (ED) is connect with terminal 1100.For example, external device (ED) may include wired
Or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 1108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in terminal 1100 or can be used in terminal 1100 and external dress
Data are transmitted between setting.
Memory 1109 can be used for storing software program and various data.Memory 1109 can mainly include storage program
Area and storage data area, wherein storing program area can application program needed for storage program area, at least one function (such as
Sound-playing function, first image player function etc.) etc.;Storage data area, which can be stored, uses created data according to mobile phone
(such as audio data, phone directory etc.) etc..In addition, memory 1109 may include high-speed random access memory, can also wrap
Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 1110 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection,
By running or execute the software program and/or module that are stored in memory 1109, and calls and be stored in memory 1109
Interior data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 1110 may include
One or more processing units;Preferably, processor 1110 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 1110.
Terminal 1100 can also include the power supply 1111 (such as battery) powered to all parts, it is preferred that power supply 1111
Can be logically contiguous by power-supply management system and processor 1110, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, terminal 1100 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 1110, and memory 1109 is stored in
On reservoir 1109 and the computer program that can run on the processor 1110, the computer program are executed by processor 1110
A kind of above-mentioned each process of security level method of adjustment embodiment of Shi Shixian, and identical technical effect can be reached, to avoid
It repeats, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, the computer program realize a kind of each mistake of above-mentioned security level method of adjustment embodiment when being executed by processor
Journey, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer-readable storage medium
Matter, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access
Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (12)
1. a kind of security level method of adjustment is applied to terminal, which is characterized in that the described method includes:
Determine that first state locating for the terminal, the first state are unlocked state or screen lock state;
Obtain the corresponding target data of the first state;
The security level of the terminal is adjusted according to the target data;
Wherein, when the first state is unlocked state, the target data includes the authentication result of default authentication information.
2. the method as described in claim 1, which is characterized in that described according to institute when the first state is unlocked state
State the security level that target data adjusts the terminal, comprising:
The safety in N+1 default authentication periods is calculated according to the authentication result of the default authentication information, wherein institute
Stating default authentication information is the authentication information in N+1 default authentication periods, and the N is positive integer;
Obtain n-th preset authentication period in safety, and calculate the n-th preset authentication period in and the N+
Safety summation in 1 default authentication period;
Security level of the terminal in N+2 default authentication periods is determined according to the safety summation.
3. method according to claim 2, which is characterized in that described to be calculated according to the authentication result of the default authentication information
Safety in the N+1 default authentication periods, comprising:
Calculate that the default authentication information authenticates each time in N+1 default authentication periods authentication result is corresponding must to divide it
With obtain the safety in the N+1 default authentication period;
Wherein, when the M times authentication result of the default authentication information is to authenticate successfully, the M of the default authentication information
Secondary authentication result is scored at the first score value;It is described when the L times authentication result of the default authentication information is authentification failure
The L times authentication result of default authentication information is scored at the second score value, and the M and the L are positive integer.
4. method according to claim 2, which is characterized in that described to determine that the terminal exists according to the safety summation
Security level in N+2 default authentication periods, comprising:
When the safety summation is less than or equal to the first preset value, determines that the terminal is preset at the N+2 and recognize
Demonstrate,proving the security level in the period is the first security level;
When the safety summation is greater than first preset value, and is less than or equal to the second preset value, the end is determined
Holding the security level in the N+2 default authentication periods is the second security level;
When the safety summation is greater than second preset value, determine the terminal in the N+2 pre- setting authentications
Security level in period is third security level.
5. method according to claim 2, which is characterized in that described to determine that the terminal exists according to the safety summation
After security level in N+2 default authentication periods, the method also includes:
Judge whether security level of the terminal in N+2 default authentication periods is more than default security level;
When security level of the terminal in N+2 default authentication periods is more than the default security level, by N+3
The duration of a default authentication period is set as the first duration, wherein first duration is less than the N+2 pre- setting authentication weeks
The duration of phase.
6. the method as described in claim 1, which is characterized in that when the first state is screen lock state, the number of targets
According to including screen locking duration, the security level that the terminal is adjusted according to the target data, comprising:
When screen locking duration is less than or equal to the first preset duration, determine that the security level of the terminal is the 4th safety etc.
Grade;
When screen locking duration is greater than first preset duration, and is less than or equal to the second preset duration, the end is determined
The security level at end is the 5th security level;
When screen locking duration is greater than second preset duration, determine that the security level of the terminal is the 6th safety etc.
Grade.
7. a kind of terminal characterized by comprising
Determining module, for determining that first state locating for the terminal, the first state are unlocked state or screen lock state;
Module is obtained, for obtaining the corresponding target data of the first state;
Module is adjusted, for adjusting the security level of the terminal according to the target data;
Wherein, when the first state is unlocked state, the target data includes the authentication result of default authentication information.
8. terminal as claimed in claim 7, which is characterized in that when the first state is unlocked state, the adjustment mould
Block includes:
First computational submodule, for calculating N+1 default authentication periods according to the authentication result of the default authentication information
Interior safety, wherein the default authentication information is the authentication information in N+1 default authentication periods, and the N is positive
Integer;
Second computational submodule, for obtaining the safety in the default authentication period of n-th, and it is default to calculate the n-th
Safety summation in authentication period and in the N+1 default authentication periods;
First determines submodule, for determining the terminal in N+2 default authentication periods according to the safety summation
Interior security level.
9. terminal as claimed in claim 8, which is characterized in that first computational submodule is also used to calculate N+1 in advance
The sum of the corresponding score of authentication result that the default authentication information authenticates each time in the setting authentication period, obtains the N+1
Safety in a default authentication period;
Wherein, when the M times authentication result of the default authentication information is to authenticate successfully, the M of the default authentication information
Secondary authentication result is scored at the first score value;It is described when the L times authentication result of the default authentication information is authentification failure
The L times authentication result of default authentication information is scored at the second score value, and the M and the L are positive integer.
10. terminal as claimed in claim 8, which is characterized in that described first determines that submodule includes:
First determination unit, for determining that the terminal exists when the safety summation is less than or equal to the first preset value
Security level in the N+2 default authentication periods is the first security level;
Second determination unit, for being greater than first preset value when the safety summation, and it is pre- to be less than or equal to second
If when value, determining that security level of the terminal in the N+2 default authentication periods is the second security level;
Third determination unit, for determining the terminal in institute when the safety summation is greater than second preset value
Stating the security level in N+2 default authentication periods is third security level.
11. terminal as claimed in claim 8, which is characterized in that the adjustment module further include:
Judging submodule, for judging whether security level of the terminal in N+2 default authentication periods is more than default
Security level;
Submodule is set, for being more than the default peace when security level of the terminal in N+2 default authentication periods
When congruent grade, the first duration is set by the duration of N+3 default authentication periods, wherein first duration is less than described
The duration of N+2 default authentication periods.
12. terminal as claimed in claim 7, which is characterized in that when the first state is screen lock state, the number of targets
According to including screen locking duration, the adjustment module includes:
Second determines submodule, for determining the terminal when screen locking duration is less than or equal to the first preset duration
Security level is the 4th security level;
Third determines submodule, and for being greater than first preset duration when screen locking duration, and it is pre- to be less than or equal to second
If when duration, determining that the security level of the terminal is the 5th security level;
4th determines submodule, for determining the peace of the terminal when screen locking duration is greater than second preset duration
Congruent grade is the 6th security level.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910328316.6A CN110336911B (en) | 2019-04-23 | 2019-04-23 | Security level adjustment method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910328316.6A CN110336911B (en) | 2019-04-23 | 2019-04-23 | Security level adjustment method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110336911A true CN110336911A (en) | 2019-10-15 |
CN110336911B CN110336911B (en) | 2022-01-21 |
Family
ID=68140123
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910328316.6A Active CN110336911B (en) | 2019-04-23 | 2019-04-23 | Security level adjustment method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110336911B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111976647A (en) * | 2020-08-04 | 2020-11-24 | 东风越野车有限公司 | Military off-road vehicle anti-theft control method and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103237119A (en) * | 2013-03-26 | 2013-08-07 | 东莞宇龙通信科技有限公司 | Mobile terminal alarm method and device |
CN103885827A (en) * | 2014-03-28 | 2014-06-25 | 深圳市中兴移动通信有限公司 | Method switching running modes automatically and intelligent terminal |
CN103927466A (en) * | 2014-04-01 | 2014-07-16 | 可牛网络技术(北京)有限公司 | Method and device for controlling mobile terminal |
EP2811725A1 (en) * | 2013-06-07 | 2014-12-10 | BlackBerry Limited | Mobile wireless communications device performing device unlock based upon near field communication (nfc) and related methods |
CN104811932A (en) * | 2014-01-23 | 2015-07-29 | 统一有限责任两合公司 | Method for handling security configurations in a mobile terminal or for controlling access |
WO2015184467A1 (en) * | 2014-05-30 | 2015-12-03 | Reylabs Inc. | Systems and methods involving mobile linear asset efficiency exploration, monitoring and/or display aspects |
CN105678171A (en) * | 2014-11-17 | 2016-06-15 | 中兴通讯股份有限公司 | Data processing method, device and mobile terminal |
CN107613129A (en) * | 2017-09-28 | 2018-01-19 | 广东欧珀移动通信有限公司 | Unlocking method and related product |
CN109325334A (en) * | 2018-09-26 | 2019-02-12 | 维沃移动通信有限公司 | A kind of touch control terminal control method and touch control terminal |
-
2019
- 2019-04-23 CN CN201910328316.6A patent/CN110336911B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103237119A (en) * | 2013-03-26 | 2013-08-07 | 东莞宇龙通信科技有限公司 | Mobile terminal alarm method and device |
EP2811725A1 (en) * | 2013-06-07 | 2014-12-10 | BlackBerry Limited | Mobile wireless communications device performing device unlock based upon near field communication (nfc) and related methods |
CN104811932A (en) * | 2014-01-23 | 2015-07-29 | 统一有限责任两合公司 | Method for handling security configurations in a mobile terminal or for controlling access |
CN103885827A (en) * | 2014-03-28 | 2014-06-25 | 深圳市中兴移动通信有限公司 | Method switching running modes automatically and intelligent terminal |
CN103927466A (en) * | 2014-04-01 | 2014-07-16 | 可牛网络技术(北京)有限公司 | Method and device for controlling mobile terminal |
WO2015184467A1 (en) * | 2014-05-30 | 2015-12-03 | Reylabs Inc. | Systems and methods involving mobile linear asset efficiency exploration, monitoring and/or display aspects |
CN105678171A (en) * | 2014-11-17 | 2016-06-15 | 中兴通讯股份有限公司 | Data processing method, device and mobile terminal |
CN107613129A (en) * | 2017-09-28 | 2018-01-19 | 广东欧珀移动通信有限公司 | Unlocking method and related product |
CN109325334A (en) * | 2018-09-26 | 2019-02-12 | 维沃移动通信有限公司 | A kind of touch control terminal control method and touch control terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111976647A (en) * | 2020-08-04 | 2020-11-24 | 东风越野车有限公司 | Military off-road vehicle anti-theft control method and system |
Also Published As
Publication number | Publication date |
---|---|
CN110336911B (en) | 2022-01-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108491123A (en) | A kind of adjusting application program image target method and mobile terminal | |
CN107609363B (en) | Unlocking method and mobile terminal | |
CN107679514A (en) | A kind of face identification method and electronic equipment | |
CN108549802A (en) | A kind of unlocking method, device and mobile terminal based on recognition of face | |
CN108650408B (en) | Screen unlocking method and mobile terminal | |
CN108010170A (en) | A kind of control method and device of face recognition unlocking function | |
CN108171832A (en) | A kind of method for unlocking and mobile terminal of shared bicycle | |
CN109284150A (en) | A kind of method and terminal starting application program | |
CN108958582A (en) | A kind of application program launching method and terminal | |
CN108156537A (en) | The remote operation method and mobile terminal of a kind of mobile terminal | |
CN108961489A (en) | A kind of equipment wearing control method, terminal and computer readable storage medium | |
CN109756621A (en) | A kind of two-dimensional code display method and terminal device | |
CN109544172A (en) | A kind of display methods and terminal device | |
CN109325334A (en) | A kind of touch control terminal control method and touch control terminal | |
CN109886686A (en) | A kind of safe payment method, equipment and computer readable storage medium | |
CN109409044A (en) | A kind of verifying interface display method and terminal | |
CN108710806A (en) | A kind of terminal unlock method, mobile terminal | |
CN108038360A (en) | The switching method and mobile terminal of a kind of operational mode | |
CN107895108B (en) | Operation management method and mobile terminal | |
CN109800606A (en) | A kind of display control method and mobile terminal | |
CN109218984A (en) | A kind of method for tracing and mobile terminal | |
CN110519443A (en) | A kind of bright screen method and mobile terminal | |
CN109063462A (en) | A kind of right management method and terminal device | |
CN110336911A (en) | A kind of security level method of adjustment and terminal | |
CN107613145B (en) | Screen unlocking method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |