CN110336911A - A kind of security level method of adjustment and terminal - Google Patents

A kind of security level method of adjustment and terminal Download PDF

Info

Publication number
CN110336911A
CN110336911A CN201910328316.6A CN201910328316A CN110336911A CN 110336911 A CN110336911 A CN 110336911A CN 201910328316 A CN201910328316 A CN 201910328316A CN 110336911 A CN110336911 A CN 110336911A
Authority
CN
China
Prior art keywords
terminal
security level
default
authentication
default authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910328316.6A
Other languages
Chinese (zh)
Other versions
CN110336911B (en
Inventor
李宗霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910328316.6A priority Critical patent/CN110336911B/en
Publication of CN110336911A publication Critical patent/CN110336911A/en
Application granted granted Critical
Publication of CN110336911B publication Critical patent/CN110336911B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Abstract

The present invention provides a kind of security level method of adjustment and terminal, this method comprises: determining first state locating for the terminal, the first state is unlocked state or screen lock state;Obtain the corresponding target data of the first state;The security level of the terminal is determined according to the target data;Wherein, when the first state is unlocked state, the target data includes the authentication result of default authentication information.The embodiment of the present invention improves the safety that terminal uses.

Description

A kind of security level method of adjustment and terminal
Technical field
The present invention relates to field of communication technology more particularly to a kind of security level methods of adjustment and terminal.
Background technique
With the development of terminal, terminal occupies more and more important position in people's lives, currently, one in terminal As be stored with a large amount of data information of owner.In practice, the security level of terminal is changeless, the i.e. behaviour of terminal It is changeless for making permission.Such as: if the authentication information of terminal is grasped by the other users in addition to owner, complete to authenticate After unlock, other users can inquire the data information stored in terminal, be leaked so as to cause data information, or control Application program in terminal executes corresponding operation, brings loss to owner.There is peace when as it can be seen that terminal using in the prior art The poor problem of full property.
Summary of the invention
The embodiment of the present invention provides a kind of security level method of adjustment and terminal, when solving that terminal uses in the prior art There is a problem of that safety is poor.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, being applied to terminal, the method packet the embodiment of the invention provides a kind of security level method of adjustment It includes:
Determine that first state locating for the terminal, the first state are unlocked state or screen lock state;
Obtain the corresponding target data of the first state;
The security level of the terminal is adjusted according to the target data;
Wherein, when the first state is unlocked state, the target data includes the certification knot of default authentication information Fruit.
Second aspect, the embodiment of the present invention also provide a kind of terminal, comprising:
Determining module, for determining that first state locating for the terminal, the first state are unlocked state or screen locking State;
Module is obtained, for obtaining the corresponding target data of the first state;
Module is adjusted, for adjusting the security level of the terminal according to the target data;
Wherein, when the first state is unlocked state, the target data includes the certification knot of default authentication information Fruit.
In the embodiment of the present invention, by determining that first state locating for terminal, first state are unlocked state or screen locking shape State;Obtain the corresponding target data of first state;The security level of terminal is adjusted according to target data.When first state is unlock When state, the first data include the authentication result of default authentication information.In this way, according to the target obtained under different first states Data, so that different security levels can be arranged in terminal automatically under different first states.Therefore, the present invention is implemented Example improves the safety that terminal uses.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is a kind of flow chart of security level method of adjustment provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another security level method of adjustment provided in an embodiment of the present invention;
Fig. 3 is one of exemplary graph provided in an embodiment of the present invention;
Fig. 4 is the two of exemplary graph provided in an embodiment of the present invention;
Fig. 5 is the flow chart of another security level method of adjustment provided in an embodiment of the present invention;
Fig. 6 is a kind of structure chart of terminal provided in an embodiment of the present invention;
Fig. 7 is one of the structure chart of the second determining module in a kind of terminal provided in an embodiment of the present invention;
Fig. 8 is the structure chart of the first determining submodule in a kind of terminal provided in an embodiment of the present invention;
Fig. 9 is the two of the structure chart of the second determining module in a kind of terminal provided in an embodiment of the present invention;
Figure 10 is the three of the structure chart of the second determining module in a kind of terminal provided in an embodiment of the present invention;
Figure 11 is the structure chart of another terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It is a kind of flow chart of security level method of adjustment provided in an embodiment of the present invention referring to Fig. 1, Fig. 1, such as Fig. 1 institute Show, comprising the following steps:
Step 101 determines that first state locating for the terminal, the first state are unlocked state or screen lock state.
Wherein, when terminal is screen lock state, while terminal can be to put out screen state, or bright screen state.Specific shape State is it is not limited here.
Step 102 obtains the corresponding target data of the first state.
Wherein, terminal can obtain target data every default authentication period, and the length of default authentication period is herein not It limits.Certainly, terminal can also obtain target data in real time.
Step 103, the security level that the terminal is adjusted according to the target data.
Wherein, when first state is unlocked state, target data includes the authentication result of default authentication information;When the first shape When state is screen lock state, target data includes the geographical location information that screen locking duration or terminal are presently in.
Wherein, default authentication information may include at least one that user is accustomed in authentication information and user biological authentication information ?.Such as: user is accustomed to the pressing gesture that authentication information may include user, the position for pressing terminal display screen and slip gesture Etc. in information at least one of;User biological authentication information may include in the information such as the fingerprint, face and iris of user extremely One item missing.In this way, since default authentication information includes a plurality of types of information, so that the certification knot of default authentication information The reliability of fruit is higher.
In addition, above-mentioned default authentication information can be stored in advance in terminal inner.
In addition, default authentication information can also include in user shows for terminal when first state is unlocked state The work angle of appearance, such as: user for terminal show content work angle can for along terminal up and down direction or Left and right directions.In this way, can show the work angle of content for terminal by the user of the currently used terminal of calculating and preset The matching degree of work angle, so that it is determined that the security level of terminal.
In addition, target data can also include the geographical location that terminal is presently in when first state is screen lock state Information.Such as: terminal can be according to the distance between the position and predeterminated position that terminal is presently in, so that it is determined that the peace of terminal Congruent grade.
It should be noted that when first state is unlocked state, what the authentication result certification of default authentication information passed through When number is more, a possibility that user of currently used terminal is the owner of terminal, is higher, may thereby determine that terminal is Gao An Congruent grade, when terminal is high safety grade, the operating right of terminal is larger.When the authentication result certification of default authentication information is logical When the number crossed is fewer, a possibility that user of currently used terminal is the owner of terminal, is smaller, may thereby determine that terminal is Lower security grade, when terminal is lower security grade, the operating right of terminal is smaller.In this way, when terminal is by its in addition to owner His user in use, can determine that terminal is lower security grade, to reduce the data money of terminal owner through the above steps Material a possibility that being leaked, the application program decreased in other users controlling terminal execute corresponding operation, to owner with Come appearance the phenomenon that loss, to improve the security performance of terminal.
It should be noted that screen locking duration is longer when first state is screen lock state, judge lost terminal can Can property it is bigger, can determine that terminal is lower security grade at this time, when terminal is lower security grade, the operating right of terminal compared with It is small, such as: when terminal is lower security grade, external equipment can be closed by the interface of terminal and access the number stored in terminal According to the function of data.A possibility that data information of terminal owner is leaked can be equally reduced, to improve the peace of terminal Full performance.
In addition, when target data difference, the security level of terminal be can also be different, so that more flexible Determine the security level of terminal.
In the embodiment of the present invention, above-mentioned terminal can be mobile phone, tablet computer (Tablet Personal Computer), Laptop computer (Laptop Computer), personal digital assistant (PersonalDigital Assistant, abbreviation PDA), Mobile Internet access device (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..
By step 101 to 103, security level and operating right with terminal in the prior art are changeless side Formula is compared, in embodiments of the present invention, according to the target data obtained under different first states, so that terminal can be Different security levels is set automatically under different first states.Therefore, the embodiment of the present invention improves the safety that terminal uses Property.
Referring to fig. 2, Fig. 2 is the flow chart of another security level method of adjustment provided in an embodiment of the present invention.This implementation The main distinction of example and last embodiment is: when first state is unlocked state, can calculate n-th and preset authentication period Safety summation in interior and N+1 default authentication period, and determine that terminal is pre- at N+2 according to safety summation Security level in the setting authentication period.As shown in Figure 2, comprising the following steps:
Step 201 determines that first state locating for the terminal, the first state are unlocked state.
Wherein, when terminal is screen lock state, while terminal can be to put out screen state, or bright screen state.Specific shape State is it is not limited here.
Step 202 obtains the corresponding target data of the first state, and the target data includes default authentication information Authentication result.
Wherein, terminal can obtain target data every default authentication period.Certainly, terminal can also obtain target in real time Data.
Step 203 calculates the safety in N+1 default authentication periods according to the authentication result of the default authentication information Score, wherein the default authentication information is the authentication information in N+1 default authentication periods, and the N is positive integer.
Wherein, preset authentication period length it is not limited here, such as: default authentication period can be 10 seconds, 20 seconds Or 30 seconds etc..
Wherein, default authentication information may include delivery operation, the account of user's input and password and the voice of user Identification etc..And the authentication result of default authentication information may include: the delivery operation account whether successful, user inputs and password Whether whether certification success and the speech recognition of user authenticate successfully etc..
It is corresponded to wherein it is possible to first calculate and preset the authentication result of authentication information each time in N+1 default authentication periods Safety, then the corresponding safety of the authentication result of default authentication information each time is directly superimposed or is weighted again Superposition, to obtain the safety in N+1 default authentication periods.
Optionally, described that the N+1 default authentication period is calculated according to the authentication result of the default authentication information Interior safety, comprising:
It is corresponding to calculate the default authentication information authenticates each time in N+1 default authentication periods authentication result / and, obtain the safety in the N+1 default authentication periods;
Wherein, when the M times authentication result of the default authentication information is to authenticate successfully, the default authentication information The M times authentication result is scored at the first score value;When the L times authentication result of the default authentication information is authentification failure, The L times authentication result of the default authentication information is scored at the second score value, and the M and the L are positive integer.
The certification that authentication information authenticates each time is preset in present embodiment and weighted superposition N+1 default authentication periods As a result the mode of corresponding score is compared, and can be more quickly calculated safe in N+1 default authentication periods Point.
Wherein, the value of the first score value and the second score value is different, such as: the first score value can be positive number, and the second score value It can be negative or 0.Preferably, the first score value is positive number, and the second score value is negative.
It should be noted that the second score value is negative integer it is further preferred that the first score value is positive integer.
In this way, since the safety in N+1 default authentication periods is every by being directly superimposed default authentication information The corresponding score of the authentication result once authenticated obtains, and the first score value is positive number, and the second score value is negative.Work as authentication result When more for the number of authentification failure, by the second score value of multiple stacking, terminal can be reduced automatically in N+1 pre- setting authentications Safety in period, and then the security level of terminal is reduced automatically.
In addition, in present embodiment, if authentication result be authenticate successful number it is more, corresponding safety compared with Height, and be positive number;If authentication result is that the number of authentification failure is more, corresponding safety is lower, thereby increases and it is possible to be negative.
Optionally, the default authentication information includes that user is accustomed to authentication information and/or user biological authentication information.
Wherein, default authentication information may include at least one that user is accustomed in authentication information and user biological authentication information ?.Such as: user is accustomed to the pressing gesture that authentication information may include user, the position for pressing terminal display screen and slip gesture Etc. in information at least one of;User biological authentication information may include in the information such as the fingerprint, face and iris of user extremely One item missing.
In this way, since default authentication information includes a plurality of types of information, so that the certification of default authentication information As a result reliability is higher.
Optionally, it is corresponding less than the user biological authentication information to be accustomed to corresponding first score value of authentication information by the user The first score value;
The user is accustomed to corresponding second score value of authentication information and is greater than the user biological authentication information corresponding second Score value.
Wherein, referring to table 1, in same security level, user is accustomed to corresponding first score value of authentication information and is less than user Corresponding first score value of biometric authentication information;User is accustomed to corresponding second score value of authentication information and is greater than user biological authentication information Corresponding second score value.Such as: when terminal is in the first security level, when user be accustomed to authentication information it is every authenticate it is successfully primary When, can add 2 points, and user biological authentication information it is every authenticate successfully one time when, 3 points can be added.When user is accustomed to authentication information At every authentification failure one time, minus 2 points can be added, and at the every authentification failure of user biological authentication information one time, minus 3 points can be added.
In addition, referring to table 1, when terminal is in third security level, primary, the explanation if user biological authentication information fails A possibility that user of currently used terminal is not terminal owner is higher, directly can directly be adjusted to the security level of terminal Second security level, to reduce a possibility that data information of terminal is leaked.
Table 1
In present embodiment, since when being authenticated, user biological authentication information can than user's habit authentication information It is more preferable by property, in this way, setting user, which is accustomed to corresponding first score value of authentication information, is less than user biological authentication information corresponding the One score value;And corresponding second score value of setting user's habit authentication information is second point corresponding greater than user biological authentication information Value, to improve the accuracy for the security level that terminal determines.
Step 204, acquisition n-th preset the safety in authentication period, and calculate the n-th and preset authentication period Safety summation in the interior and described N+1 default authentication periods.
Wherein, n-th presets the safety summation in authentication period and in N+1 default authentication periods, i.e., by N Safety in a default authentication period is directly added with the safety in N+1 default authentication periods.
Step 205 determines safety of the terminal in N+2 default authentication periods according to the safety summation Grade.
Wherein, security level is classified as at least two grades, and in different security levels, the operating right of terminal is not Together.
Optionally, described to determine the terminal in N+2 default authentication periods according to the safety summation Security level, comprising:
When the safety summation is less than or equal to the first preset value, determine that the terminal is pre- at the N+2 Security level in the setting authentication period is the first security level;
When the safety summation is greater than first preset value, and is less than or equal to the second preset value, institute is determined Stating security level of the terminal in the N+2 default authentication periods is the second security level;
When the safety summation is greater than second preset value, determine that the terminal is default at the N+2 Security level in authentication period is third security level;
Wherein, in first security level, the terminal forbids accessing the data information of user, and operation is forbidden to pay Class application program;In second security level, the terminal forbids accessing the private data information in the data information of user, And forbid operation payment class application program;In the third security level, the terminal allows to access the data information of user, and Allow to run payment class application program.
Such as: when the password of terminal is leaked, after other users get above-mentioned password, terminal is unlocked, eventually End is currently at the first security level, then present terminal executes some basic operations, such as: open browser.It is any to be related to Data information to user is not allowed access to.In this way, since other users only obtain the unlocking pin of terminal, then terminal Security level be constantly in the first security level, the operation that terminal is able to carry out is limited, to improve the safety of terminal.
In addition, when owner is in the case where continuous operating terminal, the security level of present terminal is higher, for instance in the Three security levels need to lend terminal at this time other users use, when other users are during using the terminal, are connecing In the default authentication period got off, since the user detected is accustomed to the matching of authentication information and/or user biological authentication information As a result be generally it is unsuccessful, so as in next default authentication period reduce terminal security level, to improve The safety that terminal uses.
Wherein, the specific value of the first preset value and the second preset value it is not limited here, such as: the first preset value takes Value can be 15, and the value of the second preset value can be with 25.
Certainly, a upper limit value can be set in the corresponding safety of third security level, when the safety of terminal arrives When up to the upper limit value, safety no longer rises.Such as: referring to table 1, the corresponding safety range of third security level can be with For 26-30.When safety of the terminal in second default authentication period is 30, terminal is in the default authentication period of third Interior safety summation is 5, then the safety in second default authentication period and in the default authentication period of third is total With remain as 30.
In addition, the private data information in the data information of user may include the photo of user, contact person, call note Record, short message or documentum privatum etc..User can at the terminal be marked above-mentioned private data information.
In addition, the part A in Fig. 3 indicates the status bar of terminal referring to Fig. 3, the part B in Fig. 3 indicates the display of terminal Interface.And security level that terminal is presently in can be shown in the display interface and status bar of terminal and terminal exists Forbid the function of executing when current safety grade.Certainly, terminal can also show the safety etc. of adjustment terminal in the display interface The option of grade, for selection by the user whether with the security level of active accommodation terminal.Such as: above-mentioned adjustment terminal is triggered in user Security level option, terminal can directly be raised to third security level by the first current security level.
In addition, in different security levels, security level that terminal is presently in, terminal taboo in current safety grade The information such as the option of security level of the function and adjustment terminal that only execute can partly or entirely be shown at the terminal.Such as: Referring to table 2, when terminal is in the first security level, above-mentioned letter can be shown when running application program and access data information Breath;When terminal is in the second security level, above- mentioned information can be often shown in the status bar of terminal, it is of course also possible in terminal Above- mentioned information are shown when operation application program and access data information;It, can be in terminal when terminal is in third security level Status bar and display interface often show above- mentioned information, it is of course also possible in terminal operating application program and access data information Show above- mentioned information.
Table 2
In present embodiment, the security level of terminal includes the first security level, the second security level and third safety etc. Grade, and it is configured with different operating rights for different security levels, in this way, when user's using terminal in addition to owner, eventually End may be at lower security level, reduce a possibility that data information of user is leaked, so that the peace of terminal Full better performances, and when owner's using terminal, it may be at higher security level, in this way, the intelligence of terminal can be made Change degree is higher.
Optionally, described to determine the terminal in N+2 default authentication periods according to the safety summation After security level, the method also includes:
Judge whether security level of the terminal in N+2 default authentication periods is more than default security level;
It, will when security level of the terminal in N+2 default authentication periods is more than the default security level The duration of N+3 default authentication periods is set as the first duration, wherein first duration is less than the N+2 and presets The duration of authentication period.
Wherein, default security level can be the first security level, when peace of the terminal in N+2 default authentication periods When congruent grade is more than the first security level, i.e., security level of the terminal in N+2 default authentication periods is second safety etc. When grade or third security level, N+3 default authentication periods can be shortened, (N+3 default authentication periods are set Duration of the duration less than N+2 default authentication periods).
Such as: referring to table 3, when default security level is the first security level, when terminal is in N+2 default authentication periods When interior security level is in the first security level, default authentication period of the terminal in N+3 default authentication periods can be with Without shortening, T is remained as;When security level of the terminal in N+2 default authentication periods is in the second security level, eventually Holding the default authentication period in N+3 default authentication periods adjustable is T/2;When terminal is in N+2 pre- setting authentications When security level in period is in third security level, default authentication period of the terminal in N+3 default authentication periods Adjustable is T/4.
In addition, seeing also table 3, when terminal is in different security levels, user is accustomed to authentication information or user biological is recognized Also adjustable default authentication period when demonstrate,proving authentification of message failure.It should be noted that when terminal is N+2 pre- setting authentication weeks When being in third security level in the phase, and there is user biological authentication information authentification failure in N+2 default authentication periods When, security level of the terminal in N+3 default authentication periods directly can be adjusted to the second security level, improved eventually The safety at end.
Table 3
In present embodiment, if terminal it is current security level it is higher when, can pass through shorten terminal pre- setting authentication week Phase, to improve the certification frequency of terminal, thus a possibility that data information for reducing terminal is leaked, and then improve terminal and use Safety.
It is, of course, also possible to default authentication period is shortened according to the instruction of user, and such as: it presets and recognizes at N+2 when terminal Demonstrate,proving the security level in the period is more than when presetting security level, and user's input is for shortening the finger of N+3 default authentication periods It enables, to shorten N+3 default authentication periods.The type of above-metioned instruction it is not limited here, such as: above-metioned instruction can for by Press operation, touch control operation or phonetic order etc..
It should be noted that in the present embodiment, terminal is in the different moments belonged in the same default authentication period Safety and security level are fixed and invariable.Such as: when terminal is currently in second default authentication period, terminal It will not change belonging to the safety at each moment and security level in second default authentication period, preset when second Authentication period terminates, and when terminal will be entered in the default authentication period of third, counts terminal at this time second pre- setting authentication week Safety in phase, to determine security level of the terminal in third predetermined period.Referring to fig. 4, C segment table shows that terminal is belonging to The corresponding safety in different in second default authentication period at the time of, D segment table shows terminal, and third is default to recognize belonging to Corresponding safety at the time of demonstrate,proving different in the period.It should be noted that C sections and D sections indicate terminal in the unlocked state.
In the embodiment of the present invention, by step 201 to 205, the safety that terminal uses equally can be improved.
It is the flow chart of another security level method of adjustment provided in an embodiment of the present invention referring to Fig. 5, Fig. 5.This implementation The main distinction of example and last embodiment is: when first state is screen lock state, can be determined eventually according to screen locking duration The security level at end.As shown in Figure 5, comprising the following steps:
Step 501 determines that first state locating for the terminal, the first state are screen lock state.
Wherein, when terminal is in screen lock state, while terminal can be to put out screen state, or bright screen state.Work as end When end is bright screen state, the current security level of display terminal and terminal it can be equally on the display interface of terminal Forbid the function of executing when current safety grade.
In addition, when terminal receives trigger action, and the trigger action is presently in security level for triggering terminal Forbid the operation executed, above-mentioned trigger action can also be shown on the display interface of terminal.
Step 502 obtains the corresponding target data of the first state, and the target data includes screen locking duration.
Wherein, equally successively target data can be obtained every a default authentication period, target can also be obtained in real time Data.In addition, target data can also include the current geographical location of terminal.
Step 503, when screen locking duration be less than or equal to the first preset duration when, determine the security level of the terminal For the 4th security level.
Step 504, when screen locking duration be greater than first preset duration, and be less than or equal to the second preset duration When, determine that the security level of the terminal is the 5th security level.
Step 505, when screen locking duration be greater than second preset duration when, determine that the security level of the terminal is 6th security level.
Wherein, in the 4th security level, the background application of the terminal is forbidden to access the data information of user; In the 5th security level, closes the speech identifying function of the terminal and external equipment is forbidden to pass through the general of the terminal The data information of universal serial bus (Universal Serial Bus, USB) interface access user;In the 6th security level, The current position of the terminal is obtained, and the current position of the terminal is sent to network side equipment.
Wherein, when terminal is in screen lock state, the screen locking duration of terminal is obtained, and according to screen locking duration Safety can be counted, it should be noted that screen locking duration is longer, and safety is lower, and safety can be with For negative.Referring to fig. 4, E segment table shows that terminal is corresponding at the time of difference in a default authentication period in the state of the lock screen in Fig. 4 Safety, and E sections may refer to about C sections and D sections of specific statement in last embodiment, and details are not described herein.
Wherein, the specific value of the first preset duration and the second preset duration is it is not limited here.
In addition, terminal can be normally carried out charge function by USB interface when terminal is in five security levels.
In addition, terminal then can be set when terminal current geographical location and the distance between preset geographical position are bigger Security level it is lower, when the current geographical location of terminal and the distance between preset geographical position are bigger, then end can be set The security level at end is higher.
Such as: when terminal is illegally occupied by the other users in addition to owner, when the screen locking by detecting terminal continues Long, if screen locking duration is longer, a possibility that determining lost terminal, is bigger, and then can determine that the security level of terminal is got over It is low.Such as: when screen locking duration is small to 10 for 6 hours, it can determine that the security level of terminal is the 4th security level, The background application of terminal is forbidden to access the data information of user at this time.When screen locking duration is greater than 36 hours, It can then determine that a possibility that security level of terminal is the 6th security level, determines lost terminal at this time is larger, then terminal can To obtain the current position of terminal, and the current position of terminal is sent to network side equipment.To further improve terminal The safety used.
In the embodiment of the present invention, terminal in the state of the lock screen, can adjust terminal according to the screen locking duration of terminal Security level.A possibility that screen locking duration is longer, lost terminal is bigger, so as to which terminal is determined as lower safety Grade reduces a possibility that data information of terminal storage is leaked.In addition, making when the screen locking duration of terminal is too long Terminal when being in six security levels, the current position of terminal can be sent to network side equipment by terminal, to facilitate machine Master recovers terminal, and makes the intelligence degree of terminal higher.
It is the structure chart of terminal provided in an embodiment of the present invention referring to Fig. 6, Fig. 6, is able to achieve a kind of peace in above-described embodiment The details of congruent grade method of adjustment, and reach identical effect.As shown in fig. 6, terminal 600 includes:
Determining module 601, for determining that first state locating for the terminal, the first state are unlocked state or lock Screen state;
Module 602 is obtained, for obtaining the corresponding target data of the first state;
Module 603 is adjusted, for adjusting the security level of the terminal according to the target data;
Wherein, when the first state is unlocked state, the target data includes the certification knot of default authentication information Fruit.
Optionally, referring to Fig. 7, when the first state is unlocked state, the adjustment module 603 includes:
First computational submodule 6031, it is N+1 described for being calculated according to the authentication result of the default authentication information Safety in default authentication period, wherein the default authentication information is the certification letter in N+1 default authentication periods Breath, the N are positive integer;
Second computational submodule 6032 presets safety in authentication period for obtaining n-th, and calculates described the Safety summation in N number of default authentication period and in the N+1 default authentication periods;
First determines submodule 6033, for determining that the terminal is default at N+2 according to the safety summation Security level in authentication period.
Optionally, first computational submodule 6031 is also used to calculate described default in N+1 default authentication periods The sum of corresponding score of the authentication result that authentication information authenticates each time, to obtain in the N+1 default authentication periods Safety;
Wherein, when the M times authentication result of the default authentication information is to authenticate successfully, the default authentication information The M times authentication result is scored at the first score value;When the L times authentication result of the default authentication information is authentification failure, The L times authentication result of the default authentication information is scored at the second score value, and the M and the L are positive integer.
Optionally, first score value is positive number, and second score value is negative.
Optionally, the default authentication information includes that user is accustomed to authentication information and/or user biological authentication information.
Optionally, it is corresponding less than the user biological authentication information to be accustomed to corresponding first score value of authentication information by the user The first score value;
The user is accustomed to corresponding second score value of authentication information and is greater than the user biological authentication information corresponding second Score value.
Optionally, referring to Fig. 8, described first determines that submodule 6033 includes:
First determination unit 60331, for determining institute when the safety summation is less than or equal to the first preset value Stating security level of the terminal in the N+2 default authentication periods is the first security level;
Second determination unit 60332 for being greater than first preset value when the safety summation, and is less than or waits When the second preset value, determine that security level of the terminal in the N+2 default authentication periods is second safety etc. Grade;
Third determination unit 60333, described in determining when the safety summation is greater than second preset value Security level of the terminal in the N+2 default authentication periods is third security level;
Wherein, in first security level, the terminal forbids accessing the data information of user, and operation is forbidden to pay Class application program;In second security level, the terminal forbids accessing the private data information in the data information of user, And forbid operation payment class application program;In the third security level, the terminal allows to access the data information of user, and Allow to run payment class application program.
Optionally, referring to Fig. 9, the adjustment module 603 further include:
Judging submodule 6034, for whether judging security level of the terminal in N+2 default authentication periods More than default security level;
Submodule 6035 is set, for being more than institute when security level of the terminal in N+2 default authentication periods When stating default security level, the first duration is set by the duration of N+3 default authentication periods, wherein first duration Less than the duration of the N+2 default authentication periods.
Optionally, referring to Figure 10, when the first state is screen lock state, the adjustment module 603 includes:
Second determines submodule 6036, for determining institute when screen locking duration is less than or equal to the first preset duration The security level for stating terminal is the 4th security level;
Third determines submodule 6037, for being greater than first preset duration when screen locking duration, and is less than or waits When the second preset duration, determine that the security level of the terminal is the 5th security level;
4th determines submodule 6038, described in determining when screen locking duration is greater than second preset duration The security level of terminal is the 6th security level;
Wherein, in the 4th security level, the background application of the terminal is forbidden to access the data information of user; In the 5th security level, closes the speech identifying function of the terminal and external equipment is forbidden to pass through the USB of the terminal The data information of interface access user;In the 6th security level, the current position of the terminal is obtained, and by the terminal Current position is sent to network side equipment.
Terminal provided in an embodiment of the present invention can be realized terminal in the embodiment of the method for Fig. 1, Fig. 2 and Fig. 5 realize it is each A process, to avoid repeating, which is not described herein again.The embodiment of the present invention equally improves the safety that terminal uses.
A kind of hardware structural diagram of Figure 11 terminal of each embodiment to realize the present invention.
The terminal 1100 includes but is not limited to: radio frequency unit 1101, network module 1102, audio output unit 1103, defeated Enter unit 1104, sensor 1105, display unit 1106, user input unit 1107, interface unit 1108, memory 1109, The components such as processor 1110 and power supply 1111.It will be understood by those skilled in the art that terminal structure shown in Figure 11 is not The restriction of structure paired terminal, terminal may include perhaps combining certain components or difference than illustrating more or fewer components Component layout.In embodiments of the present invention, terminal includes but is not limited to mobile phone, tablet computer, laptop, palm electricity Brain, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 1110 are used for:
Determine that first state locating for the terminal, the first state are unlocked state or screen lock state;
Obtain the corresponding target data of the first state;
The security level of the terminal is determined according to the target data;
Wherein, when the first state is unlocked state, the target data includes the certification knot of default authentication information Fruit.
Optionally, when the first state is unlocked state, the processor 1110 executes described according to the target The security level of terminal described in data point reuse, comprising:
The safety in N+1 default authentication periods is calculated according to the authentication result of the default authentication information, In, the default authentication information is the authentication information in N+1 default authentication periods, and the N is positive integer;
The safety in the default authentication period of n-th is obtained, and is calculated in the default authentication period of the n-th and described Safety summation in N+1 default authentication periods;
Security level of the terminal in N+2 default authentication periods is determined according to the safety summation.
Optionally, the processor 1110, which executes, described calculates described the according to the authentication result of the default authentication information Safety in N+1 default authentication periods, comprising:
It is corresponding to calculate the default authentication information authenticates each time in N+1 default authentication periods authentication result / and, to obtain the safety in the N+1 default authentication periods;
Wherein, when the M times authentication result of the default authentication information is to authenticate successfully, the default authentication information The M times authentication result is scored at the first score value;When the L times authentication result of the default authentication information is authentification failure, The L times authentication result of the default authentication information is scored at the second score value, and the M and the L are positive integer.
Optionally, first score value is positive number, and second score value is negative.
Optionally, the default authentication information includes that user is accustomed to authentication information and/or user biological authentication information.
Optionally, it is corresponding less than the user biological authentication information to be accustomed to corresponding first score value of authentication information by the user The first score value;
The user is accustomed to corresponding second score value of authentication information and is greater than the user biological authentication information corresponding second Score value.
Optionally, the processor 1110 executes described determines the terminal in N+2 according to the safety summation Security level in a default authentication period, comprising:
When the safety summation is less than or equal to the first preset value, determine that the terminal is pre- at the N+2 Security level in the setting authentication period is the first security level;
When the safety summation is greater than first preset value, and is less than or equal to the second preset value, institute is determined Stating security level of the terminal in the N+2 default authentication periods is the second security level;
When the safety summation is greater than second preset value, determine that the terminal is default at the N+2 Security level in authentication period is third security level;
Wherein, in first security level, the terminal forbids accessing the data information of user, and operation is forbidden to pay Class application program;In second security level, the terminal forbids accessing the private data information in the data information of user, And forbid operation payment class application program;In the third security level, the terminal allows to access the data information of user, and Allow to run payment class application program.
Optionally, the processor 1110 is also used to:
Judge whether security level of the terminal in N+2 default authentication periods is more than default security level;
It, will when security level of the terminal in N+2 default authentication periods is more than the default security level The duration of N+3 default authentication periods is set as the first duration, wherein first duration is less than the N+2 and presets The duration of authentication period.
Optionally, when the first state is screen lock state, the processor 1110 executes described according to the target Data determine the security level of the terminal, comprising:
When screen locking duration is less than or equal to the first preset duration, determine that the security level of the terminal is the 4th peace Congruent grade;
When screen locking duration is greater than first preset duration, and is less than or equal to the second preset duration, institute is determined The security level for stating terminal is the 5th security level;
When screen locking duration is greater than second preset duration, determine that the security level of the terminal is the 6th safety Grade;
Wherein, in the 4th security level, the background application of the terminal is forbidden to access the data information of user; In the 5th security level, closes the speech identifying function of the terminal and external equipment is forbidden to pass through the USB of the terminal The data information of interface access user;In the 6th security level, the current position of the terminal is obtained, and by the terminal Current position is sent to network side equipment.
Terminal provided in an embodiment of the present invention can be realized each process that terminal is realized in previous embodiment, to avoid weight Multiple, which is not described herein again.The safety that terminal uses equally can be improved in the present embodiment.
It should be understood that the embodiment of the present invention in, radio frequency unit 1101 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 1110 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 1101 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 1101 can also by wireless communication system and network and other Equipment communication.
Terminal provides wireless broadband internet by network module 1102 for user and accesses, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..
Audio output unit 1103 can be received by radio frequency unit 1101 or network module 1102 or in memory The audio data stored in 1109 is converted into audio signal and exports to be sound.Moreover, audio output unit 1103 can be with Audio output relevant to the specific function that terminal 1100 executes is provided (for example, call signal receives sound, message sink sound Etc.).Audio output unit 1103 includes loudspeaker, buzzer and receiver etc..
Input unit 1104 is for receiving audio or video signal.Input unit 1104 may include graphics processor (Graphics Processing Unit, GPU) 11041 and microphone 11042, graphics processor 11041 are captured in video The of the static images or video obtained in mode or the first image capture mode by the first image capture apparatus (such as camera) One image data is handled.Treated, and the first picture frame may be displayed on display unit 1106.Through graphics processor 11041 treated that the first picture frame can store in memory 1109 (or other storage mediums) or via radio frequency unit 1101 or network module 1102 sent.Microphone 11042 can receive sound, and can be by such acoustic processing Audio data.Treated, and audio data can be converted in the case where telephone calling model and can be sent out via radio frequency unit 1101 It is sent to the format output of mobile communication base station.
Terminal 1100 further includes at least one sensor 1105, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment light The light and shade of line adjusts the brightness of display panel 11061, and proximity sensor can close display when terminal 1100 is moved in one's ear Panel 11061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three in all directions Axis) acceleration size, can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 1105 It can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, temperature Meter, infrared sensor etc. are spent, details are not described herein.
Display unit 1106 is for showing information input by user or being supplied to the information of user.Display unit 1106 can Including display panel 11061, liquid crystal display (Liquid Crystal Display, LCD), organic light-emitting diodes can be used Forms such as (Organic Light-Emitting Diode, OLED) are managed to configure display panel 11061.
User input unit 1107 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 1107 include touch panel 11071 and its His input equipment 11072.Touch panel 11071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 11071 or in touch panel Operation near 11071).Touch panel 11071 may include both touch detecting apparatus and touch controller.Wherein, it touches The touch orientation of detection device detection user is touched, and detects touch operation bring signal, transmits a signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 1110, It receives the order that processor 1110 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface The multiple types such as sound wave realize touch panel 11071.In addition to touch panel 11071, user input unit 1107 can also include Other input equipments 11072.Specifically, other input equipments 11072 can include but is not limited to physical keyboard, function key (ratio Such as volume control button, switch key), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 11071 can be covered on display panel 11061, when touch panel 11071 detects After touch operation on or near it, processor 1110 is sent to determine the type of touch event, is followed by subsequent processing device 1110 Corresponding visual output is provided on display panel 11061 according to the type of touch event.Although in Figure 11, touch panel 11071 and display panel 11061 are the functions that outputs and inputs of realizing terminal as two independent components, but certain In embodiment, touch panel 11071 and display panel 11061 can be integrated and be realized the function that outputs and inputs of terminal, tool Body is herein without limitation.
Interface unit 1108 is the interface that external device (ED) is connect with terminal 1100.For example, external device (ED) may include wired Or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 1108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal 1100 or can be used in terminal 1100 and external dress Data are transmitted between setting.
Memory 1109 can be used for storing software program and various data.Memory 1109 can mainly include storage program Area and storage data area, wherein storing program area can application program needed for storage program area, at least one function (such as Sound-playing function, first image player function etc.) etc.;Storage data area, which can be stored, uses created data according to mobile phone (such as audio data, phone directory etc.) etc..In addition, memory 1109 may include high-speed random access memory, can also wrap Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 1110 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, By running or execute the software program and/or module that are stored in memory 1109, and calls and be stored in memory 1109 Interior data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 1110 may include One or more processing units;Preferably, processor 1110 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 1110.
Terminal 1100 can also include the power supply 1111 (such as battery) powered to all parts, it is preferred that power supply 1111 Can be logically contiguous by power-supply management system and processor 1110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal 1100 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 1110, and memory 1109 is stored in On reservoir 1109 and the computer program that can run on the processor 1110, the computer program are executed by processor 1110 A kind of above-mentioned each process of security level method of adjustment embodiment of Shi Shixian, and identical technical effect can be reached, to avoid It repeats, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize a kind of each mistake of above-mentioned security level method of adjustment embodiment when being executed by processor Journey, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer-readable storage medium Matter, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (12)

1. a kind of security level method of adjustment is applied to terminal, which is characterized in that the described method includes:
Determine that first state locating for the terminal, the first state are unlocked state or screen lock state;
Obtain the corresponding target data of the first state;
The security level of the terminal is adjusted according to the target data;
Wherein, when the first state is unlocked state, the target data includes the authentication result of default authentication information.
2. the method as described in claim 1, which is characterized in that described according to institute when the first state is unlocked state State the security level that target data adjusts the terminal, comprising:
The safety in N+1 default authentication periods is calculated according to the authentication result of the default authentication information, wherein institute Stating default authentication information is the authentication information in N+1 default authentication periods, and the N is positive integer;
Obtain n-th preset authentication period in safety, and calculate the n-th preset authentication period in and the N+ Safety summation in 1 default authentication period;
Security level of the terminal in N+2 default authentication periods is determined according to the safety summation.
3. method according to claim 2, which is characterized in that described to be calculated according to the authentication result of the default authentication information Safety in the N+1 default authentication periods, comprising:
Calculate that the default authentication information authenticates each time in N+1 default authentication periods authentication result is corresponding must to divide it With obtain the safety in the N+1 default authentication period;
Wherein, when the M times authentication result of the default authentication information is to authenticate successfully, the M of the default authentication information Secondary authentication result is scored at the first score value;It is described when the L times authentication result of the default authentication information is authentification failure The L times authentication result of default authentication information is scored at the second score value, and the M and the L are positive integer.
4. method according to claim 2, which is characterized in that described to determine that the terminal exists according to the safety summation Security level in N+2 default authentication periods, comprising:
When the safety summation is less than or equal to the first preset value, determines that the terminal is preset at the N+2 and recognize Demonstrate,proving the security level in the period is the first security level;
When the safety summation is greater than first preset value, and is less than or equal to the second preset value, the end is determined Holding the security level in the N+2 default authentication periods is the second security level;
When the safety summation is greater than second preset value, determine the terminal in the N+2 pre- setting authentications Security level in period is third security level.
5. method according to claim 2, which is characterized in that described to determine that the terminal exists according to the safety summation After security level in N+2 default authentication periods, the method also includes:
Judge whether security level of the terminal in N+2 default authentication periods is more than default security level;
When security level of the terminal in N+2 default authentication periods is more than the default security level, by N+3 The duration of a default authentication period is set as the first duration, wherein first duration is less than the N+2 pre- setting authentication weeks The duration of phase.
6. the method as described in claim 1, which is characterized in that when the first state is screen lock state, the number of targets According to including screen locking duration, the security level that the terminal is adjusted according to the target data, comprising:
When screen locking duration is less than or equal to the first preset duration, determine that the security level of the terminal is the 4th safety etc. Grade;
When screen locking duration is greater than first preset duration, and is less than or equal to the second preset duration, the end is determined The security level at end is the 5th security level;
When screen locking duration is greater than second preset duration, determine that the security level of the terminal is the 6th safety etc. Grade.
7. a kind of terminal characterized by comprising
Determining module, for determining that first state locating for the terminal, the first state are unlocked state or screen lock state;
Module is obtained, for obtaining the corresponding target data of the first state;
Module is adjusted, for adjusting the security level of the terminal according to the target data;
Wherein, when the first state is unlocked state, the target data includes the authentication result of default authentication information.
8. terminal as claimed in claim 7, which is characterized in that when the first state is unlocked state, the adjustment mould Block includes:
First computational submodule, for calculating N+1 default authentication periods according to the authentication result of the default authentication information Interior safety, wherein the default authentication information is the authentication information in N+1 default authentication periods, and the N is positive Integer;
Second computational submodule, for obtaining the safety in the default authentication period of n-th, and it is default to calculate the n-th Safety summation in authentication period and in the N+1 default authentication periods;
First determines submodule, for determining the terminal in N+2 default authentication periods according to the safety summation Interior security level.
9. terminal as claimed in claim 8, which is characterized in that first computational submodule is also used to calculate N+1 in advance The sum of the corresponding score of authentication result that the default authentication information authenticates each time in the setting authentication period, obtains the N+1 Safety in a default authentication period;
Wherein, when the M times authentication result of the default authentication information is to authenticate successfully, the M of the default authentication information Secondary authentication result is scored at the first score value;It is described when the L times authentication result of the default authentication information is authentification failure The L times authentication result of default authentication information is scored at the second score value, and the M and the L are positive integer.
10. terminal as claimed in claim 8, which is characterized in that described first determines that submodule includes:
First determination unit, for determining that the terminal exists when the safety summation is less than or equal to the first preset value Security level in the N+2 default authentication periods is the first security level;
Second determination unit, for being greater than first preset value when the safety summation, and it is pre- to be less than or equal to second If when value, determining that security level of the terminal in the N+2 default authentication periods is the second security level;
Third determination unit, for determining the terminal in institute when the safety summation is greater than second preset value Stating the security level in N+2 default authentication periods is third security level.
11. terminal as claimed in claim 8, which is characterized in that the adjustment module further include:
Judging submodule, for judging whether security level of the terminal in N+2 default authentication periods is more than default Security level;
Submodule is set, for being more than the default peace when security level of the terminal in N+2 default authentication periods When congruent grade, the first duration is set by the duration of N+3 default authentication periods, wherein first duration is less than described The duration of N+2 default authentication periods.
12. terminal as claimed in claim 7, which is characterized in that when the first state is screen lock state, the number of targets According to including screen locking duration, the adjustment module includes:
Second determines submodule, for determining the terminal when screen locking duration is less than or equal to the first preset duration Security level is the 4th security level;
Third determines submodule, and for being greater than first preset duration when screen locking duration, and it is pre- to be less than or equal to second If when duration, determining that the security level of the terminal is the 5th security level;
4th determines submodule, for determining the peace of the terminal when screen locking duration is greater than second preset duration Congruent grade is the 6th security level.
CN201910328316.6A 2019-04-23 2019-04-23 Security level adjustment method and terminal Active CN110336911B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910328316.6A CN110336911B (en) 2019-04-23 2019-04-23 Security level adjustment method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910328316.6A CN110336911B (en) 2019-04-23 2019-04-23 Security level adjustment method and terminal

Publications (2)

Publication Number Publication Date
CN110336911A true CN110336911A (en) 2019-10-15
CN110336911B CN110336911B (en) 2022-01-21

Family

ID=68140123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910328316.6A Active CN110336911B (en) 2019-04-23 2019-04-23 Security level adjustment method and terminal

Country Status (1)

Country Link
CN (1) CN110336911B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111976647A (en) * 2020-08-04 2020-11-24 东风越野车有限公司 Military off-road vehicle anti-theft control method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237119A (en) * 2013-03-26 2013-08-07 东莞宇龙通信科技有限公司 Mobile terminal alarm method and device
CN103885827A (en) * 2014-03-28 2014-06-25 深圳市中兴移动通信有限公司 Method switching running modes automatically and intelligent terminal
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
EP2811725A1 (en) * 2013-06-07 2014-12-10 BlackBerry Limited Mobile wireless communications device performing device unlock based upon near field communication (nfc) and related methods
CN104811932A (en) * 2014-01-23 2015-07-29 统一有限责任两合公司 Method for handling security configurations in a mobile terminal or for controlling access
WO2015184467A1 (en) * 2014-05-30 2015-12-03 Reylabs Inc. Systems and methods involving mobile linear asset efficiency exploration, monitoring and/or display aspects
CN105678171A (en) * 2014-11-17 2016-06-15 中兴通讯股份有限公司 Data processing method, device and mobile terminal
CN107613129A (en) * 2017-09-28 2018-01-19 广东欧珀移动通信有限公司 Unlocking method and related product
CN109325334A (en) * 2018-09-26 2019-02-12 维沃移动通信有限公司 A kind of touch control terminal control method and touch control terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237119A (en) * 2013-03-26 2013-08-07 东莞宇龙通信科技有限公司 Mobile terminal alarm method and device
EP2811725A1 (en) * 2013-06-07 2014-12-10 BlackBerry Limited Mobile wireless communications device performing device unlock based upon near field communication (nfc) and related methods
CN104811932A (en) * 2014-01-23 2015-07-29 统一有限责任两合公司 Method for handling security configurations in a mobile terminal or for controlling access
CN103885827A (en) * 2014-03-28 2014-06-25 深圳市中兴移动通信有限公司 Method switching running modes automatically and intelligent terminal
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
WO2015184467A1 (en) * 2014-05-30 2015-12-03 Reylabs Inc. Systems and methods involving mobile linear asset efficiency exploration, monitoring and/or display aspects
CN105678171A (en) * 2014-11-17 2016-06-15 中兴通讯股份有限公司 Data processing method, device and mobile terminal
CN107613129A (en) * 2017-09-28 2018-01-19 广东欧珀移动通信有限公司 Unlocking method and related product
CN109325334A (en) * 2018-09-26 2019-02-12 维沃移动通信有限公司 A kind of touch control terminal control method and touch control terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111976647A (en) * 2020-08-04 2020-11-24 东风越野车有限公司 Military off-road vehicle anti-theft control method and system

Also Published As

Publication number Publication date
CN110336911B (en) 2022-01-21

Similar Documents

Publication Publication Date Title
CN108491123A (en) A kind of adjusting application program image target method and mobile terminal
CN107609363B (en) Unlocking method and mobile terminal
CN108549802A (en) A kind of unlocking method, device and mobile terminal based on recognition of face
CN108650408B (en) Screen unlocking method and mobile terminal
CN108010170A (en) A kind of control method and device of face recognition unlocking function
CN107679514A (en) A kind of face identification method and electronic equipment
CN108171832A (en) A kind of method for unlocking and mobile terminal of shared bicycle
CN109284150A (en) A kind of method and terminal starting application program
CN108958582A (en) A kind of application program launching method and terminal
CN108961489A (en) A kind of equipment wearing control method, terminal and computer readable storage medium
CN109544172A (en) A kind of display methods and terminal device
CN109325334A (en) A kind of touch control terminal control method and touch control terminal
CN109886686A (en) A kind of safe payment method, equipment and computer readable storage medium
CN109409044A (en) A kind of verifying interface display method and terminal
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN108156537A (en) The remote operation method and mobile terminal of a kind of mobile terminal
CN108038360A (en) The switching method and mobile terminal of a kind of operational mode
CN109756621A (en) A kind of two-dimensional code display method and terminal device
CN109800606A (en) A kind of display control method and mobile terminal
CN109218984A (en) A kind of method for tracing and mobile terminal
CN110519443A (en) A kind of bright screen method and mobile terminal
CN109063462A (en) A kind of right management method and terminal device
CN108388790A (en) A kind of unlocking request response method, mobile terminal
CN110336911A (en) A kind of security level method of adjustment and terminal
CN107895108B (en) Operation management method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant