CN110831113A - Starting method of mobile terminal and mobile terminal - Google Patents

Starting method of mobile terminal and mobile terminal Download PDF

Info

Publication number
CN110831113A
CN110831113A CN201911108910.0A CN201911108910A CN110831113A CN 110831113 A CN110831113 A CN 110831113A CN 201911108910 A CN201911108910 A CN 201911108910A CN 110831113 A CN110831113 A CN 110831113A
Authority
CN
China
Prior art keywords
local area
area network
wireless local
network
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911108910.0A
Other languages
Chinese (zh)
Inventor
赵友军
王鑫
王蓓蓓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201911108910.0A priority Critical patent/CN110831113A/en
Publication of CN110831113A publication Critical patent/CN110831113A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention provides a starting method of a mobile terminal and the mobile terminal, belongs to the technical field of mobile terminal safety, and can overcome the defect that the existing mobile terminal is complicated in starting operation. The starting method of the mobile terminal comprises the following steps: detecting whether the terminal is connected with a wireless local area network or not; when the terminal is connected with the wireless local area network, judging whether the currently connected wireless local area network is matched with the first wireless network list; and when the currently connected wireless local area network is judged not to be matched with the first wireless network list, the terminal is enabled to display a password input interface.

Description

Starting method of mobile terminal and mobile terminal
Technical Field
The invention relates to the technical field of mobile terminal safety, in particular to a starting method of a mobile terminal and the mobile terminal.
Background
Currently, many mobile terminals (e.g., mobile phones and tablet computers) display a password input interface on a screen when the mobile terminals are powered on, where the password input interface is used to obtain authentication information such as a preset pattern, a preset number, or a combination of the two of the preset pattern and the preset number of the user. And only after the user inputs correct verification information, the next operation can be carried out on the mobile phone, otherwise, the screen of the mobile terminal stays in the password input interface all the time.
The starting-up mode of the mobile terminal can protect personal sensitive information of a user on the mobile terminal to a certain extent. However, for a user who normally opens or closes the mobile terminal, the operation of the mobile terminal in the power-on mode is cumbersome, and user experience is affected.
Disclosure of Invention
The invention at least partially solves the defect of complex starting operation of the existing mobile terminal, and provides the starting method of the mobile terminal and the mobile terminal, which simplify the starting operation of the mobile terminal on the premise of ensuring the data security of the mobile terminal.
The technical scheme adopted for solving the technical problem of the invention is a starting method of a mobile terminal, which comprises the following steps:
detecting whether a wireless local area network is connected;
when the connection of the wireless local area network is detected, judging whether the currently connected wireless local area network is matched with a preset first wireless network list;
and when the currently connected wireless local area network is judged not to be matched with the first wireless network list, displaying a password input interface for unlocking a terminal screen.
Optionally, the method further comprises:
when the wireless local area network is connected, acquiring the use information of the wireless local area network;
determining whether the wireless local area network is a trusted network based on the usage information,
and if the network is a trusted network, storing the information of the wireless local area network to the first wireless network list.
Optionally, the usage information includes first usage information, and the first usage information includes one or a combination of a duration, a frequency, and a data traffic for accessing the wireless local area network;
the wireless local area network is a trusted network when at least one of said first usage information is greater than or equal to a respective threshold.
Optionally, the usage information of the wireless local area network includes second usage information, and the second usage information includes: usage information of the predetermined application of the terminal on the wireless local area network;
when the usage information of the wireless local area network by the application includes predetermined information, the wireless local area network is a trusted network.
Optionally, the method further comprises: storing the information of the preset wireless local area network into a second wireless network list;
and when the currently connected wireless local area network is judged to be matched with the second wireless network list, displaying a password input interface for unlocking the terminal screen.
Optionally, the first wireless network list includes a plurality of pieces of historical wireless local area network information;
the determining whether the currently connected wlan matches the first wlan list includes: judging whether the plurality of pieces of historical wireless local area network information contain the information of the currently connected wireless local area network;
if the plurality of pieces of historical wireless local area network information contain the information of the currently connected wireless local area network, judging that the currently connected wireless local area network is matched with the first wireless network list;
and if the plurality of pieces of historical wireless local area network information do not contain the information of the currently connected wireless local area network, judging that the currently connected wireless local area network is not matched with the first wireless network list.
The technical scheme adopted for solving the technical problem of the invention is a mobile terminal, which comprises:
the detection module is used for detecting whether the wireless local area network is connected or not;
the matching module is used for judging whether the currently connected wireless local area network is matched with the first wireless network list or not when the connection of the wireless local area network is detected;
and the display module is used for displaying a password input interface for unlocking the terminal screen when the currently connected wireless local area network is judged not to be matched with the first wireless network list.
Optionally, the method further comprises:
the acquisition module is used for acquiring the use information of the wireless local area network when the wireless local area network is connected;
and the judging module is used for determining whether the wireless local area network is a trusted network or not according to the use information, and storing the information of the wireless local area network into a first wireless network list if the wireless local area network is the trusted network.
Optionally, the determining module includes a first determining unit, where the first determining unit is configured to determine that the wireless local area network is a trusted network when at least one of the first usage information is greater than or equal to a corresponding threshold;
wherein the first usage information includes one or a combination of a duration, a frequency, and a data traffic of the mobile terminal accessing the wireless local area network.
Optionally, the determining module includes a second determining unit, where the second determining unit is configured to determine whether the usage information of the predetermined application of the terminal on the wireless local area network includes predetermined information, where the wireless local area network is a trusted network, and if the usage information includes the predetermined information, determine that the wireless local area network is a trusted network.
According to the mobile terminal and the starting method thereof, when the mobile terminal is connected with a Wireless Local Area Network (WLAN), whether the currently connected WLAN is a trusted WLAN is judged, and if the currently connected WLAN is judged to be a trusted preset WLAN, the step of displaying the password input interface on the mobile terminal is skipped, so that the starting operation of the mobile terminal is simplified on the premise that privacy safety information is stolen when a user is connected with an untrusted LAN, and the user experience is improved.
Drawings
Fig. 1 is a flowchart of a boot method of a mobile terminal according to an embodiment of the present invention;
FIG. 2 is a partial block diagram of a mobile terminal according to one embodiment of the present invention;
wherein the reference numbers indicate: 1. a detection module; 2. a matching module; 3. a display module; 4. an acquisition module; 5. a judgment module; 51. a first judgment unit; 52. a second judgment unit.
Detailed Description
In order to make the technical solutions of the present invention better understood by those skilled in the art, the present invention will be described in further detail below with reference to the accompanying drawings and specific embodiments.
Example 1:
the embodiment provides a starting method of a mobile terminal, which comprises the following steps:
and step 11, detecting whether the wireless local area network is connected.
And step 12, when the connection of the wireless local area network is detected, judging whether the currently connected wireless local area network is matched with a preset first wireless network list.
In this step, the first wireless network list includes a plurality of pieces of historical wireless local area network information.
Judging whether the currently connected wireless local area network is matched with the first wireless network list or not, wherein the judging step comprises the following steps: and judging whether the plurality of pieces of historical wireless local area network information contain the information of the currently connected wireless local area network.
And if the plurality of pieces of historical wireless local area network information contain the information of the currently connected wireless local area network, judging that the currently connected wireless local area network is matched with the first wireless network list.
And if the plurality of pieces of historical wireless local area network information do not contain the information of the currently connected wireless local area network, judging that the currently connected wireless local area network is not matched with the first wireless network list.
And step 13, when the currently connected wireless local area network is judged not to be matched with the first wireless network list, displaying a password input interface for unlocking the terminal screen.
In this embodiment, the accessed WLAN network is untrusted, and a power-on password unlocking interface is displayed; otherwise, the accessed WLAN network can be trusted, and the unlocking interface of the starting-up password is not displayed. Therefore, when the user is prevented from connecting to an untrusted local area network, on the premise that the privacy safety information is stolen, the starting operation of the mobile terminal is simplified, and the user experience is improved.
Optionally, the method further comprises:
step 10a, when the wireless local area network is connected, obtaining the use information of the wireless local area network.
In this step, the usage information includes first usage information, where the first usage information includes one or a combination of duration, frequency, and data traffic of accessing the wireless local area network;
the wireless local area network is a trusted network when the at least one first usage information is greater than or equal to a respective threshold.
For example, according to the acquired information of the accessed WLAN network, such as name, signal strength, etc., in combination with the connection usage information of the accessed WLAN network collected and stored at ordinary times, it is determined whether the accessed WLAN network is trusted. The connection use time length, frequency, data flow and the like of the accessed WLAN network can be compared with preset thresholds (the relevant thresholds used when judging whether the accessed WLAN network is reliable can be preset by a manufacturer or an operation interface is provided for a user to define when the terminal leaves a factory), and if the connection use time length, frequency and data flow of the accessed WLAN network are equal to or greater than the preset thresholds, the accessed WLAN network can be judged to be reliable; the connection service time, frequency, data flow and the like of each WLAN collected and stored in the local database can be counted and sorted according to the size, and if the name of the accessed WLAN is larger than a preset name threshold, the accessed WLAN can be judged to be trustable.
And step 10b, determining whether the wireless local area network is a trusted network or not according to the use information, and storing the information of the wireless local area network to a first wireless network list if the wireless local area network is the trusted network.
Optionally, the usage information of the wireless local area network includes second usage information, and the second usage information includes: usage information of the wireless local area network by a predetermined application of the terminal.
When the usage information of the application for the wireless local area network includes predetermined information, the wireless local area network is a trusted network.
For example, whether the accessed WLAN network is trusted can be determined according to the behavior of the end user after accessing the WLAN, and the accessed WLAN network can be determined to be trusted by transacting business such as banking, shopping and the like for a plurality of times or frequently using important APPs. Multiple times or frequently, the importance can be screened through a preset time threshold or a frequency threshold, and the importance can be screened through APP classification, such as finance, network and the like. Similarly, when determining whether the accessed WLAN network is trusted according to the line of the terminal user after accessing the WLAN network, the mobile terminal should pay attention to collect and store the APP usage conditions of the terminal user after accessing the WLAN network, such as APP name, login/logout time, whether login is successful, transacted services, and the like.
Optionally, step 10c further includes: and storing the information of the predetermined wireless local area network into the second wireless network list.
And when the currently connected wireless local area network is judged to be matched with the second wireless network list, the terminal is enabled to display a password input interface.
In this step, the information of the predetermined wireless local area network may be a WLAN network deployed by a unified operator. For example, "CMCC" for china mobile, "china net" for china telecom, "china unicom" for china unicom, etc., such wireless networks exist in a large spatial range and have poor credibility. And if the WLAN network accessed by the mobile terminal is the WLAN network deployed by the operator, the terminal displays a password input interface.
Example 2:
the mobile terminal of the embodiment comprises:
the mobile terminal comprises a detection module 1, a processing module and a processing module, wherein the detection module is used for detecting whether the mobile terminal is connected with a wireless local area network or not;
the matching module 2 is used for judging whether the currently connected wireless local area network is matched with the first wireless network list when the mobile terminal is detected to be connected with the wireless local area network;
and the display module 3 is used for displaying a password input interface for unlocking the terminal screen when the currently connected wireless local area network is judged not to be matched with the first wireless network list.
Optionally, the method further comprises:
the acquisition module 4 is used for acquiring the use information of the terminal to the wireless local area network when the terminal is connected to the wireless local area network;
and the judging module 5 determines whether the wireless local area network is a trusted network or not according to the use information, and stores the information of the wireless local area network into the first wireless network list if the wireless local area network is the trusted network.
Optionally, the determining module includes a first determining unit 51, where the first determining unit 51 is configured to determine that the wireless local area network is a trusted network when at least one piece of first usage information is greater than or equal to a corresponding threshold;
the first usage information includes one or a combination of a duration, a frequency and a data traffic of the mobile terminal accessing the wireless local area network.
Optionally, the determining module includes a second determining unit 52, where the second determining unit 52 is configured to determine whether the usage information of the predetermined application of the terminal on the wireless local area network includes predetermined information, where the wireless local area network is a trusted network, and if the usage information includes the predetermined information, determine that the wireless local area network is a trusted network.
The mobile terminal of the scheme can execute the method, so that the starting operation is simplified and the user experience is improved on the premise of avoiding the condition that the privacy safety information is stolen.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
While embodiments in accordance with the invention have been described above, these embodiments are not intended to be exhaustive or to limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. The invention is limited only by the claims and their full scope and equivalents.

Claims (10)

1. A starting method of a mobile terminal is characterized by comprising the following steps:
detecting whether a wireless local area network is connected;
when the connection of the wireless local area network is detected, judging whether the currently connected wireless local area network is matched with a preset first wireless network list;
and when the currently connected wireless local area network is judged not to be matched with the first wireless network list, displaying a password input interface for unlocking a terminal screen.
2. The power-on method of the mobile terminal according to claim 1, further comprising:
when the wireless local area network is connected, acquiring the use information of the wireless local area network;
determining whether the wireless local area network is a trusted network based on the usage information,
and if the network is a trusted network, storing the information of the wireless local area network to the first wireless network list.
3. The power-on method of the mobile terminal according to claim 2, wherein the usage information includes first usage information, the first usage information includes one or a combination of duration, frequency, and data traffic of accessing the wireless local area network;
the wireless local area network is a trusted network when at least one of said first usage information is greater than or equal to a respective threshold.
4. The method according to claim 2, wherein the usage information of the wireless lan includes second usage information, and the second usage information includes: usage information of the predetermined application of the terminal on the wireless local area network;
when the usage information of the wireless local area network by the application includes predetermined information, the wireless local area network is a trusted network.
5. The power-on method of the mobile terminal according to claim 1, further comprising: storing the information of the preset wireless local area network into a second wireless network list;
and when the currently connected wireless local area network is judged to be matched with the second wireless network list, displaying a password input interface for unlocking the terminal screen.
6. The method according to claim 1, wherein the first wireless network list includes a plurality of pieces of historical wlan information;
the determining whether the currently connected wlan matches the first wlan list includes: judging whether the plurality of pieces of historical wireless local area network information contain the information of the currently connected wireless local area network;
if the plurality of pieces of historical wireless local area network information contain the information of the currently connected wireless local area network, judging that the currently connected wireless local area network is matched with the first wireless network list;
and if the plurality of pieces of historical wireless local area network information do not contain the information of the currently connected wireless local area network, judging that the currently connected wireless local area network is not matched with the first wireless network list.
7. A mobile terminal, comprising:
the detection module is used for detecting whether the wireless local area network is connected or not;
the matching module is used for judging whether the currently connected wireless local area network is matched with the first wireless network list or not when the connection of the wireless local area network is detected;
and the display module is used for displaying a password input interface for unlocking the terminal screen when the currently connected wireless local area network is judged not to be matched with the first wireless network list.
8. The mobile terminal of claim 7, further comprising:
the acquisition module is used for acquiring the use information of the wireless local area network when the wireless local area network is connected;
and the judging module is used for determining whether the wireless local area network is a trusted network or not according to the use information, and storing the information of the wireless local area network into a first wireless network list if the wireless local area network is the trusted network.
9. The mobile terminal of claim 8, wherein the determining module comprises a first determining unit, and the first determining unit is configured to determine that the wlan is a trusted network when at least one of the first usage information is greater than or equal to a corresponding threshold;
wherein the first usage information includes one or a combination of a duration, a frequency, and a data traffic of the mobile terminal accessing the wireless local area network.
10. The mobile terminal according to claim 8, wherein the determining module includes a second determining unit, and the second determining unit is configured to determine whether the usage information of the predetermined application of the terminal on the wlan includes predetermined information, the wlan is a trusted network, and if so, the wlan is a trusted network.
CN201911108910.0A 2019-11-13 2019-11-13 Starting method of mobile terminal and mobile terminal Pending CN110831113A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911108910.0A CN110831113A (en) 2019-11-13 2019-11-13 Starting method of mobile terminal and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911108910.0A CN110831113A (en) 2019-11-13 2019-11-13 Starting method of mobile terminal and mobile terminal

Publications (1)

Publication Number Publication Date
CN110831113A true CN110831113A (en) 2020-02-21

Family

ID=69554705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911108910.0A Pending CN110831113A (en) 2019-11-13 2019-11-13 Starting method of mobile terminal and mobile terminal

Country Status (1)

Country Link
CN (1) CN110831113A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103997768A (en) * 2014-05-16 2014-08-20 深圳市欧珀通信软件有限公司 Method and device for preventing access to invalid Wi-Fi hot spots
CN105045506A (en) * 2015-07-28 2015-11-11 惠州Tcl移动通信有限公司 Operational processing method and system for mobile terminal and mobile terminal
CN106658489A (en) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 Terminal application processing method, device and mobile terminal
CN106648396A (en) * 2015-08-21 2017-05-10 珠海金山办公软件有限公司 Unlocking method and apparatus for mobile terminal
CN107885988A (en) * 2017-09-26 2018-04-06 努比亚技术有限公司 A kind of unlocking screen method, terminal and computer-readable recording medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103997768A (en) * 2014-05-16 2014-08-20 深圳市欧珀通信软件有限公司 Method and device for preventing access to invalid Wi-Fi hot spots
CN105045506A (en) * 2015-07-28 2015-11-11 惠州Tcl移动通信有限公司 Operational processing method and system for mobile terminal and mobile terminal
CN106648396A (en) * 2015-08-21 2017-05-10 珠海金山办公软件有限公司 Unlocking method and apparatus for mobile terminal
CN106658489A (en) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 Terminal application processing method, device and mobile terminal
CN107885988A (en) * 2017-09-26 2018-04-06 努比亚技术有限公司 A kind of unlocking screen method, terminal and computer-readable recording medium

Similar Documents

Publication Publication Date Title
US10152715B2 (en) Detection of an unauthorized wireless communication device
US20210076212A1 (en) Recognizing users with mobile application access patterns learned from dynamic data
CN108377241B (en) Monitoring method, device and equipment based on access frequency and computer storage medium
KR102069863B1 (en) Apparatas and method for controlling a input means of payment function in an electronic device
US8863261B2 (en) User authentication apparatus, method thereof and computer readable recording medium
US20170053107A1 (en) Behavioral Stochastic Authentication (BSA)
CN107230066B (en) Payment method and device, computer device and readable storage medium
US8768306B1 (en) Method for adaptive mobile identity
US20140067682A1 (en) Nfc-based information exchange method and device
CN104640174B (en) Wireless network access point reminding method and device
CN105281906A (en) Safety authentication method and device
CN104899490A (en) Terminal positioning method and user terminal
CN105306610B (en) Network identity detection method and device
CN106464502B (en) Method and system for authentication of a communication device
CN106027520A (en) Method and device for detecting and processing stealing of website accounts
US20210407013A1 (en) System and method for extensible device assessment and dynamic policy configuration
EP3449374A1 (en) Systems and methods for detection of mobile device fault conditions
US20110250867A1 (en) Method and apparatus for restricting network access in a mobile communication terminal
CN105812536A (en) Incoming call management method and mobile terminal
CN104853030B (en) The method and mobile terminal of a kind of information processing
CN105488678A (en) Payment behavior information acquisition method and system
US8478340B1 (en) Device for and method of detecting SIM card removal and reinsertion
CN106529232A (en) Startup method and device
CN104348655A (en) Method and device for determining degree of safety and health of system
CN110546638A (en) Improvements in biometric authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200221

RJ01 Rejection of invention patent application after publication