WO2017000347A1 - 一种移动终端的保护方法及装置 - Google Patents

一种移动终端的保护方法及装置 Download PDF

Info

Publication number
WO2017000347A1
WO2017000347A1 PCT/CN2015/085825 CN2015085825W WO2017000347A1 WO 2017000347 A1 WO2017000347 A1 WO 2017000347A1 CN 2015085825 W CN2015085825 W CN 2015085825W WO 2017000347 A1 WO2017000347 A1 WO 2017000347A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
feature data
fingerprint feature
user
mobile terminal
Prior art date
Application number
PCT/CN2015/085825
Other languages
English (en)
French (fr)
Inventor
许行
许奕波
张碧君
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017000347A1 publication Critical patent/WO2017000347A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • the present invention relates to the field of mobile communications, and in particular, to a method and an apparatus for protecting a mobile terminal.
  • the current mobile terminal mainly achieves the purpose of anti-theft protection and retrieval through remote control methods.
  • the Apple mobile phone can obtain the geographical location information of Apple's terminal device through the "find iPhone” application, and remotely control the terminal device of Apple to ring the ringtone. Remotely format the memory data, etc., the mobile terminal installed with the "Tencent Mobile Manager” application has the "Mobile Anti-theft" option, once the mobile terminal is lost or stolen, as long as the mobile terminal has a SIM (Subscriber Identity Module, The user identification module) card will send the replaced number to the emergency contact set by the user by SMS, and will also send an email to the default mailbox to remind the user that the mobile phone may be stolen. You can log in to the application's official website to remotely. Control the mobile terminal.
  • SIM Subscriber Identity Module
  • the embodiment of the invention provides a method and a device for protecting a mobile terminal.
  • an early warning signal is sent on the second terminal, thereby improving the security of the mobile terminal.
  • An aspect of the present invention provides a method for protecting a mobile terminal, including:
  • the mobile terminal acquires at least one fingerprint feature data by using a fingerprint recognition sensor
  • the mobile terminal sends a control command to the second terminal, so that the second terminal sends an early warning signal.
  • Another aspect of the present invention provides a protection device for a mobile terminal, including:
  • An acquiring module configured to acquire at least one fingerprint feature data by using a fingerprint recognition sensor on the mobile terminal
  • a detecting module configured to detect the fingerprint feature data according to a predefined fingerprint database, and determine whether the fingerprint feature data includes fingerprint feature data of an illegal user
  • the warning module is configured to: if the fingerprint feature data includes fingerprint feature data of the illegal user, send a control command from the mobile terminal to the second terminal, so that the second terminal sends an early warning signal.
  • the mobile terminal obtains at least one fingerprint feature data through the fingerprint identification sensor, and detects the fingerprint feature data according to the predefined fingerprint database, and determines whether the fingerprint feature data includes fingerprint feature data of the illegal user, if the fingerprint The feature data includes fingerprint feature data of the illegal user, the mobile terminal sends a control command to the second terminal, and generates an early warning signal on the second terminal to remind the user to strengthen the protection of the mobile terminal.
  • an early warning signal is sent on the second terminal, which improves the security of the mobile terminal.
  • FIG. 1 is a flowchart of a method for protecting a mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of an operation of an ultrasonic fingerprint recognition sensor according to an embodiment of the present invention
  • FIG. 3 is a flowchart of another method for protecting a mobile terminal according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of still another method for protecting a mobile terminal according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of still another method for protecting a mobile terminal according to an embodiment of the present invention.
  • FIG. 6 is a flowchart of still another method for protecting a mobile terminal according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a protection apparatus for a mobile terminal according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of an embodiment of an obtaining module according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of an embodiment of an image acquiring unit according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of an embodiment of a detection module according to an embodiment of the present invention.
  • the mobile terminal may be any one of a smart phone, a tablet computer, a PC (Personal Computer), an e-reader, and the like
  • the second terminal may be a smart phone, a tablet computer, smart glasses, or the like. Any one of a smart bracelet, a smart watch, and the like, preferably, the wearable smart device is used as the second terminal.
  • FIG. 1 is a flowchart of a method for protecting a mobile terminal according to an embodiment of the present invention.
  • the method may include steps S101-S103.
  • the mobile terminal acquires at least one fingerprint feature data by using a fingerprint recognition sensor.
  • the mobile terminal has a fingerprint recognition function, and the mobile terminal acquires fingerprint feature data through a built-in fingerprint recognition sensor.
  • the fingerprint recognition sensor may exist independently of the mobile terminal, and the mobile terminal and the fingerprint recognition sensor are connected by a wireless network, and the mobile terminal receives the fingerprint feature data collected and transmitted by the fingerprint recognition sensor.
  • the mobile terminal has one or more ultrasonic fingerprint recognition sensors built in the body, and the sensor may be placed in the inner layer of the terminal screen or embedded in a plastic or metal casing constituting the body.
  • the working principle diagram of the ultrasonic fingerprint recognition sensor transmits an ultrasonic wave of a certain frequency to the surrounding space to detect an object within the ultrasonic detection range. If the detected object is a human finger, the ultrasonic wave encounters the human body. Reflected waves are generated after the fingers, and the uneven fingerprint surface of the human finger leads to different positions. The delay time of the reflected wave is different. By analyzing the received reflected wave, the fingerprint image of the finger can be obtained.
  • the fingerprint image can be two-dimensional or three-dimensional, and can accurately capture the texture on the fingerprint.
  • the fingerprint image acquisition method based on the ultrasonic fingerprint recognition sensor does not affect the accuracy of the acquired fingerprint image even if the user's finger is contaminated with water, dust, grease, etc.
  • the ultrasonic fingerprint recognition sensor can detect the ultrasonic detection range. All objects inside, which means that there is no need for the detected object to have direct contact with the mobile terminal.
  • the ultrasonic fingerprint recognition sensor obtains a fingerprint image of one or more fingers from which at least one fingerprint feature data can be extracted for identifying the identity of the user.
  • the body of the mobile terminal has a built-in fingerprint recognition sensor, and the push-type fingerprint recognition sensor can be on the screen edge, the back of the fuselage, and the front of the fuselage to be held by the user.
  • the fingerprint of the user is collected when the mobile terminal is used.
  • the mobile terminal obtains a fingerprint image including one or more finger fingerprints by pressing the fingerprint recognition sensor, and extracts at least one fingerprint feature data from the fingerprint image for identifying the identity of the user.
  • the fingerprint feature data is detected according to a predefined fingerprint database, and it is determined whether the fingerprint feature data includes fingerprint feature data of an illegal user.
  • the mobile terminal stores a predefined fingerprint database, where the fingerprint database is used to detect the fingerprint feature data of the obtained user, and determine the legality of the user identity.
  • the predefined fingerprint database can be stored in memory or ROM, usually by an administrator user of the mobile terminal. Before detecting the fingerprint feature data, the administrator user acquires the control authority of the mobile terminal, enters the initialization step of the predefined fingerprint database, and inputs the fingerprint of the at least one finger into the mobile terminal.
  • the predefined fingerprint database includes fingerprint feature data of the legal user
  • the obtained fingerprint feature data is detected according to the predefined fingerprint database to determine whether the fingerprint feature data includes fingerprint feature data of the illegal user.
  • the matching similarity between the fingerprint feature data of the legal user and each fingerprint feature data is traversed, and if the matching similarity between the fingerprint feature data of the current matching matching similarity calculation and the fingerprint feature data of any legal user is not greater than a preset threshold And determining that the fingerprint feature data currently participating in the matching similarity calculation does not belong to the fingerprint feature data of the legal user, that is, the fingerprint feature data obtained in step S101 includes the fingerprint feature data of the illegal user.
  • the predefined fingerprint database includes fingerprint feature data of the illegal user
  • the obtained fingerprint feature data is detected according to the predefined fingerprint database, and the fingerprint is determined. Whether the data contains fingerprint data of illegal users.
  • the matching similarity between the fingerprint feature data of the illegal user and each fingerprint feature data is traversed. If the matching similarity between the fingerprint feature data of the current matching matching similarity calculation and the fingerprint feature data of one of the illegal users is greater than a preset threshold, it is determined.
  • the fingerprint feature data obtained in step S101 includes fingerprint feature data of an illegal user.
  • the mobile terminal sends a control command to the second terminal, so that the second terminal sends an early warning signal.
  • the mobile terminal when determining that the fingerprint feature data includes the fingerprint feature data of the illegal user, determining that the mobile terminal has a non-goodwill touch or proximity in the current scenario, facing a certain degree of theft risk, the mobile terminal generates and Sending a control command to the second terminal, the control command is configured to generate an early warning signal on the second terminal to remind the user to strengthen protection of the mobile terminal.
  • the user's wearable smart device can be used as the second terminal, such as a smart watch, a smart bracelet, smart glasses, and the like.
  • There is a wireless connection between the second terminal and the mobile terminal including Near Field Communication (NFC), Bluetooth, and Wi-Fi.
  • NFC Near Field Communication
  • Bluetooth Bluetooth
  • the user can timely check the state of the mobile terminal and strengthen the protection of the mobile terminal. For example, when there is an NFC connection between the second terminal and the mobile terminal, the mobile terminal transmits a control command to the second terminal through the near field communication unit, so that the second terminal generates an early warning signal.
  • an early warning signal such as LED flashing, terminal vibration, and playing ringtone
  • the second terminal after receiving the control instruction, the second terminal generates an early warning signal according to the pre-stored configuration table.
  • the configuration table maintains a mapping relationship between the type of the second terminal and the preferred early warning signal. For example, when the second terminal is a smart watch, after receiving the control command, an early warning signal in the form of ringing, vibration, or the like is generated according to the mapping relationship in the pre-stored configuration table; when the second terminal is a smart wristband, an LED is generated. The warning signal in the form of flashing, vibrating, etc.; when the second terminal is smart glasses, the preset prompt information is displayed on the lens.
  • the mobile terminal is considered to be at a high risk of theft, and can be controlled.
  • the more obvious early warning signals generated on the two terminals such as higher frequency LED light flashing, more intense terminal vibration, playing more urgent ring tones, and the like.
  • the mobile terminal acquires at least one fingerprint feature data by using a fingerprint identification sensor, and detects the fingerprint feature data according to a predefined fingerprint database, and determines the fingerprint feature. Whether the levy data includes fingerprint feature data of the illegal user, if the fingerprint feature data includes fingerprint feature data of the illegal user, the mobile terminal sends a control command to the second terminal, and generates an early warning signal on the second terminal to remind the user Strengthen the protection of the mobile terminal. When detecting the identity of the user approaching or touching the mobile terminal, the embodiment of the present invention sends an early warning signal on the second terminal, which improves the security of the mobile terminal.
  • FIG. 3 is a flowchart of another method for protecting a mobile terminal according to an embodiment of the present invention.
  • the method may include steps S301-S305.
  • the mobile terminal acquires a fingerprint image of a user in an ultrasound detection range by using an ultrasonic fingerprint recognition sensor, where the fingerprint image of the user in the ultrasound detection range includes a two-dimensional fingerprint image and a three-dimensional fingerprint image.
  • the mobile terminal has one or more ultrasonic fingerprint recognition sensors built in the body, and the sensor may be placed in the inner layer of the terminal screen or embedded in a plastic or metal casing constituting the body.
  • This embodiment of the present invention does not limit this.
  • the ultrasonic wave emitted by the ultrasonic fingerprint recognition sensor to the surrounding space generates a reflected wave after encountering the human finger.
  • the unevenness of the fingerprint surface of the human finger surface causes the delay time of the reflected wave at different positions to be different, and the reflected wave received by the analysis is analyzed.
  • a fingerprint image of the finger can be obtained, and the fingerprint image can be two-dimensional or three-dimensional, and can accurately capture the texture on the fingerprint.
  • the fingerprint image acquisition method based on the ultrasonic fingerprint recognition sensor does not affect the accuracy of the acquired fingerprint image even if the user's finger is contaminated with water, dust, grease, etc.
  • the ultrasonic fingerprint recognition sensor can detect the ultrasonic detection range. All objects inside, which means that there is no need for the detected object to have direct contact with the mobile terminal. It is assumed that the ultrasonic detecting distance of the ultrasonic fingerprint recognition sensor of the mobile terminal here is 15 cm, and if there is a finger approaching 10 cm from the body of the mobile terminal, a fingerprint image of the finger can be obtained.
  • a fingerprint feature extraction algorithm is run on the fingerprint image.
  • the fingerprint feature data with insufficient feature information is discarded, and at least one fingerprint feature data is obtained. Assume that two fingerprint feature data are obtained here, namely Pm1 and Pm2.
  • the mobile terminal pre-enters and saves a predefined fingerprint database, and the user with the administrator authority pre-records the fingerprint feature data of one or more legitimate users on the mobile terminal as a pre-preparation.
  • the defined fingerprint database The matching similarity between each fingerprint feature data obtained in S302 and the predefined fingerprint database is traversed. Assuming that the fingerprint feature data of the legitimate users here is Pm3 and Pm4, the matching similarity of the four pairs of data of Pm1 and Pm3, Pm1 and Pm4, Pm2 and Pm3, Pm2 and Pm4 is calculated.
  • the fingerprint feature is determined in the matching similarity calculation in step S303.
  • the data does not belong to the fingerprint feature data of the legitimate user, that is, the fingerprint feature data obtained in step S302 includes the fingerprint feature data of the illegal user.
  • the preset threshold is 0.99
  • the matching similarities of Pm1 and Pm3, Pm1 and Pm4, Pm2 and Pm3, Pm2 and Pm4 are 0.57, 0.45, 0.55, and 0.997, respectively, and the fingerprint characteristic data of Pm2 belonging to legal users can be determined.
  • Pm1 does not belong to the fingerprint feature data of the legitimate user, and Pm1 and Pm2 contain the fingerprint feature data of the illegal user.
  • the mobile terminal sends a control command to the second terminal, so that the second terminal sends an early warning signal.
  • the mobile terminal when determining that the fingerprint feature data includes the fingerprint feature data of the illegal user, determining that the mobile terminal has a non-goodwill touch or proximity in the current scenario, facing a certain degree of theft risk, the mobile terminal generates and Sending a control command to the second terminal, the control command is configured to generate an early warning signal on the second terminal to remind the user to strengthen protection of the mobile terminal.
  • the user's wearable smart device can be used as the second terminal, such as a smart watch, a smart bracelet, smart glasses, and the like.
  • There is a wireless connection between the second terminal and the mobile terminal including Near Field Communication (NFC), Bluetooth, and Wi-Fi.
  • NFC Near Field Communication
  • Bluetooth Bluetooth
  • the user can timely check the state of the mobile terminal and strengthen the protection of the mobile terminal. For example, when there is an NFC connection between the second terminal and the mobile terminal, the mobile The terminal transmits a control command to the second terminal through the near field communication unit, so that the second terminal generates an early warning signal.
  • an early warning signal such as LED flashing, terminal vibration, and playing ringtone
  • the second terminal after receiving the control instruction, the second terminal generates an early warning signal according to the pre-stored configuration table.
  • the configuration table maintains a mapping relationship between the type of the second terminal and the preferred early warning signal. For example, when the second terminal is a smart watch, after receiving the control command, an early warning signal in the form of ringing, vibration, or the like is generated according to the mapping relationship in the pre-stored configuration table; when the second terminal is a smart wristband, an LED is generated. The warning signal in the form of flashing, vibrating, etc.; when the second terminal is smart glasses, the preset prompt information is displayed on the lens.
  • the mobile terminal is considered to be at a high risk of theft, and can be controlled.
  • the more obvious early warning signals generated on the two terminals such as higher frequency LED light flashing, more intense terminal vibration, playing more urgent ring tones, and the like.
  • the mobile terminal acquires at least one fingerprint feature data by using an ultrasonic fingerprint recognition sensor, and detects the fingerprint feature data according to a predefined fingerprint database including fingerprint feature data of the legal user, and determines whether the fingerprint feature data is The fingerprint feature data of the illegal user is included. If the fingerprint feature data includes the fingerprint feature data of the illegal user, the mobile terminal sends a control command to the second terminal, and generates an early warning signal on the second terminal to remind the user to strengthen the The protection of the mobile terminal. When detecting the identity of the user approaching or touching the mobile terminal, the embodiment of the present invention sends an early warning signal on the second terminal, which improves the security of the mobile terminal.
  • FIG. 4 is a flowchart of still another method for protecting a mobile terminal according to an embodiment of the present invention.
  • the method may include steps S401-S405.
  • the mobile terminal acquires a fingerprint image of a user in an ultrasound detection range by using an ultrasonic fingerprint recognition sensor, where the fingerprint image of the user in the ultrasound detection range includes a two-dimensional fingerprint image and a three-dimensional fingerprint image.
  • the predefined fingerprint database includes fingerprint feature data of the illegal user
  • the obtained fingerprint feature data is detected according to the predefined fingerprint database to determine whether the fingerprint feature data includes fingerprint feature data of the illegal user.
  • a user with administrator rights pre-records fingerprint feature data of one or more illegal users on the mobile terminal as a predefined fingerprint database.
  • the traversal calculates the matching similarity between each fingerprint feature data obtained and the predefined fingerprint database. Assume that the fingerprint feature data of the illegal users here are Pm5 and Pm6, and the acquired fingerprint feature data is Pm7 and Pm8, and the matching of Pm7 and Pm5, Pm7 and Pm6, Pm8 and Pm5, Pm8 and Pm6 is similar. degree.
  • the matching similarity between the fingerprint feature data and the fingerprint feature data of any of the illegal users is greater than a preset threshold in the matching similarity calculation in step S403, determining that the fingerprint feature data is the fingerprint feature data of the illegal user, that is, the step
  • the fingerprint feature data obtained in S402 includes fingerprint feature data of the illegal user.
  • the preset threshold is 0.99
  • the matching similarities of the four pairs of data of Pm7 and Pm5, Pm7 and Pm6, Pm8 and Pm5, Pm8 and Pm6 are 0.998, 0.45, 0.55, and 0.37, respectively, and it can be determined that Pm7 is the fingerprint characteristic data of the illegal user.
  • Pm7 and Pm8 contain fingerprint feature data of illegal users.
  • the mobile terminal sends a control command to the second terminal, so that the second terminal sends an early warning signal.
  • steps S401 to S402 and the step S405 in the embodiment of the present invention refer to steps S301 to S302 and step S305 of the method shown in FIG. 3, and details are not described herein.
  • the mobile terminal acquires at least one fingerprint feature data by using an ultrasonic fingerprint recognition sensor, and detects the fingerprint feature data according to a predefined fingerprint database including fingerprint feature data of the illegal user, and determines whether the fingerprint feature data is The fingerprint feature data of the illegal user is included. If the fingerprint feature data includes the fingerprint feature data of the illegal user, the mobile terminal sends a control command to the second terminal, and generates an early warning signal on the second terminal to remind the user to strengthen the The protection of the mobile terminal. When detecting the identity of the user approaching or touching the mobile terminal, the embodiment of the present invention sends an early warning signal on the second terminal, which improves the security of the mobile terminal.
  • FIG. 5 is a flowchart of still another method for protecting a mobile terminal according to an embodiment of the present invention.
  • the method may include steps S501-S505.
  • the mobile terminal acquires a fingerprint image left by the user touching the body through a push-type fingerprint recognition sensor built in the body.
  • the body of the mobile terminal has a built-in fingerprint recognition sensor, and the push-type fingerprint recognition sensor can be on the screen edge, the back of the fuselage, and the front of the fuselage to be held by the user.
  • the fingerprint of the user is collected when the mobile terminal is used.
  • the mobile terminal obtains a fingerprint image including one or more finger fingerprints by the push type fingerprint recognition sensor.
  • the mobile terminal sends a control command to the second terminal, so that the second terminal sends an early warning signal.
  • steps S502 to S505 in the embodiment of the present invention refer to steps S302 to S305 of the method shown in FIG. 3, and details are not described herein.
  • the mobile terminal acquires at least one fingerprint feature data by using a push-type fingerprint recognition sensor, and detects the fingerprint feature data according to a predefined fingerprint database including fingerprint feature data of the legal user, and determines the fingerprint feature data. Whether the fingerprint feature data of the illegal user is included, if the fingerprint feature data includes the fingerprint feature data of the illegal user, the mobile terminal sends a control command to the second terminal, and generates an early warning signal on the second terminal to remind the user to strengthen the pair. Protection of the mobile terminal. When detecting the identity of the user approaching or touching the mobile terminal, the embodiment of the present invention sends an early warning signal on the second terminal, which improves the security of the mobile terminal.
  • FIG. 6 is a flowchart of still another method for protecting a mobile terminal according to an embodiment of the present invention.
  • the method may include steps S601-S605.
  • the mobile terminal acquires a fingerprint image left by the user touching the body through a push-type fingerprint recognition sensor built in the body.
  • the mobile terminal sends a control command to the second terminal, so that the second terminal sends an early warning signal.
  • step S501 of the method shown in FIG. 5 and steps S402 to S405 of the method shown in FIG. 4, respectively.
  • the mobile terminal acquires at least one fingerprint feature data by using a push-type fingerprint recognition sensor, and detects the fingerprint feature data according to a predefined fingerprint database including fingerprint feature data of the illegal user, and determines the fingerprint feature data. Whether the fingerprint feature data of the illegal user is included, if the fingerprint feature data includes the fingerprint feature data of the illegal user, the mobile terminal sends a control command to the second terminal, and generates an early warning signal on the second terminal to remind the user to strengthen the pair. Protection of the mobile terminal. When detecting the identity of the user approaching or touching the mobile terminal, the embodiment of the present invention sends an early warning signal on the second terminal, which improves the security of the mobile terminal.
  • a protection device for a mobile terminal according to an embodiment of the present invention will be described in detail below with reference to FIG. 7 to FIG.
  • FIG. 7 is a schematic structural diagram of a protection apparatus for a mobile terminal according to an embodiment of the present invention.
  • the apparatus includes: an obtaining module 701, a detecting module 702, and an early warning module 703.
  • the obtaining module 701 is configured to acquire at least one fingerprint feature data by using a fingerprint recognition sensor on the mobile terminal.
  • the detecting module 702 is configured to detect the fingerprint feature data according to a predefined fingerprint database, and determine whether the fingerprint feature data includes fingerprint feature data of an illegal user.
  • the warning module 703 is configured to: if the fingerprint feature data includes fingerprint feature data of an illegal user, Sending a control command from the mobile terminal to the second terminal, so that the second terminal sends an early warning signal.
  • FIG. 8 is a schematic structural diagram of an embodiment of an obtaining module 701 according to an embodiment of the present invention.
  • the acquiring module 701 may include: an image obtaining unit 7011 and a feature extracting unit 7012.
  • the image obtaining unit 7011 is configured to acquire a fingerprint image of the user by using the fingerprint recognition sensor on the mobile terminal.
  • the feature extraction unit 7012 is configured to obtain at least one fingerprint feature data of the user according to the fingerprint image of the user, where the fingerprint feature data is used for identity identification of the user.
  • step S302 of the method shown in FIG. 3 For the specific function of the feature extraction unit 7012 in the embodiment of the present invention, refer to step S302 of the method shown in FIG. 3, and details are not described herein.
  • FIG. 9 a schematic structural diagram of an embodiment of the image obtaining unit 7011 in the embodiment of the present invention may be referred to FIG. 9.
  • the image obtaining unit 7011 may include an ultrasound acquiring subunit 70111 and a pressing acquiring subunit 70112.
  • the ultrasound acquisition subunit 70111 is configured to acquire, by using an ultrasonic fingerprint recognition sensor on the mobile terminal, a fingerprint image of a user in an ultrasound detection range, where the fingerprint image of the user in the ultrasound detection range includes a two-dimensional fingerprint image and 3D fingerprint image.
  • the specific functions of the ultrasound acquisition subunit 70111 and the compression acquisition subunit 70112 can be respectively referred to step S301 of the method shown in FIG. 3 and step S501 of the method shown in FIG. 5, and details are not described herein.
  • the image acquisition unit 7011 including the ultrasound acquisition subunit 70111 can be applied to the methods illustrated in FIGS. 3 and 4, and the image acquisition unit 7011 including the compression acquisition subunit 70112 can be applied to the methods illustrated in FIGS. 5 and 6.
  • FIG. 10 is a schematic structural diagram of an embodiment of a detection module 702 according to an embodiment of the present invention.
  • the detection module 702 may include: a first matching unit 70211, a first determining unit 70212, a second matching unit 70221, and a second determination. Unit 70222.
  • the detecting module 702 includes:
  • the first matching unit 70211 is configured to calculate a matching similarity between the fingerprint feature data of the legal user and the fingerprint feature data.
  • the first determining unit 70212 is configured to determine that the fingerprint feature data includes fingerprint feature data of the illegal user if the matching similarity is not greater than a preset threshold.
  • the detecting module 702 includes:
  • the second matching unit 70221 is configured to calculate a matching similarity between the fingerprint feature data of the illegal user and the fingerprint feature data.
  • the second determining unit 70222 is configured to determine that the fingerprint feature data includes fingerprint feature data of the illegal user if the matching similarity is greater than a preset threshold.
  • Steps S403 and S404 of the method shown in FIG. 4 are not described herein.
  • the detecting module 702 including the first matching unit 70211 and the first determining unit 70212 can be applied to the methods shown in FIG. 3 and FIG. 5, and the detecting module 702 including the second matching unit 70221 and the second determining unit 70222 can be applied to FIG. 4. And the method shown in FIG. 6.
  • the mobile terminal acquires at least one fingerprint feature data by using the fingerprint identification sensor, and detects the fingerprint feature data according to the predefined fingerprint database, and determines whether the fingerprint feature data includes fingerprint feature data of the illegal user.
  • the fingerprint feature data includes fingerprint feature data of an illegal user
  • the mobile terminal sends a control command to the second terminal, and generates an early warning signal on the second terminal to remind the user to strengthen protection of the mobile terminal.
  • the embodiment of the present invention sends an early warning signal on the second terminal, which improves the security of the mobile terminal.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Collating Specific Patterns (AREA)

Abstract

本发明实施例公开了一种移动终端的保护方法及装置,其中该方法包括:移动终端通过指纹识别传感器获取至少一个指纹特征数据;根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据;若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。实施本发明实施例,当检测到接近或触碰移动终端的用户的身份非法时,在第二终端上发出预警信号,提升了移动终端的安全性。

Description

一种移动终端的保护方法及装置
本申请要求于2015年6月30日提交中国专利局,申请号为201510374639.0、发明名称为“一种移动终端的保护方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及移动通信领域,尤其涉及一种移动终端的保护方法及装置。
背景技术
现实生活中,以智能手机为代表的移动终端的失窃现象屡见不鲜。伴随着移动互联网与人们生活的深度结合,智能手机已成为用户重要的个人物品。加强对智能手机等移动终端的保护成为一个热点话题。
目前的移动终端主要是通过远程控制的方法来达到防盗保护及找回的目的,比如苹果手机可以通过“查找iPhone”应用获取苹果的终端设备的地理位置信息、远程控制苹果的终端设备发出铃声、远程格式化内存数据等,安装了“腾讯手机管家”应用的移动终端在开启了“手机防盗”功能选项后,一旦移动终端丢失或者被盗了,只要该移动终端有更换SIM(Subscriber Identity Module,用户身份识别模块)卡,会将更换后的号码通过短信的方式发送给用户设置的紧急联系人,也会发邮件到预设邮箱,提醒用户手机可能被盗,可登陆应用的官方网站来远程控制该移动终端。但是,以上的保护方法都是在移动终端丢失后的补救措施,不能防止移动终端被盗走。
发明内容
本发明实施例提供一种移动终端的保护方法及装置,当检测到接近或触碰移动终端的用户的身份非法时,在第二终端上发出预警信号,提升了移动终端的安全性。
本发明一方面提供了一种移动终端的保护方法,包括:
移动终端通过指纹识别传感器获取至少一个指纹特征数据;
根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据;
若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。
本发明另一方面还提供了一种移动终端的保护装置,包括:
获取模块,用于在移动终端上通过指纹识别传感器获取至少一个指纹特征数据;
检测模块,用于根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据;
预警模块,用于若所述指纹特征数据包含非法用户的指纹特征数据,从所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。
实施本发明实施例,具有如下有益效果:
本发明实施例通过移动终端通过指纹识别传感器获取至少一个指纹特征数据,根据预定义的指纹数据库对该指纹特征数据进行检测,确定该指纹特征数据是否包含非法用户的指纹特征数据,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,在所述第二终端上产生预警信号以提醒用户加强对所述移动终端的保护。本发明实施例中,当检测到接近或触碰移动终端的用户的身份非法时,在第二终端上发出预警信号,提升了移动终端的安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例提供的一种移动终端的保护方法的流程图;
图2为本发明实施例提供的超声波指纹识别传感器的工作原理图;
图3为本发明实施例提供的另一种移动终端的保护方法的流程图;
图4为本发明实施例提供的又一种移动终端的保护方法的流程图;
图5为本发明实施例提供的又一种移动终端的保护方法的流程图;
图6为本发明实施例提供的又一种移动终端的保护方法的流程图;
图7为本发明实施例提供的一种移动终端的保护装置的结构示意图;
图8为本发明实施例提供的获取模块的一个实施例的结构示意图;
图9为本发明实施例提供的图像获取单元的一个实施例的结构示意图;
图10为本发明实施例提供的检测模块的一个实施例的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明实施例中,移动终端可以是智能手机、平板电脑、PC(Personal Computer,个人计算机)、电子阅读器等设备中的任一种,第二终端可以是智能手机、平板电脑、智能眼镜、智能手环、智能手表等设备中的任一种,优选的,将可穿戴智能设备作为第二终端。
下面将结合附图1-附图6,对本发明实施例提供的移动终端的保护方法进行详细说明。
请参见图1,为本发明实施例提供的一种移动终端的保护方法的流程图,该方法可包括步骤S101-S103。
S101,移动终端通过指纹识别传感器获取至少一个指纹特征数据。
作为一种可选的实施方式,移动终端具有指纹识别功能,移动终端通过内置的指纹识别传感器获取指纹特征数据。进一步可选的,指纹识别传感器可独立于移动终端而存在,移动终端与指纹识别传感器之间通过无线网络相连接,移动终端接收由指纹识别传感器采集并发送的指纹特征数据。
作为一种可选的实施方式,移动终端的机身内置了一个或多个的超声波指纹识别传感器,该传感器可置于终端屏幕内层,也可以内嵌于构成机身的塑料或金属外壳里,本发明实施例对此不做限定。如图2所示,为超声波指纹识别传感器的工作原理图,超声波指纹识别传感器向周边空间发射一定频率的超声波,检测超声探测范围内的物体,若被探测物体是人体手指,超声波在遇到人体手指后会产生反射波,人体手指表面凹凸不平的指纹纹路导致不同位置上的 反射波的延迟时间各不相同,通过分析接收到的反射波可以得到该手指的指纹图像,该指纹图像既可以是二维的,也可以是三维的,能够准确地捕捉指纹上的纹路。基于超声波指纹识别传感器的指纹图像获取方式,即便用户手指上沾有水、灰尘、油脂等杂物,也不会影响所获取的指纹图像的准确性;同时,超声波指纹识别传感器能检测超声探测范围内的所有物体,这意味着不需要被探测物体与移动终端存在直接接触。超声波指纹识别传感器获得一个或多个手指的指纹图像,从中可提取出至少一个指纹特征数据,用于鉴定用户的身份。
作为一种可选的实施方式,移动终端的机身内置了按压式指纹识别传感器,该按压式指纹识别传感器可处于机框沿、机身背面、机身正面的屏幕上,以便在用户握持移动终端时采集用户的指纹。移动终端通过按压式指纹识别传感器获得包括一个或多个手指指纹的指纹图像,并从所述指纹图像中提取出至少一个指纹特征数据,用于鉴定用户的身份。
S102,根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据。
作为一种可选的实施方式,移动终端上存储了预定义的指纹数据库,该指纹数据库用于对获得的用户的指纹特征数据进行检测,判断用户身份的合法性。预定义的指纹数据库可存储于内存或ROM中,通常是由该移动终端的管理员用户设置的。在对指纹特征数据进行检测之前,管理员用户获取移动终端的控制权限,进入预定义的指纹数据库的初始化步骤,将至少一个手指的指纹录入到移动终端中。
作为一种可选的实施方式,预定义的指纹数据库包括合法用户的指纹特征数据,根据预定义的指纹数据库对获得的指纹特征数据进行检测,确定指纹特征数据是否包含非法用户的指纹特征数据。首先遍历计算合法用户的指纹特征数据与每一个指纹特征数据的匹配相似度,若当前参与匹配相似度计算的指纹特征数据与任意一个合法用户的指纹特征数据的匹配相似度都不大于预设阈值,确定当前参与匹配相似度计算的指纹特征数据不属于合法用户的指纹特征数据,即步骤S101中获得的指纹特征数据包含非法用户的指纹特征数据。
作为一种可选的实施方式,预定义的指纹数据库包括非法用户的指纹特征数据,根据预定义的指纹数据库对获得的指纹特征数据进行检测,确定指纹特 征数据是否包含非法用户的指纹特征数据。首先遍历计算非法用户的指纹特征数据与每一个指纹特征数据的匹配相似度,若当前参与匹配相似度计算的指纹特征数据与其中一个非法用户的指纹特征数据的匹配相似度大于预设阈值,确定步骤S101中获得的指纹特征数据包含非法用户的指纹特征数据。
S103,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。
作为一种可选的实施方式,在确定指纹特征数据包含非法用户的指纹特征数据时,认定当前场景下该移动终端存在非善意的触碰或接近,面临一定程度的失窃风险,移动终端生成并发送控制指令到第二终端,所述控制指令用于在第二终端上产生预警信号以提醒用户加强对所述移动终端的保护。优选的,可将用户的可穿戴智能设备作为第二终端,比如智能手表、智能手环、智能眼镜等。第二终端与移动终端之间存在包括近场通信(Near Field Communication,NFC)、蓝牙、Wi-Fi的无线连接。通过在第二终端上产生LED灯闪烁、终端振动、播放铃声等预警信号,使用户能及时地去查看移动终端的状态,加强对移动终端的保护。例如当第二终端与移动终端之间存在NFC的连接时,移动终端通过近场通信单元将控制指令发送到第二终端上,以使第二终端产生预警信号。
进一步可选的,第二终端在接收到控制指令后,根据预存的配置表生成预警信号。该配置表维护了第二终端的类型与优选的预警信号之间的映射关系。比如当第二终端为智能手表时,在接收到控制指令后,根据预存的配置表中的映射关系产生响铃、振动等形式的预警信号;当第二终端为智能手环时,则产生LED灯闪烁、振动等形式的预警信号;当第二终端为智能眼镜时,则在镜片上显示预设的提示信息等。
进一步可选的,若在指纹特征数据中只检测到非法用户的指纹特征数据,同时没检测到至少一个的合法用户的指纹特征数据,则认为移动终端面临较高的失窃风险,可控制在第二终端上产生的更明显的预警信号,比如更高频率的LED灯闪烁、更强烈的终端振动、播放更急促的铃声等。
本发明实施例中,移动终端通过指纹识别传感器获取至少一个指纹特征数据,根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特 征数据是否包含非法用户的指纹特征数据,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,在所述第二终端上产生预警信号以提醒用户加强对所述移动终端的保护。本发明实施例当检测到接近或触碰移动终端的用户的身份非法时,在第二终端上发出预警信号,提升了移动终端的安全性。
请参见图3,为本发明实施例提供的另一种移动终端的保护方法的流程图,该方法可包括步骤S301-S305。
S301,所述移动终端通过超声波指纹识别传感器来获取处于超声探测范围内的用户的指纹图像,所述处于超声探测范围内的用户的指纹图像包括二维指纹图像和三维指纹图像。
作为一种可选的实施方式,移动终端的机身内置了一个或多个的超声波指纹识别传感器,该传感器可置于终端屏幕内层,也可以内嵌于构成机身的塑料或金属外壳里,本发明实施例对此不做限定。超声波指纹识别传感器向周边空间发射的超声波在遇到人体手指后会产生反射波,人体手指表面凹凸不平的指纹纹路导致不同位置上的反射波的延迟时间各不相同,通过分析接收到的反射波可以得到该手指的指纹图像,该指纹图像既可以是二维的,也可以是三维的,能够准确地捕捉指纹上的纹路。基于超声波指纹识别传感器的指纹图像获取方式,即便用户手指上沾有水、灰尘、油脂等杂物,也不会影响所获取的指纹图像的准确性;同时,超声波指纹识别传感器能检测超声探测范围内的所有物体,这意味着不需要被探测物体与移动终端存在直接接触。假设此处移动终端的超声波指纹识别传感器的超声探测距离为15cm,若在距离移动终端机身10cm处有手指靠近,则可获得手指的指纹图像。
S302,根据所述用户的指纹图像获得用户的至少一个指纹特征数据,所述指纹特征数据用于用户的身份鉴定。
作为一种可选的实施方式,对步骤S301中获得的用户的指纹图像执行图像去噪等预处理操作后,在该指纹图像上运行指纹特征提取算法。对特征信息不足的指纹特征数据予以舍弃,得到至少一个指纹特征数据。假设这里得到了两个指纹特征数据,分别为Pm1和Pm2。
S303,计算包括合法用户的指纹特征数据的预定义的指纹数据库与所述指纹特征数据的匹配相似度。
作为一种可选的实施方式,移动终端预先录入并保存了一个预定义的指纹数据库,具有管理员权限的用户在该移动终端上预先录入了一个或多个的合法用户的指纹特征数据作为预定义的指纹数据库。遍历计算S302中得到的每一个指纹特征数据与预定义的指纹数据库的匹配相似度。假设这里的合法用户的指纹特征数据为Pm3和Pm4,一共需计算Pm1与Pm3、Pm1与Pm4、Pm2与Pm3、Pm2与Pm4这四对数据的匹配相似度。
S304,若所述匹配相似度不大于预设阈值,确定所述指纹特征数据包含非法用户的指纹特征数据。
作为一种可选的实施方式,若在步骤S303中的匹配相似度计算中,某一个指纹特征数据与任意一个合法用户的指纹特征数据的匹配相似度都不大于预设阈值,确定该指纹特征数据不属于合法用户的指纹特征数据,即步骤S302中获得的指纹特征数据包含非法用户的指纹特征数据。例如预设阈值为0.99,Pm1与Pm3、Pm1与Pm4、Pm2与Pm3、Pm2与Pm4这四对数据的匹配相似度分别为0.57、0.45、0.55、0.997,可确定Pm2属于合法用户的指纹特征数据,Pm1不属于合法用户的指纹特征数据,Pm1和Pm2中包含非法用户的指纹特征数据。
S305,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。
作为一种可选的实施方式,在确定指纹特征数据包含非法用户的指纹特征数据时,认定当前场景下该移动终端存在非善意的触碰或接近,面临一定程度的失窃风险,移动终端生成并发送控制指令到第二终端,所述控制指令用于在第二终端上产生预警信号以提醒用户加强对所述移动终端的保护。优选的,可将用户的可穿戴智能设备作为第二终端,比如智能手表、智能手环、智能眼镜等。第二终端与移动终端之间存在包括近场通信(Near Field Communication,NFC)、蓝牙、Wi-Fi的无线连接。通过在第二终端上产生LED灯闪烁、终端振动、播放铃声等预警信号,使用户能及时地去查看移动终端的状态,加强对移动终端的保护。例如当第二终端与移动终端之间存在NFC的连接时,移动 终端通过近场通信单元将控制指令发送到第二终端上,以使第二终端产生预警信号。
进一步可选的,第二终端在接收到控制指令后,根据预存的配置表生成预警信号。该配置表维护了第二终端的类型与优选的预警信号之间的映射关系。比如当第二终端为智能手表时,在接收到控制指令后,根据预存的配置表中的映射关系产生响铃、振动等形式的预警信号;当第二终端为智能手环时,则产生LED灯闪烁、振动等形式的预警信号;当第二终端为智能眼镜时,则在镜片上显示预设的提示信息等。
进一步可选的,若在指纹特征数据中只检测到非法用户的指纹特征数据,同时没检测到至少一个的合法用户的指纹特征数据,则认为移动终端面临较高的失窃风险,可控制在第二终端上产生的更明显的预警信号,比如更高频率的LED灯闪烁、更强烈的终端振动、播放更急促的铃声等。
本发明实施例中,移动终端通过超声波指纹识别传感器获取至少一个指纹特征数据,根据包括合法用户的指纹特征数据的预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,在所述第二终端上产生预警信号以提醒用户加强对所述移动终端的保护。本发明实施例当检测到接近或触碰移动终端的用户的身份非法时,在第二终端上发出预警信号,提升了移动终端的安全性。
请参见图4,为本发明实施例提供的又一种移动终端的保护方法的流程图,该方法可包括步骤S401-S405。
S401,所述移动终端通过超声波指纹识别传感器来获取处于超声探测范围内的用户的指纹图像,所述处于超声探测范围内的用户的指纹图像包括二维指纹图像和三维指纹图像。
S402,根据所述用户的指纹图像获得用户的至少一个指纹特征数据,所述指纹特征数据用于用户的身份鉴定。
S403,计算包括非法用户的指纹特征数据的预定义的指纹数据库与所述指纹特征数据的匹配相似度。
作为一种可选的实施方式,预定义的指纹数据库包括非法用户的指纹特征数据,根据预定义的指纹数据库对获得的指纹特征数据进行检测,确定指纹特征数据是否包含非法用户的指纹特征数据。具有管理员权限的用户在该移动终端上预先录入了一个或多个的非法用户的指纹特征数据作为预定义的指纹数据库。遍历计算获取到的每一个指纹特征数据与预定义的指纹数据库的匹配相似度。假设这里的非法用户的指纹特征数据为Pm5和Pm6,获取到的指纹特征数据为Pm7和Pm8,一共需计算Pm7与Pm5、Pm7与Pm6、Pm8与Pm5、Pm8与Pm6这四对数据的匹配相似度。
S404,若所述匹配相似度大于预设阈值,确定所述指纹特征数据包含非法用户的指纹特征数据。
若在步骤S403中的匹配相似度计算中,某一个指纹特征数据与任意一个非法用户的指纹特征数据的匹配相似度大于预设阈值,确定该指纹特征数据是非法用户的指纹特征数据,即步骤S402中获得的指纹特征数据包含非法用户的指纹特征数据。例如预设阈值为0.99,Pm7与Pm5、Pm7与Pm6、Pm8与Pm5、Pm8与Pm6这四对数据的匹配相似度分别为0.998、0.45、0.55、0.37,可确定Pm7是非法用户的指纹特征数据,Pm7和Pm8中包含非法用户的指纹特征数据。
S405,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。
本发明实施例中的步骤S401~S402、步骤S405的具体功能可分别参见图3所示的方法的步骤S301~S302、步骤S305,在此不赘述。
本发明实施例中,移动终端通过超声波指纹识别传感器获取至少一个指纹特征数据,根据包括非法用户的指纹特征数据的预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,在所述第二终端上产生预警信号以提醒用户加强对所述移动终端的保护。本发明实施例当检测到接近或触碰移动终端的用户的身份非法时,在第二终端上发出预警信号,提升了移动终端的安全性。
请参见图5,为本发明实施例提供的又一种移动终端的保护方法的流程图,该方法可包括步骤S501-S505。
S501,所述移动终端通过机身内置的按压式指纹识别传感器来获取用户触碰机身留下的指纹图像。
作为一种可选的实施方式,移动终端的机身内置了按压式指纹识别传感器,该按压式指纹识别传感器可处于机框沿、机身背面、机身正面的屏幕上,以便在用户握持移动终端时采集用户的指纹。当检测到有用户的手指碰触到移动终端时,该移动终端通过按压式指纹识别传感器获得包括一个或多个手指指纹的指纹图像。
S502,根据所述用户的指纹图像获得用户的至少一个指纹特征数据,所述指纹特征数据用于用户的身份鉴定。
S503,计算包括合法用户的指纹特征数据的预定义的指纹数据库与所述指纹特征数据的匹配相似度。
S504,若所述匹配相似度不大于预设阈值,确定所述指纹特征数据包含非法用户的指纹特征数据。
S505,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。
本发明实施例中的步骤S502~S505的具体功能可参见图3所示的方法的步骤S302~S305,在此不赘述。
本发明实施例中,移动终端通过按压式指纹识别传感器获取至少一个指纹特征数据,根据包括合法用户的指纹特征数据的预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,在所述第二终端上产生预警信号以提醒用户加强对所述移动终端的保护。本发明实施例当检测到接近或触碰移动终端的用户的身份非法时,在第二终端上发出预警信号,提升了移动终端的安全性。
请参见图6,为本发明实施例提供的又一种移动终端的保护方法的流程图,该方法可包括步骤S601-S605。
S601,所述移动终端通过机身内置的按压式指纹识别传感器来获取用户触碰机身留下的指纹图像。
S602,根据所述用户的指纹图像获得用户的至少一个指纹特征数据,所述指纹特征数据用于用户的身份鉴定。
S603,计算包括非法用户的指纹特征数据的预定义的指纹数据库与所述指纹特征数据的匹配相似度。
S604,若所述匹配相似度大于预设阈值,确定所述指纹特征数据包含非法用户的指纹特征数据。
S605,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。
本发明实施例中的步骤S601、S602~S605的具体功能可分别参见图5所示的方法的步骤S501、图4所示的方法的步骤S402~S405,在此不赘述。
本发明实施例中,移动终端通过按压式指纹识别传感器获取至少一个指纹特征数据,根据包括非法用户的指纹特征数据的预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,在所述第二终端上产生预警信号以提醒用户加强对所述移动终端的保护。本发明实施例当检测到接近或触碰移动终端的用户的身份非法时,在第二终端上发出预警信号,提升了移动终端的安全性。
下面将结合附图7-附图10,对本发明实施例提供的移动终端的保护装置进行详细介绍。
请参见图7,为本发明实施例提供的一种移动终端的保护装置的结构示意图,该装置包括:获取模块701、检测模块702、预警模块703。
获取模块701,用于在移动终端上通过指纹识别传感器获取至少一个指纹特征数据。
检测模块702,用于根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据。
预警模块703,用于若所述指纹特征数据包含非法用户的指纹特征数据, 从所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。
本发明实施例中的获取模块701~预警模块703的具体功能可参见图1所示的方法的步骤S101~S103,在此不赘述。
请参见图8,为本发明实施例提供的获取模块701的一个实施例的结构示意图,获取模块701可包括:图像获取单元7011、特征提取单元7012。
图像获取单元7011,用于在所述移动终端上通过指纹识别传感器获取用户的指纹图像。
特征提取单元7012,用于根据所述用户的指纹图像获得用户的至少一个指纹特征数据,所述指纹特征数据用于用户的身份鉴定。
本发明实施例中的特征提取单元7012的具体功能可参见图3所示的方法的步骤S302,在此不赘述。
作为一种可选的实施方式,本发明实施例中的图像获取单元7011的一个实施例的结构示意图可参见图9,图像获取单元7011可包括:超声获取子单元70111、按压获取子单元70112。
超声获取子单元70111,用于在所述移动终端上通过超声波指纹识别传感器来获取处于超声探测范围内的用户的指纹图像,所述处于超声探测范围内的用户的指纹图像包括二维指纹图像和三维指纹图像。
按压获取子单元70112,用于在所述移动终端上通过机身内置的按压式指纹识别传感器来获取用户触碰机身留下的指纹图像。
超声获取子单元70111、按压获取子单元70112的具体功能可分别参见图3所示的方法的步骤S301、图5所示的方法的步骤S501,在此不赘述。包含超声获取子单元70111的图像获取单元7011可应用于图3及图4所示的方法,包含按压获取子单元70112的图像获取单元7011可应用于图5及图6所示的方法。
请参见图10,为本发明实施例提供的检测模块702的一个实施例的结构示意图,检测模块702可包括:第一匹配单元70211、第一确定单元70212、第二匹配单元70221、第二确定单元70222。
若所述预定义的指纹数据库包括合法用户的指纹特征数据,所述检测模块702包括:
第一匹配单元70211,用于计算所述合法用户的指纹特征数据与所述指纹特征数据的匹配相似度。
第一确定单元70212,用于若所述匹配相似度不大于预设阈值,确定所述指纹特征数据包含非法用户的指纹特征数据。
若所述预定义的指纹数据库包括非法用户的指纹特征数据,所述检测模块702包括:
第二匹配单元70221,用于计算所述非法用户的指纹特征数据与所述指纹特征数据的匹配相似度。
第二确定单元70222,用于若所述匹配相似度大于预设阈值,确定所述指纹特征数据包含非法用户的指纹特征数据。
本发明实施例中的第一匹配单元70211、第一确定单元70212的具体功能可参见图3所示的方法的步骤S303、S304,第二匹配单元70221、第二确定单元70222的具体功能可参见图4所示的方法的步骤S403、S404,在此不赘述。包含第一匹配单元70211和第一确定单元70212的检测模块702可应用于图3及图5所示的方法,包含第二匹配单元70221和第二确定单元70222的检测模块702可应用于图4及图6所示的方法。
本发明实施例中,移动终端通过指纹识别传感器获取至少一个指纹特征数据,根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据,若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,在所述第二终端上产生预警信号以提醒用户加强对所述移动终端的保护。本发明实施例当检测到接近或触碰移动终端的用户的身份非法时,在第二终端上发出预警信号,提升了移动终端的安全性。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。 其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
以上所揭露的仅为本发明较佳实施例而已,当然不能以此来限定本发明之权利范围,因此依本发明权利要求所作的等同变化,仍属本发明所涵盖的范围。

Claims (10)

  1. 一种移动终端的保护方法,其特征在于,所述方法包括:
    移动终端通过指纹识别传感器获取至少一个指纹特征数据;
    根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据;
    若所述指纹特征数据包含非法用户的指纹特征数据,所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。
  2. 如权利要求1所述的方法,其特征在于,所述移动终端通过指纹识别传感器获取至少一个指纹特征数据,包括:
    所述移动终端通过指纹识别传感器获取用户的指纹图像;
    根据所述用户的指纹图像获得用户的至少一个指纹特征数据,所述指纹特征数据用于用户的身份鉴定。
  3. 如权利要求2所述的方法,其特征在于,所述移动终端通过指纹识别传感器获取用户的指纹图像,包括:
    所述移动终端通过超声波指纹识别传感器来获取处于超声探测范围内的用户的指纹图像,所述处于超声探测范围内的用户的指纹图像包括二维指纹图像和三维指纹图像;或
    所述移动终端通过机身内置的按压式指纹识别传感器来获取用户触碰机身留下的指纹图像。
  4. 如权利要求1-3任一项所述的方法,其特征在于,
    所述预定义的指纹数据库包括合法用户的指纹特征数据;
    所述根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据,包括:
    计算所述合法用户的指纹特征数据与所述指纹特征数据的匹配相似度;
    若所述匹配相似度不大于预设阈值,确定所述指纹特征数据包含非法用户 的指纹特征数据。
  5. 如权利要求1-3任一项所述的方法,其特征在于,
    所述预定义的指纹数据库包括非法用户的指纹特征数据;
    所述根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据,包括:
    计算所述非法用户的指纹特征数据与所述指纹特征数据的匹配相似度;
    若所述匹配相似度大于预设阈值,确定所述指纹特征数据包含非法用户的指纹特征数据。
  6. 一种移动终端的保护装置,其特征在于,所述装置包括:
    获取模块,用于在移动终端上通过指纹识别传感器获取至少一个指纹特征数据;
    检测模块,用于根据预定义的指纹数据库对所述指纹特征数据进行检测,确定所述指纹特征数据是否包含非法用户的指纹特征数据;
    预警模块,用于若所述指纹特征数据包含非法用户的指纹特征数据,从所述移动终端发送控制指令到第二终端,以使所述第二终端发出预警信号。
  7. 如权利要求6所述的装置,其特征在于,所述获取模块包括:
    图像获取单元,用于在所述移动终端上通过指纹识别传感器获取用户的指纹图像;
    特征提取单元,用于根据所述用户的指纹图像获得用户的至少一个指纹特征数据,所述指纹特征数据用于用户的身份鉴定。
  8. 如权利要求7所述的装置,其特征在于,所述图像获取单元包括:
    超声获取子单元,用于在所述移动终端上通过超声波指纹识别传感器来获取处于超声探测范围内的用户的指纹图像,所述处于超声探测范围内的用户的指纹图像包括二维指纹图像和三维指纹图像;
    按压获取子单元,用于在所述移动终端上通过机身内置的按压式指纹识别 传感器来获取用户触碰机身留下的指纹图像。
  9. 如权利要求6-8任一项所述的装置,其特征在于,
    所述预定义的指纹数据库包括合法用户的指纹特征数据;
    所述检测模块包括:
    第一匹配单元,用于计算所述合法用户的指纹特征数据与所述指纹特征数据的匹配相似度;
    第一确定单元,用于若所述匹配相似度不大于预设阈值,确定所述指纹特征数据包含非法用户的指纹特征数据。
  10. 如权利要求6-8任一项所述的装置,其特征在于,
    所述预定义的指纹数据库包括非法用户的指纹特征数据;
    所述检测模块包括:
    第二匹配单元,用于计算所述非法用户的指纹特征数据与所述指纹特征数据的匹配相似度;
    第二确定单元,用于若所述匹配相似度大于预设阈值,确定所述指纹特征数据包含非法用户的指纹特征数据。
PCT/CN2015/085825 2015-06-30 2015-07-31 一种移动终端的保护方法及装置 WO2017000347A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510374639.0 2015-06-30
CN201510374639.0A CN105550552B (zh) 2015-06-30 2015-06-30 一种移动终端的保护方法及装置

Publications (1)

Publication Number Publication Date
WO2017000347A1 true WO2017000347A1 (zh) 2017-01-05

Family

ID=55829739

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/085825 WO2017000347A1 (zh) 2015-06-30 2015-07-31 一种移动终端的保护方法及装置

Country Status (2)

Country Link
CN (1) CN105550552B (zh)
WO (1) WO2017000347A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109085940A (zh) * 2017-06-14 2018-12-25 南昌欧菲生物识别技术有限公司 触控终端及其触控方法和装置
CN109085941A (zh) * 2017-06-14 2018-12-25 南昌欧菲生物识别技术有限公司 触控终端及其触控方法和装置
CN109255211A (zh) * 2017-07-12 2019-01-22 波音公司 移动安全对策

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109075974B (zh) * 2016-10-25 2021-12-21 深圳市汇顶科技股份有限公司 指纹算法库与指纹传感器的绑定认证方法及指纹识别系统
CN107045598A (zh) * 2016-12-14 2017-08-15 广东小天才科技有限公司 一种移动设备的防盗方法及装置
CN107135287A (zh) * 2017-04-05 2017-09-05 广东欧珀移动通信有限公司 终端
CN108647506A (zh) * 2018-04-28 2018-10-12 上海与德通讯技术有限公司 一种指纹密码的录入方法、指纹解锁方法及终端设备
CN109544304B (zh) * 2018-11-29 2021-02-05 每日互动股份有限公司 根据移动终端信息进行预警的方法
CN110263752B (zh) * 2019-06-27 2022-01-11 Oppo广东移动通信有限公司 指纹识别方法及相关产品
CN117221440B (zh) * 2023-09-08 2024-06-21 重庆数智融合创新科技有限公司 基于短消息控制手机终端应用数据安全的方法及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745148A (zh) * 2014-01-26 2014-04-23 广东欧珀移动通信有限公司 一种基于指纹识别的信息保护方法及移动终端
CN104008321A (zh) * 2014-05-28 2014-08-27 惠州Tcl移动通信有限公司 移动终端的基于指纹识别用户权限的判别方法和判断系统
US20140335862A1 (en) * 2013-05-10 2014-11-13 Qualcomm Incorporated Methods and apparatus for enhanced cell detection

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101840611A (zh) * 2010-03-04 2010-09-22 英华达(南昌)科技有限公司 可携式电子设备的防盗系统和方法
CN103118174A (zh) * 2012-12-31 2013-05-22 广东欧珀移动通信有限公司 移动终端的防盗方法及移动终端
CN103354016A (zh) * 2013-07-01 2013-10-16 广东欧珀移动通信有限公司 防止移动终端丢失的报警系统、相关装置和报警方法
CN203786852U (zh) * 2014-01-15 2014-08-20 梁宏 移动终端防盗器及系统
CN103886300A (zh) * 2014-03-27 2014-06-25 上海集成电路研发中心有限公司 一种电容式指纹传感器芯片及其封装结构
CN104484970B (zh) * 2014-12-15 2017-03-22 广东梅雁吉祥水电股份有限公司 防盗方法及系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140335862A1 (en) * 2013-05-10 2014-11-13 Qualcomm Incorporated Methods and apparatus for enhanced cell detection
CN103745148A (zh) * 2014-01-26 2014-04-23 广东欧珀移动通信有限公司 一种基于指纹识别的信息保护方法及移动终端
CN104008321A (zh) * 2014-05-28 2014-08-27 惠州Tcl移动通信有限公司 移动终端的基于指纹识别用户权限的判别方法和判断系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109085940A (zh) * 2017-06-14 2018-12-25 南昌欧菲生物识别技术有限公司 触控终端及其触控方法和装置
CN109085941A (zh) * 2017-06-14 2018-12-25 南昌欧菲生物识别技术有限公司 触控终端及其触控方法和装置
CN109255211A (zh) * 2017-07-12 2019-01-22 波音公司 移动安全对策
CN109255211B (zh) * 2017-07-12 2023-09-15 波音公司 移动安全对策

Also Published As

Publication number Publication date
CN105550552A (zh) 2016-05-04
CN105550552B (zh) 2019-01-15

Similar Documents

Publication Publication Date Title
WO2017000347A1 (zh) 一种移动终端的保护方法及装置
US9973510B2 (en) Contextual device locking/unlocking
WO2019096008A1 (zh) 身份识别方法、计算机设备及存储介质
JP6144849B1 (ja) 電子デバイス間の接続を確立するための方法および装置
TWI679552B (zh) 解鎖控制方法及移動終端
KR102402146B1 (ko) 지문 감지 방법 및 장치
US9514296B2 (en) Automatic authorization for access to electronic device
CN105306204B (zh) 安全验证方法、装置及系统
WO2016041340A1 (zh) 一种提示方法及移动终端
US20160117500A1 (en) Device security using user interaction anomaly detection
EP2919430A1 (en) Apparatus and method for authenticating a user using a wearable electronic device
CN109074435B (zh) 用于提供用户信息的电子设备和方法
WO2016053532A1 (en) Social reminders
AU2013245535A1 (en) Electronic device and method for controlling payment function of input means
US20170344234A1 (en) Unlocking control methods and apparatuses, and electronic devices
CN110286744B (zh) 信息处理方法和装置、电子设备、计算机可读存储介质
CN106506820B (zh) 一种移动终端数据的备份方法及装置
CN105917350B (zh) 隐私保护传感器装置
KR102424296B1 (ko) 복수의 영상들을 제공하기 위한 방법, 저장 매체 및 전자 장치
CN107908939B (zh) 终端报警方法、装置以及移动终端
WO2019019837A1 (zh) 生物识别方法及相关产品
CN108038360B (zh) 一种运行模式的切换方法及移动终端
CN103632141A (zh) 一种识别人物的方法、装置及终端设备
CN110278327A (zh) 数据处理方法及移动终端
AU2017202637B2 (en) Contextual device locking/unlocking

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15896877

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16/05/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 15896877

Country of ref document: EP

Kind code of ref document: A1